ieshims.dll

Description: Internet Explorer Compatibility Shims

Authors: © Microsoft Corporation. All rights reserved.

Version: 8.0.7600.16385

Architecture: 64-bit

Operating System: Windows NT

SHA256: 7a59828322c21e52d3e8387dcd6bdf67

File Size: 295.5 KB

Uploaded At: Dec. 1, 2025, 7:29 a.m.

Views: 6

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess

Exported Functions

  • AcRedirNotify (Ordinal: 1, Address: 0x21500)
  • AcRedirNotifySetEnabled (Ordinal: 2, Address: 0x21578)
  • AcRedirSetEnabled (Ordinal: 3, Address: 0x21588)
  • IEShims_GetOriginatingThreadId (Ordinal: 4, Address: 0x140cc)
  • IEShims_InDllMainContext (Ordinal: 5, Address: 0xff08)
  • IEShims_Initialize (Ordinal: 6, Address: 0xfdac)
  • IEShims_SetRedirectRegistryForThread (Ordinal: 7, Address: 0xfe6c)
  • IEShims_Uninitialize (Ordinal: 8, Address: 0xfe60)

Imported DLLs & Functions

ADVAPI32.dll
  • DecryptFileW (Address: 0x7ff34441040)
  • EncryptFileW (Address: 0x7ff34441038)
  • RegCloseKey (Address: 0x7ff34441048)
  • RegCreateKeyExW (Address: 0x7ff34441010)
  • RegEnumKeyW (Address: 0x7ff34441028)
  • RegEnumValueW (Address: 0x7ff34441018)
  • RegOpenKeyExW (Address: 0x7ff34441008)
  • RegQueryInfoKeyW (Address: 0x7ff34441020)
  • RegQueryValueExW (Address: 0x7ff34441000)
  • RegSetValueExW (Address: 0x7ff34441030)
iertutil.dll
  • (Address: 0x7ff344413a8)
  • (Address: 0x7ff344413b0)
  • (Address: 0x7ff344413b8)
  • (Address: 0x7ff344413c0)
  • (Address: 0x7ff344413c8)
KERNEL32.dll
  • CloseHandle (Address: 0x7ff344412b0)
  • CopyFileW (Address: 0x7ff34441108)
  • CreateDirectoryW (Address: 0x7ff34441110)
  • CreateFileMappingW (Address: 0x7ff34441160)
  • CreateFileW (Address: 0x7ff344412c8)
  • CreateMutexW (Address: 0x7ff34441058)
  • DecodePointer (Address: 0x7ff34441180)
  • DeleteCriticalSection (Address: 0x7ff34441288)
  • DeleteProcThreadAttributeList (Address: 0x7ff344412b8)
  • DeviceIoControl (Address: 0x7ff344410f8)
  • DuplicateHandle (Address: 0x7ff344410d0)
  • EncodePointer (Address: 0x7ff34441138)
  • EnterCriticalSection (Address: 0x7ff34441128)
  • ExpandEnvironmentStringsW (Address: 0x7ff34441258)
  • FindClose (Address: 0x7ff34441120)
  • FindFirstFileW (Address: 0x7ff34441130)
  • FindNextFileW (Address: 0x7ff34441118)
  • FreeLibrary (Address: 0x7ff344411c8)
  • GetCurrentDirectoryW (Address: 0x7ff344411e8)
  • GetCurrentProcess (Address: 0x7ff344410d8)
  • GetCurrentProcessId (Address: 0x7ff34441210)
  • GetCurrentThreadId (Address: 0x7ff34441190)
  • GetEnvironmentVariableW (Address: 0x7ff34441220)
  • GetFileAttributesW (Address: 0x7ff344411a0)
  • GetFileInformationByHandle (Address: 0x7ff344410e8)
  • GetFileSizeEx (Address: 0x7ff34441188)
  • GetFullPathNameW (Address: 0x7ff34441218)
  • GetLastError (Address: 0x7ff34441200)
  • GetLogicalDriveStringsW (Address: 0x7ff34441168)
  • GetLongPathNameW (Address: 0x7ff34441248)
  • GetModuleFileNameW (Address: 0x7ff344411a8)
  • GetModuleHandleA (Address: 0x7ff344410c0)
  • GetModuleHandleExW (Address: 0x7ff34441260)
  • GetModuleHandleW (Address: 0x7ff344411d0)
  • GetProcAddress (Address: 0x7ff344411f0)
  • GetProcessHeap (Address: 0x7ff34441238)
  • GetProcessId (Address: 0x7ff34441208)
  • GetSystemDirectoryW (Address: 0x7ff34441240)
  • GetSystemTimeAsFileTime (Address: 0x7ff34441088)
  • GetTickCount (Address: 0x7ff34441090)
  • GetWindowsDirectoryW (Address: 0x7ff34441250)
  • HeapAlloc (Address: 0x7ff34441228)
  • HeapFree (Address: 0x7ff34441230)
  • InitializeCriticalSection (Address: 0x7ff34441098)
  • InitializeCriticalSectionAndSpinCount (Address: 0x7ff34441278)
  • InitializeProcThreadAttributeList (Address: 0x7ff34441178)
  • LeaveCriticalSection (Address: 0x7ff34441280)
  • LoadLibraryW (Address: 0x7ff34441140)
  • LocalAlloc (Address: 0x7ff344411b8)
  • LocalFree (Address: 0x7ff344411f8)
  • lstrcmpiW (Address: 0x7ff344410f0)
  • lstrlenW (Address: 0x7ff34441100)
  • MapViewOfFile (Address: 0x7ff34441150)
  • MultiByteToWideChar (Address: 0x7ff344411e0)
