cslol-dll.dll
Description:
Authors:
Version:
Architecture: 64-bit
Operating System:
SHA256: 4a009619c6dea691780b2f20cf17e08d
File Size: 251.0 KB
Uploaded At: April 11, 2026, 3:14 p.m.
Views: 2
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory
Exported Functions
- cslol_find (Ordinal: 1, Address: 0x24d0)
- cslol_hook (Ordinal: 2, Address: 0x2510)
- cslol_init (Ordinal: 3, Address: 0x2050)
- cslol_log_pull (Ordinal: 4, Address: 0x25e0)
- cslol_msg_hookproc (Ordinal: 5, Address: 0x2000)
- cslol_set_config (Ordinal: 6, Address: 0x2060)
- cslol_set_flags (Ordinal: 7, Address: 0x24b0)
- cslol_set_log_level (Ordinal: 8, Address: 0x24c0)
Imported DLLs & Functions
KERNEL32.dll
- CloseHandle (Address: 0x180027478)
- CreateFileW (Address: 0x180027480)
- CreateToolhelp32Snapshot (Address: 0x180027488)
- DeleteCriticalSection (Address: 0x180027490)
- DisableThreadLibraryCalls (Address: 0x180027498)
- EncodePointer (Address: 0x1800274a0)
- EnterCriticalSection (Address: 0x1800274a8)
- ExitProcess (Address: 0x1800274b0)
- FindClose (Address: 0x1800274b8)
- FindFirstFileExW (Address: 0x1800274c0)
- FindNextFileW (Address: 0x1800274c8)
- FlsAlloc (Address: 0x1800274d0)
- FlsFree (Address: 0x1800274d8)
- FlsGetValue (Address: 0x1800274e0)
- FlsSetValue (Address: 0x1800274e8)
- FlushFileBuffers (Address: 0x1800274f0)
- FlushInstructionCache (Address: 0x1800274f8)
- FreeEnvironmentStringsW (Address: 0x180027500)
- FreeLibrary (Address: 0x180027508)
- GetACP (Address: 0x180027510)
- GetCommandLineA (Address: 0x180027520)
- GetCommandLineW (Address: 0x180027528)
- GetConsoleMode (Address: 0x180027530)
- GetConsoleOutputCP (Address: 0x180027538)
- GetCPInfo (Address: 0x180027518)
- GetCurrentProcess (Address: 0x180027540)
- GetCurrentProcessId (Address: 0x180027548)
- GetCurrentThreadId (Address: 0x180027550)
- GetEnvironmentStringsW (Address: 0x180027558)
- GetFileAttributesW (Address: 0x180027560)
- GetFileSize (Address: 0x180027568)
- GetFileType (Address: 0x180027570)
- GetFullPathNameW (Address: 0x180027578)
- GetLastError (Address: 0x180027580)
- GetModuleFileNameA (Address: 0x180027588)
- GetModuleFileNameW (Address: 0x180027590)
- GetModuleHandleA (Address: 0x180027598)
- GetModuleHandleExW (Address: 0x1800275a0)
- GetModuleHandleW (Address: 0x1800275a8)
- GetOEMCP (Address: 0x1800275b0)
- GetProcAddress (Address: 0x1800275b8)
- GetProcessHeap (Address: 0x1800275c0)
- GetStartupInfoW (Address: 0x1800275c8)
- GetStdHandle (Address: 0x1800275d0)
- GetStringTypeW (Address: 0x1800275d8)
- GetSystemInfo (Address: 0x1800275e0)
- GetSystemTimeAsFileTime (Address: 0x1800275e8)
- GetTempFileNameW (Address: 0x1800275f0)
- GetTempPathW (Address: 0x1800275f8)
- GetThreadContext (Address: 0x180027600)
- HeapAlloc (Address: 0x180027608)
- HeapCreate (Address: 0x180027610)
- HeapFree (Address: 0x180027618)
- HeapReAlloc (Address: 0x180027620)
- HeapSize (Address: 0x180027628)
- InitializeCriticalSectionAndSpinCount (Address: 0x180027630)
- InitializeCriticalSectionEx (Address: 0x180027638)
- InitializeSListHead (Address: 0x180027640)
- InterlockedFlushSList (Address: 0x180027648)
- IsDebuggerPresent (Address: 0x180027650)
- IsProcessorFeaturePresent (Address: 0x180027658)
- IsValidCodePage (Address: 0x180027660)
- LCMapStringW (Address: 0x180027668)
- LeaveCriticalSection (Address: 0x180027670)
- LoadLibraryExW (Address: 0x180027678)
- LoadLibraryW (Address: 0x180027680)
- MultiByteToWideChar (Address: 0x180027688)
- OpenThread (Address: 0x180027690)
- QueryPerformanceCounter (Address: 0x180027698)
- RaiseException (Address: 0x1800276a0)
- ReadFile (Address: 0x1800276a8)
- ReadProcessMemory (Address: 0x1800276b0)
- ResumeThread (Address: 0x1800276b8)
- RtlCaptureContext (Address: 0x1800276c0)
- RtlLookupFunctionEntry (Address: 0x1800276c8)
- RtlPcToFileHeader (Address: 0x1800276d0)
- RtlUnwindEx (Address: 0x1800276d8)
- RtlVirtualUnwind (Address: 0x1800276e0)
- SetFilePointer (Address: 0x1800276e8)
- SetFilePointerEx (Address: 0x1800276f0)
- SetLastError (Address: 0x1800276f8)
- SetStdHandle (Address: 0x180027700)
- SetThreadContext (Address: 0x180027708)
- SetUnhandledExceptionFilter (Address: 0x180027710)
- Sleep (Address: 0x180027718)
- SuspendThread (Address: 0x180027720)
- TerminateProcess (Address: 0x180027728)
- Thread32First (Address: 0x180027730)
- Thread32Next (Address: 0x180027738)
- TlsAlloc (Address: 0x180027740)
- TlsFree (Address: 0x180027748)
- TlsGetValue (Address: 0x180027750)
- TlsSetValue (Address: 0x180027758)
- UnhandledExceptionFilter (Address: 0x180027760)
- VirtualAlloc (Address: 0x180027768)
- VirtualFree (Address: 0x180027770)
- VirtualProtect (Address: 0x180027778)
- VirtualQuery (Address: 0x180027780)
- WideCharToMultiByte (Address: 0x180027788)
- WriteConsoleW (Address: 0x180027790)
- WriteFile (Address: 0x180027798)
- WriteProcessMemory (Address: 0x1800277a0)
USER32.dll
- CallNextHookEx (Address: 0x1800277b0)
- FindWindowExA (Address: 0x1800277b8)
- GetWindowThreadProcessId (Address: 0x1800277c0)
- PostThreadMessageA (Address: 0x1800277c8)
- SetWindowsHookExA (Address: 0x1800277d0)
- UnhookWindowsHookEx (Address: 0x1800277d8)