NVPrxy32.dll

Description: NVIDIA Install Proxy

Authors: Copyright © 2010, 2023 NVIDIA Corporation. All rights reserved.

Version: 2.1002.418.0

Architecture: 32-bit

Operating System: Windows

SHA256: 43177d143e3a8738ee67389cd3b2c9f9

File Size: 1.1 MB

Uploaded At: Dec. 1, 2025, 7:49 a.m.

Views: 6

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess

Exported Functions

  • ProxyW (Ordinal: 1, Address: 0x1590)

Imported DLLs & Functions

ADVAPI32.dll
  • AdjustTokenPrivileges (Address: 0x100d5010)
  • GetTokenInformation (Address: 0x100d501c)
  • LookupPrivilegeValueW (Address: 0x100d5014)
  • LsaNtStatusToWinError (Address: 0x100d5034)
  • OpenProcessToken (Address: 0x100d5018)
  • RegCloseKey (Address: 0x100d5024)
  • RegDeleteKeyW (Address: 0x100d5004)
  • RegDeleteValueW (Address: 0x100d5008)
  • RegEnumKeyExW (Address: 0x100d500c)
  • RegEnumValueW (Address: 0x100d5020)
  • RegOpenCurrentUser (Address: 0x100d5000)
  • RegOpenKeyExW (Address: 0x100d5028)
  • RegQueryInfoKeyW (Address: 0x100d5030)
  • RegQueryValueExW (Address: 0x100d502c)
KERNEL32.dll
  • AreFileApisANSI (Address: 0x100d51f8)
  • ChangeTimerQueueTimer (Address: 0x100d51bc)
  • CloseHandle (Address: 0x100d50c4)
  • CompareStringW (Address: 0x100d5214)
  • CreateDirectoryW (Address: 0x100d5230)
  • CreateEventA (Address: 0x100d504c)
  • CreateEventW (Address: 0x100d52c8)
  • CreateFileMappingW (Address: 0x100d5260)
  • CreateFileW (Address: 0x100d5060)
  • CreateMutexW (Address: 0x100d505c)
  • CreateProcessW (Address: 0x100d5290)
  • CreateThread (Address: 0x100d51d0)
  • CreateTimerQueue (Address: 0x100d5174)
  • CreateTimerQueueTimer (Address: 0x100d51c0)
  • CreateToolhelp32Snapshot (Address: 0x100d529c)
  • DecodePointer (Address: 0x100d509c)
  • DeleteCriticalSection (Address: 0x100d50b4)
  • DeleteFileW (Address: 0x100d5234)
  • DeleteTimerQueueTimer (Address: 0x100d51b8)
  • DeviceIoControl (Address: 0x100d524c)
  • DuplicateHandle (Address: 0x100d5288)
  • EncodePointer (Address: 0x100d5218)
  • EnterCriticalSection (Address: 0x100d50c8)
  • EnumSystemLocalesW (Address: 0x100d5154)
  • ExitProcess (Address: 0x100d5108)
  • ExitThread (Address: 0x100d516c)
  • ExpandEnvironmentStringsW (Address: 0x100d5104)
  • FindClose (Address: 0x100d5238)
  • FindFirstFileExA (Address: 0x100d5138)
  • FindFirstFileW (Address: 0x100d523c)
  • FindNextFileA (Address: 0x100d5134)
  • FindNextFileW (Address: 0x100d5240)
  • FindResourceExW (Address: 0x100d50ec)
  • FindResourceW (Address: 0x100d50f0)
  • FlushFileBuffers (Address: 0x100d5204)
  • FormatMessageA (Address: 0x100d5048)
  • FormatMessageW (Address: 0x100d5044)
  • FreeEnvironmentStringsW (Address: 0x100d511c)
  • FreeLibrary (Address: 0x100d5278)
  • FreeLibraryAndExitThread (Address: 0x100d519c)
  • GetACP (Address: 0x100d5150)
