ShadowPlayExt.dll

Description: NVIDIA ShadowPlay Install Helper

Authors: Copyright © 2010, 2025 NVIDIA Corporation. All rights reserved.

Version: 11.0.5.420

Architecture: 32-bit

Operating System: Windows

SHA256: 86bbf13ded13e98df6d62657b4285d70

File Size: 1.1 MB

Uploaded At: Dec. 1, 2025, 2:53 p.m.

Views: 6

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess

Exported Functions

  • DllCanUnloadNow (Ordinal: 1, Address: 0xac820)
  • DllGetClassObject (Ordinal: 2, Address: 0xac7e0)
  • DllInstall (Ordinal: 3, Address: 0xac7b0)
  • DllRegisterServer (Ordinal: 4, Address: 0xac7d0)
  • DllUnregisterServer (Ordinal: 5, Address: 0xac7c0)

Imported DLLs & Functions

ADVAPI32.dll
  • GetTokenInformation (Address: 0x100c3020)
  • LsaNtStatusToWinError (Address: 0x100c3000)
  • OpenProcessToken (Address: 0x100c301c)
  • RegCloseKey (Address: 0x100c302c)
  • RegCreateKeyExW (Address: 0x100c3028)
  • RegDeleteKeyW (Address: 0x100c3014)
  • RegDeleteValueW (Address: 0x100c3010)
  • RegEnumKeyExW (Address: 0x100c300c)
  • RegEnumValueW (Address: 0x100c3024)
  • RegOpenCurrentUser (Address: 0x100c3018)
  • RegOpenKeyExW (Address: 0x100c3030)
  • RegQueryInfoKeyW (Address: 0x100c3008)
  • RegQueryValueExW (Address: 0x100c3034)
  • RegSetValueExW (Address: 0x100c3004)
KERNEL32.dll
  • AreFileApisANSI (Address: 0x100c32a4)
  • ChangeTimerQueueTimer (Address: 0x100c31c0)
  • CloseHandle (Address: 0x100c3160)
  • CompareStringW (Address: 0x100c327c)
  • CreateDirectoryW (Address: 0x100c3118)
  • CreateEventA (Address: 0x100c30bc)
  • CreateEventW (Address: 0x100c3250)
  • CreateFileW (Address: 0x100c3174)
  • CreateMutexW (Address: 0x100c30cc)
  • CreateThread (Address: 0x100c32b4)
  • CreateTimerQueue (Address: 0x100c31a4)
  • CreateTimerQueueTimer (Address: 0x100c31c4)
  • CreateToolhelp32Snapshot (Address: 0x100c3108)
  • DecodePointer (Address: 0x100c3094)
  • DeleteCriticalSection (Address: 0x100c3074)
  • DeleteFileW (Address: 0x100c311c)
  • DeleteTimerQueueTimer (Address: 0x100c31bc)
  • DeviceIoControl (Address: 0x100c312c)
  • DuplicateHandle (Address: 0x100c30f4)
  • EncodePointer (Address: 0x100c309c)
  • EnterCriticalSection (Address: 0x100c3088)
  • EnumSystemLocalesW (Address: 0x100c3220)
  • ExitProcess (Address: 0x100c3238)
  • ExitThread (Address: 0x100c32b8)
  • ExpandEnvironmentStringsW (Address: 0x100c3180)
  • FindClose (Address: 0x100c3120)
  • FindFirstFileExA (Address: 0x100c3210)
  • FindNextFileA (Address: 0x100c320c)
  • FindResourceExW (Address: 0x100c3054)
  • FindResourceW (Address: 0x100c3050)
  • FlushFileBuffers (Address: 0x100c3298)
  • FormatMessageA (Address: 0x100c30b8)
  • FormatMessageW (Address: 0x100c30b4)
  • FreeEnvironmentStringsW (Address: 0x100c31f4)
  • FreeLibrary (Address: 0x100c314c)
  • FreeLibraryAndExitThread (Address: 0x100c32bc)
  • GetACP (Address: 0x100c3234)
  • GetCommandLineA (Address: 0x100c3200)
  • GetCommandLineW (Address: 0x100c31fc)
  • GetConsoleCP (Address: 0x100c31ec)
  • GetConsoleMode (Address: 0x100c31e8)
  • GetCPInfo (Address: 0x100c3288)
  • GetCurrentProcess (Address: 0x100c3184)
