dinput.dll

Description: Microsoft DirectInput

Authors: © Microsoft Corporation. All rights reserved.

Version: 10.0.19041.1

Architecture: 32-bit

Operating System: Windows NT

SHA256: 46797c469015a219cc0f17227c5610c1

File Size: 132.5 KB

Uploaded At: Dec. 1, 2025, 7:55 a.m.

Views: 8

Exported Functions

  • DirectInputCreateA (Ordinal: 1, Address: 0xbd30)
  • DirectInputCreateEx (Ordinal: 2, Address: 0xbdb0)
  • DirectInputCreateW (Ordinal: 3, Address: 0xbd70)
  • DllCanUnloadNow (Ordinal: 4, Address: 0xba70)
  • DllGetClassObject (Ordinal: 5, Address: 0xb9d0)
  • DllRegisterServer (Ordinal: 6, Address: 0x16ee0)
  • DllUnregisterServer (Ordinal: 7, Address: 0x16ef0)

Imported DLLs & Functions

ADVAPI32.dll
  • AllocateAndInitializeSid (Address: 0x5f5a0020)
  • FreeSid (Address: 0x5f5a000c)
  • GetSecurityInfo (Address: 0x5f5a0004)
  • InitializeSecurityDescriptor (Address: 0x5f5a0018)
  • RegCloseKey (Address: 0x5f5a004c)
  • RegCreateKeyExW (Address: 0x5f5a0010)
  • RegCreateKeyW (Address: 0x5f5a002c)
  • RegDeleteKeyW (Address: 0x5f5a0024)
  • RegDeleteValueW (Address: 0x5f5a0038)
  • RegEnumKeyExW (Address: 0x5f5a0008)
  • RegEnumKeyW (Address: 0x5f5a0044)
  • RegEnumValueW (Address: 0x5f5a0030)
  • RegOpenKeyExW (Address: 0x5f5a0040)
  • RegOpenKeyW (Address: 0x5f5a0028)
  • RegQueryInfoKeyW (Address: 0x5f5a003c)
  • RegQueryValueExW (Address: 0x5f5a0034)
  • RegQueryValueW (Address: 0x5f5a0000)
  • RegSetValueExW (Address: 0x5f5a0048)
  • SetEntriesInAclW (Address: 0x5f5a001c)
  • SetSecurityDescriptorDacl (Address: 0x5f5a0014)
api-ms-win-downlevel-kernel32-l1-1-0.dll
  • GetModuleHandleExW (Address: 0x5f5a02a0)
  • InitOnceExecuteOnce (Address: 0x5f5a029c)
  • QueueUserWorkItem (Address: 0x5f5a0294)
  • SetLastError (Address: 0x5f5a0298)
KERNEL32.dll
  • AcquireSRWLockExclusive (Address: 0x5f5a0170)
  • CloseHandle (Address: 0x5f5a0054)
  • CreateEventW (Address: 0x5f5a008c)
  • CreateFileMappingW (Address: 0x5f5a0118)
  • CreateFileW (Address: 0x5f5a0154)
  • CreateMutexW (Address: 0x5f5a0114)
  • CreateProcessW (Address: 0x5f5a0128)
  • CreateThread (Address: 0x5f5a0090)
  • DeleteCriticalSection (Address: 0x5f5a0070)
  • DeviceIoControl (Address: 0x5f5a0108)
  • DisableThreadLibraryCalls (Address: 0x5f5a00d0)
  • DuplicateHandle (Address: 0x5f5a00b0)
  • EnterCriticalSection (Address: 0x5f5a0060)
  • FindResourceW (Address: 0x5f5a0120)
  • FreeLibrary (Address: 0x5f5a00a0)
  • FreeLibraryAndExitThread (Address: 0x5f5a0084)
  • GetCurrentProcess (Address: 0x5f5a00ac)
  • GetCurrentProcessId (Address: 0x5f5a0078)
  • GetCurrentThreadId (Address: 0x5f5a0064)
  • GetFileSize (Address: 0x5f5a0180)
  • GetFullPathNameW (Address: 0x5f5a0158)
