Post

Core Processes in Windows System: Understanding and Baselining

Core Processes in Windows System: Understanding and Baselining

Core Processes in Windows System

Date: 9 September 2025
Read Time: ~10 mins
Tags: Windows System


Table of Contents


Introduction

This article aims to help you understand normal behavior within a Windows operating system by detailing the core processes that run at boot and during normal operations. Knowledge of these processes helps with:

  • System baselining for security monitoring
  • Detecting anomalous or malicious activity
  • Understanding Windows internals for troubleshooting and auditing

These core processes are also referenced in monitoring and intrusion detection tools like Snort, where baseline behavior is crucial for alerting on anomalies.


System (ntoskrnl.exe)

The System process is the kernel of Windows and always has PID 4. It hosts kernel-mode threads with all attributes of user-mode threads but without a user-space memory context.

Responsibilities:

  • CPU scheduling
  • Memory management (paged/non-paged pools)
  • Hardware abstraction via device drivers
  • Handling critical errors and Blue Screens

Normal vs Abnormal Behavior:

PropertyNormalAbnormal
Image PathN/A or C:\Windows\System32\ntoskrnl.exeOther paths
Parent ProcessNone / System Idle ProcessAny other parent
PID4Different PID
InstancesOneMultiple
UserLocal SystemNot Local System
Start TimeBoot timeNot at boot
SessionSession 0Other session

smss.exe (Session Manager Subsystem)

smss.exe creates new sessions and starts user-mode processes:

  • Starts csrss.exe and wininit.exe for Session 0
  • Starts csrss.exe and winlogon.exe for user sessions
  • Manages environment variables and paging files

Normal vs Abnormal Behavior:

PropertyNormalAbnormal
Image Path%SystemRoot%\System32\smss.exeDifferent path
Parent ProcessSystemOther than System
InstancesOne master + child per sessionMore than one master; child does not exit
UserLocal SystemNot SYSTEM
Start TimeWithin seconds of bootDeviates

csrss.exe (Client Server Runtime Process)

Handles Win32 console windows, thread creation, and shutdown. Also maps drives and exposes Windows API to other processes.

PropertyNormalAbnormal
Image Path%SystemRoot%\System32\csrss.exeOther path
Parent Processsmss.exeOther
InstancesTypically two (Session 0 & 1)Additional rogue instances
UserSYSTEMNon-SYSTEM
Start TimeSeconds after bootDeviates

wininit.exe (Windows Initialization Process)

Starts:

  • services.exe (Service Control Manager)
  • lsass.exe (Security Authority)
  • lsaiso.exe (Credential Guard / KeyGuard, if enabled)

Normal vs Abnormal Behavior:

PropertyNormalAbnormal
Image Path%SystemRoot%\System32\wininit.exeOther path
Parentsmss.exeOther
InstancesOneMultiple
UserSYSTEMNot SYSTEM
Start TimeSeconds after bootDeviates

services.exe (Service Control Manager)

Manages Windows services like svchost.exe, spoolsv.exe, msmpeng.exe.

PropertyNormalAbnormal
Image Path%SystemRoot%\System32\services.exeOther path
Parentwininit.exeOther
InstancesOneMultiple
UserSYSTEMNot SYSTEM
Start TimeSeconds after bootDeviates

svchost.exe (Service Host)

Hosts Windows services implemented as DLLs. Often multiple instances exist. Malware may impersonate svchost.exe.

PropertyNormalAbnormal
Image Path%SystemRoot%\System32\svchost.exeOther path
Parentservices.exeOther
InstancesManyRogue instances
UserSYSTEM / Network Service / Local Service / logged-in userOther
Start TimeSeconds after bootDeviates
Command LineMust include -k parameterMissing or altered

lsass.exe (Local Security Authority Subsystem Service)

Handles authentication, tokens, and security policies. Target for credential-dumping attacks.

PropertyNormalAbnormal
Image Path%SystemRoot%\System32\lsass.exeOther path
Parentwininit.exeOther
InstancesOneMultiple
UserSYSTEMNot SYSTEM
Start TimeSeconds after bootDeviates

winlogon.exe (Windows Logon)

Manages Secure Attention Sequence (Ctrl+Alt+Del), profile loading, userinit, screen locking, and screensaver execution.

PropertyNormalAbnormal
Image Path%SystemRoot%\System32\winlogon.exeOther path
Parentsmss.exeOther
InstancesOne or moreDeviates
UserSYSTEMNot SYSTEM
Start TimeSeconds after bootDeviates
Shellexplorer.exeOther shell

explorer.exe (Windows Explorer)

Provides the desktop environment, Start menu, Taskbar, and File Explorer.

PropertyNormalAbnormal
Image Path%SystemRoot%\explorer.exeOther
Parentuserinit.exeOther
InstancesOne or more per userDeviates
UserLogged-in usersUnknown user
Start TimeFirst interactive loginDeviates
NotesHandles GUI, can be restarted if terminatedOutbound connections or anomalies

Baselining and Security Monitoring

Understanding these core processes allows security teams to baseline a Windows system:

  • Establish what is normal (process path, PID, user, number of instances)
  • Detect deviations such as rogue processes, malware, or misconfigurations
  • Tools like Snort, OSSEC, or Sysmon can leverage this baseline for alerts

Example:

  • Snort rules can monitor for unexpected paths, multiple instances, or processes running under wrong user accounts.
  • Endpoint detection systems can compare live process metadata with baselined information.

References


Author: wrench

Note: Understanding these processes helps not just for security monitoring, but also for troubleshooting, forensic analysis, and safe system configuration.

This post is licensed under CC BY 4.0 by the author.