nvdxgdmal64.dll
Description:
Authors:
Version:
Architecture: 64-bit
Operating System:
SHA256: 99941620754c42f22d2590d0da7644c2
File Size: 584.1 KB
Uploaded At: Dec. 1, 2025, 7:49 a.m.
Views: 5
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: OpenProcess
Exported Functions
- dxgdmalDestroyExternalDescriptorObjects (Ordinal: 1, Address: 0x1040)
- dxgdmalEnumAdapters (Ordinal: 2, Address: 0x1000)
- dxgdmalGetAdapterCallbacks (Ordinal: 3, Address: 0x1010)
- dxgdmalImportFromExternalDescriptor (Ordinal: 4, Address: 0x1030)
Imported DLLs & Functions
ADVAPI32.dll
- EqualSid (Address: 0x180071018)
- GetSecurityInfo (Address: 0x180071000)
- GetTokenInformation (Address: 0x180071008)
- OpenProcessToken (Address: 0x180071010)
KERNEL32.dll
- AcquireSRWLockExclusive (Address: 0x180071190)
- AcquireSRWLockShared (Address: 0x180071228)
- CloseHandle (Address: 0x1800711c0)
- CompareStringW (Address: 0x180071408)
- CreateDirectoryA (Address: 0x180071270)
- CreateEventA (Address: 0x180071288)
- CreateFileMappingA (Address: 0x180071218)
- CreateFileMappingNumaA (Address: 0x180071040)
- CreateFileMappingW (Address: 0x180071278)
- CreateFileW (Address: 0x1800712d0)
- CreateProcessA (Address: 0x180071310)
- CreateProcessW (Address: 0x1800712f8)
- CreateSemaphoreA (Address: 0x180071280)
- CreateThread (Address: 0x1800713c8)
- DeleteCriticalSection (Address: 0x180071238)
- DeleteFileA (Address: 0x1800711b0)
- EncodePointer (Address: 0x180071398)
- EnterCriticalSection (Address: 0x180071078)
- EnumSystemLocalesW (Address: 0x180071430)
- ExitProcess (Address: 0x1800713e8)
- ExitThread (Address: 0x1800713d0)
- FindClose (Address: 0x180071110)
- FindFirstFileA (Address: 0x180071050)
- FindFirstFileExW (Address: 0x180071470)
- FindNextFileA (Address: 0x1800710c8)
- FindNextFileW (Address: 0x180071478)
- FlushFileBuffers (Address: 0x180071458)
- FreeEnvironmentStringsW (Address: 0x1800714c8)
- FreeLibrary (Address: 0x180071258)
- FreeLibraryAndExitThread (Address: 0x180071120)
- GetACP (Address: 0x180071488)
- GetCommandLineA (Address: 0x1800714a0)
- GetCommandLineW (Address: 0x1800714a8)
- GetComputerNameA (Address: 0x1800712a8)
- GetConsoleMode (Address: 0x180071440)
- GetConsoleOutputCP (Address: 0x180071460)
- GetCPInfo (Address: 0x180071498)
- GetCurrentDirectoryA (Address: 0x180071138)
- GetCurrentProcess (Address: 0x180071088)
- GetCurrentProcessId (Address: 0x180071248)
- GetCurrentThread (Address: 0x180071188)
- GetCurrentThreadId (Address: 0x180071128)
- GetDateFormatW (Address: 0x1800713f8)
- GetEnvironmentStringsW (Address: 0x1800714c0)
- GetEnvironmentVariableA (Address: 0x180071208)
- GetFileAttributesExA (Address: 0x180071048)
- GetFileAttributesW (Address: 0x1800712d8)
- GetFileSizeEx (Address: 0x180071468)
- GetFileType (Address: 0x1800713c0)
- GetFullPathNameW (Address: 0x1800712b8)
- GetLargePageMinimum (Address: 0x1800710f8)
- GetLastError (Address: 0x180071168)
- GetLocaleInfoW (Address: 0x180071418)
- GetLocalTime (Address: 0x1800711f0)
- GetModuleFileNameA (Address: 0x180071030)
- GetModuleFileNameW (Address: 0x1800712c0)
- GetModuleHandleA (Address: 0x180071148)
- GetModuleHandleExA (Address: 0x180071160)
- GetModuleHandleExW (Address: 0x1800713e0)
- GetModuleHandleW (Address: 0x180071300)
- GetNativeSystemInfo (Address: 0x1800711d0)
- GetNumaNodeProcessorMask (Address: 0x180071180)
- GetOEMCP (Address: 0x180071490)
- GetProcAddress (Address: 0x180071210)
- GetProcessAffinityMask (Address: 0x1800710a8)
- GetProcessHeap (Address: 0x1800714d8)
- GetStartupInfoW (Address: 0x180071360)
- GetStdHandle (Address: 0x1800713f0)
- GetStringTypeW (Address: 0x1800714e8)
- GetSystemDirectoryW (Address: 0x1800712e0)
- GetSystemInfo (Address: 0x1800711d8)
