Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

119 lines
3.0 KiB

  1. // description of IE 4 binaries load addresses for Win 9X
  2. begin setupstuff 0x50000000
  3. bindfile.dll
  4. iernonce.dll
  5. jobexec.dll
  6. inseng.dll
  7. mssetup.dll
  8. ie4.dll
  9. asctrls.ocx
  10. // Shell only components
  11. begin UIexplorer 0x01010000
  12. cdfview.dll
  13. thumbvw.dll
  14. webvw.dll
  15. occache.dll
  16. plugin.ocx
  17. cabinet.dll
  18. plustab.dll
  19. inetcpl.cpl
  20. inetcfg.dll
  21. cabinet.dll
  22. // Leave it at it's Win95 address
  23. begin advapi32 bfed0000
  24. advapi32.dll
  25. // Shared arena components
  26. // comctl32 must be based high so that CS_GLOBALCLASSES work in the context
  27. // of 16 bit apps which thunk to it on Win9x
  28. begin comctl32 bfc00000 down
  29. comctl32.dll
  30. // The following get dropped to us - leave it alone
  31. begin dropped unchanged
  32. RSABASE.DLL
  33. OLEAUT32.DLL
  34. // Platform components
  35. // Added by pritobla on 6/16/98 -
  36. // IF YOU WANT TO ADD NEW BINARIES TO THE ActivePlatform1 SECTION,
  37. // MAKE SURE THAT AFTER REBASING, THE BASE ADDRESS + IMAGE SIZE OF THE LAST
  38. // BINARY IN THIS SECTION DOES NOT EXCEED 0x70850000 (see comments below)
  39. begin ActivePlatform1 70200000
  40. WININET.DLL
  41. URLMON.DLL
  42. WEBCHECK.DLL
  43. HLINK.DLL
  44. ACTXPRXY.DLL
  45. MSRATING.DLL
  46. MLANG.DLL
  47. MSENCODE.DLL
  48. IMGUTIL.DLL
  49. PNGFILT.DLL
  50. // Added by pritobla on 6/16/98 -
  51. // Should leave a "hole" to avoid collision with the IE4.x shell32.dll.
  52. // The base address and the image size of shell32.dll in IE4.x are:
  53. // IE40 : Image Base = 0x70850000, Image Size = 0x0014F000
  54. // IE401 : Image Base = 0x70930000, Image Size = 0x00155000
  55. // IE401SP1 : Image Base = 0x70970000, Image Size = 0x00156000
  56. // So, the "hole" should start at 0x70850000 for a size of
  57. // [0x00156000 + (0x70970000 - 0x70850000) + 0x00100000 /* 1MB buffer */] =
  58. // 0x70850000 + 0x00376000 = 0x70BC6000 = 0x70BD0000 (64K boundary)
  59. begin ActivePlatform2 70BD0000
  60. SHLWAPI.DLL
  61. MSHTML.DLL
  62. MSHTMLER.DLL
  63. MSHTMLED.DLL
  64. IEPEERS.DLL
  65. SHDOCVW.DLL
  66. BROWSEUI.DLL
  67. MSXML.DLL
  68. MSIDLE.DLL
  69. JSCRIPT.DLL
  70. VBSCRIPT.DLL
  71. CRYPT32.DLL
  72. DIGSIG.DLL
  73. VSREVOKE.DLL
  74. SOFTPUB.DLL
  75. LICMGR10.DLL
  76. WINTRUST.DLL
  77. SCHANNEL.DLL
  78. ADVPACK.DLL
  79. SETUPAPI.DLL
  80. W95INF32.DLL
  81. SENDMAIL.DLL
  82. WSOCK32N.DLL
  83. JSPROXY.DLL
  84. IENPSTUB.DLL
  85. ES.DLL
  86. ESSHARED.DLL
  87. ESTIER2.DLL
  88. url.dll
  89. msnsspc.dll
  90. msapsspc.dll
  91. shdoclc.dll
  92. browselc.dll
  93. msident.dll
  94. shfolder.dll
  95. inetcplc.dll
  96. // MS components
  97. // Reserve space for internal browser/shell components here.
  98. // begin MSComponents 35000000
  99. // IHammer components 35000000 to 350FFFFF
  100. // Trident ADC user components 35100000 to 3515FFFF (Richard Rollman)
  101. // ADC components 35160000 to 3519FFFF (Wolfgang Manousek)
  102. // GAP 351A0000 to 351FFFFF
  103. // IMT 35200000 to 354FFFFF (Michael Van Kleeck)
  104. // Active Movie 35500000 to 35BFFFFF (David May)
  105. // Connection Manager 35C00000 to 35C3FFFF (Nick Ball / Henry Tam)
  106. // WAB32.DLL 35c40000 to 35c4FFFF (Vikram Madan)
  107. // DXTRANS 35C50000 to 35CAFFFF
  108. // DXTMSFT 35CB0000 to 35D0FFFF