NCH Debut Video Capture 5.65 patch Archives

NCH Debut Video Capture 5.65 patch Archives

A special fencing disp lay was mounted in the Gym, and Dr. Mallion made a video of proceedings for the school's video archive. that his voice is a phonograph record? This happens to be the stl'ict truth, thollah the Fred AJ1en referred to is not the <0 smooth radio comedian but a. It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An attacker could use a path traversal attack to map URLs to files.

You can watch a thematic video

Debut NCH Multiple video capture software ,User,Rating:,This,gives,me,the,oey,re,install,the,Lister,Download,Ilo,4,Trial,Key,serial,keygen,nocd,crack,activation,license.,gpsgate,server,license,crack,created,-,Imgurgnu.su/news.php?extend.1256,results,Related,software,with,serial,key,crack:,ilo,4,license,key;,GpsGate,-,GpsGate,Server,licenses,KEYGENS.CO,-,GpsGate,v1.03b,for,Windows,keygen.,Проливая,свет,на,HP,ProLiant,iLO,Management,Engine,/,Блог,mood-events.com/blogg/2015/01/16/keygen-ilo-hp/24,май,2012,HP,iLO,Management,Engine,представляет,собой,полный,набор,С,выходом,iLO,4,появилась,возможность,управления,сервером,с .,HP,iLO,60,day,Trial,Key,-,Cochenowww.cocheno.com/2015/07/hp-ilo-60-day-trial-key/Jul,28,2015,My,Trial,key,for,Advanced,features,(like,Virtual,Media),seems,working,multiples,times,on,different,servers,thanks,HP!,License,Key,for,a,60,day .,HP,iLO,Advanced

blogbuffalo — ScourgeBringer Supporter Pack For Mac

ScourgeBringer Supporter Pack For Mac

image


The Living Walls update now releases for ScourgeBringer roguelite game on Linux, Mac and Windows PC. Thanks to developer Flying Oak Games and E-Studio. Available now on Steam Early Access. Holding some Very Positive reviews. ScourgeBringer and Living Walls update come thanks to French developer Flying Oak Games. Including composer Joonas Turner. Supporter Pack This Pack contains exclusive bonuses to go deeper into the game’s lore and get insights from its development. This pack contains a 12-page full-color prequel comic, prototypes and alpha versions, as well as a load of high resolution artworks and wallpapers, NCH Debut Video Capture 5.65 patch Archives. When you install Microsoft Windows on your Mac, Boot Camp Assistant automatically opens the Boot Camp installer, NCH Debut Video Capture 5.65 patch Archives, which installs the latest Windows support software (drivers). If that doesn’t happen, or you experience any of the following issues while using Windows on your Mac, follow the steps in this article. Additionally, we’re announcing bonus content which will also be available on October 21st, NCH Debut Video Capture 5.65 patch Archives. We will introduce a Supporter Bundle, which will contain the following: - The game itself; - The Supporter Pack, which contains an exclusive 12-page prequel comic, 20 early prototypes, and a dozen of artwork; - The Original Soundtrack from Joonas Turner. Use a Mac or an iOS device, and you can do incredible things. Use them together, and you can do so much more. Because now with OS X Yosemite and iOS 8, all your devices work together even more harmoniously. They recognize when they’re near each other, enabling brilliant new features that feel magical and yet make perfect sense.

  1. Scourgebringer Supporter Pack For Macbook
  2. Scourgebringer Supporter Pack For Macbook Pro
  3. Scourgebringer Supporter Pack For Macbook Air
  4. Scourgebringer Supporter Pack For Mac Os
ScourgeBringer Supporter Pack For Mac

Boot Camp requires a Mac with an Intel processor.

Pack
Scourgebringer supporter pack for macbook

When you install Microsoft Windows on your Mac, NCH Debut Video Capture 5.65 patch Archives, Boot Camp Assistant automatically opens the Boot Camp installer, which installs the latest Windows support software (drivers). If that doesn’t happen, or you experience any of the following issues while using Windows on your Mac, follow the steps in this article.

  • Your Apple mouse, trackpad, or keyboard isn’t working in Windows.
    Force Touch isn’t designed to work in Windows.
  • You don’t hear audio from the built-in speakers of your Mac in Windows.
  • The built-in microphone or camera of your Mac isn’t recognized in Windows.
  • One or more screen resolutions are unavailable for your display in Windows.
  • You can’t adjust the brightness of your built-in display in Windows.
  • You have issues with Bluetooth or Wi-Fi in Windows.
  • You get an alert that Apple Software Update has stopped working.
  • You get a message that your PC has a driver or service that isn’t ready for this version of Windows.
  • Your Mac starts up to a black or blue screen after you install Windows.

If your Mac has an AMD video card and is having graphics issues in Windows, you might need to update your AMD graphics drivers instead.

Install the latest macOS updates

Before proceeding, install the latest macOS updates, which can include updates to Boot Camp.

Format a USB flash drive

To install the latest Windows support software, you need a 16GB or larger USB flash drive formatted as MS-DOS (FAT).

  1. Start your Mac from macOS.
  2. Plug the USB flash drive into your Mac.
  3. Open Disk Utility, which is in the Utilities folder of your Applications folder.
  4. Choose View > Show All Devices from the menu bar.
  5. From the sidebar in Disk Utility, select your USB flash drive. (Select the drive name, not the volume name beneath it.)
  6. Click the Erase button or tab.
  7. Choose MS-DOS (FAT) as the format and Master Boot Record as the scheme.
  8. Click Erase to format the drive. When done, quit Disk Utility.

Download the Windows support software

After preparing your USB flash drive, complete these steps:

Scourgebringer Supporter Pack For Macbook

  1. Make sure that your Mac is connected to the Internet.
  2. Open Boot Camp Assistant, which is in the Utilities folder of your Applications folder.
  3. From the menu bar at the top of your screen, choose Action > Download Windows Support Software, then choose your USB flash drive as the save destination. When the download completes, quit Boot Camp Assistant.

Scourgebringer Supporter Pack For Macbook Pro

Scourgebringer supporter pack for macbook

Learn what to do if you can’t download or save the Windows support software.

Install the Windows support software

Scourgebringer

Scourgebringer Supporter Pack For Macbook Air

After downloading the Windows support software to your flash drive, follow these steps to install the software. (If you’re attempting to resolve issues with a Bluetooth mouse or keyboard, it might be easier to use a USB mouse or keyboard until these steps are complete.)

  1. Make sure that the USB flash drive is plugged into your Mac.
  2. Start up your Mac in Windows.
  3. From File Explorer, open the USB flash drive, NCH Debut Video Capture 5.65 patch Archives, then open Setup or setup.exe, which is in the WindowsSupport folder or BootCamp folder. When you’re asked to allow Boot Camp to make changes to your device, click Yes.
  4. Click Repair to begin installation. If you get an alert that the software hasn’t passed Windows Logo testing, click Continue Anyway.
  5. After installation completes, click Finish, then click Yes when you’re asked to restart your Mac.

Learn more

If you can’t download or save the Windows support software:

  • If the NCH Debut Video Capture 5.65 patch Archives says that the Windows support software could not be saved to the selected drive, or that the USB flash drive can’t be used, make sure that your USB flash drive has a storage capacity of at least 16GB and is formatted correctly.
  • If the assistant doesn’t see your USB flash drive, click Go Back and make sure that the drive is connected directly to the USB port on your Mac—not to a display, hub, or keyboard. Disconnect and reconnect the drive, then click Continue.
  • If the assistant says that it can’t download the software because of a network problem, make sure that your Mac is connected to the Internet.
  • Make sure that your Mac meets the system requirements to install Windows using Boot Camp.

If a Mac feature still doesn’t work after updating the Windows support software, search for your symptom on the Apple support website or Microsoft support website. Some features of your Mac aren’t designed to work in Windows.

Developer Flying Oak Games and publisher Dear Villagers (Recompile) today release the hit rogue-lite platformer ScourgeBringer on Nintendo Switch, Xbox One, Game Pass for Console and PC, Epic, and GOG, and are launching the game out of Steam Early Access (PC, Mac, Linux) with a major launch content update.

To celebrate the launch the team also released a new animated release trailer.

Scourgebringer Supporter Pack For Mac Os

Launch Update for Steam Early Access Version

ScourgeBringer hit the Steam Top 20 bestseller charts when it entered Early Access back in February and has received a host of major updates over the past eight months, all of which are present in the launch version of the game across all platforms. On Oct. 21 the game gets a major 1.0 launch update NCH Debut Video Capture 5.65 patch Archives the new realm “The Beyond,” a new post-game mode called “Chaos Roots,” secret rooms, revamped systems, an updated story, blessings, minis bosses and more. You can find the full launch update details here.

About ScourgeBringer

ScourgeBringer aims to channel the mystery and rawness of an early rogue-platformer, with fluid control, aerial combat, pixel graphics and a punchy soundtrack. The story follows hero Kyhra, who is NCH Debut Video Capture 5.65 patch Archives away to uncover the secrets of an Eldritch monolith which is threatening to destroy her world. Armed with her trusty combat drone, she must shoot and slash her way through the infinite depths of an ever-changing dungeon, wherein gigantic bosses, ancient machines, strange ghosts and untold secrets from previous explorers await. There is no backtracking, as the game’s structure follows a procedural combination of pre-built challenge rooms, not unlike the Binding of Isaac.

Features:

  • Dive into fast-paced rogue-platforming gameplay described by Eurogamer as “Dead Cells meets Celeste”
  • Slash and shoot your way smoothly with superfluid platforming controls
  • Sharpen your skills with a frantic combat system focused on attacks only
  • Dash forward to the otherworldly adaptive sounds of Joonas Turner (Nuclear Throne, Downwell, Broforce…)
  • Defy hordes of unspeakable enemies and giant bosses holding the secrets of the Scourge
  • Explore the infinite depths of an ever-changing dungeon
  • Uncover mysteries and find mementoes of previous explorers to unlock reality defining secrets

ScourgeBringer is fully localized into English, French, German, Italian, Spanish, Portuguese, Russian, Polish, Japanese, Korean and Chinese (simplified).

Launch Discount & Supporter Pack Edition

There will be a 15 percent launch discount in the first week and ScougeBringer will also be available in the Supporter Pack on Steam, Epic Games Store and GOG, including digital extras like a 12-page digital comic prequel, early prototypes artwork, 4K wallpapers and an optional 28-track OST by acclaimed composer Joonas Turner.



image

More you might like

Hp Ilo4 Trial License Key

image

Ilo 4 License Key Crack

Ilo4 License Activation Key with serial number. Download Ilo4 License Activation Key with activation code keygen or crack from link. Activacion ilo serial, NCH Debut Video Capture 5.65 patch Archives. I’m having trouble to look for HP website on where I could activate and get the iLO license to be used for a newly setup server. Jan 18, 2018 - This utility requires the HPE ProLiant iLO 3 or 4.

  • Adapter - NIC (HTTP(S) IPv6)) 13. My Trial key for Advanced features (like Virtual Media) seems working multiples times on different servers, thanks HP! License Key for a 60 day Trial. Jul 13, 2016 If you need to reapply or upgrade the license, follow these steps. May 21, 2017 Results of ilo 4 license activation key: Free.
  • The HPE iLO trial license allows users to try HPE iLO Advanced features for a period of 60 days. HPE iLO Advanced enhances HPE iLO capabilities that enable users configure, monitor and update HPE servers seamlessly from anywhere. With the convenience NCH Debut Video Capture 5.65 patch Archives full remote capability via your browser or mobile device, HPE iLO Advanced enables your server do more for your business.
  • Ilo advanced keygen, vsan advanced keygen, hpe ilo advanced keygen, ilo4 advanced keygen, filemaker pro advanced keygen, power pdf advanced keygen, ozone 8 advanced keygen, hp ilo advanced keygen, advanced system repair pro keygen, advanced system optimizer keygen, keygen advanced system repair pro, keygen advanced systemcare 12 pro, keygen.
  • Hp Ilo 4 Advanced License Keygen supports many. Hp ilo 4 advanced license keygen for Mac analyzes the music in your iTunes library to create recommendations for new music you might enjoy. My Trial key for Advanced features (like Virtual Media) seems working multiples times on different servers, thanks HP! License Key for a 60 day Trial.

