From: Jeff482 on 26 Sep 2006 21:35 And well I'll be making 3 posts out of this since both logs will be very long due to the Limit = 30000 Microsoft put on this group, Also I had dome some research and it has something to do with a +Com and a Moniker that is causing this error to happen which no one here has any idea what the error really is unless working for Microsoft for 10 years, but here is the first error, Event Type: Error Event Source: Microsoft Internet Explorer Event Category: None Event ID: 1000 Date: 9/26/2006 Time: 6:07:14 PM OS: Windows 200 SP4 Browser: IE6 SP1(Finial) Description: The description for Event ID ( 1000 ) in Source ( Microsoft Internet Explorer ) cannot be found. The local computer may not have the necessary registry information or message DLL files to display messages from a remote computer. The following information is part of the event: iexplore.exe, 6.0.2800.1106, mshtml.dll, 6.0.2800.1561, 00190447. Then the error that followed before DR. Watson, Event Type: Information Event Source: Application Popup Event Category: None Event ID: 26 Date: 9/26/2006 Time: 6:08:53 PM Application popup: IEXPLORE.EXE - Application Error : The instruction at "0x63710447" referenced memory at "0x00000002". The memory could not be "read". And now the whole DR. Watson log, please see second reply for Symbal table, Application exception occurred: App: (pid=372) When: 9/26/2006 @ 18:29:04.864 Exception number: c0000005 (access violation) *----> System Information <----* Computer Name: JJHYDE1 User Name: Jeffrey Number of Processors: 1 Processor Type: x86 Family 6 Model 8 Stepping 6 Windows 2000 Version: 5.0 Current Build: 2195 Service Pack: 4 Current Type: Uniprocessor Free Registered Organization: Registered Owner: Jeffrey Hyde *----> Task List <----* 0 Idle.exe 8 System.exe 228 smss.exe 256 csrss.exe 276 winlogon.exe 304 services.exe 316 lsass.exe 488 AppServices.exe 524 nvsvc32.exe 548 regsvc.exe 568 svchost.exe 580 stisvc.exe 600 svchost.exe 628 ADService.exe 652 svchost.exe 692 WinMgmt.exe 376 winamp.exe 872 WinShade.exe 372 IEXPLORE.exe 1092 Explorer.exe 1116 RUNDLL32.exe 288 BarClock.exe 1152 WLANSTA.exe 780 gaim.exe 1044 firefox.exe 2580 notepad.exe 1712 IEXPLORE.exe 1900 mmc.exe 1848 drwtsn32.exe 0 _Total.exe (00400000 - 00419000) (77F80000 - 77FFC000) (78000000 - 78045000) (7C570000 - 7C623000) (77E10000 - 77E79000) (77F40000 - 77F7C000) (70A70000 - 70AD6000) (7C2D0000 - 7C335000) (77D30000 - 77D9F000) (71700000 - 7184A000) (007A0000 - 00824000) (7CF30000 - 7D176000) (7CE20000 - 7CF0F000) (10000000 - 1000E000) (71500000 - 715FC000) (71960000 - 71972000) (00FF0000 - 0111A000) (77880000 - 7790E000) (7C0F0000 - 7C154000) (63000000 - 63095000) (7C740000 - 7C7CC000) (77430000 - 77441000) (779B0000 - 77A4B000) (1A400000 - 1A47D000) (77820000 - 77827000) (759B0000 - 