legitimate Windows processes
Here is a list of legitimate Windows processes, their typical paths, purposes, and why attackers might target them. This overview simplifies the information for better understanding.
1. System-Level Processes
System
Path: N/A (Kernel-level process)
Purpose: Manages core operating system functions, including hardware interactions.
Attack Use: Rarely targeted directly but used to hide malicious activity in kernel-mode attacks
smss.exe (Session Manager Subsystem)
Path:
C:\Windows\System32\smss.exePurpose: Handles session initialization during system startup.
Attack Use: Rarely abused; critical to system stability.
csrss.exe (Client/Server Runtime Subsystem)
Path:
C:\Windows\System32\csrss.exePurpose: Manages graphical and console operations.
Attack Use: Sometimes mimicked in process injection attacks.
wininit.exe (Windows Initialization)
Path:
C:\Windows\System32\wininit.exePurpose: Starts system services during boot.
Attack Use: Rarely abused; attackers may spoof this process for persistence
2. Service Host Processes
svchost.exe (Service Host)
Path:
C:\Windows\System32\svchost.exePurpose: Hosts Windows services (e.g., network services, updates).
Attack Use: Common for malicious DLL injection and privilege escalation.
services.exe (Service Control Manager)
Path:
C:\Windows\System32\services.exePurpose: Manages services and their startup processes.
Attack Use: Used to register malicious services for persistence
3. User-Level Processes
explorer.exe (Windows Explorer)
Path:
C:\Windows\explorer.exePurpose: Manages the desktop, taskbar, and file explorer.
Attack Use: Often abused for persistence via COM hijacking or DLL injection.
taskhostw.exe (Task Host)
Path:
C:\Windows\System32\taskhostw.exePurpose: Hosts dynamic-link libraries (DLLs) for tasks and processes.
Attack Use: Used to execute malicious DLLs.
dllhost.exe (COM Surrogate)
Path:
C:\Windows\System32\dllhost.exePurpose: Hosts COM objects that do not run in the main application.
Attack Use: Common for COM hijacking to execute malicious DLLs.
cmd.exe (Command Prompt)
Path:
C:\Windows\System32\cmd.exePurpose: Command-line interface for executing scripts and commands.
Attack Use: Used to execute commands or scripts stealthily.
powershell.exe (PowerShell)
Path:
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePurpose: Scripting tool for automation and management tasks.
Attack Use: A primary tool for attackers due to its powerful scripting capabilities.
4. Network and Communication Processes
lsass.exe (Local Security Authority Subsystem Service)
Path:
C:\Windows\System32\lsass.exePurpose: Manages user authentication and password validation.
Attack Use: Dumped to extract credentials using tools like Mimikatz.
winlogon.exe (Windows Logon Application)
Path:
C:\Windows\System32\winlogon.exePurpose: Manages user logon sessions.
Attack Use: Hijacked for persistence.
mstsc.exe (Remote Desktop Client)
Path:
C:\Windows\System32\mstsc.exePurpose: Remote desktop connections.
Attack Use: Used to interact with compromised systems remotely.
rundll32.exe (Run DLL as an App)
Path:
C:\Windows\System32\rundll32.exePurpose: Executes functions from DLLs.
Attack Use: Abused to execute malicious payloads.
wscript.exe and cscript.exe (Windows Script Host)
Path:
C:\Windows\System32\wscript.exe/C:\Windows\System32\cscript.exePurpose: Runs scripts like VBScript and JScript.
Attack Use: Executes malicious scripts
5. Scheduled Task and Utility Processes
schtasks.exe (Task Scheduler)
Path:
C:\Windows\System32\schtasks.exePurpose: Schedules and manages tasks.
Attack Use: Creates tasks for persistence or delayed execution of malware.
taskmgr.exe (Task Manager)
Path:
C:\Windows\System32\taskmgr.exePurpose: Monitors running processes and system performance.
Attack Use: Rarely targeted but useful for detecting malicious processes.
6. Browser and Media Processes
msedge.exe (Microsoft Edge)
Path:
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exePurpose: Internet browsing.
Attack Use: Rarely targeted directly; browser vulnerabilities are exploited instead.
wmplayer.exe (Windows Media Player)
Path:
C:\Program Files (x86)\Windows Media Player\wmplayer.exePurpose: Plays media files.
Attack Use: Abused to execute malicious media files.
7. System Update Processes
wuauclt.exe (Windows Update Client)
Path:
C:\Windows\System32\wuauclt.exePurpose: Manages Windows updates.
Attack Use: Rarely abused; attackers may spoof update mechanisms
8. Administrative and Diagnostic Tools
regedit.exe (Registry Editor)
Path:
C:\Windows\System32\regedit.exePurpose: Edits the Windows Registry.
Attack Use: Used to modify Registry keys manually or programmatically.
msiexec.exe (Windows Installer)
Path:
C:\Windows\System32\msiexec.exePurpose: Installs MSI packages.
Attack Use: Executes malicious installation packages.
perfmon.exe (Performance Monitor)
Path:
C:\Windows\System32\perfmon.exePurpose: Monitors system performance.
Attack Use: Rarely abused but could be used for reconnaissance
Processes Often Targeted by Attackers
High Privilege Processes:
svchost.exelsass.exewinlogon.exe
Versatile Execution Processes:
powershell.execmd.exerundll32.exemshta.exereg.execertutil.exe
Service and Communication Processes:
dllhost.exeexplorer.exe
Automation and Scripting Processes:
wscript.execscript.exe
Last updated