GameOverlayRenderer.dll
Description: Steam Game Overlay Renderer
Authors: Copyright (C) 2007
Version: 10.26.0.34
Architecture: 32-bit
Operating System: Windows
SHA256: d745f47364be2764b86bc91b00951ad7
File Size: 1.3 MB
Uploaded At: Dec. 4, 2025, 6:19 a.m.
Views: 15
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory, VirtualAllocEx, OpenProcess
Exported Functions
- BOverlayNeedsPresent (Ordinal: 1, Address: 0x93590)
- IsOverlayEnabled (Ordinal: 2, Address: 0x953d0)
- OverlayHookD3D3 (Ordinal: 3, Address: 0x6d170)
- SetNotificationInset (Ordinal: 4, Address: 0x953e0)
- SetNotificationPosition (Ordinal: 5, Address: 0x95400)
- SteamOverlayIsUsingGamepad (Ordinal: 6, Address: 0x95420)
- SteamOverlayIsUsingKeyboard (Ordinal: 7, Address: 0x95440)
- SteamOverlayIsUsingMouse (Ordinal: 8, Address: 0x95440)
- ValveHookScreenshots (Ordinal: 9, Address: 0xa3bb0)
- ValveIsScreenshotsHooked (Ordinal: 10, Address: 0xa3bc0)
- VirtualFreeWrapper (Ordinal: 11, Address: 0x95450)
- VulkanSteamOverlayPresent (Ordinal: 12, Address: 0xa7400)
- VulkanSteamOverlayProcessCapturedFrame (Ordinal: 13, Address: 0xa74b0)
Imported DLLs & Functions
ADVAPI32.dll
- AddAccessAllowedAce (Address: 0x100e2038)
- CopySid (Address: 0x100e2024)
- CreateWellKnownSid (Address: 0x100e2004)
- GetLengthSid (Address: 0x100e2008)
- GetTokenInformation (Address: 0x100e200c)
- InitializeAcl (Address: 0x100e2010)
- InitializeSecurityDescriptor (Address: 0x100e2014)
- IsValidSid (Address: 0x100e2000)
- OpenProcessToken (Address: 0x100e2034)
- RegCloseKey (Address: 0x100e2028)
- RegOpenKeyA (Address: 0x100e201c)
- RegOpenKeyExW (Address: 0x100e202c)
- RegQueryValueExA (Address: 0x100e2020)
- RegQueryValueExW (Address: 0x100e2030)
- SetSecurityDescriptorDacl (Address: 0x100e2018)
CFGMGR32.dll
- CM_Get_Device_IDA (Address: 0x100e2048)
- CM_Get_Parent (Address: 0x100e2044)
- CM_Locate_DevNodeA (Address: 0x100e2040)
GDI32.dll
- BitBlt (Address: 0x100e2064)
- CreateBitmap (Address: 0x100e205c)
- CreateCompatibleDC (Address: 0x100e2060)
- CreateDIBSection (Address: 0x100e206c)
- DeleteDC (Address: 0x100e2058)
- DeleteObject (Address: 0x100e2070)
- GetBitmapBits (Address: 0x100e2054)
- GetDeviceCaps (Address: 0x100e2068)
- GetObjectA (Address: 0x100e2074)
- SelectObject (Address: 0x100e2050)
IMM32.dll
- ImmAssociateContext (Address: 0x100e2098)
- ImmCreateContext (Address: 0x100e2080)
- ImmDestroyContext (Address: 0x100e2084)
- ImmGetCandidateListCountW (Address: 0x100e20a4)
- ImmGetCandidateListW (Address: 0x100e20a8)
- ImmGetCompositionStringW (Address: 0x100e209c)
- ImmGetContext (Address: 0x100e2090)
- ImmGetConversionStatus (Address: 0x100e20ac)
- ImmGetOpenStatus (Address: 0x100e20b8)
- ImmGetProperty (Address: 0x100e207c)
- ImmNotifyIME (Address: 0x100e2088)
- ImmReleaseContext (Address: 0x100e2094)
- ImmSetCandidateWindow (Address: 0x100e208c)
- ImmSetCompositionStringW (Address: 0x100e20a0)
- ImmSetConversionStatus (Address: 0x100e20b0)
- ImmSetOpenStatus (Address: 0x100e20b4)
KERNEL32.dll
- AcquireSRWLockExclusive (Address: 0x100e2254)
- CloseHandle (Address: 0x100e2328)
