discord_overlay.dll

Description:

Authors:

Version:

Architecture: 64-bit

Operating System:

SHA256: 1fce92de21716d1ee4bcace48a4c0819

File Size: 28.0 KB

Uploaded At: Feb. 8, 2026, 4:14 p.m.

Views: 13

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess, WriteProcessMemory

Exported Functions

No exported functions.

Imported DLLs & Functions

ADVAPI32.dll
  • ConvertSidToStringSidW (Address: 0x180005008)
  • GetTokenInformation (Address: 0x180005010)
  • OpenProcessToken (Address: 0x180005000)
api-ms-win-crt-heap-l1-1-0.dll
  • _callnewh (Address: 0x180005198)
  • _msize (Address: 0x180005190)
  • free (Address: 0x180005180)
  • malloc (Address: 0x180005188)
api-ms-win-crt-math-l1-1-0.dll
  • ceilf (Address: 0x1800051a8)
api-ms-win-crt-multibyte-l1-1-0.dll
  • _mbsicmp (Address: 0x1800051b8)
api-ms-win-crt-runtime-l1-1-0.dll
  • _cexit (Address: 0x180005208)
  • _configure_narrow_argv (Address: 0x180005210)
  • _crt_atexit (Address: 0x1800051e0)
  • _execute_onexit_table (Address: 0x1800051d8)
  • _initialize_narrow_environment (Address: 0x1800051e8)
  • _initialize_onexit_table (Address: 0x1800051c8)
  • _initterm (Address: 0x1800051f0)
  • _initterm_e (Address: 0x1800051f8)
  • _invoke_watson (Address: 0x180005200)
  • _register_onexit_function (Address: 0x180005218)
  • _seh_filter_dll (Address: 0x1800051d0)
KERNEL32.dll
  • Beep (Address: 0x180005078)
  • CloseHandle (Address: 0x1800050d8)
  • CreateThread (Address: 0x1800050d0)
  • CreateToolhelp32Snapshot (Address: 0x1800050c8)
  • DeleteCriticalSection (Address: 0x1800050e0)
  • GetCurrentProcess (Address: 0x180005090)
  • GetCurrentProcessId (Address: 0x180005050)
  • GetCurrentThreadId (Address: 0x180005058)
  • GetLastError (Address: 0x1800050f0)
  • GetSystemInfo (Address: 0x180005080)
  • GetSystemTimeAsFileTime (Address: 0x180005060)
  • InitializeCriticalSectionEx (Address: 0x1800050e8)
  • InitializeSListHead (Address: 0x180005100)
  • IsDebuggerPresent (Address: 0x180005070)
  • IsProcessorFeaturePresent (Address: 0x180005048)
  • LocalFree (Address: 0x1800050f8)
  • OpenProcess (Address: 0x1800050b0)
  • OutputDebugStringW (Address: 0x180005068)
  • Process32First (Address: 0x1800050c0)
  • Process32Next (Address: 0x1800050b8)
  • QueryPerformanceCounter (Address: 0x180005028)
  • ReadProcessMemory (Address: 0x1800050a0)
  • RtlCaptureContext (Address: 0x180005108)
  • RtlLookupFunctionEntry (Address: 0x180005040)
  • RtlVirtualUnwind (Address: 0x180005020)
  • SetUnhandledExceptionFilter (Address: 0x180005030)
  • Sleep (Address: 0x180005088)
  • UnhandledExceptionFilter (Address: 0x180005038)
  • VirtualQueryEx (Address: 0x1800050a8)
  • WriteProcessMemory (Address: 0x180005098)
MSVCP140.dll
  • ?_Xlength_error@std@@YAXPEBD@Z (Address: 0x180005118)
USER32.dll
  • GetAsyncKeyState (Address: 0x180005128)
VCRUNTIME140.dll
  • __C_specific_handler (Address: 0x180005170)
  • __std_exception_copy (Address: 0x180005158)
  • __std_exception_destroy (Address: 0x180005160)
  • __std_type_info_destroy_list (Address: 0x180005138)
  • _CxxThrowException (Address: 0x180005148)
  • memcpy (Address: 0x180005150)
  • memmove (Address: 0x180005140)
  • memset (Address: 0x180005168)