Ilo 4 License Key Crack > http://urlin.us/2pha5


hp,ilo,licence,free,-,Findeen.comtopdownloadofsoftwarehere.com/business/ilo-4-license-keygen.htmlHP,iLO,Advanced,license,can,be,used,with,all,versions,of,iLO.,To,learn,more,about,the,specific,HPE,Integrated,Lights,Out,(iLO),License,Key,Installation.,Ilo4,Activation,Key,-,Pupper,Softwareilo3keygen697.pen.io/*This,version,of,Ilo4,Activation,Key,must,be,used,for,guidance,only,after,which,the,program,should,be,deleted,from,your,PC,and,buy,a,genuine,version,on .,HP,ILO,4,ADVANCED,LICENSE,KEYGEN,-,Freeware,4,Mobilewww.safeandfreefiles.com/free-hp-ilo-management-interface-driver-1-4-4-0-keygen-download/starry,night,pro,plus,6,keygen,·,windows,vista,business,product,key,keygen,keygen,·,trend,micro,titanium,2012,crack,keygen,·,licencia,de,teamviewer,7,keygen,Hp,Ilo,4,Advanced,License,Keygen,supports,many,file,types,-,we,were,able,to .,Activate,iLo,Advanced,licensing,-,YouTubesysadmins.ru/post10759468.htmlFeb,10,2015.,Bought,a,used,hp,dl160g6,and,wondering,if,there’s,a,way,to,get,the,https://www.reddit.com//bought_a_used_hp_dl160g6_and_wondering_if_theres/Sep,28,2014,iLO,(actually,its,a,LO100),advanced,license,for,free,(self.homelab),all,4,comments,License,Key:,35DPH-SVSXJ-HGBJN-C7N5R-2SS4W.,ilo,3,keygenmeyli.fr/ilo-f434a-license-activation-key-crack-39419Ilo,2,Keygen,-,Serial,Key,Finder,Title:,Ilo,2,Hp,Ilo,3,Serial,-,Free,Serial,Key,Download,Title:,Hp,Ilo,3,Crack,Hp,Ilo,4,License,Keygen,-,Torrent,download,list.,HP,ILO,4,LICENSE,KEY,GENERATORwarezlovers.me/internet/hp-ilo-4-license-key-generator.htmlhp,ilo,4,license,key,generator,intervideo,windvr,3.0,crack,free,download,All,Media,To,Mp3,Converter,Pro,7.7,Keygen.,Gen8,MicroServer,iLO4,&,Remote,Monitoring,&,License,-,MS,Gen,8,homeservershow.com/forums/index.php?/topic/ilo4license/Does,anyone,know,the,best,price,for,the,iLO4,advanced/essentials,HP,iLO,Essentials:,The,Key,to,Unlocking,Remote,Management,for,your .,How,to,get,the,license,key,for,iLO,activation?,-,Hewlett,Packard,community.hpe.com/t5/license-keyiLO-activation//1067178Mar,16,2009,Hewlett,Packard,Enterprise,(HPE),Community,offers,worldwide,IT,technology,and,enterprise,forum,support,and,solutions.,qbandbeyond.com,»,Blog,Archive,»,lights,out,100i,license,keygengetmaterialsplease.us/page.php?id=ilo-4-advanced-license-keygenJan,16,2015,key,crack,teamviewer,9,·,igi,2,game,crack,download,».,lights,out,100i,license,keygen.,ILO,2,Remote,Console,and,Remote,Serial,Console,access.,HP,Lights-Out,100i,Advanced,Pack,provides,license,key,activated,upgrades,to,the,4,Software,with,CEP,10,VSE,CEP,100,VSE,CEP,1000,VSE,and,CEP.,-page-6/hp,ilo,4,license,keymoomasoft.com/hp-ilo-2-license-keygen.htmlIlo,4,advanced,license,key,crack,The,Federal,Communications,Commission,voted,for,quite,a,few,years,now,and,this,is,the,move,(or,BIOS,flash),could,protected .,free,hp,ilo,advanced,license,key,Questions,&,Answers,-,Fixyahttps://www.cdw.com/shop/products/HPLicense/1644616.aspxFind,solutions,to,your,free,hp,ilo,advanced,license,key,question.,Get,free,for,Advanced,System,Protector,License,Key,and,Crack.,ILO,4,Advanced,License.,HP,iLO,Trial,Key,-,-,Blackforcehttps://www.blackforce.co.uk/2012/07/20/hp-ilo-trial-keyJul,20,2012,HP,iLO,Trial,Key.,License,Key,for,a,30,day,Trial.,iLO4,On,iLO2,2.20,the,key,gives,you,a,60day,Trial,:D.,Lafufy,•,4,months,ago.,THANK,YOU!,i .,HP,Integrated,Lights-Out,Advanced,License,1,Server,-,512485-B21,imgur.com/qM6n7YsWith,an,iLO,Advanced,license,key,you,can,activate,powerful,remote,support,-,for,HPE,Integrated,Lights-Out,(iLO),Advanced,Pack,-,phone,consulting,-,4,years .,HP,iLO3,-,iLO2,-,iLO,-,LO100i,-,Компьютерный,форум,Ru.Boardqbandbeyond.com/journal/2015/01//lights-out-100i-license-keygen/Тема,для,обсуждения,работы,HP,iLO2,-,iLO,-,iLO100.,Варезник,(?),Кто-нибудь,пользовался,HP-шными,тулзами,для,iLO?,Залез,на .,Ilo4,License,Activation,Key,-,Advanced,Software,Collectionfreeware4mobile.com/hp-ilo-4-advanced-license-keygen.htmlIlo4,License,Activation,Key,with,serial,number,key,activation,crack.,Hp,Ilo,Licence,Key,Generator,-,Dmist,Softwarehttps://docs.google.com/document/d/1ftXl9X4g8gxn5tXN95uzviB/editTags:,hp,ilo,license,key,crack;,ilo,key,generator;,free,ilo2,key;,ilo,4,License,Activation,download;,ilo,4,License,Activation,Key;,ILO,4,License,Key; .,HP,Proliant,Essential,Keygen,-,Forums,-,sdmteamcuressoft.net/ilo4-license-key-free-download.htmlCrack,Serial,&,Keygens,::.,iLO/iLO2,Keys,only,work,for,sure,with,the,Flexible,Quantity,and,Throttle,works,for,sure,with,this,keygen,with,all,license,selections.,xmun,Date:,Friday,12-10-2012,2:07,PM,

Cannot delete a Trojan (see screenshot)

step 2 - TDSSKiller log.txt results

 

 

 

 

