nvspcap64.dll

Description: NVIDIA Game Proxy

Authors: (C) NVIDIA Corporation. All rights reserved.

Version: 11.0.5.420

Architecture: 64-bit

Operating System: Windows

SHA256: f5b618db2b4cff0f9b8be4393b1a7d3b

File Size: 1.3 MB

Uploaded At: Dec. 1, 2025, 7:35 a.m.

Views: 8

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess

Exported Functions

  • QueryShadowPlayDdiShimInterface (Ordinal: 1, Address: 0x571d)
  • QueryShadowPlayDdiShimStatus (Ordinal: 2, Address: 0x51b4)
  • CreateShadowPlayProxyShimInterface (Ordinal: 3, Address: 0x3f80)

Imported DLLs & Functions

ADVAPI32.dll
  • AllocateAndInitializeSid (Address: 0x180130038)
  • CopySid (Address: 0x180130018)
  • CreateRestrictedToken (Address: 0x180130040)
  • CreateWellKnownSid (Address: 0x180130048)
  • FreeSid (Address: 0x180130050)
  • GetLengthSid (Address: 0x180130008)
  • GetSecurityDescriptorDacl (Address: 0x180130058)
  • GetTokenInformation (Address: 0x180130010)
  • GetUserNameA (Address: 0x180130080)
  • GetUserNameW (Address: 0x180130088)
  • ImpersonateSelf (Address: 0x180130060)
  • InitializeSecurityDescriptor (Address: 0x180130068)
  • OpenProcessToken (Address: 0x180130000)
  • OpenThreadToken (Address: 0x180130030)
  • RegCloseKey (Address: 0x180130090)
  • RegOpenKeyExA (Address: 0x180130098)
  • RegQueryValueExA (Address: 0x1801300a0)
  • RevertToSelf (Address: 0x180130070)
  • SetEntriesInAclA (Address: 0x180130020)
  • SetSecurityDescriptorDacl (Address: 0x180130078)
  • SetThreadToken (Address: 0x180130028)
KERNEL32.dll
  • AcquireSRWLockExclusive (Address: 0x180130328)
  • CloseHandle (Address: 0x180130358)
  • CompareStringW (Address: 0x180130188)
  • ConnectNamedPipe (Address: 0x180130580)
  • CopyFileA (Address: 0x1801304b8)
  • CreateDirectoryA (Address: 0x180130460)
  • CreateEventA (Address: 0x1801304e0)
  • CreateEventW (Address: 0x1801305e0)
  • CreateFileA (Address: 0x180130468)
  • CreateFileMappingA (Address: 0x1801305c0)
  • CreateFileMappingW (Address: 0x180130340)
  • CreateFileW (Address: 0x1801303f8)
  • CreateMutexA (Address: 0x1801305a0)
  • CreateMutexW (Address: 0x1801305d0)
  • CreateNamedPipeA (Address: 0x1801305c8)
  • CreateProcessA (Address: 0x180130418)
  • CreateProcessW (Address: 0x180130420)
  • CreateThread (Address: 0x1801304e8)
  • CreateToolhelp32Snapshot (Address: 0x1801303c0)
  • DeleteCriticalSection (Address: 0x180130380)
  • DeleteFileA (Address: 0x180130470)
  • DisconnectNamedPipe (Address: 0x180130560)
  • EncodePointer (Address: 0x180130270)
  • EnterCriticalSection (Address: 0x180130450)
  • EnumSystemLocalesW (Address: 0x180130160)
  • ExitProcess (Address: 0x180130240)
  • FindClose (Address: 0x180130220)
  • FindFirstFileExW (Address: 0x180130218)
  • FindNextFileW (Address: 0x180130210)
  • FlsAlloc (Address: 0x1801301b8)
  • FlsFree (Address: 0x1801301a0)
  • FlsGetValue (Address: 0x1801301b0)
  • FlsSetValue (Address: 0x1801301a8)
  • FlushFileBuffers (Address: 0x180130550)
  • FreeEnvironmentStringsW (Address: 0x1801301d0)
  • FreeLibrary (Address: 0x180130390)
  • GetACP (Address: 0x180130200)
  • GetCommandLineA (Address: 0x1801301e8)
  • GetCommandLineW (Address: 0x1801301e0)
  • GetConsoleMode (Address: 0x180130120)
  • GetConsoleOutputCP (Address: 0x180130128)
  • GetCPInfo (Address: 0x1801301f0)
  • GetCurrentProcess (Address: 0x180130548)
  • GetCurrentProcessId (Address: 0x180130348)
  • GetCurrentThread (Address: 0x1801304a0)
  • GetCurrentThreadId (Address: 0x1801304a8)
  • GetDateFormatW (Address: 0x180130198)
  • GetEnvironmentStringsW (Address: 0x1801301d8)
  • GetFileAttributesA (Address: 0x180130478)
  • GetFileAttributesW (Address: 0x180130400)
  • GetFileSizeEx (Address: 0x180130480)
  • GetFileType (Address: 0x180130228)
