JIURL玩玩Win2k 地址空间的布局

JIURL玩玩Win2k 地址空间的布局

作者: JIURL

                主页: http://jiurl.yeah.net

    日期: 2003-7-30


    地址空间的布局,每个进程有4G的地址空间,其中低2G是用户地址空间,高2G是系统地址空间。

用户地址空间的布局

    每个进程有自己的用户地址空间(低2G),在用户地址空间中有,进程的环境变量,进程的参数,进程的堆(Heap),进程载入的模组,进程PEB,线程的堆栈(Stack),线程TEB等等。我写了一个叫 JiurlL2gLayoutSee 的程序,可以获得一个指定进程的用户地址空间布局情况。下面是使用 JiurlL2gLayoutSee 获得的一个记事本的用户地址空间布局情况。

NOTEPAD.EXE:

// 通过进程的VAD我们可以了解到进程保留了哪些用户地址空间。
VADs:

#define MEM_IMAGE 0x001
#define MEM_PRIVATE 0x800
#define PAGE_READONLY 0x010
#define PAGE_READWRITE 0x040
#define PAGE_WRITECOPY 0x050
#define PAGE_EXECUTE 0x020
#define PAGE_EXECUTE_READ 0x030
#define PAGE_EXECUTE_READWRITE 0x060
#define PAGE_EXECUTE_WRITECOPY 0x070

0x00010000 - 0x00011000 Flags= 0xc40
0x00020000 - 0x00021000 Flags= 0xc40
0x00030000 - 0x00070000 Flags= 0x840
0x00070000 - 0x00170000 Flags= 0x840
0x00170000 - 0x00180000 Flags= 0x040
0x00180000 - 0x00196000 Flags= 0x010
0x001a0000 - 0x001cf000 Flags= 0x010
0x001d0000 - 0x00211000 Flags= 0x010
0x00220000 - 0x00224000 Flags= 0x010
0x00230000 - 0x00271000 Flags= 0x010
0x00280000 - 0x00348000 Flags= 0x034
0x00350000 - 0x00393000 Flags= 0x014
0x003a0000 - 0x006a0000 Flags= 0x034
0x006a0000 - 0x006a1000 Flags= 0xc44
0x006b0000 - 0x006b1000 Flags= 0xc44
0x006c0000 - 0x006d0000 Flags= 0x840
0x006d0000 - 0x006d2000 Flags= 0x010
0x006e0000 - 0x006e1000 Flags= 0x040
0x006f0000 - 0x00770000 Flags= 0x840
0x00770000 - 0x00780000 Flags= 0x840
0x00780000 - 0x00b80000 Flags= 0x840
0x00b90000 - 0x00b91000 Flags= 0xc44
0x00bb0000 - 0x00bc2000 Flags= 0xc44
0x00bd0000 - 0x00bd5000 Flags= 0xc44
0x00be0000 - 0x00be5000 Flags= 0x010
0x00bf0000 - 0x00c30000 Flags= 0x840
0x00d40000 - 0x00d5c000 Flags= 0x071
0x00d60000 - 0x00d70000 Flags= 0x840
0x00d70000 - 0x00dc3000 Flags= 0x071
0x00dd0000 - 0x00de0000 Flags= 0x840
0x00de0000 - 0x00f84000 Flags= 0x040
0x01000000 - 0x01010000 Flags= 0x071
0x01010000 - 0x011f0000 Flags= 0x010
0x011f0000 - 0x01201000 Flags= 0x010
0x01210000 - 0x01310000 Flags= 0x840
0x10000000 - 0x10019000 Flags= 0x071
0x6dd30000 - 0x6dd36000 Flags= 0x071
0x75e00000 - 0x75e1a000 Flags= 0x071
0x76af0000 - 0x76b2e000 Flags= 0x071
0x77560000 - 0x777a0000 Flags= 0x071
0x777c0000 - 0x777dd000 Flags= 0x071
0x77990000 - 0x77a25000 Flags= 0x071
0x77a30000 - 0x77b24000 Flags= 0x071
0x77b30000 - 0x77bba000 Flags= 0x071
0x77c50000 - 0x77c9a000 Flags= 0x071
0x77ca0000 - 0x77d20000 Flags= 0x071
0x77d20000 - 0x77d8f000 Flags= 0x071
0x77d90000 - 0x77dea000 Flags= 0x071
0x77df0000 - 0x77e54000 Flags= 0x071
0x77e60000 - 0x77f35000 Flags= 0x071
0x77f40000 - 0x77f7c000 Flags= 0x071
0x77f80000 - 0x77ff9000 Flags= 0x071
0x78000000 - 0x78046000 Flags= 0x071
0x7f6f0000 - 0x7f7f0000 Flags= 0x034
0x7ffa0000 - 0x7ffd3000 Flags= 0x014
0x7ffdd000 - 0x7ffde000 Flags= 0xc64
0x7ffde000 - 0x7ffdf000 Flags= 0xc64
0x7ffdf000 - 0x7ffe0000 Flags= 0xc64

// 布局情况
Layout:

// 环境变量
0x00010000 - 0x00011000 Environment

// 进程参数
0x00020000 - 0x00021000 ProcessParameters

// 进程堆
0x00070000 - 0x00170000 ProcessHeap 0
0x00170000 - 0x00270000 ProcessHeap 1
0x006c0000 - 0x007c0000 ProcessHeap 2
0x00770000 - 0x00870000 ProcessHeap 3
0x00d60000 - 0x00e60000 ProcessHeap 4
0x00dd0000 - 0x00ed0000 ProcessHeap 5

// 进程载入的模组,以及模组中的各节
0x00d70000 - 0x00dc3000 upengine.dll
0x00d71000 - 0x00d8b000 .text
0x00d8b000 - 0x00da0000 .rdata
0x00da0000 - 0x00db2000 .data
0x00db2000 - 0x00db3000 .idata
0x00db3000 - 0x00dbf000 .share_d
0x00dbf000 - 0x00dc1000 .rsrc
0x00dc1000 - 0x00dc3000 .reloc

0x00d40000 - 0x00d5c000 unispim.ime
0x00d41000 - 0x00d4e000 .text
0x00d4e000 - 0x00d51000 .rdata
0x00d51000 - 0x00d55000 .data
0x00d55000 - 0x00d56000 .SharedD
0x00d56000 - 0x00d5a000 .rsrc
0x00d5a000 - 0x00d5c000 .reloc

0x77ca0000 - 0x77d20000 CLBCATQ.DLL
0x77ca1000 - 0x77d0f000 .text
0x77d0f000 - 0x77d19000 .data
0x77d19000 - 0x77d1b000 .rsrc
0x77d1b000 - 0x77d20000 .reloc

0x77990000 - 0x77a25000 OLEAUT32.DLL
0x77991000 - 0x77a16000 .text
0x77a16000 - 0x77a1d000 .data
0x77a1d000 - 0x77a1e000 .rsrc
0x77a1e000 - 0x77a25000 .reloc

0x77a30000 - 0x77b24000 OLE32.DLL
0x77a31000 - 0x77b08000 .text
0x77b08000 - 0x77b11000 .orpc
0x77b11000 - 0x77b17000 .data
0x77b17000 - 0x77b19000 .rsrc
0x77b19000 - 0x77b24000 .reloc

