cslol-dll.dll

Description:

Authors:

Version:

Architecture: 64-bit

Operating System:

SHA256: 4a009619c6dea691780b2f20cf17e08d

File Size: 251.0 KB

Uploaded At: April 11, 2026, 3:14 p.m.

Views: 2

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory

Exported Functions

  • cslol_find (Ordinal: 1, Address: 0x24d0)
  • cslol_hook (Ordinal: 2, Address: 0x2510)
  • cslol_init (Ordinal: 3, Address: 0x2050)
  • cslol_log_pull (Ordinal: 4, Address: 0x25e0)
  • cslol_msg_hookproc (Ordinal: 5, Address: 0x2000)
  • cslol_set_config (Ordinal: 6, Address: 0x2060)
  • cslol_set_flags (Ordinal: 7, Address: 0x24b0)
  • cslol_set_log_level (Ordinal: 8, Address: 0x24c0)

Imported DLLs & Functions

KERNEL32.dll
  • CloseHandle (Address: 0x180027478)
  • CreateFileW (Address: 0x180027480)
  • CreateToolhelp32Snapshot (Address: 0x180027488)
  • DeleteCriticalSection (Address: 0x180027490)
  • DisableThreadLibraryCalls (Address: 0x180027498)
  • EncodePointer (Address: 0x1800274a0)
  • EnterCriticalSection (Address: 0x1800274a8)
  • ExitProcess (Address: 0x1800274b0)
  • FindClose (Address: 0x1800274b8)
  • FindFirstFileExW (Address: 0x1800274c0)
  • FindNextFileW (Address: 0x1800274c8)
  • FlsAlloc (Address: 0x1800274d0)
  • FlsFree (Address: 0x1800274d8)
  • FlsGetValue (Address: 0x1800274e0)
  • FlsSetValue (Address: 0x1800274e8)
  • FlushFileBuffers (Address: 0x1800274f0)
  • FlushInstructionCache (Address: 0x1800274f8)
  • FreeEnvironmentStringsW (Address: 0x180027500)
  • FreeLibrary (Address: 0x180027508)
  • GetACP (Address: 0x180027510)
  • GetCommandLineA (Address: 0x180027520)
  • GetCommandLineW (Address: 0x180027528)
  • GetConsoleMode (Address: 0x180027530)
  • GetConsoleOutputCP (Address: 0x180027538)
  • GetCPInfo (Address: 0x180027518)
  • GetCurrentProcess (Address: 0x180027540)
  • GetCurrentProcessId (Address: 0x180027548)
  • GetCurrentThreadId (Address: 0x180027550)
  • GetEnvironmentStringsW (Address: 0x180027558)
  • GetFileAttributesW (Address: 0x180027560)
  • GetFileSize (Address: 0x180027568)
  • GetFileType (Address: 0x180027570)
  • GetFullPathNameW (Address: 0x180027578)
  • GetLastError (Address: 0x180027580)
  • GetModuleFileNameA (Address: 0x180027588)
  • GetModuleFileNameW (Address: 0x180027590)
  • GetModuleHandleA (Address: 0x180027598)
  • GetModuleHandleExW (Address: 0x1800275a0)
  • GetModuleHandleW (Address: 0x1800275a8)
  • GetOEMCP (Address: 0x1800275b0)
  • GetProcAddress (Address: 0x1800275b8)
  • GetProcessHeap (Address: 0x1800275c0)
  • GetStartupInfoW (Address: 0x1800275c8)
  • GetStdHandle (Address: 0x1800275d0)
  • GetStringTypeW (Address: 0x1800275d8)
  • GetSystemInfo (Address: 0x1800275e0)
  • GetSystemTimeAsFileTime (Address: 0x1800275e8)
  • GetTempFileNameW (Address: 0x1800275f0)
  • GetTempPathW (Address: 0x1800275f8)
  • GetThreadContext (Address: 0x180027600)
  • HeapAlloc (Address: 0x180027608)
  • HeapCreate (Address: 0x180027610)
  • HeapFree (Address: 0x180027618)
  • HeapReAlloc (Address: 0x180027620)
  • HeapSize (Address: 0x180027628)
  • InitializeCriticalSectionAndSpinCount (Address: 0x180027630)
  • InitializeCriticalSectionEx (Address: 0x180027638)
  • InitializeSListHead (Address: 0x180027640)
  • InterlockedFlushSList (Address: 0x180027648)
  • IsDebuggerPresent (Address: 0x180027650)
  • IsProcessorFeaturePresent (Address: 0x180027658)
  • IsValidCodePage (Address: 0x180027660)
  • LCMapStringW (Address: 0x180027668)
  • LeaveCriticalSection (Address: 0x180027670)
  • LoadLibraryExW (Address: 0x180027678)
  • LoadLibraryW (Address: 0x180027680)
  • MultiByteToWideChar (Address: 0x180027688)
  • OpenThread (Address: 0x180027690)
  • QueryPerformanceCounter (Address: 0x180027698)
  • RaiseException (Address: 0x1800276a0)
  • ReadFile (Address: 0x1800276a8)
  • ReadProcessMemory (Address: 0x1800276b0)
  • ResumeThread (Address: 0x1800276b8)
  • RtlCaptureContext (Address: 0x1800276c0)
  • RtlLookupFunctionEntry (Address: 0x1800276c8)
  • RtlPcToFileHeader (Address: 0x1800276d0)
  • RtlUnwindEx (Address: 0x1800276d8)
  • RtlVirtualUnwind (Address: 0x1800276e0)
  • SetFilePointer (Address: 0x1800276e8)
  • SetFilePointerEx (Address: 0x1800276f0)
  • SetLastError (Address: 0x1800276f8)
  • SetStdHandle (Address: 0x180027700)
  • SetThreadContext (Address: 0x180027708)
  • SetUnhandledExceptionFilter (Address: 0x180027710)
  • Sleep (Address: 0x180027718)
  • SuspendThread (Address: 0x180027720)
  • TerminateProcess (Address: 0x180027728)
  • Thread32First (Address: 0x180027730)
  • Thread32Next (Address: 0x180027738)
  • TlsAlloc (Address: 0x180027740)
  • TlsFree (Address: 0x180027748)
  • TlsGetValue (Address: 0x180027750)
  • TlsSetValue (Address: 0x180027758)
  • UnhandledExceptionFilter (Address: 0x180027760)
  • VirtualAlloc (Address: 0x180027768)
  • VirtualFree (Address: 0x180027770)
  • VirtualProtect (Address: 0x180027778)
  • VirtualQuery (Address: 0x180027780)
  • WideCharToMultiByte (Address: 0x180027788)
  • WriteConsoleW (Address: 0x180027790)
  • WriteFile (Address: 0x180027798)
  • WriteProcessMemory (Address: 0x1800277a0)
USER32.dll
  • CallNextHookEx (Address: 0x1800277b0)
  • FindWindowExA (Address: 0x1800277b8)
  • GetWindowThreadProcessId (Address: 0x1800277c0)
  • PostThreadMessageA (Address: 0x1800277c8)
  • SetWindowsHookExA (Address: 0x1800277d0)
  • UnhookWindowsHookEx (Address: 0x1800277d8)