759B6000) (75050000 - 75058000) (75030000 - 75044000) (75020000 - 75028000) (76930000 - 7695B000) (77920000 - 77943000) (77570000 - 775A0000) (6B2C0000 - 6B2C5000) (77840000 - 7787E000) (770C0000 - 770E3000) (72A00000 - 72A2D000) (76DF0000 - 76E01000) (76FA0000 - 76FAF000) (773E0000 - 773F5000) (7CDC0000 - 7CE10000) (7C340000 - 7C34F000) (77BF0000 - 77C01000) (77980000 - 779A4000) (77950000 - 7797B000) (751C0000 - 751C6000) (75150000 - 75160000) (774E0000 - 77514000) (774C0000 - 774D1000) (77530000 - 77552000) (77830000 - 7783E000) (75AB0000 - 75AB5000) (76620000 - 76631000) (75160000 - 7516C000) (75210000 - 75225000) (751D0000 - 75208000) (745E0000 - 748A6000) (02110000 - 02139000) (76B30000 - 76B6E000) (02140000 - 02151000) (718C0000 - 71944000) (70440000 - 704CF000) (74FD0000 - 74FEE000) (75010000 - 75017000) (782C0000 - 782CC000) (77340000 - 77353000) (77520000 - 77525000) (77320000 - 77337000) (773B0000 - 773DF000) (77380000 - 773A3000) (77360000 - 77379000) (777E0000 - 777E8000) (777F0000 - 777F5000) (63580000 - 63820000) (75E60000 - 75E7A000) (32520000 - 32532000) (02C50000 - 02CC1000) (75AC0000 - 75AE8000) (77560000 - 77568000) (77400000 - 77408000) (77410000 - 77423000) (70F30000 - 70F9E000) (04220000 - 04238000) (63400000 - 63423000) (30000000 - 30011000) (703D0000 - 703EB000) (6A8F0000 - 6A910000) (70510000 - 7051A000) (6B600000 - 6B671000) (07690000 - 07B16000) (08110000 - 083DE000) (71F00000 - 71F4D000) (07020000 - 07036000) (70020000 - 70025000) (07450000 - 0746C000) (04E30000 - 04E6C000) (77800000 - 7781E000) (04F20000 - 04F26000) (01E90000 - 020B4000) (35C50000 - 35C84000) (78160000 - 78188000) (7CA00000 - 7CA23000) (67400000 - 67427000) (69B10000 - 69C32000) (4FF90000 - 4FFE4000) (66650000 - 666A4000) (69640000 - 6965F000) (03330000 - 03353000) (7C700000 - 7C713000) (690A0000 - 690AB000) (75A00000 - 75A12000) (091E0000 - 091EB000) (09320000 - 0936E000) (719D0000 - 719ED000)
From: Jeff482 on 26 Sep 2006 21:37 Reply 2 State Dump for Thread Id 0x16c eax=0271e1b0 ebx=000002b9 ecx=00000002 edx=00000007 esi=0279ece0 edi=000002b9 eip=63710447 esp=0012c364 ebp=0012c37c iopl=0 nv up ei pl nz na pe nc cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000202 function: <nosymbols> 63710432 1bc0 sbb eax,eax 63710434 23c1 and eax,ecx 63710436 c3 ret 63710437 8b400c mov eax,[eax+0xc] ds:035b8096=???????? 6371043a 85c0 test eax,eax 6371043c 7414 jz 63718f52 6371043e 8bff mov edi,edi 63710440 8b4808 mov ecx,[eax+0x8] ds:035b8096=???????? 63710443 85c9 test ecx,ecx 63710445 740b jz 6371fa52 FAULT ->63710447 f60110 test byte ptr [ecx],0x10 ds:00000002=?? 6371044a 7406 jz 63718f52 6371044c 8bc1 mov eax,ecx 6371044e 85c0 test eax,eax 63710450 75ee jnz 6371c840 63710452 c3 ret 63710453 90 nop 63710454 90 nop 63710455 90 nop 63710456 90 nop 63710457 90 nop 63710458 90 nop *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0012C37C 6373CC59 000002B9 00000001 0012D044 0012C47C !