0x6dd30000 - 0x6dd36000 INDICDLL.dll
0x6dd31000 - 0x6dd33000 .text
0x6dd33000 - 0x6dd34000 .data
0x6dd34000 - 0x6dd35000 .rsrc
0x6dd35000 - 0x6dd36000 .reloc

0x10000000 - 0x10019000 NVDESK32.DLL
0x10001000 - 0x1000f000 .text
0x1000f000 - 0x10010000 .rdata
0x10010000 - 0x10012000 .data
0x10012000 - 0x10014000 .shared
0x10014000 - 0x10015000 .notshar
0x10015000 - 0x10017000 .rsrc
0x10017000 - 0x10019000 .reloc

0x75e00000 - 0x75e1a000 IMM32.DLL
0x75e01000 - 0x75e13000 .text
0x75e13000 - 0x75e14000 .data
0x75e14000 - 0x75e19000 .rsrc
0x75e19000 - 0x75e1a000 .reloc

0x777c0000 - 0x777dd000 WINSPOOL.DRV
0x777c1000 - 0x777d8000 .text
0x777d8000 - 0x777db000 .data
0x777db000 - 0x777dc000 .rsrc
0x777dc000 - 0x777dd000 .reloc

0x78000000 - 0x78046000 MSVCRT.DLL
0x78001000 - 0x78033000 .text
0x78033000 - 0x7803b000 .rdata
0x7803b000 - 0x78042000 .data
0x78042000 - 0x78043000 .rsrc
0x78043000 - 0x78046000 .reloc

0x77560000 - 0x777a0000 SHELL32.DLL
0x77561000 - 0x7767c000 .text
0x7767c000 - 0x77680000 .data
0x77680000 - 0x77791000 .rsrc
0x77791000 - 0x777a0000 .reloc

0x77b30000 - 0x77bba000 COMCTL32.DLL
0x77b31000 - 0x77b96000 .text
0x77b96000 - 0x77b97000 .data
0x77b97000 - 0x77bb6000 .rsrc
0x77bb6000 - 0x77bba000 .reloc

0x77d20000 - 0x77d8f000 RPCRT4.DLL
0x77d21000 - 0x77d81000 .text
0x77d81000 - 0x77d89000 .orpc
0x77d89000 - 0x77d8a000 .data
0x77d8a000 - 0x77d8b000 .rsrc
0x77d8b000 - 0x77d8f000 .reloc

0x77d90000 - 0x77dea000 ADVAPI32.DLL
0x77d91000 - 0x77de1000 .text
0x77de1000 - 0x77de4000 .data
0x77de4000 - 0x77de6000 .rsrc
0x77de6000 - 0x77dea000 .reloc

0x77df0000 - 0x77e54000 USER32.DLL
0x77df1000 - 0x77e48000 .text
0x77e48000 - 0x77e49000 .data
0x77e49000 - 0x77e51000 .rsrc
0x77e51000 - 0x77e54000 .reloc

0x77e60000 - 0x77f35000 KERNEL32.DLL
0x77e61000 - 0x77ebf000 .text
0x77ebf000 - 0x77ec1000 .data
0x77ec1000 - 0x77f31000 .rsrc
0x77f31000 - 0x77f35000 .reloc

0x77f40000 - 0x77f7c000 GDI32.DLL
0x77f41000 - 0x77f78000 .text
0x77f78000 - 0x77f79000 .data
0x77f79000 - 0x77f7a000 .rsrc
0x77f7a000 - 0x77f7c000 .reloc

0x77c50000 - 0x77c9a000 SHLWAPI.DLL
0x77c51000 - 0x77c94000 .text
0x77c94000 - 0x77c95000 .data
0x77c95000 - 0x77c97000 .rsrc
0x77c97000 - 0x77c9a000 .reloc

0x76af0000 - 0x76b2e000 comdlg32.dll
0x76af1000 - 0x76b1b000 .text
0x76b1b000 - 0x76b1f000 .data
0x76b1f000 - 0x76b2b000 .rsrc
0x76b2b000 - 0x76b2e000 .reloc

0x77f80000 - 0x77ff9000 ntdll.dll
0x77f81000 - 0x77fc4000 .text
0x77fc4000 - 0x77fc9000 ECODE
0x77fc9000 - 0x77fcd000 PAGE
0x77fcd000 - 0x77fd0000 .data
0x77fd0000 - 0x77ff7000 .rsrc
0x77ff7000 - 0x77ff9000 .reloc

0x01000000 - 0x01010000 NOTEPAD.EXE
0x01001000 - 0x01008000 .text
0x01008000 - 0x0100a000 .data
0x0100a000 - 0x01010000 .rsrc

// 进程PEB
0x7ffdf000 - 0x7ffe0000 PEB

// 线程堆栈(Stack),以及线程TEB
0x0006a000 - 0x00070000 Stack Thread 0x118
0x7ffde000 - 0x7ffdf000 TEB Thread 0x118

0x00c2f000 - 0x00c30000 Stack Thread 0x2a8
0x7ffdd000 - 0x7ffde000 TEB Thread 0x2a8


系统地址空间的布局

    所有进程的系统地址空间中的内容,大部分是一样的。系统地址空间中有,系统代码,当前进程的页表,当前进程的页目录,当前进程的 Working Set,Paged pool (可以被换出物理内存的系统堆),Nonpaged pool (不能被换出物理内存的系统堆,NonPagedPool 有两部分,一部分位于系统地址空间的低处,一部分位于系统地址空间的高处),驱动程序等等。

下面我们来看一看当前我的系统地址空间的大概布局

HAL.dll 0x80001000 - 0x80011220

ntoskrnl.exe 0x80400000 - 0x80590900

MmNonPagedPoolStart 8103e000

win32k.sys 0xa0000000 - 0xa01a6000

当前进程的页表,页目录 0xc0000000 - 0xc03fffff

MmSystemCacheStart c1000000
MmSystemCacheEnd e0ffffff

MmPagedPoolStart e1000000
MmPagedPoolEnd e77fffff

MmNonPagedSystemStart e7800000

MmNonPagedPoolExpansionStart fcd6c000
MmNonPagedPoolEnd ffbe0000

其中 MmNonPagedPoolStart,MmSystemCacheStart,MmSystemCacheEnd,MmPagedPoolStart,MmPagedPoolEnd,MmNonPagedSystemStart,MmNonPagedPoolEnd 是全局变量,使用 kd 我们可以得到这些全局变量的值。

kd> dd MmNonPagedPoolStart l 1
dd MmNonPagedPoolStart l 1
8047e750 8103e000

kd> dd MmSystemCacheStart l 1
dd MmSystemCacheStart l 1
8046ac00 c1000000

kd> dd MmSystemCacheEnd l 1
dd MmSystemCacheEnd l 1
8047efd8 e0ffffff

kd> dd MmPagedPoolStart l 1
dd MmPagedPoolStart l 1
80471038 e1000000

kd> dd MmPagedPoolEnd l 1
dd MmPagedPoolEnd l 1
8047e738 e77fffff

kd> dd MmNonPagedSystemStart l 1
dd MmNonPagedSystemStart l 1
8047f62c e7800000

kd> dd MmNonPagedPoolExpansionStart l 1
dd MmNonPagedPoolExpansionStart l 1
8047e8dc fcd6c000

kd> dd MmNonPagedPoolEnd l 1
dd MmNonPagedPoolEnd l 1
8046a85c ffbe0000

我写了一个叫 JiurlSystemModulesSee 的程序,可以获得系统地址空间载入的模组的信息。系统地址空间中载入的模组包括,ntoskrnl.exe,hal.dll,win32k.sys 以及驱动程序。