  • GetCurrentProcessId (Address: 0x100c30e0)
  • GetCurrentThread (Address: 0x100c3130)
  • GetCurrentThreadId (Address: 0x100c30c8)
  • GetDateFormatW (Address: 0x100c3230)
  • GetEnvironmentStringsW (Address: 0x100c31f8)
  • GetExitCodeThread (Address: 0x100c3084)
  • GetFileAttributesW (Address: 0x100c3170)
  • GetFileInformationByHandle (Address: 0x100c329c)
  • GetFileSizeEx (Address: 0x100c30d8)
  • GetFileType (Address: 0x100c3214)
  • GetFullPathNameW (Address: 0x100c3188)
  • GetLastError (Address: 0x100c3164)
  • GetLocaleInfoW (Address: 0x100c3284)
  • GetLogicalProcessorInformation (Address: 0x100c3294)
  • GetModuleFileNameA (Address: 0x100c3190)
  • GetModuleFileNameW (Address: 0x100c317c)
  • GetModuleHandleA (Address: 0x100c3168)
  • GetModuleHandleExW (Address: 0x100c30e8)
  • GetModuleHandleW (Address: 0x100c3150)
  • GetNumaHighestNodeNumber (Address: 0x100c31b8)
  • GetOEMCP (Address: 0x100c3204)
  • GetProcAddress (Address: 0x100c315c)
  • GetProcessAffinityMask (Address: 0x100c31b4)
  • GetProcessHeap (Address: 0x100c306c)
  • GetProcessId (Address: 0x100c30fc)
  • GetProcessTimes (Address: 0x100c30ac)
  • GetStartupInfoW (Address: 0x100c325c)
  • GetStdHandle (Address: 0x100c3218)
  • GetStringTypeW (Address: 0x100c3260)
  • GetSystemDirectoryW (Address: 0x100c316c)
  • GetSystemInfo (Address: 0x100c3138)
  • GetSystemTimeAsFileTime (Address: 0x100c30a8)
  • GetTempPathW (Address: 0x100c30e4)
  • GetThreadPriority (Address: 0x100c31c8)
  • GetThreadTimes (Address: 0x100c3148)
  • GetTickCount (Address: 0x100c3104)
  • GetTimeFormatW (Address: 0x100c322c)
  • GetTimeZoneInformation (Address: 0x100c321c)
  • GetUserDefaultLCID (Address: 0x100c3224)
  • GetVersionExW (Address: 0x100c313c)
  • HeapAlloc (Address: 0x100c3068)
  • HeapDestroy (Address: 0x100c3058)
  • HeapFree (Address: 0x100c3064)
  • HeapReAlloc (Address: 0x100c3060)
  • HeapSize (Address: 0x100c305c)
  • InitializeCriticalSectionAndSpinCount (Address: 0x100c3268)
  • InitializeCriticalSectionEx (Address: 0x100c3078)
  • InitializeSListHead (Address: 0x100c3254)
  • InterlockedFlushSList (Address: 0x100c32b0)
  • InterlockedPopEntrySList (Address: 0x100c3198)
  • InterlockedPushEntrySList (Address: 0x100c32ac)
  • IsDebuggerPresent (Address: 0x100c3258)
  • IsProcessorFeaturePresent (Address: 0x100c3248)
  • IsValidCodePage (Address: 0x100c3208)
  • IsValidLocale (Address: 0x100c3228)
  • LCMapStringW (Address: 0x100c3280)
  • LeaveCriticalSection (Address: 0x100c308c)
  • LoadLibraryExW (Address: 0x100c3040)
  • LoadLibraryW (Address: 0x100c30ec)
  • LoadResource (Address: 0x100c304c)
  • LocalAlloc (Address: 0x100c3178)
  • LocalFree (Address: 0x100c3158)
  • LockResource (Address: 0x100c3048)
  • lstrcmpW (Address: 0x100c303c)
  • MoveFileExW (Address: 0x100c3134)
  • MultiByteToWideChar (Address: 0x100c3114)
  • OpenEventA (Address: 0x100c3290)
  • OpenProcess (Address: 0x100c3100)
  • OutputDebugStringW (Address: 0x100c30b0)
  • Process32FirstW (Address: 0x100c310c)
  • Process32NextW (Address: 0x100c3110)
  • QueryDepthSList (Address: 0x100c319c)
  • QueryDosDeviceW (Address: 0x100c3124)
