From: Jeff482 on
And well I'll be making 3 posts out of this since both logs will be very long
due to the Limit = 30000 Microsoft put on this group,

Also I had dome some research and it has something to do with a +Com and a
Moniker that is causing this error to happen which no one here has any idea
what the error really is unless working for Microsoft for 10 years, but here
is the first error,

Event Type: Error
Event Source: Microsoft Internet Explorer
Event Category: None
Event ID: 1000
Date: 9/26/2006
Time: 6:07:14 PM

OS: Windows 200 SP4
Browser: IE6 SP1(Finial)

Description:
The description for Event ID ( 1000 ) in Source ( Microsoft Internet
Explorer ) cannot be found. The local computer may not have the necessary
registry information or message DLL files to display messages from a remote
computer. The following information is part of the event: iexplore.exe,
6.0.2800.1106, mshtml.dll, 6.0.2800.1561, 00190447.

Then the error that followed before DR. Watson,

Event Type: Information
Event Source: Application Popup
Event Category: None
Event ID: 26
Date: 9/26/2006
Time: 6:08:53 PM

Application popup: IEXPLORE.EXE - Application Error : The instruction at
"0x63710447" referenced memory at "0x00000002". The memory could not be
"read".

And now the whole DR. Watson log, please see second reply for Symbal table,

Application exception occurred:
App: (pid=372)
When: 9/26/2006 @ 18:29:04.864
Exception number: c0000005 (access violation)

*----> System Information <----*
Computer Name: JJHYDE1
User Name: Jeffrey
Number of Processors: 1
Processor Type: x86 Family 6 Model 8 Stepping 6
Windows 2000 Version: 5.0
Current Build: 2195
Service Pack: 4
Current Type: Uniprocessor Free
Registered Organization:
Registered Owner: Jeffrey Hyde

*----> Task List <----*
0 Idle.exe
8 System.exe
228 smss.exe
256 csrss.exe
276 winlogon.exe
304 services.exe
316 lsass.exe
488 AppServices.exe
524 nvsvc32.exe
548 regsvc.exe
568 svchost.exe
580 stisvc.exe
600 svchost.exe
628 ADService.exe
652 svchost.exe
692 WinMgmt.exe
376 winamp.exe
872 WinShade.exe
372 IEXPLORE.exe
1092 Explorer.exe
1116 RUNDLL32.exe
288 BarClock.exe
1152 WLANSTA.exe
780 gaim.exe
1044 firefox.exe
2580 notepad.exe
1712 IEXPLORE.exe
1900 mmc.exe
1848 drwtsn32.exe
0 _Total.exe