// 当前我的系统地址空间中载入的模组,以及模组中的各节
0x80400000 - 0x80590900 ntoskrnl.exe
0x804004c0 - 0x80466c69 .text
0x80466c80 - 0x804677df POOLCODE
0x80467800 - 0x80468a10 POOLMI
0x80468a40 - 0x8046912c MISYSPTE
0x80469140 - 0x80480ba4 .data
0x80480bc0 - 0x8048c2f8 PAGELK
0x8048c300 - 0x8052c481 PAGE
0x8052c4c0 - 0x8053275f PAGEVRFY
0x80532780 - 0x80535b39 PAGEKD
0x80535b40 - 0x80538430 PAGEHYDR
0x80538440 - 0x80538e4c PAGESPEC
0x80538e80 - 0x80541f87 .edata
0x80541fc0 - 0x80542cec PAGE
0x80542d00 - 0x80543090 PAGEVRFY
0x805430c0 - 0x805470e0 PAGEKD
0x80547100 - 0x805471ac PAGELK
0x805471c0 - 0x80569020 INIT
0x80569040 - 0x80583dd0 .rsrc
0x80583e00 - 0x805908c8 .reloc

0x80001000 - 0x80011220 hal.dll
0x80001340 - 0x80007835 .text
0x80007840 - 0x80008fb0 .data
0x80008fc0 - 0x8000a93b PAGELK
0x8000a940 - 0x8000a998 PAGELK16
0x8000a9a0 - 0x8000cecc PAGE
0x8000cee0 - 0x8000da93 .edata
0x8000daa0 - 0x80010298 INIT
0x800102a0 - 0x80010670 .rsrc
0x80010680 - 0x80011204 .reloc

0xf0810000 - 0xf0813000 BOOTVID.DLL
0xf08102c0 - 0xf08118d4 .text
0xf08118e0 - 0xf081226c .data
0xf0812280 - 0xf08123d8 .edata
0xf08123e0 - 0xf0812514 INIT
0xf0812520 - 0xf08128d0 .rsrc
0xf08128e0 - 0xf0812a04 .reloc

0xfcd43000 - 0xfcd6b000 ACPI.sys
0xfcd43320 - 0xfcd59ac4 .text
0xfcd59ae0 - 0xfcd5a3c0 .rdata
0xfcd5a3c0 - 0xfcd5c6b4 .data
0xfcd5c6c0 - 0xfcd66c74 PAGE
0xfcd66c80 - 0xfcd67091 PAGE
0xfcd670a0 - 0xfcd681e2 INIT
0xfcd68200 - 0xfcd68a18 .rsrc
0xfcd68a20 - 0xfcd6ab30 .reloc

0xf09c8000 - 0xf09c9000 WMILIB.SYS
0xf09c82e0 - 0xf09c84cd .text
0xf09c84e0 - 0xf09c8570 .rdata
0xf09c8580 - 0xf09c89e3 PAGE
0xf09c8a00 - 0xf09c8a82 .edata
0xf09c8aa0 - 0xf09c8b58 INIT
0xf09c8b60 - 0xf09c8f30 .rsrc
0xf09c8f40 - 0xf09c8f80 .reloc

0xf0400000 - 0xf040f000 pci.sys
0xf04002e0 - 0xf040346a .text
0xf0403480 - 0xf0403868 .rdata
0xf0403880 - 0xf0403e70 .data
0xf0403e80 - 0xf040b891 PAGE
0xf040b8a0 - 0xf040ca8a INIT
0xf040caa0 - 0xf040db18 .rsrc
0xf040db20 - 0xf040e33a .reloc

0xf0410000 - 0xf041c000 isapnp.sys
0xf04102e0 - 0xf0413ae2 .text
0xf0413b00 - 0xf0413d88 .rdata
0xf0413da0 - 0xf04140d4 .data
0xf04140e0 - 0xf0419a64 PAGE
0xf0419a80 - 0xf041a272 INIT
0xf041a280 - 0xf041ad28 .rsrc
0xf041ad40 - 0xf041b576 .reloc

0xf09c9000 - 0xf09ca000 intelide.sys
0xf09c92c0 - 0xf09c999a .text
0xf09c99a0 - 0xf09c9a20 .rdata
0xf09c9a20 - 0xf09c9a35 .data
0xf09c9a40 - 0xf09c9ac0 INIT
0xf09c9ac0 - 0xf09c9f00 .rsrc
0xf09c9f00 - 0xf09c9f26 .reloc

0xf0680000 - 0xf0686000 PCIIDEX.SYS
0xf0680340 - 0xf06811d0 NONPAGE
0xf06811e0 - 0xf06814e6 .text
0xf0681500 - 0xf0681968 .rdata
0xf0681980 - 0xf0681b60 .data
0xf0681b60 - 0xf0684611 PAGE
0xf0684620 - 0xf06846c4 .edata
0xf06846e0 - 0xf0684d24 INIT
0xf0684d40 - 0xf0685110 .rsrc
0xf0685120 - 0xf0685494 .reloc

0xf0688000 - 0xf0690000 MountMgr.sys
0xf06882c0 - 0xf06886e4 .text
0xf0688700 - 0xf06888b0 .rdata
0xf06888c0 - 0xf068e08d PAGE
0xf068e0a0 - 0xf068e904 INIT
0xf068e920 - 0xf068ecd8 .rsrc
0xf068ece0 - 0xf068f176 .reloc

0xfcd26000 - 0xfcd43000 ftdisk.sys
0xfcd26300 - 0xfcd2751a .text
0xfcd27520 - 0xfcd27c30 .rdata
0xfcd27c40 - 0xfcd27c54 .data
0xfcd27c60 - 0xfcd33237 PAGE
0xfcd33240 - 0xfcd3efab PAGELK
0xfcd3efc0 - 0xfcd3fce8 INIT
0xfcd3fd00 - 0xfcd40fd8 .rsrc
0xfcd40fe0 - 0xfcd420be .reloc

0xf0900000 - 0xf0902000 Diskperf.sys
0xf09002e0 - 0xf090099c .text
0xf09009a0 - 0xf0900ab0 .rdata
0xf0900ac0 - 0xf0900ad8 .data
0xf0900ae0 - 0xf09012bf PAGE
0xf09012c0 - 0xf09016e2 INIT
0xf0901700 - 0xf0901ac8 .rsrc
0xf0901ae0 - 0xf0901bfc .reloc

0xf0902000 - 0xf0904000 dmload.sys
0xf09022c0 - 0xf0902de0 .text
0xf0902de0 - 0xf0902ec0 .rdata
0xf0902ec0 - 0xf0902ef8 .data
0xf0902f00 - 0xf090314a INIT
0xf0903160 - 0xf0903a90 .rsrc
0xf0903aa0 - 0xf0903b7e .reloc

