cslol-dll.dll
Description:
Authors:
Version:
Architecture: 64-bit
Operating System:
SHA256: ae12fb633d88cf31a080ef24ec2c08dc
File Size: 497.4 KB
Uploaded At: April 16, 2026, 7:01 p.m.
Views: 46
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory
Exported Functions
- cslol_find (Ordinal: 1, Address: 0x1440)
- cslol_hook (Ordinal: 2, Address: 0x1480)
- cslol_init (Ordinal: 3, Address: 0x10b0)
- cslol_log_pull (Ordinal: 4, Address: 0x1720)
- cslol_msg_hookproc (Ordinal: 5, Address: 0x1090)
- cslol_set_config (Ordinal: 6, Address: 0x10c0)
- cslol_set_flags (Ordinal: 7, Address: 0x1420)
- cslol_set_log_level (Ordinal: 8, Address: 0x1430)
Imported DLLs & Functions
KERNEL32.dll
- CloseHandle (Address: 0x1800633b0)
- ConnectNamedPipe (Address: 0x1800633b8)
- CreateFileMappingW (Address: 0x1800633c0)
- CreateFileW (Address: 0x1800633c8)
- CreateNamedPipeW (Address: 0x1800633d0)
- ExitProcess (Address: 0x1800633d8)
- FindClose (Address: 0x1800633e0)
- FindFirstFileW (Address: 0x1800633e8)
- FindNextFileW (Address: 0x1800633f0)
- FlushFileBuffers (Address: 0x1800633f8)
- GetCommandLineW (Address: 0x180063400)
- GetFileAttributesW (Address: 0x180063408)
- GetFullPathNameW (Address: 0x180063410)
- GetLastError (Address: 0x180063418)
- GetModuleFileNameA (Address: 0x180063420)
- GetModuleFileNameW (Address: 0x180063428)
- GetModuleHandleA (Address: 0x180063430)
- GetModuleHandleW (Address: 0x180063438)
- GetProcessHeap (Address: 0x180063440)
- HeapAlloc (Address: 0x180063448)
- HeapFree (Address: 0x180063450)
- MapViewOfFile (Address: 0x180063458)
- ReadFile (Address: 0x180063460)
- ReadProcessMemory (Address: 0x180063468)
- SetFilePointer (Address: 0x180063470)
- UnmapViewOfFile (Address: 0x180063478)
- VirtualProtect (Address: 0x180063480)
- VirtualQuery (Address: 0x180063488)
- WriteFile (Address: 0x180063490)
- WriteProcessMemory (Address: 0x180063498)
ntdll.dll
- __chkstk (Address: 0x1800632f0)
- _strnicmp (Address: 0x1800632f8)
- _vsnprintf (Address: 0x180063300)
- _wcsicmp (Address: 0x180063308)
- LdrAddRefDll (Address: 0x1800632d8)
- memcpy (Address: 0x180063310)
- memmove (Address: 0x180063318)
- memset (Address: 0x180063320)
- NtAllocateVirtualMemory (Address: 0x1800632e0)
- NtFreeVirtualMemory (Address: 0x1800632e8)
- sprintf (Address: 0x180063328)
- strcmp (Address: 0x180063330)
- strstr (Address: 0x180063338)
- swprintf_s (Address: 0x180063340)
- wcscmp (Address: 0x180063348)
- wcscpy_s (Address: 0x180063350)
- wcslen (Address: 0x180063358)
- wcsstr (Address: 0x180063360)
SHELL32.dll
- CommandLineToArgvW (Address: 0x1800634a8)
USER32.dll
- CallNextHookEx (Address: 0x180063370)
- FindWindowExA (Address: 0x180063378)
- GetWindowThreadProcessId (Address: 0x180063380)
- MessageBoxA (Address: 0x180063388)
- MessageBoxW (Address: 0x180063390)
- SetWindowsHookExA (Address: 0x180063398)
- UnhookWindowsHookEx (Address: 0x1800633a0)