ie_to_edge_bho_64.dll

Description: IEToEdge BHO

Authors: Copyright Microsoft Corporation. All rights reserved.

Version: 142.0.3595.94

Architecture: 64-bit

Operating System: Windows

SHA256: 3205087262ff8523fa2c4f492f5994a9

File Size: 576.1 KB

Uploaded At: Dec. 2, 2025, 2:43 p.m.

Views: 6

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess

Exported Functions

  • DllCanUnloadNow (Ordinal: 1, Address: 0x7340)
  • DllGetClassObject (Ordinal: 2, Address: 0x7360)
  • DllInstall (Ordinal: 3, Address: 0x71d0)
  • DllRegisterServer (Ordinal: 4, Address: 0x71d0)
  • DllUnregisterServer (Ordinal: 5, Address: 0x71d0)

Imported DLLs & Functions

ADVAPI32.dll
  • ConvertStringSecurityDescriptorToSecurityDescriptorW (Address: 0x18007d038)
  • GetTokenInformation (Address: 0x18007d040)
  • OpenProcessToken (Address: 0x18007d048)
  • RegCloseKey (Address: 0x18007d050)
  • RegCreateKeyExW (Address: 0x18007d058)
  • RegDeleteValueW (Address: 0x18007d060)
  • RegGetValueW (Address: 0x18007d068)
  • RegOpenKeyExW (Address: 0x18007d070)
  • RegQueryValueExW (Address: 0x18007d078)
  • RegSetValueExW (Address: 0x18007d080)
  • SystemFunction036 (Address: 0x18007d088)
KERNEL32.dll
  • AcquireSRWLockExclusive (Address: 0x18007cb50)
  • CloseHandle (Address: 0x18007cb58)
  • CompareFileTime (Address: 0x18007cb60)
  • CompareStringW (Address: 0x18007cb68)
  • CreateDirectoryW (Address: 0x18007cb70)
  • CreateEventW (Address: 0x18007cb78)
  • CreateFileW (Address: 0x18007cb80)
  • CreateMutexW (Address: 0x18007cb88)
  • CreateProcessW (Address: 0x18007cb90)
  • CreateThread (Address: 0x18007cb98)
  • DebugBreak (Address: 0x18007cba0)
  • DecodePointer (Address: 0x18007cba8)
  • DeleteCriticalSection (Address: 0x18007cbb0)
  • EncodePointer (Address: 0x18007cbb8)
  • EnterCriticalSection (Address: 0x18007cbc0)
  • EnumSystemLocalesW (Address: 0x18007cbc8)
  • ExitProcess (Address: 0x18007cbd0)
  • FindClose (Address: 0x18007cbd8)
  • FindFirstFileExW (Address: 0x18007cbe0)
  • FindNextFileW (Address: 0x18007cbe8)
  • FindResourceExW (Address: 0x18007cbf0)
  • FlsAlloc (Address: 0x18007cbf8)
  • FlsFree (Address: 0x18007cc00)
  • FlsGetValue (Address: 0x18007cc08)
  • FlsSetValue (Address: 0x18007cc10)
  • FlushFileBuffers (Address: 0x18007cc18)
  • FlushInstructionCache (Address: 0x18007cc20)
  • FreeEnvironmentStringsW (Address: 0x18007cc28)
  • FreeLibrary (Address: 0x18007cc30)
  • GetACP (Address: 0x18007cc38)
  • GetCommandLineA (Address: 0x18007cc48)
  • GetCommandLineW (Address: 0x18007cc50)
  • GetConsoleMode (Address: 0x18007cc58)
  • GetConsoleOutputCP (Address: 0x18007cc60)
  • GetCPInfo (Address: 0x18007cc40)
  • GetCurrentProcess (Address: 0x18007cc68)
  • GetCurrentProcessId (Address: 0x18007cc70)
  • GetCurrentThreadId (Address: 0x18007cc78)
  • GetDateFormatW (Address: 0x18007cc80)
  • GetEnvironmentStringsW (Address: 0x18007cc88)
  • GetExitCodeProcess (Address: 0x18007cc90)
