LogSession.dll

Description: LogSession

Authors: Copyright 2008 - 10 Adobe Systems Incorporated. All rights reserved.

Version: 2.0.1.11

Architecture: 32-bit

Operating System: Windows

SHA256: d1e24cee69ed53da7c9570258226d6a9

File Size: 539.9 KB

Uploaded At: Dec. 2, 2025, 2:41 p.m.

Views: 6

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory

Exported Functions

  • UTAddToGroup (Ordinal: 1, Address: 0x64280)
  • UTAddToSession (Ordinal: 2, Address: 0x64300)
  • UTCloseSession (Ordinal: 3, Address: 0x64260)
  • UTGetDemographic (Ordinal: 4, Address: 0x641b0)
  • UTGetNonDefaultDemographic (Ordinal: 5, Address: 0x64170)
  • UTGetOptIn (Ordinal: 6, Address: 0x64240)
  • UTInitialize (Ordinal: 7, Address: 0x64350)
  • UTLogEvent (Ordinal: 8, Address: 0x642d0)
  • UTNewDataGroup (Ordinal: 9, Address: 0x642a0)
  • UTOptInGet (Ordinal: 10, Address: 0x641f0)
  • UTOptInSet (Ordinal: 11, Address: 0x641d0)
  • UTSetDemographic (Ordinal: 12, Address: 0x64190)
  • UTSetNonDefaultDemographic (Ordinal: 13, Address: 0x64150)
  • UTSetOptIn (Ordinal: 14, Address: 0x64220)
  • UTSetSerializationState (Ordinal: 15, Address: 0x64100)
  • UTStartSession (Ordinal: 16, Address: 0x64320)

