NvAppExt.dll
Description: NVIDIA NvApp Install Helper
Authors: Copyright © 2010, 2025 NVIDIA Corporation. All rights reserved.
Version: 2.1002.438.0
Architecture: 32-bit
Operating System: Windows
SHA256: 41788dfaf00b363b0adcae4cd8b55c36
File Size: 1.4 MB
Uploaded At: Dec. 1, 2025, 2:53 p.m.
Views: 6
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: OpenProcess
Exported Functions
- DllCanUnloadNow (Ordinal: 1, Address: 0xc9560)
- DllGetClassObject (Ordinal: 2, Address: 0xc9520)
- DllInstall (Ordinal: 3, Address: 0xc94f0)
- DllRegisterServer (Ordinal: 4, Address: 0xc9510)
- DllUnregisterServer (Ordinal: 5, Address: 0xc9500)
Imported DLLs & Functions
ADVAPI32.dll
- AccessCheck (Address: 0x100f602c)
- DuplicateToken (Address: 0x100f6028)
- GetFileSecurityW (Address: 0x100f6024)
- GetTokenInformation (Address: 0x100f6038)
- IsTextUnicode (Address: 0x100f601c)
- LsaNtStatusToWinError (Address: 0x100f6004)
- MapGenericMask (Address: 0x100f6020)
- OpenProcessToken (Address: 0x100f6034)
- OpenThreadToken (Address: 0x100f6030)
- RegCloseKey (Address: 0x100f6044)
- RegCopyTreeW (Address: 0x100f6000)
- RegCreateKeyExW (Address: 0x100f6040)
- RegDeleteKeyW (Address: 0x100f6014)
- RegDeleteValueW (Address: 0x100f6010)
- RegEnumKeyExW (Address: 0x100f600c)
- RegEnumValueW (Address: 0x100f603c)
- RegOpenCurrentUser (Address: 0x100f6018)
- RegOpenKeyExW (Address: 0x100f6048)
- RegQueryInfoKeyW (Address: 0x100f6008)
- RegQueryValueExW (Address: 0x100f604c)
KERNEL32.dll
- AreFileApisANSI (Address: 0x100f627c)
- ChangeTimerQueueTimer (Address: 0x100f62e8)
- CloseHandle (Address: 0x100f6068)
- CompareStringW (Address: 0x100f629c)
- CopyFileExW (Address: 0x100f6120)
- CopyFileW (Address: 0x100f611c)
- CreateDirectoryW (Address: 0x100f60dc)
- CreateEventA (Address: 0x100f6078)
- CreateEventW (Address: 0x100f60c0)
- CreateFileMappingW (Address: 0x100f610c)
- CreateFileW (Address: 0x100f608c)
- CreateHardLinkW (Address: 0x100f6280)
- CreateMutexW (Address: 0x100f6088)
- CreateProcessW (Address: 0x100f6130)
- CreateThread (Address: 0x100f62d4)
- CreateTimerQueue (Address: 0x100f61e0)
- CreateTimerQueueTimer (Address: 0x100f62e4)
- CreateToolhelp32Snapshot (Address: 0x100f60c4)
- DecodePointer (Address: 0x100f61c0)
- DeleteCriticalSection (Address: 0x100f61bc)
- DeleteFileW (Address: 0x100f60e0)
- DeleteTimerQueueTimer (Address: 0x100f62ec)
- DeviceIoControl (Address: 0x100f60fc)
- DuplicateHandle (Address: 0x100f60d0)
- EncodePointer (Address: 0x100f61ac)
- EnterCriticalSection (Address: 0x100f61a8)
- EnumSystemLocalesW (Address: 0x100f624c)
- ExitProcess (Address: 0x100f62fc)
- ExpandEnvironmentStringsW (Address: 0x100f609c)
- FindClose (Address: 0x100f60e4)
- FindFirstFileExA (Address: 0x100f6230)
- FindFirstFileExW (Address: 0x100f626c)
- FindFirstFileW (Address: 0x100f60e8)
- FindNextFileA (Address: 0x100f622c)
- FindNextFileW (Address: 0x100f60ec)
- FindResourceExW (Address: 0x100f6190)
- FindResourceW (Address: 0x100f6194)
- FlushFileBuffers (Address: 0x100f62ac)
- FormatMessageA (Address: 0x100f6074)
- FormatMessageW (Address: 0x100f6070)
- FreeEnvironmentStringsW (Address: 0x100f6214)
- FreeLibrary (Address: 0x100f6144)
- FreeLibraryAndExitThread (Address: 0x100f6208)
- GetACP (Address: 0x100f6248)
- GetCommandLineA (Address: 0x100f6220)
- GetCommandLineW (Address: 0x100f621c)
- GetConsoleCP (Address: 0x100f623c)
- GetConsoleMode (Address: 0x100f6238)
- GetCPInfo (Address: 0x100f62a8)
