dfshim.dll

Description: ClickOnce Application Deployment Support Library

Authors: © Microsoft Corporation. All rights reserved.

Version: 10.0.19041.1

Architecture: 32-bit

Operating System: Windows NT

SHA256: 785cd48d1b1046a69224913e17f229ed

File Size: 1.1 MB

Uploaded At: Dec. 1, 2025, 7:55 a.m.

Views: 4

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess

Exported Functions

  • CreateActContext (Ordinal: 1, Address: 0x26980)
  • CreateCMSFromXml (Ordinal: 2, Address: 0x26930)
  • GetCurrentActContext (Ordinal: 3, Address: 0x269c0)
  • GetUserStateManager (Ordinal: 4, Address: 0x268b0)
  • GetUserStore (Ordinal: 5, Address: 0x26870)
  • KillService (Ordinal: 6, Address: 0x23b00)
  • LaunchApplication (Ordinal: 7, Address: 0x23a70)
  • ParseManifest (Ordinal: 8, Address: 0x268f0)
  • ShArpMaintain (Ordinal: 9, Address: 0x23ad0)
  • ShArpMaintainW (Ordinal: 10, Address: 0x23aa0)
  • ShOpenVerbApplication (Ordinal: 11, Address: 0x23a10)
  • ShOpenVerbApplicationW (Ordinal: 12, Address: 0x239f0)
  • ShOpenVerbExtension (Ordinal: 13, Address: 0x23a50)
  • ShOpenVerbExtensionW (Ordinal: 14, Address: 0x23a30)
  • ShOpenVerbShortcut (Ordinal: 15, Address: 0x23960)
  • ShOpenVerbShortcutW (Ordinal: 16, Address: 0x23880)
  • CleanOnlineAppCache (Ordinal: 17, Address: 0x23b20)
  • DllCanUnloadNow (Ordinal: 18, Address: 0x23800)
  • DllGetClassObject (Ordinal: 19, Address: 0x23820)
  • GetDeploymentDataFromManifest (Ordinal: 20, Address: 0x23b70)

