NAME | SYNOPSIS | DESCRIPTION | OPTIONS | EXAMPLES | SEE ALSO | NOTES | AUTHORS |
|
|
ETWDUMP(1) ETWDUMP(1)
etwdump - Provide an interface to read Event Tracing for Windows (ETW)
etwdump [ --help ] [ --version ] [ --extcap-interfaces ] [ --extcap-dlts ] [ --extcap-interface=<interface> ] [ --extcap-config ] [ --capture ] [ --fifo=<path to file or pipe> ] [ --iue=<Should undecidable events be included> ] [ --etlfile=<etl file> ] [ --params=<filter parameters> ]
etwdump is a extcap tool that provides access to a event trace log file or an event trace live session. It is only used to display event trace on Windows that includes readable text message and different protocols (like MBIM and IP packets).
--help Print program arguments. --version Print program version. --extcap-interfaces List available interfaces. --extcap-interface=<interface> Use specified interfaces. --extcap-dlts List DLTs of specified interface. --extcap-config List configuration options of specified interface. --capture Start capturing from specified interface save saved it in place specified by --fifo. --fifo=<path to file or pipe> Save captured packet to file or send it through pipe. --iue=<Should undecidable events be included> Choose if the undecidable event is included. --etlfile=<Etl file> Select etl file to display in Wireshark. --params=<filter parameters> Input providers, keyword and level filters for the etl file and live session.
To see program arguments: etwdump --help To see program version: etwdump --version To see interfaces: etwdump --extcap-interfaces Example output interface {value=etwdump}{display=ETW reader} To see interface DLTs: etwdump --extcap-interface=etwdump --extcap-dlts Example output dlt {number=1}{name=etwdump}{display=DLT_ETW} To see interface configuration options: etwdump --extcap-interface=etwdump --extcap-config Example output arg {number=0}{call=--etlfile}{display=etl file}{type=fileselect}{tooltip=Select etl file to display in Wireshark}{group=Capture} arg {number=1}{call=--params}{display=filter parameters}{type=string}{tooltip=Input providers, keyword and level filters for the etl file and live session}{group=Capture} arg {number=2}{call=--iue}{display=Should undecidable events be included}{type=boolflag}{default=false}{tooltip=Choose if the undecidable event is included}{group=Capture} To capture: etwdump --extcap-interface etwdump --fifo=/tmp/etw.pcapng --capture --params "--p=Microsoft-Windows-Wmbclass-Opn --p=Microsoft-Windows-wmbclass --k=0xff --l=4" etwdump --extcap-interface etwdump --fifo=/tmp/etw.pcapng --capture --params "--p=Microsoft-Windows-Wmbclass-Opn --p=Microsoft-Windows-NDIS-PacketCapture" Note To stop capturing CTRL+C/kill/terminate the application.
wireshark(1), tshark(1), dumpcap(1), extcap(4)
etwdump is part of the Wireshark distribution. The latest version of Wireshark can be found at https://www.wireshark.org. HTML versions of the Wireshark project man pages are available at https://www.wireshark.org/docs/man-pages.
Original Author
Odysseus Yang
[email protected] This page is part of the wireshark
(Interactively dump and analyze network traffic) project.
Information about the project can be found at
⟨https://www.wireshark.org/⟩. If you have a bug report for this
manual page, see
⟨https://gitlab.com/wireshark/wireshark/-/issues⟩. This page was
obtained from the project's upstream Git repository
⟨https://gitlab.com/wireshark/wireshark.git⟩ on 2025-08-11. (At
that time, the date of the most recent commit that was found in
the repository was 2025-08-11.) If you discover any rendering
problems in this HTML version of the page, or you believe there is
a better or more up-to-date source for the page, or you have
corrections or improvements to the information in this COLOPHON
(which is not part of the original manual page), send a mail to
[email protected]
2025-03-07 ETWDUMP(1)