<nosymbols> 0012D044 0000025B 00000678 0271F600 00000000 FFFFFFFF !<nosymbols> *----> Raw Stack Dump <----* 0012c364 05 5c 74 63 44 44 44 04 - cc c6 12 00 e8 2d 2e 05 .\tcDDD......-.. 0012c374 d0 2d 2e 05 d0 b1 71 02 - 44 d0 12 00 59 cc 73 63 .-....q.D...Y.sc 0012c384 b9 02 00 00 01 00 00 00 - 44 d0 12 00 7c c4 12 00 ........D...|... 0012c394 44 d0 12 00 e0 c7 12 00 - 00 00 00 00 54 d0 12 00 D...........T... 0012c3a4 00 00 00 00 54 d0 12 00 - ac c4 12 00 44 d0 12 00 ....T.......D... 0012c3b4 a0 00 00 00 4d 6b 74 63 - 49 d5 73 63 44 44 44 04 ....MktcI.scDDD. 0012c3c4 ff ff ff ff 13 00 00 00 - cc c6 12 00 a0 c7 12 00 ................ 0012c3d4 54 d0 12 00 ac c4 12 00 - 1a a1 74 63 44 44 44 04 T.........tcDDD. 0012c3e4 ff ff ff ff 13 00 00 00 - cc c6 12 00 a0 c7 12 00 ................ 0012c3f4 00 00 00 00 38 c8 71 02 - 98 d2 12 00 f8 f0 69 63 ....8.q.......ic 0012c404 09 00 00 00 b1 00 00 00 - f8 81 7d 63 3c c4 12 00 ..........}c<... 0012c414 f8 f0 69 63 ce 10 7a 02 - 3b 00 00 00 09 00 00 00 ..ic..z.;....... 0012c424 8c 00 00 00 09 00 00 00 - 5d 10 7a 02 64 c4 12 00 ........].z.d... 0012c434 7e 87 6a 63 c7 87 6a 63 - f8 81 7d 63 23 88 6a 63 ~.jc..jc..}c#.jc 0012c444 00 40 7e 63 05 00 00 00 - 38 c8 71 02 01 00 00 00 .@~c....8.q..... 0012c454 f8 81 7d 63 00 10 7a 02 - 00 c8 71 02 03 00 00 00 ..}c..z...q..... 0012c464 00 00 00 00 00 00 00 00 - ac c4 12 00 f0 f5 71 02 ..............q. 0012c474 30 12 7a 02 44 44 44 04 - c0 c7 12 00 36 39 72 63 0.z.DDD.....69rc 0012c484 00 00 00 00 13 00 00 00 - 2c c8 12 00 28 c8 12 00 ........,...(... 0012c494 e0 c7 12 00 a0 c7 12 00 - ec c7 12 00 38 c8 71 02 ............8.q. State Dump for Thread Id 0x3f0 eax=00000000 ebx=000493e0 ecx=0013d088 edx=00000000 esi=0013ce80 edi=000493e0 eip=77f88af7 esp=00d3febc ebp=00d3fee4 iopl=0 nv up ei ng nz ac po cy cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000297 function: NtRemoveIoCompletion 77f88aec b8a8000000 mov eax,0xa8 77f88af1 8d542404 lea edx,[esp+0x4] ss:01bd9da3=00000000 77f88af5 cd2e int 2e 77f88af7 c21400 ret 0x14 77f88afa 8bff mov edi,edi *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 00D3FEE4 77D818FF 00000104 00D3FF1C 00D3FF0C 00D3FF14 ntdll!NtRemoveIoCompletion 00D3FF20 77D51484 000493E0 00D3FF60 00D3FF5C 00D3FF70 rpcrt4!I_RpcTransGetAddressList 00D3FF74 77D512BD 77D3AFBD 0013CE80 77D50101 00130000 rpcrt4!TowerConstruct 00D3FFA8 77D37DE8 0013B5D8 00D3FFEC 7C57B388 0013E078 rpcrt4!TowerConstruct 00D3FFB4 7C57B388 0013E078 77D50101 00130000 0013E078 rpcrt4!I_RpcConnectionInqSockBuffSize2 00D3FFEC 00000000 77D37DD0 0013E078 00000000 C7000000 kernel32!lstrcmpiW *----> Raw Stack Dump <----* 00d3febc 23 54 58 7c 04 01 00 00 - 0c ff d3 00 fc fe d3 00 #TX|............ 