Medium RiskWindowsLegitimateCommonly Abused
tasklist.exeSYSTEM UTILITY

tasklist.exe - Process List Utility Security Analysis

tasklist.exe displays **running processes** on local or remote systems. Attackers use tasklist for **security software detection**, **process reconnaissance**, and **target identification**. Combined with taskkill.exe, attackers can **terminate security processes**. Repeated tasklist execution indicates reconnaissance.

Risk Summary

MEDIUM priority for SOC triage. tasklist.exe is commonly used for reconnaissance to identify security software and processes to target. Monitor for repeated executions, remote process listing, and correlation with subsequent taskkill commands.

Overview

What is tasklist.exe?

tasklist.exe displays information about running processes.

Core Functions

Process Information:

  • List running processes
  • Show process details
  • Query remote systems
  • Filter by criteria

Security Significance

  • Reconnaissance Tool: Identify security software
  • Target Selection: Find processes to kill
  • Environment Profiling: Understand system state

Normal Behavior

Normal Behavior

Expected Process State

PropertyExpected Value
PathC:\Windows\System32\tasklist.exe
Parentcmd.exe, powershell.exe
UserAny
ContextSystem monitoring

Legitimate Usage

tasklist
tasklist /v
tasklist /svc

Common Locations

C:\Windows\System32\tasklist.exeC:\Windows\SysWOW64\tasklist.exe

Suspicious Indicators

Legitimate vs Suspicious

LEGITIMATE

Command:     tasklist (basic list)
             tasklist /svc (show services)
Frequency:   Occasional
Context:     System monitoring

SUSPICIOUS

Command:     tasklist | findstr /i "defender malware antivirus"
             tasklist /s RemotePC
Frequency:   Repeated rapid execution
Context:     After initial access
             Before process termination

Abuse Techniques

Attack Techniques

Technique #1: Security Software Discovery (T1518.001)

Find AV/EDR Processes:

tasklist | findstr /i "defender avg avast kaspersky crowdstrike carbon"

Technique #2: Process Reconnaissance (T1057)

Enumerate All Processes:

tasklist /v /fo csv > processes.csv

Technique #3: Remote Process Enumeration (T1057)

tasklist /s TARGET /u admin /p password

Combined with taskkill (T1489)

tasklist | findstr MsMpEng
taskkill /f /im MsMpEng.exe

Remediation Steps

Protection and Remediation

Defense: Monitor Execution Patterns

Alert on tasklist combined with findstr for security terms.

If Reconnaissance Detected

  1. Identify the user/process
  2. Check for subsequent taskkill
  3. Review for lateral movement
  4. Assess if security software targeted
  5. Investigate initial access vector

Investigation Checklist

Investigation Checklist

  • Review command line arguments
  • Check for security software keywords
  • Correlate with taskkill commands
  • Review remote enumeration attempts
  • Check execution frequency
  • Identify parent process chain
  • Assess reconnaissance intent

MITRE ATT&CK Techniques

Last verified: January 18, 2026