(00400000 - 00419000)
(77F80000 - 77FFC000)
(78000000 - 78045000)
(7C570000 - 7C623000)
(77E10000 - 77E79000)
(77F40000 - 77F7C000)
(70A70000 - 70AD6000)
(7C2D0000 - 7C335000)
(77D30000 - 77D9F000)
(71700000 - 7184A000)
(007A0000 - 00824000)
(7CF30000 - 7D176000)
(7CE20000 - 7CF0F000)
(10000000 - 1000E000)
(71500000 - 715FC000)
(71960000 - 71972000)
(00FF0000 - 0111A000)
(77880000 - 7790E000)
(7C0F0000 - 7C154000)
(63000000 - 63095000)
(7C740000 - 7C7CC000)
(77430000 - 77441000)
(779B0000 - 77A4B000)
(1A400000 - 1A47D000)
(77820000 - 77827000)
(759B0000 - 759B6000)
(75050000 - 75058000)
(75030000 - 75044000)
(75020000 - 75028000)
(76930000 - 7695B000)
(77920000 - 77943000)
(77570000 - 775A0000)
(6B2C0000 - 6B2C5000)
(77840000 - 7787E000)
(770C0000 - 770E3000)
(72A00000 - 72A2D000)
(76DF0000 - 76E01000)
(76FA0000 - 76FAF000)
(773E0000 - 773F5000)
(7CDC0000 - 7CE10000)
(7C340000 - 7C34F000)
(77BF0000 - 77C01000)
(77980000 - 779A4000)
(77950000 - 7797B000)
(751C0000 - 751C6000)
(75150000 - 75160000)
(774E0000 - 77514000)
(774C0000 - 774D1000)
(77530000 - 77552000)
(77830000 - 7783E000)
(75AB0000 - 75AB5000)
(76620000 - 76631000)
(75160000 - 7516C000)
(75210000 - 75225000)
(751D0000 - 75208000)
(745E0000 - 748A6000)
(02110000 - 02139000)
(76B30000 - 76B6E000)
(02140000 - 02151000)
(718C0000 - 71944000)
(70440000 - 704CF000)
(74FD0000 - 74FEE000)
(75010000 - 75017000)
(782C0000 - 782CC000)
(77340000 - 77353000)
(77520000 - 77525000)
(77320000 - 77337000)
(773B0000 - 773DF000)
(77380000 - 773A3000)
(77360000 - 77379000)
(777E0000 - 777E8000)
(777F0000 - 777F5000)
(63580000 - 63820000)
(75E60000 - 75E7A000)
(32520000 - 32532000)
(02C50000 - 02CC1000)
(75AC0000 - 75AE8000)
(77560000 - 77568000)
(77400000 - 77408000)
(77410000 - 77423000)
(70F30000 - 70F9E000)
(04220000 - 04238000)
(63400000 - 63423000)
(30000000 - 30011000)
(703D0000 - 703EB000)
(6A8F0000 - 6A910000)
(70510000 - 7051A000)
(6B600000 - 6B671000)
(07690000 - 07B16000)
(08110000 - 083DE000)
(71F00000 - 71F4D000)
(07020000 - 07036000)
(70020000 - 70025000)
(07450000 - 0746C000)
(04E30000 - 04E6C000)
(77800000 - 7781E000)
(04F20000 - 04F26000)
(01E90000 - 020B4000)
(35C50000 - 35C84000)
(78160000 - 78188000)
(7CA00000 - 7CA23000)
(67400000 - 67427000)
(69B10000 - 69C32000)
(4FF90000 - 4FFE4000)
(66650000 - 666A4000)
(69640000 - 6965F000)
(03330000 - 03353000)
(7C700000 - 7C713000)
(690A0000 - 690AB000)
(75A00000 - 75A12000)
(091E0000 - 091EB000)
(09320000 - 0936E000)
(719D0000 - 719ED000)


From: Jeff482 on
Reply 2

State Dump for Thread Id 0x16c

eax=0271e1b0 ebx=000002b9 ecx=00000002 edx=00000007 esi=0279ece0 edi=000002b9
eip=63710447 esp=0012c364 ebp=0012c37c iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000202

function: <nosymbols>
63710432 1bc0 sbb eax,eax
63710434 23c1 and eax,ecx
63710436 c3 ret
63710437 8b400c mov eax,[eax+0xc]
ds:035b8096=????????
6371043a 85c0 test eax,eax
6371043c 7414 jz 63718f52
6371043e 8bff mov edi,edi
63710440 8b4808 mov ecx,[eax+0x8]
ds:035b8096=????????
63710443 85c9 test ecx,ecx
63710445 740b jz 6371fa52
FAULT ->63710447 f60110 test byte ptr [ecx],0x10
ds:00000002=??
6371044a 7406 jz 63718f52
6371044c 8bc1 mov eax,ecx
6371044e 85c0 test eax,eax
63710450 75ee jnz 6371c840
63710452 c3 ret
63710453 90 nop
63710454 90 nop
63710455 90 nop
63710456 90 nop
63710457 90 nop
63710458 90 nop

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0012C37C 6373CC59 000002B9 00000001 0012D044 0012C47C !<nosymbols>
0012D044 0000025B 00000678 0271F600 00000000 FFFFFFFF !<nosymbols>