  • GetFileSizeEx (Address: 0x18007cc98)
  • GetFileType (Address: 0x18007cca0)
  • GetLastError (Address: 0x18007cca8)
  • GetLocaleInfoW (Address: 0x18007ccb8)
  • GetLocalTime (Address: 0x18007ccb0)
  • GetModuleFileNameW (Address: 0x18007ccc0)
  • GetModuleHandleExW (Address: 0x18007ccc8)
  • GetModuleHandleW (Address: 0x18007ccd0)
  • GetOEMCP (Address: 0x18007ccd8)
  • GetProcAddress (Address: 0x18007cce0)
  • GetProcessHeap (Address: 0x18007cce8)
  • GetProcessTimes (Address: 0x18007ccf0)
  • GetProductInfo (Address: 0x18007ccf8)
  • GetStartupInfoW (Address: 0x18007cd00)
  • GetStdHandle (Address: 0x18007cd08)
  • GetStringTypeW (Address: 0x18007cd10)
  • GetSystemTimeAsFileTime (Address: 0x18007cd18)
  • GetTimeFormatW (Address: 0x18007cd20)
  • GetTimeZoneInformation (Address: 0x18007cd28)
  • GetUserDefaultLCID (Address: 0x18007cd30)
  • GetVersionExW (Address: 0x18007cd38)
  • HeapAlloc (Address: 0x18007cd40)
  • HeapDestroy (Address: 0x18007cd48)
  • HeapFree (Address: 0x18007cd50)
  • HeapQueryInformation (Address: 0x18007cd58)
  • HeapReAlloc (Address: 0x18007cd60)
  • HeapSize (Address: 0x18007cd68)
  • InitializeCriticalSectionAndSpinCount (Address: 0x18007cd70)
  • InitializeCriticalSectionEx (Address: 0x18007cd78)
  • InitializeSListHead (Address: 0x18007cd80)
  • InterlockedFlushSList (Address: 0x18007cd88)
  • InterlockedPopEntrySList (Address: 0x18007cd90)
  • InterlockedPushEntrySList (Address: 0x18007cd98)
  • IsDebuggerPresent (Address: 0x18007cda0)
  • IsProcessorFeaturePresent (Address: 0x18007cda8)
  • IsValidCodePage (Address: 0x18007cdb0)
  • IsValidLocale (Address: 0x18007cdb8)
  • LCMapStringW (Address: 0x18007cdc0)
  • LeaveCriticalSection (Address: 0x18007cdc8)
  • LoadLibraryExA (Address: 0x18007cdd0)
  • LoadLibraryExW (Address: 0x18007cdd8)
  • LoadResource (Address: 0x18007cde0)
  • LocalFree (Address: 0x18007cde8)
  • LockResource (Address: 0x18007cdf0)
  • MultiByteToWideChar (Address: 0x18007cdf8)
  • OpenProcess (Address: 0x18007ce00)
  • OutputDebugStringW (Address: 0x18007ce08)
  • QueryPerformanceCounter (Address: 0x18007ce10)
  • RaiseException (Address: 0x18007ce18)
  • ReadConsoleW (Address: 0x18007ce20)
  • ReadFile (Address: 0x18007ce28)
  • ReleaseMutex (Address: 0x18007ce30)
  • ReleaseSRWLockExclusive (Address: 0x18007ce38)
  • RtlCaptureContext (Address: 0x18007ce40)
  • RtlLookupFunctionEntry (Address: 0x18007ce48)
  • RtlPcToFileHeader (Address: 0x18007ce50)
  • RtlUnwind (Address: 0x18007ce58)
  • RtlUnwindEx (Address: 0x18007ce60)
  • RtlVirtualUnwind (Address: 0x18007ce68)
  • SetEndOfFile (Address: 0x18007ce70)
  • SetEnvironmentVariableW (Address: 0x18007ce78)
  • SetEvent (Address: 0x18007ce80)
  • SetFilePointerEx (Address: 0x18007ce88)
  • SetLastError (Address: 0x18007ce90)
  • SetStdHandle (Address: 0x18007ce98)
  • SetUnhandledExceptionFilter (Address: 0x18007cea0)
  • SizeofResource (Address: 0x18007cea8)
  • SleepConditionVariableSRW (Address: 0x18007ceb0)
