nvspcap64.dll
Description: NVIDIA Game Proxy
Authors: (C) NVIDIA Corporation. All rights reserved.
Version: 11.0.5.420
Architecture: 64-bit
Operating System: Windows
SHA256: f5b618db2b4cff0f9b8be4393b1a7d3b
File Size: 1.3 MB
Uploaded At: Dec. 1, 2025, 7:35 a.m.
Views: 8
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: OpenProcess
Exported Functions
- QueryShadowPlayDdiShimInterface (Ordinal: 1, Address: 0x571d)
- QueryShadowPlayDdiShimStatus (Ordinal: 2, Address: 0x51b4)
- CreateShadowPlayProxyShimInterface (Ordinal: 3, Address: 0x3f80)
Imported DLLs & Functions
ADVAPI32.dll
- AllocateAndInitializeSid (Address: 0x180130038)
- CopySid (Address: 0x180130018)
- CreateRestrictedToken (Address: 0x180130040)
- CreateWellKnownSid (Address: 0x180130048)
- FreeSid (Address: 0x180130050)
- GetLengthSid (Address: 0x180130008)
- GetSecurityDescriptorDacl (Address: 0x180130058)
- GetTokenInformation (Address: 0x180130010)
- GetUserNameA (Address: 0x180130080)
- GetUserNameW (Address: 0x180130088)
- ImpersonateSelf (Address: 0x180130060)
- InitializeSecurityDescriptor (Address: 0x180130068)
- OpenProcessToken (Address: 0x180130000)
- OpenThreadToken (Address: 0x180130030)
- RegCloseKey (Address: 0x180130090)
- RegOpenKeyExA (Address: 0x180130098)
- RegQueryValueExA (Address: 0x1801300a0)
- RevertToSelf (Address: 0x180130070)
- SetEntriesInAclA (Address: 0x180130020)
- SetSecurityDescriptorDacl (Address: 0x180130078)
- SetThreadToken (Address: 0x180130028)
KERNEL32.dll
- AcquireSRWLockExclusive (Address: 0x180130328)
- CloseHandle (Address: 0x180130358)
- CompareStringW (Address: 0x180130188)
- ConnectNamedPipe (Address: 0x180130580)
- CopyFileA (Address: 0x1801304b8)
- CreateDirectoryA (Address: 0x180130460)
- CreateEventA (Address: 0x1801304e0)
- CreateEventW (Address: 0x1801305e0)
- CreateFileA (Address: 0x180130468)
- CreateFileMappingA (Address: 0x1801305c0)
- CreateFileMappingW (Address: 0x180130340)
- CreateFileW (Address: 0x1801303f8)
- CreateMutexA (Address: 0x1801305a0)
- CreateMutexW (Address: 0x1801305d0)
- CreateNamedPipeA (Address: 0x1801305c8)
- CreateProcessA (Address: 0x180130418)
- CreateProcessW (Address: 0x180130420)
- CreateThread (Address: 0x1801304e8)
- CreateToolhelp32Snapshot (Address: 0x1801303c0)
- DeleteCriticalSection (Address: 0x180130380)
- DeleteFileA (Address: 0x180130470)
- DisconnectNamedPipe (Address: 0x180130560)
- EncodePointer (Address: 0x180130270)
- EnterCriticalSection (Address: 0x180130450)
- EnumSystemLocalesW (Address: 0x180130160)
- ExitProcess (Address: 0x180130240)
- FindClose (Address: 0x180130220)
- FindFirstFileExW (Address: 0x180130218)
- FindNextFileW (Address: 0x180130210)
- FlsAlloc (Address: 0x1801301b8)
- FlsFree (Address: 0x1801301a0)
- FlsGetValue (Address: 0x1801301b0)
- FlsSetValue (Address: 0x1801301a8)
- FlushFileBuffers (Address: 0x180130550)
- FreeEnvironmentStringsW (Address: 0x1801301d0)
- FreeLibrary (Address: 0x180130390)
- GetACP (Address: 0x180130200)
- GetCommandLineA (Address: 0x1801301e8)
- GetCommandLineW (Address: 0x1801301e0)
- GetConsoleMode (Address: 0x180130120)
- GetConsoleOutputCP (Address: 0x180130128)
- GetCPInfo (Address: 0x1801301f0)
- GetCurrentProcess (Address: 0x180130548)
- GetCurrentProcessId (Address: 0x180130348)
- GetCurrentThread (Address: 0x1801304a0)
- GetCurrentThreadId (Address: 0x1801304a8)
- GetDateFormatW (Address: 0x180130198)
- GetEnvironmentStringsW (Address: 0x1801301d8)
- GetFileAttributesA (Address: 0x180130478)
- GetFileAttributesW (Address: 0x180130400)
- GetFileSizeEx (Address: 0x180130480)
- GetFileType (Address: 0x180130228)