00d3fecc dc fe d3 00 d4 fe d3 00 - 00 a2 2f 4d ff ff ff ff ........../M.... 00d3fedc ec 03 00 00 7e 0a d8 77 - 20 ff d3 00 ff 18 d8 77 ....~..w ......w 00d3feec 04 01 00 00 1c ff d3 00 - 0c ff d3 00 14 ff d3 00 ................ 00d3fefc e0 93 04 00 e0 93 04 00 - 80 ce 13 00 94 b5 57 7c ..............W| 00d3ff0c 10 00 00 00 04 01 00 00 - 00 00 00 00 19 00 02 00 ................ 00d3ff1c 00 00 00 00 74 ff d3 00 - 84 14 d5 77 e0 93 04 00 ....t......w.... 00d3ff2c 60 ff d3 00 5c ff d3 00 - 70 ff d3 00 58 ff d3 00 `...\...p...X... 00d3ff3c 64 ff d3 00 6c ff d3 00 - 60 b5 13 00 68 d6 13 00 d...l...`...h... 00d3ff4c c0 7f f8 77 04 01 00 00 - 00 00 00 00 00 a2 2f 4d ...w........../M 00d3ff5c ff ff ff ff 00 00 00 00 - 00 00 00 00 01 00 00 00 ................ 00d3ff6c 00 00 00 00 04 01 00 00 - a8 ff d3 00 bd 12 d5 77 ...............w 00d3ff7c bd af d3 77 80 ce 13 00 - 01 01 d5 77 00 00 13 00 ...w.......w.... 00d3ff8c 78 e0 13 00 00 5d 1e ee - ff ff ff ff 00 5d 1e ee x....].......].. 00d3ff9c ff ff ff ff 30 75 00 00 - 78 e0 13 00 b4 ff d3 00 ....0u..x....... 00d3ffac e8 7d d3 77 d8 b5 13 00 - ec ff d3 00 88 b3 57 7c .}.w..........W| 00d3ffbc 78 e0 13 00 01 01 d5 77 - 00 00 13 00 78 e0 13 00 x......w....x... 00d3ffcc 00 d0 fd 7f c4 d5 12 00 - c0 ff d3 00 c4 d5 12 00 ................ 00d3ffdc ff ff ff ff 54 1f 5c 7c - 08 2b 57 7c 00 00 00 00 ....T.\|.+W|.... 00d3ffec 00 00 00 00 00 00 00 00 - d0 7d d3 77 78 e0 13 00 .........}.wx... State Dump for Thread Id 0x41c eax=00fefeb8 ebx=00000001 ecx=00010101 edx=00000000 esi=77f88ef8 edi=00000001 eip=77f88f03 esp=00fefd98 ebp=00fefde4 iopl=0 nv up ei pl zr na po nc cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246 function: NtWaitForMultipleObjects 77f88ef8 b8e9000000 mov eax,0xe9 77f88efd 8
From: Jeff482 on 26 Sep 2006 21:41 Reply 3 *----> Symbol Table <----* 635ECCD6 00000072 DllInstall 635ECD48 0000006d DllRegisterServer 635ECDB5 0000019a DllUnregisterServer 635ECF4F 00000005 DllGetClassObject 635ECF54 00000290 DllEnumClassObjects 635ED1E4 00006f83 DllCanUnloadNow 635F4167 00000cef PrintHTML 635F4E56 0002d2ac CreateHTMLPropertyPage 63622102 000584ab Ordinal100 6367A5AD 000102ec MatchExactGetIDsOfNames 6368A899 0000084c ShowModelessHTMLDialog 6368B0E5 00000084 ShowModalDialog 6368B169 00000009 ShowHTMLDialog 6368B172 00002acd ShowHTMLDialogEx 6368DC3F 00002dec RunHTMLApplication 63690A2B 00000006 RNIGetCompatibleVersion 63690A31 0000002f com_ms_osp_ospmrshl_classInit 63690A60 000002a3 com_ms_osp_ospmrshl_toJava 63690D03 0000009f com_ms_osp_ospmrshl_copyToExternal 63690DA2 00000000 com_ms_osp_ospmrshl_releaseByValExternal And 6300F2F6 00000000 InternetSetDialStateA 6300F2F6 00000019 InternetSetDialState 6300F30F 00000182 InternetSetDialStateW 6300F491 00000f2c Ordinal101 630103BD 0000030d InternetGetConnectedStateExW 630106CA 00000000 InternetGetConnectedStateEx 