  • TerminateProcess (Address: 0x18007ceb8)
  • TlsAlloc (Address: 0x18007cec0)
  • TlsFree (Address: 0x18007cec8)
  • TlsGetValue (Address: 0x18007ced0)
  • TlsSetValue (Address: 0x18007ced8)
  • UnhandledExceptionFilter (Address: 0x18007cee0)
  • VerifyVersionInfoW (Address: 0x18007cef0)
  • VerSetConditionMask (Address: 0x18007cee8)
  • VirtualAlloc (Address: 0x18007cef8)
  • VirtualFree (Address: 0x18007cf00)
  • VirtualProtect (Address: 0x18007cf08)
  • WaitForSingleObject (Address: 0x18007cf10)
  • WakeAllConditionVariable (Address: 0x18007cf18)
  • WideCharToMultiByte (Address: 0x18007cf20)
  • WriteConsoleW (Address: 0x18007cf28)
  • WriteFile (Address: 0x18007cf30)
ole32.dll
  • CoCreateInstance (Address: 0x18007d100)
  • CoInitializeEx (Address: 0x18007d108)
  • CoTaskMemFree (Address: 0x18007d110)
  • CoUninitialize (Address: 0x18007d118)
OLEAUT32.dll
  • DispCallFunc (Address: 0x18007cff0)
  • LoadRegTypeLib (Address: 0x18007cff8)
  • LoadTypeLib (Address: 0x18007d000)
  • SysAllocString (Address: 0x18007d008)
  • SysFreeString (Address: 0x18007d010)
  • SysStringLen (Address: 0x18007d018)
  • VariantClear (Address: 0x18007d020)
  • VariantInit (Address: 0x18007d028)
SHELL32.dll
  • ShellExecuteW (Address: 0x18007d0f0)
  • SHGetKnownFolderPath (Address: 0x18007d0e0)
  • SHGetSpecialFolderPathW (Address: 0x18007d0e8)
SHLWAPI.dll
  • (Address: 0x18007d098)
  • (Address: 0x18007d0b0)
  • (Address: 0x18007d0c0)
  • PathCombineW (Address: 0x18007d0a0)
  • PathFileExistsW (Address: 0x18007d0a8)
  • StrChrW (Address: 0x18007d0b8)
  • StrStrW (Address: 0x18007d0c8)
  • UrlUnescapeW (Address: 0x18007d0d0)
urlmon.dll
  • CreateUri (Address: 0x18007cf40)
  • URLDownloadToCacheFileW (Address: 0x18007cf48)
USER32.dll
  • CallWindowProcW (Address: 0x18007cf58)
  • CharLowerBuffW (Address: 0x18007cf60)
  • CreateWindowExW (Address: 0x18007cf68)
  • DefWindowProcW (Address: 0x18007cf70)
  • DestroyWindow (Address: 0x18007cf78)
  • DispatchMessageW (Address: 0x18007cf80)
  • GetAncestor (Address: 0x18007cf88)
  • GetClassInfoExW (Address: 0x18007cf90)
  • GetWindowLongPtrW (Address: 0x18007cf98)
  • KillTimer (Address: 0x18007cfa0)
  • LoadCursorW (Address: 0x18007cfa8)
  • MsgWaitForMultipleObjects (Address: 0x18007cfb0)
  • PeekMessageW (Address: 0x18007cfb8)
  • RegisterClassExW (Address: 0x18007cfc0)
  • SetTimer (Address: 0x18007cfc8)
  • SetWindowLongPtrW (Address: 0x18007cfd0)
  • TranslateMessage (Address: 0x18007cfd8)
  • UnregisterClassW (Address: 0x18007cfe0)
WININET.dll
  • CommitUrlCacheEntryBinaryBlob (Address: 0x18007d128)
  • DeleteUrlCacheContainerW (Address: 0x18007d130)
  • DeleteUrlCacheEntryW (Address: 0x18007d138)
  • GetUrlCacheEntryBinaryBlob (Address: 0x18007d140)
  • UrlCacheCreateContainer (Address: 0x18007d148)
  • UrlCacheFindFirstEntry (Address: 0x18007d150)
  • UrlCacheFindNextEntry (Address: 0x18007d158)
  • UrlCacheFreeEntryInfo (Address: 0x18007d160)