1

I recorded an xperf trace. Can the trace contain passwords? (assuming that paths contain no password)

I see that upon hitting xperf -stop I have the following warning:

The trace you have just captured "C:\User.etl" may contain personally identifiable information, including but not necessarily limited to paths to files accessed, paths to registry accessed and process names. Exact information depends on the events that were logged. Please be aware of this when sharing out this trace with other people.

But it's pretty vague.

The commands I used to record the xperf trace are below (given by magicandre1981). I use Windows 7 SP1 x64 Ultimate.

REG ADD "HKLM\System\CurrentControlSet\Control\Session Manager\Memory Management" -v DisablePagingExecutive -d 0x1 -t REG_DWORD -f

REM Install the Windows Performance Toolkit (http://social.technet.microsoft.com/wiki/contents/articles/4847.install-the-windows-performance-toolkit-wpt.aspx), open the command prompt with admin rights.

REM Now copy those commands in an empty .CMD file and run the CMD (as admin) before you try to start a program from the startmenu again:

xperf -on BASE+LATENCY+DISPATCHER+FILE_IO+FILENAME+NETWORKTRACE -stackwalk profile+CSwitch+ReadyThread+ProcessCreate+FileCreate+FileCleanup+FileClose+FileRead+FileWrite -buffersize 2048 -MaxFile 1024 -FileMode Circular -f Kernel.etl
xperf -start UserLogger -on Microsoft-Windows-Shell-Core:::'stack'+Microsoft-Windows-Shell-Shwebsvc:::'stack' -BufferSize 2048 -f User.etl

timeout -1

xperf -stop
xperf -stop UserLogger

xperf -merge User.etl kernel.etl SlowShell.etl

del user.etl
del kernel.etl
Franck Dernoncourt
  • 24,246
  • 64
  • 231
  • 400

1 Answers1

1

no, it never contains the actual data like a memory dump, only the filename or list of processes.