shacctprofile.dll

Description: Shell Accounts Profile Classes

Authors: © Microsoft Corporation. All rights reserved.

Version: 10.0.19041.4355

Architecture: 64-bit

Operating System: Windows NT

SHA256: 448061e20c15dabfe8761fede8bd164b

File Size: 71.0 KB

Uploaded At: Dec. 1, 2025, 7:39 a.m.

Views: 6

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess

Exported Functions

  • DllCanUnloadNow (Ordinal: 1, Address: 0x4150)
  • DllGetClassObject (Ordinal: 2, Address: 0x4090)

Imported DLLs & Functions

api-ms-win-core-debug-l1-1-0.dll
  • DebugBreak (Address: 0x18000a220)
  • IsDebuggerPresent (Address: 0x18000a228)
  • OutputDebugStringW (Address: 0x18000a218)
api-ms-win-core-delayload-l1-1-0.dll
  • DelayLoadFailureHook (Address: 0x18000a238)
api-ms-win-core-delayload-l1-1-1.dll
  • ResolveDelayLoadedAPI (Address: 0x18000a248)
api-ms-win-core-errorhandling-l1-1-0.dll
  • GetLastError (Address: 0x18000a268)
  • SetLastError (Address: 0x18000a270)
  • SetUnhandledExceptionFilter (Address: 0x18000a258)
  • UnhandledExceptionFilter (Address: 0x18000a260)
api-ms-win-core-file-l1-1-0.dll
  • CreateFileW (Address: 0x18000a288)
  • DeleteFileW (Address: 0x18000a280)
api-ms-win-core-handle-l1-1-0.dll
  • CloseHandle (Address: 0x18000a298)
api-ms-win-core-heap-l1-1-0.dll
  • GetProcessHeap (Address: 0x18000a2b8)
  • HeapAlloc (Address: 0x18000a2a8)
  • HeapFree (Address: 0x18000a2c0)
  • HeapReAlloc (Address: 0x18000a2b0)
api-ms-win-core-heap-l2-1-0.dll
  • LocalAlloc (Address: 0x18000a2d8)
  • LocalFree (Address: 0x18000a2d0)
api-ms-win-core-kernel32-legacy-l1-1-0.dll
  • GetComputerNameW (Address: 0x18000a2e8)
api-ms-win-core-libraryloader-l1-2-0.dll
  • DisableThreadLibraryCalls (Address: 0x18000a318)
  • GetModuleFileNameA (Address: 0x18000a308)
  • GetModuleHandleExW (Address: 0x18000a310)
  • GetModuleHandleW (Address: 0x18000a2f8)
  • GetProcAddress (Address: 0x18000a300)
api-ms-win-core-localization-l1-2-0.dll
  • FormatMessageW (Address: 0x18000a328)
api-ms-win-core-path-l1-1-0.dll
  • PathCchAppend (Address: 0x18000a340)
  • PathCchCanonicalizeEx (Address: 0x18000a338)
api-ms-win-core-processenvironment-l1-1-0.dll
  • ExpandEnvironmentStringsW (Address: 0x18000a350)
api-ms-win-core-processthreads-l1-1-0.dll
  • GetCurrentProcess (Address: 0x18000a388)
  • GetCurrentProcessId (Address: 0x18000a368)
  • GetCurrentThread (Address: 0x18000a378)
  • GetCurrentThreadId (Address: 0x18000a370)
  • OpenProcessToken (Address: 0x18000a390)
  • OpenThreadToken (Address: 0x18000a360)
  • TerminateProcess (Address: 0x18000a380)
api-ms-win-core-processthreads-l1-1-1.dll
  • OpenProcess (Address: 0x18000a3a0)
api-ms-win-core-profile-l1-1-0.dll
  • QueryPerformanceCounter (Address: 0x18000a3b0)
api-ms-win-core-registry-l1-1-0.dll
