D
DioIPS

ETW Consumer

Usermode

Event Tracing for Windows consumer for capturing usermode events.

Overview

ETW (Event Tracing for Windows) is a high-performance event tracing mechanism built into Windows. DioIPS subscribes to specific ETW providers to capture events that complement kernel-level monitoring.

Subscribed Providers

ProviderEvents
Microsoft-Windows-PowerShellScript block logging, command execution
Microsoft-Windows-DotNETRuntimeAssembly loading, JIT compilation
Microsoft-Windows-Kernel-ProcessProcess start/stop (usermode view)
Microsoft-Windows-DNS-ClientDNS query events

PowerShell Events

PowerShell script block logging captures the actual script content:

  • Script blocks — Full script content before execution
  • Commands — Individual cmdlet invocations
  • Modules — Module loading events
  • Obfuscation — Deobfuscated script content

.NET Runtime Events

Monitor .NET assembly loading for fileless malware detection:

  • Assembly load — DLL loaded into CLR
  • Assembly name — Full assembly name
  • Load context — How the assembly was loaded
  • In-memory loading — Detect reflection-based loading

Captured Information

  • Timestamp — Event time with high precision
  • Process — PID and process name
  • Provider — Which ETW provider
  • Event ID — Specific event type
  • Payload — Event-specific data

UI Features

  • ETW tab — View all ETW events
  • Provider filter — Filter by ETW provider
  • Script view — Expand to see full script content
  • Process filter — Focus on specific process

Usage

  1. Start the DioIPS application
  2. ETW consumer starts automatically
  3. Navigate to the ETW tab
  4. Run PowerShell or .NET applications to see events
  5. Use filters to focus on specific providers