DisplayDriverExt.dll

Description: Graphics Driver Install Helper

Authors: Copyright © 2010, 2023 NVIDIA Corporation. All rights reserved.

Version: 2.1002.418.0

Architecture: 32-bit

Operating System: Windows

SHA256: df280ceb709a3e5254e53e6328ae78d5

File Size: 1.8 MB

Uploaded At: Dec. 1, 2025, 7:49 a.m.

Views: 5

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess

Exported Functions

  • DllCanUnloadNow (Ordinal: 1, Address: 0x1880)
  • DllGetClassObject (Ordinal: 2, Address: 0x18c0)
  • DllInstall (Ordinal: 3, Address: 0x1910)
  • DllRegisterServer (Ordinal: 4, Address: 0x1900)
  • DllUnregisterServer (Ordinal: 5, Address: 0x1900)

Imported DLLs & Functions

ADVAPI32.dll
  • AccessCheck (Address: 0x1013802c)
  • AdjustTokenPrivileges (Address: 0x10138050)
  • AllocateAndInitializeSid (Address: 0x1013805c)
  • ChangeServiceConfig2W (Address: 0x10138080)
  • ChangeServiceConfigW (Address: 0x1013807c)
  • CloseServiceHandle (Address: 0x10138084)
  • ControlService (Address: 0x10138088)
  • DeleteService (Address: 0x10138014)
  • DuplicateToken (Address: 0x10138028)
  • EnumDependentServicesW (Address: 0x10138010)
  • GetFileSecurityW (Address: 0x10138024)
  • GetTokenInformation (Address: 0x10138064)
  • IsTextUnicode (Address: 0x1013801c)
  • LookupPrivilegeValueW (Address: 0x1013804c)
  • LsaNtStatusToWinError (Address: 0x10138018)
  • MapGenericMask (Address: 0x10138020)
  • OpenProcessToken (Address: 0x10138060)
  • OpenSCManagerW (Address: 0x1013800c)
  • OpenServiceW (Address: 0x10138008)
  • OpenThreadToken (Address: 0x10138030)
  • QueryServiceConfig2W (Address: 0x10138004)
  • QueryServiceStatusEx (Address: 0x10138000)
  • RegCloseKey (Address: 0x10138070)
  • RegCreateKeyExW (Address: 0x1013806c)
  • RegDeleteKeyW (Address: 0x10138044)
  • RegDeleteValueW (Address: 0x10138040)
  • RegEnumKeyExW (Address: 0x1013803c)
  • RegEnumValueW (Address: 0x10138068)
  • RegOpenCurrentUser (Address: 0x10138048)
  • RegOpenKeyExW (Address: 0x10138074)
  • RegQueryInfoKeyW (Address: 0x10138038)
  • RegQueryValueExW (Address: 0x10138078)
  • RegSetValueExW (Address: 0x10138034)
  • SetEntriesInAclW (Address: 0x10138058)
  • SetNamedSecurityInfoW (Address: 0x10138054)
bcrypt.dll
  • BCryptCloseAlgorithmProvider (Address: 0x10138410)
  • BCryptDecrypt (Address: 0x10138420)
  • BCryptDestroyKey (Address: 0x10138414)
  • BCryptEncrypt (Address: 0x1013841c)
  • BCryptImportKeyPair (Address: 0x10138418)
  • BCryptOpenAlgorithmProvider (Address: 0x1013840c)
KERNEL32.dll
  • AreFileApisANSI (Address: 0x101382b4)
  • CloseHandle (Address: 0x10138198)
  • CompareStringW (Address: 0x101382c8)
  • CopyFileW (Address: 0x1013813c)
  • CreateDirectoryW (Address: 0x101380f8)
  • CreateEventA (Address: 0x101381ac)
  • CreateEventW (Address: 0x101382dc)
  • CreateFileMappingW (Address: 0x1013812c)
  • CreateFileW (Address: 0x10138194)
  • CreateMutexW (Address: 0x1013819c)
  • CreateProcessW (Address: 0x10138160)
  • CreateThread (Address: 0x10138288)
  • DecodePointer (Address: 0x10138204)
  • DeleteCriticalSection (Address: 0x10138208)
  • DeleteFileW (Address: 0x101380fc)
  • DeviceIoControl (Address: 0x10138118)
  • DuplicateHandle (Address: 0x10138154)
  • EncodePointer (Address: 0x10138200)
  • EnterCriticalSection (Address: 0x101381fc)
  • EnumSystemLocalesW (Address: 0x10138264)
  • ExitProcess (Address: 0x1013827c)
  • ExitThread (Address: 0x10138284)
  • ExpandEnvironmentStringsW (Address: 0x10138090)
  • FileTimeToSystemTime (Address: 0x1013816c)
  • FindClose (Address: 0x10138100)
  • FindFirstFileExA (Address: 0x10138248)
  • FindFirstFileW (Address: 0x10138104)
  • FindNextFileA (Address: 0x10138244)
  • FindNextFileW (Address: 0x10138108)
  • FindResourceExW (Address: 0x101381e4)
  • FindResourceW (Address: 0x101381e8)
  • FlushFileBuffers (Address: 0x10138254)
  • FormatMessageA (Address: 0x101382b8)
  • FormatMessageW (Address: 0x10138178)
  • FreeEnvironmentStringsW (Address: 0x1013822c)
  • FreeLibrary (Address: 0x10138148)
  • FreeLibraryAndExitThread (Address: 0x10138280)
  • GetACP (Address: 0x10138260)
  • GetCommandLineA (Address: 0x10138238)
  • GetCommandLineW (Address: 0x10138234)
  • GetConsoleCP (Address: 0x10138250)
  • GetConsoleMode (Address: 0x1013824c)
  • GetCPInfo (Address: 0x101382bc)
  • GetCurrentDirectoryW (Address: 0x101380f4)
  • GetCurrentProcess (Address: 0x101381b4)
  • GetCurrentProcessId (Address: 0x101380a4)
  • GetCurrentThread (Address: 0x1013811c)
  • GetCurrentThreadId (Address: 0x101381a0)
  • GetDateFormatW (Address: 0x10138274)
  • GetEnvironmentStringsW (Address: 0x10138230)
  • GetExitCodeProcess (Address: 0x1013815c)
  • GetExitCodeThread (Address: 0x101380d0)
  • GetFileAttributesW (Address: 0x10138114)
  • GetFileSize (Address: 0x101380dc)
  • GetFileSizeEx (Address: 0x10138098)
  • GetFileType (Address: 0x10138258)
  • GetFullPathNameW (Address: 0x10138180)
  • GetLastError (Address: 0x10138210)
  • GetLocaleInfoW (Address: 0x101382c0)
  • GetModuleFileNameA (Address: 0x10138184)
  • GetModuleFileNameW (Address: 0x10138214)
  • GetModuleHandleA (Address: 0x10138188)
  • GetModuleHandleExW (Address: 0x1013814c)
  • GetModuleHandleW (Address: 0x101380bc)
  • GetOEMCP (Address: 0x1013823c)
  • GetProcAddress (Address: 0x101380c0)
  • GetProcessHeap (Address: 0x101381cc)
  • GetProcessId (Address: 0x10138164)
  • GetProcessTimes (Address: 0x101381b8)
  • GetStartupInfoW (Address: 0x10138298)
  • GetStdHandle (Address: 0x1013825c)
  • GetStringTypeW (Address: 0x101382e0)
  • GetSystemDirectoryW (Address: 0x10138120)
  • GetSystemInfo (Address: 0x10138144)
  • GetSystemTimeAsFileTime (Address: 0x101381bc)
  • GetSystemWindowsDirectoryW (Address: 0x10138128)
  • GetTempPathW (Address: 0x101380a8)
  • GetTimeFormatW (Address: 0x10138270)
  • GetTimeZoneInformation (Address: 0x10138278)
  • GetUserDefaultLCID (Address: 0x10138268)
  • GetVersionExW (Address: 0x101380c4)
  • GetWindowsDirectoryW (Address: 0x10138124)
  • HeapAlloc (Address: 0x101381d0)
  • HeapDestroy (Address: 0x101381e0)
  • HeapFree (Address: 0x101381d4)
  • HeapReAlloc (Address: 0x101381d8)
  • HeapSize (Address: 0x101381dc)
  • InitializeCriticalSectionAndSpinCount (Address: 0x101380ec)
  • InitializeCriticalSectionEx (Address: 0x1013820c)
  • InitializeSListHead (Address: 0x101382a8)
  • InterlockedFlushSList (Address: 0x1013828c)
  • InterlockedPushEntrySList (Address: 0x10138290)
  • IsDebuggerPresent (Address: 0x101382b0)
  • IsProcessorFeaturePresent (Address: 0x1013829c)
  • IsValidCodePage (Address: 0x10138240)
  • IsValidLocale (Address: 0x1013826c)
  • LCMapStringW (Address: 0x101382c4)
  • LeaveCriticalSection (Address: 0x101381f8)
  • LoadLibraryExW (Address: 0x1013818c)
  • LoadLibraryW (Address: 0x10138150)
  • LoadResource (Address: 0x101381ec)
  • LocalAlloc (Address: 0x101380f0)
  • LocalFree (Address: 0x10138174)
  • LockResource (Address: 0x101381f0)
  • lstrcmpW (Address: 0x10138138)
  • lstrlenW (Address: 0x101380c8)
  • MapViewOfFile (Address: 0x10138130)
  • MoveFileExW (Address: 0x10138140)
  • MultiByteToWideChar (Address: 0x101380cc)
  • OpenEventA (Address: 0x10138218)
  • OpenEventW (Address: 0x10138170)
  • OpenProcess (Address: 0x10138168)
  • OutputDebugStringW (Address: 0x101381b0)
  • QueryDosDeviceW (Address: 0x1013810c)
  • QueryPerformanceCounter (Address: 0x101381c4)
  • QueryPerformanceFrequency (Address: 0x101381c0)
  • RaiseException (Address: 0x101380d8)
  • ReadConsoleW (Address: 0x10138220)
  • ReadFile (Address: 0x101380e0)
  • ReleaseMutex (Address: 0x1013809c)
  • RemoveDirectoryW (Address: 0x10138190)
  • ResetEvent (Address: 0x101382ac)
  • ResumeThread (Address: 0x101380d4)
  • RtlUnwind (Address: 0x10138294)
  • SetEndOfFile (Address: 0x101380e4)
  • SetEnvironmentVariableA (Address: 0x10138228)
  • SetEvent (Address: 0x101381a8)
  • SetFileAttributesW (Address: 0x10138110)
  • SetFilePointerEx (Address: 0x101380e8)
  • SetLastError (Address: 0x101380b4)
  • SetStdHandle (Address: 0x10138224)
  • SetUnhandledExceptionFilter (Address: 0x101382a0)
  • SizeofResource (Address: 0x101381f4)
  • Sleep (Address: 0x101380b8)
  • SystemTimeToFileTime (Address: 0x1013817c)
  • TerminateProcess (Address: 0x10138158)
  • TlsAlloc (Address: 0x101382d8)
  • TlsFree (Address: 0x101382cc)
  • TlsGetValue (Address: 0x101382d4)
  • TlsSetValue (Address: 0x101382d0)
  • UnhandledExceptionFilter (Address: 0x101382a4)
  • UnmapViewOfFile (Address: 0x10138134)
  • VerifyVersionInfoW (Address: 0x101380ac)
  • VerSetConditionMask (Address: 0x101380b0)
  • WaitForSingleObject (Address: 0x101380a0)
  • WaitForSingleObjectEx (Address: 0x101381a4)
  • WideCharToMultiByte (Address: 0x101381c8)
  • WriteConsoleW (Address: 0x1013821c)
  • WriteFile (Address: 0x10138094)
ole32.dll
  • CoCreateInstance (Address: 0x10138428)
  • CoInitializeEx (Address: 0x1013842c)
  • CoUninitialize (Address: 0x10138430)
OLEAUT32.dll
  • LoadRegTypeLib (Address: 0x1013832c)
  • LoadTypeLib (Address: 0x10138338)
  • SafeArrayCopy (Address: 0x101382f8)
  • SafeArrayCreate (Address: 0x10138304)
  • SafeArrayDestroy (Address: 0x10138330)
  • SafeArrayGetDim (Address: 0x10138314)
  • SafeArrayGetLBound (Address: 0x101382e8)
  • SafeArrayGetUBound (Address: 0x101382ec)
  • SafeArrayGetVartype (Address: 0x101382f4)
  • SafeArrayLock (Address: 0x10138300)
  • SafeArrayRedim (Address: 0x10138308)
  • SafeArrayUnlock (Address: 0x101382fc)
  • SysAllocString (Address: 0x1013833c)
  • SysAllocStringByteLen (Address: 0x1013830c)
  • SysAllocStringLen (Address: 0x10138320)
  • SysFreeString (Address: 0x10138334)
  • SysStringByteLen (Address: 0x10138310)
  • SysStringLen (Address: 0x10138318)
  • VariantChangeType (Address: 0x10138324)
  • VariantClear (Address: 0x10138328)
  • VariantCopy (Address: 0x101382f0)
  • VariantInit (Address: 0x1013831c)
PSAPI.DLL
  • GetProcessImageFileNameW (Address: 0x10138344)
RPCRT4.dll
  • RpcStringFreeW (Address: 0x1013834c)
  • UuidFromStringW (Address: 0x10138350)
  • UuidToStringW (Address: 0x10138354)
SETUPAPI.dll
  • CM_Get_Device_IDW (Address: 0x1013838c)
  • CM_Get_DevNode_Status (Address: 0x10138374)
  • SetupCloseInfFile (Address: 0x10138384)
  • SetupDiBuildDriverInfoList (Address: 0x101383c4)
  • SetupDiCreateDeviceInfoList (Address: 0x1013835c)
  • SetupDiDeleteDeviceInfo (Address: 0x101383d0)
  • SetupDiDestroyDeviceInfoList (Address: 0x10138394)
  • SetupDiEnumDeviceInfo (Address: 0x101383c8)
  • SetupDiEnumDriverInfoW (Address: 0x101383c0)
  • SetupDiGetActualSectionToInstallExW (Address: 0x1013837c)
  • SetupDiGetClassDevsW (Address: 0x10138390)
  • SetupDiGetDeviceInstallParamsW (Address: 0x101383a4)
  • SetupDiGetDeviceInstanceIdW (Address: 0x101383a0)
  • SetupDiGetDeviceRegistryPropertyW (Address: 0x101383a8)
  • SetupDiGetDriverInfoDetailW (Address: 0x101383b8)
  • SetupDiGetINFClassW (Address: 0x101383b4)
  • SetupDiOpenDeviceInfoW (Address: 0x10138378)
  • SetupDiOpenDevRegKey (Address: 0x101383b0)
  • SetupDiSetDeviceInstallParamsW (Address: 0x1013839c)
  • SetupDiSetSelectedDevice (Address: 0x10138398)
  • SetupDiSetSelectedDriverW (Address: 0x101383bc)
  • SetupFindFirstLineW (Address: 0x10138380)
  • SetupFindNextLine (Address: 0x101383ac)
  • SetupFindNextMatchLineW (Address: 0x101383cc)
  • SetupGetFieldCount (Address: 0x10138368)
  • SetupGetIntField (Address: 0x10138360)
  • SetupGetLineTextW (Address: 0x1013836c)
  • SetupGetStringFieldW (Address: 0x10138364)
  • SetupOpenAppendInfFileW (Address: 0x10138370)
  • SetupOpenInfFileW (Address: 0x10138388)
SHELL32.dll
  • ShellExecuteExW (Address: 0x101383d8)
  • SHGetFolderPathW (Address: 0x101383dc)
SHLWAPI.dll
  • PathFindFileNameW (Address: 0x101383e4)
USERENV.dll
  • UnloadUserProfile (Address: 0x101383ec)
VERSION.dll
  • GetFileVersionInfoSizeW (Address: 0x101383f4)
  • GetFileVersionInfoW (Address: 0x101383fc)
  • VerQueryValueW (Address: 0x101383f8)
WINTRUST.dll
  • WinVerifyTrust (Address: 0x10138404)