Imported DLLs & Functions

ADVAPI32.dll
  • CryptAcquireContextA (Address: 0x1010e004)
  • CryptCreateHash (Address: 0x1010e058)
  • CryptDestroyHash (Address: 0x1010e054)
  • CryptGenRandom (Address: 0x1010e060)
  • CryptGetHashParam (Address: 0x1010e05c)
  • CryptHashData (Address: 0x1010e000)
  • CryptReleaseContext (Address: 0x1010e008)
  • RegCloseKey (Address: 0x1010e050)
  • RegCreateKeyExA (Address: 0x1010e03c)
  • RegCreateKeyExW (Address: 0x1010e038)
  • RegDeleteKeyA (Address: 0x1010e02c)
  • RegDeleteKeyW (Address: 0x1010e028)
  • RegDeleteValueA (Address: 0x1010e024)
  • RegDeleteValueW (Address: 0x1010e020)
  • RegEnumKeyExA (Address: 0x1010e01c)
  • RegEnumKeyExW (Address: 0x1010e018)
  • RegEnumValueA (Address: 0x1010e014)
  • RegEnumValueW (Address: 0x1010e010)
  • RegOpenKeyExA (Address: 0x1010e034)
  • RegOpenKeyExW (Address: 0x1010e030)
  • RegQueryInfoKeyA (Address: 0x1010e00c)
  • RegQueryValueExA (Address: 0x1010e04c)
  • RegQueryValueExW (Address: 0x1010e048)
  • RegSetValueExA (Address: 0x1010e044)
  • RegSetValueExW (Address: 0x1010e040)
KERNEL32.dll
  • AreFileApisANSI (Address: 0x1010e124)
  • CloseHandle (Address: 0x1010e128)
  • CopyFileA (Address: 0x1010e154)
  • CopyFileW (Address: 0x1010e158)
  • CreateDirectoryA (Address: 0x1010e134)
  • CreateDirectoryW (Address: 0x1010e138)
  • CreateFileA (Address: 0x1010e13c)
  • CreateFileW (Address: 0x1010e140)
  • CreateMutexA (Address: 0x1010e1e0)
  • CreateMutexW (Address: 0x1010e1dc)
  • DebugBreak (Address: 0x1010e1e4)
  • DeleteCriticalSection (Address: 0x1010e080)
  • DeleteFileA (Address: 0x1010e144)
  • DeleteFileW (Address: 0x1010e148)
  • DisableThreadLibraryCalls (Address: 0x1010e21c)
  • EnterCriticalSection (Address: 0x1010e0bc)
  • ExitProcess (Address: 0x1010e218)
  • FindClose (Address: 0x1010e17c)
  • FindFirstFileA (Address: 0x1010e174)
  • FindFirstFileW (Address: 0x1010e178)
  • FindNextFileA (Address: 0x1010e16c)
  • FindNextFileW (Address: 0x1010e170)
  • FlushFileBuffers (Address: 0x1010e1c4)
  • FreeEnvironmentStringsW (Address: 0x1010e0a0)
  • FreeLibrary (Address: 0x1010e1b8)
  • GetACP (Address: 0x1010e0c8)
  • GetCommandLineA (Address: 0x1010e190)
  • GetConsoleCP (Address: 0x1010e194)
  • GetConsoleMode (Address: 0x1010e1a4)
  • GetCPInfo (Address: 0x1010e0d0)
  • GetCurrentProcess (Address: 0x1010e0b0)
  • GetCurrentProcessId (Address: 0x1010e090)
  • GetCurrentThreadId (Address: 0x1010e118)
  • GetEnvironmentStringsW (Address: 0x1010e09c)
  • GetEnvironmentVariableA (Address: 0x1010e11c)
  • GetFileAttributesA (Address: 0x1010e15c)
  • GetFileAttributesW (Address: 0x1010e160)
  • GetFileInformationByHandle (Address: 0x1010e180)
  • GetFileSize (Address: 0x1010e208)
  • GetFileType (Address: 0x1010e078)
  • GetFullPathNameA (Address: 0x1010e12c)
  • GetFullPathNameW (Address: 0x1010e130)
  • GetLastError (Address: 0x1010e1b0)
  • GetModuleFileNameA (Address: 0x1010e088)
  • GetModuleFileNameW (Address: 0x1010e1c8)
  • GetModuleHandleA (Address: 0x1010e198)
  • GetModuleHandleW (Address: 0x1010e104)
  • GetOEMCP (Address: 0x1010e0cc)
  • GetProcAddress (Address: 0x1010e1b4)
  • GetProcessHeap (Address: 0x1010e1d0)
  • GetProcessTimes (Address: 0x1010e1f0)
  • GetStartupInfoW (Address: 0x1010e084)
  • GetStdHandle (Address: 0x1010e074)
  • GetStringTypeW (Address: 0x1010e0ec)
  • GetSystemDirectoryA (Address: 0x1010e200)
  • GetSystemInfo (Address: 0x1010e0fc)
  • GetSystemTimeAsFileTime (Address: 0x1010e094)
  • GetTickCount (Address: 0x1010e098)
  • GetVersion (Address: 0x1010e1a0)
  • GetVersionExA (Address: 0x1010e204)
  • GetVersionExW (Address: 0x1010e18c)
  • HeapAlloc (Address: 0x1010e210)
  • HeapCreate (Address: 0x1010e068)
  • HeapDestroy (Address: 0x1010e06c)
  • HeapFree (Address: 0x1010e1cc)
  • HeapReAlloc (Address: 0x1010e0e0)
  • HeapSize (Address: 0x1010e0f8)
  • InitializeCriticalSection (Address: 0x1010e20c)
  • InitializeCriticalSectionAndSpinCount (Address: 0x1010e07c)
  • InterlockedCompareExchange (Address: 0x1010e19c)
  • IsValidCodePage (Address: 0x1010e0c4)
  • LCMapStringW (Address: 0x1010e0f4)
  • LeaveCriticalSection (Address: 0x1010e0c0)
  • LoadLibraryA (Address: 0x1010e120)
  • LoadLibraryExA (Address: 0x1010e0d8)
  • LoadLibraryExW (Address: 0x1010e1a8)
  • LoadLibraryW (Address: 0x1010e1f4)
  • lstrlenW (Address: 0x1010e1f8)
  • MultiByteToWideChar (Address: 0x1010e0f0)
  • OpenProcess (Address: 0x1010e1ec)
  • OutputDebugStringA (Address: 0x1010e0b8)
  • QueryPerformanceCounter (Address: 0x1010e08c)
  • RaiseException (Address: 0x1010e1e8)
  • ReadFile (Address: 0x1010e184)
  • ReleaseMutex (Address: 0x1010e1d8)
  • RemoveDirectoryA (Address: 0x1010e164)
  • RemoveDirectoryW (Address: 0x1010e168)
  • RtlUnwind (Address: 0x1010e0e8)
  • SetEndOfFile (Address: 0x1010e188)
  • SetFileAttributesA (Address: 0x1010e14c)
  • SetFileAttributesW (Address: 0x1010e150)
  • SetFilePointer (Address: 0x1010e1fc)
  • SetLastError (Address: 0x1010e214)
  • SetStdHandle (Address: 0x1010e1bc)
  • SetUnhandledExceptionFilter (Address: 0x1010e0ac)
  • Sleep (Address: 0x1010e1ac)
  • TerminateProcess (Address: 0x1010e0b4)
  • TlsAlloc (Address: 0x1010e114)
  • TlsFree (Address: 0x1010e108)
  • TlsGetValue (Address: 0x1010e110)
  • TlsSetValue (Address: 0x1010e10c)
  • UnhandledExceptionFilter (Address: 0x1010e0a8)
  • VirtualAlloc (Address: 0x1010e0e4)
  • VirtualFree (Address: 0x1010e070)
  • VirtualProtect (Address: 0x1010e0dc)
  • VirtualQuery (Address: 0x1010e100)
  • WaitForSingleObject (Address: 0x1010e1d4)
  • WideCharToMultiByte (Address: 0x1010e0a4)
  • WriteConsoleW (Address: 0x1010e1c0)
  • WriteFile (Address: 0x1010e0d4)
mscoree.dll
  • GetRequestedRuntimeInfo (Address: 0x1010e254)
OLE32.dll
  • CoTaskMemAlloc (Address: 0x1010e224)
  • CoTaskMemFree (Address: 0x1010e228)
RPCRT4.dll
  • RpcStringFreeW (Address: 0x1010e234)
  • UuidToStringW (Address: 0x1010e230)
SHELL32.dll
  • SHParseDisplayName (Address: 0x1010e23c)
urlmon.dll
  • CoInternetCreateSecurityManager (Address: 0x1010e25c)
VERSION.dll
  • GetFileVersionInfoSizeW (Address: 0x1010e248)
  • GetFileVersionInfoW (Address: 0x1010e24c)
  • VerQueryValueW (Address: 0x1010e244)