Forked from mattifestation/EmulateProcExpDotNetEnumeration.ps1
Created
August 11, 2018 09:42
-
-
Save CaledoniaProject/fa87e9e022871ec6b4fbb866764ba8f2 to your computer and use it in GitHub Desktop.
Replicates the data collected when enumerating .NET Assemblies in Process Explorer
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
logman start trace dotNetAssemblyTrace2 -p "Microsoft-Windows-DotNETRuntimeRundown" "LoaderRundownKeyword, StartRundownKeyword" win:Informational -o dotNetAssemblyTrace2.etl -ets | |
Start-Sleep -Seconds 5 | |
logman stop dotNetAssemblyTrace2 -ets | |
$EnumeratedCLRRuntimes = Get-WinEvent -Path .\dotNetAssemblyTrace2.etl -Oldest -FilterXPath '*[System[(EventID=187)]]' | |
$EnumeratedAppDomains = Get-WinEvent -Path .\dotNetAssemblyTrace2.etl -Oldest -FilterXPath '*[System[(EventID=157)]]' | |
$EnumeratedAssemblies = Get-WinEvent -Path .\dotNetAssemblyTrace2.etl -Oldest -FilterXPath '*[System[(EventID=155)]]' | |
$EnumeratedModules = Get-WinEvent -Path .\dotNetAssemblyTrace2.etl -Oldest -FilterXPath '*[System[(EventID=153)]]' |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment