CUDAVisualStudioIntegrationExt.dll

Description: CUDAVisualStudioIntegration

Authors: Copyright © 2010, 2021 NVIDIA Corporation. All rights reserved.

Version: 2.1002.364.0

Architecture: 32-bit

Operating System: Windows

SHA256: 5e1171b9180bc441fee7127e9f4f5645

File Size: 1.0 MB

Uploaded At: Dec. 1, 2025, 2:53 p.m.

Views: 6

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess

Exported Functions

  • DllCanUnloadNow (Ordinal: 1, Address: 0x16f0)
  • DllGetClassObject (Ordinal: 2, Address: 0x1710)
  • DllInstall (Ordinal: 3, Address: 0x1760)
  • DllRegisterServer (Ordinal: 4, Address: 0x1750)
  • DllUnregisterServer (Ordinal: 5, Address: 0x1750)

Imported DLLs & Functions

ADVAPI32.dll
  • GetTokenInformation (Address: 0x100b801c)
  • LsaNtStatusToWinError (Address: 0x100b8000)
  • OpenProcessToken (Address: 0x100b8018)
  • RegCloseKey (Address: 0x100b8024)
  • RegDeleteKeyW (Address: 0x100b8010)
  • RegDeleteValueW (Address: 0x100b800c)
  • RegEnumKeyExW (Address: 0x100b8008)
  • RegEnumValueW (Address: 0x100b8020)
  • RegOpenCurrentUser (Address: 0x100b8014)
  • RegOpenKeyExW (Address: 0x100b8028)
  • RegQueryInfoKeyW (Address: 0x100b8004)
  • RegQueryValueExW (Address: 0x100b802c)
KERNEL32.dll
  • AreFileApisANSI (Address: 0x100b8228)
  • CloseHandle (Address: 0x100b8060)
  • CompareFileTime (Address: 0x100b812c)
  • CompareStringW (Address: 0x100b8248)
  • CopyFileExW (Address: 0x100b8098)
  • CreateDirectoryW (Address: 0x100b80b8)
  • CreateEventA (Address: 0x100b804c)
  • CreateEventW (Address: 0x100b8230)
  • CreateFileW (Address: 0x100b8064)
  • CreateMutexW (Address: 0x100b805c)
  • CreateProcessW (Address: 0x100b80f4)
  • CreateSymbolicLinkW (Address: 0x100b80a0)
  • CreateToolhelp32Snapshot (Address: 0x100b8100)
  • DecodePointer (Address: 0x100b8180)
  • DeleteCriticalSection (Address: 0x100b8184)
  • DeleteFileW (Address: 0x100b80a8)
  • DeviceIoControl (Address: 0x100b80d0)
  • DuplicateHandle (Address: 0x100b80a4)
  • EncodePointer (Address: 0x100b817c)
  • EnterCriticalSection (Address: 0x100b8178)
  • EnumSystemLocalesW (Address: 0x100b81e0)
  • ExitProcess (Address: 0x100b81fc)
  • ExpandEnvironmentStringsW (Address: 0x100b806c)
  • FileTimeToSystemTime (Address: 0x100b80b0)
  • FindClose (Address: 0x100b80bc)
  • FindFirstFileExA (Address: 0x100b81c0)
  • FindFirstFileW (Address: 0x100b80c0)
  • FindNextFileA (Address: 0x100b81bc)
  • FindNextFileW (Address: 0x100b80c4)
  • FindResourceExW (Address: 0x100b8160)
  • FindResourceW (Address: 0x100b8164)
  • FlushFileBuffers (Address: 0x100b81d0)
  • FormatMessageA (Address: 0x100b8258)
  • FormatMessageW (Address: 0x100b8124)
  • FreeEnvironmentStringsW (Address: 0x100b81a4)
  • FreeLibrary (Address: 0x100b8110)
  • GetACP (Address: 0x100b81dc)
  • GetCommandLineA (Address: 0x100b81b0)
  • GetCommandLineW (Address: 0x100b81ac)
  • GetConsoleCP (Address: 0x100b81cc)
  • GetConsoleMode (Address: 0x100b81c8)
  • GetCPInfo (Address: 0x100b8254)
  • GetCurrentDirectoryW (Address: 0x100b80b4)
  • GetCurrentProcess (Address: 0x100b8044)
  • GetCurrentProcessId (Address: 0x100b8080)
  • GetCurrentThreadId (Address: 0x100b8058)
  • GetDateFormatW (Address: 0x100b81f0)
  • GetEnvironmentStringsW (Address: 0x100b81a8)
  • GetExitCodeProcess (Address: 0x100b80f0)
  • GetFileAttributesW (Address: 0x100b80c8)
  • GetFileSizeEx (Address: 0x100b8074)
  • GetFileType (Address: 0x100b81d4)
  • GetFullPathNameW (Address: 0x100b8130)
  • GetLastError (Address: 0x100b818c)
  • GetLocaleInfoW (Address: 0x100b8250)
  • GetModuleFileNameA (Address: 0x100b81f8)
  • GetModuleFileNameW (Address: 0x100b8068)
  • GetModuleHandleA (Address: 0x100b8134)
  • GetModuleHandleExW (Address: 0x100b8114)
  • GetModuleHandleW (Address: 0x100b8138)
  • GetOEMCP (Address: 0x100b81b4)
  • GetProcAddress (Address: 0x100b8118)
  • GetProcessHeap (Address: 0x100b8148)
  • GetProcessId (Address: 0x100b80f8)
  • GetProcessTimes (Address: 0x100b8040)
  • GetStartupInfoW (Address: 0x100b820c)
  • GetStdHandle (Address: 0x100b81d8)
  • GetStringTypeW (Address: 0x100b822c)
  • GetSystemDirectoryW (Address: 0x100b80d8)
  • GetSystemInfo (Address: 0x100b8128)
  • GetSystemTimeAsFileTime (Address: 0x100b803c)
  • GetTempPathW (Address: 0x100b8084)
  • GetTimeFormatW (Address: 0x100b81ec)
  • GetTimeZoneInformation (Address: 0x100b81f4)
  • GetUserDefaultLCID (Address: 0x100b81e4)
  • GetVersionExW (Address: 0x100b810c)
  • GetWindowsDirectoryW (Address: 0x100b80dc)
  • HeapAlloc (Address: 0x100b814c)
  • HeapDestroy (Address: 0x100b815c)
  • HeapFree (Address: 0x100b8150)
  • HeapReAlloc (Address: 0x100b8154)
  • HeapSize (Address: 0x100b8158)
  • InitializeCriticalSectionAndSpinCount (Address: 0x100b8190)
  • InitializeCriticalSectionEx (Address: 0x100b8188)
  • InitializeSListHead (Address: 0x100b821c)
  • InterlockedFlushSList (Address: 0x100b8200)
  • InterlockedPushEntrySList (Address: 0x100b8204)
  • IsDebuggerPresent (Address: 0x100b8224)
  • IsProcessorFeaturePresent (Address: 0x100b8210)
  • IsValidCodePage (Address: 0x100b81b8)
  • IsValidLocale (Address: 0x100b81e8)
  • LCMapStringW (Address: 0x100b824c)
  • LeaveCriticalSection (Address: 0x100b8174)
  • LoadLibraryExW (Address: 0x100b813c)
  • LoadLibraryW (Address: 0x100b811c)
  • LoadResource (Address: 0x100b8168)
  • LocalAlloc (Address: 0x100b80e8)
  • LocalFree (Address: 0x100b8120)
  • LockResource (Address: 0x100b816c)
  • lstrcmpA (Address: 0x100b8140)
  • lstrcmpW (Address: 0x100b80e0)
  • MoveFileExW (Address: 0x100b80e4)
  • MultiByteToWideChar (Address: 0x100b8090)
  • OpenEventA (Address: 0x100b8144)
  • OpenProcess (Address: 0x100b80fc)
  • OutputDebugStringW (Address: 0x100b8048)
  • Process32FirstW (Address: 0x100b8104)
  • Process32NextW (Address: 0x100b8108)
  • QueryDosDeviceW (Address: 0x100b80cc)
  • QueryPerformanceCounter (Address: 0x100b8034)
  • QueryPerformanceFrequency (Address: 0x100b8038)
  • RaiseException (Address: 0x100b80ac)
  • ReadConsoleW (Address: 0x100b8198)
  • ReadFile (Address: 0x100b81c4)
  • ReleaseMutex (Address: 0x100b8078)
  • RemoveDirectoryW (Address: 0x100b809c)
  • ResetEvent (Address: 0x100b8220)
  • RtlUnwind (Address: 0x100b8208)
  • SetEnvironmentVariableA (Address: 0x100b81a0)
  • SetEvent (Address: 0x100b8050)
  • SetFilePointerEx (Address: 0x100b825c)
  • SetLastError (Address: 0x100b8094)
  • SetStdHandle (Address: 0x100b819c)
  • SetUnhandledExceptionFilter (Address: 0x100b8214)
  • SizeofResource (Address: 0x100b8170)
  • Sleep (Address: 0x100b8234)
  • TerminateProcess (Address: 0x100b80ec)
  • TlsAlloc (Address: 0x100b8238)
  • TlsFree (Address: 0x100b8244)
  • TlsGetValue (Address: 0x100b823c)
  • TlsSetValue (Address: 0x100b8240)
  • UnhandledExceptionFilter (Address: 0x100b8218)
  • VerifyVersionInfoW (Address: 0x100b8088)
  • VerSetConditionMask (Address: 0x100b808c)
  • WaitForSingleObject (Address: 0x100b807c)
  • WaitForSingleObjectEx (Address: 0x100b8054)
  • WideCharToMultiByte (Address: 0x100b80d4)
  • WriteConsoleW (Address: 0x100b8194)
  • WriteFile (Address: 0x100b8070)
ole32.dll
  • CoCreateInstance (Address: 0x100b82e4)
  • OleRun (Address: 0x100b82e8)
OLEAUT32.dll
  • LoadRegTypeLib (Address: 0x100b8288)
  • LoadTypeLib (Address: 0x100b828c)
  • SafeArrayCopy (Address: 0x100b82a4)
  • SafeArrayCreate (Address: 0x100b829c)
  • SafeArrayDestroy (Address: 0x100b8284)
  • SafeArrayGetDim (Address: 0x100b8298)
  • SafeArrayGetLBound (Address: 0x100b8294)
  • SafeArrayGetUBound (Address: 0x100b8290)
  • SafeArrayGetVartype (Address: 0x100b82a0)
  • SafeArrayLock (Address: 0x100b82ac)
  • SafeArrayUnlock (Address: 0x100b82a8)
  • SysAllocString (Address: 0x100b8264)
  • SysAllocStringByteLen (Address: 0x100b8268)
  • SysAllocStringLen (Address: 0x100b826c)
  • SysFreeString (Address: 0x100b8274)
  • SysStringLen (Address: 0x100b8270)
  • VariantChangeType (Address: 0x100b8280)
  • VariantClear (Address: 0x100b827c)
  • VariantInit (Address: 0x100b8278)
PSAPI.DLL
  • GetProcessImageFileNameW (Address: 0x100b82b4)
SHELL32.dll
  • SHCreateDirectoryExW (Address: 0x100b82c0)
  • ShellExecuteExW (Address: 0x100b82bc)
  • SHGetFolderPathW (Address: 0x100b82c4)
SHLWAPI.dll
  • PathFindFileNameW (Address: 0x100b82cc)
VERSION.dll
  • GetFileVersionInfoSizeW (Address: 0x100b82dc)
  • GetFileVersionInfoW (Address: 0x100b82d8)
  • VerQueryValueW (Address: 0x100b82d4)