- GetCurrentDirectoryW (Address: 0x100f60d8)
- GetCurrentProcess (Address: 0x100f6060)
- GetCurrentProcessId (Address: 0x100f60b0)
- GetCurrentThread (Address: 0x100f6100)
- GetCurrentThreadId (Address: 0x100f6084)
- GetDateFormatW (Address: 0x100f625c)
- GetEnvironmentStringsW (Address: 0x100f6218)
- GetExitCodeProcess (Address: 0x100f612c)
- GetFileAttributesExW (Address: 0x100f60f0)
- GetFileAttributesW (Address: 0x100f6094)
- GetFileInformationByHandle (Address: 0x100f6270)
- GetFileSizeEx (Address: 0x100f60a4)
- GetFileType (Address: 0x100f6240)
- GetFullPathNameW (Address: 0x100f6160)
- GetLastError (Address: 0x100f61b4)
- GetLocaleInfoW (Address: 0x100f62a4)
- GetLogicalProcessorInformation (Address: 0x100f62e0)
- GetModuleFileNameA (Address: 0x100f6164)
- GetModuleFileNameW (Address: 0x100f6098)
- GetModuleHandleA (Address: 0x100f6168)
- GetModuleHandleExW (Address: 0x100f6148)
- GetModuleHandleW (Address: 0x100f616c)
- GetNumaHighestNodeNumber (Address: 0x100f62f0)
- GetOEMCP (Address: 0x100f6224)
- GetProcAddress (Address: 0x100f614c)
- GetProcessAffinityMask (Address: 0x100f62f4)
- GetProcessHeap (Address: 0x100f6178)
- GetProcessId (Address: 0x100f6134)
- GetProcessTimes (Address: 0x100f605c)
- GetStartupInfoW (Address: 0x100f62c8)
- GetStdHandle (Address: 0x100f6244)
- GetStringTypeW (Address: 0x100f6268)
- GetSystemDirectoryW (Address: 0x100f6108)
- GetSystemInfo (Address: 0x100f6154)
- GetSystemTimeAsFileTime (Address: 0x100f6058)
- GetTempPathW (Address: 0x100f60b4)
- GetThreadPriority (Address: 0x100f62dc)
- GetThreadTimes (Address: 0x100f60c8)
- GetTickCount (Address: 0x100f6104)
- GetTimeFormatW (Address: 0x100f6258)
- GetTimeZoneInformation (Address: 0x100f6260)
- GetUserDefaultLCID (Address: 0x100f6250)
- GetVersionExW (Address: 0x100f615c)
- HeapAlloc (Address: 0x100f617c)
- HeapDestroy (Address: 0x100f618c)
- HeapFree (Address: 0x100f6180)
- HeapReAlloc (Address: 0x100f6184)
- HeapSize (Address: 0x100f6188)
- InitializeCriticalSectionAndSpinCount (Address: 0x100f6288)
- InitializeCriticalSectionEx (Address: 0x100f61b0)
- InitializeSListHead (Address: 0x100f62b8)
- InterlockedFlushSList (Address: 0x100f61ec)
- InterlockedPopEntrySList (Address: 0x100f61f4)
- InterlockedPushEntrySList (Address: 0x100f61f0)
- IsDebuggerPresent (Address: 0x100f62b0)
- IsProcessorFeaturePresent (Address: 0x100f62c4)
- IsValidCodePage (Address: 0x100f6228)
- IsValidLocale (Address: 0x100f6254)
- LCMapStringW (Address: 0x100f62a0)
- LeaveCriticalSection (Address: 0x100f61a4)
- LoadLibraryExW (Address: 0x100f6170)
- LoadLibraryW (Address: 0x100f6150)
- LoadResource (Address: 0x100f6198)
- LocalAlloc (Address: 0x100f6158)
- LocalFree (Address: 0x100f606c)
- LockResource (Address: 0x100f619c)
- lstrcmpW (Address: 0x100f6118)
- MapViewOfFile (Address: 0x100f6110)
- MoveFileExW (Address: 0x100f6124)
- MultiByteToWideChar (Address: 0x100f60d4)
- OpenEventA (Address: 0x100f61c4)
- OpenProcess (Address: 0x100f6138)
- OutputDebugStringW (Address: 0x100f6064)
- Process32FirstW (Address: 0x100f613c)
- Process32NextW (Address: 0x100f6140)
- QueryDepthSList (Address: 0x100f61e8)
- QueryDosDeviceW (Address: 0x100f61c8)
- QueryPerformanceCounter (Address: 0x100f60f4)
- QueryPerformanceFrequency (Address: 0x100f6054)
- RaiseException (Address: 0x100f61b8)
- ReadConsoleW (Address: 0x100f61d0)
- ReadFile (Address: 0x100f6234)
- RegisterWaitForSingleObject (Address: 0x100f6210)
- ReleaseMutex (Address: 0x100f60a8)