- CompareStringW (Address: 0x100e21f0)
- ConnectNamedPipe (Address: 0x100e2170)
- CreateEventA (Address: 0x100e22c4)
- CreateFileA (Address: 0x100e2278)
- CreateFileMappingA (Address: 0x100e2104)
- CreateFileW (Address: 0x100e2198)
- CreateMutexA (Address: 0x100e2324)
- CreateNamedPipeA (Address: 0x100e217c)
- CreateProcessA (Address: 0x100e2138)
- CreateProcessW (Address: 0x100e213c)
- CreateSemaphoreA (Address: 0x100e2190)
- CreateThread (Address: 0x100e218c)
- CreateToolhelp32Snapshot (Address: 0x100e2108)
- DecodePointer (Address: 0x100e2268)
- DeleteCriticalSection (Address: 0x100e22a8)
- DisableThreadLibraryCalls (Address: 0x100e2150)
- DisconnectNamedPipe (Address: 0x100e2174)
- DuplicateHandle (Address: 0x100e2180)
- EncodePointer (Address: 0x100e226c)
- EnterCriticalSection (Address: 0x100e22b0)
- EnumSystemLocalesW (Address: 0x100e21e0)
- ExitProcess (Address: 0x100e2228)
- ExpandEnvironmentStringsW (Address: 0x100e22f4)
- FindClose (Address: 0x100e21d8)
- FindFirstFileExW (Address: 0x100e21d4)
- FindNextFileW (Address: 0x100e21d0)
- FlushFileBuffers (Address: 0x100e2200)
- FlushInstructionCache (Address: 0x100e229c)
- FormatMessageA (Address: 0x100e20e4)
- FreeEnvironmentStringsW (Address: 0x100e21b8)
- FreeLibrary (Address: 0x100e22d0)
- GetACP (Address: 0x100e21c8)
- GetCommandLineA (Address: 0x100e2114)
- GetCommandLineW (Address: 0x100e21c0)
- GetConsoleMode (Address: 0x100e2210)
- GetConsoleOutputCP (Address: 0x100e21fc)
- GetCPInfo (Address: 0x100e225c)
- GetCurrentProcess (Address: 0x100e22a4)
- GetCurrentProcessId (Address: 0x100e20d8)
- GetCurrentThread (Address: 0x100e2340)
- GetCurrentThreadId (Address: 0x100e2320)
- GetDateFormatW (Address: 0x100e21f8)
- GetEnvironmentStringsW (Address: 0x100e21bc)
- GetEnvironmentVariableA (Address: 0x100e2330)
- GetExitCodeThread (Address: 0x100e20c0)
- GetFileSizeEx (Address: 0x100e21b0)
- GetFileType (Address: 0x100e2218)
- GetFullPathNameW (Address: 0x100e219c)
- GetHandleInformation (Address: 0x100e211c)
- GetLastError (Address: 0x100e2308)
- GetLocaleInfoW (Address: 0x100e20e8)
- GetModuleFileNameA (Address: 0x100e2154)
- GetModuleFileNameW (Address: 0x100e227c)
- GetModuleHandleA (Address: 0x100e2338)
- GetModuleHandleExA (Address: 0x100e22b8)
- GetModuleHandleExW (Address: 0x100e2284)
- GetModuleHandleW (Address: 0x100e20d0)
- GetOEMCP (Address: 0x100e21c4)
- GetOverlappedResult (Address: 0x100e2178)
- GetProcAddress (Address: 0x100e2334)
- GetProcessHeap (Address: 0x100e21b4)
- GetProcessId (Address: 0x100e22a0)
- GetStartupInfoW (Address: 0x100e223c)
- GetStdHandle (Address: 0x100e221c)
- GetStringTypeW (Address: 0x100e2260)
- GetSystemDirectoryW (Address: 0x100e231c)
- GetSystemInfo (Address: 0x100e2298)
- GetSystemTimeAsFileTime (Address: 0x100e2168)
- GetSystemWindowsDirectoryW (Address: 0x100e2140)
- GetThreadContext (Address: 0x100e20c4)
- GetTickCount (Address: 0x100e2280)
- GetTimeFormatW (Address: 0x100e21f4)
- GetTimeZoneInformation (Address: 0x100e21dc)
- GetUserDefaultLCID (Address: 0x100e21e4)
- GetWindowsDirectoryW (Address: 0x100e2318)