  • OpenEventW (Address: 0x7ff344412a8)
  • OpenProcess (Address: 0x7ff34441068)
  • OutputDebugStringA (Address: 0x7ff344410b0)
  • OutputDebugStringW (Address: 0x7ff344410a8)
  • QueryDosDeviceW (Address: 0x7ff34441070)
  • QueryPerformanceCounter (Address: 0x7ff34441170)
  • ReleaseMutex (Address: 0x7ff34441148)
  • SearchPathW (Address: 0x7ff34441198)
  • SetEnvironmentVariableW (Address: 0x7ff344410c8)
  • SetFileAttributesW (Address: 0x7ff344410e0)
  • SetLastError (Address: 0x7ff344411b0)
  • SetUnhandledExceptionFilter (Address: 0x7ff34441078)
  • Sleep (Address: 0x7ff344410a0)
  • TerminateProcess (Address: 0x7ff344412c0)
  • TlsAlloc (Address: 0x7ff34441290)
  • TlsFree (Address: 0x7ff34441298)
  • TlsGetValue (Address: 0x7ff34441268)
  • TlsSetValue (Address: 0x7ff34441270)
  • UnhandledExceptionFilter (Address: 0x7ff34441080)
  • UnmapViewOfFile (Address: 0x7ff34441158)
  • VirtualProtect (Address: 0x7ff344410b8)
  • VirtualQuery (Address: 0x7ff344411c0)
  • WaitForSingleObject (Address: 0x7ff34441060)
  • WaitForSingleObjectEx (Address: 0x7ff344412a0)
  • WideCharToMultiByte (Address: 0x7ff344411d8)
msvcrt.dll
  • __C_specific_handler (Address: 0x7ff34441468)
  • __CxxFrameHandler3 (Address: 0x7ff344414b0)
  • __dllonexit (Address: 0x7ff34441488)
  • _amsg_exit (Address: 0x7ff34441460)
  • _CxxThrowException (Address: 0x7ff344414f8)
  • _initterm (Address: 0x7ff34441458)
  • _lock (Address: 0x7ff34441490)
  • _onexit (Address: 0x7ff34441498)
  • _unlock (Address: 0x7ff34441480)
  • _vscwprintf (Address: 0x7ff34441408)
  • _vsnwprintf (Address: 0x7ff344413e0)
  • _wcsicmp (Address: 0x7ff344414d0)
  • _wcslwr (Address: 0x7ff344413f8)
  • _wcsnicmp (Address: 0x7ff344414e8)
  • _wfopen (Address: 0x7ff34441438)
  • _XcptFilter (Address: 0x7ff34441450)
  • ??1type_info@@UEAA@XZ (Address: 0x7ff34441470)
  • ?terminate@@YAXXZ (Address: 0x7ff34441478)
  • calloc (Address: 0x7ff34441430)
  • fclose (Address: 0x7ff34441448)
  • fputws (Address: 0x7ff34441440)
  • free (Address: 0x7ff344413d8)
  • iswctype (Address: 0x7ff344414c0)
  • iswspace (Address: 0x7ff344414d8)
  • malloc (Address: 0x7ff344414e0)
  • memcpy (Address: 0x7ff344414a8)
  • memmove (Address: 0x7ff34441400)
  • memset (Address: 0x7ff344414a0)
  • realloc (Address: 0x7ff34441418)
  • towlower (Address: 0x7ff344414c8)
  • wcschr (Address: 0x7ff34441410)
  • wcsncmp (Address: 0x7ff34441428)
  • wcspbrk (Address: 0x7ff344414f0)
  • wcsrchr (Address: 0x7ff344413f0)
  • wcsspn (Address: 0x7ff34441420)
  • wcsstr (Address: 0x7ff344413e8)
  • wcstok (Address: 0x7ff344414b8)
ntdll.dll
  • NtQueryObject (Address: 0x7ff34441528)
  • RtlCaptureContext (Address: 0x7ff34441508)
  • RtlLookupFunctionEntry (Address: 0x7ff34441510)
  • RtlNtStatusToDosError (Address: 0x7ff34441520)
  • RtlVirtualUnwind (Address: 0x7ff34441518)
ole32.dll
  • CoInitialize (Address: 0x7ff34441558)
  • CoTaskMemAlloc (Address: 0x7ff34441548)
  • CoTaskMemFree (Address: 0x7ff34441540)
  • CoUninitialize (Address: 0x7ff34441550)
  • StringFromGUID2 (Address: 0x7ff34441538)
OLEAUT32.dll
  • SysAllocString (Address: 0x7ff344412e0)
  • SysFreeString (Address: 0x7ff344412d8)
SHELL32.dll
  • ShellExecuteExW (Address: 0x7ff344412f0)
  • SHGetFolderPathW (Address: 0x7ff344412f8)
SHLWAPI.dll
  • (Address: 0x7ff34441350)
  • (Address: 0x7ff34441348)
  • (Address: 0x7ff34441340)
  • (Address: 0x7ff34441338)
  • (Address: 0x7ff34441330)
  • (Address: 0x7ff34441318)
  • PathFindFileNameW (Address: 0x7ff34441320)
  • PathGetArgsW (Address: 0x7ff34441360)
  • PathIsUNCW (Address: 0x7ff34441328)
  • PathSkipRootW (Address: 0x7ff34441358)
  • SHRegGetValueW (Address: 0x7ff34441310)
  • StrDupW (Address: 0x7ff34441308)
USER32.dll
  • AllowSetForegroundWindow (Address: 0x7ff34441390)
  • GetClassNameW (Address: 0x7ff34441388)
  • GetForegroundWindow (Address: 0x7ff34441378)
  • GetGUIThreadInfo (Address: 0x7ff34441380)
  • GetPropW (Address: 0x7ff34441398)
  • GetWindowThreadProcessId (Address: 0x7ff34441370)