*----> Raw Stack Dump <----*
0012c364 05 5c 74 63 44 44 44 04 - cc c6 12 00 e8 2d 2e 05 .\tcDDD......-..
0012c374 d0 2d 2e 05 d0 b1 71 02 - 44 d0 12 00 59 cc 73 63 .-....q.D...Y.sc
0012c384 b9 02 00 00 01 00 00 00 - 44 d0 12 00 7c c4 12 00 ........D...|...
0012c394 44 d0 12 00 e0 c7 12 00 - 00 00 00 00 54 d0 12 00 D...........T...
0012c3a4 00 00 00 00 54 d0 12 00 - ac c4 12 00 44 d0 12 00 ....T.......D...
0012c3b4 a0 00 00 00 4d 6b 74 63 - 49 d5 73 63 44 44 44 04 ....MktcI.scDDD.
0012c3c4 ff ff ff ff 13 00 00 00 - cc c6 12 00 a0 c7 12 00 ................
0012c3d4 54 d0 12 00 ac c4 12 00 - 1a a1 74 63 44 44 44 04 T.........tcDDD.
0012c3e4 ff ff ff ff 13 00 00 00 - cc c6 12 00 a0 c7 12 00 ................
0012c3f4 00 00 00 00 38 c8 71 02 - 98 d2 12 00 f8 f0 69 63 ....8.q.......ic
0012c404 09 00 00 00 b1 00 00 00 - f8 81 7d 63 3c c4 12 00 ..........}c<...
0012c414 f8 f0 69 63 ce 10 7a 02 - 3b 00 00 00 09 00 00 00 ..ic..z.;.......
0012c424 8c 00 00 00 09 00 00 00 - 5d 10 7a 02 64 c4 12 00 ........].z.d...
0012c434 7e 87 6a 63 c7 87 6a 63 - f8 81 7d 63 23 88 6a 63 ~.jc..jc..}c#.jc
0012c444 00 40 7e 63 05 00 00 00 - 38 c8 71 02 01 00 00 00 .@~c....8.q.....
0012c454 f8 81 7d 63 00 10 7a 02 - 00 c8 71 02 03 00 00 00 ..}c..z...q.....
0012c464 00 00 00 00 00 00 00 00 - ac c4 12 00 f0 f5 71 02 ..............q.
0012c474 30 12 7a 02 44 44 44 04 - c0 c7 12 00 36 39 72 63 0.z.DDD.....69rc
0012c484 00 00 00 00 13 00 00 00 - 2c c8 12 00 28 c8 12 00 ........,...(...
0012c494 e0 c7 12 00 a0 c7 12 00 - ec c7 12 00 38 c8 71 02 ............8.q.

State Dump for Thread Id 0x3f0

eax=00000000 ebx=000493e0 ecx=0013d088 edx=00000000 esi=0013ce80 edi=000493e0
eip=77f88af7 esp=00d3febc ebp=00d3fee4 iopl=0 nv up ei ng nz ac po cy
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000297

function: NtRemoveIoCompletion
77f88aec b8a8000000 mov eax,0xa8
77f88af1 8d542404 lea edx,[esp+0x4]
ss:01bd9da3=00000000
77f88af5 cd2e int 2e
77f88af7 c21400 ret 0x14
77f88afa 8bff mov edi,edi

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
00D3FEE4 77D818FF 00000104 00D3FF1C 00D3FF0C 00D3FF14
ntdll!NtRemoveIoCompletion
00D3FF20 77D51484 000493E0 00D3FF60 00D3FF5C 00D3FF70
rpcrt4!I_RpcTransGetAddressList
00D3FF74 77D512BD 77D3AFBD 0013CE80 77D50101 00130000 rpcrt4!TowerConstruct
00D3FFA8 77D37DE8 0013B5D8 00D3FFEC 7C57B388 0013E078 rpcrt4!TowerConstruct
00D3FFB4 7C57B388 0013E078 77D50101 00130000 0013E078
rpcrt4!I_RpcConnectionInqSockBuffSize2
00D3FFEC 00000000 77D37DD0 0013E078 00000000 C7000000 kernel32!lstrcmpiW

