nvdxgdmal32.dll
Description:
Authors:
Version:
Architecture: 32-bit
Operating System:
SHA256: b680a97ad8bfa91e43f4a47c7ab70e51
File Size: 458.0 KB
Uploaded At: Dec. 1, 2025, 7:49 a.m.
Views: 5
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: OpenProcess
Exported Functions
- dxgdmalDestroyExternalDescriptorObjects (Ordinal: 1, Address: 0x1040)
- dxgdmalEnumAdapters (Ordinal: 2, Address: 0x1000)
- dxgdmalGetAdapterCallbacks (Ordinal: 3, Address: 0x1010)
- dxgdmalImportFromExternalDescriptor (Ordinal: 4, Address: 0x1030)
Imported DLLs & Functions
ADVAPI32.dll
- EqualSid (Address: 0x1005f00c)
- GetSecurityInfo (Address: 0x1005f000)
- GetTokenInformation (Address: 0x1005f004)
- OpenProcessToken (Address: 0x1005f008)
KERNEL32.dll
- AcquireSRWLockExclusive (Address: 0x1005f0c8)
- AcquireSRWLockShared (Address: 0x1005f114)
- CloseHandle (Address: 0x1005f0e0)
- CompareStringW (Address: 0x1005f1fc)
- CreateDirectoryA (Address: 0x1005f138)
- CreateEventA (Address: 0x1005f144)
- CreateFileMappingA (Address: 0x1005f10c)
- CreateFileMappingNumaA (Address: 0x1005f020)
- CreateFileMappingW (Address: 0x1005f13c)
- CreateFileW (Address: 0x1005f16c)
- CreateProcessA (Address: 0x1005f18c)
- CreateProcessW (Address: 0x1005f180)
- CreateSemaphoreA (Address: 0x1005f140)
- CreateThread (Address: 0x1005f1dc)
- DecodePointer (Address: 0x1005f280)
- DeleteCriticalSection (Address: 0x1005f11c)
- DeleteFileA (Address: 0x1005f0d8)
- EncodePointer (Address: 0x1005f1c8)
- EnterCriticalSection (Address: 0x1005f03c)
- EnumSystemLocalesW (Address: 0x1005f210)
- ExitProcess (Address: 0x1005f1ec)
- ExitThread (Address: 0x1005f1e0)
- ExpandEnvironmentStringsW (Address: 0x1005f160)
- FindClose (Address: 0x1005f088)
- FindFirstFileA (Address: 0x1005f028)
- FindFirstFileExW (Address: 0x1005f230)
- FindNextFileA (Address: 0x1005f064)
- FindNextFileW (Address: 0x1005f234)
- FlushFileBuffers (Address: 0x1005f224)
- FreeEnvironmentStringsW (Address: 0x1005f25c)
- FreeLibrary (Address: 0x1005f12c)
- FreeLibraryAndExitThread (Address: 0x1005f090)
- GetACP (Address: 0x1005f23c)
- GetCommandLineA (Address: 0x1005f248)
- GetCommandLineW (Address: 0x1005f24c)
- GetComputerNameA (Address: 0x1005f154)
- GetConsoleMode (Address: 0x1005f218)
- GetConsoleOutputCP (Address: 0x1005f228)
- GetCPInfo (Address: 0x1005f244)
- GetCurrentDirectoryA (Address: 0x1005f09c)
- GetCurrentProcess (Address: 0x1005f044)
- GetCurrentProcessId (Address: 0x1005f124)
- GetCurrentThread (Address: 0x1005f0c4)
- GetCurrentThreadId (Address: 0x1005f094)
- GetDateFormatW (Address: 0x1005f1f4)
- GetEnvironmentStringsW (Address: 0x1005f258)
- GetEnvironmentVariableA (Address: 0x1005f104)
- GetFileAttributesExA (Address: 0x1005f024)
- GetFileAttributesW (Address: 0x1005f170)
- GetFileSizeEx (Address: 0x1005f22c)
- GetFileType (Address: 0x1005f1d8)
- GetFullPathNameW (Address: 0x1005f15c)
- GetLargePageMinimum (Address: 0x1005f07c)
- GetLastError (Address: 0x1005f0b4)
- GetLocaleInfoW (Address: 0x1005f204)
- GetLocalTime (Address: 0x1005f0f8)
- GetModuleFileNameA (Address: 0x1005f018)
- GetModuleFileNameW (Address: 0x1005f164)
- GetModuleHandleA (Address: 0x1005f0a4)
- GetModuleHandleExA (Address: 0x1005f0b0)
- GetModuleHandleExW (Address: 0x1005f1e8)
- GetModuleHandleW (Address: 0x1005f184)
- GetNativeSystemInfo (Address: 0x1005f0e8)
- GetNumaNodeProcessorMask (Address: 0x1005f0c0)
- GetOEMCP (Address: 0x1005f240)
- GetProcAddress (Address: 0x1005f108)
- GetProcessAffinityMask (Address: 0x1005f054)
- GetProcessHeap (Address: 0x1005f264)
- GetStartupInfoW (Address: 0x1005f1ac)
- GetStdHandle (Address: 0x1005f1f0)
