logman.exe
- File Path:
C:\WINDOWS\system32\logman.exe
- Description: Performance Log Utility
Hashes
Type | Hash |
---|---|
MD5 | BC839026F80208B0BEADFD8A513C3C71 |
SHA1 | 41DDA16D59DEF411636A5A1406A03F198CFC9CAC |
SHA256 | 8F0BD33907B705136560BC42502A2B697CC8CF4D14609B9A33FCD214D89CE46F |
SHA384 | C49653C6F49CF042FD152EE649DA82342C994962CCEA43D03A38E2766C01DDA2D6C50BF6CF75CEF350D4EB0BD2B3926F |
SHA512 | 72CA16C14034CF54BAD7CD943E6A119483BE9C7195ECAF6E6D0F5079C5B5C01A7876094950C38B7144F1A0F95C24488F3BAAC65B54D192B75FFB14C024853D69 |
SSDEEP | 3072:dy05HnqNCmOOcVyW1RlQoKMUTpVqSbL6X7UN6ukOV7rMzKxwaT:dy05HnqNCscVjRlQoKJqeL6X7UN6ukOZ |
IMP | EB3FED89E97C57F1B41AE544CC3CA475 |
PESHA1 | 2E6B3E8DAA3D329897CB261E7990DCD5DF64213C |
PE256 | 9E2BBD3E93FB239D83CC183207F3C39AF7675B90E200853213A0DDDABAA239CB |
Runtime Data
Usage (stdout):
Microsoft r Logman.exe (10.0.22000.1)
Usage:
C:\WINDOWS\system32\logman.exe [create|query|start|stop|delete|update|import|export] [options]
Verbs:
create Create a new data collector.
query Query data collector properties. If no name
is given all data collectors are listed.
start Start an existing data collector and set the
begin time to manual.
stop Stop an existing data collector and set the
end time to manual.
delete Delete an existing data collector.
update Update an existing data collector's properties.
import Import a data collector set from an XML file.
export Export a data collector set to an XML file.
Adverbs:
counter Create a counter data collector.
trace Create a trace data collector.
alert Create an alert data collector.
cfg Create a configuration data collector.
providers Show registered providers.
Options (counter):
-c <path [path [...]]> Performance counters to collect.
-cf <filename> File listing performance counters to collect,
one per line.
-f <bin|bincirc|csv|tsv|sql> Specifies the log format for the data
collector. For SQL database format, you must
use the -o option in the command line with
the DNS!log option. The defaults is binary.
-sc <value> Maximum number of samples to collect with a
performance counter data collector.
-si <[[hh:]mm:]ss> Sample interval for performance counter data
collectors.
Options (trace):
-f <bin|bincirc|csv|tsv|sql> Specifies the log format for the data
collector. For SQL database format, you must
use the -o option in the command line with
the DNS!log option. The defaults is binary.
-mode <trace_mode> Event Trace Session logger mode. For more
information visit -
https://go.microsoft.com/fwlink/?LinkID=136464
-ct <perf|system|cycle> Specifies the clock resolution to use when
logging the time stamp for each event. You
can use query performance counter, system
time, or CPU cycle.
-ln <logger_name> Logger name for Event Trace Sessions.
-ft <[[hh:]mm:]ss> Event Trace Session flush timer.
-[-]p <provider [flags [level]]> A single Event Trace provider to enable.
The terms 'Flags' and 'Keywords' are
synonymous in this context.
-pf <filename> File listing multiple Event Trace providers
to enable.
-[-]rt Run the Event Trace Session in real-time mode.
-[-]ul Run the Event Trace Session in user mode.
-bs <value> Event Trace Session buffer size in kb.
-nb <min max> Number of Event Trace Session buffers.
Options (alert):
-[-]el Enable/Disable event log reporting.
-th <threshold [threshold [...]]> Specify counters and their threshold
values for and alert.
-[-]rdcs <name> Data collector set to start when alert fires.
-[-]tn <task> Task to run when alert fires.
-[-]targ <argument> Task arguments.
-si <[[hh:]mm:]ss> Sample interval for performance counter data
collectors.
Options (cfg):
-[-]ni Enable/Disable network interface query.
-reg <path [path [...]]> Registry values to collect.
-mgt <query [query [...]]> WMI objects to collect.
-ftc <path [path [...]]> Full path to the files to collect.
Options:
-? Displays context sensitive help.
-s <computer> Perform the command on specified remote system.
-config <filename> Settings file containing command options.
[-n] <name> Name of the target object.
-pid <pid> Process identifier.
-xml <filename> Name of the XML file to import or export.
-as Perform the requested operation asynchronously.
-[-]u <user [password]> User to Run As. Entering a * for the password
produces a prompt for the password. The
password is not displayed when you type it at
the password prompt.
-m <[start] [stop]> Change to manual start or stop instead of a
scheduled begin or end time.
-rf <[[hh:]mm:]ss> Run the data collector for the specified
period of time.
-b <M/d/yyyy h:mm:ss[AM|PM]> Begin the data collector at specified time.
-e <M/d/yyyy h:mm:ss[AM|PM]> End the data collector at specified time.