*----> Raw Stack Dump <----*
00d3febc 23 54 58 7c 04 01 00 00 - 0c ff d3 00 fc fe d3 00 #TX|............
00d3fecc dc fe d3 00 d4 fe d3 00 - 00 a2 2f 4d ff ff ff ff ........../M....
00d3fedc ec 03 00 00 7e 0a d8 77 - 20 ff d3 00 ff 18 d8 77 ....~..w ......w
00d3feec 04 01 00 00 1c ff d3 00 - 0c ff d3 00 14 ff d3 00 ................
00d3fefc e0 93 04 00 e0 93 04 00 - 80 ce 13 00 94 b5 57 7c ..............W|
00d3ff0c 10 00 00 00 04 01 00 00 - 00 00 00 00 19 00 02 00 ................
00d3ff1c 00 00 00 00 74 ff d3 00 - 84 14 d5 77 e0 93 04 00 ....t......w....
00d3ff2c 60 ff d3 00 5c ff d3 00 - 70 ff d3 00 58 ff d3 00 `...\...p...X...
00d3ff3c 64 ff d3 00 6c ff d3 00 - 60 b5 13 00 68 d6 13 00 d...l...`...h...
00d3ff4c c0 7f f8 77 04 01 00 00 - 00 00 00 00 00 a2 2f 4d ...w........../M
00d3ff5c ff ff ff ff 00 00 00 00 - 00 00 00 00 01 00 00 00 ................
00d3ff6c 00 00 00 00 04 01 00 00 - a8 ff d3 00 bd 12 d5 77 ...............w
00d3ff7c bd af d3 77 80 ce 13 00 - 01 01 d5 77 00 00 13 00 ...w.......w....
00d3ff8c 78 e0 13 00 00 5d 1e ee - ff ff ff ff 00 5d 1e ee x....].......]..
00d3ff9c ff ff ff ff 30 75 00 00 - 78 e0 13 00 b4 ff d3 00 ....0u..x.......
00d3ffac e8 7d d3 77 d8 b5 13 00 - ec ff d3 00 88 b3 57 7c .}.w..........W|
00d3ffbc 78 e0 13 00 01 01 d5 77 - 00 00 13 00 78 e0 13 00 x......w....x...
00d3ffcc 00 d0 fd 7f c4 d5 12 00 - c0 ff d3 00 c4 d5 12 00 ................
00d3ffdc ff ff ff ff 54 1f 5c 7c - 08 2b 57 7c 00 00 00 00 ....T.\|.+W|....
00d3ffec 00 00 00 00 00 00 00 00 - d0 7d d3 77 78 e0 13 00 .........}.wx...

State Dump for Thread Id 0x41c

eax=00fefeb8 ebx=00000001 ecx=00010101 edx=00000000 esi=77f88ef8 edi=00000001
eip=77f88f03 esp=00fefd98 ebp=00fefde4 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246

function: NtWaitForMultipleObjects
77f88ef8 b8e9000000 mov eax,0xe9
77f88efd 8
From: Jeff482 on
Reply 3
*----> Symbol Table <----*

635ECCD6 00000072 DllInstall
635ECD48 0000006d DllRegisterServer
635ECDB5 0000019a DllUnregisterServer
635ECF4F 00000005 DllGetClassObject
635ECF54 00000290 DllEnumClassObjects
635ED1E4 00006f83 DllCanUnloadNow
635F4167 00000cef PrintHTML
635F4E56 0002d2ac CreateHTMLPropertyPage
63622102 000584ab Ordinal100
6367A5AD 000102ec MatchExactGetIDsOfNames
6368A899 0000084c ShowModelessHTMLDialog
6368B0E5 00000084 ShowModalDialog
6368B169 00000009 ShowHTMLDialog
6368B172 00002acd ShowHTMLDialogEx
6368DC3F 00002dec RunHTMLApplication
63690A2B 00000006 RNIGetCompatibleVersion
63690A31 0000002f com_ms_osp_ospmrshl_classInit
63690A60 000002a3 com_ms_osp_ospmrshl_toJava
63690D03 0000009f com_ms_osp_ospmrshl_copyToExternal
63690DA2 00000000 com_ms_osp_ospmrshl_releaseByValExternal