630106CA 00000078 InternetGetConnectedStateExA 63010742 0000009a InternetGetConnectedState 630107DC 000004ba InternetDialW 63010C96 00000000 InternetDial 63010C96 00000066 InternetDialA 63010CFC 000000f6 InternetHangUp 63010DF2 000002fc InternetAutodial 630110EE 00000342 InternetAutodialHangup 63011430 000001f6 InternetAutodialCallback 63011626 000000f2 InternetGoOnlineW 63011718 00000000 InternetGoOnlineA 63011718 00000e28 InternetGoOnline 63012540 000003a5 Ordinal108 630128E5 000001a8 Ordinal110 63012A8D 000003b2 Ordinal109 63012E3F 000000c6 Ordinal111 63012F05 00002dea DllInstall 63015CEF 000004f8 InternetCrackUrlA 630161E7 00000722 InternetCreateUrlA 63016909 0000006c InternetCanonicalizeUrlA 63016975 00000072 InternetCombineUrlA 630169E7 00000000 InternetGetCertByURLA 630169E7 0000004e InternetGetCertByURL 63016A35 00000000 InternetWriteFileExW 63016A35 00000000 InternetWriteFileExA 63016A35 0000000d InternetReadFileExW 63016A42 0000006a InternetSetFilePointer 63016AAC 00000161 InternetGetLastResponseInfoA 63016C0D 00000000 InternetSetStatusCallbackA 63016C0D 000000d2 InternetSetStatusCallback 63016CDF 0000002c InternetAttemptConnect 63016D0B 000005a2 InternetUnlockRequestFile 630172AD 00000000 InternetShowSecurityInfoByURLA 630172AD 000002a6 InternetShowSecurityInfoByURL 63017553 0000023d InternetLockRequestFile 63017790 000001f8 InternetOpenA 63017988 000005d1 InternetConnectA 63017F59 00000284 InternetOpenUrlA 630181DD 00000292 InternetWriteFile 6301846F 0000034f InternetFindNextFileA 630187BE 0000013d InternetCloseHandle 630188FB 00000446 InternetReadFile 63018D41 00000193 InternetReadFileExA 63018ED4 000001f1 InternetQueryDataAvailable 630190C5 0000036a InternetCheckConnectionA 6301942F 00000038 ForceNexusLookupExW 63019467 00000025 ForceNexusLookup 6301948C 000002ce CreateMD5SSOHash 6301975A 0000008d InternetCanonicalizeUrlW 630197E7 000000a4 InternetCombineUrlW 6301988B 000000d0 InternetFindNextFileW 6301995B 00000012 InternetSetStatusCallbackW 6301996D 0000030f InternetCrackUrlW 63019C7C 00000468 InternetCreateUrlW 6301A0E4 0000017d InternetOpenW 6301A261 0000019a InternetConnectW 6301A3FB 00000137 InternetOpenUrlW 6301A532 000000c5 InternetGetLastResponseInfoW 6301A5F7 000000a1 InternetCheckConnectionW 6301A698 0000009e InternetShowSecurityInfoByURLW 6301A736 000000e7 InternetAlgIdToStringW 6301A81D 000002b6 InternetSecurityProtocolToStringW 6301AAD3 00000cfb InternetQueryOptionA 6301B7CE 00000316 InternetQueryOptionW 6301BAE4 00000ca3 InternetSetOptionA 6301C787 00000226 InternetSetOptionW 6301C9AD 0000002a InternetSetOptionExA 6301C9D7 000047a8 InternetSetOptionExW 6302117F 00000d0f ResumeSuspendedDownload 63021E8E 00000058 InternetQueryFortezzaStatus 63021EE6 00008ecf InternetFortezzaCommand 6302ADB5 0000010f FtpGetFileA 6302AEC4 000009e0 FtpPutFileA 