  • GetFinalPathNameByHandleA (Address: 0x180130488)
  • GetFullPathNameW (Address: 0x180130408)
  • GetLastError (Address: 0x180130360)
  • GetLocaleInfoW (Address: 0x180130178)
  • GetLocalTime (Address: 0x1801304b0)
  • GetModuleFileNameA (Address: 0x180130350)
  • GetModuleFileNameW (Address: 0x180130398)
  • GetModuleHandleA (Address: 0x1801303e8)
  • GetModuleHandleExW (Address: 0x180130238)
  • GetModuleHandleW (Address: 0x180130428)
  • GetOEMCP (Address: 0x1801301f8)
  • GetProcAddress (Address: 0x1801303a0)
  • GetProcessHeap (Address: 0x180130598)
  • GetStartupInfoW (Address: 0x1801302e0)
  • GetStdHandle (Address: 0x180130230)
  • GetStringTypeW (Address: 0x180130150)
  • GetSystemDirectoryA (Address: 0x1801303d8)
  • GetSystemDirectoryW (Address: 0x1801303e0)
  • GetSystemInfo (Address: 0x1801304f8)
  • GetSystemTimeAsFileTime (Address: 0x1801302c8)
  • GetTempPathW (Address: 0x1801301c0)
  • GetThreadId (Address: 0x1801304f0)
  • GetTickCount (Address: 0x180130538)
  • GetTimeFormatW (Address: 0x1801302b0)
  • GetUserDefaultLCID (Address: 0x180130168)
  • HeapAlloc (Address: 0x180130588)
  • HeapFree (Address: 0x180130590)
  • HeapReAlloc (Address: 0x180130130)
  • HeapSize (Address: 0x180130138)
  • InitializeCriticalSection (Address: 0x180130378)
  • InitializeCriticalSectionAndSpinCount (Address: 0x180130268)
  • InitializeSListHead (Address: 0x1801302c0)
  • InterlockedFlushSList (Address: 0x180130278)
  • InterlockedPushEntrySList (Address: 0x180130280)
  • IsDebuggerPresent (Address: 0x1801302f8)
  • IsProcessorFeaturePresent (Address: 0x1801302d8)
  • IsValidCodePage (Address: 0x180130208)
  • IsValidLocale (Address: 0x180130170)
  • K32GetProcessImageFileNameA (Address: 0x180130530)
  • LCMapStringW (Address: 0x180130180)
  • LeaveCriticalSection (Address: 0x1801302b8)
  • LoadLibraryA (Address: 0x1801303a8)
  • LoadLibraryExW (Address: 0x180130430)
  • LocalAlloc (Address: 0x180130438)
  • LocalFree (Address: 0x180130440)
  • MapViewOfFile (Address: 0x1801305b0)
  • MoveFileExA (Address: 0x1801304c0)
  • MultiByteToWideChar (Address: 0x1801303b0)
  • OpenEventA (Address: 0x1801305a8)
  • OpenEventW (Address: 0x1801305e8)
  • OpenFileMappingA (Address: 0x180130578)
  • OpenFileMappingW (Address: 0x180130338)
  • OpenMutexA (Address: 0x1801305b8)
  • OpenMutexW (Address: 0x1801305d8)
  • OpenProcess (Address: 0x180130388)
  • OutputDebugStringA (Address: 0x180130498)
  • OutputDebugStringW (Address: 0x1801302a0)
  • Process32First (Address: 0x1801303c8)
  • Process32FirstW (Address: 0x180130510)
  • Process32Next (Address: 0x1801303d0)
  • Process32NextW (Address: 0x180130518)
  • QueryFullProcessImageNameA (Address: 0x180130520)
  • QueryFullProcessImageNameW (Address: 0x180130528)
  • QueryPerformanceCounter (Address: 0x180130368)
  • QueryPerformanceFrequency (Address: 0x180130370)
  • RaiseException (Address: 0x180130290)
  • ReadConsoleW (Address: 0x180130190)
  • ReadFile (Address: 0x180130558)
  • ReleaseMutex (Address: 0x180130568)
  • ReleaseSRWLockExclusive (Address: 0x180130330)
  • ResetEvent (Address: 0x1801304d0)
  • RtlCaptureContext (Address: 0x180130310)
  • RtlLookupFunctionEntry (Address: 0x180130308)
  • RtlPcToFileHeader (Address: 0x180130298)
  • RtlUnwind (Address: 0x180130458)
  • RtlUnwindEx (Address: 0x180130288)
  • RtlVirtualUnwind (Address: 0x180130300)
  • SetConsoleCtrlHandler (Address: 0x180130158)
  • SetEnvironmentVariableW (Address: 0x1801301c8)
  • SetEvent (Address: 0x1801304c8)
  • SetFilePointerEx (Address: 0x180130148)
  • SetLastError (Address: 0x180130410)
  • SetStdHandle (Address: 0x180130140)
  • SetUnhandledExceptionFilter (Address: 0x1801302e8)
  • SleepConditionVariableSRW (Address: 0x180130318)