And


6300F2F6 00000000 InternetSetDialStateA
6300F2F6 00000019 InternetSetDialState
6300F30F 00000182 InternetSetDialStateW
6300F491 00000f2c Ordinal101
630103BD 0000030d InternetGetConnectedStateExW
630106CA 00000000 InternetGetConnectedStateEx
630106CA 00000078 InternetGetConnectedStateExA
63010742 0000009a InternetGetConnectedState
630107DC 000004ba InternetDialW
63010C96 00000000 InternetDial
63010C96 00000066 InternetDialA
63010CFC 000000f6 InternetHangUp
63010DF2 000002fc InternetAutodial
630110EE 00000342 InternetAutodialHangup
63011430 000001f6 InternetAutodialCallback
63011626 000000f2 InternetGoOnlineW
63011718 00000000 InternetGoOnlineA
63011718 00000e28 InternetGoOnline
63012540 000003a5 Ordinal108
630128E5 000001a8 Ordinal110
63012A8D 000003b2 Ordinal109
63012E3F 000000c6 Ordinal111
63012F05 00002dea DllInstall
63015CEF 000004f8 InternetCrackUrlA
630161E7 00000722 InternetCreateUrlA
63016909 0000006c InternetCanonicalizeUrlA
63016975 00000072 InternetCombineUrlA
630169E7 00000000 InternetGetCertByURLA
630169E7 0000004e InternetGetCertByURL
63016A35 00000000 InternetWriteFileExW
63016A35 00000000 InternetWriteFileExA
63016A35 0000000d InternetReadFileExW
63016A42 0000006a InternetSetFilePointer
63016AAC 00000161 InternetGetLastResponseInfoA
63016C0D 00000000 InternetSetStatusCallbackA
63016C0D 000000d2 InternetSetStatusCallback
63016CDF 0000002c InternetAttemptConnect
63016D0B 000005a2 InternetUnlockRequestFile
630172AD 00000000 InternetShowSecurityInfoByURLA
630172AD 000002a6 InternetShowSecurityInfoByURL
63017553 0000023d InternetLockRequestFile
63017790 000001f8 InternetOpenA
63017988 000005d1 InternetConnectA
63017F59 00000284 InternetOpenUrlA
630181DD 00000292 InternetWriteFile
6301846F 0000034f InternetFindNextFileA
630187BE 0000013d InternetCloseHandle
630188FB 00000446 InternetReadFile
63018D41 00000193 InternetReadFileExA
63018ED4 000001f1 InternetQueryDataAvailable
630190C5 0000036a InternetCheckConnectionA
6301942F 00000038 ForceNexusLookupExW
63019467 00000025 ForceNexusLookup
6301948C 000002ce CreateMD5SSOHash
6301975A 0000008d InternetCanonicalizeUrlW
630197E7 000000a4 InternetCombineUrlW
6301988B 000000d0 InternetFindNextFileW
6301995B 00000012 InternetSetStatusCallbackW
6301996D 0000030f InternetCrackUrlW
63019C7C 00000468 InternetCreateUrlW
6301A0E4 0000017d InternetOpenW
6301A261 0000019a InternetConnectW
6301A3FB 00000137 InternetOpenUrlW
6301A532 000000c5 InternetGetLastResponseInfoW
6301A5F7 000000a1 InternetCheckConnectionW
6301A698 0000009e InternetShowSecurityInfoByURLW
6301A736 000000e7 InternetAlgIdToStringW
6301A81D 000002b6 InternetSecurityProtocolToStringW
