dfshim.dll

Description: ClickOnce Application Deployment Support Library

Authors: © Microsoft Corporation. All rights reserved.

Version: 10.0.19041.1

Architecture: 64-bit

Operating System: Windows NT

SHA256: 65cb5a9e02a25267ac0cedd9ca048dfe

File Size: 1.5 MB

Uploaded At: Dec. 1, 2025, 7:26 a.m.

Views: 12

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess

Exported Functions

  • CreateActContext (Ordinal: 1, Address: 0x52a0)
  • CreateCMSFromXml (Ordinal: 2, Address: 0x5220)
  • GetCurrentActContext (Ordinal: 3, Address: 0x5300)
  • GetUserStateManager (Ordinal: 4, Address: 0x5120)
  • GetUserStore (Ordinal: 5, Address: 0x50a0)
  • KillService (Ordinal: 6, Address: 0x19e0)
  • LaunchApplication (Ordinal: 7, Address: 0x16e0)
  • ParseManifest (Ordinal: 8, Address: 0x51a0)
  • ShArpMaintain (Ordinal: 9, Address: 0x1870)
  • ShArpMaintainW (Ordinal: 10, Address: 0x1700)
  • ShOpenVerbApplication (Ordinal: 11, Address: 0x14e0)
  • ShOpenVerbApplicationW (Ordinal: 12, Address: 0x14c0)
  • ShOpenVerbExtension (Ordinal: 13, Address: 0x15f0)
  • ShOpenVerbExtensionW (Ordinal: 14, Address: 0x1500)
  • ShOpenVerbShortcut (Ordinal: 15, Address: 0x1390)
  • ShOpenVerbShortcutW (Ordinal: 16, Address: 0x1230)
  • CleanOnlineAppCache (Ordinal: 17, Address: 0x1a50)
  • DllCanUnloadNow (Ordinal: 18, Address: 0x1080)
  • DllGetClassObject (Ordinal: 19, Address: 0x1100)
  • GetDeploymentDataFromManifest (Ordinal: 20, Address: 0x1b40)

