ieshims.dll
Description: Internet Explorer Compatibility Shims
Authors: © Microsoft Corporation. All rights reserved.
Version: 8.0.7600.16385
Architecture: 64-bit
Operating System: Windows NT
SHA256: 7a59828322c21e52d3e8387dcd6bdf67
File Size: 295.5 KB
Uploaded At: Dec. 1, 2025, 7:29 a.m.
Views: 6
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: OpenProcess
Exported Functions
- AcRedirNotify (Ordinal: 1, Address: 0x21500)
- AcRedirNotifySetEnabled (Ordinal: 2, Address: 0x21578)
- AcRedirSetEnabled (Ordinal: 3, Address: 0x21588)
- IEShims_GetOriginatingThreadId (Ordinal: 4, Address: 0x140cc)
- IEShims_InDllMainContext (Ordinal: 5, Address: 0xff08)
- IEShims_Initialize (Ordinal: 6, Address: 0xfdac)
- IEShims_SetRedirectRegistryForThread (Ordinal: 7, Address: 0xfe6c)
- IEShims_Uninitialize (Ordinal: 8, Address: 0xfe60)
Imported DLLs & Functions
ADVAPI32.dll
- DecryptFileW (Address: 0x7ff34441040)
- EncryptFileW (Address: 0x7ff34441038)
- RegCloseKey (Address: 0x7ff34441048)
- RegCreateKeyExW (Address: 0x7ff34441010)
- RegEnumKeyW (Address: 0x7ff34441028)
- RegEnumValueW (Address: 0x7ff34441018)
- RegOpenKeyExW (Address: 0x7ff34441008)
- RegQueryInfoKeyW (Address: 0x7ff34441020)
- RegQueryValueExW (Address: 0x7ff34441000)
- RegSetValueExW (Address: 0x7ff34441030)
iertutil.dll
- (Address: 0x7ff344413a8)
- (Address: 0x7ff344413b0)
- (Address: 0x7ff344413b8)
- (Address: 0x7ff344413c0)
- (Address: 0x7ff344413c8)
KERNEL32.dll
- CloseHandle (Address: 0x7ff344412b0)
- CopyFileW (Address: 0x7ff34441108)
- CreateDirectoryW (Address: 0x7ff34441110)
- CreateFileMappingW (Address: 0x7ff34441160)
- CreateFileW (Address: 0x7ff344412c8)
- CreateMutexW (Address: 0x7ff34441058)
- DecodePointer (Address: 0x7ff34441180)
- DeleteCriticalSection (Address: 0x7ff34441288)
- DeleteProcThreadAttributeList (Address: 0x7ff344412b8)
- DeviceIoControl (Address: 0x7ff344410f8)
- DuplicateHandle (Address: 0x7ff344410d0)
- EncodePointer (Address: 0x7ff34441138)
- EnterCriticalSection (Address: 0x7ff34441128)
- ExpandEnvironmentStringsW (Address: 0x7ff34441258)
- FindClose (Address: 0x7ff34441120)
- FindFirstFileW (Address: 0x7ff34441130)
- FindNextFileW (Address: 0x7ff34441118)
- FreeLibrary (Address: 0x7ff344411c8)
- GetCurrentDirectoryW (Address: 0x7ff344411e8)
- GetCurrentProcess (Address: 0x7ff344410d8)
- GetCurrentProcessId (Address: 0x7ff34441210)
- GetCurrentThreadId (Address: 0x7ff34441190)
- GetEnvironmentVariableW (Address: 0x7ff34441220)
- GetFileAttributesW (Address: 0x7ff344411a0)
- GetFileInformationByHandle (Address: 0x7ff344410e8)
- GetFileSizeEx (Address: 0x7ff34441188)
- GetFullPathNameW (Address: 0x7ff34441218)
- GetLastError (Address: 0x7ff34441200)
- GetLogicalDriveStringsW (Address: 0x7ff34441168)
- GetLongPathNameW (Address: 0x7ff34441248)
- GetModuleFileNameW (Address: 0x7ff344411a8)
- GetModuleHandleA (Address: 0x7ff344410c0)
- GetModuleHandleExW (Address: 0x7ff34441260)
- GetModuleHandleW (Address: 0x7ff344411d0)
- GetProcAddress (Address: 0x7ff344411f0)
- GetProcessHeap (Address: 0x7ff34441238)
- GetProcessId (Address: 0x7ff34441208)
- GetSystemDirectoryW (Address: 0x7ff34441240)
- GetSystemTimeAsFileTime (Address: 0x7ff34441088)
- GetTickCount (Address: 0x7ff34441090)
- GetWindowsDirectoryW (Address: 0x7ff34441250)
- HeapAlloc (Address: 0x7ff34441228)
- HeapFree (Address: 0x7ff34441230)
- InitializeCriticalSection (Address: 0x7ff34441098)
- InitializeCriticalSectionAndSpinCount (Address: 0x7ff34441278)
- InitializeProcThreadAttributeList (Address: 0x7ff34441178)
- LeaveCriticalSection (Address: 0x7ff34441280)
- LoadLibraryW (Address: 0x7ff34441140)
- LocalAlloc (Address: 0x7ff344411b8)
- LocalFree (Address: 0x7ff344411f8)
- lstrcmpiW (Address: 0x7ff344410f0)
- lstrlenW (Address: 0x7ff34441100)
- MapViewOfFile (Address: 0x7ff34441150)
- MultiByteToWideChar (Address: 0x7ff344411e0)