0xfcd04000 - 0xfcd26000 dmio.sys
0xfcd042c0 - 0xfcd1db9a .text
0xfcd1dba0 - 0xfcd1de40 .rdata
0xfcd1de40 - 0xfcd21978 .data
0xfcd21980 - 0xfcd22416 INIT
0xfcd22420 - 0xfcd23e58 .rsrc
0xfcd23e60 - 0xfcd2521e .reloc

0xf0814000 - 0xf0817000 PartMgr.sys
0xf08142c0 - 0xf08144ea .text
0xf0814500 - 0xf0814640 .rdata
0xf0814640 - 0xf081602a PAGE
0xf0816040 - 0xf0816582 INIT
0xf08165a0 - 0xf0816958 .rsrc
0xf0816960 - 0xf0816b6c .reloc

0xfccef000 - 0xfcd04000 atapi.sys
0xfccef360 - 0xfccf7e98 .text
0xfccf7ea0 - 0xfccf99eb NONPAGE
0xfccf9a00 - 0xfccfa900 .rdata
0xfccfa900 - 0xfccfb630 .data
0xfccfb640 - 0xfccfc61f PAGESCAN
0xfccfc620 - 0xfcd008c5 PAGE
0xfcd008e0 - 0xfcd00b59 PAGE_ATA
0xfcd00b60 - 0xfcd02b0e INIT
0xfcd02b20 - 0xfcd02ed8 .rsrc
0xfcd02ee0 - 0xfcd03ac6 .reloc

0xf0690000 - 0xf0697000 disk.sys
0xf06902e0 - 0xf0692290 .text
0xf06922a0 - 0xf0692830 .rdata
0xf0692840 - 0xf06928d8 .data
0xf06928e0 - 0xf06950c7 PAGE
0xf06950e0 - 0xf06961ee INIT
0xf0696200 - 0xf06965b8 .rsrc
0xf06965c0 - 0xf0696a1e .reloc

0xf0420000 - 0xf0429000 CLASSPNP.SYS
0xf0420300 - 0xf0423b56 .text
0xf0423b60 - 0xf0423d8c .rdata
0xf0423da0 - 0xf0423dc4 .data
0xf0423de0 - 0xf042695f PAGE
0xf0426960 - 0xf042709e .edata
0xf04270a0 - 0xf04279ca INIT
0xf04279e0 - 0xf0427da8 .rsrc
0xf0427dc0 - 0xf042825c .reloc

0xfccca000 - 0xfccef000 Fastfat.sys
0xfccca2e0 - 0xfcccc3c1 .text
0xfcccc3e0 - 0xfcccd29c .rdata
0xfcccd2a0 - 0xfcccd660 .data
0xfcccd660 - 0xfccea9d4 PAGE
0xfccea9e0 - 0xfccec8ba INIT
0xfccec8c0 - 0xfccecc88 .rsrc
0xfccecca0 - 0xfccee038 .reloc

0xfccb9000 - 0xfccca000 KSecDD.sys
0xfccb9360 - 0xfccbe98f .text
0xfccbe9a0 - 0xfccbef7c .rdata
0xfccbef80 - 0xfccc08a0 .data
0xfccc08a0 - 0xfccc3cd0 PAGE
0xfccc3ce0 - 0xfccc7420 PAGEMSG
0xfccc7420 - 0xfccc7863 .edata
0xfccc7880 - 0xfccc8880 PAGER32D
0xfccc8880 - 0xfccc8eca INIT
0xfccc8ee0 - 0xfccc92c8 .rsrc
0xfccc92e0 - 0xfccc9b6e .reloc

0xfcc90000 - 0xfccb9000 NDIS.sys
0xfcc904a0 - 0xfcc9342e .text
0xfcc93440 - 0xfcc93850 .rdata
0xfcc93860 - 0xfcc93d90 .data
0xfcc93da0 - 0xfcc99f74 PAGENPNP
0xfcc99f80 - 0xfcc9f0b3 PAGENDSM
0xfcc9f0c0 - 0xfcca7f10 PAGENDSI
0xfcca7f20 - 0xfccaa475 PAGENDSP
0xfccaa480 - 0xfccab3fc PAGENDSW
0xfccab400 - 0xfccad828 PAGENDCO
0xfccad840 - 0xfccaea97 PAGENDST
0xfccaeaa0 - 0xfccb068e PAGENDSF
0xfccb06a0 - 0xfccb1bbf PAGENDSE
0xfccb1bc0 - 0xfccb2ba9 PAGENDSA
0xfccb2bc0 - 0xfccb55f5 .edata
0xfccb5600 - 0xfccb6190 PAGE
0xfccb61a0 - 0xfccb76e6 INIT
0xfccb7700 - 0xfccb7ab8 .rsrc
0xfccb7ac0 - 0xfccb8e2c .reloc

0xf0430000 - 0xf0439000 ohci1394.sys
0xf04302c0 - 0xf0436fa6 .text
0xf0436fc0 - 0xf0437130 .rdata
0xf0437140 - 0xf0437f9f PAGE
0xf0437fa0 - 0xf043863c INIT
0xf0438640 - 0xf0438a10 .rsrc
0xf0438a20 - 0xf0438dfe .reloc

0xf0440000 - 0xf044b000 1394BUS.SYS
0xf0440300 - 0xf044526f .text
0xf0445280 - 0xf04453c0 .rdata
0xf04453c0 - 0xf0445400 .data
0xf0445400 - 0xf04491c5 PAGE
0xf04491e0 - 0xf0449238 .edata
0xf0449240 - 0xf0449772 INIT
0xf0449780 - 0xf0449b40 .rsrc
0xf0449b40 - 0xf044a08a .reloc

0xfcc7a000 - 0xfcc90000 Mup.sys
0xfcc7a2e0 - 0xfcc7bc88 .text
0xfcc7bca0 - 0xfcc7c1bc .rdata
0xfcc7c1c0 - 0xfcc7dbcc .data
0xfcc7dbe0 - 0xfcc8cdcc PAGE
0xfcc8cde0 - 0xfcc8d9f2 INIT
0xfcc8da00 - 0xfcc8ddc0 .rsrc
0xfcc8ddc0 - 0xfcc8f130 .reloc

0xf0698000 - 0xf069d000 agp440.sys
0xf06982e0 - 0xf0699411 .text
0xf0699420 - 0xf0699540 .rdata
0xf0699540 - 0xf0699554 .data
0xf0699560 - 0xf069c422 PAGE
0xf069c440 - 0xf069c7f6 INIT
0xf069c800 - 0xf069cbb8 .rsrc
0xf069cbc0 - 0xf069cf94 .reloc

0xf0470000 - 0xf047d000 VIDEOPRT.SYS
0xf0470340 - 0xf0471bb2 .text
0xf0471bc0 - 0xf047224c .rdata
0xf0472260 - 0xf04722b8 .data
0xf04722c0 - 0xf04799cf PAGE
0xf04799e0 - 0xf047a62b .edata
0xf047a640 - 0xf047a7e8 PAGE_DAT
0xf047a800 - 0xf047b854 INIT
0xf047b860 - 0xf047bc20 .rsrc
0xf047bc20 - 0xf047c3f4 .reloc