Imported DLLs & Functions

ADVAPI32.dll
  • CryptAcquireContextA (Address: 0x180146bb0)
  • CryptCreateHash (Address: 0x180146c58)
  • CryptDestroyHash (Address: 0x180146c50)
  • CryptGenRandom (Address: 0x180146ba8)
  • CryptGetHashParam (Address: 0x180146c60)
  • CryptHashData (Address: 0x180146c68)
  • CryptReleaseContext (Address: 0x180146bb8)
  • RegCloseKey (Address: 0x180146c48)
  • RegCreateKeyExA (Address: 0x180146c20)
  • RegCreateKeyExW (Address: 0x180146c18)
  • RegDeleteKeyA (Address: 0x180146c00)
  • RegDeleteKeyW (Address: 0x180146bf8)
  • RegDeleteValueA (Address: 0x180146bf0)
  • RegDeleteValueW (Address: 0x180146be8)
  • RegEnumKeyExA (Address: 0x180146be0)
  • RegEnumKeyExW (Address: 0x180146bd8)
  • RegEnumValueA (Address: 0x180146bd0)
  • RegEnumValueW (Address: 0x180146bc8)
  • RegOpenKeyExA (Address: 0x180146c10)
  • RegOpenKeyExW (Address: 0x180146c08)
  • RegQueryInfoKeyA (Address: 0x180146bc0)
  • RegQueryValueExA (Address: 0x180146c40)
  • RegQueryValueExW (Address: 0x180146c38)
  • RegSetValueExA (Address: 0x180146c30)
  • RegSetValueExW (Address: 0x180146c28)
KERNEL32.dll
  • AreFileApisANSI (Address: 0x180146e28)
  • CloseHandle (Address: 0x180146e30)
  • CopyFileA (Address: 0x180146e88)
  • CopyFileW (Address: 0x180146e90)
  • CreateDirectoryA (Address: 0x180146e48)
  • CreateDirectoryW (Address: 0x180146e50)
  • CreateFileA (Address: 0x180146e58)
  • CreateFileW (Address: 0x180146e60)
  • CreateMutexA (Address: 0x180146f98)
  • CreateMutexW (Address: 0x180146f90)
  • DebugBreak (Address: 0x180146fa0)
  • DecodePointer (Address: 0x180146e00)
  • DeleteCriticalSection (Address: 0x180146cb8)
  • DeleteFileA (Address: 0x180146e68)
  • DeleteFileW (Address: 0x180146e70)
  • DisableThreadLibraryCalls (Address: 0x180147008)
  • EncodePointer (Address: 0x180146e08)
  • EnterCriticalSection (Address: 0x180146d50)
  • ExitProcess (Address: 0x180146c78)
  • FindClose (Address: 0x180146ed8)
  • FindFirstFileA (Address: 0x180146ec8)
  • FindFirstFileW (Address: 0x180146ed0)
  • FindNextFileA (Address: 0x180146eb8)
  • FindNextFileW (Address: 0x180146ec0)
  • FlsAlloc (Address: 0x180146df8)
  • FlsFree (Address: 0x180146de8)
  • FlsGetValue (Address: 0x180146df0)
  • FlsSetValue (Address: 0x180146ef8)
  • FlushFileBuffers (Address: 0x180146f60)
  • FreeEnvironmentStringsW (Address: 0x180146cf8)
  • FreeLibrary (Address: 0x180146f48)
  • GetACP (Address: 0x180146d68)
  • GetCommandLineA (Address: 0x180146f00)
  • GetConsoleCP (Address: 0x180146f08)
  • GetConsoleMode (Address: 0x180146f20)
  • GetCPInfo (Address: 0x180146d78)
  • GetCurrentProcess (Address: 0x180146d38)
  • GetCurrentProcessId (Address: 0x180146cd8)
  • GetCurrentThreadId (Address: 0x180146de0)
  • GetEnvironmentStringsW (Address: 0x180146cf0)
  • GetEnvironmentVariableA (Address: 0x180146e18)
  • GetFileAttributesA (Address: 0x180146e98)
  • GetFileAttributesW (Address: 0x180146ea0)
  • GetFileInformationByHandle (Address: 0x180146ee0)
  • GetFileSize (Address: 0x180146fe8)
  • GetFileType (Address: 0x180146ca8)
  • GetFullPathNameA (Address: 0x180146e38)
  • GetFullPathNameW (Address: 0x180146e40)
  • GetLastError (Address: 0x180146f38)
  • GetModuleFileNameA (Address: 0x180146cc8)
  • GetModuleFileNameW (Address: 0x180146f68)
  • GetModuleHandleA (Address: 0x180146f10)
  • GetModuleHandleExW (Address: 0x180146c80)
  • GetOEMCP (Address: 0x180146d70)
  • GetProcAddress (Address: 0x180146f40)
  • GetProcessHeap (Address: 0x180146f78)
  • GetProcessTimes (Address: 0x180146fb8)
  • GetStartupInfoW (Address: 0x180146cc0)
  • GetStdHandle (Address: 0x180146ca0)
  • GetStringTypeW (Address: 0x180146d98)
  • GetSystemDirectoryA (Address: 0x180146fd8)
  • GetSystemInfo (Address: 0x180146dc0)
  • GetSystemTimeAsFileTime (Address: 0x180146ce0)
  • GetTickCount (Address: 0x180146ce8)
  • GetVersion (Address: 0x180146f18)
  • GetVersionExA (Address: 0x180146fe0)
  • GetVersionExW (Address: 0x180146e10)
  • HeapAlloc (Address: 0x180146ff8)
  • HeapCreate (Address: 0x180146c88)
  • HeapDestroy (Address: 0x180146c90)
  • HeapFree (Address: 0x180146f70)
  • HeapReAlloc (Address: 0x180146d90)
  • HeapSetInformation (Address: 0x180146c98)
  • HeapSize (Address: 0x180146db0)
  • InitializeCriticalSection (Address: 0x180146ff0)
  • InitializeCriticalSectionAndSpinCount (Address: 0x180146cb0)
  • IsValidCodePage (Address: 0x180146d60)
  • LCMapStringW (Address: 0x180146da8)
  • LeaveCriticalSection (Address: 0x180146d58)
  • LoadLibraryA (Address: 0x180146e20)
  • LoadLibraryExA (Address: 0x180146d88)
  • LoadLibraryExW (Address: 0x180146f28)
  • LoadLibraryW (Address: 0x180146fc0)
  • lstrlenW (Address: 0x180146fc8)
  • MultiByteToWideChar (Address: 0x180146da0)
  • OpenProcess (Address: 0x180146fb0)
  • OutputDebugStringA (Address: 0x180146d48)
  • QueryPerformanceCounter (Address: 0x180146cd0)
  • RaiseException (Address: 0x180146fa8)
  • ReadFile (Address: 0x180146ee8)
  • ReleaseMutex (Address: 0x180146f88)
  • RemoveDirectoryA (Address: 0x180146ea8)
  • RemoveDirectoryW (Address: 0x180146eb0)
  • RtlCaptureContext (Address: 0x180146d10)
  • RtlLookupFunctionEntry (Address: 0x180146d18)
  • RtlUnwindEx (Address: 0x180146d08)
  • RtlVirtualUnwind (Address: 0x180146d20)
  • SetEndOfFile (Address: 0x180146ef0)
  • SetFileAttributesA (Address: 0x180146e78)
  • SetFileAttributesW (Address: 0x180146e80)
  • SetFilePointer (Address: 0x180146fd0)
  • SetLastError (Address: 0x180147000)
  • SetStdHandle (Address: 0x180146f50)
  • SetThreadStackGuarantee (Address: 0x180146db8)
  • SetUnhandledExceptionFilter (Address: 0x180146d30)
  • Sleep (Address: 0x180146f30)
  • TerminateProcess (Address: 0x180146d40)
  • UnhandledExceptionFilter (Address: 0x180146d28)
  • VirtualAlloc (Address: 0x180146dc8)
  • VirtualProtect (Address: 0x180146dd0)
  • VirtualQuery (Address: 0x180146dd8)
  • WaitForSingleObject (Address: 0x180146f80)
  • WideCharToMultiByte (Address: 0x180146d00)
  • WriteConsoleW (Address: 0x180146f58)
  • WriteFile (Address: 0x180146d80)
mscoree.dll
  • GetRequestedRuntimeInfo (Address: 0x180147078)
OLE32.dll
  • CoTaskMemAlloc (Address: 0x180147018)
  • CoTaskMemFree (Address: 0x180147020)
RPCRT4.dll
  • RpcStringFreeW (Address: 0x180147038)
  • UuidToStringW (Address: 0x180147030)
SHELL32.dll
  • SHParseDisplayName (Address: 0x180147048)
urlmon.dll
  • CoInternetCreateSecurityManager (Address: 0x180147088)
VERSION.dll
  • GetFileVersionInfoSizeW (Address: 0x180147060)
  • GetFileVersionInfoW (Address: 0x180147068)
  • VerQueryValueW (Address: 0x180147058)