discord-rpc.dll
Description:
Authors:
Version:
Architecture: 32-bit
Operating System:
SHA256: 3ade46bd17d6cd114b0e7f79f8a1e985
File Size: 300.5 KB
Uploaded At: March 22, 2026, 6:39 a.m.
Views: 15
Exported Functions
- Discord_ClearPresence (Ordinal: 1, Address: 0x2d30)
- Discord_Initialize (Ordinal: 2, Address: 0x2d40)
- Discord_Register (Ordinal: 3, Address: 0x7510)
- Discord_RegisterSteamGame (Ordinal: 4, Address: 0x7590)
- Discord_Respond (Ordinal: 5, Address: 0x2e60)
- Discord_RunCallbacks (Ordinal: 6, Address: 0x2f20)
- Discord_Shutdown (Ordinal: 7, Address: 0x32a0)
- Discord_UpdateHandlers (Ordinal: 8, Address: 0x3350)
- Discord_UpdatePresence (Ordinal: 9, Address: 0x34a0)
Imported DLLs & Functions
ADVAPI32.dll
- RegCloseKey (Address: 0x10035010)
- RegCreateKeyExW (Address: 0x10035000)
- RegOpenKeyExW (Address: 0x10035004)
- RegQueryValueExW (Address: 0x10035008)
- RegSetValueExW (Address: 0x1003500c)
KERNEL32.dll
- ChangeTimerQueueTimer (Address: 0x100350e4)
- CloseHandle (Address: 0x10035024)
- CreateEventW (Address: 0x1003507c)
- CreateFileW (Address: 0x10035018)
- CreateThread (Address: 0x100350d0)
- CreateTimerQueue (Address: 0x100350c4)
- CreateTimerQueueTimer (Address: 0x100350e0)
- DecodePointer (Address: 0x10035168)
- DeleteCriticalSection (Address: 0x10035070)
- DeleteTimerQueueTimer (Address: 0x100350e8)
- DuplicateHandle (Address: 0x10035044)
- EncodePointer (Address: 0x10035100)
- EnterCriticalSection (Address: 0x10035064)
- ExitProcess (Address: 0x1003515c)
- ExitThread (Address: 0x1003514c)
- FindClose (Address: 0x1003517c)
- FindFirstFileExA (Address: 0x10035180)
- FindNextFileA (Address: 0x10035184)
- FlushFileBuffers (Address: 0x100351a4)
- FreeEnvironmentStringsW (Address: 0x100351a0)
- FreeLibrary (Address: 0x10035108)
- FreeLibraryAndExitThread (Address: 0x1003510c)
- GetACP (Address: 0x10035174)
- GetCommandLineA (Address: 0x10035194)
- GetCommandLineW (Address: 0x10035198)
- GetConsoleCP (Address: 0x100351a8)
- GetConsoleMode (Address: 0x100351ac)
- GetCPInfo (Address: 0x10035190)
- GetCurrentProcess (Address: 0x10035050)
- GetCurrentProcessId (Address: 0x10035034)
- GetCurrentThread (Address: 0x10035054)
- GetCurrentThreadId (Address: 0x10035058)
- GetEnvironmentStringsW (Address: 0x1003519c)
- GetExitCodeThread (Address: 0x1003505c)
- GetFileType (Address: 0x10035170)
- GetLastError (Address: 0x10035028)
- GetLogicalProcessorInformation (Address: 0x100350dc)
- GetModuleFileNameA (Address: 0x10035160)
- GetModuleFileNameW (Address: 0x10035038)
- GetModuleHandleA (Address: 0x10035110)
- GetModuleHandleExW (Address: 0x10035150)
- GetModuleHandleW (Address: 0x10035098)
- GetNumaHighestNodeNumber (Address: 0x100350ec)
- GetOEMCP (Address: 0x1003518c)
- GetProcAddress (Address: 0x1003509c)
- GetProcessAffinityMask (Address: 0x100350f0)
- GetProcessHeap (Address: 0x10035178)
- GetStartupInfoW (Address: 0x100350b8)
- GetStdHandle (Address: 0x1003516c)
- GetStringTypeW (Address: 0x100351b4)
- GetSystemTimeAsFileTime (Address: 0x10035090)
- GetThreadPriority (Address: 0x100350d8)
- GetThreadTimes (Address: 0x10035104)
- GetTickCount (Address: 0x10035094)
- GetVersionExW (Address: 0x10035118)
- HeapAlloc (Address: 0x10035154)
- HeapFree (Address: 0x10035158)
- HeapReAlloc (Address: 0x100351c0)
- HeapSize (Address: 0x100351bc)
- InitializeCriticalSectionAndSpinCount (Address: 0x10035078)
- InitializeSListHead (Address: 0x100350c0)
- InterlockedFlushSList (Address: 0x10035134)
- InterlockedPopEntrySList (Address: 0x1003512c)
- InterlockedPushEntrySList (Address: 0x10035130)
- IsDebuggerPresent (Address: 0x100350ac)
- IsProcessorFeaturePresent (Address: 0x100350a8)
- IsValidCodePage (Address: 0x10035188)
- LCMapStringW (Address: 0x10035164)
- LeaveCriticalSection (Address: 0x10035068)
- LoadLibraryExW (Address: 0x10035114)
- LoadLibraryW (Address: 0x10035140)
- lstrlenW (Address: 0x1003503c)
- MultiByteToWideChar (Address: 0x10035040)
- PeekNamedPipe (Address: 0x1003502c)
- QueryDepthSList (Address: 0x10035138)
- QueryPerformanceCounter (Address: 0x10035060)
- RaiseException (Address: 0x10035148)
- ReadFile (Address: 0x1003501c)
- RegisterWaitForSingleObject (Address: 0x100350f8)
- ReleaseSemaphore (Address: 0x10035128)
- RtlUnwind (Address: 0x10035144)
- SetEvent (Address: 0x100350a4)
- SetFilePointerEx (Address: 0x100351b8)
- SetLastError (Address: 0x10035074)
- SetStdHandle (Address: 0x100351b0)
- SetThreadAffinityMask (Address: 0x100350f4)
- SetThreadPriority (Address: 0x100350d4)
- SetUnhandledExceptionFilter (Address: 0x100350b4)
- SignalObjectAndWait (Address: 0x100350c8)
- Sleep (Address: 0x1003504c)
- SwitchToThread (Address: 0x100350cc)
- TerminateProcess (Address: 0x100350bc)
- TlsAlloc (Address: 0x10035080)
- TlsFree (Address: 0x1003508c)
- TlsGetValue (Address: 0x10035084)
- TlsSetValue (Address: 0x10035088)
- TryEnterCriticalSection (Address: 0x1003506c)
- UnhandledExceptionFilter (Address: 0x100350b0)
- UnregisterWait (Address: 0x100350fc)
- UnregisterWaitEx (Address: 0x1003513c)
- VirtualAlloc (Address: 0x1003511c)
- VirtualFree (Address: 0x10035120)
- VirtualProtect (Address: 0x10035124)
- WaitForSingleObjectEx (Address: 0x10035048)
- WaitNamedPipeW (Address: 0x10035030)
- WideCharToMultiByte (Address: 0x100350a0)
- WriteConsoleW (Address: 0x100351c4)
- WriteFile (Address: 0x10035020)