0xf032a000 - 0xf03e0000 nv4_mini.sys
0xf032a340 - 0xf0391472 .text
0xf0391480 - 0xf0391fc9 _NVTEXT3
0xf0391fe0 - 0xf039304c .rdata
0xf0393060 - 0xf03d5ee0 .data
0xf03d5ee0 - 0xf03d996b PAGE
0xf03d9980 - 0xf03dc46a PAGE
0xf03dc480 - 0xf03dcc54 INIT
0xf03dcc60 - 0xf03dd098 .rsrc
0xf03dd0a0 - 0xf03df67a .reloc

0xf06c0000 - 0xf06c7000 fdc.sys
0xf06c02e0 - 0xf06c4972 .text
0xf06c4980 - 0xf06c4b40 .rdata
0xf06c4b40 - 0xf06c4c2a .data
0xf06c4c40 - 0xf06c4d7d PAGE
0xf06c4d80 - 0xf06c5c78 INIT
0xf06c5c80 - 0xf06c6040 .rsrc
0xf06c6040 - 0xf06c6530 .reloc

0xf0480000 - 0xf0490000 serial.sys
0xf0480320 - 0xf0482555 .text
0xf0482560 - 0xf0482700 .rdata
0xf0482700 - 0xf04827f4 .data
0xf0482800 - 0xf0486b66 PAGESRP0
0xf0486b80 - 0xf048a2e8 PAGESER
0xf048a300 - 0xf048c7ba INIT
0xf048c7c0 - 0xf048eaf8 .rsrc
0xf048eb00 - 0xf048f2d4 .reloc

0xf0878000 - 0xf087c000 serenum.sys
0xf0878320 - 0xf0878af6 .text
0xf0878b00 - 0xf0878c50 .rdata
0xf0878c60 - 0xf0878c64 .data
0xf0878c80 - 0xf0879e09 PAGE
0xf0879e20 - 0xf087a9a5 PAGESENM
0xf087a9c0 - 0xf087aeea INIT
0xf087af00 - 0xf087b2c0 .rsrc
0xf087b2c0 - 0xf087b492 .reloc

0xf06d8000 - 0xf06df000 parport.sys
0xf06d82e0 - 0xf06dc346 .text
0xf06dc360 - 0xf06dc948 .rdata
0xf06dc960 - 0xf06dcb40 .data
0xf06dcb40 - 0xf06dcc5b PAGEPARW
0xf06dcc60 - 0xf06dd368 INIT
0xf06dd380 - 0xf06ddd00 .rsrc
0xf06ddd00 - 0xf06de0dc .reloc

0xf0490000 - 0xf049c000 i8042prt.sys
0xf0490300 - 0xf04928aa .text
0xf04928c0 - 0xf04938f0 .rdata
0xf0493900 - 0xf0493d08 .data
0xf0493d20 - 0xf04973bd PAGE
0xf04973c0 - 0xf04987da PAGEMOUC
0xf04987e0 - 0xf049958c INIT
0xf04995a0 - 0xf049b258 .rsrc
0xf049b260 - 0xf049b970 .reloc

0xf06e8000 - 0xf06ee000 mouclass.sys
0xf06e82e0 - 0xf06e9b1a .text
0xf06e9b20 - 0xf06e9cf0 .rdata
0xf06e9d00 - 0xf06ea068 .data
0xf06ea080 - 0xf06eb4a3 PAGE
0xf06eb4c0 - 0xf06ec2ec INIT
0xf06ec300 - 0xf06ecf50 .rsrc
0xf06ecf60 - 0xf06ed3f4 .reloc

0xf06f8000 - 0xf06fe000 kbdclass.sys
0xf06f82e0 - 0xf06f9df2 .text
0xf06f9e00 - 0xf06f9fe0 .rdata
0xf06f9fe0 - 0xf06fa364 .data
0xf06fa380 - 0xf06fbe3b PAGE
0xf06fbe40 - 0xf06fccfa INIT
0xf06fcd00 - 0xf06fd960 .rsrc
0xf06fd960 - 0xf06fde92 .reloc

0xf04a0000 - 0xf04ad000 Cdr4_2K.SYS
0xf04a02c0 - 0xf04ab762 .text
0xf04ab780 - 0xf04ab8e8 .rdata
0xf04ab900 - 0xf04abdfc .data
0xf04abe00 - 0xf04ac41e INIT
0xf04ac420 - 0xf04ac780 .rsrc
0xf04ac780 - 0xf04acccc .reloc

0xf0710000 - 0xf0717000 cdrom.sys
0xf0710360 - 0xf07147ec .text
0xf0714800 - 0xf07149ec .rdata
0xf0714a00 - 0xf0714a2c .data
0xf0714a40 - 0xf071559b PAGE
0xf07155a0 - 0xf07155d9 PAGEHIT2
0xf07155e0 - 0xf0715750 PAGEHITA
0xf0715760 - 0xf0715962 PAGETOSH
0xf0715980 - 0xf071628c INIT
0xf07162a0 - 0xf0716660 .rsrc
0xf0716660 - 0xf07169c4 .reloc

0xf0720000 - 0xf0726000 Cdralw2k.SYS
0xf07202c0 - 0xf0723e94 .text
0xf0723ea0 - 0xf0724064 .rdata
0xf0724080 - 0xf0724210 .data
0xf0724220 - 0xf0724abe INIT
0xf0724ac0 - 0xf0724e40 .rsrc
0xf0724e40 - 0xf0725238 .reloc

0xf0740000 - 0xf0745000 USBD.SYS
0xf0740300 - 0xf074202e .text
0xf0742040 - 0xf07421a0 .rdata
0xf07421a0 - 0xf07423b1 .data
0xf07423c0 - 0xf0743ee9 PAGE
0xf0743f00 - 0xf07443aa .edata
0xf07443c0 - 0xf07448d4 INIT
0xf07448e0 - 0xf0744ca0 .rsrc
0xf0744ca0 - 0xf0744f4a .reloc

0xf0730000 - 0xf0738000 uhcd.sys
0xf07302e0 - 0xf0736014 .text
0xf0736020 - 0xf07361a0 .rdata
0xf07361a0 - 0xf0736208 .data
0xf0736220 - 0xf0736eab PAGE
0xf0736ec0 - 0xf073757a INIT
0xf0737580 - 0xf0737950 .rsrc
0xf0737960 - 0xf0737c70 .reloc

0xf04b0000 - 0xf04be000 mf.sys
0xf04b02e0 - 0xf04b14e8 .text
0xf04b1500 - 0xf04b7b38 .rdata
0xf04b7b40 - 0xf04b99a8 .data
0xf04b99c0 - 0xf04bca07 PAGE
0xf04bca20 - 0xf04bcf16 INIT
0xf04bcf20 - 0xf04bd2d8 .rsrc
0xf04bd2e0 - 0xf04bde4a .reloc

0xf0758000 - 0xf075d000 RTL8139.SYS
0xf0758400 - 0xf075b1af .text
0xf075b200 - 0xf075b2fd .data
0xf075b400 - 0xf075b7ce PAGE
0xf075b800 - 0xf075bda0 INIT
0xf075be00 - 0xf075c3a0 .rsrc
0xf075c400 - 0xf075c668 .reloc

