discord-rpc.dll

Description:

Authors:

Version:

Architecture: 32-bit

Operating System:

SHA256: 3ade46bd17d6cd114b0e7f79f8a1e985

File Size: 300.5 KB

Uploaded At: March 22, 2026, 6:39 a.m.

Views: 15

Exported Functions

  • Discord_ClearPresence (Ordinal: 1, Address: 0x2d30)
  • Discord_Initialize (Ordinal: 2, Address: 0x2d40)
  • Discord_Register (Ordinal: 3, Address: 0x7510)
  • Discord_RegisterSteamGame (Ordinal: 4, Address: 0x7590)
  • Discord_Respond (Ordinal: 5, Address: 0x2e60)
  • Discord_RunCallbacks (Ordinal: 6, Address: 0x2f20)
  • Discord_Shutdown (Ordinal: 7, Address: 0x32a0)
  • Discord_UpdateHandlers (Ordinal: 8, Address: 0x3350)
  • Discord_UpdatePresence (Ordinal: 9, Address: 0x34a0)

Imported DLLs & Functions

ADVAPI32.dll
  • RegCloseKey (Address: 0x10035010)
  • RegCreateKeyExW (Address: 0x10035000)
  • RegOpenKeyExW (Address: 0x10035004)
  • RegQueryValueExW (Address: 0x10035008)
  • RegSetValueExW (Address: 0x1003500c)
KERNEL32.dll
  • ChangeTimerQueueTimer (Address: 0x100350e4)
  • CloseHandle (Address: 0x10035024)
  • CreateEventW (Address: 0x1003507c)
  • CreateFileW (Address: 0x10035018)
  • CreateThread (Address: 0x100350d0)
  • CreateTimerQueue (Address: 0x100350c4)
  • CreateTimerQueueTimer (Address: 0x100350e0)
  • DecodePointer (Address: 0x10035168)
  • DeleteCriticalSection (Address: 0x10035070)
  • DeleteTimerQueueTimer (Address: 0x100350e8)
  • DuplicateHandle (Address: 0x10035044)
  • EncodePointer (Address: 0x10035100)
  • EnterCriticalSection (Address: 0x10035064)
  • ExitProcess (Address: 0x1003515c)
  • ExitThread (Address: 0x1003514c)
  • FindClose (Address: 0x1003517c)
  • FindFirstFileExA (Address: 0x10035180)
  • FindNextFileA (Address: 0x10035184)
  • FlushFileBuffers (Address: 0x100351a4)
  • FreeEnvironmentStringsW (Address: 0x100351a0)
  • FreeLibrary (Address: 0x10035108)
  • FreeLibraryAndExitThread (Address: 0x1003510c)
  • GetACP (Address: 0x10035174)
  • GetCommandLineA (Address: 0x10035194)
  • GetCommandLineW (Address: 0x10035198)
  • GetConsoleCP (Address: 0x100351a8)
  • GetConsoleMode (Address: 0x100351ac)
  • GetCPInfo (Address: 0x10035190)
  • GetCurrentProcess (Address: 0x10035050)
  • GetCurrentProcessId (Address: 0x10035034)
  • GetCurrentThread (Address: 0x10035054)
  • GetCurrentThreadId (Address: 0x10035058)
  • GetEnvironmentStringsW (Address: 0x1003519c)
  • GetExitCodeThread (Address: 0x1003505c)
  • GetFileType (Address: 0x10035170)
  • GetLastError (Address: 0x10035028)
  • GetLogicalProcessorInformation (Address: 0x100350dc)
  • GetModuleFileNameA (Address: 0x10035160)
  • GetModuleFileNameW (Address: 0x10035038)
  • GetModuleHandleA (Address: 0x10035110)
  • GetModuleHandleExW (Address: 0x10035150)
  • GetModuleHandleW (Address: 0x10035098)
  • GetNumaHighestNodeNumber (Address: 0x100350ec)
  • GetOEMCP (Address: 0x1003518c)
  • GetProcAddress (Address: 0x1003509c)
  • GetProcessAffinityMask (Address: 0x100350f0)
  • GetProcessHeap (Address: 0x10035178)
  • GetStartupInfoW (Address: 0x100350b8)
  • GetStdHandle (Address: 0x1003516c)
  • GetStringTypeW (Address: 0x100351b4)
  • GetSystemTimeAsFileTime (Address: 0x10035090)
  • GetThreadPriority (Address: 0x100350d8)
  • GetThreadTimes (Address: 0x10035104)
  • GetTickCount (Address: 0x10035094)
  • GetVersionExW (Address: 0x10035118)
  • HeapAlloc (Address: 0x10035154)
  • HeapFree (Address: 0x10035158)
  • HeapReAlloc (Address: 0x100351c0)
  • HeapSize (Address: 0x100351bc)
  • InitializeCriticalSectionAndSpinCount (Address: 0x10035078)
  • InitializeSListHead (Address: 0x100350c0)
  • InterlockedFlushSList (Address: 0x10035134)
  • InterlockedPopEntrySList (Address: 0x1003512c)
  • InterlockedPushEntrySList (Address: 0x10035130)
  • IsDebuggerPresent (Address: 0x100350ac)
  • IsProcessorFeaturePresent (Address: 0x100350a8)
  • IsValidCodePage (Address: 0x10035188)
  • LCMapStringW (Address: 0x10035164)
  • LeaveCriticalSection (Address: 0x10035068)
  • LoadLibraryExW (Address: 0x10035114)
  • LoadLibraryW (Address: 0x10035140)
  • lstrlenW (Address: 0x1003503c)
  • MultiByteToWideChar (Address: 0x10035040)
  • PeekNamedPipe (Address: 0x1003502c)
  • QueryDepthSList (Address: 0x10035138)
  • QueryPerformanceCounter (Address: 0x10035060)
  • RaiseException (Address: 0x10035148)
  • ReadFile (Address: 0x1003501c)
  • RegisterWaitForSingleObject (Address: 0x100350f8)
  • ReleaseSemaphore (Address: 0x10035128)
  • RtlUnwind (Address: 0x10035144)
  • SetEvent (Address: 0x100350a4)
  • SetFilePointerEx (Address: 0x100351b8)
  • SetLastError (Address: 0x10035074)
  • SetStdHandle (Address: 0x100351b0)
  • SetThreadAffinityMask (Address: 0x100350f4)
  • SetThreadPriority (Address: 0x100350d4)
  • SetUnhandledExceptionFilter (Address: 0x100350b4)
  • SignalObjectAndWait (Address: 0x100350c8)
  • Sleep (Address: 0x1003504c)
  • SwitchToThread (Address: 0x100350cc)
  • TerminateProcess (Address: 0x100350bc)
  • TlsAlloc (Address: 0x10035080)
  • TlsFree (Address: 0x1003508c)
  • TlsGetValue (Address: 0x10035084)
  • TlsSetValue (Address: 0x10035088)
  • TryEnterCriticalSection (Address: 0x1003506c)
  • UnhandledExceptionFilter (Address: 0x100350b0)
  • UnregisterWait (Address: 0x100350fc)
  • UnregisterWaitEx (Address: 0x1003513c)
  • VirtualAlloc (Address: 0x1003511c)
  • VirtualFree (Address: 0x10035120)
  • VirtualProtect (Address: 0x10035124)
  • WaitForSingleObjectEx (Address: 0x10035048)
  • WaitNamedPipeW (Address: 0x10035030)
  • WideCharToMultiByte (Address: 0x100350a0)
  • WriteConsoleW (Address: 0x100351c4)
  • WriteFile (Address: 0x10035020)