6301AAD3 00000cfb InternetQueryOptionA
6301B7CE 00000316 InternetQueryOptionW
6301BAE4 00000ca3 InternetSetOptionA
6301C787 00000226 InternetSetOptionW
6301C9AD 0000002a InternetSetOptionExA
6301C9D7 000047a8 InternetSetOptionExW
6302117F 00000d0f ResumeSuspendedDownload
63021E8E 00000058 InternetQueryFortezzaStatus
63021EE6 00008ecf InternetFortezzaCommand
6302ADB5 0000010f FtpGetFileA
6302AEC4 000009e0 FtpPutFileA
6302B8A4 000001b3 FtpDeleteFileA
6302BA57 000001df FtpRenameFileA
6302BC36 000001bd FtpCreateDirectoryA
6302BDF3 0000019b FtpRemoveDirectoryA
6302BF8E 000001ae FtpSetCurrentDirectoryA
6302C13C 000001a2 FtpGetCurrentDirectoryA
6302C2DE 00000220 FtpCommandA
6302C4FE 00000d97 FtpGetFileSize
6302D295 0000001f FtpFindFirstFileA
6302D2B4 000002f6 FtpOpenFileA
6302D5AA 000000fe FtpFindFirstFileW
6302D6A8 000000b0 FtpDeleteFileW
6302D758 00000141 FtpRenameFileW
6302D899 000000b6 FtpOpenFileW
6302D94F 000000b0 FtpCreateDirectoryW
6302D9FF 000000ad FtpRemoveDirectoryW
6302DAAC 000000ad FtpSetCurrentDirectoryW
6302DB59 000000f8 FtpGetCurrentDirectoryW
6302DC51 000000d5 FtpCommandW
6302DD26 00000321 FtpGetFileW
6302E047 0000033f FtpPutFileW
6302E386 00000077 FtpGetFileEx
6302E3FD 00003270 FtpPutFileEx
6303166D 000001fc GopherCreateLocatorA
63031869 0000070f GopherGetLocatorTypeA
63031F78 00000408 GopherFindFirstFileA
63032380 00000404 GopherOpenFileA
63032784 00000000 GopherGetAttributeW
63032784 0000000d GopherGetAttributeA
63032791 0000023b GopherCreateLocatorW
630329CC 0000009b GopherGetLocatorTypeW
63032A67 00000199 GopherFindFirstFileW
63032C00 00002e30 GopherOpenFileW
63035A30 0000336c InternetInitializeAutoProxyDll
63038D9C 000038be IsHostInProxyBypassList
6303C65A 000005b0 Ordinal118
6303CC0A 00000176 PrivacySetZonePreferenceW
6303CD80 00000874 PrivacyGetZonePreferenceW
6303D5F4 0000011d HttpAddRequestHeadersA
6303D711 000000e4 HttpAddRequestHeadersW
6303D7F5 00000000 HttpCheckDavCompliance
6303D7F5 000002d5 Ordinal104
6303DACA 000003b3 Ordinal105
6303DE7D 0000001f HttpSendRequestA
6303DE9C 000000bc HttpSendRequestW
6303DF58 0000005e HttpSendRequestExA
6303DFB6 000000fd HttpSendRequestExW
6303E0B3 00000029 HttpEndRequestA
6303E0DC 00000137 HttpEndRequestW
6303E213 0000034e HttpOpenRequestA
6303E561 00000a91 HttpOpenRequestW
6303EFF2 00000200 HttpQueryInfoA
6303F1F2 00000722 HttpQueryInfoW
6303F914 00000071 InternetSetPerSiteCookieDecisionA
6303F985 000000a3 InternetSetPerSiteCookieDecisionW
6303FA28 0000004a InternetGetPerSiteCookieDecisionA
6303FA72 000000b6 InternetGetPerSiteCookieDecisionW
6303FB28 00000072
From: Jeff482 on
And finily Reply 4,