- HeapAlloc (Address: 0x100e2220)
- HeapFree (Address: 0x100e2224)
- HeapReAlloc (Address: 0x100e2204)
- HeapSize (Address: 0x100e21a8)
- InitializeCriticalSection (Address: 0x100e22b4)
- InitializeCriticalSectionAndSpinCount (Address: 0x100e2304)
- InitializeCriticalSectionEx (Address: 0x100e2270)
- InitializeSListHead (Address: 0x100e2238)
- InitOnceExecuteOnce (Address: 0x100e22e0)
- InterlockedFlushSList (Address: 0x100e222c)
- IsDebuggerPresent (Address: 0x100e2348)
- IsProcessorFeaturePresent (Address: 0x100e2248)
- IsValidCodePage (Address: 0x100e21cc)
- IsValidLocale (Address: 0x100e21e8)
- IsWow64Process (Address: 0x100e214c)
- LCMapStringEx (Address: 0x100e2264)
- LCMapStringW (Address: 0x100e21ec)
- LeaveCriticalSection (Address: 0x100e22ac)
- LoadLibraryA (Address: 0x100e20dc)
- LoadLibraryExA (Address: 0x100e2214)
- LoadLibraryExW (Address: 0x100e22cc)
- LoadLibraryW (Address: 0x100e22c0)
- LocalAlloc (Address: 0x100e22fc)
- LocalFree (Address: 0x100e20e0)
- lstrcatW (Address: 0x100e2310)
- lstrcmpA (Address: 0x100e22e8)
- lstrcmpW (Address: 0x100e22f8)
- lstrcpyW (Address: 0x100e2314)
- MapViewOfFile (Address: 0x100e20fc)
- Module32First (Address: 0x100e2158)
- Module32Next (Address: 0x100e215c)
- MultiByteToWideChar (Address: 0x100e20d4)
- OpenEventW (Address: 0x100e2128)
- OpenProcess (Address: 0x100e20f8)
- OpenThread (Address: 0x100e212c)
- OutputDebugStringA (Address: 0x100e22e4)
- OutputDebugStringW (Address: 0x100e232c)
- Process32First (Address: 0x100e210c)
- Process32Next (Address: 0x100e2110)
- QueryPerformanceCounter (Address: 0x100e2160)
- QueryPerformanceFrequency (Address: 0x100e2164)
- RaiseException (Address: 0x100e2234)
- ReadConsoleW (Address: 0x100e220c)
- ReadFile (Address: 0x100e2274)
- ReleaseMutex (Address: 0x100e22bc)
- ReleaseSemaphore (Address: 0x100e2184)
- ReleaseSRWLockExclusive (Address: 0x100e2258)
- ResetEvent (Address: 0x100e20f0)
- ResumeThread (Address: 0x100e2134)
- RtlUnwind (Address: 0x100e2230)
- SetEndOfFile (Address: 0x100e21a4)
- SetEnvironmentVariableA (Address: 0x100e2118)
- SetEnvironmentVariableW (Address: 0x100e2194)
- SetEvent (Address: 0x100e20ec)
- SetFilePointerEx (Address: 0x100e2208)
- SetHandleInformation (Address: 0x100e2120)
- SetLastError (Address: 0x100e2124)
- SetStdHandle (Address: 0x100e21ac)
- SetThreadContext (Address: 0x100e20c8)
- SetThreadPriority (Address: 0x100e233c)
- SetUnhandledExceptionFilter (Address: 0x100e2240)
- Sleep (Address: 0x100e2344)
- SleepConditionVariableSRW (Address: 0x100e224c)
- SuspendThread (Address: 0x100e2130)
- TerminateProcess (Address: 0x100e2188)
- TlsAlloc (Address: 0x100e2300)
- TlsFree (Address: 0x100e22d4)
- TlsGetValue (Address: 0x100e22dc)
- TlsSetValue (Address: 0x100e22d8)
- UnhandledExceptionFilter (Address: 0x100e2244)
- UnmapViewOfFile (Address: 0x100e2100)
- VerifyVersionInfoW (Address: 0x100e22f0)
- VerSetConditionMask (Address: 0x100e22ec)
- VirtualAllocEx (Address: 0x100e228c)
- VirtualFree (Address: 0x100e2144)
- VirtualProtect (Address: 0x100e2294)
- VirtualProtectEx (Address: 0x100e20cc)