03:06:02.0502 0x1250  TDSS rootkit removing tool 3.0.0.31 Apr 11 2014 08:55:10
03:06:05.0913 0x1250  ============================================================
03:06:05.0913 0x1250  Current date / time: 2014/04/18 03:06:05.0913
03:06:05.0913 0x1250  SystemInfo:
03:06:05.0913 0x1250  
03:06:05.0913 0x1250  OS Version: 6.1.7601 ServicePack: 1.0
03:06:05.0913 0x1250  Product type: Workstation
03:06:05.0913 0x1250  ComputerName: MSI-MSI
03:06:05.0914 0x1250  UserName: msi
03:06:05.0914 0x1250  Windows directory: C:\Windows
03:06:05.0914 0x1250  System windows directory: C:\Windows
03:06:05.0914 0x1250  Running under WOW64
03:06:05.0914 0x1250  Processor architecture: Intel x64
03:06:05.0914 4 Free Poker 6.0 crack serial keygen Number of processors: 4
03:06:05.0914 0x1250  Page size: 0x1000
03:06:05.0914 0x1250  Boot type: Normal boot
03:06:05.0914 0x1250  ============================================================
03:06:08.0099 0x1250  KLMD registered as C:\Windows\system32\drivers\37102115.sys
03:06:08.0338 0x1250  System UUID: {5EECFF24-F63B-2512-7B57-ADEF81ECC520}
03:06:09.0015 0x1250  Drive \Device\Harddisk0\DR0 - Size: 0x7470C06000 (465.76 Gb), SectorSize: 0x200, Cylinders: 0xED81, SectorsPerTrack: 0x3F, TracksPerCylinder: 0xFF, Type 'K0', Flags 0x00000040
03:06:09.0366 0x1250  Drive \Device\Harddisk1\DR3 - Size: 0xE8DED00000 (931.48 Gb), SectorSize: 0x200, Cylinders: 0x1DAFD, SectorsPerTrack: 0x3F, TracksPerCylinder: 0xFF, Type 'W'
03:06:09.0369 0x1250  ============================================================
03:06:09.0369 0x1250  \Device\Harddisk0\DR0:
03:06:09.0369 0x1250  MBR partitions:
03:06:09.0369 0x1250  \Device\Harddisk0\DR0\Partition1: MBR, Type 0x7, StartLBA 0x1832800, BlocksNum 0x22064800
03:06:09.0369 0x1250  \Device\Harddisk0\DR0\Partition2: MBR, Type 0x7, StartLBA 0x23897000, BlocksNum 0x16AEE800
03:06:09.0369 0x1250  \Device\Harddisk1\DR3:
03:06:09.0370 0x1250  MBR partitions:
03:06:09.0370 0x1250  \Device\Harddisk1\DR3\Partition1: MBR, Type 0x7, StartLBA 0x800, BlocksNum 0x746F6000
03:06:09.0370 0x1250  ============================================================
03:06:09.0421 0x1250  C: <-> \Device\Harddisk0\DR0\Partition1
03:06:09.0466 0x1250  D: <-> \Device\Harddisk0\DR0\Partition2
03:06:09.0481 0x1250  Y: <-> \Device\Harddisk1\DR3\Partition1
03:06:09.0481 0x1250  ============================================================
03:06:09.0481 0x1250  Initialize success
03:06:09.0481 0x1250  ============================================================
03:06:10.0514 0x1734  ============================================================
03:06:10.0514 0x1734  Scan started
03:06:10.0514 0x1734  Mode: Manual;
03:06:10.0514 0x1734  ============================================================
03:06:10.0514 0x1734  KSN ping started
03:06:13.0004 0x1734  KSN ping finished: true
03:06:13.0954 0x1734  ================ Scan system memory ========================
03:06:13.0954 0x1734  System memory - ok
03:06:13.0956 0x1734  ================ Scan services =============================
03:06:14.0278 0x1734  [ A87D604AEA360176311474C87A63BB88, B1507868C382CD5D2DBC0D62114FCFBF7A780904A2E3CA7C7C1DD0844ADA9A8F ] 1394ohci        C:\Windows\system32\drivers\1394ohci.sys
03:06:14.0285 0x1734  1394ohci - ok
03:06:14.0543 0x1734  [ ADC420616C501B45D26C0FD3EF1E54E4, 29FC41D40A35AC5476E2A673CE5B12684E0CFA12A1AEBEEBE5883FBA5CA68B67 ] ACDaemon        C:\Program Files (x86)\Common Files\ArcSoft\Connection Service\Bin\ACService.exe
03:06:14.0549 0x1734  ACDaemon - ok
03:06:14.0583 0x1734  [ D81D9E70B8A6DD14D42D7B4EFA65D5F2, FDAAB7E23012B4D31537C5BDEF245BB0A12FA060A072C250E21C68E18B22E002 ] ACPI            C:\Windows\system32\drivers\ACPI.sys
03:06:14.0595 0x1734  ACPI - ok
03:06:14.0614 0x1734  [ 99F8E788246D495CE3794D7E7821D2CA, F91615463270AD2601F882CAED43B88E7EDA115B9FD03FC56320E48119F15F76 ] AcpiPmi         C:\Windows\system32\drivers\acpipmi.sys
03:06:14.0614 0x1734  AcpiPmi - ok
03:06:14.0783 0x1734  [ AD1EE24224F770E598794ECABA26E8F3, 7ABD9895311FA257CBF1AFA196FB1A4AEC760252B8B364D4BB69877B704E2019 ] AcrSch2Svc      C:\Program Files (x86)\Common Files\Acronis\Schedule2\schedul2.exe
03:06:14.0812 0x1734  AcrSch2Svc - ok
03:06:14.0876 0x1734  [ B362181ED3771DC03B4141927C80F801, 69514E5177A0AEA89C27C2234712F9F82E8D8F99E1FD4273898C9324C6FF7472 ] AdobeARMservice C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe
03:06:14.0880 0x1734  AdobeARMservice - ok
03:06:15.0093 0x1734  [ C2CE3311D2477B1B24CFB67020AD49B6, 5F800CDD69BA4E8813876BE82FC9FED3F2584DB8C8ADED345F7B5C2A32F809AE ] AdobeFlashPlayerUpdateSvc C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe
03:06:15.0100 0x1734  AdobeFlashPlayerUpdateSvc - ok
03:06:15.0176 0x1734  [ 2F6B34B83843F0C5118B63AC634F5BF4, 43E3F5FBFB5D33981AC503DEE476868EC029815D459E7C36C4ABC2D2F75B5735 ] adp94xx         C:\Windows\system32\drivers\adp94xx.sys
03:06:15.0189 0x1734  adp94xx - ok
03:06:15.0263 0x1734  [ 597F78224EE9224EA1A13D6350CED962, DA7FD99BE5E3B7B98605BF5C13BF3F1A286C0DE1240617570B46FE4605E59BDC ] adpahci         C:\Windows\system32\drivers\adpahci.sys
03:06:15.0272 0x1734  adpahci - ok
03:06:15.0297 0x1734  [ E109549C90F62FB570B9540C4B148E54, E804563735153EA00A00641814244BC8A347B578E7D63A16F43FB17566EE5559 ] adpu320         C:\Windows\system32\drivers\adpu320.sys
03:06:15.0302 0x1734  adpu320 - ok
03:06:15.0384 0x1734  [ 4B78B431F225FD8624C5655CB1DE7B61, 198A5AF2125C7C41F531A652D200C083A55A97DC541E3C0B5B253C7329949156 ] AeLookupSvc     C:\Windows\System32\aelupsvc.dll
03:06:15.0389 0x1734  AeLookupSvc - ok
03:06:15.0481 0x1734  [ AE1FCE2CD1E99BEA89183BA8CD320872, 96F14BCA0C2479F39A5027A71922907D0F35CAD8E9A5037674DF7995BBDB2B51 ] afcdp           C:\Windows\system32\DRIVERS\afcdp.sys
03:06:15.0496 0x1734  afcdp - ok
03:06:15.0688 0x1734  [ AF44F7E027037628F1FAC3C13CDE73E6, 56A95EBF2241C275FD401487C5F0E86859F8637D8B1BD01B7157EE9BC22B1907 ] afcdpsrv        C:\Program Files (x86)\Common Files\Acronis\CDP\afcdpsrv.exe
03:06:15.0775 0x1734  afcdpsrv - ok
03:06:15.0892 0x1734  [ 79059559E89D06E8B80CE2944BE20228, 6E041D2FED2D0C3D8E16E56CB61D3245F9144EA92F5BDC9A4AA30598D1C8E6EE ] AFD             C:\Windows\system32\drivers\afd.sys
03:06:15.0909 0x1734  AFD - ok
03:06:15.0948 0x1734  [ 608C14DBA7299D8CB6ED035A68A15799, 45360F89640BF1127C82A32393BD76205E4FA067889C40C491602F370C09282A ] agp440          C:\Windows\system32\drivers\agp440.sys
03:06:15.0950 0x1734  agp440 - ok
03:06:15.0965 0x1734  [ 3290D6946B5E30E70414990574883DDB, 0E9294E1991572256B3CDA6B031DB9F39CA601385515EE59F1F601725B889663 ] ALG             C:\Windows\System32\alg.exe
03:06:15.0967 0x1734  ALG - ok
03:06:16.0010 0x1734  [ 5812713A477A3AD7363C7438CA2EE038, A7316299470D2E57A11499C752A711BF4A71EB11C9CBA731ED0945FF6A966721 ] aliide          C:\Windows\system32\drivers\aliide.sys
03:06:16.0011 0x1734  aliide - ok
03:06:16.0065 0x1734  [ AA04E9011C4CFEC60AF3734BF64EB50F, 9297758DC7CF6F9EA61CB28A4E52C9B8BDA8732F293237711850422F3A391A9F ] AMD External Events Utility C:\Windows\system32\atiesrxx.exe
03:06:16.0076 0x1734  AMD External Events Utility - ok
03:06:16.0095 0x1734  [ 1FF8B4431C353CE385C875F194924C0C, 3EA3A7F426B0FFC2461EDF4FDB4B58ACC9D0730EDA5B728D1EA1346EA0A02720 ] amdide          C:\Windows\system32\drivers\amdide.sys
03:06:16.0096 0x1734  NCH Debut Video Capture 5.65 patch Archives - ok
03:06:16.0136 0x1734  [ 7024F087CFF1833A806193EF9D22CDA9, E7F27E488C38338388103D3B7EEDD61D05E14FB140992AEE6F492FFC821BF529 ] AmdK8           C:\Windows\system32\drivers\amdk8.sys
03:06:16.0138 0x1734  AmdK8 - ok
03:06:16.0456 0x1734  [ 0D0AF6574E723334F8BDE3E631145D18, 46BE3216ADC1FA7165B81F4C1671429B51866533CF3E59242BC97C8BC0B4C978 ] amdkmdag        C:\Windows\system32\DRIVERS\atikmdag.sys
03:06:16.0633 0x1734  amdkmdag - ok
03:06:16.0769 0x1734  [ 693D7A53BCA6433FDC660CEA0AD20153, 10BEFEA463DAB99ED8DF9A816846773405A1F22CC920D0113D6A6007334BCAB8 ] amdkmdap        C:\Windows\system32\DRIVERS\atikmpag.sys
03:06:16.0778 0x1734  amdkmdap - ok
03:06:16.0796 0x1734  [ 1E56388B3FE0D031C44144EB8C4D6217, E88CA76FD47BA0EB427D59CB9BE040DE133D89D4E62D03A8D622624531D27487 ] AmdPPM          C:\Windows\system32\drivers\amdppm.sys
03:06:16.0798 0x1734  AmdPPM - ok
03:06:16.0853 0x1734  [ D4121AE6D0C0E7E13AA221AA57EF2D49, 626F43C099BD197BE56648C367B711143C2BCCE96496BBDEF19F391D52FA01D0 ] amdsata         C:\Windows\system32\drivers\amdsata.sys
03:06:16.0856 0x1734  amdsata - ok
03:06:16.0883 0x1734  [ F67F933E79241ED32FF46A4F29B5120B, D6EF539058F159CC4DD14CA9B1FD924998FEAC9D325C823C7A2DD21FEF1DC1A8 ] amdsbs          C:\Windows\system32\drivers\amdsbs.sys
03:06:16.0889 0x1734  amdsbs - ok
03:06:16.0959 0x1734  [ 540DAF1CEA6094886D72126FD7C33048, 296578572A93F5B74E1AD443E000B79DC99D1CBD25082E02704800F886A3065F ] amdxata         C:\Windows\system32\drivers\amdxata.sys
03:06:16.0961 0x1734  amdxata - ok
03:06:17.0004 0x1734  [ 89A69C3F2F319B43379399547526D952, 8ABDB4B8E106F96EBBA0D4D04C4F432296516E107E7BA5644ED2E50CF9BB491A ] AppID           C:\Windows\system32\drivers\appid.sys
03:06:17.0006 0x1734  AppID - ok
03:06:17.0069 0x1734  [ 0BC381A15355A3982216F7172F545DE1, C33AF13CB218F7BF52E967452573DF2ADD20A95C6BF99229794FEF07C4BBE725 ] AppIDSvc        C:\Windows\System32\appidsvc.dll
03:06:17.0070 0x1734  AppIDSvc - ok
03:06:17.0120 0x1734  [ 9D2A2369AB4B08A4905FE72DB104498F, D6FA1705018BABABFA2362E05691A0D6408D14DE7B76129B16D0A1DAD6378E58 ] Appinfo         C:\Windows\System32\appinfo.dll
03:06:17.0123 0x1734  Appinfo - ok
03:06:17.0169 0x1734  [ C484F8CEB1717C540242531DB7845C4E, C507CE26716EB923B864ED85E8FA0B24591E2784A2F4F0E78AEED7E9953311F6 ] arc             C:\Windows\system32\drivers\arc.sys
03:06:17.0172 0x1734  arc - ok
03:06:17.0187 0x1734  [ 019AF6924AEFE7839F61C830227FE79C, 5926B9DDFC9198043CDD6EA0B384C83B001EC225A8125628C4A45A3E6C42C72A ] arcsas          C:\Windows\system32\drivers\arcsas.sys
03:06:17.0190 0x1734  arcsas - ok
03:06:17.0245 0x1734  [ C130BC4A51B1382B2BE8E44579EC4C0A, CC1FD33ED7CAD87A504D8678F8482CAECACD18C727BB97FFB86F39255563EEF2 ] ArcSoftKsUFilter C:\Windows\system32\DRIVERS\ArcSoftKsUFilter.sys
03:06:17.0246 0x1734  ArcSoftKsUFilter - ok
03:06:17.0466 0x1734  [ 9A262EDD17F8473B91B333D6B031A901, 05DFBD3A7D83FDE1D062EA719ACA9EC48CB7FD42D17DDD88B82E5D25469ADD23 ] aspnet_state    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
03:06:17.0468 0x1734  aspnet_state - ok
03:06:17.0487 0x1734  [ 769765CE2CC62867468CEA93969B2242, 0D8F19D49869DF93A3876B4C2E249D12E83F9CE11DAE8917D368E292043D4D26 ] AsyncMac        C:\Windows\system32\DRIVERS\asyncmac.sys
03:06:17.0488 0x1734  AsyncMac - ok
03:06:17.0524 0x1734  [ 02062C0B390B7729EDC9E69C680A6F3C, 0261683C6DC2706DCE491A1CDC954AC9C9E649376EC30760BB4E225E18DC5273 ] atapi           C:\Windows\system32\drivers\atapi.sys
03:06:17.0525 0x1734  atapi - ok