  • QueryPerformanceCounter (Address: 0x100c30a0)
  • QueryPerformanceFrequency (Address: 0x100c30a4)
  • RaiseException (Address: 0x100c3098)
  • ReadConsoleW (Address: 0x100c31dc)
  • ReadFile (Address: 0x100c31e4)
  • RegisterWaitForSingleObject (Address: 0x100c31ac)
  • ReleaseMutex (Address: 0x100c30dc)
  • ReleaseSemaphore (Address: 0x100c328c)
  • RemoveDirectoryW (Address: 0x100c30d0)
  • ResetEvent (Address: 0x100c324c)
  • ResumeThread (Address: 0x100c3090)
  • RtlUnwind (Address: 0x100c32a8)
  • SetEnvironmentVariableA (Address: 0x100c31f0)
  • SetEvent (Address: 0x100c30c0)
  • SetFileAttributesW (Address: 0x100c3128)
  • SetFilePointerEx (Address: 0x100c32a0)
  • SetLastError (Address: 0x100c318c)
  • SetStdHandle (Address: 0x100c31e0)
  • SetThreadAffinityMask (Address: 0x100c31b0)
  • SetThreadPriority (Address: 0x100c31cc)
  • SetUnhandledExceptionFilter (Address: 0x100c3244)
  • SignalObjectAndWait (Address: 0x100c31d4)
  • SizeofResource (Address: 0x100c3044)
  • Sleep (Address: 0x100c323c)
  • SwitchToThread (Address: 0x100c31d0)
  • TerminateProcess (Address: 0x100c30f8)
  • TerminateThread (Address: 0x100c3080)
  • TlsAlloc (Address: 0x100c326c)
  • TlsFree (Address: 0x100c3278)
  • TlsGetValue (Address: 0x100c3270)
  • TlsSetValue (Address: 0x100c3274)
  • TryEnterCriticalSection (Address: 0x100c3264)
  • UnhandledExceptionFilter (Address: 0x100c3240)
  • UnregisterWait (Address: 0x100c31a8)
  • UnregisterWaitEx (Address: 0x100c31a0)
  • VerifyVersionInfoW (Address: 0x100c30f0)
  • VerSetConditionMask (Address: 0x100c3154)
  • VirtualAlloc (Address: 0x100c3144)
  • VirtualFree (Address: 0x100c3194)
  • VirtualProtect (Address: 0x100c3140)
  • WaitForSingleObject (Address: 0x100c307c)
  • WaitForSingleObjectEx (Address: 0x100c30c4)
  • WideCharToMultiByte (Address: 0x100c3070)
  • WriteConsoleW (Address: 0x100c31d8)
  • WriteFile (Address: 0x100c30d4)
ole32.dll
  • CoCreateInstance (Address: 0x100c3340)
  • CoInitializeEx (Address: 0x100c3344)
  • CoUninitialize (Address: 0x100c333c)
OLEAUT32.dll
  • LoadRegTypeLib (Address: 0x100c32e8)
  • LoadTypeLib (Address: 0x100c32ec)
  • SafeArrayCopy (Address: 0x100c32e0)
  • SafeArrayDestroy (Address: 0x100c32f0)
  • SafeArrayGetLBound (Address: 0x100c32f8)
  • SafeArrayGetUBound (Address: 0x100c32f4)
  • SafeArrayGetVartype (Address: 0x100c32fc)
  • SafeArrayLock (Address: 0x100c3300)
  • SafeArrayUnlock (Address: 0x100c32c4)
  • SysAllocString (Address: 0x100c32e4)
  • SysAllocStringLen (Address: 0x100c32dc)
  • SysFreeString (Address: 0x100c32c8)
  • SysStringLen (Address: 0x100c32d4)
  • VariantChangeType (Address: 0x100c32d8)
  • VariantClear (Address: 0x100c32cc)
  • VariantInit (Address: 0x100c32d0)
PSAPI.DLL
  • GetProcessImageFileNameW (Address: 0x100c3308)
SHELL32.dll
  • SHGetFolderPathW (Address: 0x100c3310)
SHLWAPI.dll
  • PathFindFileNameW (Address: 0x100c3318)
USER32.dll
  • EnumWindows (Address: 0x100c3330)
  • GetParent (Address: 0x100c3328)
  • GetWindow (Address: 0x100c3324)
  • GetWindowThreadProcessId (Address: 0x100c332c)
  • IsWindowVisible (Address: 0x100c3320)
  • PostMessageW (Address: 0x100c3334)