- VirtualQuery (Address: 0x100e2290)
- VirtualQueryEx (Address: 0x100e2148)
- WaitForMultipleObjects (Address: 0x100e20f4)
- WaitForSingleObject (Address: 0x100e22c8)
- WakeAllConditionVariable (Address: 0x100e2250)
- WideCharToMultiByte (Address: 0x100e230c)
- WriteConsoleW (Address: 0x100e21a0)
- WriteFile (Address: 0x100e216c)
- WriteProcessMemory (Address: 0x100e2288)
ole32.dll
- CoCreateInstance (Address: 0x100e2454)
- CoInitialize (Address: 0x100e2460)
- CoTaskMemAlloc (Address: 0x100e245c)
- CoTaskMemFree (Address: 0x100e2458)
- CoUninitialize (Address: 0x100e2468)
- StringFromIID (Address: 0x100e2464)
OLEAUT32.dll
- SysAllocString (Address: 0x100e2354)
- VariantInit (Address: 0x100e2350)
PSAPI.DLL
- GetModuleBaseNameA (Address: 0x100e2360)
- GetModuleInformation (Address: 0x100e235c)
USER32.dll
- ActivateKeyboardLayout (Address: 0x100e2424)
- AdjustWindowRect (Address: 0x100e243c)
- CallNextHookEx (Address: 0x100e23b4)
- ClientToScreen (Address: 0x100e236c)
- CreateCaret (Address: 0x100e2414)
- CreateIconIndirect (Address: 0x100e23a8)
- DestroyCaret (Address: 0x100e2410)
- DestroyIcon (Address: 0x100e23b0)
- DisplayConfigGetDeviceInfo (Address: 0x100e2370)
- EnumChildWindows (Address: 0x100e238c)
- EnumWindows (Address: 0x100e2394)
- GetActiveWindow (Address: 0x100e23d8)
- GetClassLongW (Address: 0x100e23c8)
- GetClientRect (Address: 0x100e2368)
- GetCursorInfo (Address: 0x100e2380)
- GetDC (Address: 0x100e23dc)
- GetDisplayConfigBufferSizes (Address: 0x100e2434)
- GetForegroundWindow (Address: 0x100e2440)
- GetIconInfo (Address: 0x100e2390)
- GetKeyboardLayout (Address: 0x100e241c)
- GetKeyboardLayoutList (Address: 0x100e2420)
- GetKeyState (Address: 0x100e23f0)
- GetMessageExtraInfo (Address: 0x100e2404)
- GetMonitorInfoW (Address: 0x100e2378)
- GetRawInputDeviceInfoA (Address: 0x100e23a4)
- GetRawInputDeviceList (Address: 0x100e23a0)
- GetSystemMetrics (Address: 0x100e242c)
- GetWindowRect (Address: 0x100e2418)
- GetWindowThreadProcessId (Address: 0x100e23c0)
- IsChild (Address: 0x100e23f4)
- IsIconic (Address: 0x100e2444)
- IsWindow (Address: 0x100e23f8)
- IsWindowUnicode (Address: 0x100e23e0)
- LoadImageW (Address: 0x100e23ac)
- MapVirtualKeyExW (Address: 0x100e23e4)
- MonitorFromWindow (Address: 0x100e237c)
- PostMessageA (Address: 0x100e2400)
- PostMessageW (Address: 0x100e23fc)
- QueryDisplayConfig (Address: 0x100e2430)
- ReleaseDC (Address: 0x100e2384)
- SendInput (Address: 0x100e23e8)
- SendMessageTimeoutA (Address: 0x100e239c)
- SendMessageTimeoutW (Address: 0x100e2398)
- SetCaretPos (Address: 0x100e240c)
- SetClassLongW (Address: 0x100e23c4)
- SetCursor (Address: 0x100e23cc)
- SetCursorPos (Address: 0x100e23d0)
- SetWindowLongW (Address: 0x100e2438)
- SetWindowPos (Address: 0x100e2388)
- SetWindowsHookExW (Address: 0x100e23bc)
- ShowCursor (Address: 0x100e23d4)
- ShowWindow (Address: 0x100e2374)
- TranslateMessage (Address: 0x100e2408)
- UnhookWindowsHookEx (Address: 0x100e23b8)
- VkKeyScanExW (Address: 0x100e23ec)
- WindowFromDC (Address: 0x100e2428)
WINMM.dll
- timeBeginPeriod (Address: 0x100e244c)