I have one for process events that's coming along ...
# windows
t
I have one for process events that's coming along alright, missing quite a bit if data from the normal table schema though šŸ˜ž Also haven't sorted out the best trace provider for network events
m
At a previous job I worked on this problem, here are the providers we used: https://github.com/DigitalOperatives/PAINT/blob/6412814c0a61d8e0a785801970eaf37d3f835b38/PAINT/PAINT.h
t
Any chance you knew how to get command line information for the process events?
Were you using anything for process events? That looks like just networking stuff. Still very useful, thank you very much ā¤ļø
m
In that project, we were using some network-related ETW providers which carried PID metadata for every packet. So we were not capturing process events per se, but I thought maybe the list of network event providers might be of interest to you.
I noticed that you're using the TDH API directly and if it works that's fine but Microsoft does have a less-known modern C++ wrapper called krabsetw that I really like: https://github.com/Microsoft/krabsetw
šŸ˜„ 1
Regarding the getting of command line information: I dunno where to get that from an ETW provider. The way that ProcessHacker gets it is
NtQueryInformationProcess
t
Hah, yeah, I've been talking with @zacbrown who's one of (the?) authors of Krabs, and his response to my question was "why don't you just use krabs?" šŸ˜„
šŸ˜„ 1
z
Heh. Weird hearing people talk about krabs
@thor and actually, Iā€™m one of three main authors. The other two still work for MSFT but both are on the C++ compiler team now. We all worked on O365 Security tho when it was written
šŸ‘ 2