  • GetLastError (Address: 0x5f5a009c)
  • GetLocalTime (Address: 0x5f5a010c)
  • GetModuleFileNameW (Address: 0x5f5a0160)
  • GetModuleHandleW (Address: 0x5f5a015c)
  • GetPrivateProfileStringW (Address: 0x5f5a00f0)
  • GetProcAddress (Address: 0x5f5a00d4)
  • GetProcessHeap (Address: 0x5f5a0100)
  • GetSystemInfo (Address: 0x5f5a0148)
  • GetSystemTimeAsFileTime (Address: 0x5f5a0058)
  • GetTickCount (Address: 0x5f5a0168)
  • GetVersion (Address: 0x5f5a00bc)
  • GetVersionExW (Address: 0x5f5a0130)
  • GetWindowsDirectoryW (Address: 0x5f5a00ec)
  • HeapAlloc (Address: 0x5f5a00fc)
  • HeapFree (Address: 0x5f5a0104)
  • InitializeCriticalSection (Address: 0x5f5a012c)
  • LeaveCriticalSection (Address: 0x5f5a0068)
  • LoadLibraryExA (Address: 0x5f5a0178)
  • LoadLibraryW (Address: 0x5f5a0088)
  • LoadResource (Address: 0x5f5a0124)
  • LocalAlloc (Address: 0x5f5a00c4)
  • LocalFree (Address: 0x5f5a0164)
  • LocalReAlloc (Address: 0x5f5a00c0)
  • lstrcmpiA (Address: 0x5f5a00f4)
  • lstrcmpiW (Address: 0x5f5a00a4)
  • lstrcmpW (Address: 0x5f5a00e8)
  • lstrlenA (Address: 0x5f5a0134)
  • lstrlenW (Address: 0x5f5a005c)
  • MapViewOfFile (Address: 0x5f5a011c)
  • MulDiv (Address: 0x5f5a00b4)
  • MultiByteToWideChar (Address: 0x5f5a00e4)
  • OpenEventW (Address: 0x5f5a00d8)
  • QueryPerformanceCounter (Address: 0x5f5a0144)
  • RaiseException (Address: 0x5f5a016c)
  • ReadFile (Address: 0x5f5a0150)
  • ReadFileEx (Address: 0x5f5a00a8)
  • ReleaseMutex (Address: 0x5f5a00b8)
  • ReleaseSRWLockExclusive (Address: 0x5f5a0174)
  • ResetEvent (Address: 0x5f5a0074)
  • ResumeThread (Address: 0x5f5a00cc)
  • SetEvent (Address: 0x5f5a006c)
  • SetFilePointer (Address: 0x5f5a014c)
  • SetThreadPriority (Address: 0x5f5a0094)
  • SetUnhandledExceptionFilter (Address: 0x5f5a013c)
  • Sleep (Address: 0x5f5a00e0)
  • SleepEx (Address: 0x5f5a00c8)
  • SystemTimeToFileTime (Address: 0x5f5a0110)
  • TerminateProcess (Address: 0x5f5a0140)
  • UnhandledExceptionFilter (Address: 0x5f5a0138)
  • UnmapViewOfFile (Address: 0x5f5a00dc)
  • VirtualProtect (Address: 0x5f5a017c)
  • VirtualQuery (Address: 0x5f5a0184)
  • WaitForMultipleObjects (Address: 0x5f5a0098)
  • WaitForSingleObject (Address: 0x5f5a0080)
  • WideCharToMultiByte (Address: 0x5f5a007c)
  • WriteFileEx (Address: 0x5f5a00f8)
msvcrt.dll
  • _amsg_exit (Address: 0x5f5a02ac)
  • _CIatan2 (Address: 0x5f5a02c8)
  • _CIcos (Address: 0x5f5a02cc)
  • _CIsin (Address: 0x5f5a02d0)
  • _CIsqrt (Address: 0x5f5a02d4)
  • _except_handler4_common (Address: 0x5f5a02b0)
  • _ftol2_sse (Address: 0x5f5a02d8)
  • _initterm (Address: 0x5f5a02c0)
  • _vsnwprintf (Address: 0x5f5a02a8)
  • _XcptFilter (Address: 0x5f5a02c4)
  • free (Address: 0x5f5a02b4)
  • malloc (Address: 0x5f5a02b8)