  • GetCommandLineA (Address: 0x100d5128)
  • GetCommandLineW (Address: 0x100d5124)
  • GetConsoleCP (Address: 0x100d5144)
  • GetConsoleMode (Address: 0x100d5140)
  • GetCPInfo (Address: 0x100d5208)
  • GetCurrentDirectoryW (Address: 0x100d522c)
  • GetCurrentProcess (Address: 0x100d50d4)
  • GetCurrentProcessId (Address: 0x100d5080)
  • GetCurrentThread (Address: 0x100d5250)
  • GetCurrentThreadId (Address: 0x100d5058)
  • GetDateFormatW (Address: 0x100d5164)
  • GetEnvironmentStringsW (Address: 0x100d5120)
  • GetExitCodeThread (Address: 0x100d50bc)
  • GetFileAttributesW (Address: 0x100d5068)
  • GetFileInformationByHandle (Address: 0x100d5200)
  • GetFileSizeEx (Address: 0x100d5078)
  • GetFileType (Address: 0x100d5148)
  • GetFullPathNameW (Address: 0x100d52ac)
  • GetLastError (Address: 0x100d50c0)
  • GetLocaleInfoW (Address: 0x100d520c)
  • GetLogicalProcessorInformation (Address: 0x100d51c4)
  • GetModuleFileNameA (Address: 0x100d52b0)
  • GetModuleFileNameW (Address: 0x100d506c)
  • GetModuleHandleA (Address: 0x100d52b4)
  • GetModuleHandleExW (Address: 0x100d527c)
  • GetModuleHandleW (Address: 0x100d52b8)
  • GetNumaHighestNodeNumber (Address: 0x100d51b4)
  • GetOEMCP (Address: 0x100d512c)
  • GetProcAddress (Address: 0x100d5280)
  • GetProcessAffinityMask (Address: 0x100d51b0)
  • GetProcessHeap (Address: 0x100d50d0)
  • GetProcessId (Address: 0x100d5294)
  • GetProcessTimes (Address: 0x100d5070)
  • GetStartupInfoW (Address: 0x100d51dc)
  • GetStdHandle (Address: 0x100d514c)
  • GetStringTypeW (Address: 0x100d52c0)
  • GetSystemDirectoryW (Address: 0x100d5258)
  • GetSystemInfo (Address: 0x100d5220)
  • GetSystemTimeAsFileTime (Address: 0x100d50a4)
  • GetSystemWindowsDirectoryW (Address: 0x100d525c)
  • GetTempPathW (Address: 0x100d5084)
  • GetThreadPriority (Address: 0x100d51c8)
  • GetThreadTimes (Address: 0x100d51a0)
  • GetTickCount (Address: 0x100d5254)
  • GetTimeFormatW (Address: 0x100d5160)
  • GetTimeZoneInformation (Address: 0x100d5168)
  • GetUserDefaultLCID (Address: 0x100d5158)
  • GetVersionExW (Address: 0x100d5224)
  • HeapAlloc (Address: 0x100d50d8)
  • HeapDestroy (Address: 0x100d50e8)
  • HeapFree (Address: 0x100d50dc)
  • HeapReAlloc (Address: 0x100d50e0)
  • HeapSize (Address: 0x100d50e4)
  • InitializeCriticalSectionAndSpinCount (Address: 0x100d5090)
  • InitializeSListHead (Address: 0x100d51ec)
  • InterlockedFlushSList (Address: 0x100d5180)
  • InterlockedPopEntrySList (Address: 0x100d5188)
  • InterlockedPushEntrySList (Address: 0x100d5184)
  • IsDebuggerPresent (Address: 0x100d51f4)
  • IsProcessorFeaturePresent (Address: 0x100d51e0)
  • IsValidCodePage (Address: 0x100d5130)
  • IsValidLocale (Address: 0x100d515c)
  • LCMapStringW (Address: 0x100d5210)
  • LeaveCriticalSection (Address: 0x100d5100)
