cslol-dll.dll

Description:

Authors:

Version:

Architecture: 64-bit

Operating System:

SHA256: ae12fb633d88cf31a080ef24ec2c08dc

File Size: 497.4 KB

Uploaded At: April 16, 2026, 7:01 p.m.

Views: 46

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory

Exported Functions

  • cslol_find (Ordinal: 1, Address: 0x1440)
  • cslol_hook (Ordinal: 2, Address: 0x1480)
  • cslol_init (Ordinal: 3, Address: 0x10b0)
  • cslol_log_pull (Ordinal: 4, Address: 0x1720)
  • cslol_msg_hookproc (Ordinal: 5, Address: 0x1090)
  • cslol_set_config (Ordinal: 6, Address: 0x10c0)
  • cslol_set_flags (Ordinal: 7, Address: 0x1420)
  • cslol_set_log_level (Ordinal: 8, Address: 0x1430)

Imported DLLs & Functions

KERNEL32.dll
  • CloseHandle (Address: 0x1800633b0)
  • ConnectNamedPipe (Address: 0x1800633b8)
  • CreateFileMappingW (Address: 0x1800633c0)
  • CreateFileW (Address: 0x1800633c8)
  • CreateNamedPipeW (Address: 0x1800633d0)
  • ExitProcess (Address: 0x1800633d8)
  • FindClose (Address: 0x1800633e0)
  • FindFirstFileW (Address: 0x1800633e8)
  • FindNextFileW (Address: 0x1800633f0)
  • FlushFileBuffers (Address: 0x1800633f8)
  • GetCommandLineW (Address: 0x180063400)
  • GetFileAttributesW (Address: 0x180063408)
  • GetFullPathNameW (Address: 0x180063410)
  • GetLastError (Address: 0x180063418)
  • GetModuleFileNameA (Address: 0x180063420)
  • GetModuleFileNameW (Address: 0x180063428)
  • GetModuleHandleA (Address: 0x180063430)
  • GetModuleHandleW (Address: 0x180063438)
  • GetProcessHeap (Address: 0x180063440)
  • HeapAlloc (Address: 0x180063448)
  • HeapFree (Address: 0x180063450)
  • MapViewOfFile (Address: 0x180063458)
  • ReadFile (Address: 0x180063460)
  • ReadProcessMemory (Address: 0x180063468)
  • SetFilePointer (Address: 0x180063470)
  • UnmapViewOfFile (Address: 0x180063478)
  • VirtualProtect (Address: 0x180063480)
  • VirtualQuery (Address: 0x180063488)
  • WriteFile (Address: 0x180063490)
  • WriteProcessMemory (Address: 0x180063498)
ntdll.dll
  • __chkstk (Address: 0x1800632f0)
  • _strnicmp (Address: 0x1800632f8)
  • _vsnprintf (Address: 0x180063300)
  • _wcsicmp (Address: 0x180063308)
  • LdrAddRefDll (Address: 0x1800632d8)
  • memcpy (Address: 0x180063310)
  • memmove (Address: 0x180063318)
  • memset (Address: 0x180063320)
  • NtAllocateVirtualMemory (Address: 0x1800632e0)
  • NtFreeVirtualMemory (Address: 0x1800632e8)
  • sprintf (Address: 0x180063328)
  • strcmp (Address: 0x180063330)
  • strstr (Address: 0x180063338)
  • swprintf_s (Address: 0x180063340)
  • wcscmp (Address: 0x180063348)
  • wcscpy_s (Address: 0x180063350)
  • wcslen (Address: 0x180063358)
  • wcsstr (Address: 0x180063360)
SHELL32.dll
  • CommandLineToArgvW (Address: 0x1800634a8)
USER32.dll
  • CallNextHookEx (Address: 0x180063370)
  • FindWindowExA (Address: 0x180063378)
  • GetWindowThreadProcessId (Address: 0x180063380)
  • MessageBoxA (Address: 0x180063388)
  • MessageBoxW (Address: 0x180063390)
  • SetWindowsHookExA (Address: 0x180063398)
  • UnhookWindowsHookEx (Address: 0x1800633a0)