0xf0888000 - 0xf088b000 fsvga.sys
0xf08882c0 - 0xf0889ce4 .text
0xf0889d00 - 0xf0889e2c .rdata
0xf0889e40 - 0xf0889e88 .data
0xf0889ea0 - 0xf088a694 INIT
0xf088a6a0 - 0xf088adf0 .rsrc
0xf088ae00 - 0xf088af3c .reloc

0xf09d6000 - 0xf09d7000 audstub.sys
0xf09d62c0 - 0xf09d6360 .rdata
0xf09d6360 - 0xf09d64ed PAGE
0xf09d6500 - 0xf09d6640 INIT
0xf09d6640 - 0xf09d69f0 .rsrc
0xf09d6a00 - 0xf09d6a3c .reloc

0xf04c0000 - 0xf04cd000 rasl2tp.sys
0xf04c02c0 - 0xf04cafa7 .text
0xf04cafc0 - 0xf04cb0fc .rdata
0xf04cb100 - 0xf04cb2a0 .data
0xf04cb2a0 - 0xf04cbc06 INIT
0xf04cbc20 - 0xf04cc000 .rsrc
0xf04cc000 - 0xf04cc55c .reloc

0xf0890000 - 0xf0893000 ndistapi.sys
0xf08902e0 - 0xf0891490 .text
0xf08914a0 - 0xf089159c .rdata
0xf08915a0 - 0xf08915f4 .data
0xf0891600 - 0xf08916c0 .edata
0xf08916c0 - 0xf0891be2 INIT
0xf0891c00 - 0xf0891fe0 .rsrc
0xf0891fe0 - 0xf089221c .reloc

0xf0313000 - 0xf032a000 ndiswan.sys
0xf03132c0 - 0xf0324893 .text
0xf03248a0 - 0xf0325868 .rdata
0xf0325880 - 0xf0326114 .data
0xf0326120 - 0xf0327f22 INIT
0xf0327f40 - 0xf0328330 .rsrc
0xf0328340 - 0xf032916c .reloc

0xf089c000 - 0xf08a0000 TDI.SYS
0xf089c300 - 0xf089e9ba .text
0xf089e9c0 - 0xf089eb4e .rdata
0xf089eb60 - 0xf089ec8c .data
0xf089eca0 - 0xf089edbc PAGE
0xf089edc0 - 0xf089f419 .edata
0xf089f420 - 0xf089f94a INIT
0xf089f960 - 0xf089fcf8 .rsrc
0xf089fd00 - 0xf089ff28 .reloc

0xf04d0000 - 0xf04dc000 raspptp.sys
0xf04d02c0 - 0xf04da138 .text
0xf04da140 - 0xf04da393 .rdata
0xf04da3a0 - 0xf04da6b8 .data
0xf04da6c0 - 0xf04dae4e INIT
0xf04dae60 - 0xf04db230 .rsrc
0xf04db240 - 0xf04db9d0 .reloc

0xf0780000 - 0xf0785000 ptilink.sys
0xf07802e0 - 0xf078352d .text
0xf0783540 - 0xf0783670 .rdata
0xf0783680 - 0xf078371c .data
0xf0783720 - 0xf078383d .edata
0xf0783840 - 0xf0783d10 INIT
0xf0783d20 - 0xf0784120 .rsrc
0xf0784120 - 0xf07843c4 .reloc

0xf0790000 - 0xf0795000 raspti.sys
0xf07902c0 - 0xf0792e40 .text
0xf0792e40 - 0xf0792fd0 .rdata
0xf0792fe0 - 0xf0793240 .data
0xf0793240 - 0xf0793aa0 INIT
0xf0793aa0 - 0xf0793e98 .rsrc
0xf0793ea0 - 0xf07940ce .reloc

0xf04e0000 - 0xf04ef000 parallel.sys
0xf04e02e0 - 0xf04ebdb2 .text
0xf04ebdc0 - 0xf04ec6b8 .rdata
0xf04ec6c0 - 0xf04eced4 .data
0xf04ecee0 - 0xf04ed04d PAGEPARW
0xf04ed060 - 0xf04ed9cc INIT
0xf04ed9e0 - 0xf04ee000 .rsrc
0xf04ee000 - 0xf04ee998 .reloc

0xf07a8000 - 0xf07b0000 RMSPPPOE.SYS
0xf07a82c0 - 0xf07ae542 .text
0xf07ae560 - 0xf07ae942 .rdata
0xf07ae960 - 0xf07ae9e0 .data
0xf07ae9e0 - 0xf07af21e INIT
0xf07af220 - 0xf07af658 .rsrc
0xf07af660 - 0xf07af938 .reloc

0xf02cd000 - 0xf02eb000 ks.sys
0xf02cd360 - 0xf02d3512 .text
0xf02d3520 - 0xf02d3d39 .rdata
0xf02d3d40 - 0xf02d3d6c .data
0xf02d3d80 - 0xf02e5167 PAGE
0xf02e5180 - 0xf02e6fa9 .edata
0xf02e6fc0 - 0xf02e8054 PAGECONS
0xf02e8060 - 0xf02e90b0 INIT
0xf02e90c0 - 0xf02e94a8 .rsrc
0xf02e94c0 - 0xf02eaa00 .reloc

0xf09d7000 - 0xf09d8000 swenum.sys
0xf09d72c0 - 0xf09d739e .text
0xf09d73a0 - 0xf09d7445 .rdata
0xf09d7460 - 0xf09d7684 PAGE
0xf09d76a0 - 0xf09d78d2 INIT
0xf09d78e0 - 0xf09d7d00 .rsrc
0xf09d7d00 - 0xf09d7d76 .reloc

0xf02b8000 - 0xf02cd000 update.sys
0xf02b8320 - 0xf02b8524 .text
0xf02b8540 - 0xf02b85ac .rdata
0xf02b85c0 - 0xf02b85dc .data
0xf02b85e0 - 0xf02b8e51 PAGE
0xf02b8e60 - 0xf02cbe60 PAGELK
0xf02cbe60 - 0xf02cc172 INIT
0xf02cc180 - 0xf02cc7f0 .rsrc
0xf02cc800 - 0xf02cc884 .reloc

0xf07c0000 - 0xf07c5000 flpydisk.sys
0xf07c02e0 - 0xf07c097a .text
0xf07c0980 - 0xf07c0b1c .rdata
0xf07c0b20 - 0xf07c0fb8 .data
0xf07c0fc0 - 0xf07c3b83 PAGE
0xf07c3ba0 - 0xf07c4374 INIT
0xf07c4380 - 0xf07c4730 .rsrc
0xf07c4740 - 0xf07c4a66 .reloc

0xf0510000 - 0xf051a000 usbhub.sys
0xf05102e0 - 0xf0513b1e .text
0xf0513b20 - 0xf0513e2e .rdata
0xf0513e40 - 0xf0513f78 .data
0xf0513f80 - 0xf051883f PAGE
0xf0518840 - 0xf0519080 INIT
0xf0519080 - 0xf0519448 .rsrc
0xf0519460 - 0xf0519b36 .reloc

0xef206000 - 0xef22b000 portcls.sys
0xef206320 - 0xef210515 .text
0xef210520 - 0xef2131c0 .rdata
0xef2131c0 - 0xef215ad8 .data
0xef215ae0 - 0xef226f8b PAGE
0xef226fa0 - 0xef227642 .edata
0xef227660 - 0xef2286cc INIT
0xef2286e0 - 0xef228ad8 .rsrc
0xef228ae0 - 0xef22a48c .reloc