  • LoadLibraryExW (Address: 0x100d52bc)
  • LoadLibraryW (Address: 0x100d5284)
  • LoadResource (Address: 0x100d50f4)
  • LocalAlloc (Address: 0x100d52a8)
  • LocalFree (Address: 0x100d5040)
  • LockResource (Address: 0x100d50f8)
  • lstrcmpW (Address: 0x100d526c)
  • MapViewOfFile (Address: 0x100d5264)
  • MoveFileExW (Address: 0x100d5270)
  • MultiByteToWideChar (Address: 0x100d5274)
  • OpenEventA (Address: 0x100d50a0)
  • OpenProcess (Address: 0x100d5298)
  • OutputDebugStringW (Address: 0x100d503c)
  • Process32FirstW (Address: 0x100d52a0)
  • Process32NextW (Address: 0x100d52a4)
  • QueryDepthSList (Address: 0x100d517c)
  • QueryDosDeviceW (Address: 0x100d5244)
  • QueryPerformanceCounter (Address: 0x100d50ac)
  • QueryPerformanceFrequency (Address: 0x100d50a8)
  • RaiseException (Address: 0x100d5098)
  • ReadConsoleW (Address: 0x100d5110)
  • ReadFile (Address: 0x100d513c)
  • RegisterWaitForSingleObject (Address: 0x100d51a8)
  • ReleaseMutex (Address: 0x100d507c)
  • ReleaseSemaphore (Address: 0x100d518c)
  • RemoveDirectoryW (Address: 0x100d5064)
  • ResetEvent (Address: 0x100d51f0)
  • ResumeThread (Address: 0x100d5094)
  • RtlUnwind (Address: 0x100d5170)
  • SetCurrentDirectoryW (Address: 0x100d5228)
  • SetEnvironmentVariableA (Address: 0x100d5118)
  • SetEvent (Address: 0x100d5050)
  • SetFileAttributesW (Address: 0x100d5248)
  • SetFilePointerEx (Address: 0x100d51fc)
  • SetLastError (Address: 0x100d50b0)
  • SetStdHandle (Address: 0x100d5114)
  • SetThreadAffinityMask (Address: 0x100d51ac)
  • SetThreadPriority (Address: 0x100d51cc)
  • SetUnhandledExceptionFilter (Address: 0x100d51e4)
  • SignalObjectAndWait (Address: 0x100d51d8)
  • SizeofResource (Address: 0x100d50fc)
  • Sleep (Address: 0x100d52cc)
  • SwitchToThread (Address: 0x100d51d4)
  • TerminateProcess (Address: 0x100d528c)
  • TlsAlloc (Address: 0x100d52d0)
  • TlsFree (Address: 0x100d521c)
  • TlsGetValue (Address: 0x100d52d4)
  • TlsSetValue (Address: 0x100d52d8)
  • TryEnterCriticalSection (Address: 0x100d52c4)
  • UnhandledExceptionFilter (Address: 0x100d51e8)
  • UnmapViewOfFile (Address: 0x100d5268)
  • UnregisterWait (Address: 0x100d51a4)
  • UnregisterWaitEx (Address: 0x100d5178)
  • VerifyVersionInfoW (Address: 0x100d5088)
  • VerSetConditionMask (Address: 0x100d508c)
  • VirtualAlloc (Address: 0x100d5198)
  • VirtualFree (Address: 0x100d5190)
  • VirtualProtect (Address: 0x100d5194)
  • WaitForSingleObject (Address: 0x100d50b8)
  • WaitForSingleObjectEx (Address: 0x100d5054)
  • WideCharToMultiByte (Address: 0x100d50cc)
  • WriteConsoleW (Address: 0x100d510c)
  • WriteFile (Address: 0x100d5074)
ole32.dll
  • CoCreateInstance (Address: 0x100d53f0)
  • CoInitialize (Address: 0x100d53ec)
  • CoInitializeEx (Address: 0x100d53e8)
  • CoUninitialize (Address: 0x100d53e4)