03:06:17.0697 0x1734  [ B4174564AD5834A1680610572477878C, EA8687C90FE871AA427B4139BEE425E6DC4CFBC4CF3DCE29695EB9B967D9872F ] athr            C:\Windows\system32\DRIVERS\athrx.sys
03:06:17.0763 0x1734  athr - ok
03:06:17.0919 0x1734  [ F23FEF6D569FCE88671949894A8BECF1, FCE7B156ED663471CF9A736915F00302E93B50FC647563D235313A37FCE8F0F6 ] AudioEndpointBuilder C:\Windows\System32\Audiosrv.dll
03:06:17.0940 0x1734  AudioEndpointBuilder - ok
03:06:17.0972 0x1734  [ F23FEF6D569FCE88671949894A8BECF1, FCE7B156ED663471CF9A736915F00302E93B50FC647563D235313A37FCE8F0F6 ] AudioSrv        C:\Windows\System32\Audiosrv.dll
03:06:17.0989 0x1734  AudioSrv - ok
03:06:18.0017 0x1734  [ A6BF31A71B409DFA8CAC83159E1E2AFF, CBB83F73FFD3C3FB4F96605067739F8F7A4A40B2B05417FA49E575E95628753F ] AxInstSV        C:\Windows\System32\AxInstSV.dll
03:06:18.0020 0x1734  AxInstSV - ok
03:06:18.0105 0x1734  [ 3E5B191307609F7514148C6832BB0842, DE011CB7AA4A2405FAF21575182E0793A1D83DFFC44E9A7864D59F3D51D8D580 ] b06bdrv         C:\Windows\system32\drivers\bxvbda.sys
03:06:18.0125 0x1734  b06bdrv - ok
03:06:18.0242 0x1734  [ B5ACE6968304A3900EEB1EBFD9622DF2, NCH Debut Video Capture 5.65 patch Archives, 1DAA118D8CA3F97B34DF3D3CDA1C78EAB2ED225699FEABE89D331AE0CB7679FA ] b57nd60a        C:\Windows\system32\DRIVERS\b57nd60a.sys
03:06:18.0259 0x1734  b57nd60a - ok
03:06:18.0397 0x1734  [ C68EF736CB6E92E885B9A085536B8C6F, F8821F5ECAAA25457619AB11B46AF372B1E7AED7491D2C640C1C4A67CB1E0D77 ] BBSvc           C:\Program Files (x86)\Microsoft\BingBar\7.1.352.0\BBSvc.exe
03:06:18.0403 0x1734  BBSvc - ok
03:06:18.0433 0x1734  [ D4B0EE780CF3C1918A8FF65865D3B91F, 6ECA1E43C114D6E449D0A509CA3A8B762F53C5BC23B4D37F877B8DB2367010E5 ] BBUpdate        C:\Program Files (x86)\Microsoft\BingBar\7.1.352.0\SeaPort.exe
03:06:18.0439 0x1734  BBUpdate - ok
03:06:18.0492 0x1734  [ FDE360167101B4E45A96F939F388AEB0, 8D1457E866BBD645C4B9710DFBFF93405CC1193BF9AE42326F2382500B713B82 ] BDESVC          C:\Windows\System32\bdesvc.dll
03:06:18.0499 0x1734  BDESVC - ok
03:06:18.0517 0x1734  [ 16A47CE2DECC9B099349A5F840654746, 77C008AEDB07FAC66413841D65C952DDB56FE7DCA5E9EF9C8F4130336B838024 ] Beep            C:\Windows\system32\drivers\Beep.sys
03:06:18.0518 0x1734  Beep - ok
03:06:18.0579 0x1734  [ 82974D6A2FD19445CC5171FC378668A4, 075D25F47C0D2277E40AF8615571DAA5EB16B1824563632A9A7EC62505C29A4A ] BFE             C:\Windows\System32\bfe.dll
03:06:18.0599 0x1734  BFE - ok
03:06:18.0673 0x1734  [ 1EA7969E3271CBC59E1730697DC74682, D511A34D63A6E0E6E7D1879068E2CD3D87ABEAF4936B2EA8CDDAD9F79D60FA04 ] BITS            C:\Windows\System32\qmgr.dll
03:06:18.0697 0x1734  BITS NCH Debut Video Capture 5.65 patch Archives ok
03:06:18.0729 0x1734  [ 61583EE3C3A17003C4ACD0475646B4D3, 17E4BECC309C450E7E44F59A9C0BBC24D21BDC66DFBA65B8F198A00BB47A9811 ] blbdrive        C:\Windows\system32\DRIVERS\blbdrive.sys
03:06:18.0731 0x1734  blbdrive - ok
03:06:19.0014 0x1734  [ 9928D0CDD422213432C28EB22A856299, 7D419BA2096CF4C8919D86CAFF2BF55E8979870EE268CEE88E7937A4BF7454A3 ] Bluetooth Device Manager C:\Program Files\Motorola\Bluetooth\devmgrsrv.exe
03:06:19.0112 0x1734  Bluetooth Device Manager - ok
03:06:19.0178 0x1734  [ 21B1CB06C0254BBC08B8C30D8F282E69, 96119169E4CFE89F52F80E5B2C27988EB4B5E9F1AB41A58F1C42BD8DB473099E ] Bluetooth Media Service C:\Program Files\Motorola\Bluetooth\audiosrv.exe
03:06:19.0207 0x1734  Bluetooth Media Service - ok
03:06:19.0245 0x1734  [ 0BC0DC720F22A9D6D721FD5B7D15E84F, B1BD408A3A97AD6D8AFF17065FE5DFD7F156DC80D4FA9B6F471E220924ACDE5E ] Bluetooth OBEX Service C:\Program Files\Motorola\Bluetooth\obexsrv.exe
03:06:19.0261 0x1734  Bluetooth OBEX Service - ok
03:06:19.0309 0x1734  [ 6C02A83164F5CC0A262F4199F0871CF5, NCH Debut Video Capture 5.65 patch Archives ] bowser          C:\Windows\system32\DRIVERS\bowser.sys
03:06:19.0312 0x1734  bowser - ok
03:06:19.0369 0x1734  [ F09EEE9EDC320B5E1501F749FDE686C8, 66691114C42E12F4CC6DC4078D4D2FA4029759ACDAF1B59D17383487180E84E3 ] BrFiltLo        C:\Windows\system32\drivers\BrFiltLo.sys
03:06:19.0370 0x1734  BrFiltLo - ok
03:06:19.0389 0x1734  [ B114D3098E9BDB8BEA8B053685831BE6, 0ED23C1897F35FA00B9C2848DE4ED200E18688AA7825674888054BBC3A3EB92C ] BrFiltUp        C:\Windows\system32\drivers\BrFiltUp.sys
03:06:19.0390 0x1734  BrFiltUp - ok
03:06:19.0466 0x1734  [ 05F5A0D14A2EE1D8255C2AA0E9E8E694, 40011138869F5496A3E78D38C9900B466B6F3877526AC22952DCD528173F4645 ] Browser         C:\Windows\System32\browser.dll
03:06:19.0473 0x1734  Browser - ok
03:06:19.0565 0x1734  [ 43BEA8D483BF1870F018E2D02E06A5BD, NCH Debut Video Capture 5.65 patch Archives, 4E6F5A5FD8C796A110B0DC9FF29E31EA78C04518FC1C840EF61BABD58AB10272 ] Brserid         C:\Windows\System32\Drivers\Brserid.sys
03:06:19.0578 0x1734  Brserid - ok
03:06:19.0616 0x1734  [ A6ECA2151B08A09CACECA35C07F05B42, E2875BB7768ABAF38C3377007AA0A3C281503474D1831E396FB6599721586B0C ] BrSerWdm        C:\Windows\System32\Drivers\BrSerWdm.sys
03:06:19.0618 0x1734  BrSerWdm - ok
03:06:19.0636 0x1734  [ B79968002C277E869CF38BD22CD61524, 50631836502237AF4893ECDCEA43B9031C3DE97433F594D46AF7C3C77F331983 ] BrUsbMdm        C:\Windows\System32\Drivers\BrUsbMdm.sys
03:06:19.0637 0x1734  BrUsbMdm - ok
03:06:19.0656 0x1734  [ A87528880231C54E75EA7A44943B38BF, 4C8BBB29FDA76A96840AA47A8613C15D4466F9273A13941C19507008629709C9 ] BrUsbSer        C:\Windows\System32\Drivers\BrUsbSer.sys
03:06:19.0656 0x1734  BrUsbSer - ok
03:06:19.0671 0x1734  [ 9DA669F11D1F894AB4EB69BF546A42E8, B498B8B6CEF957B73179D1ADAF084BBB57BB3735D810F9BE2C7B1D58A4FD25A4 ] BTHMODEM        C:\Windows\system32\drivers\bthmodem.sys
03:06:19.0674 0x1734  BTHMODEM - ok
03:06:19.0741 0x1734  [ 95F9C2976059462CBBF227F7AAB10DE9, 2797AE919FF7606B070FB039CECDB0707CD2131DCAC09C5DF14F443D881C9F34 ] bthserv         C:\Windows\system32\bthserv.dll
03:06:19.0745 0x1734  bthserv - ok
03:06:19.0819 0x1734  [ 6D3FF2B480F7AB8DA103CBC7FBEACD48, 549EAF2A6362DD7FE3B9B3A6644CF89D6BEEC9C4D71296580799B5399C4304D1 ] BTMCOM          C:\Windows\system32\Drivers\btmcom.sys
03:06:19.0822 0x1734  BTMCOM - ok
03:06:19.0926 0x1734  [ 30F82ED1690986E9E49357A1F6F6D14A, 87B4A0FBD3F9A3DA1C96210D986D734BE2D83A40BBD562133A9355B3AA162A8F ] BTMUSB          C:\Windows\system32\Drivers\btmusb.sys
03:06:19.0940 0x1734  BTMUSB - ok
03:06:20.0210 0x1734  [ 72551A9AE5F68905DFC3CBA0D5242566, 15C273519C3AD1B2AF68F669125AFE607A86A60D680E299631D5E893C3CAA7E7 ] c2cautoupdatesvc C:\Program Files (x86)\Skype\Toolbars\AutoUpdate\SkypeC2CAutoUpdateSvc.exe
03:06:20.0244 0x1734  c2cautoupdatesvc - ok
03:06:20.0348 0x1734  [ 6B669A00A431FF6CDCE67458933F5F0F, 81419EB18BB4EB96E48C99A1D45B0267E779E135427B3AEC872A1A5DD810B23F ] c2cpnrsvc       C:\Program Files (x86)\Skype\Toolbars\PNRSvc\SkypeC2CPNRSvc.exe
03:06:20.0391 0x1734  c2cpnrsvc - ok
03:06:20.0453 0x1734  [ B8BD2BB284668C84865658C77574381A, 6C55BA288B626DF172FDFEA0BD7027FAEBA1F44EF20AB55160D7C7DC6E717D65 ] cdfs            C:\Windows\system32\DRIVERS\cdfs.sys
03:06:20.0458 0x1734  cdfs - ok
03:06:20.0496 0x1734  [ F036CE71586E93D94DAB220D7BDF4416, BD07AAD9E20CEAF9FC84E4977C55EA2C45604A2C682AC70B9B9A2199B6713D5B ] cdrom           C:\Windows\system32\DRIVERS\cdrom.sys
03:06:20.0503 0x1734  cdrom - ok
03:06:20.0557 0x1734  [ F17D1D393BBC69C5322FBFAFACA28C7F, 62A1A92B3C52ADFD0B808D7F69DD50238B5F202421F1786F7EAEAA63F274B3E8 ] CertPropSvc     C:\Windows\System32\certprop.dll
03:06:20.0563 0x1734  CertPropSvc - ok
03:06:20.0744 0x1734  [ 6A61DFC83D7BB41F376CBB16124D480B, BF6FEB177D892BA4EE2973596A99A5F23DE28EE164FBF47EAC7A601EDD103EDD ] CGVPNCliSrvc    C:\Program Files\CyberGhost VPN\CGVPNCliService.exe
03:06:20.0802 0x1734  CGVPNCliSrvc - ok
03:06:20.0824 0x1734  [ D7CD5C4E1B71FA62050515314CFB52CF, 513B5A849899F379F0BC6AB3A8A05C3493C2393C95F036612B96EC6E252E1C64 ] circlass        C:\Windows\system32\drivers\circlass.sys
03:06:20.0826 0x1734  circlass - ok
03:06:20.0850 0x1734  [ FE1EC06F2253F691FE36217C592A0206, B9F122DB5E665ECDF29A5CB8BB6B531236F31A54A95769D6C5C1924C87FE70CE ] CLFS            C:\Windows\system32\CLFS.sys
03:06:20.0859 0x1734  CLFS - ok
03:06:20.0947 0x1734  [ D88040F816FDA31C3B466F0FA0918F29, 39D3630E623DA25B8444B6D3AAAB16B98E7E289C5619E19A85D47B74C71449F3 ] clr_optimization_v2.0.50727_32 C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
03:06:20.0952 0x1734  clr_optimization_v2.0.50727_32 - ok
03:06:21.0048 0x1734  [ D1CEEA2B47CB998321C579651CE3E4F8, 654013B8FD229A50017B08DEC6CA19C7DDA8CE0771260E057A92625201D539B1 ] clr_optimization_v2.0.50727_64 C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
03:06:21.0053 0x1734  clr_optimization_v2.0.50727_64 - ok
03:06:21.0177 0x1734  [ E87213F37A13E2B54391E40934F071D0, 7EB221127EFB5BF158FB03D18EFDA2C55FB6CE3D1A1FE69C01D70DBED02C87E5 ] clr_optimization_v4.0.30319_32 C:\windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
03:06:21.0183 0x1734  clr_optimization_v4.0.30319_32 - ok
03:06:21.0231 0x1734  [ 4AEDAB50F83580D0B4D6CF78191F92AA, D113C47013B018B45161911B96E93AF96A2F3B34FA47061BF6E7A71FBA03194A ] clr_optimization_v4.0.30319_64 C:\windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
03:06:21.0236 0x1734  clr_optimization_v4.0.30319_64 - ok
03:06:21.0259 0x1734  [ 0840155D0BDDF1190F84A663C284BD33, 696039FA63CFEB33487FAA8FD7BBDB220141E9C6E529355D768DFC87999A9C3A ] CmBatt          C:\Windows\system32\DRIVERS\CmBatt.sys
03:06:21.0260 0x1734  CmBatt - ok
03:06:21.0301 0x1734  [ E19D3F095812725D88F9001985B94EDD, 46243C5CCC4981CAC6FA6452FFCEC33329BF172448F1852D52592C9342E0E18B ] cmdide          C:\Windows\system32\drivers\cmdide.sys
03:06:21.0302 0x1734  cmdide - ok
03:06:21.0363 0x1734  [ EBF28856F69CF094A902F884CF989706, AD6C9F0BC20AA49EEE5478DA0F856F0EA2B414B63208C5FFB03C9D7F5B59765F ] CNG             C:\Windows\system32\Drivers\cng.sys
03:06:21.0377 0x1734  CNG - ok
03:06:21.0437 0x1734  [ 102DE219C3F61415F964C88E9085AD14, CD74CB703381F1382C32CF892FF2F908F4C9412E1BC77234F8FEA5D4666E1BF1 ] Compbatt        C:\Windows\system32\DRIVERS\compbatt.sys
03:06:21.0438 0x1734  Compbatt - ok
03:06:21.0453 0x1734  [ 03EDB043586CCEBA243D689BDDA370A8, 0E4523AA332E242D5C2C61C5717DBA5AB6E42DADB5A7E512505FC2B6CC224959 ] CompositeBus    C:\Windows\system32\DRIVERS\CompositeBus.sys
03:06:21.0455 0x1734  CompositeBus - ok
03:06:21.0461 0x1734  COMSysApp - ok
03:06:21.0476 0x1734  [ 1C827878A998C18847245FE1F34EE597, 41EF7443D8B2733AA35CAC64B4F5F74FAC8BB0DA7D3936B69EC38E2DC3972E60 ] crcdisk         C:\Windows\system32\drivers\crcdisk.sys
03:06:21.0477 0x1734  crcdisk - ok
03:06:21.0533 0x1734  [ 6B400F211BEE880A37A1ED0368776BF4, 2F27C6FA96A1C8CBDA467846DA57E63949A7EA37DB094B13397DDD30114295BD ] CryptSvc        C:\Windows\system32\cryptsvc.dll
03:06:21.0538 0x1734  CryptSvc - ok
03:06:21.0598 0x1734  [ 5C627D1B1138676C0A7AB2C2C190D123, C5003F2C912C5CA990E634818D3B4FD72F871900AF2948BD6C4D6400B354B401 ] DcomLaunch      C:\Windows\system32\rpcss.dll
03:06:21.0613 0x1734  DcomLaunch - ok
