Windows Process List
Not every process is suspicious — but every process is a potential evidence source. The table below lists common Windows processes and services, what they do, what they host and what forensic artifacts or indicators we look for when extracting their memory strings. Click any description to expand the full details.
| Process | Type | Description |
|---|---|---|
| AppInfo | Service |
Application Information [AppInfo] — enables...
Application Information [AppInfo] — enables and brokers User Account Control (UAC) elevation requests on behalf of standard-user processes. When a program requires administrative privileges, the UAC prompt and the resulting elevation token are orchestrated by AppInfo. Without it, privilege escalation dialogs do not function. It also interacts closely with the Program Compatibility Assistant and is involved in logging execution attempts that require elevated rights.
|
| bfe | Service |
Base Filtering Engine [BFE] —...
Base Filtering Engine [BFE] — the core policy engine underpinning Windows Firewall and the entire WFP (Windows Filtering Platform). It stores and enforces firewall rules, IPsec policies and callout filters registered by third-party security products. All inbound and outbound filtering decisions ultimately run through BFE. Disabling it disables all Windows-based packet filtering.
|
| cdpusersvc | Service |
Connected Devices Platform User Service...
Connected Devices Platform User Service [CDPUserSvc] — powers the cross-device experience features introduced in Windows 10, including timeline, clipboard history sync, "Continue on PC" and nearby sharing via Bluetooth or Wi-Fi Direct. It runs per user session and communicates with Microsoft's cloud services to broker device discovery and activity synchronization. It essentially tracks everything the user does across their device ecosystem.
|
| csrss | Process |
Client Server Runtime Process [CSRSS]...
Client Server Runtime Process [CSRSS] — one of the most critical processes in Windows. It manages the Win32 console subsystem, handles console window creation and destruction, process and thread lifecycle notifications and shutdown coordination. There are always exactly two csrss.exe instances per Windows session: one for Session 0 (services) and one for the interactive desktop session. Terminating csrss causes an immediate BSOD.
|
| ctfmon | Process |
CTF Monitor [ctfmon] — activates...
CTF Monitor [ctfmon] — activates the Alternative User Input and Office Language Bar, providing input method editor (IME) support, speech recognition integration and handwriting recognition. It runs per user and mediates input between Windows Text Services Framework (TSF) and applications. It is a legitimate and expected process on all modern Windows installations.
|
| diagtrack | Service |
Connected User Experiences and Telemetry...
Connected User Experiences and Telemetry [DiagTrack] — Microsoft's telemetry and diagnostics collection service. It collects system health data, crash reports, application usage metrics and diagnostic traces and transmits them to Microsoft endpoints. On enterprise systems it is frequently disabled via Group Policy. The volume of data it processes makes its memory a rich source of system activity snapshots.
|
| dnscache | Service |
DNS Client [dnscache] — resolves...
DNS Client [dnscache] — resolves and caches DNS queries on behalf of all processes on the machine. Rather than each process querying a DNS server independently, they send requests to dnscache, which manages the local resolver cache. This centralises resolution and improves performance. From a forensic standpoint the DNS cache in memory is a direct record of every hostname the machine has resolved recently.
|
| dps | Service |
Diagnostic Policy Service [DPS] —...
Diagnostic Policy Service [DPS] — enables automated problem detection, troubleshooting and resolution for Windows components. It runs diagnostic packages in response to system faults and feeds data into the Problem Reports and Solutions infrastructure. It operates silently in the background and has broad read access to system state.
|
| dusmsvc | Service |
Data Usage Monitoring Service [DusmSvc]...
Data Usage Monitoring Service [DusmSvc] — tracks per-app and per-connection network data usage across all network interfaces. It powers the "Data usage" view in Windows Settings and enforces metered connection limits. The service maintains an internal database of byte counts grouped by application and network interface, updated in real time.
|
| DWM | Process |
Desktop Window Manager [DWM] —...
Desktop Window Manager [DWM] — composites and renders all visual output on the Windows desktop using GPU-accelerated DirectX surfaces. It manages Aero Glass effects, transparency, live thumbnails and the visual layer above every application window. DWM runs in an isolated session in Session 0 with direct access to the display output pipeline.
|
| Eventlog | Service |
Windows Event Log [Eventlog] —...
Windows Event Log [Eventlog] — manages the collection, storage and retrieval of all Windows event log entries across every log channel. It receives log records from the ETW (Event Tracing for Windows) infrastructure, applies channel routing and writes records to
.evtx files. The service holds a write buffer for pending log records in memory before flushing to disk.
|
| Explorer | Process |
Windows Explorer [Explorer] — the...
