nvdxgdmal32.dll

Description:

Authors:

Version:

Architecture: 32-bit

Operating System:

SHA256: b680a97ad8bfa91e43f4a47c7ab70e51

File Size: 458.0 KB

Uploaded At: Dec. 1, 2025, 7:49 a.m.

Views: 5

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess

Exported Functions

  • dxgdmalDestroyExternalDescriptorObjects (Ordinal: 1, Address: 0x1040)
  • dxgdmalEnumAdapters (Ordinal: 2, Address: 0x1000)
  • dxgdmalGetAdapterCallbacks (Ordinal: 3, Address: 0x1010)
  • dxgdmalImportFromExternalDescriptor (Ordinal: 4, Address: 0x1030)

Imported DLLs & Functions

ADVAPI32.dll
  • EqualSid (Address: 0x1005f00c)
  • GetSecurityInfo (Address: 0x1005f000)
  • GetTokenInformation (Address: 0x1005f004)
  • OpenProcessToken (Address: 0x1005f008)
KERNEL32.dll
  • AcquireSRWLockExclusive (Address: 0x1005f0c8)
  • AcquireSRWLockShared (Address: 0x1005f114)
  • CloseHandle (Address: 0x1005f0e0)
  • CompareStringW (Address: 0x1005f1fc)
  • CreateDirectoryA (Address: 0x1005f138)
  • CreateEventA (Address: 0x1005f144)
  • CreateFileMappingA (Address: 0x1005f10c)
  • CreateFileMappingNumaA (Address: 0x1005f020)
  • CreateFileMappingW (Address: 0x1005f13c)
  • CreateFileW (Address: 0x1005f16c)
  • CreateProcessA (Address: 0x1005f18c)
  • CreateProcessW (Address: 0x1005f180)
  • CreateSemaphoreA (Address: 0x1005f140)
  • CreateThread (Address: 0x1005f1dc)
  • DecodePointer (Address: 0x1005f280)
  • DeleteCriticalSection (Address: 0x1005f11c)
  • DeleteFileA (Address: 0x1005f0d8)
  • EncodePointer (Address: 0x1005f1c8)
  • EnterCriticalSection (Address: 0x1005f03c)
  • EnumSystemLocalesW (Address: 0x1005f210)
  • ExitProcess (Address: 0x1005f1ec)
  • ExitThread (Address: 0x1005f1e0)
  • ExpandEnvironmentStringsW (Address: 0x1005f160)
  • FindClose (Address: 0x1005f088)
  • FindFirstFileA (Address: 0x1005f028)
  • FindFirstFileExW (Address: 0x1005f230)
  • FindNextFileA (Address: 0x1005f064)
  • FindNextFileW (Address: 0x1005f234)
  • FlushFileBuffers (Address: 0x1005f224)
  • FreeEnvironmentStringsW (Address: 0x1005f25c)
  • FreeLibrary (Address: 0x1005f12c)
  • FreeLibraryAndExitThread (Address: 0x1005f090)
  • GetACP (Address: 0x1005f23c)
  • GetCommandLineA (Address: 0x1005f248)
  • GetCommandLineW (Address: 0x1005f24c)
  • GetComputerNameA (Address: 0x1005f154)
  • GetConsoleMode (Address: 0x1005f218)
  • GetConsoleOutputCP (Address: 0x1005f228)
  • GetCPInfo (Address: 0x1005f244)
  • GetCurrentDirectoryA (Address: 0x1005f09c)
  • GetCurrentProcess (Address: 0x1005f044)
  • GetCurrentProcessId (Address: 0x1005f124)
  • GetCurrentThread (Address: 0x1005f0c4)
  • GetCurrentThreadId (Address: 0x1005f094)
  • GetDateFormatW (Address: 0x1005f1f4)
  • GetEnvironmentStringsW (Address: 0x1005f258)
  • GetEnvironmentVariableA (Address: 0x1005f104)
  • GetFileAttributesExA (Address: 0x1005f024)
  • GetFileAttributesW (Address: 0x1005f170)
  • GetFileSizeEx (Address: 0x1005f22c)
  • GetFileType (Address: 0x1005f1d8)
  • GetFullPathNameW (Address: 0x1005f15c)
  • GetLargePageMinimum (Address: 0x1005f07c)
  • GetLastError (Address: 0x1005f0b4)
  • GetLocaleInfoW (Address: 0x1005f204)
  • GetLocalTime (Address: 0x1005f0f8)
  • GetModuleFileNameA (Address: 0x1005f018)
  • GetModuleFileNameW (Address: 0x1005f164)
  • GetModuleHandleA (Address: 0x1005f0a4)
  • GetModuleHandleExA (Address: 0x1005f0b0)
  • GetModuleHandleExW (Address: 0x1005f1e8)
  • GetModuleHandleW (Address: 0x1005f184)
  • GetNativeSystemInfo (Address: 0x1005f0e8)
  • GetNumaNodeProcessorMask (Address: 0x1005f0c0)
  • GetOEMCP (Address: 0x1005f240)
  • GetProcAddress (Address: 0x1005f108)
  • GetProcessAffinityMask (Address: 0x1005f054)
  • GetProcessHeap (Address: 0x1005f264)
  • GetStartupInfoW (Address: 0x1005f1ac)
  • GetStdHandle (Address: 0x1005f1f0)