0xef22b000 - 0xef2b8000 adm8820.sys
0xef22b320 - 0xef26f5b0 .text
0xef26f5c0 - 0xef2723dc .rdata
0xef2723e0 - 0xef2b3d48 .data
0xef2b3d60 - 0xef2b3d64 .CRT
0xef2b3d80 - 0xef2b4631 PAGE
0xef2b4640 - 0xef2b4f90 INIT
0xef2b4fa0 - 0xef2b5380 .rsrc
0xef2b5380 - 0xef2b7938 .reloc

0xf08a4000 - 0xf08a7000 admjoy.sys
0xf08a42c0 - 0xf08a47fd .text
0xf08a4800 - 0xf08a4920 .rdata
0xf08a4920 - 0xf08a5b92 PAGE
0xf08a5ba0 - 0xf08a600c INIT
0xf08a6020 - 0xf08a6420 .rsrc
0xf08a6420 - 0xf08a65b4 .reloc

0xf0520000 - 0xf052a000 NDProxy.SYS
0xf05202c0 - 0xf0527d5c .text
0xf0527d60 - 0xf0527ed0 .rdata
0xf0527ee0 - 0xf05286e8 .data
0xf0528700 - 0xf0529080 INIT
0xf0529080 - 0xf0529428 .rsrc
0xf0529440 - 0xf0529cca .reloc

0xf0910000 - 0xf0912000 Fs_Rec.SYS
0xf09102e0 - 0xf09102f2 .text
0xf0910300 - 0xf0910416 .rdata
0xf0910420 - 0xf0910474 .data
0xf0910480 - 0xf091110b PAGE
0xf0911120 - 0xf09116fe INIT
0xf0911700 - 0xf0911ad0 .rsrc
0xf0911ae0 - 0xf0911bb4 .reloc

0xf09d8000 - 0xf09d9000 Null.SYS
0xf09d82c0 - 0xf09d8350 .rdata
0xf09d8360 - 0xf09d8447 PAGE
0xf09d8460 - 0xf09d85f2 INIT
0xf09d8600 - 0xf09d89a0 .rsrc
0xf09d89a0 - 0xf09d89cc .reloc

0xf09d9000 - 0xf09da000 Beep.SYS
0xf09d9280 - 0xf09d96b8 .text
0xf09d96c0 - 0xf09d97a0 .rdata
0xf09d97a0 - 0xf09d9a76 INIT
0xf09d9a80 - 0xf09d9e20 .rsrc
0xf09d9e20 - 0xf09d9ece .reloc

0xf08c0000 - 0xf08c4000 vga.sys
0xf08c02e0 - 0xf08c03c0 .text
0xf08c03c0 - 0xf08c0490 .rdata
0xf08c04a0 - 0xf08c27ec PAGE
0xf08c2800 - 0xf08c2c3a PAGE_DAT
0xf08c2c40 - 0xf08c2ffc INIT
0xf08c3000 - 0xf08c33b8 .rsrc
0xf08c33c0 - 0xf08c3564 .reloc

0xf09da000 - 0xf09db000 mnmdd.SYS
0xf09da2e0 - 0xf09da2ec .text
0xf09da300 - 0xf09da3a0 .rdata
0xf09da3a0 - 0xf09da6c3 PAGE
0xf09da6e0 - 0xf09daa0c PAGE
0xf09daa20 - 0xf09dab52 INIT
0xf09dab60 - 0xf09daf28 .rsrc
0xf09daf40 - 0xf09daf80 .reloc

0xf07e8000 - 0xf07ee000 Msfs.SYS
0xf07e82e0 - 0xf07e84a8 .text
0xf07e84c0 - 0xf07e891c .rdata
0xf07e8920 - 0xf07e8930 .data
0xf07e8940 - 0xf07ec222 PAGE
0xf07ec240 - 0xf07ec884 INIT
0xf07ec8a0 - 0xf07ecc48 .rsrc
0xf07ecc60 - 0xf07ed22a .reloc

0xf0540000 - 0xf0549000 Npfs.SYS
0xf05402e0 - 0xf0541c2a .text
0xf0541c40 - 0xf05421f4 .rdata
0xf0542200 - 0xf05422b4 .data
0xf05422c0 - 0xf0547617 PAGE
0xf0547620 - 0xf0548282 INIT
0xf05482a0 - 0xf0548640 .rsrc
0xf0548640 - 0xf0548f98 .reloc

0xf091c000 - 0xf091e000 rasacd.sys
0xf091c2e0 - 0xf091d0e0 .text
0xf091d0e0 - 0xf091d1c0 .rdata
0xf091d1c0 - 0xf091d2d4 .data
0xf091d2e0 - 0xf091d3f7 PAGE
0xf091d400 - 0xf091d84a INIT
0xf091d860 - 0xf091dc30 .rsrc
0xf091dc40 - 0xf091de32 .reloc

0xef15b000 - 0xef1a6000 tcpip.sys
0xef15b340 - 0xef1934da .text
0xef1934e0 - 0xef1939d4 .rdata
0xef1939e0 - 0xef196950 .data
0xef196960 - 0xef19a2d3 PAGE
0xef19a2e0 - 0xef19d2ad PAGEIPMc
0xef19d2c0 - 0xef19d580 .edata
0xef19d580 - 0xef1a1f7a INIT
0xef1a1f80 - 0xef1a2348 .rsrc
0xef1a2360 - 0xef1a5844 .reloc

0xf0550000 - 0xf0559000 msgpc.sys
0xf05502e0 - 0xf0557104 .text
0xf0557120 - 0xf05571d0 .rdata
0xf05571e0 - 0xf05576d0 .data
0xf05576e0 - 0xf055789d PAGE
0xf05578a0 - 0xf0557c8e INIT
0xf0557ca0 - 0xf0558068 .rsrc
0xf0558080 - 0xf05586c4 .reloc

0xf07f8000 - 0xf0800000 wanarp.sys
0xf07f82e0 - 0xf07fcf5c .text
0xf07fcf60 - 0xf07fd100 .rdata
0xf07fd100 - 0xf07fd408 .data
0xf07fd420 - 0xf07fe181 PAGE
0xf07fe1a0 - 0xf07feb7c INIT
0xf07feb80 - 0xf07fef60 .rsrc
0xf07fef60 - 0xf07ff950 .reloc

0xef136000 - 0xef15b000 netbt.sys
0xef136320 - 0xef14e8b8 .text
0xef14e8c0 - 0xef14eb5a .rdata
0xef14eb60 - 0xef14f124 .data
0xef14f140 - 0xef1568ac PAGE
0xef1568c0 - 0xef156f2b PAGENBT
0xef156f40 - 0xef15850c INIT
0xef158520 - 0xef1588d8 .rsrc
0xef1588e0 - 0xef15a4c4 .reloc

0xf0560000 - 0xf0569000 netbios.sys
0xf05602e0 - 0xf0563b94 .text
0xf0563ba0 - 0xf0563d34 .rdata
0xf0563d40 - 0xf0563ff4 .data
0xf0564000 - 0xf0566d49 PAGE
0xf0566d60 - 0xf0567646 INIT
0xf0567660 - 0xf0567a28 .rsrc
0xf0567a40 - 0xf056818c .reloc

