Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

106 lines
2.6 KiB

  1. // description of IE 4 binaries load addresses for NT x86
  2. begin setupstuff 0x50000000
  3. bindfile.dll
  4. iernonce.dll
  5. jobexec.dll
  6. inseng.dll
  7. mssetup.dll
  8. ie4.dll
  9. asctrls.ocx
  10. // Shell only components
  11. begin UIexplorer 0x01010000
  12. cdfview.dll
  13. thumbvw.dll
  14. webvw.dll
  15. occache.dll
  16. plugin.ocx
  17. cabinet.dll
  18. plustab.dll
  19. inetcpl.cpl
  20. inetcfg.dll
  21. cabinet.dll
  22. begin dropped unchanged
  23. RSABASE.DLL
  24. // Platform components
  25. // Added by pritobla on 6/16/98 -
  26. // IF YOU WANT TO ADD NEW BINARIES TO THE ActivePlatform1 SECTION,
  27. // MAKE SURE THAT AFTER REBASING, THE BASE ADDRESS + IMAGE SIZE OF THE LAST
  28. // BINARY IN THIS SECTION DOES NOT EXCEED 0x70850000 (see comments below)
  29. begin ActivePlatform1 70200000
  30. WININET.DLL
  31. URLMON.DLL
  32. WEBCHECK.DLL
  33. HLINK.DLL
  34. ACTXPRXY.DLL
  35. MSRATING.DLL
  36. MLANG.DLL
  37. MSENCODE.DLL
  38. IMGUTIL.DLL
  39. PNGFILT.DLL
  40. // Added by pritobla on 6/16/98 -
  41. // Should leave a "hole" to avoid collision with the IE4.x shell32.dll.
  42. // The base address and the image size of shell32.dll in IE4.x are:
  43. // IE40 : Image Base = 0x70850000, Image Size = 0x001A1000
  44. // IE401 : Image Base = 0x70930000, Image Size = 0x001A6000
  45. // IE401SP1 : Image Base = 0x70970000, Image Size = 0x001A8000
  46. // So, the "hole" should start at 0x70850000 for a size of
  47. // [0x001A8000 + (0x70970000 - 0x70850000) + 0x00100000 /* 1MB buffer */] =
  48. // 0x70850000 + 0x003C8000 = 0x70C18000 = 0x70C20000 (64K boundary)
  49. begin ActivePlatform2 70BD0000
  50. SHLWAPI.DLL
  51. MSHTML.DLL
  52. MSHTMLER.DLL
  53. MSHTMLED.DLL
  54. IEPEERS.DLL
  55. SHDOCVW.DLL
  56. BROWSEUI.DLL
  57. MSXML.DLL
  58. MSIDLE.DLL
  59. JSCRIPT.DLL
  60. VBSCRIPT.DLL
  61. CRYPT32.DLL
  62. DIGSIG.DLL
  63. VSREVOKE.DLL
  64. SOFTPUB.DLL
  65. LICMGR10.DLL
  66. WINTRUST.DLL
  67. SCHANNEL.DLL
  68. ADVPACK.DLL
  69. SETUPAPI.DLL
  70. W95INF32.DLL
  71. SENDMAIL.DLL
  72. WSOCK32N.DLL
  73. JSPROXY.DLL
  74. COMCTL32.DLL
  75. ES.DLL
  76. ESSHARED.DLL
  77. ESTIER2.DLL
  78. url.dll
  79. msnsspc.dll
  80. msapsspc.dll
  81. shdoclc.dll
  82. browselc.dll
  83. msident.dll
  84. shfolder.dll
  85. inetcplc.dll
  86. // MS components
  87. // Reserve space for internal browser/shell components here.
  88. // begin MSComponents 35000000
  89. // IHammer components 35000000 to 350FFFFF
  90. // Trident ADC user components 35100000 to 3515FFFF (Richard Rollman)
  91. // ADC components 35160000 to 3519FFFF (Wolfgang Manousek)
  92. // GAP 351A0000 to 351FFFFF
  93. // IMT 35200000 to 354FFFFF (Michael Van Kleeck)
  94. // Active Movie 35500000 to 35BFFFFF (David May)
  95. // Connection Manager 35C00000 to 35C3FFFF (Nick Ball / Henry Tam)
  96. // WAB32.DLL 35c40000 to 35c4FFFF (Vikram Madan)
  97. // DXTRANS 35C50000 to 35CAFFFF
  98. // DXTMSFT 35CB0000 to 35D0FFFF