6302B8A4 000001b3 FtpDeleteFileA 6302BA57 000001df FtpRenameFileA 6302BC36 000001bd FtpCreateDirectoryA 6302BDF3 0000019b FtpRemoveDirectoryA 6302BF8E 000001ae FtpSetCurrentDirectoryA 6302C13C 000001a2 FtpGetCurrentDirectoryA 6302C2DE 00000220 FtpCommandA 6302C4FE 00000d97 FtpGetFileSize 6302D295 0000001f FtpFindFirstFileA 6302D2B4 000002f6 FtpOpenFileA 6302D5AA 000000fe FtpFindFirstFileW 6302D6A8 000000b0 FtpDeleteFileW 6302D758 00000141 FtpRenameFileW 6302D899 000000b6 FtpOpenFileW 6302D94F 000000b0 FtpCreateDirectoryW 6302D9FF 000000ad FtpRemoveDirectoryW 6302DAAC 000000ad FtpSetCurrentDirectoryW 6302DB59 000000f8 FtpGetCurrentDirectoryW 6302DC51 000000d5 FtpCommandW 6302DD26 00000321 FtpGetFileW 6302E047 0000033f FtpPutFileW 6302E386 00000077 FtpGetFileEx 6302E3FD 00003270 FtpPutFileEx 6303166D 000001fc GopherCreateLocatorA 63031869 0000070f GopherGetLocatorTypeA 63031F78 00000408 GopherFindFirstFileA 63032380 00000404 GopherOpenFileA 63032784 00000000 GopherGetAttributeW 63032784 0000000d GopherGetAttributeA 63032791 0000023b GopherCreateLocatorW 630329CC 0000009b GopherGetLocatorTypeW 63032A67 00000199 GopherFindFirstFileW 63032C00 00002e30 GopherOpenFileW 63035A30 0000336c InternetInitializeAutoProxyDll 63038D9C 000038be IsHostInProxyBypassList 6303C65A 000005b0 Ordinal118 6303CC0A 00000176 PrivacySetZonePreferenceW 6303CD80 00000874 PrivacyGetZonePreferenceW 6303D5F4 0000011d HttpAddRequestHeadersA 6303D711 000000e4 HttpAddRequestHeadersW 6303D7F5 00000000 HttpCheckDavCompliance 6303D7F5 000002d5 Ordinal104 6303DACA 000003b3 Ordinal105 6303DE7D 0000001f HttpSendRequestA 6303DE9C 000000bc HttpSendRequestW 6303DF58 0000005e HttpSendRequestExA 6303DFB6 000000fd HttpSendRequestExW 6303E0B3 00000029 HttpEndRequestA 6303E0DC 00000137 HttpEndRequestW 6303E213 0000034e HttpOpenRequestA 6303E561 00000a91 HttpOpenRequestW 6303EFF2 00000200 HttpQueryInfoA 6303F1F2 00000722 HttpQueryInfoW 6303F914 00000071 InternetSetPerSiteCookieDecisionA 6303F985 000000a3 InternetSetPerSiteCookieDecisionW 6303FA28 0000004a InternetGetPerSiteCookieDecisionA 6303FA72 000000b6 InternetGetPerSiteCookieDecisionW 6303FB28 00000072
From: Jeff482 on 26 Sep 2006 21:45 And finily Reply 4, ntdll.dll 77F88048 00000030 LdrInitializeThunk 77F88078 00000000 NtAcceptConnectPort 77F88078 00000010 ZwAcceptConnectPort 77F88088 00000000 ZwAccessCheck 77F88088 00000010 NtAccessCheck 77F88098 00000000 ZwAccessCheckAndAuditAlarm 77F88098 00000010 NtAccessCheckAndAuditAlarm 77F880A8 00000000 ZwAccessCheckByType 77F880A8 00000010 NtAccessCheckByType 77F880B8 00000000 NtAccessCheckByTypeAndAuditAlarm 77F880B8 00000010 ZwAccessCheckByTypeAndAuditAlarm 77F880C8 00000000 NtAccessCheckByTypeResultList 77F880C8 00000010 ZwAccessCheckByTypeResultList 77F880D8 00000000 NtAccessCheckByTypeResultListAndAuditAlarm 77F880D8 00000010 