ROOTED!
Nice Windows box, it’s very realistic and the software you have to exploit is quite common and widespread. Below some hints:
Foothold: it’s easy to identify the first service, it’s also easy to get access to a not protected share, then just Google where the juicy information is stored.
User: if you are here you know what to do now so read the PoC and think what can be more useful to run on a Windows box instead of calc.exe
Root: I owned the box following the “Remote” way, so again identify the service that is not on a default Windows installation and google for vulnerabilities of that particular version, then there is a msf module to complete the task.
PM me if you need help!