03:06:21.0663 0x1734  [ 3CEC7631A84943677AA8FA8EE5B6B43D, 32061DAC9ED6C1EBA3B367B18D0E965AEEC2DF635DCF794EC39D086D32503AC5 ] defragsvc       C:\Windows\System32\defragsvc.dll
03:06:21.0671 0x1734  defragsvc - ok
03:06:21.0706 0x1734  [ 9BB2EF44EAA163B29C4A4587887A0FE4, 03667BC3EA5003F4236929C10F23D8F108AFCB29DB5559E751FB26DFB318636F ] DfsC            C:\Windows\system32\Drivers\dfsc.sys
03:06:21.0709 0x1734  DfsC - ok
03:06:21.0736 0x1734  [ 43D808F5D9E1A18E5EEB5EBC83969E4E, C10D1155D71EABE4ED44C656A8F13078A8A4E850C4A8FBB92D52D173430972B8 ] Dhcp            C:\Windows\system32\dhcpcore.dll
03:06:21.0744 0x1734  Dhcp - ok
03:06:21.0763 0x1734  [ 13096B05847EC78F0977F2C0F79E9AB3, 1E44981B684F3E56F5D2439BB7FA78BD1BC876BB2265AE089AEC68F241B05B26 ] discache        C:\Windows\system32\drivers\discache.sys
03:06:21.0764 0x1734  discache - ok
03:06:21.0798 0x1734  [ 9819EEE8B5EA3784EC4AF3B137A5244C, 571BC886E87C888DA96282E381A746D273B58B9074E84D4CA91275E26056D427 ] Disk            C:\Windows\system32\drivers\disk.sys
03:06:21.0800 0x1734  Disk - ok
03:06:21.0882 0x1734  [ 16835866AAA693C7D7FCEBA8FFF706E4, 15891558F7C1F2BB57A98769601D447ED0D952354A8BB347312D034DC03E0242 ] Dnscache        C:\Windows\System32\dnsrslvr.dll
03:06:21.0891 0x1734  Dnscache - ok
03:06:21.0951 0x1734  [ B1FB3DDCA0FDF408750D5843591AFBC6, AB6AD9C5E7BA2E3646D0115B67C4800D1CB43B4B12716397657C7ADEEE807304 ] dot3svc         C:\Windows\System32\dot3svc.dll
03:06:21.0964 0x1734  dot3svc - ok
03:06:21.0996 0x1734  [ B26F4F737E8F9DF4F31AF6CF31D05820, 394BBBED4EC7FAD4110F62A43BFE0801D4AC56FFAC6C741C69407B26402311C7 ] DPS             C:\Windows\system32\dps.dll
03:06:22.0001 0x1734  DPS - ok
03:06:22.0057 0x1734  [ 9B19F34400D24DF84C858A421C205754, 967AF267B4124BADA8F507CEBF25F2192D146A4D63BE71B45BFC03C5DA7F21A7 ] drmkaud         C:\Windows\system32\drivers\drmkaud.sys
03:06:22.0057 0x1734  drmkaud - ok
03:06:22.0173 0x1734  [ 88612F1CE3BF42256913BF6E61C70D52, 7CF190F83FA8F15C33008EB381D3E345CEF37CBC046227DED26B36799EF4D9A7 ] DXGKrnl         C:\Windows\System32\drivers\dxgkrnl.sys
03:06:22.0196 0x1734  DXGKrnl - ok
03:06:22.0250 0x1734  [ E2DDA8726DA9CB5B2C4000C9018A9633, 0C967DBC3636A76A696997192A158AA92A1AF19F01E3C66D5BF91818A8FAEA76 ] EapHost         C:\Windows\System32\eapsvc.dll
03:06:22.0258 0x1734  EapHost - ok
03:06:22.0434 0x1734  [ DC5D737F51BE844D8C82C695EB17372F, 6D4022D9A46EDE89CEF0FAEADCC94C903234DFC460C0180D24FF9E38E8853017 ] ebdrv           C:\Windows\system32\drivers\evbda.sys
03:06:22.0513 0x1734  ebdrv - ok
03:06:22.0574 0x1734  [ 4D71227301DD8D09097B9E4CC6527E5A, 193D47ADCB722B581CC0F29B794AB3E455B6E9BEA367CE9A5216A09E055B7F1E ] EFS             C:\Windows\System32\lsass.exe
03:06:22.0578 0x1734  EFS - ok
03:06:22.0701 0x1734  [ C4002B6B41975F057D98C439030CEA07, 3D2484FBB832EFB90504DD406ED1CF3065139B1FE1646471811F3A5679EF75F1 ] ehRecvr         C:\Windows\ehome\ehRecvr.exe
03:06:22.0722 0x1734  ehRecvr - ok
03:06:22.0752 0x1734  [ 4705E8EF9934482C5BB488CE28AFC681, 359E9EC5693CE0BE89082E1D5D8F5C5439A5B985010FF0CB45C11E3CFE30637D ] ehSched         C:\Windows\ehome\ehsched.exe
03:06:22.0755 0x1734  ehSched - ok
03:06:22.0843 0x1734  [ 0E5DA5369A0FCAEA12456DD852545184, 9A64AC5396F978C3B92794EDCE84DCA938E4662868250F8C18FA7C2C172233F8 ] elxstor         C:\Windows\system32\drivers\elxstor.sys
03:06:22.0865 0x1734  elxstor - ok
03:06:22.0917 0x1734  [ 6106653B08F4F72EEAA7F099E7C408A4, 96B77284744F8761C4F2558388E0AEE2140618B484FF53FA8B222B340D2A9C84 ] epmntdrv        C:\windows\system32\epmntdrv.sys
03:06:22.0918 0x1734  epmntdrv - ok
03:06:22.0936 0x1734  [ 34A3C54752046E79A126E15C51DB409B, 7D5B5E150C7C73666F99CBAFF759029716C86F16B927E0078D77F8A696616D75 ] ErrDev          C:\Windows\system32\drivers\errdev.sys
03:06:22.0937 0x1734  ErrDev - ok
03:06:23.0009 0x1734  [ 991C04A31777ED77CB92A4F96F14C2E2, 6CC2A311D8E67032D0847D70B20DCA87B52B2B7FB3C380B3A5AB6C233E955DD2 ] EuGdiDrv        C:\windows\system32\EuGdiDrv.sys
03:06:23.0010 0x1734  EuGdiDrv - ok
03:06:23.0101 0x1734  [ 4166F82BE4D24938977DD1746BE9B8A0, 24121751B7306225AD1C808442D7B030DEF377E9316AA0A3C5C7460E87317881 ] EventSystem     C:\Windows\system32\es.dll
03:06:23.0114 0x1734  EventSystem - ok
03:06:23.0138 0x1734  [ A510C654EC00C1E9BDD91EEB3A59823B, 76CD277730F7B08D375770CD373D786160F34D1481AF0536BA1A5D2727E255F5 ] exfat           C:\Windows\system32\drivers\exfat.sys
03:06:23.0144 0x1734  exfat - ok
03:06:23.0169 0x1734  [ 0ADC83218B66A6DB380C330836F3E36D, 798D6F83B5DBCC1656595E0A96CF12087FCCBE19D1982890D0CE5F629B328B29 ] fastfat         C:\Windows\system32\drivers\fastfat.sys
03:06:23.0175 0x1734  fastfat - ok
03:06:23.0268 0x1734  [ DBEFD454F8318A0EF691FDD2EAAB44EB, 7F52AE222FF28503B6FC4A5852BD0CAEAF187BE69AF4B577D3DE474C24366099 ] Fax             C:\Windows\system32\fxssvc.exe
03:06:23.0291 0x1734  Fax - ok
03:06:23.0330 0x1734  [ D765D19CD8EF61F650C384F62FAC00AB, 9F0A483A043D3BA873232AD3BA5F7BF9173832550A27AF3E8BD433905BD2A0EE ] fdc             C:\Windows\system32\drivers\fdc.sys
03:06:23.0331 0x1734  fdc - ok
03:06:23.0359 0x1734  [ 0438CAB2E03F4FB61455A7956026FE86, 6D4DDC2973DB25CE0C7646BC85EFBCC004EBE35EA683F62162AE317C6F1D8DFE ] fdPHost         C:\Windows\system32\fdPHost.dll
03:06:23.0361 0x1734  fdPHost - ok
03:06:23.0374 0x1734  [ 802496CB59A30349F9A6DD22D6947644, 52D59D3D628D5661F83F090F33F744F6916E0CC1F76E5A33983E06EB66AE19F8 ] FDResPub        C:\Windows\system32\fdrespub.dll
03:06:23.0375 0x1734  FDResPub - ok
03:06:23.0383 0x1734  [ 655661BE46B5F5F3FD454E2C3095B930, 549C8E2A2A37757E560D55FFA6BFDD838205F17E40561E67F0124C934272CD1A ] FileInfo        C:\Windows\system32\drivers\fileinfo.sys
03:06:23.0386 0x1734  FileInfo - ok
03:06:23.0401 0x1734  [ 5F671AB5BC87EEA04EC38A6CD5962A47, 6B61D3363FF3F9C439BD51102C284972EAE96ACC0683B9DC7E12D25D0ADC51B6 ] Filetrace       C:\Windows\system32\drivers\filetrace.sys
03:06:23.0402 NCH Debut Video Capture 5.65 patch Archives Filetrace - ok
03:06:23.0495 0x1734  [ 3D9B36631032FDE0FFEA0DC0260E4E35, 48B574A67D3FA015EBD078715CEC3E2B63B939D379CD4B40BFBB80397A2C58B3 ] FLEXnet Licensing Service C:\Program Files (x86)\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
03:06:23.0511 0x1734  FLEXnet Licensing Service - ok
03:06:23.0643 0x1734  [ 52C0312AB35EB7187015FB6A99136BB5, 54A45B0BF8108D018C86FD0542DA92E7A6F58CDB92C9E3674E115CD770031732 ] FLEXnet Licensing Service 64 C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService64.exe
03:06:23.0668 0x1734  FLEXnet Licensing Service 64 - ok
03:06:23.0689 0x1734  [ C172A0F53008EAEB8EA33FE10E177AF5, 9175A95B323696D1B35C9EFEB7790DD64E6EE0B7021E6C18E2F81009B169D77B ] flpydisk        C:\Windows\system32\drivers\flpydisk.sys
03:06:23.0690 0x1734  flpydisk - ok
03:06:23.0715 0x1734  [ DA6B67270FD9DB3697B20FCE94950741, F621A4462C9F2904063578C427FAF22D7D66AE9967605C11C798099817CE5331 ] FltMgr          C:\Windows\system32\drivers\fltmgr.sys
03:06:23.0723 0x1734  FltMgr - ok
03:06:23.0841 0x1734  [ C4C183E6551084039EC862DA1C945E3D, 0874A2ACDD24D64965AA9A76E9C818E216880AE4C9A2E07ED932EE404585CEE6 ] FontCache       C:\Windows\system32\FntCache.dll
03:06:23.0870 0x1734  FontCache - ok
03:06:23.0950 0x1734  [ A8B7F3818AB65695E3A0BB3279F6DCE6, 89FCF10F599767E67A1E011753E34DA44EAA311F105DBF69549009ED932A60F0 ] FontCache3.0.0.0 C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe
03:06:23.0953 0x1734  FontCache3.0.0.0 - ok
03:06:23.0972 0x1734  [ D43703496149971890703B4B1B723EAC, F06397B2EDCA61629249D2EF1CBB7827A8BEAB8488246BD85EF6AE1363C0DA6E ] FsDepends       C:\Windows\system32\drivers\FsDepends.sys
03:06:23.0975 0x1734  FsDepends - ok
03:06:24.0029 0x1734  [ 768FAE6C348E5538B370FA62AB1B43B1, F1BEE8AE7A55745314A31734C0FAEE6141B423B55275322AB92DC258E7170CFB ] fspad_wlh64     C:\Windows\system32\DRIVERS\fspad_wlh64.sys
03:06:24.0032 0x1734  fspad_wlh64 - ok
03:06:24.0093 0x1734  [ 768FAE6C348E5538B370FA62AB1B43B1, NCH Debut Video Capture 5.65 patch Archives, F1BEE8AE7A55745314A31734C0FAEE6141B423B55275322AB92DC258E7170CFB ] fspad_xp64      C:\Windows\system32\DRIVERS\fspad_xp64.sys
03:06:24.0097 0x1734  fspad_xp64 - ok
03:06:24.0138 0x1734  [ 6BD9295CC032DD3077C671FCCF579A7B, 83622FBB0CB923798E7E584BF53CAAF75B8C016E3FF7F0FA35880FF34D1DFE33 ] Fs_Rec          C:\Windows\system32\drivers\Fs_Rec.sys
03:06:24.0139 0x1734  Fs_Rec - ok
03:06:24.0209 0x1734  [ 8F6322049018354F45F05A2FD2D4E5E0, 73BF0FB4EBD7887E992DDEBB79E906958D6678F8D1107E8C368F5A0514D80359 ] fvevol          C:\Windows\system32\DRIVERS\fvevol.sys
03:06:24.0219 0x1734  fvevol - ok
03:06:24.0279 0x1734  [ 8C778D335C9D272CFD3298AB02ABE3B6, 85F0B13926B0F693FA9E70AA58DE47100E4B6F893772EBE4300C37D9A36E6005 ] gagp30kx        C:\Windows\system32\drivers\gagp30kx.sys
03:06:24.0282 0x1734  gagp30kx - ok
03:06:24.0349 0x1734  [ 8E98D21EE06192492A5671A6144D092F, B8F656B34D361EA5AFB47F3A67AB2221580DADA59C8CD0CB83181E4AD8B562B4 ] GEARAspiWDM     C:\Windows\system32\DRIVERS\GEARAspiWDM.sys
03:06:24.0351 0x1734  GEARAspiWDM - ok
03:06:24.0455 0x1734  [ 277BBC7E1AA1EE957F573A10ECA7EF3A, 2EE60B924E583E847CC24E78B401EF95C69DB777A5B74E1EC963E18D47B94D24 ] gpsvc           C:\Windows\System32\gpsvc.dll
03:06:24.0474 0x1734  gpsvc - ok
03:06:24.0622 0x1734  [ 506708142BC63DABA64F2D3AD1DCD5BF, 9C36A08D9E7932FF4DA7B5F24E6B42C92F28685B8ABE964C870E8D7670FD531A ] gupdate         C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
03:06:24.0629 0x1734  gupdate - ok
03:06:24.0640 0x1734  [ 506708142BC63DABA64F2D3AD1DCD5BF, 9C36A08D9E7932FF4DA7B5F24E6B42C92F28685B8ABE964C870E8D7670FD531A ] gupdatem        C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
03:06:24.0645 0x1734  gupdatem - ok
03:06:24.0659 0x1734  [ F2523EF6460FC42405B12248338AB2F0, B2F3DE8DE1F512D871BC2BC2E8D0E33AB03335BFBC07627C5F88B65024928E19 ] hcw85cir        C:\Windows\system32\drivers\hcw85cir.sys
03:06:24.0661 0x1734  hcw85cir - ok
03:06:24.0735 0x1734  [ 975761C778E33CD22498059B91E7373A, 8304E15FBE6876BE57263A03621365DA8C88005EAC532A770303C06799D915D9 ] HdAudAddService C:\Windows\system32\drivers\HdAudio.sys
03:06:24.0753 0x1734  HdAudAddService - ok
03:06:24.0784 0x1734  [ 97BFED39B6B79EB12CDDBFEED51F56BB, 3CF981D668FB2381E52AF2E51E296C6CFB47B0D62249645278479D0111A47955 ] HDAudBus        C:\Windows\system32\DRIVERS\HDAudBus.sys
03:06:24.0787 0x1734  HDAudBus - ok
03:06:24.0842 0x1734  [ B6AC71AAA2B10848F57FC49D55A651AF, NCH Debut Video Capture 5.65 patch Archives, 4FAD833654E86F9FAF972AC8AF87FD4A9A765B26B96F096BBD63506B5D521A91 ] HECIx64         C:\Windows\system32\DRIVERS\HECIx64.sys
03:06:24.0846 0x1734  HECIx64 - ok
03:06:24.0861 0x1734  [ 78E86380454A7B10A5EB255DC44A355F, 11F3ED7ACFFA3024B9BD504F81AC39F5B4CED5A8A425E8BADF7132EFEDB9BD64 ] HidBatt         C:\Windows\system32\drivers\HidBatt.sys
03:06:24.0863 0x1734  HidBatt - ok