ZwAccessCheckByTypeResultListAndAuditAlarm 77F880E8 00000000 ZwAccessCheckByTypeResultListAndAuditAlarmByHandle 77F880E8 00000010 NtAccessCheckByTypeResultListAndAuditAlarmByHandle 77F880F8 00000000 ZwAddAtom 77F880F8 00000010 NtAddAtom 77F88108 00000000 ZwAdjustGroupsToken 77F88108 00000010 NtAdjustGroupsToken 77F88118 00000000 ZwAdjustPrivilegesToken 77F88118 00000010 NtAdjustPrivilegesToken 77F88128 00000000 NtAlertResumeThread 77F88128 00000010 ZwAlertResumeThread 77F88138 00000000 ZwAlertThread 77F88138 00000010 NtAlertThread 77F88148 00000000 ZwAllocateLocallyUniqueId 77F88148 00000010 NtAllocateLocallyUniqueId 77F88158 00000000 NtAllocateUserPhysicalPages 77F88158 00000010 ZwAllocateUserPhysicalPages 77F88168 00000000 NtAllocateUuids 77F88168 00000010 ZwAllocateUuids 77F88178 00000000 NtAllocateVirtualMemory 77F88178 00000010 ZwAllocateVirtualMemory 77F88188 00000000 ZwAreMappedFilesTheSame 77F88188 00000010 NtAreMappedFilesTheSame 77F88198 00000000 NtAssignProcessToJobObject 77F88198 00000010 ZwAssignProcessToJobObject 77F881A8 00000000 ZwCallbackReturn 77F881A8 00000010 NtCallbackReturn 77F881B8 00000000 ZwCancelIoFile 77F881B8 00000010 NtCancelIoFile 77F881C8 00000000 NtCancelTimer 77F881C8 00000010 ZwCancelTimer 77F881D8 00000000 NtCancelDeviceWakeupRequest 77F881D8 00000010 ZwCancelDeviceWakeupRequest 77F881E8 00000000 NtClearEvent 77F881E8 00000010 ZwClearEvent 77F881F8 00000000 NtClose 77F881F8 00000010 ZwClose 77F88208 00000000 NtCloseObjectAuditAlarm 77F88208 00000010 ZwCloseObjectAuditAlarm 77F88218 00000000 NtCompleteConnectPort 77F88218 00000010 ZwCompleteConnectPort 77F88228 00000000 ZwConnectPort 77F88228 00000010 NtConnectPort 77F88238 00000000 NtContinue 77F88238 00000010 ZwContinue 77F88248 00000000 NtCreateDirectoryObject 77F88248 00000010 ZwCreateDirectoryObject 77F88258 00000000 NtCreateEvent 77F88258 00000010 ZwCreateEvent 77F88268 00000000 NtCreateEventPair 77F88268 00000010 ZwCreateEventPair 77F88278 00000000 ZwCreateFile 77F88278 00000010 NtCreateFile 77F88288 00000000 NtCreateIoCompletion 77F88288 00000010 ZwCreateIoCompletion 77F88298 00000000 NtCreateJobObject 77F88298 00000010 ZwCreateJobObject 77F882A8 00000000 NtCreateKey 77F882A8 00000010 ZwCreateKey 77F882B8 00000000 ZwCreateMailslotFile 77F882B8 00000010 NtCreateMailslotFile 77F882C8 00000000 ZwCreateMutant 77F882C8 00000010 NtCreateMutant 77F882D8 00000000 NtCreateNamedPipeFile 77F882D8 00000010 ZwCreateNamedPipeFile 77F882E8 00000000 NtCreatePagingFile 77F882E8 00000010 ZwCreatePagingFile 77F882F8 00000000 ZwCreatePort 77F882F8 00000010 NtCreatePort 77F88308 00000000 ZwCreateProcess 77F88308 00000010 NtCreateProcess 77F88318 00000000 NtCreateProfile 77F88318 00000010 ZwCreateProfile 77F88328 00000000 ZwCreateSection 77F88328 00000010 NtCreateSection 77F88338 00000000 ZwCreateSemaphore 