  • PropVariantClear (Address: 0x100d53e0)
OLEAUT32.dll
  • SafeArrayCreate (Address: 0x100d52f8)
  • SafeArrayDestroy (Address: 0x100d52f4)
  • SafeArrayGetLBound (Address: 0x100d52ec)
  • SafeArrayGetUBound (Address: 0x100d52f0)
  • SafeArrayLock (Address: 0x100d52e8)
  • SafeArrayUnlock (Address: 0x100d52e4)
  • SysAllocString (Address: 0x100d52e0)
  • SysAllocStringLen (Address: 0x100d530c)
  • SysFreeString (Address: 0x100d5310)
  • SysStringLen (Address: 0x100d5304)
  • VariantChangeType (Address: 0x100d5308)
  • VariantClear (Address: 0x100d52fc)
  • VariantInit (Address: 0x100d5300)
PSAPI.DLL
  • GetProcessImageFileNameW (Address: 0x100d5318)
RPCRT4.dll
  • NdrServerCall2 (Address: 0x100d5338)
  • RpcMgmtStopServerListening (Address: 0x100d532c)
  • RpcMgmtWaitServerListen (Address: 0x100d5330)
  • RpcServerListen (Address: 0x100d5328)
  • RpcServerRegisterIfEx (Address: 0x100d5324)
  • RpcServerUnregisterIf (Address: 0x100d5334)
  • RpcServerUseProtseqEpW (Address: 0x100d5320)
SETUPAPI.dll
  • CM_Get_Device_IDW (Address: 0x100d534c)
  • CM_Get_DevNode_Status (Address: 0x100d5344)
  • SetupCopyOEMInfW (Address: 0x100d536c)
  • SetupDiBuildDriverInfoList (Address: 0x100d5384)
  • SetupDiCallClassInstaller (Address: 0x100d53b0)
  • SetupDiCreateDeviceInfoList (Address: 0x100d5354)
  • SetupDiCreateDeviceInfoW (Address: 0x100d5374)
  • SetupDiDeleteDeviceInfo (Address: 0x100d537c)
  • SetupDiDestroyDeviceInfoList (Address: 0x100d5358)
  • SetupDiEnumDeviceInfo (Address: 0x100d5380)
  • SetupDiEnumDriverInfoW (Address: 0x100d5388)
  • SetupDiGetClassDevsW (Address: 0x100d5348)
  • SetupDiGetClassInstallParamsW (Address: 0x100d5360)
  • SetupDiGetDeviceInstallParamsW (Address: 0x100d535c)
  • SetupDiGetDeviceInstanceIdW (Address: 0x100d5378)
  • SetupDiGetDeviceRegistryPropertyW (Address: 0x100d5398)
  • SetupDiGetDriverInfoDetailW (Address: 0x100d53a4)
  • SetupDiGetSelectedDriverW (Address: 0x100d538c)
  • SetupDiInstallDevice (Address: 0x100d53ac)
  • SetupDiOpenDeviceInfoW (Address: 0x100d5350)
  • SetupDiOpenDevRegKey (Address: 0x100d539c)
  • SetupDiSetClassInstallParamsW (Address: 0x100d5390)
  • SetupDiSetDeviceInstallParamsW (Address: 0x100d5364)
  • SetupDiSetDeviceRegistryPropertyW (Address: 0x100d5394)
  • SetupDiSetSelectedDevice (Address: 0x100d53a8)
  • SetupDiSetSelectedDriverW (Address: 0x100d53a0)
  • SetupGetFieldCount (Address: 0x100d5340)
  • SetupGetStringFieldW (Address: 0x100d5368)
  • SetupUninstallOEMInfW (Address: 0x100d5370)
SHELL32.dll
  • ShellExecuteExW (Address: 0x100d53b8)
  • SHGetFolderPathW (Address: 0x100d53bc)
SHLWAPI.dll
  • PathFindFileNameW (Address: 0x100d53c4)
  • SHStrDupW (Address: 0x100d53c8)
USER32.dll
  • GetMessageW (Address: 0x100d53d4)
  • PostQuitMessage (Address: 0x100d53d8)
  • SetTimer (Address: 0x100d53d0)