  • RegCloseKey (Address: 0x18000a3e0)
  • RegCreateKeyExW (Address: 0x18000a3d0)
  • RegDeleteKeyExW (Address: 0x18000a3c0)
  • RegDeleteTreeW (Address: 0x18000a3d8)
  • RegSetValueExW (Address: 0x18000a3c8)
api-ms-win-core-rtlsupport-l1-1-0.dll
  • RtlCaptureContext (Address: 0x18000a400)
  • RtlLookupFunctionEntry (Address: 0x18000a3f8)
  • RtlVirtualUnwind (Address: 0x18000a3f0)
api-ms-win-core-string-l1-1-0.dll
  • CompareStringOrdinal (Address: 0x18000a410)
api-ms-win-core-string-obsolete-l1-1-0.dll
  • lstrcmpiW (Address: 0x18000a420)
api-ms-win-core-synch-l1-1-0.dll
  • CreateMutexExW (Address: 0x18000a430)
  • CreateSemaphoreExW (Address: 0x18000a460)
  • OpenSemaphoreW (Address: 0x18000a438)
  • ReleaseMutex (Address: 0x18000a448)
  • ReleaseSemaphore (Address: 0x18000a458)
  • WaitForSingleObject (Address: 0x18000a450)
  • WaitForSingleObjectEx (Address: 0x18000a440)
api-ms-win-core-synch-l1-2-0.dll
  • Sleep (Address: 0x18000a470)
api-ms-win-core-sysinfo-l1-1-0.dll
  • GetSystemTimeAsFileTime (Address: 0x18000a480)
  • GetTickCount (Address: 0x18000a488)
api-ms-win-security-base-l1-1-0.dll
  • AddAccessAllowedAceEx (Address: 0x18000a4e0)
  • AddAccessDeniedAceEx (Address: 0x18000a4d0)
  • AddAce (Address: 0x18000a4e8)
  • AdjustTokenPrivileges (Address: 0x18000a4a8)
  • CopySid (Address: 0x18000a510)
  • EqualSid (Address: 0x18000a508)
  • GetAce (Address: 0x18000a4f0)
  • GetAclInformation (Address: 0x18000a4f8)
  • GetLengthSid (Address: 0x18000a500)
  • GetTokenInformation (Address: 0x18000a4a0)
  • InitializeAcl (Address: 0x18000a4d8)
  • InitializeSecurityDescriptor (Address: 0x18000a4c8)
  • IsValidSid (Address: 0x18000a4b8)
  • SetFileSecurityW (Address: 0x18000a4b0)
  • SetSecurityDescriptorDacl (Address: 0x18000a4c0)
  • SetSecurityDescriptorOwner (Address: 0x18000a498)
msvcrt.dll
  • __C_specific_handler (Address: 0x18000a5a0)
  • __CxxFrameHandler3 (Address: 0x18000a528)
  • __dllonexit (Address: 0x18000a538)
  • _amsg_exit (Address: 0x18000a560)
  • _callnewh (Address: 0x18000a580)
  • _initterm (Address: 0x18000a558)
  • _lock (Address: 0x18000a548)
  • _onexit (Address: 0x18000a520)
  • _unlock (Address: 0x18000a540)
  • _vsnwprintf (Address: 0x18000a530)
  • _XcptFilter (Address: 0x18000a568)
  • free (Address: 0x18000a590)
  • malloc (Address: 0x18000a588)
  • memcmp (Address: 0x18000a578)
  • memcpy (Address: 0x18000a570)
  • memcpy_s (Address: 0x18000a598)
  • memmove (Address: 0x18000a550)
  • memset (Address: 0x18000a5b0)
  • wcsstr (Address: 0x18000a5a8)
ntdll.dll
  • EtwTraceMessage (Address: 0x18000a5c0)
  • RtlInitializeSid (Address: 0x18000a5d0)
  • RtlMapGenericMask (Address: 0x18000a5c8)
  • RtlSubAuthoritySid (Address: 0x18000a5d8)
SHCORE.dll
  • SHStrDupW (Address: 0x18000a208)