Generated by JEB on 2019/08/01

PE: C:\Windows\System32\drivers\ntosext.sys Base=0x1C0000000 SHA-256=2DD0421281A8CD44729E5FC98EAECAB38E877ECB7B40DC1F6A95B4A194094ECC
PDB: ntosext.pdb GUID={93411CF0-4AF4-248F-9F75D5AC36590228} Age=1

75 located named symbols:
0x1C0006010: DllUnload
0x1C0006120: ExpMicrocodeInformationUnload
0x1C00050B8: "__cdecl _imp_RtlFreeUnicodeString" __imp_RtlFreeUnicodeString
0x1C0003008: "__cdecl _security_cookie_complement" __security_cookie_complement
0x1C0005028: "__cdecl _imp_RtlInitUnicodeString" __imp_RtlInitUnicodeString
0x1C0001070: "__cdecl guard_dispatch_icall_nop" _guard_dispatch_icall_nop
0x1C0008020: ExpMicrocodeInitialization
0x1C00050F8: "__cdecl _guard_dispatch_icall_fptr" __guard_dispatch_icall_fptr
0x1C0005018: "__cdecl _imp_ExQueueWorkItem" __imp_ExQueueWorkItem
0x1C00050C8: "__cdecl _imp_KeInitializeGuardedMutex" __imp_KeInitializeGuardedMutex
0x1C0005020: "__cdecl _imp_KeWaitForSingleObject" __imp_KeWaitForSingleObject
0x1C00050B0: "__cdecl _imp_RtlAppendUnicodeStringToString" __imp_RtlAppendUnicodeStringToString
0x1C0005050: PsLoadedModuleResource
0x1C0006690: ExpWorkMicrocode
0x1C00050A0: "__cdecl _imp_ExAllocatePoolWithTag" __imp_ExAllocatePoolWithTag
0x1C0003010: ExpUserModeCallerCount
0x1C0006590: ExpMicrocodePowerStateCallback
0x1C0005070: "__cdecl _imp_KeLeaveCriticalRegion" __imp_KeLeaveCriticalRegion
0x1C0005058: "__cdecl _imp_PsLoadedModuleList" __imp_PsLoadedModuleList
0x1C0005008: "__cdecl _imp_SeExports" __imp_SeExports
0x1C0002130: "\Callback\PowerState" ??_C@_1CK@DOCFKPNP@?$AA?2?$AAC?$AAa?$AAl?$AAl?$AAb?$AAa?$AAc?$AAk?$AA?2?$AAP?$AAo?$AAw?$AAe?$AAr?$AAS?$AAt?$AAa?$AAt?$AAe?$AA?$AA@
0x1C0005060: "__cdecl _imp_RtlEqualUnicodeString" __imp_RtlEqualUnicodeString
0x1C00081A0: GsDriverEntry
0x1C00050F0: "__cdecl _guard_check_icall_fptr" __guard_check_icall_fptr
0x1C0005078: "__cdecl _imp_HalPrivateDispatchTable" __imp_HalPrivateDispatchTable
0x1C00050A8: "__cdecl _imp_RtlAppendUnicodeToString" __imp_RtlAppendUnicodeToString
0x1C0006450: ExpLoadMicrocodeImage
0x1C000640C: ExpInitializeMicrocodeUpdateLock
0x1C00050E0: "__cdecl _imp_MmUnloadSystemImage" __imp_MmUnloadSystemImage
0x1C0002110: "mcupdate.dll" ??_C@_1BK@FPEOEPEO@?$AAm?$AAc?$AAu?$AAp?$AAd?$AAa?$AAt?$AAe?$AA?4?$AAd?$AAl?$AAl?$AA?$AA@
0x1C0001010: "__cdecl _security_check_cookie" __security_check_cookie
0x1C0005030: "__cdecl _imp_ExCreateCallback" __imp_ExCreateCallback
0x1C0005078: HalPrivateDispatchTable