ntdll.dll
77F88048 00000030 LdrInitializeThunk
77F88078 00000000 NtAcceptConnectPort
77F88078 00000010 ZwAcceptConnectPort
77F88088 00000000 ZwAccessCheck
77F88088 00000010 NtAccessCheck
77F88098 00000000 ZwAccessCheckAndAuditAlarm
77F88098 00000010 NtAccessCheckAndAuditAlarm
77F880A8 00000000 ZwAccessCheckByType
77F880A8 00000010 NtAccessCheckByType
77F880B8 00000000 NtAccessCheckByTypeAndAuditAlarm
77F880B8 00000010 ZwAccessCheckByTypeAndAuditAlarm
77F880C8 00000000 NtAccessCheckByTypeResultList
77F880C8 00000010 ZwAccessCheckByTypeResultList
77F880D8 00000000 NtAccessCheckByTypeResultListAndAuditAlarm
77F880D8 00000010 ZwAccessCheckByTypeResultListAndAuditAlarm
77F880E8 00000000 ZwAccessCheckByTypeResultListAndAuditAlarmByHandle
77F880E8 00000010 NtAccessCheckByTypeResultListAndAuditAlarmByHandle
77F880F8 00000000 ZwAddAtom
77F880F8 00000010 NtAddAtom
77F88108 00000000 ZwAdjustGroupsToken
77F88108 00000010 NtAdjustGroupsToken
77F88118 00000000 ZwAdjustPrivilegesToken
77F88118 00000010 NtAdjustPrivilegesToken
77F88128 00000000 NtAlertResumeThread
77F88128 00000010 ZwAlertResumeThread
77F88138 00000000 ZwAlertThread
77F88138 00000010 NtAlertThread
77F88148 00000000 ZwAllocateLocallyUniqueId
77F88148 00000010 NtAllocateLocallyUniqueId
77F88158 00000000 NtAllocateUserPhysicalPages
77F88158 00000010 ZwAllocateUserPhysicalPages
77F88168 00000000 NtAllocateUuids
77F88168 00000010 ZwAllocateUuids
77F88178 00000000 NtAllocateVirtualMemory
77F88178 00000010 ZwAllocateVirtualMemory
77F88188 00000000 ZwAreMappedFilesTheSame
77F88188 00000010 NtAreMappedFilesTheSame
77F88198 00000000 NtAssignProcessToJobObject
77F88198 00000010 ZwAssignProcessToJobObject
77F881A8 00000000 ZwCallbackReturn
77F881A8 00000010 NtCallbackReturn
77F881B8 00000000 ZwCancelIoFile
77F881B8 00000010 NtCancelIoFile
77F881C8 00000000 NtCancelTimer
77F881C8 00000010 ZwCancelTimer
77F881D8 00000000 NtCancelDeviceWakeupRequest
77F881D8 00000010 ZwCancelDeviceWakeupRequest
77F881E8 00000000 NtClearEvent
77F881E8 00000010 ZwClearEvent
77F881F8 00000000 NtClose
77F881F8 00000010 ZwClose
77F88208 00000000 NtCloseObjectAuditAlarm
77F88208 00000010 ZwCloseObjectAuditAlarm
77F88218 00000000 NtCompleteConnectPort
77F88218 00000010 ZwCompleteConnectPort
77F88228 00000000 ZwConnectPort
77F88228 00000010 NtConnectPort
77F88238 00000000 NtContinue
77F88238 00000010 ZwContinue
77F88248 00000000 NtCreateDirectoryObject
77F88248 00000010 ZwCreateDirectoryObject
77F88258 00000000 NtCreateEvent
77F88258 00000010 ZwCreateEvent
77F88268 00000000 NtCreateEventPair
77F88268 00000010 ZwCreateEventPair
77F88278 00000000 ZwCreateFile
77F88278 00000010 NtCreateFile
77F88288 00000000 NtCreateIoCompletion
77F88288 00000010 ZwCreateIoCompletion
77F88298 00000000 NtCreateJobObject
77F88298 00000010 ZwCreateJobObject
77F882A8 00000000 NtCreateKey
77F882A8 00000010 ZwCreateKey
77F882B8 00000000 ZwCreateMailslotFile
77F882B8 00000010 NtCreateMailslotFile
77F882C8 00000000 ZwCreateMutant
77F882C8 00000010 NtCreateMutant
77F882D8 00000000 NtCreateNamedPipeFile
77F882D8 00000010 ZwCreateNamedPipeFile
77F882E8 00000000 NtCreatePagingFile