- OpenEventW (Address: 0x7ff344412a8)
- OpenProcess (Address: 0x7ff34441068)
- OutputDebugStringA (Address: 0x7ff344410b0)
- OutputDebugStringW (Address: 0x7ff344410a8)
- QueryDosDeviceW (Address: 0x7ff34441070)
- QueryPerformanceCounter (Address: 0x7ff34441170)
- ReleaseMutex (Address: 0x7ff34441148)
- SearchPathW (Address: 0x7ff34441198)
- SetEnvironmentVariableW (Address: 0x7ff344410c8)
- SetFileAttributesW (Address: 0x7ff344410e0)
- SetLastError (Address: 0x7ff344411b0)
- SetUnhandledExceptionFilter (Address: 0x7ff34441078)
- Sleep (Address: 0x7ff344410a0)
- TerminateProcess (Address: 0x7ff344412c0)
- TlsAlloc (Address: 0x7ff34441290)
- TlsFree (Address: 0x7ff34441298)
- TlsGetValue (Address: 0x7ff34441268)
- TlsSetValue (Address: 0x7ff34441270)
- UnhandledExceptionFilter (Address: 0x7ff34441080)
- UnmapViewOfFile (Address: 0x7ff34441158)
- VirtualProtect (Address: 0x7ff344410b8)
- VirtualQuery (Address: 0x7ff344411c0)
- WaitForSingleObject (Address: 0x7ff34441060)
- WaitForSingleObjectEx (Address: 0x7ff344412a0)
- WideCharToMultiByte (Address: 0x7ff344411d8)
msvcrt.dll
- __C_specific_handler (Address: 0x7ff34441468)
- __CxxFrameHandler3 (Address: 0x7ff344414b0)
- __dllonexit (Address: 0x7ff34441488)
- _amsg_exit (Address: 0x7ff34441460)
- _CxxThrowException (Address: 0x7ff344414f8)
- _initterm (Address: 0x7ff34441458)
- _lock (Address: 0x7ff34441490)
- _onexit (Address: 0x7ff34441498)
- _unlock (Address: 0x7ff34441480)
- _vscwprintf (Address: 0x7ff34441408)
- _vsnwprintf (Address: 0x7ff344413e0)
- _wcsicmp (Address: 0x7ff344414d0)
- _wcslwr (Address: 0x7ff344413f8)
- _wcsnicmp (Address: 0x7ff344414e8)
- _wfopen (Address: 0x7ff34441438)
- _XcptFilter (Address: 0x7ff34441450)
- ??1type_info@@UEAA@XZ (Address: 0x7ff34441470)
- ?terminate@@YAXXZ (Address: 0x7ff34441478)
- calloc (Address: 0x7ff34441430)
- fclose (Address: 0x7ff34441448)
- fputws (Address: 0x7ff34441440)
- free (Address: 0x7ff344413d8)
- iswctype (Address: 0x7ff344414c0)
- iswspace (Address: 0x7ff344414d8)
- malloc (Address: 0x7ff344414e0)
- memcpy (Address: 0x7ff344414a8)
- memmove (Address: 0x7ff34441400)
- memset (Address: 0x7ff344414a0)
- realloc (Address: 0x7ff34441418)
- towlower (Address: 0x7ff344414c8)
- wcschr (Address: 0x7ff34441410)
- wcsncmp (Address: 0x7ff34441428)
- wcspbrk (Address: 0x7ff344414f0)
- wcsrchr (Address: 0x7ff344413f0)
- wcsspn (Address: 0x7ff34441420)
- wcsstr (Address: 0x7ff344413e8)
- wcstok (Address: 0x7ff344414b8)
ntdll.dll
- NtQueryObject (Address: 0x7ff34441528)
- RtlCaptureContext (Address: 0x7ff34441508)
- RtlLookupFunctionEntry (Address: 0x7ff34441510)
- RtlNtStatusToDosError (Address: 0x7ff34441520)
- RtlVirtualUnwind (Address: 0x7ff34441518)
ole32.dll
- CoInitialize (Address: 0x7ff34441558)
- CoTaskMemAlloc (Address: 0x7ff34441548)
- CoTaskMemFree (Address: 0x7ff34441540)
- CoUninitialize (Address: 0x7ff34441550)
- StringFromGUID2 (Address: 0x7ff34441538)
OLEAUT32.dll
- SysAllocString (Address: 0x7ff344412e0)
- SysFreeString (Address: 0x7ff344412d8)
SHELL32.dll
- ShellExecuteExW (Address: 0x7ff344412f0)
- SHGetFolderPathW (Address: 0x7ff344412f8)
SHLWAPI.dll
- (Address: 0x7ff34441350)
- (Address: 0x7ff34441348)
- (Address: 0x7ff34441340)
- (Address: 0x7ff34441338)
- (Address: 0x7ff34441330)
- (Address: 0x7ff34441318)
- PathFindFileNameW (Address: 0x7ff34441320)
- PathGetArgsW (Address: 0x7ff34441360)
- PathIsUNCW (Address: 0x7ff34441328)
- PathSkipRootW (Address: 0x7ff34441358)
- SHRegGetValueW (Address: 0x7ff34441310)
- StrDupW (Address: 0x7ff34441308)
USER32.dll
- AllowSetForegroundWindow (Address: 0x7ff34441390)
- GetClassNameW (Address: 0x7ff34441388)
- GetForegroundWindow (Address: 0x7ff34441378)
- GetGUIThreadInfo (Address: 0x7ff34441380)
- GetPropW (Address: 0x7ff34441398)
- GetWindowThreadProcessId (Address: 0x7ff34441370)