- GetFinalPathNameByHandleA (Address: 0x180130488)
- GetFullPathNameW (Address: 0x180130408)
- GetLastError (Address: 0x180130360)
- GetLocaleInfoW (Address: 0x180130178)
- GetLocalTime (Address: 0x1801304b0)
- GetModuleFileNameA (Address: 0x180130350)
- GetModuleFileNameW (Address: 0x180130398)
- GetModuleHandleA (Address: 0x1801303e8)
- GetModuleHandleExW (Address: 0x180130238)
- GetModuleHandleW (Address: 0x180130428)
- GetOEMCP (Address: 0x1801301f8)
- GetProcAddress (Address: 0x1801303a0)
- GetProcessHeap (Address: 0x180130598)
- GetStartupInfoW (Address: 0x1801302e0)
- GetStdHandle (Address: 0x180130230)
- GetStringTypeW (Address: 0x180130150)
- GetSystemDirectoryA (Address: 0x1801303d8)
- GetSystemDirectoryW (Address: 0x1801303e0)
- GetSystemInfo (Address: 0x1801304f8)
- GetSystemTimeAsFileTime (Address: 0x1801302c8)
- GetTempPathW (Address: 0x1801301c0)
- GetThreadId (Address: 0x1801304f0)
- GetTickCount (Address: 0x180130538)
- GetTimeFormatW (Address: 0x1801302b0)
- GetUserDefaultLCID (Address: 0x180130168)
- HeapAlloc (Address: 0x180130588)
- HeapFree (Address: 0x180130590)
- HeapReAlloc (Address: 0x180130130)
- HeapSize (Address: 0x180130138)
- InitializeCriticalSection (Address: 0x180130378)
- InitializeCriticalSectionAndSpinCount (Address: 0x180130268)
- InitializeSListHead (Address: 0x1801302c0)
- InterlockedFlushSList (Address: 0x180130278)
- InterlockedPushEntrySList (Address: 0x180130280)
- IsDebuggerPresent (Address: 0x1801302f8)
- IsProcessorFeaturePresent (Address: 0x1801302d8)
- IsValidCodePage (Address: 0x180130208)
- IsValidLocale (Address: 0x180130170)
- K32GetProcessImageFileNameA (Address: 0x180130530)
- LCMapStringW (Address: 0x180130180)
- LeaveCriticalSection (Address: 0x1801302b8)
- LoadLibraryA (Address: 0x1801303a8)
- LoadLibraryExW (Address: 0x180130430)
- LocalAlloc (Address: 0x180130438)
- LocalFree (Address: 0x180130440)
- MapViewOfFile (Address: 0x1801305b0)
- MoveFileExA (Address: 0x1801304c0)
- MultiByteToWideChar (Address: 0x1801303b0)
- OpenEventA (Address: 0x1801305a8)
- OpenEventW (Address: 0x1801305e8)
- OpenFileMappingA (Address: 0x180130578)
- OpenFileMappingW (Address: 0x180130338)
- OpenMutexA (Address: 0x1801305b8)
- OpenMutexW (Address: 0x1801305d8)
- OpenProcess (Address: 0x180130388)
- OutputDebugStringA (Address: 0x180130498)
- OutputDebugStringW (Address: 0x1801302a0)
- Process32First (Address: 0x1801303c8)
- Process32FirstW (Address: 0x180130510)
- Process32Next (Address: 0x1801303d0)
- Process32NextW (Address: 0x180130518)
- QueryFullProcessImageNameA (Address: 0x180130520)
- QueryFullProcessImageNameW (Address: 0x180130528)
- QueryPerformanceCounter (Address: 0x180130368)
- QueryPerformanceFrequency (Address: 0x180130370)
- RaiseException (Address: 0x180130290)
- ReadConsoleW (Address: 0x180130190)
- ReadFile (Address: 0x180130558)
- ReleaseMutex (Address: 0x180130568)
- ReleaseSRWLockExclusive (Address: 0x180130330)
- ResetEvent (Address: 0x1801304d0)
- RtlCaptureContext (Address: 0x180130310)
- RtlLookupFunctionEntry (Address: 0x180130308)
- RtlPcToFileHeader (Address: 0x180130298)
- RtlUnwind (Address: 0x180130458)
- RtlUnwindEx (Address: 0x180130288)
- RtlVirtualUnwind (Address: 0x180130300)
- SetConsoleCtrlHandler (Address: 0x180130158)
- SetEnvironmentVariableW (Address: 0x1801301c8)
- SetEvent (Address: 0x1801304c8)
- SetFilePointerEx (Address: 0x180130148)
- SetLastError (Address: 0x180130410)
- SetStdHandle (Address: 0x180130140)
- SetUnhandledExceptionFilter (Address: 0x1801302e8)
- SleepConditionVariableSRW (Address: 0x180130318)