77F882E8 00000010 ZwCreatePagingFile
77F882F8 00000000 ZwCreatePort
77F882F8 00000010 NtCreatePort
77F88308 00000000 ZwCreateProcess
77F88308 00000010 NtCreateProcess
77F88318 00000000 NtCreateProfile
77F88318 00000010 ZwCreateProfile
77F88328 00000000 ZwCreateSection
77F88328 00000010 NtCreateSection
77F88338 00000000 ZwCreateSemaphore
77F88338 00000010 NtCreateSemaphore
77F88348 00000000 ZwCreateSymbolicLinkObject
77F88348 00000010 NtCreateSymbolicLinkObject
77F88358 00000000 ZwCreateThread
77F88358 00000010 NtCreateThread
77F88368 00000000 ZwCreateTimer
77F88368 00000010 NtCreateTimer
77F88378 00000000 ZwCreateToken
77F88378 00000010 NtCreateToken
77F88388 00000000 ZwCreateWaitablePort
77F88388 00000010 NtCreateWaitablePort
77F88398 00000000 ZwDelayExecution
77F88398 00000010 NtDelayExecution
77F883A8 00000000 ZwDeleteAtom
77F883A8 00000010 NtDeleteAtom
77F883B8 00000000 ZwDeleteFile
77F883B8 00000010 NtDeleteFile
77F883C8 00000000 NtDeleteKey
77F883C8 00000010 ZwDeleteKey
77F883D8 00000000 ZwDeleteObjectAuditAlarm
77F883D8 00000010 NtDeleteObjectAuditAlarm
77F883E8 00000000 NtDeleteValueKey
77F883E8 00000010 ZwDeleteValueKey
77F883F8 00000000 ZwDeviceIoControlFile
77F883F8 00000010 NtDeviceIoControlFile
77F88408 00000000 ZwDisplayString
77F88408 00000010 NtDisplayString
77F88418 00000000 ZwDuplicateObject
77F88418 00000010 NtDuplicateObject
77F88428 00000000 ZwDuplicateToken
77F88428 00000010 NtDuplicateToken
77F88438 00000000 NtEnumerateKey
77F88438 00000010 ZwEnumerateKey
77F88448 00000000 ZwEnumerateValueKey
77F88448 00000010 NtEnumerateValueKey
77F88458 00000000 ZwExtendSection
77F88458 00000010 NtExtendSection
77F88468 00000000 NtFilterToken
77F88468 00000010 ZwFilterToken
77F88478 00000000 ZwFindAtom
77F88478 00000010 NtFindAtom
77F88488 00000000 NtFlushBuffersFile
77F88488 00000010 ZwFlushBuffersFile
77F88498 00000000 NtFlushInstructionCache
77F88498 00000010 ZwFlushInstructionCache
77F884A8 00000000 NtFlushKey
77F884A8 00000010 ZwFlushKey
77F884B8 00000000 ZwFlushVirtualMemory
77F884B8 00000010 NtFlushVirtualMemory
77F884C8 00000000 NtFlushWriteBuffer
77F884C8 0000000c ZwFlushWriteBuffer
77F884D4 00000000 ZwFreeUserPhysicalPages
77F884D4 00000010 NtFreeUserPhysicalPages
77F884E4 00000000 NtFreeVirtualMemory
77F884E4 00000010 ZwFreeVirtualMemory
77F884F4 00000000 ZwFsControlFile
77F884F4 00000010 NtFsControlFile
77F88504 00000000 ZwGetContextThread
77F88504 00000010 NtGetContextThread
77F88514 00000000 ZwGetDevicePowerState
77F88514 00000010 NtGetDevicePowerState
77F88524 00000000 ZwGetPlugPlayEvent
77F88524 00000010 NtGetPlugPlayEvent
77F88534 00000000 ZwGetTickCount
77F88534 0000000c NtGetTickCount
77F88540 00000000 ZwGetWriteWatch
77F88540 00000010 NtGetWriteWatch
77F88550 00000000 ZwImpersonateAnonymousToken
77F88550 00000010 NtImpersonateAnonymousToken
77F88560 00000000 ZwImpersonateClientOfPort
77F88560 000000
From: siljaline on
Please read-up!
http://www.dts-l.org/goodpost.htm

Silj

--
siljaline

MS - MVP Windows (IE/OE) & Windows Security, AH-VSOP

Security Tools Updates
http://aumha.net/viewforum.php?f=31

Reply to group, as return address is invalid that we may all benefit.