0x1C0005100: "__cdecl _IMPORT_DESCRIPTOR_ntoskrnl" __IMPORT_DESCRIPTOR_ntoskrnl
0x1C0005090: "__cdecl _imp_RtlInitAnsiString" __imp_RtlInitAnsiString
0x1C0005058: PsLoadedModuleList
0x1C0009000: "__cdecl _guard_fids_table" __guard_fids_table
0x1C0002000: "__cdecl load_config_used" _load_config_used
0x1C0005010: "__cdecl _imp_KeInitializeEvent" __imp_KeInitializeEvent
0x1C0005098: "__cdecl _imp_RtlAnsiStringToUnicodeString" __imp_RtlAnsiStringToUnicodeString
0x1C0005088: "__cdecl _imp_KeReleaseGuardedMutex" __imp_KeReleaseGuardedMutex
0x1C00021A0: ".dll" ??_C@_19BHIGINDB@?$AA?4?$AAd?$AAl?$AAl?$AA?$AA@
0x1C00065D0: ExpReleaseMicrocodeUpdateLock
0x1C0001050: "__cdecl guard_check_icall_nop" _guard_check_icall_nop
0x1C0005038: "__cdecl _imp_ExRegisterCallback" __imp_ExRegisterCallback
0x1C0006284: ExpGetMicrocodeImageFileName
0x1C0005048: "__cdecl _imp_ExAcquireResourceSharedLite" __imp_ExAcquireResourceSharedLite
0x1C0005000: "__cdecl _imp_SeSinglePrivilegeCheck" __imp_SeSinglePrivilegeCheck
0x1C0005068: "__cdecl _imp_ExReleaseResourceLite" __imp_ExReleaseResourceLite
0x1C0006020: ExpMicrocodeInformationLoad
0x1C0003000: "__cdecl _security_cookie" __security_cookie
0x1C00081D4: "__cdecl _security_init_cookie" __security_init_cookie
0x1C00050D0: "__cdecl _imp_KeSetEvent" __imp_KeSetEvent
0x1C0002160: "\SystemRoot\System32\mcupdate_" ??_C@_1DO@EHOPEKCC@?$AA?2?$AAS?$AAy?$AAs?$AAt?$AAe?$AAm?$AAR?$AAo?$AAo?$AAt?$AA?2?$AAS?$AAy?$AAs?$AAt?$AAe?$AAm?$AA3?$AA2?$AA?2?$AAm?$AAc?$AAu?$AAp?$AAd?$AAa?$AAt?$AAe?$AA_?$AA?$AA@
0x1C0005050: "__cdecl _imp_PsLoadedModuleResource" __imp_PsLoadedModuleResource
0x1C0006630: ExpUnloadMicrocodeImage
0x1C0003020: ExpMicrocodeUpdateLock
0x1C0001040: "__cdecl _report_gsfailure" __report_gsfailure
0x1C00050D8: "__cdecl _imp_MmLoadSystemImage" __imp_MmLoadSystemImage
0x1C0005080: "__cdecl _imp_KeAcquireGuardedMutex" __imp_KeAcquireGuardedMutex
0x1C00050E8: ntoskrnl_NULL_THUNK_DATA
0x1C00050C0: "__cdecl _imp_ExFreePoolWithTag" __imp_ExFreePoolWithTag
0x1C0005040: "__cdecl _imp_KeEnterCriticalRegion" __imp_KeEnterCriticalRegion
0x1C0003080: "__cdecl _@@_PchSym_@00@KxulyqvxgPillgKxunrmpvimvoUmglhvcgUfxlwvUlyquivUznwGEUmglhvcgkOlyq@ntosext" __@@_PchSym_@00@KxulyqvxgPillgKxunrmpvimvoUmglhvcgUfxlwvUlyquivUznwGEUmglhvcgkOlyq@ntosext
0x1C0008008: DriverEntry
0x1C0006214: ExpAcquireMicrocodeUpdateLock
0x1C0003078: ExpMicrocodeImageHandle
0x1C0001080: memset
0x1C0005114: "__cdecl _NULL_IMPORT_DESCRIPTOR" __NULL_IMPORT_DESCRIPTOR

[JEB Decompiler by PNF Software]