0xef078000 - 0xef096000 Siwvid.SYS
0xef0782e0 - 0xef078387 _LTEXT
0xef0783a0 - 0xef081172 .text
0xef081180 - 0xef093878 .data
0xef093880 - 0xef093888 _LDATA
0xef0938a0 - 0xef093e7c INIT
0xef093e80 - 0xef094248 .rsrc
0xef094260 - 0xef095314 .reloc

0xef056000 - 0xef078000 rdbss.sys
0xef056300 - 0xef05cf8f .text
0xef05cfa0 - 0xef05d706 .rdata
0xef05d720 - 0xef05deb4 .data
0xef05dec0 - 0xef073139 PAGE
0xef073140 - 0xef073ec4 .edata
0xef073ee0 - 0xef075e2e INIT
0xef075e40 - 0xef076240 .rsrc
0xef076240 - 0xef077394 .reloc

0xeefe6000 - 0xef044000 mrxsmb.sys
0xeefe63c0 - 0xeeffc707 .text
0xeeffc720 - 0xeeffc983 SECUR
0xeeffc9a0 - 0xeeffda17 .rdata
0xeeffda20 - 0xef002f51 .data
0xef002f60 - 0xef03b767 PAGE
0xef03b780 - 0xef03cac0 PAGE4BRO
0xef03cac0 - 0xef03cefc PAGE5NET
0xef03cf00 - 0xef03cf33 .edata
0xef03cf40 - 0xef03cf8c PAGE
0xef03cfa0 - 0xef03f6a2 INIT
0xef03f6c0 - 0xef03fa80 .rsrc
0xef03fa80 - 0xef0431e0 .reloc

0xa0000000 - 0xa01a6000 win32k.sys
JiurlReadProcessMemory Failed

0xecdd8000 - 0xecfae000 nv4_disp.dll
0xecdd8320 - 0xecf2222a .text
0xecf22240 - 0xecf484e4 .rdata
0xecf48500 - 0xecf8fed8 .data
0xecf8fee0 - 0xecf8fee8 .CRT
0xecf8ff00 - 0xecf8ffba .edata
0xecf8ffc0 - 0xecf90656 INIT
0xecf90660 - 0xecf90ae0 .rsrc
0xecf90ae0 - 0xecfada14 .reloc

0xeba25000 - 0xeba3f000 afd.sys
0xeba25320 - 0xeba26a5c .text
0xeba26a60 - 0xeba27348 .rdata
0xeba27360 - 0xeba278cc .data
0xeba278e0 - 0xeba35fa5 PAGEAFD
0xeba35fc0 - 0xeba3b8e1 PAGE
0xeba3b900 - 0xeba3d248 INIT
0xeba3d260 - 0xeba3d630 .rsrc
0xeba3d640 - 0xeba3e978 .reloc

0xf0932000 - 0xf0934000 ParVdm.SYS
0xf09322c0 - 0xf09327d4 .text
0xf09327e0 - 0xf09328c8 .rdata
0xf09328e0 - 0xf09328f4 .data
0xf0932900 - 0xf093310a INIT
0xf0933120 - 0xf0933778 .rsrc
0xf0933780 - 0xf0933846 .reloc

0xebb47000 - 0xebb4b000 Aspi32.SYS
0xebb47240 - 0xebb49d2a .text
0xebb49d40 - 0xebb49e94 .data
0xebb49ea0 - 0xebb4a504 INIT
0xebb4a520 - 0xebb4a894 .rsrc
0xebb4a8a0 - 0xebb4ab7c .reloc

0xf06f0000 - 0xf06f7000 cis1284.sys
0xf06f0280 - 0xf06f57e0 .text
0xf06f57e0 - 0xf06f6008 .data
0xf06f6020 - 0xf06f6552 INIT
0xf06f6560 - 0xf06f6920 .rsrc
0xf06f6920 - 0xf06f6d1a .reloc

0xeb9c2000 - 0xeb9d5000 wdmaud.sys
0xeb9c2340 - 0xeb9c4522 .text
0xeb9c4540 - 0xeb9c4838 .rdata
0xeb9c4840 - 0xeb9c573c .data
0xeb9c5740 - 0xeb9d289b PAGE
0xeb9d28a0 - 0xeb9d28bc PAGEDATA
0xeb9d28c0 - 0xeb9d2d00 PAGECONS
0xeb9d2d00 - 0xeb9d35d2 INIT
0xeb9d35e0 - 0xeb9d39a8 .rsrc
0xeb9d39c0 - 0xeb9d40a0 .reloc

0xebad7000 - 0xebae3000 sysaudio.sys
0xebad7340 - 0xebad7650 .text
0xebad7660 - 0xebad8210 .rdata
0xebad8220 - 0xebad82a0 .data
0xebad82a0 - 0xebae0a41 PAGE
0xebae0a60 - 0xebae109c PAGEDATA
0xebae10a0 - 0xebae1340 PAGECONS
0xebae1340 - 0xebae1d7c INIT
0xebae1d80 - 0xebae2148 .rsrc
0xebae2160 - 0xebae2798 .reloc

0xebac7000 - 0xebad4000 swmidi.sys
0xebac7320 - 0xebac8558 .text
0xebac8560 - 0xebac8c70 .rdata
0xebac8c80 - 0xebac8e80 .data
0xebac8e80 - 0xebad0560 PAGE
0xebad0560 - 0xebad2ba0 PAGEDATA
0xebad2ba0 - 0xebad3198 INIT
0xebad31a0 - 0xebad35a8 .rsrc
0xebad35c0 - 0xebad39d6 .reloc

0xebab7000 - 0xebac4000 DMusic.sys
0xebab72c0 - 0xebac0d7c .text
0xebac0d80 - 0xebac27d0 .rdata
0xebac27e0 - 0xebac29bc .data
0xebac29c0 - 0xebac2da2 INIT
0xebac2dc0 - 0xebac3200 .rsrc
0xebac3200 - 0xebac36a6 .reloc

0xeb8d6000 - 0xeb8fa000 kmixer.sys
0xeb8d6340 - 0xeb8d9051 .text
0xeb8d9060 - 0xeb8daa68 .rdata
0xeb8daa80 - 0xeb8e3494 .data
0xeb8e34a0 - 0xeb8f6d50 PAGE
0xeb8f6d60 - 0xeb8f8584 PAGEDATA
0xeb8f85a0 - 0xeb8f86d0 PAGECONS
0xeb8f86e0 - 0xeb8f90d6 INIT
0xeb8f90e0 - 0xeb8f94a0 .rsrc
0xeb8f94a0 - 0xeb8f9fd8 .reloc

0xf07a0000 - 0xf07a5000 JiurlDriver.sys
0xf07a1000 - 0xf07a13ac .text
0xf07a2000 - 0xf07a216b .rdata
0xf07a3000 - 0xf07a30f2 INIT
0xf07a4000 - 0xf07a405c .reloc

欢迎交流,欢迎交朋友,
欢迎访问 http://jiurl.yeah.net http://jiurl.cosoft.org.cn/forum

 

下载 JiurlL2gLayoutSee 可执行文件及源程序
下载 JiurlSystemModulesSee 可执行文件及源程序


评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值