Imported DLLs & Functions

ADVAPI32.dll
  • CryptAcquireContextA (Address: 0x1006b008)
  • CryptCreateHash (Address: 0x1006b004)
  • CryptDestroyHash (Address: 0x1006b000)
  • CryptGetHashParam (Address: 0x1006b010)
  • CryptHashData (Address: 0x1006b034)
  • CryptReleaseContext (Address: 0x1006b00c)
  • RegCloseKey (Address: 0x1006b018)
  • RegCreateKeyExW (Address: 0x1006b030)
  • RegDeleteKeyW (Address: 0x1006b028)
  • RegDeleteValueW (Address: 0x1006b024)
  • RegEnumValueW (Address: 0x1006b020)
  • RegOpenKeyExW (Address: 0x1006b01c)
  • RegQueryValueExW (Address: 0x1006b02c)
  • RegSetValueExW (Address: 0x1006b014)
KERNEL32.dll
  • CloseHandle (Address: 0x1006b048)
  • CompareFileTime (Address: 0x1006b058)
  • CompareStringA (Address: 0x1006b10c)
  • CompareStringW (Address: 0x1006b0c8)
  • CopyFileW (Address: 0x1006b064)
  • CreateFileA (Address: 0x1006b118)
  • CreateFileW (Address: 0x1006b044)
  • CreateProcessW (Address: 0x1006b050)
  • CreateThread (Address: 0x1006b190)
  • DeleteCriticalSection (Address: 0x1006b0bc)
  • DeleteFileW (Address: 0x1006b080)
  • EnterCriticalSection (Address: 0x1006b0b8)
  • EnumSystemLocalesA (Address: 0x1006b130)
  • ExitProcess (Address: 0x1006b1d0)
  • ExitThread (Address: 0x1006b188)
  • FindClose (Address: 0x1006b06c)
  • FindFirstFileW (Address: 0x1006b04c)
  • FindNextFileW (Address: 0x1006b074)
  • FindResourceA (Address: 0x1006b08c)
  • FindResourceExA (Address: 0x1006b094)
  • FlushFileBuffers (Address: 0x1006b204)
  • FreeEnvironmentStringsA (Address: 0x1006b144)
  • FreeEnvironmentStringsW (Address: 0x1006b070)
  • FreeLibrary (Address: 0x1006b100)
  • GetACP (Address: 0x1006b0d4)
  • GetCommandLineA (Address: 0x1006b1a0)
  • GetConsoleCP (Address: 0x1006b1fc)
  • GetConsoleMode (Address: 0x1006b200)
  • GetConsoleOutputCP (Address: 0x1006b0d0)
  • GetCPInfo (Address: 0x1006b180)
  • GetCurrentProcess (Address: 0x1006b0e4)
  • GetCurrentProcessId (Address: 0x1006b194)
  • GetCurrentThreadId (Address: 0x1006b18c)
  • GetDateFormatA (Address: 0x1006b19c)
  • GetDiskFreeSpaceW (Address: 0x1006b068)
  • GetEnvironmentStrings (Address: 0x1006b140)
  • GetEnvironmentStringsW (Address: 0x1006b05c)
  • GetExitCodeThread (Address: 0x1006b084)
  • GetFileAttributesExW (Address: 0x1006b078)
  • GetFileType (Address: 0x1006b178)
  • GetLastError (Address: 0x1006b0f8)
  • GetLocaleInfoA (Address: 0x1006b0a4)
  • GetLocaleInfoW (Address: 0x1006b0cc)
  • GetModuleFileNameA (Address: 0x1006b0ec)
  • GetModuleFileNameW (Address: 0x1006b0a0)
  • GetModuleHandleA (Address: 0x1006b128)
  • GetModuleHandleW (Address: 0x1006b1cc)
  • GetOEMCP (Address: 0x1006b1f0)
  • GetProcAddress (Address: 0x1006b0f4)
  • GetProcessHeap (Address: 0x1006b124)
  • GetStartupInfoA (Address: 0x1006b1d8)
  • GetStdHandle (Address: 0x1006b17c)
  • GetStringTypeA (Address: 0x1006b20c)
  • GetStringTypeW (Address: 0x1006b1b4)
  • GetSystemDirectoryA (Address: 0x1006b0fc)
  • GetSystemInfo (Address: 0x1006b0ac)
  • GetSystemTimeAsFileTime (Address: 0x1006b184)
  • GetTickCount (Address: 0x1006b138)
  • GetTimeFormatA (Address: 0x1006b198)
  • GetTimeZoneInformation (Address: 0x1006b210)
  • GetUserDefaultLCID (Address: 0x1006b134)
  • GetVersionExA (Address: 0x1006b07c)
  • GlobalMemoryStatusEx (Address: 0x1006b0a8)
  • HeapAlloc (Address: 0x1006b164)
  • HeapCreate (Address: 0x1006b1b8)
  • HeapDestroy (Address: 0x1006b1bc)
  • HeapFree (Address: 0x1006b160)
  • HeapReAlloc (Address: 0x1006b1c8)
  • HeapSize (Address: 0x1006b148)
  • InitializeCriticalSection (Address: 0x1006b0b0)
  • InitializeCriticalSectionAndSpinCount (Address: 0x1006b11c)
  • InterlockedCompareExchange (Address: 0x1006b154)
  • InterlockedDecrement (Address: 0x1006b150)
  • InterlockedExchange (Address: 0x1006b158)
  • InterlockedIncrement (Address: 0x1006b14c)
  • IsDebuggerPresent (Address: 0x1006b170)
  • IsValidCodePage (Address: 0x1006b1f4)
  • IsValidLocale (Address: 0x1006b12c)
  • LCMapStringA (Address: 0x1006b1ac)
  • LCMapStringW (Address: 0x1006b1b0)
  • LeaveCriticalSection (Address: 0x1006b0b4)
  • LoadLibraryA (Address: 0x1006b0f0)
  • LoadLibraryW (Address: 0x1006b060)
  • LoadResource (Address: 0x1006b090)
  • LockResource (Address: 0x1006b09c)
  • lstrlenW (Address: 0x1006b0c0)
  • MoveFileExW (Address: 0x1006b054)
  • MultiByteToWideChar (Address: 0x1006b088)
  • QueryPerformanceCounter (Address: 0x1006b13c)
  • RaiseException (Address: 0x1006b1a4)
  • ReadFile (Address: 0x1006b1f8)
  • RtlUnwind (Address: 0x1006b1a8)
  • SetEndOfFile (Address: 0x1006b120)
  • SetEnvironmentVariableA (Address: 0x1006b0c4)
  • SetEnvironmentVariableW (Address: 0x1006b104)
  • SetFilePointer (Address: 0x1006b208)
  • SetHandleCount (Address: 0x1006b1d4)
  • SetLastError (Address: 0x1006b1ec)
  • SetStdHandle (Address: 0x1006b114)
  • SetUnhandledExceptionFilter (Address: 0x1006b0e8)
  • SizeofResource (Address: 0x1006b098)
  • Sleep (Address: 0x1006b15c)
  • SuspendThread (Address: 0x1006b108)
  • TerminateProcess (Address: 0x1006b168)
  • TlsAlloc (Address: 0x1006b1e0)
  • TlsFree (Address: 0x1006b1e8)
  • TlsGetValue (Address: 0x1006b1dc)
  • TlsSetValue (Address: 0x1006b1e4)
  • UnhandledExceptionFilter (Address: 0x1006b16c)
  • VerLanguageNameW (Address: 0x1006b03c)
  • VirtualAlloc (Address: 0x1006b1c4)
  • VirtualFree (Address: 0x1006b1c0)
  • VirtualProtect (Address: 0x1006b0e0)
  • WideCharToMultiByte (Address: 0x1006b0d8)
  • WriteConsoleA (Address: 0x1006b110)
  • WriteConsoleW (Address: 0x1006b174)
  • WriteFile (Address: 0x1006b040)
  • WriteProcessMemory (Address: 0x1006b0dc)
ole32.dll
  • CoCreateGuid (Address: 0x1006b264)
SETUPAPI.dll
  • SetupDiEnumDeviceInfo (Address: 0x1006b21c)
  • SetupDiGetClassDevsA (Address: 0x1006b220)
  • SetupDiGetDeviceRegistryPropertyA (Address: 0x1006b218)
SHELL32.dll
  • SHCreateDirectoryExW (Address: 0x1006b228)
  • SHFileOperationW (Address: 0x1006b22c)
  • SHGetFolderPathW (Address: 0x1006b230)
SHLWAPI.dll
  • PathFileExistsW (Address: 0x1006b23c)
  • PathIsDirectoryW (Address: 0x1006b238)
USER32.dll
  • EnumDisplayMonitors (Address: 0x1006b248)
  • GetMonitorInfoA (Address: 0x1006b24c)
  • GetSystemMetrics (Address: 0x1006b244)
VERSION.dll
  • GetFileVersionInfoSizeW (Address: 0x1006b258)
  • GetFileVersionInfoW (Address: 0x1006b25c)
  • VerQueryValueW (Address: 0x1006b254)