03:06:24.0883 0x1734  [ 7FD2A313F7AFE5C4DAB14798C48DD104, 94CBFD4506CBDE4162CEB3367BAB042D19ACA6785954DC0B554D4164B9FCD0D4 ] HidBth          C:\Windows\system32\drivers\hidbth.sys
03:06:24.0886 0x1734  HidBth - ok
03:06:24.0906 0x1734  [ 0A77D29F311B88CFAE3B13F9C1A73825, 8615DC6CEFB591505CE16E054A71A4F371B827DDFD5E980777AB4233DCFDA01D ] HidIr           C:\Windows\system32\drivers\hidir.sys
03:06:24.0908 0x1734  HidIr - ok
03:06:24.0946 0x1734  [ BD9EB3958F213F96B97B1D897DEE006D, 4D01CBF898B528B3A4E5A683DF2177300AFABD7D4CB51F1A7891B1B545499631 ] hidserv         C:\Windows\system32\hidserv.dll
03:06:24.0949 0x1734  hidserv - ok
03:06:25.0013 0x1734  [ 9592090A7E2B61CD582B612B6DF70536, FD11D5E02C32D658B28FCC35688AB66CCB5D3A0A0D74C82AE0F0B6C67B568A0F ] HidUsb          C:\Windows\system32\DRIVERS\hidusb.sys
03:06:25.0016 0x1734  HidUsb - ok
03:06:25.0536 0x1734  [ 7B3BE448BCACBF31FA486FAA67BF28C4, NCH Debut Video Capture 5.65 patch Archives, 62F523148F13FD8522895173B15CA81C2BFBF06C1F274929CEF591A644318ED0 ] HitmanPro37CrusaderBoot C:\Program Files\HitmanPro\HitmanPro.exe
03:06:25.0792 0x1734  HitmanPro37CrusaderBoot - ok
03:06:25.0920 0x1734  [ 760B03AE5E3244E22FFC3C1AE1F5264A, 1D926E28B95394C211CC29B898ECF3C3E19814EF4D09B04DBF9BDFB2596BD1AB ] HitmanProScheduler C:\Program Files\HitmanPro\hmpsched.exe
03:06:25.0927 0x1734  HitmanProScheduler - ok
03:06:25.0979 0x1734  [ 387E72E739E15E3D37907A86D9FF98E2, 9935BE2E58788E79328293AF2F202CB0F6042441B176F75ACC5AEA93C8E05531 ] hkmsvc          C:\Windows\system32\kmsvc.dll
03:06:25.0985 0x1734  NCH Debut Video Capture 5.65 patch Archives - ok
03:06:26.0029 0x1734  [ EFDFB3DD38A4376F93E7985173813ABD, 70402FA73A5A2A8BB557AAC8F531E373077D28DE5F40A1F3F14B940BE01CD2E1 ] HomeGroupListener C:\Windows\system32\ListSvc.dll
03:06:26.0040 0x1734  HomeGroupListener - ok
03:06:26.0120 0x1734  [ 908ACB1F594274965A53926B10C81E89, 7D34A742AC486294D82676F8465A3EF26C8AC3317C32B63F62031CB007CFC208 ] HomeGroupProvider C:\Windows\system32\provsvc.dll
03:06:26.0129 0x1734  HomeGroupProvider - ok
03:06:26.0206 0x1734  [ 39D2ABCD392F3D8A6DCE7B60AE7B8EFC, E9E6A1665740CFBC2DD321010007EF42ABA2102AEB9772EE8AA3354664B1E205 ] HpSAMD          C:\Windows\system32\drivers\HpSAMD.sys
03:06:26.0211 0x1734  HpSAMD - ok
03:06:26.0283 0x1734  [ 0EA7DE1ACB728DD5A369FD742D6EEE28, 21C489412EB33A12B22290EB701C19BA57006E8702E76F730954F0784DDE9779 ] HTTP            C:\Windows\system32\drivers\HTTP.sys
03:06:26.0301 0x1734  HTTP - ok
03:06:26.0316 0x1734  [ A5462BD6884960C9DC85ED49D34FF392, 53E65841AF5B06A2844D0BB6FC4DD3923A323FFA0E4BFC89B3B5CAFB592A3D53 ] hwpolicy        C:\Windows\system32\drivers\hwpolicy.sys
03:06:26.0317 0x1734  NCH Debut Video Capture 5.65 patch Archives - ok
03:06:26.0346 0x1734  [ FA55C73D4AFFA7EE23AC4BE53B4592D3, 65CDDC62B89A60E942C5642C9D8B539EFB69DA8069B4A2E54978154B314531CD ] i8042prt        C:\Windows\system32\DRIVERS\i8042prt.sys
03:06:26.0349 0x1734  i8042prt - ok
03:06:26.0415 0x1734  [ AAAF44DB3BD0B9D1FB6969B23ECC8366, 805AA4A9464002D1AB3832E4106B2AAA1331F4281367E75956062AAE99699385 ] iaStorV         C:\Windows\system32\drivers\iaStorV.sys
03:06:26.0434 0x1734  iaStorV - ok
03:06:26.0536 0x1734  [ 5988FC40F8DB5B0739CD1E3A5D0D78BD, 2B9512324DBA4A97F6AC34E8067EE08E3B6874CD60F6CB4209AFC22A34D2BE99 ] idsvc           C:\Windows\Microsoft.NET\Framework64\v3.0\Windows Communication Foundation\infocard.exe
03:06:26.0560 0x1734  idsvc - ok
03:06:26.0601 0x1734  IEEtwCollectorService - ok
03:06:26.0618 0x1734  [ 5C18831C61933628F5BB0EA2675B9D21, 5CD9DE2F8C0256623A417B5C55BF55BB2562BD7AB2C3C83BB3D9886C2FBDA4E4 ] iirsp           C:\Windows\system32\drivers\iirsp.sys
03:06:26.0619 0x1734  iirsp - ok
03:06:26.0727 0x1734  [ 344789398EC3EE5A4E00C52B31847946, NCH Debut Video Capture 5.65 patch Archives, 3DA5F08E4B46F4E63456AA588D49E39A6A09A97D0509880C00F327623DB6122D ] IKEEXT          C:\Windows\System32\ikeext.dll
03:06:26.0750 0x1734  IKEEXT - NCH Debut Video Capture 5.65 patch Archives 03:06:26.0783 0x1734  [ 4B6363CD4610BB848531BB260B15DFCC, 13A8AA9571497086341AC00797EFF212FF76EE62F9CFF758D3C08B377EC7BF04 ] Impcd           C:\Windows\system32\DRIVERS\Impcd.sys
03:06:26.0787 0x1734  Impcd - ok
03:06:27.0003 0x1734  [ 69976169745EDFB3225D9ABEB5E91155, D1AFF69AF178B46FD9F319AA9DF8738ACB03559DE24C1114EEF46A22D01F0982 ] IntcAzAudAddService C:\Windows\system32\drivers\RTKVHD64.sys
03:06:27.0093 0x1734  IntcAzAudAddService - ok
03:06:27.0188 0x1734  [ 58CF58DEE26C909BD6F977B61D246295, 0CE27B81C091961A22B75478449D654F9C1A68E43DF80C699DB8DD3D1B288461 ] IntcDAud        C:\Windows\system32\DRIVERS\IntcDAud.sys
03:06:27.0203 0x1734  IntcDAud - ok
03:06:27.0230 0x1734  [ F00F20E70C6EC3AA366910083A0518AA, E2F3E9FFD82C802C8BAC309893A3664ACF16A279959C0FDECCA64C3D3C60FD22 ] intelide        C:\Windows\system32\drivers\intelide.sys
03:06:27.0231 0x1734  intelide - ok
03:06:27.0968 0x1734  [ 09CE164AFA8483E41808784D7FCA154E, 43557E44C8339469BD34B54D2080AF041356F0201A7ECA3A6EEEA9C9C7D78F87 ] intelkmd        C:\Windows\system32\DRIVERS\igdpmd64.sys
03:06:28.0212 0x1734  intelkmd - ok
03:06:28.0358 0x1734  [ ADA036632C664CAA754079041CF1F8C1, F2386CC09AC6DE4C54189154F7D91C1DB7AA120B13FAE8BA5B579ACF99FCC610 ] intelppm        C:\Windows\system32\DRIVERS\intelppm.sys
03:06:28.0362 0x1734  intelppm - ok
03:06:28.0409 0x1734  [ 098A91C54546A3B878DAD6A7E90A455B, 044CCE2A0DF56EBE1EFD99B4F6F0A5B9EE12498CA358CF4B2E3A1CFD872823AA ] IPBusEnum       C:\Windows\system32\ipbusenum.dll
03:06:28.0413 0x1734  IPBusEnum - ok
03:06:28.0435 0x1734  [ C9F0E1BD74365A8771590E9008D22AB6, 728BC5A6AAE499FDC50EB01577AF16D83C2A9F3B09936DD2A89C01E074BA8E51 ] IpFilterDriver  C:\Windows\system32\DRIVERS\ipfltdrv.sys
03:06:28.0438 0x1734  IpFilterDriver - ok
03:06:28.0514 0x1734  [ 08C2957BB30058E663720C5606885653, E13EDF6701512E2A9977A531454932CA5023087CB50E1D2F416B8BCDD92B67BE ] iphlpsvc        C:\Windows\System32\iphlpsvc.dll
03:06:28.0536 0x1734  iphlpsvc - ok
03:06:28.0550 0x1734  [ 0FC1AEA580957AA8817B8F305D18CA3A, 7161E4DE91AAFC3FA8BF24FAE4636390C2627DB931505247C0D52C75A31473D9 ] IPMIDRV         C:\Windows\system32\drivers\IPMIDrv.sys
03:06:28.0552 0x1734  IPMIDRV - ok
03:06:28.0571 0x1734  [ AF9B39A7E7B6CAA203B3862582E9F2D0, 67128BE7EADBE6BD0205B050F96E268948E8660C4BAB259FB0BE03935153D04E ] IPNAT           C:\Windows\system32\drivers\ipnat.sys
03:06:28.0574 0x1734  IPNAT - ok
03:06:28.0594 0x1734  [ 3ABF5E7213EB28966D55D58B515D5CE9, A352BCC5B6B9A28805B15CAFB235676F1FAFF0D2394F88C03089EB157D6188AE ] IRENUM          C:\Windows\system32\drivers\irenum.sys
03:06:28.0595 0x1734  IRENUM - ok
03:06:28.0610 0x1734  [ 2F7B28DC3E1183E5EB418DF55C204F38, D40410A760965925D6F10959B2043F7BD4F68EAFCF5E743AF11AD860BD136548 ] isapnp          C:\Windows\system32\drivers\isapnp.sys
03:06:28.0611 0x1734  isapnp - ok
03:06:28.0654 0x1734  [ 96BB922A0981BC7432C8CF52B5410FE6, 236C05509B1040059B15021CBBDBDAF3B9C0F00910142BE5887B2C7561BAAFBA ] iScsiPrt        C:\Windows\system32\drivers\msiscsi.sys
03:06:28.0670 0x1734  iScsiPrt - ok
03:06:28.0714 0x1734  [ BC02336F1CBA7DCC7D1213BB588A68A5, 450C5BAD54CCE2AFCDFF1B6E7F8E1A8446D9D3255DF9D36C29A8F848048AAD93 ] kbdclass        C:\Windows\system32\DRIVERS\kbdclass.sys
03:06:28.0717 0x1734  kbdclass - ok
03:06:28.0748 0x1734  [ 0705EFF5B42A9DB58548EEC3B26BB484, 86C6824ED7ED6FA8F306DB6319A0FD688AA91295AE571262F9D8E96A32225E99 ] kbdhid          C:\Windows\system32\DRIVERS\kbdhid.sys
03:06:28.0751 0x1734  kbdhid - ok
03:06:28.0772 0x1734  [ 4D71227301DD8D09097B9E4CC6527E5A, 193D47ADCB722B581CC0F29B794AB3E455B6E9BEA367CE9A5216A09E055B7F1E ] KeyIso          C:\Windows\system32\lsass.exe
03:06:28.0776 0x1734  KeyIso - ok
03:06:28.0820 0x1734  [ 8F489706472F7E9A06BAAA198703FA64, F020406690FB38EABD82D63B91D33039CC93ED52A5497AE12BAF475F22D0B08A ] KSecDD          C:\Windows\system32\Drivers\ksecdd.sys
03:06:28.0825 0x1734  KSecDD - ok
03:06:28.0843 0x1734  [ 868A2CAAB12EFC7A021682BCA0EEC54C, 12C4925B5B3D6EA7B6410C01F33158C6EAB50CBD6AF445F8B04ED9899720C2DD ] KSecPkg         C:\Windows\system32\Drivers\ksecpkg.sys
03:06:28.0850 0x1734  KSecPkg - ok
03:06:28.0866 0x1734  [ 6869281E78CB31A43E969F06B57347C4, 866A23E69B32A78D378D6CB3B3DA3695FFDFF0FEC3C9F68C8C3F988DF417044B ] ksthunk         C:\Windows\system32\drivers\ksthunk.sys
03:06:28.0867 0x1734  ksthunk - ok
03:06:28.0921 0x1734  [ 6AB66E16AA859232F64DEB66887A8C9C, 5F2B579BEA8098A2994B0DECECDAE7B396E7B5DC5F09645737B9F28BEEA77FFF ] KtmRm           C:\Windows\system32\msdtckrm.dll
03:06:28.0932 0x1734  KtmRm - ok
03:06:29.0089 0x1734  [ B4D3522E89DB87F0DF722D73842B2513, 98FD5DE14D0F17A813F2D0285AAF6C4E8C152ED6A673D836C8D235C16932C73F ] LaCieDesktopManagerService C:\Program Files\LaCie\Desktop Manager\lacie_dm_service.exe
03:06:29.0123 0x1734  LaCieDesktopManagerService - ok
03:06:29.0190 0x1734  [ D9F42719019740BAA6D1C6D536CBDAA6, 8757599D0AE5302C4CE50861BEBA3A8DD14D7B0DBD916FD5404133688CDFCC40 ] LanmanServer    C:\Windows\system32\srvsvc.dll
03:06:29.0198 0x1734  LanmanServer - ok
03:06:29.0247 0x1734  NCH Debut Video Capture 5.65 patch Archives 851A1382EED3E3A7476DB004F4EE3E1A, B1C67F47DD594D092E6E258F01DF5E7150227CE3131A908A244DEE9F8A1FABF9 ] LanmanWorkstation C:\Windows\System32\wkssvc.dll
03:06:29.0254 0x1734  LanmanWorkstation - ok
03:06:29.0285 0x1734  [ 1538831CF8AD2979A04C423779465827, E1729B0CC4CEEE494A0B8817A8E98FF232E3A32FB023566EF0BC71A090262C0C ] lltdio          C:\Windows\system32\DRIVERS\lltdio.sys
03:06:29.0287 0x1734  lltdio - ok
03:06:29.0343 0x1734  [ C1185803384AB3FEED115F79F109427F, 0414FE73532DCAB17E906438A14711E928CECCD5F579255410C62984DD652700 ] lltdsvc         C:\Windows\System32\lltdsvc.dll
03:06:29.0352 NCH Debut Video Capture 5.65 patch Archives lltdsvc - ok
03:06:29.0368 0x1734  [ F993A32249B66C9D622EA5592A8B76B8, EE64672A990C6145DC5601E2B8CDBE089272A72732F59AF9865DCBA8B1717E70 ] lmhosts         C:\Windows\System32\lmhsvc.dll
03:06:29.0370 0x1734  lmhosts - ok
03:06:29.0477 0x1734  [ 7485FBCEF9136F530953575E2977859D, 5A6A67EE407C6ECE637C2B2AC21259BB86D032E47CE59F77AAF48D687B74CFCB ] LMS             C:\Program Files (x86)\Intel\Intel® Management Engine Components\LMS\LMS.exe
03:06:29.0484 0x1734  LMS - ok
03:06:29.0518 0x1734  [ 1A93E54EB0ECE102495A51266DCDB6A6, DB6AA86AA36C3A7988BE96E87B5D3251BE7617C54EE8F894D9DC2E267FE3255B ] LSI_FC          C:\Windows\system32\drivers\lsi_fc.sys
03:06:29.0521 0x1734  LSI_FC - ok
03:06:29.0569 0x1734  [ 1047184A9FDC8BDBFF857175875EE810, F2251EDB7736A26D388A0C5CC2FE5FB9C5E109CBB1E3800993554CB21D81AE4B ] LSI_SAS         C:\Windows\system32\drivers\lsi_sas.sys
03:06:29.0572 0x1734  LSI_SAS - ok
03:06:29.0590 0x1734  [ 30F5C0DE1EE8B5BC9306C1F0E4A75F93, 88D5740A4E9CC3FA80FA18035DAB441BDC5A039622D666BFDAA525CC9686BD06 ] LSI_SAS2        C:\Windows\system32\drivers\lsi_sas2.sys
03:06:29.0592 0x1734  LSI_SAS2 - ok
03:06:29.0609 0x1734  [ 0504EACAFF0D3C8AED161C4B0D369D4A, 4D272237C189646F5C80822FD3CBA7C2728E482E2DAAF7A09C8AEF811C89C54D ] LSI_SCSI        C:\Windows\system32\drivers\lsi_scsi.sys