- GetSystemTimeAsFileTime (Address: 0x180071368)
- GetTimeFormatW (Address: 0x180071400)
- GetUserDefaultLCID (Address: 0x180071428)
- GetWindowsDirectoryA (Address: 0x180071510)
- GlobalMemoryStatusEx (Address: 0x180071250)
- HeapAlloc (Address: 0x1800711e8)
- HeapCreate (Address: 0x180071058)
- HeapDestroy (Address: 0x180071200)
- HeapFree (Address: 0x180071070)
- HeapReAlloc (Address: 0x1800711b8)
- HeapSize (Address: 0x1800714f8)
- InitializeConditionVariable (Address: 0x1800710e0)
- InitializeCriticalSection (Address: 0x1800710d8)
- InitializeCriticalSectionAndSpinCount (Address: 0x180071390)
- InitializeSListHead (Address: 0x180071370)
- InitializeSRWLock (Address: 0x180071028)
- InterlockedFlushSList (Address: 0x180071388)
- InterlockedPushEntrySList (Address: 0x180071380)
- IsDebuggerPresent (Address: 0x180071358)
- IsProcessorFeaturePresent (Address: 0x180071350)
- IsValidCodePage (Address: 0x180071480)
- IsValidLocale (Address: 0x180071420)
- LCMapStringW (Address: 0x180071410)
- LeaveCriticalSection (Address: 0x1800710d0)
- LoadLibraryA (Address: 0x180071198)
- LoadLibraryExW (Address: 0x180071318)
- LocalAlloc (Address: 0x1800712c8)
- LocalFree (Address: 0x1800712e8)
- LockFileEx (Address: 0x180071220)
- MapViewOfFile (Address: 0x180071290)
- MultiByteToWideChar (Address: 0x1800714b0)
- OpenFileMappingW (Address: 0x180071130)
- OpenProcess (Address: 0x180071150)
- OutputDebugStringW (Address: 0x1800714f0)
- QueryPerformanceCounter (Address: 0x180071298)
- QueryPerformanceFrequency (Address: 0x1800711a8)
- RaiseException (Address: 0x1800713a0)
- ReadConsoleW (Address: 0x180071448)
- ReadFile (Address: 0x1800713b0)
- ReleaseSemaphore (Address: 0x180071090)
- ReleaseSRWLockExclusive (Address: 0x180071170)
- ReleaseSRWLockShared (Address: 0x1800711c8)
- RemoveDirectoryA (Address: 0x180071230)
- ResetEvent (Address: 0x1800711e0)
- ResumeThread (Address: 0x1800713d8)
- RtlCaptureContext (Address: 0x180071320)
- RtlLookupFunctionEntry (Address: 0x180071328)
- RtlPcToFileHeader (Address: 0x1800713a8)
- RtlUnwind (Address: 0x180071518)
- RtlUnwindEx (Address: 0x180071378)
- RtlVirtualUnwind (Address: 0x180071330)
- SetConsoleCtrlHandler (Address: 0x1800714e0)
- SetEndOfFile (Address: 0x180071500)
- SetEnvironmentVariableA (Address: 0x180071240)
- SetEnvironmentVariableW (Address: 0x1800714d0)
- SetEvent (Address: 0x180071178)
- SetFilePointerEx (Address: 0x180071438)
- SetLastError (Address: 0x1800712b0)
- SetStdHandle (Address: 0x1800713b8)
- SetThreadAffinityMask (Address: 0x180071100)
- SetUnhandledExceptionFilter (Address: 0x180071340)
- Sleep (Address: 0x180071158)
- SleepConditionVariableCS (Address: 0x180071108)
- SwitchToThread (Address: 0x1800711f8)
- TerminateProcess (Address: 0x180071348)
- TlsAlloc (Address: 0x1800711a0)
- TlsFree (Address: 0x180071268)
- TlsGetValue (Address: 0x180071260)
- TlsSetValue (Address: 0x180071060)
- TryAcquireSRWLockExclusive (Address: 0x180071098)
- TryAcquireSRWLockShared (Address: 0x1800710e8)
- TryEnterCriticalSection (Address: 0x180071038)
- UnhandledExceptionFilter (Address: 0x180071338)
- UnlockFileEx (Address: 0x1800710f0)
- UnmapViewOfFile (Address: 0x180071140)
- VerifyVersionInfoW (Address: 0x180071308)
- VerSetConditionMask (Address: 0x1800712f0)
- VirtualAlloc (Address: 0x1800710a0)
- VirtualFree (Address: 0x180071080)
- VirtualProtect (Address: 0x180071068)
- VirtualQuery (Address: 0x1800712a0)
- WaitForMultipleObjects (Address: 0x1800710c0)
- WaitForSingleObject (Address: 0x180071118)
- WakeAllConditionVariable (Address: 0x1800710b0)
- WakeConditionVariable (Address: 0x1800710b8)
- WideCharToMultiByte (Address: 0x1800714b8)
- WriteConsoleW (Address: 0x180071508)
- WriteFile (Address: 0x180071450)