  • TerminateProcess (Address: 0x1801302d0)
  • Thread32First (Address: 0x180130500)
  • Thread32Next (Address: 0x180130508)
  • TlsAlloc (Address: 0x180130260)
  • TlsFree (Address: 0x180130248)
  • TlsGetValue (Address: 0x180130258)
  • TlsSetValue (Address: 0x180130250)
  • UnhandledExceptionFilter (Address: 0x1801302f0)
  • UnmapViewOfFile (Address: 0x180130570)
  • VerifyVersionInfoW (Address: 0x180130448)
  • VerSetConditionMask (Address: 0x1801303f0)
  • WaitForMultipleObjects (Address: 0x180130540)
  • WaitForSingleObject (Address: 0x1801304d8)
  • WakeAllConditionVariable (Address: 0x180130320)
  • WideCharToMultiByte (Address: 0x1801303b8)
  • WriteConsoleW (Address: 0x1801302a8)
  • WriteFile (Address: 0x180130490)
ole32.dll
  • CoTaskMemFree (Address: 0x180130b10)
SHELL32.dll
  • SHGetFolderPathA (Address: 0x180130740)
  • SHGetKnownFolderPath (Address: 0x180130738)
SHLWAPI.dll
  • PathFileExistsA (Address: 0x1801307a8)
  • PathFindFileNameA (Address: 0x1801307a0)
USER32.dll
  • AttachThreadInput (Address: 0x1801309b8)
  • CallNextHookEx (Address: 0x180130928)
  • ClipCursor (Address: 0x180130898)
  • CreateWindowExA (Address: 0x1801308c0)
  • DefWindowProcA (Address: 0x1801308d8)
  • DestroyWindow (Address: 0x1801308b8)
  • DispatchMessageA (Address: 0x1801308f8)
  • EnumChildWindows (Address: 0x180130830)
  • EnumDisplaySettingsA (Address: 0x180130960)
  • EnumWindows (Address: 0x180130870)
  • FindWindowA (Address: 0x180130910)
  • FindWindowExA (Address: 0x180130888)
  • FindWindowExW (Address: 0x180130880)
  • GetAsyncKeyState (Address: 0x1801308b0)
  • GetCursorInfo (Address: 0x180130940)
  • GetCursorPos (Address: 0x180130980)
  • GetDC (Address: 0x180130858)
  • GetDesktopWindow (Address: 0x1801309c8)
  • GetDpiForWindow (Address: 0x180130948)
  • GetForegroundWindow (Address: 0x1801309a8)
  • GetMessageA (Address: 0x180130908)
  • GetPhysicalCursorPos (Address: 0x180130978)
  • GetRawInputData (Address: 0x180130868)
  • GetRegisteredRawInputDevices (Address: 0x180130850)
  • GetShellWindow (Address: 0x180130878)
  • GetSystemMetrics (Address: 0x180130808)
  • GetWindow (Address: 0x180130828)
  • GetWindowDisplayAffinity (Address: 0x180130848)
  • GetWindowLongA (Address: 0x180130918)
  • GetWindowRect (Address: 0x180130820)
  • GetWindowTextW (Address: 0x180130838)
  • GetWindowThreadProcessId (Address: 0x180130968)
  • IsProcessDPIAware (Address: 0x180130950)
  • IsWindow (Address: 0x1801309b0)
  • IsWindowVisible (Address: 0x180130840)
  • LoadBitmapA (Address: 0x180130810)
  • MapVirtualKeyA (Address: 0x1801308a0)
  • PostMessageA (Address: 0x1801308e0)
  • PostThreadMessageA (Address: 0x1801309c0)
  • RedrawWindow (Address: 0x1801309a0)
  • RegisterClassExA (Address: 0x1801308c8)
  • RegisterRawInputDevices (Address: 0x180130860)
  • ReleaseDC (Address: 0x180130818)
  • SendInput (Address: 0x1801308a8)
  • SendMessageA (Address: 0x1801308f0)
  • SendNotifyMessageA (Address: 0x1801308e8)
  • SetCursor (Address: 0x180130988)
  • SetCursorPos (Address: 0x180130990)
  • SetForegroundWindow (Address: 0x180130920)
  • SetWindowLongPtrA (Address: 0x180130890)
  • SetWindowsHookExA (Address: 0x180130938)
  • ShowCursor (Address: 0x180130998)
  • SystemParametersInfoA (Address: 0x180130958)
  • TranslateMessage (Address: 0x180130900)
  • UnhookWindowsHookEx (Address: 0x180130930)
  • UnregisterClassA (Address: 0x1801308d0)
  • WindowFromPhysicalPoint (Address: 0x180130970)
VERSION.dll
  • GetFileVersionInfoA (Address: 0x180130a80)
  • GetFileVersionInfoSizeA (Address: 0x180130aa8)
  • GetFileVersionInfoSizeW (Address: 0x180130a90)
  • GetFileVersionInfoW (Address: 0x180130a98)
  • VerQueryValueA (Address: 0x180130a88)
  • VerQueryValueW (Address: 0x180130aa0)