03:06:29.0612 0x1734  LSI_SCSI - NCH Debut Video Capture 5.65 patch Archives 03:06:29.0649 0x1734  [ 43D0F98E1D56CCDDB0D5254CFF7B356E, 5BA498183B5C4996C694CB0A9A6B66CE6C7A460F6C91BEB9F305486FCC3B7B22 ] luafv           C:\Windows\system32\drivers\luafv.sys
03:06:29.0652 0x1734  luafv - ok
03:06:29.0699 0x1734  [ 0BE09CD858ABF9DF6ED259D57A1A1663, 2FD28889B93C8E801F74C1D0769673A461671E0189D0A22C94509E3F0EEB7428 ] Mcx2Svc         C:\Windows\system32\Mcx2Svc.dll
03:06:29.0705 0x1734  Mcx2Svc - ok
03:06:29.0797 0x1734  [ CF17A39BA7D1D1E386FD0C1303642B91, 8C7F6530F30C56241D54FC0799347E586332C1299DE1222AC9C08AD523E9CD96 ] MDA_NTDRV       C:\Windows\system32\MDA_NTDRV.sys
03:06:29.0800 0x1734  MDA_NTDRV - ok
03:06:29.0821 0x1734  [ A55805F747C6EDB6A9080D7C633BD0F4, 2DA0E83BF3C8ADEF6F551B6CC1C0A3F6149CDBE6EC60413BA1767C4DE425A728 ] megasas         C:\Windows\system32\drivers\megasas.sys
03:06:29.0823 0x1734  megasas - ok
03:06:29.0858 0x1734  [ BAF74CE0072480C3B6B7C13B2A94D6B3, 85CBB4949C090A904464F79713A3418338753D20D7FB811E68F287FDAC1DD834 ] MegaSR          C:\Windows\system32\drivers\MegaSR.sys
03:06:29.0869 0x1734  MegaSR - ok
03:06:30.0021 0x1734  NCH Debut Video Capture 5.65 patch Archives 123271BD5237AB991DC5C21FDF8835EB, 004F8F9228EE291A0E36CE33078D572D61733516F9AA5CFC832AF204C6869E89 ] Microsoft Office Groove Audit Service C:\Program Files (x86)\Microsoft Office\Office12\GrooveAuditService.exe
03:06:30.0026 0x1734  Microsoft Office Groove Audit Service - ok
03:06:30.0086 0x1734  [ E40E80D0304A73E8D269F7141D77250B, 0DB4AC13A264F19A84DC0BCED54E8E404014CC09C993B172002B1561EC7E265A ] MMCSS           C:\Windows\system32\mmcss.dll
03:06:30.0092 0x1734  MMCSS - ok
03:06:30.0114 0x1734  [ 800BA92F7010378B09F9ED9270F07137, 94F9AF9E1BE80AE6AC39A2A74EF9FAB115DCAACC011D07DFA8D6A1DDC8A93342 ] Modem           C:\Windows\system32\drivers\modem.sys
03:06:30.0116 0x1734  Modem - ok
03:06:30.0170 0x1734  [ B03D591DC7DA45ECE20B3B467E6AADAA, 701FB0CAD8138C58507BE28845D3E24CE269A040737C29885944A0D851238732 ] monitor         C:\Windows\system32\DRIVERS\monitor.sys
03:06:30.0172 0x1734  monitor - ok
03:06:30.0191 0x1734  [ 7D27EA49F3C1F687D357E77A470AEA99, 7FE7CAF95959F127C6D932C01D539C06D80273C49A09761F6E8331C05B1A7EE7 ] mouclass        C:\Windows\system32\DRIVERS\mouclass.sys
03:06:30.0194 0x1734  mouclass - ok
03:06:30.0226 0x1734  [ D3BF052C40B0C4166D9FD86A4288C1E6, 5E65264354CD94E844BF1838CA1B8E49080EFA34605A32CF2F6A47A2B97FC183 ] mouhid          C:\Windows\system32\DRIVERS\mouhid.sys
03:06:30.0228 0x1734  mouhid - ok
03:06:30.0244 0x1734  [ 32E7A3D591D671A6DF2DB515A5CBE0FA, 47CED0B9067AE8BF5EEF60B17ADEE5906BEDCC56E4CB460B7BFBC12BB9A69E63 ] mountmgr        C:\Windows\system32\drivers\mountmgr.sys
03:06:30.0248 0x1734  mountmgr - ok
03:06:30.0370 0x1734  [ C8F70DDFD2CAA5B624CABF267304215D, 1734BC28470D5CAEC6154BA9BC44ADE25D55653C897724EFB93C74F73E45DAF7 ] MozillaMaintenance C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
03:06:30.0379 0x1734  MozillaMaintenance - ok
03:06:30.0456 0x1734  [ 9EB89625A82AC961F25E7C865947BF9A, 91DB9530CDE883DC60BE621AC4210ACD069631D9466E37411D9D6AEE587098D9 ] MpFilter        C:\Windows\system32\DRIVERS\MpFilter.sys
03:06:30.0471 0x1734  MpFilter - ok
03:06:30.0492 0x1734  [ A44B420D30BD56E145D6A2BC8768EC58, B1E4DCA5A1008FA7A0492DC091FB2B820406AE13FD3D44F124E89B1037AF09B8 ] mpio            C:\Windows\system32\drivers\mpio.sys
03:06:30.0496 NCH Debut Video Capture 5.65 patch Archives mpio - ok
03:06:30.0534 0x1734  [ 6C38C9E45AE0EA2FA5E551F2ED5E978F, 5A3FA2F110029CB4CC4384998EDB59203FDD65EC45E01B897FB684F8956EAD20 ] mpsdrv          C:\Windows\system32\drivers\mpsdrv.sys
03:06:30.0536 0x1734  mpsdrv - ok
03:06:30.0637 0x1734  [ 54FFC9C8898113ACE189D4AA7199D2C1, 65F585C87F3F710FD5793FDFA96B740AD8D4317B0C120F4435CCF777300EA4F2 ] MpsSvc          C:\Windows\system32\mpssvc.dll
03:06:30.0658 0x1734  MpsSvc - ok
03:06:30.0710 0x1734  [ 1A4F75E63C9FB84B85DFFC6B63FD5404, 01AFA6DBB4CDE55FE4EA05BBE8F753A4266F8D072EA1EE01DB79F5126780C21F ] MRxDAV          C:\Windows\system32\drivers\mrxdav.sys
03:06:30.0714 0x1734  MRxDAV - ok
03:06:30.0798 0x1734  [ A5D9106A73DC88564C825D317CAC68AC, 0457B2AEA4E05A91D0E43F317894A614434D8CEBE35020785387F307E231FBE4 ] mrxsmb          C:\Windows\system32\DRIVERS\mrxsmb.sys
03:06:30.0807 0x1734  mrxsmb - ok
03:06:30.0836 0x1734  [ D711B3C1D5F42C0C2415687BE09FC163, 9B3013AC60BD2D0FF52086658BA5FF486ADE15954A552D7DD590580E8BAE3EFF ] mrxsmb10        C:\Windows\system32\DRIVERS\mrxsmb10.sys
03:06:30.0845 0x1734  mrxsmb10 - ok
03:06:30.0905 0x1734  [ 9423E9D355C8D303E76B8CFBD8A5C30C, 220B33F120C2DD937FE4D5664F4B581DC0ACF78D62EB56B7720888F67B9644CC ] mrxsmb20        C:\Windows\system32\DRIVERS\mrxsmb20.sys
03:06:30.0912 0x1734  mrxsmb20 - ok
03:06:30.0974 0x1734  [ C25F0BAFA182CBCA2DD3C851C2E75796, NCH Debut Video Capture 5.65 patch Archives, 643E158A0948DF331807AEAA391F23960362E46C0A0CF6D22A99020EAE7B10F8 ] msahci          C:\Windows\system32\drivers\msahci.sys
03:06:30.0976 0x1734  msahci - ok
03:06:31.0044 0x1734  [ DB801A638D011B9633829EB6F663C900, B34FD33A215ACCF2905F4B7D061686CDB1CB9C652147AF56AE14686C1F6E3C74 ] msdsm           C:\Windows\system32\drivers\msdsm.sys
03:06:31.0053 0x1734  msdsm - ok
03:06:31.0089 0x1734  [ DE0ECE52236CFA3ED2DBFC03F28253A8, 2FBBEC4CACB5161F68D7C2935852A5888945CA0F107CF8A1C01F4528CE407DE3 ] MSDTC           C:\Windows\System32\msdtc.exe
03:06:31.0099 0x1734  MSDTC - ok
03:06:31.0139 0x1734  [ AA3FB40E17CE1388FA1BEDAB50EA8F96, 69F93E15536644C8FD679A20190CFE577F4985D3B1B4A4AA250A168615AE1E99 ] Msfs            C:\Windows\system32\drivers\Msfs.sys
03:06:31.0141 0x1734  Msfs - NCH Debut Video Capture 5.65 patch Archives 03:06:31.0172 0x1734  [ F9D215A46A8B9753F61767FA72A20326, 6F76642B45E0A7EF6BCAB8B37D55CCE2EAA310ED07B76D43FCB88987C2174141 ] mshidkmdf       C:\Windows\System32\drivers\mshidkmdf.sys
03:06:31.0173 0x1734  mshidkmdf - ok
03:06:31.0195 0x1734  [ D916874BBD4F8B07BFB7FA9B3CCAE29D, B229DA150713DEDBC4F05386C9D9DC3BC095A74F44F3081E88311AB73BC992A1 ] msisadrv        C:\Windows\system32\drivers\msisadrv.sys
03:06:31.0196 0x1734  msisadrv - ok
03:06:31.0248 0x1734  [ 808E98FF49B155C522E6400953177B08, F873F5BFF0984C5165DF67E92874D3F6EB8D86F9B5AD17013A0091CA33A1A3D5 ] MSiSCSI         C:\Windows\system32\iscsiexe.dll
03:06:31.0259 0x1734  MSiSCSI - ok
03:06:31.0264 0x1734  msiserver - ok
03:06:31.0439 0x1734  [ C23F5F6865AD25DD70A00A32DEA2D0A9, 5C284AC9ABED799D6668096D3FBA9C26C9BDA844B91D93CB057048725CAA56B5 ] MSI_SuperCharger C:\Program Files (x86)\MSI\Super-Charger\ChargeService.exe
03:06:31.0447 0x1734  MSI_SuperCharger - ok
03:06:31.0474 0x1734  [ 49CCF2C4FEA34FFAD8B1B59D49439366, E5752EA57C7BDAD5F53E3BC441A415E909AC602CAE56234684FB8789A20396C7 ] MSKSSRV         C:\Windows\system32\drivers\MSKSSRV.sys
03:06:31.0475 0x1734  MSKSSRV - ok
03:06:31.0588 0x1734  [ 89F2AEDC2788696702141AB82C3E7866, E166CBD8D3C708737C37172221945D8E56C25C2CC750889C3CE14AA2DE750F33 ] MsMpSvc         C:\Program Files\Microsoft Security Client\MsMpEng.exe
03:06:31.0590 0x1734  MsMpSvc - ok
03:06:31.0603 0x1734  [ BDD71ACE35A232104DDD349EE70E1AB3, NCH Debut Video Capture 5.65 patch Archives, 27464A66868513BE6A01B75D7FC5B0D6B71842E4E20CE3F76B15C071A0618BBB ] MSPCLOCK        C:\Windows\system32\drivers\MSPCLOCK.sys
03:06:31.0604 0x1734  MSPCLOCK - ok
03:06:31.0615 0x1734  [ 4ED981241DB27C3383D72092B618A1D0, E12F121E641249DB3491141851B59E1496F4413EDF58E863388F1C229838DFCC ] MSPQM           C:\Windows\system32\drivers\MSPQM.sys
03:06:31.0615 0x1734  MSPQM - ok
03:06:31.0639 0x1734  [ 759A9EEB0FA9ED79DA1FB7D4EF78866D, 64E3BC613EC4872B1B344CBF71EE15BE195592E3244C1EE099C6F8B95A40F133 ] MsRPC           C:\Windows\system32\drivers\MsRPC.sys
03:06:31.0648 0x1734  MsRPC - ok
03:06:31.0663 0x1734  [ 0EED230E37515A0EAEE3C2E1BC97B288, B1D8F8A75006B6E99214CA36D27A8594EF8D952F315BEB201E9BAC9DE3E64D42 ] mssmbios        C:\Windows\system32\DRIVERS\mssmbios.sys
03:06:31.0664 0x1734  mssmbios - ok
03:06:31.0679 0x1734  [ 2E66F9ECB30B4221A318C92AC2250779, DF175E1AB6962303E57F26DAE5C5C1E40B8640333F3E352A64F6A5F1301586CD ] MSTEE           C:\Windows\system32\drivers\MSTEE.sys
03:06:31.0680 0x1734  MSTEE - ok
03:06:31.0696 0x1734  [ 7EA404308934E675BFFDE8EDF0757BCD, 306CD02D89CFCFE576242360ED5F9EEEDCAFC43CD43B7D2977AE960F9AEC3232 ] MTConfig        C:\Windows\system32\drivers\MTConfig.sys
03:06:31.0697 0x1734  MTConfig - ok
03:06:31.0715 0x1734  [ F9A18612FD3526FE473C1BDA678D61C8, 32F7975B5BAA447917F832D9E3499B4B6D3E90D73F478375D0B70B36C524693A ] Mup             C:\Windows\system32\Drivers\mup.sys
03:06:31.0717 0x1734  Mup - ok
03:06:31.0794 0x1734  [ 582AC6D9873E31DFA28A4547270862DD, BD540499F74E8F59A020D935D18E36A3A97C1A6EC59C8208436469A31B16B260 ] napagent        C:\Windows\system32\qagentRT.dll
03:06:31.0809 0x1734  napagent - ok
03:06:31.0854 0x1734  [ 1EA3749C4114DB3E3161156FFFFA6B33, 54C2E77BCE1037711A11313AC25B8706109098C10A31AA03AEB7A185E97800D7 ] NativeWifiP     C:\Windows\system32\DRIVERS\nwifi.sys
03:06:31.0863 0x1734  NativeWifiP - ok
03:06:31.0993 0x1734  [ 1BBBF640BC0E0B750537BAECE8D66C18, 621C1130B0C48AA900D78097E1685507A614AA9953644972C572DE267B2A6348 ] NAUpdate        C:\Program Files (x86)\Nero\Update\NASvc.exe
03:06:32.0016 0x1734  NAUpdate - ok
03:06:32.0133 0x1734  [ 760E38053BF56E501D562B70AD796B88, F856E81A975D44F8684A6F2466549CEEDFAEB3950191698555A93A1206E0A42D ] NDIS            C:\Windows\system32\drivers\ndis.sys
03:06:32.0156 0x1734  NDIS - ok
03:06:32.0169 0x1734  [ 9F9A1F53AAD7DA4D6FEF5BB73AB811AC, D7E5446E83909AE25506BB98FBDD878A529C87963E3C1125C4ABAB25823572BC ] NdisCap         C:\Windows\system32\DRIVERS\ndiscap.sys
03:06:32.0170 0x1734  NdisCap - ok
03:06:32.0199 0x1734  [ 30639C932D9FEF22B31268FE25A1B6E5, 32873D95339600F6EEFA51847D12C563FF01F320DC59055B242FA2887C99F9D6 ] NdisTapi        C:\Windows\system32\DRIVERS\ndistapi.sys
03:06:32.0200 0x1734  NdisTapi - ok
03:06:32.0213 0x1734  [ 136185F9FB2CC61E573E676AA5402356, BA3AD0A33416DA913B4242C6BE8C3E5812AD2B20BA6C11DD3094F2E8EB56E683 ] Ndisuio         C:\Windows\system32\DRIVERS\ndisuio.sys
03:06:32.0215 0x1734  Ndisuio - ok
03:06:32.0233 0x1734  [ 53F7305169863F0A2BDDC49E116C2E11, 881E9346D3C02405B7850ADC37E720990712EC9C666A0CE96E252A487FD2CE77 ] NdisWan         C:\Windows\system32\DRIVERS\ndiswan.sys
03:06:32.0238 0x1734  NdisWan - ok
03:06:32.0254 0x1734  [ 015C0D8E0E0421B4CFD48CFFE2825879, 4242E2D42CCFC859B2C0275C5331798BC0BDA68E51CF4650B6E64B1332071023 ] NDProxy         C:\Windows\system32\drivers\NDProxy.sys
03:06:32.0256 0x1734  NDProxy - ok
03:06:32.0303 0x1734  [ 62B511C3920978B4CE087F7E01DAD9A3, NCH Debut Video Capture 5.65 patch Archives ] Neo_VPN-test    C:\Windows\system32\DRIVERS\Neo_0053.sys
03:06:32.0304 0x1734  Neo_VPN-test - ok