Windows Explorer [Explorer] — the interactive shell process for the Windows desktop, taskbar, Start menu and file system browser. It hosts the ShellExecute logic that launches applications on behalf of the user. Almost all user-initiated program launches, file opens and folder navigation events pass through explorer.exe's process space, making it an exceptionally rich memory target.
|
| lsass | Process |
Local Security Authority Subsystem Service...
Local Security Authority Subsystem Service [LSASS] — the gatekeeper of authentication on every Windows system. It handles all local and domain logon authentication, enforces security policies, generates access tokens and manages the Security Account Manager (SAM) database. LSASS holds credential material for all currently and recently authenticated users in its working memory — NTLM hashes, Kerberos tickets, and in older configurations, plaintext passwords via the WDigest provider.
|
| msmpeng | Process |
Microsoft Malware Protection Engine [MsMpEng]...
Microsoft Malware Protection Engine [MsMpEng] — the scanning and detection engine at the core of Windows Defender Antivirus. It performs real-time file, process and behavior monitoring, scheduled full scans and cloud-assisted sample analysis. MsMpEng has a broad memory footprint because it loads and analyzes the content of files it scans into its own address space.
|
| nissrv | Process |
Microsoft Network Realtime Inspection Service...
Microsoft Network Realtime Inspection Service [NisSrv] — the network-level inspection component of Windows Defender. It analyzes network streams in real time using WFP callouts to detect exploit patterns, malicious payloads and network-based attacks. It works in conjunction with MsMpEng and the cloud protection service to provide behavioral network monitoring.
|
| pcasvc | Service |
Program Compatibility Assistant Service [PcaSvc]...
Program Compatibility Assistant Service [PcaSvc] — the service side of the Program Compatibility Assistant framework. It monitors application launches for compatibility issues, logs execution events to the PCA SQLite databases and triggers compatibility shims when required. It works alongside the pcaclient component that hooks into explorer.exe and other shell processes.
|
| registry | Process |
Registry Process [registry] — a...
Registry Process [registry] — a kernel-level process introduced in Windows 10 version 1803 that hosts the registry hive data entirely in kernel memory. Previously, hive data was stored in paged pool; this dedicated process improves memory management and security isolation. It is always PID 4 or a very low PID and its executable is listed as
Registry with no image path because it is a kernel process, not a userland binary.
|
| schedule | Service |
Task Scheduler [Schedule] — manages...
Task Scheduler [Schedule] — manages the Windows Task Scheduler infrastructure. It loads task definitions from
C:\Windows\System32\Tasks\ and the registry, evaluates triggers (time-based, event-based, logon-based) and launches task actions at the defined moments. It is widely abused for persistence because scheduled tasks survive reboots and execute with high reliability.
|
| searchindexer | Process |
Windows Search Indexer [SearchIndexer] —...
Windows Search Indexer [SearchIndexer] — builds and maintains the Windows Search index by crawling file content and metadata across local drives, SharePoint and Outlook data stores. It reads and parses file content from documents, emails and media files to extract indexable text. Because it processes the content of every file it indexes, its memory contains fragments of recently indexed file content.
|
| sgrmbroker | Process |
System Guard Runtime Monitor Broker...
System Guard Runtime Monitor Broker [SgrmBroker] — part of Windows Defender System Guard, providing runtime attestation and integrity monitoring of the secure boot chain and kernel state. It works with the underlying VSM (Virtualization-Based Security) infrastructure to verify that the system has not been tampered with at a low level. It was designed to protect against firmware and bootkit-level attacks.
|
| smartscreen | Process |
Windows SmartScreen [SmartScreen] — evaluates...
Windows SmartScreen [SmartScreen] — evaluates the reputation of downloaded files and URLs before execution. When a file with the Mark of the Web (MOTW) alternate data stream is launched, SmartScreen queries Microsoft's cloud reputation database using the file hash. It is also integrated into Edge for URL-level phishing and malware detection.
|
| sysmain | Service |
SysMain [SuperFetch] — proactively loads...
SysMain [SuperFetch / Superfetch] — proactively loads frequently used application data into RAM to reduce launch times. It builds a long-term usage profile by tracking which applications and files the user accesses most frequently and at what times of day. This profile is stored in the
C:\Windows\Prefetch\ directory (as the Prefetch backing data) and used to pre-populate the disk cache.
|
| taskhostw | Process |
Task Host for Windows [taskhostw]...
Task Host for Windows [taskhostw] — a generic host process that runs scheduled task DLL actions, COM-based tasks and in-process task payloads that cannot run as standalone executables. Unlike tasks that launch external executables, DLL-based task actions are loaded directly into a taskhostw instance, executed and then the host exits. Multiple instances may run simultaneously for parallel task processing.
|
For more Info check out these Articles: Dump Memory