Add Results.Process.executable and command.

Permits to know _what_ was executed, which is really needed to understand which
child process is using what. Most of the time was spent in normalizing accross
OSes. Some things where more difficult, especially because of python usage,
since on OSX the /usr/bin/python is a stub that reads /usr/bin/python2.7 symlink
and calls the linked executable manually. Also tries to 'guess' the initial
directory on Windows since the event log is lossy.

Fix yet again NTFS' EXTEND. Will have to redo the blacklisting logic later.

NOTRY=true
TBR=mad@chromium.org
BUG=98636
TEST=manually tested on each OS


Review URL: https://chromiumcodereview.appspot.com/10446052

git-svn-id: svn://svn.chromium.org/chrome/trunk/src@140113 0039d316-1c4b-4281-b951-d872f2087c98
3 files changed