- GetStringTypeW (Address: 0x1005f26c)
- GetSystemDirectoryW (Address: 0x1005f174)
- GetSystemInfo (Address: 0x1005f0ec)
- GetSystemTimeAsFileTime (Address: 0x1005f1b0)
- GetTimeFormatW (Address: 0x1005f1f8)
- GetUserDefaultLCID (Address: 0x1005f20c)
- GetWindowsDirectoryA (Address: 0x1005f284)
- GlobalMemoryStatusEx (Address: 0x1005f128)
- HeapAlloc (Address: 0x1005f0f4)
- HeapCreate (Address: 0x1005f02c)
- HeapDestroy (Address: 0x1005f100)
- HeapFree (Address: 0x1005f038)
- HeapReAlloc (Address: 0x1005f0dc)
- HeapSize (Address: 0x1005f274)
- InitializeConditionVariable (Address: 0x1005f070)
- InitializeCriticalSection (Address: 0x1005f06c)
- InitializeCriticalSectionAndSpinCount (Address: 0x1005f1c4)
- InitializeSListHead (Address: 0x1005f1b4)
- InitializeSRWLock (Address: 0x1005f014)
- InterlockedFlushSList (Address: 0x1005f1bc)
- InterlockedPushEntrySList (Address: 0x1005f1b8)
- IsDebuggerPresent (Address: 0x1005f1a8)
- IsProcessorFeaturePresent (Address: 0x1005f1a4)
- IsValidCodePage (Address: 0x1005f238)
- IsValidLocale (Address: 0x1005f208)
- LCMapStringW (Address: 0x1005f200)
- LeaveCriticalSection (Address: 0x1005f068)
- LoadLibraryA (Address: 0x1005f0cc)
- LoadLibraryExW (Address: 0x1005f194)
- LocalAlloc (Address: 0x1005f168)
- LocalFree (Address: 0x1005f178)
- LockFileEx (Address: 0x1005f110)
- lstrcmpW (Address: 0x1005f190)
- MapViewOfFile (Address: 0x1005f148)
- MultiByteToWideChar (Address: 0x1005f250)
- OpenFileMappingW (Address: 0x1005f098)
- OpenProcess (Address: 0x1005f0a8)
- OutputDebugStringW (Address: 0x1005f270)
- QueryPerformanceCounter (Address: 0x1005f14c)
- QueryPerformanceFrequency (Address: 0x1005f0d4)
- RaiseException (Address: 0x1005f1cc)
- ReadConsoleW (Address: 0x1005f21c)
- ReadFile (Address: 0x1005f1d0)
- ReleaseSemaphore (Address: 0x1005f048)
- ReleaseSRWLockExclusive (Address: 0x1005f0b8)
- ReleaseSRWLockShared (Address: 0x1005f0e4)
- RemoveDirectoryA (Address: 0x1005f118)
- ResetEvent (Address: 0x1005f0f0)
- ResumeThread (Address: 0x1005f1e4)
- RtlUnwind (Address: 0x1005f1c0)
- SetConsoleCtrlHandler (Address: 0x1005f268)
- SetEndOfFile (Address: 0x1005f278)
- SetEnvironmentVariableA (Address: 0x1005f120)
- SetEnvironmentVariableW (Address: 0x1005f260)
- SetEvent (Address: 0x1005f0bc)
- SetFilePointerEx (Address: 0x1005f214)
- SetLastError (Address: 0x1005f158)
- SetStdHandle (Address: 0x1005f1d4)
- SetThreadAffinityMask (Address: 0x1005f080)
- SetUnhandledExceptionFilter (Address: 0x1005f19c)
- Sleep (Address: 0x1005f0ac)
- SleepConditionVariableCS (Address: 0x1005f084)
- SwitchToThread (Address: 0x1005f0fc)
- TerminateProcess (Address: 0x1005f1a0)
- TlsAlloc (Address: 0x1005f0d0)
- TlsFree (Address: 0x1005f134)
- TlsGetValue (Address: 0x1005f130)
- TlsSetValue (Address: 0x1005f030)
- TryAcquireSRWLockExclusive (Address: 0x1005f04c)
- TryAcquireSRWLockShared (Address: 0x1005f074)
- TryEnterCriticalSection (Address: 0x1005f01c)
- UnhandledExceptionFilter (Address: 0x1005f198)
- UnlockFileEx (Address: 0x1005f078)
- UnmapViewOfFile (Address: 0x1005f0a0)
- VerifyVersionInfoW (Address: 0x1005f188)
- VerSetConditionMask (Address: 0x1005f17c)
- VirtualAlloc (Address: 0x1005f050)
- VirtualFree (Address: 0x1005f040)
- VirtualProtect (Address: 0x1005f034)
- VirtualQuery (Address: 0x1005f150)
- WaitForMultipleObjects (Address: 0x1005f060)
- WaitForSingleObject (Address: 0x1005f08c)
- WakeAllConditionVariable (Address: 0x1005f058)
- WakeConditionVariable (Address: 0x1005f05c)
- WideCharToMultiByte (Address: 0x1005f254)
- WriteConsoleW (Address: 0x1005f27c)
- WriteFile (Address: 0x1005f220)