-o <path|dsn!log> Path of the output log file or the DSN and
log set name in a SQL database. The default
path is '%systemdrive%\PerfLogs\Admin'.
-[-]r Repeat the data collector daily at the
specified begin and end times.
-[-]a Append to an existing log file.
-[-]ow Overwrite an existing log file.
-[-]v <nnnnnn|mmddhhmm> Attach file versioning information to the end
of the log name.
-[-]rc <task> Run the command specified each time the log
is closed.
-[-]max <value> Maximum log file size in MB or number of
records for SQL logs.
-[-]cnf <[[hh:]mm:]ss> Create a new file when the specified time has
elapsed or when the max size is exceeded.
-y Answer yes to all questions without prompting.
-fd Flushes all the active buffers of an existing
Event Trace Session to disk.
-ets Send commands to Event Trace Sessions
directly without saving or scheduling.
Note:
Where [-] is listed, an extra - negates the option.
For example --u turns off the -u option.
More Information:
Microsoft TechNet - https://go.microsoft.com/fwlink/?LinkID=136332
Examples:
logman start perf_log
logman update perf_log -si 10 -f csv -v mmddhhmm
logman create counter perf_log -c "\Processor(_Total)\% Processor Time"
logman create counter perf_log -c "\Processor(_Total)\% Processor Time" -max 10 -rf 01:00
logman create trace trace_log -nb 16 256 -bs 64 -o c:\logfile
logman create alert new_alert -th "\Processor(_Total)\% Processor Time>50"
logman create cfg cfg_log -reg "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\\"
logman create cfg cfg_log -mgt "root\cimv2:SELECT * FROM Win32_OperatingSystem"
logman query providers
logman query providers Microsoft-Windows-Diagnostics-Networking
logman start process_trace -p Microsoft-Windows-Kernel-Process 0x10 win:Informational -ets
logman start usermode_trace -p "Service Control Manager Trace" -ul -ets
logman query usermode_trace -p "Service Control Manager Trace" -ul -ets
logman stop usermode_trace -p "Service Control Manager Trace" -ul -ets
logman start process_trace -p Microsoft-Windows-Kernel-Process -mode newfile -max 1 -o output%d.etl -ets
logman start "NT Kernel Logger" -o log.etl -ets
logman start "NT Kernel Logger" -p "Windows Kernel Trace" (process,thread) -ets
Loaded Modules:
Path |
---|
C:\WINDOWS\System32\KERNEL32.DLL |
C:\WINDOWS\System32\KERNELBASE.dll |
C:\WINDOWS\system32\logman.exe |
C:\WINDOWS\SYSTEM32\ntdll.dll |
Signature
- Status: Signature verified.
- Serial:
33000002ED2C45E4C145CF48440000000002ED
- Thumbprint:
312860D2047EB81F8F58C29FF19ECDB4C634CF6A
- Issuer: CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
- Subject: CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
File Metadata
- Original Filename: Logman.exe.mui
- Product Name: Microsoft Windows Operating System
- Company Name: Microsoft Corporation
- File Version: 10.0.22000.1 (WinBuild.160101.0800)
- Product Version: 10.0.22000.1
- Language: English (United States)
- Legal Copyright: Microsoft Corporation. All rights reserved.
- Machine Type: 64-bit
File Scan
- VirusTotal Detections: 0/74
- VirusTotal Link: https://www.virustotal.com/gui/file/8f0bd33907b705136560bc42502a2b697cc8cf4d14609b9a33fcd214d89ce46f/detection
Possible Misuse
The following table contains possible examples of logman.exe
being misused. While logman.exe
is not inherently malicious, its legitimate functionality can be abused for malicious purposes.
Source | Source File | Example | License |
---|---|---|---|
sigma | image_load_wmi_module_load.yml | - '\logman.exe' |
DRL 1.0 |
sigma | proc_creation_win_etw_trace_evasion.yml | - 'logman' |
DRL 1.0 |
sigma | proc_creation_win_susp_disable_eventlog.yml | description: Detects command that is used to disable or delete Windows eventlog via logman Windows utility |
DRL 1.0 |
sigma | proc_creation_win_susp_disable_eventlog.yml | - https://ss64.com/nt/logman.html |
DRL 1.0 |
sigma | proc_creation_win_susp_disable_eventlog.yml | - 'logman ' |
DRL 1.0 |
Additional Info*
*The information below is copied from MicrosoftDocs, which is maintained by Microsoft. Available under CC BY 4.0 license.
logman
Applies to: Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows Server 2012 R2, Windows Server 2012
Creates and manages Event Trace Session and Performance logs and supports many functions of Performance Monitor from the command line.
Syntax
logman [create | query | start | stop | delete| update | import | export | /?] [options]
Parameters
Parameter | Description |
---|---|
logman create | Creates a counter, trace, configuration data collector, or API. |
logman query | Queries data collector properties. |
logman start | stop | Starts or stops data collection. |
logman delete | Deletes an existing data collector. |
logman update | Updates the properties of an existing data collector. |
logman import | export | Imports a data collector set from an XML file or export a data collector set to an XML file. |
Additional References
MIT License. Copyright (c) 2020-2021 Strontic.