- TerminateProcess (Address: 0x1801302d0)
- Thread32First (Address: 0x180130500)
- Thread32Next (Address: 0x180130508)
- TlsAlloc (Address: 0x180130260)
- TlsFree (Address: 0x180130248)
- TlsGetValue (Address: 0x180130258)
- TlsSetValue (Address: 0x180130250)
- UnhandledExceptionFilter (Address: 0x1801302f0)
- UnmapViewOfFile (Address: 0x180130570)
- VerifyVersionInfoW (Address: 0x180130448)
- VerSetConditionMask (Address: 0x1801303f0)
- WaitForMultipleObjects (Address: 0x180130540)
- WaitForSingleObject (Address: 0x1801304d8)
- WakeAllConditionVariable (Address: 0x180130320)
- WideCharToMultiByte (Address: 0x1801303b8)
- WriteConsoleW (Address: 0x1801302a8)
- WriteFile (Address: 0x180130490)
ole32.dll
- CoTaskMemFree (Address: 0x180130b10)
SHELL32.dll
- SHGetFolderPathA (Address: 0x180130740)
- SHGetKnownFolderPath (Address: 0x180130738)
SHLWAPI.dll
- PathFileExistsA (Address: 0x1801307a8)
- PathFindFileNameA (Address: 0x1801307a0)
USER32.dll
- AttachThreadInput (Address: 0x1801309b8)
- CallNextHookEx (Address: 0x180130928)
- ClipCursor (Address: 0x180130898)
- CreateWindowExA (Address: 0x1801308c0)
- DefWindowProcA (Address: 0x1801308d8)
- DestroyWindow (Address: 0x1801308b8)
- DispatchMessageA (Address: 0x1801308f8)
- EnumChildWindows (Address: 0x180130830)
- EnumDisplaySettingsA (Address: 0x180130960)
- EnumWindows (Address: 0x180130870)
- FindWindowA (Address: 0x180130910)
- FindWindowExA (Address: 0x180130888)
- FindWindowExW (Address: 0x180130880)
- GetAsyncKeyState (Address: 0x1801308b0)
- GetCursorInfo (Address: 0x180130940)
- GetCursorPos (Address: 0x180130980)
- GetDC (Address: 0x180130858)
- GetDesktopWindow (Address: 0x1801309c8)
- GetDpiForWindow (Address: 0x180130948)
- GetForegroundWindow (Address: 0x1801309a8)
- GetMessageA (Address: 0x180130908)
- GetPhysicalCursorPos (Address: 0x180130978)
- GetRawInputData (Address: 0x180130868)
- GetRegisteredRawInputDevices (Address: 0x180130850)
- GetShellWindow (Address: 0x180130878)
- GetSystemMetrics (Address: 0x180130808)
- GetWindow (Address: 0x180130828)
- GetWindowDisplayAffinity (Address: 0x180130848)
- GetWindowLongA (Address: 0x180130918)
- GetWindowRect (Address: 0x180130820)
- GetWindowTextW (Address: 0x180130838)
- GetWindowThreadProcessId (Address: 0x180130968)
- IsProcessDPIAware (Address: 0x180130950)
- IsWindow (Address: 0x1801309b0)
- IsWindowVisible (Address: 0x180130840)
- LoadBitmapA (Address: 0x180130810)
- MapVirtualKeyA (Address: 0x1801308a0)
- PostMessageA (Address: 0x1801308e0)
- PostThreadMessageA (Address: 0x1801309c0)
- RedrawWindow (Address: 0x1801309a0)
- RegisterClassExA (Address: 0x1801308c8)
- RegisterRawInputDevices (Address: 0x180130860)
- ReleaseDC (Address: 0x180130818)
- SendInput (Address: 0x1801308a8)
- SendMessageA (Address: 0x1801308f0)
- SendNotifyMessageA (Address: 0x1801308e8)
- SetCursor (Address: 0x180130988)
- SetCursorPos (Address: 0x180130990)
- SetForegroundWindow (Address: 0x180130920)
- SetWindowLongPtrA (Address: 0x180130890)
- SetWindowsHookExA (Address: 0x180130938)
- ShowCursor (Address: 0x180130998)
- SystemParametersInfoA (Address: 0x180130958)
- TranslateMessage (Address: 0x180130900)
- UnhookWindowsHookEx (Address: 0x180130930)
- UnregisterClassA (Address: 0x1801308d0)
- WindowFromPhysicalPoint (Address: 0x180130970)
VERSION.dll
- GetFileVersionInfoA (Address: 0x180130a80)
- GetFileVersionInfoSizeA (Address: 0x180130aa8)
- GetFileVersionInfoSizeW (Address: 0x180130a90)
- GetFileVersionInfoW (Address: 0x180130a98)
- VerQueryValueA (Address: 0x180130a88)
- VerQueryValueW (Address: 0x180130aa0)