  • memcmp (Address: 0x5f5a02dc)
  • memcpy (Address: 0x5f5a02bc)
  • memset (Address: 0x5f5a02e0)
USER32.dll
  • (Address: 0x5f5a0264)
  • CallNextHookEx (Address: 0x5f5a01b4)
  • CallWindowProcW (Address: 0x5f5a0190)
  • CharUpperW (Address: 0x5f5a01ac)
  • ClipCursor (Address: 0x5f5a0200)
  • CreateWindowExW (Address: 0x5f5a01e4)
  • DefWindowProcW (Address: 0x5f5a01d4)
  • DestroyWindow (Address: 0x5f5a01fc)
  • DispatchMessageW (Address: 0x5f5a01f8)
  • FindWindowW (Address: 0x5f5a0258)
  • GetAsyncKeyState (Address: 0x5f5a0224)
  • GetClientRect (Address: 0x5f5a0208)
  • GetCursorPos (Address: 0x5f5a0240)
  • GetDesktopWindow (Address: 0x5f5a0214)
  • GetForegroundWindow (Address: 0x5f5a01b8)
  • GetInputState (Address: 0x5f5a01e8)
  • GetKeyboardType (Address: 0x5f5a01a8)
  • GetMessageTime (Address: 0x5f5a0234)
  • GetPropW (Address: 0x5f5a019c)
  • GetRawInputDeviceInfoW (Address: 0x5f5a01a4)
  • GetRawInputDeviceList (Address: 0x5f5a01a0)
  • GetSystemMetrics (Address: 0x5f5a023c)
  • GetWindowLongW (Address: 0x5f5a01c8)
  • GetWindowRect (Address: 0x5f5a0210)
  • GetWindowThreadProcessId (Address: 0x5f5a01c0)
  • IntersectRect (Address: 0x5f5a0218)
  • IsIconic (Address: 0x5f5a01bc)
  • IsRectEmpty (Address: 0x5f5a0254)
  • IsWindow (Address: 0x5f5a018c)
  • keybd_event (Address: 0x5f5a024c)
  • LoadCursorW (Address: 0x5f5a01d8)
  • LoadIconW (Address: 0x5f5a01dc)
  • LoadStringW (Address: 0x5f5a0248)
  • MapVirtualKeyW (Address: 0x5f5a0244)
  • MapWindowPoints (Address: 0x5f5a020c)
  • mouse_event (Address: 0x5f5a0228)
  • MsgWaitForMultipleObjects (Address: 0x5f5a01d0)
  • PeekMessageW (Address: 0x5f5a01f0)
  • PostMessageW (Address: 0x5f5a0268)
  • PostThreadMessageW (Address: 0x5f5a01cc)
  • RegisterClassW (Address: 0x5f5a01e0)
  • RegisterWindowMessageW (Address: 0x5f5a0260)
  • ReleaseCapture (Address: 0x5f5a026c)
  • RemovePropW (Address: 0x5f5a0198)
  • SendMessageW (Address: 0x5f5a025c)
  • SendNotifyMessageW (Address: 0x5f5a0238)
  • SetCapture (Address: 0x5f5a021c)
  • SetCursorPos (Address: 0x5f5a022c)
  • SetPropW (Address: 0x5f5a0194)
  • SetTimer (Address: 0x5f5a01ec)
  • SetWindowLongW (Address: 0x5f5a0230)
  • SetWindowsHookExW (Address: 0x5f5a01c4)
  • ShowCursor (Address: 0x5f5a0220)
  • SubtractRect (Address: 0x5f5a0250)
  • SystemParametersInfoW (Address: 0x5f5a0204)
  • TranslateMessage (Address: 0x5f5a01f4)
  • UnhookWindowsHookEx (Address: 0x5f5a01b0)
WINMM.dll
  • mmioAscend (Address: 0x5f5a0288)
  • mmioClose (Address: 0x5f5a0280)
  • mmioCreateChunk (Address: 0x5f5a027c)
  • mmioDescend (Address: 0x5f5a028c)
  • mmioOpenA (Address: 0x5f5a0284)
  • mmioRead (Address: 0x5f5a0278)
  • mmioWrite (Address: 0x5f5a0274)