discord-rpc.dll

Description:

Authors:

Version:

Architecture: 64-bit

Operating System:

SHA256: ad683f7ae2c912ef502fd802f256094f

File Size: 383.0 KB

Uploaded At: April 5, 2026, 9:29 p.m.

Views: 5

Exported Functions

  • Discord_ClearPresence (Ordinal: 1, Address: 0x2da0)
  • Discord_Initialize (Ordinal: 2, Address: 0x2db0)
  • Discord_Register (Ordinal: 3, Address: 0x9140)
  • Discord_RegisterSteamGame (Ordinal: 4, Address: 0x91e0)
  • Discord_Respond (Ordinal: 5, Address: 0x2fb0)
  • Discord_RunCallbacks (Ordinal: 6, Address: 0x3070)
  • Discord_Shutdown (Ordinal: 7, Address: 0x3390)
  • Discord_UpdateHandlers (Ordinal: 8, Address: 0x3490)
  • Discord_UpdatePresence (Ordinal: 9, Address: 0x3610)

Imported DLLs & Functions

ADVAPI32.dll
  • RegCloseKey (Address: 0x180040020)
  • RegCreateKeyExW (Address: 0x180040000)
  • RegOpenKeyExW (Address: 0x180040008)
  • RegQueryValueExW (Address: 0x180040010)
  • RegSetValueExW (Address: 0x180040018)
KERNEL32.dll
  • ChangeTimerQueueTimer (Address: 0x1800401e0)
  • CloseHandle (Address: 0x180040048)
  • CreateEventW (Address: 0x1800400f8)
  • CreateFileW (Address: 0x180040030)
  • CreateThread (Address: 0x1800401b8)
  • CreateTimerQueue (Address: 0x1800401a0)
  • CreateTimerQueueTimer (Address: 0x1800401d8)
  • DecodePointer (Address: 0x1800403a8)
  • DeleteCriticalSection (Address: 0x1800400e0)
  • DeleteTimerQueueTimer (Address: 0x1800401e8)
  • DuplicateHandle (Address: 0x180040088)
  • EncodePointer (Address: 0x180040218)
  • EnterCriticalSection (Address: 0x1800400c8)
  • ExitProcess (Address: 0x1800402d8)
  • ExitThread (Address: 0x1800402b8)
  • FindClose (Address: 0x180040310)
  • FindFirstFileExA (Address: 0x180040318)
  • FindNextFileA (Address: 0x180040320)
  • FlushFileBuffers (Address: 0x180040360)
  • FreeEnvironmentStringsW (Address: 0x180040358)
  • FreeLibrary (Address: 0x180040228)
  • FreeLibraryAndExitThread (Address: 0x180040230)
  • GetACP (Address: 0x180040300)
  • GetCommandLineA (Address: 0x180040340)
  • GetCommandLineW (Address: 0x180040348)
  • GetConsoleCP (Address: 0x180040368)
  • GetConsoleMode (Address: 0x180040370)
  • GetCPInfo (Address: 0x180040338)
  • GetCurrentProcess (Address: 0x1800400a0)
  • GetCurrentProcessId (Address: 0x180040068)
  • GetCurrentThread (Address: 0x1800400a8)
  • GetCurrentThreadId (Address: 0x1800400b0)
  • GetEnvironmentStringsW (Address: 0x180040350)
  • GetExitCodeThread (Address: 0x1800400b8)
  • GetFileType (Address: 0x1800402f8)
  • GetLastError (Address: 0x180040050)
  • GetLogicalProcessorInformation (Address: 0x1800401d0)
  • GetModuleFileNameA (Address: 0x1800402e0)
  • GetModuleFileNameW (Address: 0x180040070)
  • GetModuleHandleA (Address: 0x180040238)
  • GetModuleHandleExW (Address: 0x1800402c0)
  • GetModuleHandleW (Address: 0x180040130)
  • GetNumaHighestNodeNumber (Address: 0x1800401f0)
  • GetOEMCP (Address: 0x180040330)
  • GetProcAddress (Address: 0x180040138)
