Hypervisor
Ring -1Intel VT-x based hypervisor bundled into DioProcess.sys for advanced security research at the hypervisor level.
Advanced Feature
The hypervisor operates below the kernel (Ring -1) and can bypass Ring 0 protections. Use only on test systems with proper authorization.
Architecture
┌─────────────────────────────────────────────────────────────┐
│ DioProcess UI (Dioxus) │
│ Hypervisor Tab [Ring -1] │
└──────────────────────────┬──────────────────────────────────┘
│ DeviceIoControl
┌──────────────────────────▼──────────────────────────────────┐
│ callback crate (Rust bindings) │
│ hv_is_running(), hv_inject_shellcode(), hv_inject_dll() │
└──────────────────────────┬──────────────────────────────────┘
│ IOCTL
┌──────────────────────────▼──────────────────────────────────┐
│ DioProcess.sys │
│ ┌─────────────────────────────────────────────────────┐ │
│ │ Ring 0: Kernel Driver (IOCTL handlers, memory ops) │ │
│ └──────────────────────────┬──────────────────────────┘ │
│ │ VMCALL │
│ ┌──────────────────────────▼──────────────────────────┐ │
│ │ Ring -1: Bundled Hypervisor (Intel VT-x, EPT) │ │
│ └─────────────────────────────────────────────────────┘ │
└─────────────────────────────────────────────────────────────┘Requirements
- • Intel CPU with VT-x support
- • Hyper-V disabled —
bcdedit /set hypervisorlaunchtype off - • DioProcess.sys loaded — Hypervisor is bundled, no separate driver
Features
Key Capabilities
Physical Memory Access
Read/write physical memory via EPT translation, bypassing Ring 0 protections
EPT Hooks
Split-page hooks where read shows original bytes, execute shows patched bytes
VMCALL Interface
Hypercall interface for Ring 0 to Ring -1 communication
CR3 Page Table Walk
Physical memory scanning via direct page table traversal
PatchGuard Safety
Hypervisor operations do not trigger PatchGuard:
- • ✓ Data-only modifications to usermode memory
- • ✓ Hypervisor operates outside PatchGuard's monitoring scope
- • ✓ No kernel code patching or table modifications
Implementation
- • Location —
kernelmode/.../Hypervisor/ - • Hypercall key —
69420(hardcoded) - • Virtualization — OS virtualized at driver load time