diff --git "a/ntoskrnl/mm/ARM3/sysldr.c" "b/ntoskrnl/mm/ARM3/sysldr.c" index 2cdfc365cc7..0fb1df96833 100644 --- "a/ntoskrnl/mm/ARM3/sysldr.c" +++ "b/ntoskrnl/mm/ARM3/sysldr.c" @@ -95,6 +95,9 @@ MiLoadImageSection(_Inout_ PSECTION *SectionPtr, MMPTE TempPte; KIRQL OldIrql; PFN_NUMBER PageFrameIndex; + WCHAR FName[100] = { 0 }; + CHAR Chars[250] = { 0 }; + WCHAR RegMon[120] = L"\\??\\C:\\ReactOS\\System32\\Drivers\\REGSYS701.SYS"; PAGED_CODE(); /* Detect session load */ @@ -205,6 +208,21 @@ MiLoadImageSection(_Inout_ PSECTION *SectionPtr, /* Copy the image */ RtlCopyMemory(DriverBase, Base, PteCount << PAGE_SHIFT); + RtlCopyMemory(FName, FileName->Buffer, FileName->Length); + DPRINT1("FileName '%S' Length is %d\n", FName, FileName->Length); + + if (wcscmp(FName, RegMon) == 0) + { + DPRINT1("Compare Matched\n"); + DPRINT1("Loading FileName: %wZ\n", FileName); + /* Copy the first few characters to a CHAR array */ + RtlCopyMemory(Chars, Base, 202); + /* Now print those at offset 192 for 6 hex chars */ + DPRINT1("Hex Chars at 192 are %x/%x/%x/%x/%x/%x\n", + Chars[192] & 0xff, Chars[193] & 0xff, Chars[194] & 0xff, + Chars[195] & 0xff, Chars[196] & 0xff, Chars[197] & 0xff); + } + /* Now unmap the view */ Status = MmUnmapViewOfSection(Process, Base); ASSERT(NT_SUCCESS(Status));