77F88338 00000010 NtCreateSemaphore 77F88348 00000000 ZwCreateSymbolicLinkObject 77F88348 00000010 NtCreateSymbolicLinkObject 77F88358 00000000 ZwCreateThread 77F88358 00000010 NtCreateThread 77F88368 00000000 ZwCreateTimer 77F88368 00000010 NtCreateTimer 77F88378 00000000 ZwCreateToken 77F88378 00000010 NtCreateToken 77F88388 00000000 ZwCreateWaitablePort 77F88388 00000010 NtCreateWaitablePort 77F88398 00000000 ZwDelayExecution 77F88398 00000010 NtDelayExecution 77F883A8 00000000 ZwDeleteAtom 77F883A8 00000010 NtDeleteAtom 77F883B8 00000000 ZwDeleteFile 77F883B8 00000010 NtDeleteFile 77F883C8 00000000 NtDeleteKey 77F883C8 00000010 ZwDeleteKey 77F883D8 00000000 ZwDeleteObjectAuditAlarm 77F883D8 00000010 NtDeleteObjectAuditAlarm 77F883E8 00000000 NtDeleteValueKey 77F883E8 00000010 ZwDeleteValueKey 77F883F8 00000000 ZwDeviceIoControlFile 77F883F8 00000010 NtDeviceIoControlFile 77F88408 00000000 ZwDisplayString 77F88408 00000010 NtDisplayString 77F88418 00000000 ZwDuplicateObject 77F88418 00000010 NtDuplicateObject 77F88428 00000000 ZwDuplicateToken 77F88428 00000010 NtDuplicateToken 77F88438 00000000 NtEnumerateKey 77F88438 00000010 ZwEnumerateKey 77F88448 00000000 ZwEnumerateValueKey 77F88448 00000010 NtEnumerateValueKey 77F88458 00000000 ZwExtendSection 77F88458 00000010 NtExtendSection 77F88468 00000000 NtFilterToken 77F88468 00000010 ZwFilterToken 77F88478 00000000 ZwFindAtom 77F88478 00000010 NtFindAtom 77F88488 00000000 NtFlushBuffersFile 77F88488 00000010 ZwFlushBuffersFile 77F88498 00000000 NtFlushInstructionCache 77F88498 00000010 ZwFlushInstructionCache 77F884A8 00000000 NtFlushKey 77F884A8 00000010 ZwFlushKey 77F884B8 00000000 ZwFlushVirtualMemory 77F884B8 00000010 NtFlushVirtualMemory 77F884C8 00000000 NtFlushWriteBuffer 77F884C8 0000000c ZwFlushWriteBuffer 77F884D4 00000000 ZwFreeUserPhysicalPages 77F884D4 00000010 NtFreeUserPhysicalPages 77F884E4 00000000 NtFreeVirtualMemory 77F884E4 00000010 ZwFreeVirtualMemory 77F884F4 00000000 ZwFsControlFile 77F884F4 00000010 NtFsControlFile 77F88504 00000000 ZwGetContextThread 77F88504 00000010 NtGetContextThread 77F88514 00000000 ZwGetDevicePowerState 77F88514 00000010 NtGetDevicePowerState 77F88524 00000000 ZwGetPlugPlayEvent 77F88524 00000010 NtGetPlugPlayEvent 77F88534 00000000 ZwGetTickCount 77F88534 0000000c NtGetTickCount 77F88540 00000000 ZwGetWriteWatch 77F88540 00000010 NtGetWriteWatch 77F88550 00000000 ZwImpersonateAnonymousToken 77F88550 00000010 NtImpersonateAnonymousToken 77F88560 00000000 ZwImpersonateClientOfPort 77F88560 000000
From: siljaline on 26 Sep 2006 22:21
Please read-up! http://www.dts-l.org/goodpost.htm Silj -- siljaline MS - MVP Windows (IE/OE) & Windows Security, AH-VSOP Security Tools Updates http://aumha.net/viewforum.php?f=31 Reply to group, as return address is invalid that we may all benefit. |