- ReleaseSemaphore (Address: 0x100f61f8)
- RemoveDirectoryW (Address: 0x100f6090)
- ResetEvent (Address: 0x100f62b4)
- RtlUnwind (Address: 0x100f61dc)
- SetEndOfFile (Address: 0x100f6274)
- SetEnvironmentVariableA (Address: 0x100f61d8)
- SetEvent (Address: 0x100f607c)
- SetFileAttributesW (Address: 0x100f60f8)
- SetFilePointerEx (Address: 0x100f6278)
- SetLastError (Address: 0x100f60cc)
- SetStdHandle (Address: 0x100f61d4)
- SetThreadAffinityMask (Address: 0x100f62f8)
- SetThreadPriority (Address: 0x100f62d8)
- SetUnhandledExceptionFilter (Address: 0x100f62c0)
- SignalObjectAndWait (Address: 0x100f62cc)
- SizeofResource (Address: 0x100f61a0)
- Sleep (Address: 0x100f6264)
- SwitchToThread (Address: 0x100f62d0)
- TerminateProcess (Address: 0x100f6128)
- TlsAlloc (Address: 0x100f628c)
- TlsFree (Address: 0x100f6298)
- TlsGetValue (Address: 0x100f6290)
- TlsSetValue (Address: 0x100f6294)
- TryEnterCriticalSection (Address: 0x100f6284)
- UnhandledExceptionFilter (Address: 0x100f62bc)
- UnmapViewOfFile (Address: 0x100f6114)
- UnregisterWait (Address: 0x100f620c)
- UnregisterWaitEx (Address: 0x100f61e4)
- VerifyVersionInfoW (Address: 0x100f60b8)
- VerSetConditionMask (Address: 0x100f60bc)
- VirtualAlloc (Address: 0x100f6204)
- VirtualFree (Address: 0x100f61fc)
- VirtualProtect (Address: 0x100f6200)
- WaitForSingleObject (Address: 0x100f60ac)
- WaitForSingleObjectEx (Address: 0x100f6080)
- WideCharToMultiByte (Address: 0x100f6174)
- WriteConsoleW (Address: 0x100f61cc)
- WriteFile (Address: 0x100f60a0)
ole32.dll
- CoCreateInstance (Address: 0x100f63c8)
OLEAUT32.dll
- LoadRegTypeLib (Address: 0x100f6348)
- LoadTypeLib (Address: 0x100f6320)
- SafeArrayCopy (Address: 0x100f630c)
- SafeArrayCreate (Address: 0x100f6304)
- SafeArrayDestroy (Address: 0x100f6328)
- SafeArrayGetDim (Address: 0x100f6324)
- SafeArrayGetLBound (Address: 0x100f6318)
- SafeArrayGetUBound (Address: 0x100f631c)
- SafeArrayGetVartype (Address: 0x100f6308)
- SafeArrayLock (Address: 0x100f6314)
- SafeArrayUnlock (Address: 0x100f6310)
- SysAllocString (Address: 0x100f6340)
- SysAllocStringLen (Address: 0x100f632c)
- SysFreeString (Address: 0x100f6344)
- SysStringLen (Address: 0x100f6334)
- VariantChangeType (Address: 0x100f6330)
- VariantClear (Address: 0x100f633c)
- VariantInit (Address: 0x100f6338)
PSAPI.DLL
- GetProcessImageFileNameW (Address: 0x100f6350)
SETUPAPI.dll
- CM_Get_Device_IDW (Address: 0x100f6358)
- CM_Get_DevNode_Status (Address: 0x100f637c)
- SetupDiDeleteDeviceInfo (Address: 0x100f6378)
- SetupDiDestroyDeviceInfoList (Address: 0x100f6360)
- SetupDiEnumDeviceInfo (Address: 0x100f6374)
- SetupDiGetClassDevsW (Address: 0x100f635c)
- SetupDiGetDeviceInstanceIdW (Address: 0x100f6380)
- SetupDiGetDeviceRegistryPropertyW (Address: 0x100f6364)
- SetupDiOpenDevRegKey (Address: 0x100f636c)
- SetupDiSetSelectedDevice (Address: 0x100f6368)
- SetupDiSetSelectedDriverW (Address: 0x100f6370)
- SetupGetFieldCount (Address: 0x100f6384)
- SetupGetStringFieldW (Address: 0x100f6388)
SHELL32.dll
- ShellExecuteExW (Address: 0x100f6390)
- SHGetFolderPathW (Address: 0x100f6394)
SHLWAPI.dll
- PathFindFileNameW (Address: 0x100f639c)
USER32.dll
- EnumWindows (Address: 0x100f63a4)
- GetParent (Address: 0x100f63ac)
- GetWindow (Address: 0x100f63b0)
- GetWindowThreadProcessId (Address: 0x100f63a8)
- IsWindowVisible (Address: 0x100f63b4)
- PostMessageW (Address: 0x100f63b8)
USERENV.dll
- UnloadUserProfile (Address: 0x100f63c0)