logman.exe
- File Path:
C:\windows\SysWOW64\logman.exe
- Description: Performance Log Utility
Hashes
Type | Hash |
---|---|
MD5 | A9B142160CB1CBD4A6077D616D899E20 |
SHA1 | 4D0C5033FADF53BDD0FF330F0EC146DF5F7104CF |
SHA256 | EF261231934B46B50C5045687E9EE65A8DDE980DE231F197D6D7EDECBEFB39B8 |
SHA384 | AD3B0050881B0F808EC8BDF74DBB8235654A26782395039718637BB266FA64276CA8E7116825CC508312CEB5B4634AA2 |
SHA512 | 224ECE239DF37FD54C94FB92B6F2AFE63BF3D2530C0B13ACE4899AC6CF1AF3C5066A421B047DA4310A7AFF8FAB67299F4F988B7D176F6CA9EA28A4DA9BAFDAF3 |
SSDEEP | 1536:YaDcj5bOoBMKJOJiN/yBXOG9WPvyTvbl/8pMufBr4PdZ3vuI:YaD+BJJrgBXOG9WkxkOuZrOrfb |
Signature
- Status: The file C:\windows\SysWOW64\logman.exe is not digitally signed. You cannot run this script on the current system. For more information about running scripts and setting execution policy, see about_Execution_Policies at http://go.microsoft.com/fwlink/?LinkID=135170
- Serial: ``
- Thumbprint: ``
- Issuer:
- Subject:
File Metadata
- Original Filename: Logman.exe.mui
- Product Name: Microsoft Windows Operating System
- Company Name: Microsoft Corporation
- File Version: 6.3.9600.16384 (winblue_rtm.130821-1623)
- Product Version: 6.3.9600.16384
- Language: English (United States)
- Legal Copyright: Microsoft Corporation. All rights reserved.
Possible Misuse
The following table contains possible examples of logman.exe
being misused. While logman.exe
is not inherently malicious, its legitimate functionality can be abused for malicious purposes.
Source | Source File | Example | License |
---|---|---|---|
sigma | image_load_wmi_module_load.yml | - '\logman.exe' |
DRL 1.0 |
sigma | proc_creation_win_etw_trace_evasion.yml | - 'logman' |
DRL 1.0 |
sigma | proc_creation_win_susp_disable_eventlog.yml | description: Detects command that is used to disable or delete Windows eventlog via logman Windows utility |
DRL 1.0 |
sigma | proc_creation_win_susp_disable_eventlog.yml | - https://ss64.com/nt/logman.html |
DRL 1.0 |
sigma | proc_creation_win_susp_disable_eventlog.yml | - 'logman ' |
DRL 1.0 |
Additional Info*
*The information below is copied from MicrosoftDocs, which is maintained by Microsoft. Available under CC BY 4.0 license.
logman
Applies to: Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows Server 2012 R2, Windows Server 2012
Creates and manages Event Trace Session and Performance logs and supports many functions of Performance Monitor from the command line.
Syntax
logman [create | query | start | stop | delete| update | import | export | /?] [options]
Parameters
Parameter | Description |
---|---|
logman create | Creates a counter, trace, configuration data collector, or API. |
logman query | Queries data collector properties. |
logman start | stop | Starts or stops data collection. |
logman delete | Deletes an existing data collector. |
logman update | Updates the properties of an existing data collector. |
logman import | export | Imports a data collector set from an XML file or export a data collector set to an XML file. |
Additional References
MIT License. Copyright (c) 2020-2021 Strontic.