  • GetStringTypeW (Address: 0x1005f26c)
  • GetSystemDirectoryW (Address: 0x1005f174)
  • GetSystemInfo (Address: 0x1005f0ec)
  • GetSystemTimeAsFileTime (Address: 0x1005f1b0)
  • GetTimeFormatW (Address: 0x1005f1f8)
  • GetUserDefaultLCID (Address: 0x1005f20c)
  • GetWindowsDirectoryA (Address: 0x1005f284)
  • GlobalMemoryStatusEx (Address: 0x1005f128)
  • HeapAlloc (Address: 0x1005f0f4)
  • HeapCreate (Address: 0x1005f02c)
  • HeapDestroy (Address: 0x1005f100)
  • HeapFree (Address: 0x1005f038)
  • HeapReAlloc (Address: 0x1005f0dc)
  • HeapSize (Address: 0x1005f274)
  • InitializeConditionVariable (Address: 0x1005f070)
  • InitializeCriticalSection (Address: 0x1005f06c)
  • InitializeCriticalSectionAndSpinCount (Address: 0x1005f1c4)
  • InitializeSListHead (Address: 0x1005f1b4)
  • InitializeSRWLock (Address: 0x1005f014)
  • InterlockedFlushSList (Address: 0x1005f1bc)
  • InterlockedPushEntrySList (Address: 0x1005f1b8)
  • IsDebuggerPresent (Address: 0x1005f1a8)
  • IsProcessorFeaturePresent (Address: 0x1005f1a4)
  • IsValidCodePage (Address: 0x1005f238)
  • IsValidLocale (Address: 0x1005f208)
  • LCMapStringW (Address: 0x1005f200)
  • LeaveCriticalSection (Address: 0x1005f068)
  • LoadLibraryA (Address: 0x1005f0cc)
  • LoadLibraryExW (Address: 0x1005f194)
  • LocalAlloc (Address: 0x1005f168)
  • LocalFree (Address: 0x1005f178)
  • LockFileEx (Address: 0x1005f110)
  • lstrcmpW (Address: 0x1005f190)
  • MapViewOfFile (Address: 0x1005f148)
  • MultiByteToWideChar (Address: 0x1005f250)
  • OpenFileMappingW (Address: 0x1005f098)
  • OpenProcess (Address: 0x1005f0a8)
  • OutputDebugStringW (Address: 0x1005f270)
  • QueryPerformanceCounter (Address: 0x1005f14c)
  • QueryPerformanceFrequency (Address: 0x1005f0d4)
  • RaiseException (Address: 0x1005f1cc)
  • ReadConsoleW (Address: 0x1005f21c)
  • ReadFile (Address: 0x1005f1d0)
  • ReleaseSemaphore (Address: 0x1005f048)
  • ReleaseSRWLockExclusive (Address: 0x1005f0b8)
  • ReleaseSRWLockShared (Address: 0x1005f0e4)
  • RemoveDirectoryA (Address: 0x1005f118)
  • ResetEvent (Address: 0x1005f0f0)
  • ResumeThread (Address: 0x1005f1e4)
  • RtlUnwind (Address: 0x1005f1c0)
  • SetConsoleCtrlHandler (Address: 0x1005f268)
  • SetEndOfFile (Address: 0x1005f278)
  • SetEnvironmentVariableA (Address: 0x1005f120)
  • SetEnvironmentVariableW (Address: 0x1005f260)
  • SetEvent (Address: 0x1005f0bc)
  • SetFilePointerEx (Address: 0x1005f214)
  • SetLastError (Address: 0x1005f158)
  • SetStdHandle (Address: 0x1005f1d4)
  • SetThreadAffinityMask (Address: 0x1005f080)
  • SetUnhandledExceptionFilter (Address: 0x1005f19c)
  • Sleep (Address: 0x1005f0ac)
  • SleepConditionVariableCS (Address: 0x1005f084)
  • SwitchToThread (Address: 0x1005f0fc)
  • TerminateProcess (Address: 0x1005f1a0)
  • TlsAlloc (Address: 0x1005f0d0)
  • TlsFree (Address: 0x1005f134)
  • TlsGetValue (Address: 0x1005f130)
  • TlsSetValue (Address: 0x1005f030)
  • TryAcquireSRWLockExclusive (Address: 0x1005f04c)
  • TryAcquireSRWLockShared (Address: 0x1005f074)
  • TryEnterCriticalSection (Address: 0x1005f01c)
  • UnhandledExceptionFilter (Address: 0x1005f198)
  • UnlockFileEx (Address: 0x1005f078)
  • UnmapViewOfFile (Address: 0x1005f0a0)
  • VerifyVersionInfoW (Address: 0x1005f188)
  • VerSetConditionMask (Address: 0x1005f17c)
  • VirtualAlloc (Address: 0x1005f050)
  • VirtualFree (Address: 0x1005f040)
  • VirtualProtect (Address: 0x1005f034)
  • VirtualQuery (Address: 0x1005f150)
  • WaitForMultipleObjects (Address: 0x1005f060)
  • WaitForSingleObject (Address: 0x1005f08c)
  • WakeAllConditionVariable (Address: 0x1005f058)
  • WakeConditionVariable (Address: 0x1005f05c)
  • WideCharToMultiByte (Address: 0x1005f254)
  • WriteConsoleW (Address: 0x1005f27c)
  • WriteFile (Address: 0x1005f220)