  • GetProcessAffinityMask (Address: 0x1800401f8)
  • GetProcessHeap (Address: 0x180040308)
  • GetStartupInfoW (Address: 0x180040180)
  • GetStdHandle (Address: 0x1800402f0)
  • GetStringTypeW (Address: 0x180040378)
  • GetSystemTimeAsFileTime (Address: 0x180040120)
  • GetThreadPriority (Address: 0x1800401c8)
  • GetThreadTimes (Address: 0x180040220)
  • GetTickCount (Address: 0x180040128)
  • GetVersionExW (Address: 0x180040248)
  • HeapAlloc (Address: 0x1800402c8)
  • HeapFree (Address: 0x1800402d0)
  • HeapReAlloc (Address: 0x180040398)
  • HeapSize (Address: 0x180040390)
  • InitializeCriticalSectionAndSpinCount (Address: 0x1800400f0)
  • InitializeSListHead (Address: 0x180040198)
  • InterlockedFlushSList (Address: 0x180040280)
  • InterlockedPopEntrySList (Address: 0x180040270)
  • InterlockedPushEntrySList (Address: 0x180040278)
  • IsDebuggerPresent (Address: 0x180040168)
  • IsProcessorFeaturePresent (Address: 0x180040188)
  • IsValidCodePage (Address: 0x180040328)
  • LCMapStringW (Address: 0x1800402e8)
  • LeaveCriticalSection (Address: 0x1800400d0)
  • LoadLibraryExW (Address: 0x180040240)
  • LoadLibraryW (Address: 0x180040298)
  • lstrlenW (Address: 0x180040078)
  • MultiByteToWideChar (Address: 0x180040080)
  • PeekNamedPipe (Address: 0x180040058)
  • QueryDepthSList (Address: 0x180040288)
  • QueryPerformanceCounter (Address: 0x1800400c0)
  • RaiseException (Address: 0x1800402a8)
  • ReadFile (Address: 0x180040038)
  • RegisterWaitForSingleObject (Address: 0x180040208)
  • ReleaseSemaphore (Address: 0x180040268)
  • RtlCaptureContext (Address: 0x180040150)
  • RtlLookupFunctionEntry (Address: 0x180040158)
  • RtlPcToFileHeader (Address: 0x1800402a0)
  • RtlUnwindEx (Address: 0x1800402b0)
  • RtlVirtualUnwind (Address: 0x180040160)
  • SetEvent (Address: 0x180040148)
  • SetFilePointerEx (Address: 0x180040388)
  • SetLastError (Address: 0x1800400e8)
  • SetStdHandle (Address: 0x180040380)
  • SetThreadAffinityMask (Address: 0x180040200)
  • SetThreadPriority (Address: 0x1800401c0)
  • SetUnhandledExceptionFilter (Address: 0x180040178)
  • SignalObjectAndWait (Address: 0x1800401a8)
  • Sleep (Address: 0x180040098)
  • SwitchToThread (Address: 0x1800401b0)
  • TerminateProcess (Address: 0x180040190)
  • TlsAlloc (Address: 0x180040100)
  • TlsFree (Address: 0x180040118)
  • TlsGetValue (Address: 0x180040108)
  • TlsSetValue (Address: 0x180040110)
  • TryEnterCriticalSection (Address: 0x1800400d8)
  • UnhandledExceptionFilter (Address: 0x180040170)
  • UnregisterWait (Address: 0x180040210)
  • UnregisterWaitEx (Address: 0x180040290)
  • VirtualAlloc (Address: 0x180040250)
  • VirtualFree (Address: 0x180040258)
  • VirtualProtect (Address: 0x180040260)
  • WaitForSingleObjectEx (Address: 0x180040090)
  • WaitNamedPipeW (Address: 0x180040060)
  • WideCharToMultiByte (Address: 0x180040140)
  • WriteConsoleW (Address: 0x1800403a0)
  • WriteFile (Address: 0x180040040)