logman.exe

  • File Path: C:\windows\SysWOW64\logman.exe
  • Description: Performance Log Utility

Hashes

Type Hash
MD5 A9B142160CB1CBD4A6077D616D899E20
SHA1 4D0C5033FADF53BDD0FF330F0EC146DF5F7104CF
SHA256 EF261231934B46B50C5045687E9EE65A8DDE980DE231F197D6D7EDECBEFB39B8
SHA384 AD3B0050881B0F808EC8BDF74DBB8235654A26782395039718637BB266FA64276CA8E7116825CC508312CEB5B4634AA2
SHA512 224ECE239DF37FD54C94FB92B6F2AFE63BF3D2530C0B13ACE4899AC6CF1AF3C5066A421B047DA4310A7AFF8FAB67299F4F988B7D176F6CA9EA28A4DA9BAFDAF3
SSDEEP 1536:YaDcj5bOoBMKJOJiN/yBXOG9WPvyTvbl/8pMufBr4PdZ3vuI:YaD+BJJrgBXOG9WkxkOuZrOrfb

Signature

  • Status: The file C:\windows\SysWOW64\logman.exe is not digitally signed. You cannot run this script on the current system. For more information about running scripts and setting execution policy, see about_Execution_Policies at http://go.microsoft.com/fwlink/?LinkID=135170
  • Serial: ``
  • Thumbprint: ``
  • Issuer:
  • Subject:

File Metadata

  • Original Filename: Logman.exe.mui
  • Product Name: Microsoft Windows Operating System
  • Company Name: Microsoft Corporation
  • File Version: 6.3.9600.16384 (winblue_rtm.130821-1623)
  • Product Version: 6.3.9600.16384
  • Language: English (United States)
  • Legal Copyright: Microsoft Corporation. All rights reserved.

Possible Misuse

The following table contains possible examples of logman.exe being misused. While logman.exe is not inherently malicious, its legitimate functionality can be abused for malicious purposes.

Source Source File Example License
sigma image_load_wmi_module_load.yml - '\logman.exe' DRL 1.0
sigma proc_creation_win_etw_trace_evasion.yml - 'logman' DRL 1.0
sigma proc_creation_win_susp_disable_eventlog.yml description: Detects command that is used to disable or delete Windows eventlog via logman Windows utility DRL 1.0
sigma proc_creation_win_susp_disable_eventlog.yml - https://ss64.com/nt/logman.html DRL 1.0
sigma proc_creation_win_susp_disable_eventlog.yml - 'logman ' DRL 1.0

Additional Info*

*The information below is copied from MicrosoftDocs, which is maintained by Microsoft. Available under CC BY 4.0 license.


logman

Applies to: Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows Server 2012 R2, Windows Server 2012

Creates and manages Event Trace Session and Performance logs and supports many functions of Performance Monitor from the command line.

Syntax

logman [create | query | start | stop | delete| update | import | export | /?] [options]

Parameters

Parameter Description
logman create Creates a counter, trace, configuration data collector, or API.
logman query Queries data collector properties.
logman start | stop Starts or stops data collection.
logman delete Deletes an existing data collector.
logman update Updates the properties of an existing data collector.
logman import | export Imports a data collector set from an XML file or export a data collector set to an XML file.

Additional References


MIT License. Copyright (c) 2020-2021 Strontic.