03:06:32.0321 0x1734  [ 86743D9F5D2B1048062B14B1D84501C4, DBF6D6A60AB774FCB0F464FF2D285A7521D0A24006687B243AB46B17D8032062 ] NetBIOS         C:\Windows\system32\DRIVERS\netbios.sys
03:06:32.0323 0x1734  NetBIOS - ok
03:06:32.0349 0x1734  [ 09594D1089C523423B32A4229263F068, 7426A9B8BA27D3225928DDEFBD399650ABB90798212F56B7D12158AC22CCCE37 ] NetBT           C:\Windows\system32\DRIVERS\netbt.sys
03:06:32.0356 0x1734  NetBT - ok
03:06:32.0372 0x1734  [ 4D71227301DD8D09097B9E4CC6527E5A, 193D47ADCB722B581CC0F29B794AB3E455B6E9BEA367CE9A5216A09E055B7F1E ] Netlogon        C:\Windows\system32\lsass.exe
03:06:32.0374 0x1734  Netlogon - ok
03:06:32.0441 0x1734  [ 847D3AE376C0817161A14A82C8922A9E, 37AE692B3481323134125EF58F2C3CBC20177371AF2F5874F53DD32A827CB936 ] Netman          C:\Windows\System32\netman.dll
03:06:32.0462 0x1734  Netman - ok
03:06:32.0513 0x1734  [ 21318671BCAD3ACF16638F98D4D00973, CEA6E3B6BCB4B74A9ACACBEEA12EEA967BBC2240398E2EBC04D7910109CACA11 ] NetMsmqActivator C:\windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe
03:06:32.0517 0x1734  NetMsmqActivator - ok
03:06:32.0535 0x1734  [ 21318671BCAD3ACF16638F98D4D00973, CEA6E3B6BCB4B74A9ACACBEEA12EEA967BBC2240398E2EBC04D7910109CACA11 ] NetPipeActivator C:\windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe
03:06:32.0539 0x1734  NetPipeActivator - ok
03:06:32.0558 0x1734  [ 5F28111C648F1E24F7DBC87CDEB091B8, 2E8645285921EDB98BB2173E11E57459C888D52E80D85791D169C869DE8813B9 ] netprofm        C:\Windows\System32\netprofm.dll
03:06:32.0571 0x1734  netprofm - ok
03:06:32.0733 0x1734  [ 78DFEAB988E0B0EA4ECF29D908D09AF6, E7D447CBBF4B3B561D5062CE5B7B26E8430D2A0DA7E0F59CC3A07839B37E8136 ] netr28ux        C:\Windows\system32\DRIVERS\netr28ux.sys
03:06:32.0787 0x1734  netr28ux - ok
03:06:32.0812 0x1734  [ 21318671BCAD3ACF16638F98D4D00973, CEA6E3B6BCB4B74A9ACACBEEA12EEA967BBC2240398E2EBC04D7910109CACA11 ] NetTcpActivator C:\windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe
03:06:32.0817 0x1734  NetTcpActivator - ok
03:06:32.0824 0x1734  [ 21318671BCAD3ACF16638F98D4D00973, CEA6E3B6BCB4B74A9ACACBEEA12EEA967BBC2240398E2EBC04D7910109CACA11 ] NetTcpPortSharing C:\windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe
03:06:32.0828 0x1734  NetTcpPortSharing - ok
03:06:32.0894 0x1734  [ 77889813BE4D166CDAB78DDBA990DA92, 2EF531AE502B943632EEC66A309A8BFCDD36120A5E1473F4AAF3C2393AD0E6A3 ] nfrd960         C:\Windows\system32\drivers\nfrd960.sys
03:06:32.0899 0x1734  nfrd960 - ok
03:06:32.0949 0x1734  [ C3E0696C3B42F694C5822776AA6FFFDF, 80C3DEC2C48500F96C9E677450EFC1ADA9FE9FBB70F4CC2D7D9244B1A515418B ] NisDrv          C:\Windows\system32\DRIVERS\NisDrvWFP.sys
03:06:32.0957 0x1734  NisDrv - ok
03:06:33.0033 0x1734  NCH Debut Video Capture 5.65 patch Archives DCEE3592299B2229A0DB98CB415059A2, 709AAA095DF44DDCB6159CE1635AB05EC666D845445790E569F56B297DC64AC3 ] NisSrv          C:\Program Files\Microsoft Security Client\NisSrv.exe
03:06:33.0045 0x1734  NisSrv - ok
03:06:33.0099 0x1734  [ 8AD77806D336673F270DB31645267293, E23F324913554A23CD043DD27D4305AF62F48C0561A0FC7B7811E55B74B1BE79 ] NlaSvc          C:\Windows\System32\nlasvc.dll
03:06:33.0118 0x1734  NlaSvc - ok
03:06:33.0175 0x1734  [ DE7FCC77F4A503AF4CA6A47D49B3713D, 4BFAA99393F635CD05D91A64DE73EDB5639412C129E049F0FE34F88517A10FC6 ] NPF             C:\Windows\system32\drivers\npf.sys
03:06:33.0178 0x1734  NPF - ok
03:06:33.0199 0x1734  [ 1E4C4AB5C9B8DD13179BBDC75A2A01F7, D8957EF7060A69DBB3CD6B2C45B1E4143592AB8D018471E17AC04668157DC67F ] Npfs            C:\Windows\system32\drivers\Npfs.sys
03:06:33.0202 0x1734  Npfs - ok
03:06:33.0261 0x1734  [ D54BFDF3E0C953F823B3D0BFE4732528, 497A1DCC5646EC22119273216DF10D5442D16F83E4363770F507518CF6EAA53A ] nsi             C:\Windows\system32\nsisvc.dll
03:06:33.0265 0x1734  nsi - ok
03:06:33.0294 0x1734  [ E7F5AE18AF4168178A642A9247C63001, 133023B7E4BA8049C4CAED3282BDD25571D1CC25FAC3B820C7F981D292689D76 ] nsiproxy        C:\Windows\system32\drivers\nsiproxy.sys
03:06:33.0296 0x1734  nsiproxy NCH Debut Video Capture 5.65 patch Archives ok
03:06:33.0440 0x1734  [ 1A29A59A4C5BA6F8C85062A613B7E2B2, CC137F499A12C724D4166C2D85E9F447413419A0683DAC6F1A802B7F210C77F1 ] Ntfs            C:\Windows\system32\drivers\Ntfs.sys
03:06:33.0481 0x1734  Ntfs - ok
03:06:33.0541 0x1734  [ 23CF3DA010497EB2BF39A5C5A57E437C, 39CFDE7D401EFCE4F550E0A9461F5FC4D71FA07235E1336E4F0B4882BD76550E ] NTIOLib_1_0_3   C:\Program Files (x86)\MSI\Super-Charger\NTIOLib_X64.sys
03:06:33.0542 0x1734  NTIOLib_1_0_3 - ok
03:06:33.0637 0x1734  [ 1B32C54B95121AB1683C7B83B2DB4B96, 99F4994A0E5BD1BF6E3F637D3225C69FF4CD620557E23637533E7F18D7D6CBA1 ] NTIOLib_1_0_4   C:\Program Files (x86)\msi\Live Update 5\NTIOLib_X64.sys
03:06:33.0638 0x1734  NTIOLib_1_0_4 - ok
03:06:33.0660 0x1734  [ 9899284589F75FA8724FF3D16AED75C1, 181188599FD5D4DE33B97010D9E0CAEABAB9A3EF50712FE7F9AA0735CD0666D6 ] Null            C:\Windows\system32\drivers\Null.sys
03:06:33.0660 0x1734  Null - ok
03:06:33.0693 0x1734  [ 0A92CB65770442ED0DC44834632F66AD, 581327F07A68DBD5CC749214BE5F1211FC2CE41C7A4F0656B680AFB51A35ACE7 ] nvraid          C:\Windows\system32\drivers\nvraid.sys
03:06:33.0699 0x1734  nvraid - ok
03:06:33.0781 0x1734  [ DAB0E87525C10052BF65F06152F37E4A, AD9BFF0D5FD3FFB95C758B478E1F6A9FE45E7B37AEC71EB5070D292FEAAEDF37 ] nvstor          C:\Windows\system32\drivers\nvstor.sys
03:06:33.0789 0x1734  nvstor - ok
03:06:33.0825 0x1734  [ 270D7CD42D6E3979F6DD0146650F0E05, 752489E54C9004EDCBE1F1F208FFD864DA5C83E59A2DDE6B3E0D63ECA996F76F ] nv_agp          C:\Windows\system32\drivers\nv_agp.sys
03:06:33.0830 0x1734  nv_agp - ok
03:06:33.0996 0x1734  [ 785F487A64950F3CB8E9F16253BA3B7B, 02445344BD214370A6D48B1CA04921D8EFCB13E676B5648266DD0E076C0822B6 ] odserv          C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE12\ODSERV.EXE
03:06:34.0015 0x1734  odserv - ok
03:06:34.0036 0x1734  [ 3589478E4B22CE21B41FA1BFC0B8B8A0, AD2469FC753FE552CB809FF405A9AB23E7561292FE89117E3B3B62057EFF0203 ] ohci1394        C:\Windows\system32\drivers\ohci1394.sys
03:06:34.0038 0x1734  ohci1394 - ok
03:06:34.0101 0x1734  [ 5A432A042DAE460ABE7199B758E8606C, 6E5D1F477D290905BE27CEBF9572BAC6B05FFEF2FAD901D3C8E11F665F8B9A71 ] ose             C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE
03:06:34.0109 0x1734  ose - ok
03:06:34.0441 0x1734  [ 61BFFB5F57AD12F83AB64B7181829B34, 1DD0DD35E4158F95765EE6639F217DF03A0A19E624E020DBA609268C08A13846 ] osppsvc         C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE
03:06:34.0558 0x1734  osppsvc - ok
03:06:34.0648 0x1734  [ 3EAC4455472CC2C97107B5291E0DCAFE, E51F373F2DBEAEE516B42BAE8C1B5BB68D00B881323E842CB6EDEC0A183CFFC3 ] p2pimsvc        C:\Windows\system32\pnrpsvc.dll
03:06:34.0662 0x1734  p2pimsvc - ok
03:06:34.0734 0x1734  [ 927463ECB02179F88E4B9A17568C63C3, FEFD3447692C277D59EEC7BF218552C8BB6B8C98C26E973675549628408B94CE ] p2psvc          C:\Windows\system32\p2psvc.dll
03:06:34.0749 0x1734  p2psvc - ok
03:06:34.0769 0x1734  [ 0086431C29C35BE1DBC43F52CC273887, 0D116D49EF9ABB57DA005764F25E692622210627FC2048F06A989B12FA8D0A80 ] Parport         C:\Windows\system32\drivers\parport.sys
03:06:34.0772 0x1734  Parport - ok
03:06:34.0829 0x1734  [ E9766131EEADE40A27DC27D2D68FBA9C, NCH Debut Video Capture 5.65 patch Archives, 63C295EC96DBD25F1A8B908295CCB86B54F2A77A02AAA11E5D9160C2C1A492B6 ] partmgr         C:\Windows\system32\drivers\partmgr.sys
03:06:34.0833 0x1734  partmgr - ok
03:06:34.0864 0x1734  [ 3AEAA8B561E63452C655DC0584922257, 04C072969B58657602EB0C21CEDF24FCEE14E61B90A0F758F93925EF2C9FC32D ] PcaSvc          C:\Windows\System32\pcasvc.dll
03:06:34.0874 0x1734  PcaSvc - ok
03:06:34.0898 0x1734  pccsmcfd - ok
03:06:34.0966 0x1734  [ 94575C0571D1462A0F70BDE6BD6EE6B3, 7139BAC653EA94A3DD3821CAB35FC5E22F4CCA5ACC2BAABDAA27E4C3C8B27FC9 ] pci             C:\Windows\system32\drivers\pci.sys
03:06:34.0976 0x1734  pci - ok
03:06:35.0022 0x1734  [ B5B8B5EF2E5CB34DF8DCF8831E3534FA, F2A7CC645B96946CC65BF60E14E70DC09C848D27C7943CE5DEA0C01A6B863480 ] pciide          C:\Windows\system32\drivers\pciide.sys
03:06:35.0024 0x1734  pciide - ok
03:06:35.0052 0x1734  [ B2E81D4E87CE48589F98CB8C05B01F2F, 6763BEE7270A4873B3E131BFB92313E2750FCBD0AD73C23D1C4F98F7DF73DE14 ] pcmcia          C:\Windows\system32\drivers\pcmcia.sys
03:06:35.0063 0x1734  pcmcia - ok
03:06:35.0089 0x1734  [ D6B9C2E1A11A3A4B26A182FFEF18F603, BBA5FE08B1DDD6243118E11358FD61B10E850F090F061711C3CB207CE5FBBD36 ] pcw             C:\Windows\system32\drivers\pcw.sys
03:06:35.0091 0x1734  pcw - ok
03:06:35.0161 0x1734  [ 68769C3356B3BE5D1C732C97B9A80D6E, FB2D61145980A2899D1B7729184C54070315B0E63C9A22400A76CCD39E00029C ] PEAUTH          C:\Windows\system32\drivers\peauth.sys
03:06:35.0177 0x1734  PEAUTH - ok
03:06:35.0314 0x1734  [ E495E408C93141E8FC72DC0C6046DDFA, 489B957DADA0DC128A09468F1AD082DCC657E86053208EA06A12937BE86FB919 ] PerfHost        C:\Windows\SysWow64\perfhost.exe
03:06:35.0317 0x1734  PerfHost - ok
03:06:35.0451 0x1734  [ C7CF6A6E137463219E1259E3F0F0DD6C, 08D7244F52AA17DD669AA6F77C291DAC88E7B2D1887DE422509C1F83EC85F3DD ] pla             C:\Windows\system32\pla.dll
03:06:35.0487 0x1734  pla - ok
03:06:35.0560 0x1734  [ 25FBDEF06C4D92815B353F6E792C8129, 57D9764AE6BCE33B242C399CDFC10DD405975BD6411CA8C75FBCD06EEB8442A9 ] PlugPlay        C:\Windows\system32\umpnpmgr.dll
03:06:35.0574 0x1734  PlugPlay - ok
03:06:35.0585 0x1734  [ 7195581CEC9BB7D12ABE54036ACC2E38, 9C4E5D6EA984148F2663DC529083408B2248DFF6DAAC85D9195F80A722782315 ] PNRPAutoReg     C:\Windows\system32\pnrpauto.dll
03:06:35.0588 0x1734  PNRPAutoReg - ok
03:06:35.0617 0x1734  [ 3EAC4455472CC2C97107B5291E0DCAFE, E51F373F2DBEAEE516B42BAE8C1B5BB68D00B881323E842CB6EDEC0A183CFFC3 ] PNRPsvc         C:\Windows\system32\pnrpsvc.dll
03:06:35.0626 0x1734  PNRPsvc - ok
03:06:35.0701 0x1734  [ 4F15D75ADF6156BF56ECED6D4A55C389, 2ADA3EA69A5D7EC2A4D2DD89178DB94EAFDDF95F07B0070D654D9F7A5C12A044 ] PolicyAgent     C:\Windows\System32\ipsecsvc.dll
03:06:35.0714 0x1734  PolicyAgent - ok
03:06:35.0785 0x1734  [ 6BA9D927DDED70BD1A9CADED45F8B184, 66203CE70A5EDE053929A940F38924C6792239CCCE10DD2C1D90D5B4D6748B55 ] Power           C:\Windows\system32\umpo.dll
03:06:35.0797 0x1734  Power - ok
03:06:35.0848 0x1734  [ F92A2C41117A11A00BE01CA01A7FCDE9, 38ADC6052696D110CA5F393BC586791920663F5DA66934C2A824DDA9CD89C763 ] PptpMiniport    C:\Windows\system32\DRIVERS\raspptp.sys
03:06:35.0854 0x1734  PptpMiniport - ok
03:06:35.0903 0x1734  [ 0D922E23C041EFB1C3FAC2A6F943C9BF, 855418A6A58DCAFB181A1A68613B3E203AFB0A9B3D9D26D0C521F9F613B4EAD5 ] Processor       C:\Windows\system32\drivers\processr.sys
03:06:35.0906 0x1734  Processor - ok
03:06:35.0967 0x1734  [ 53E83F1F6CF9D62F32801CF66D8352A8, 1225FED810BE8E0729EEAE5B340035CCBB9BACD3EF247834400F9B72D05ACE48 ] ProfSvc         C:\Windows\system32\profsvc.dll
03:06:35.0980 0x1734  ProfSvc - ok
03:06:35.0995 0x1734  [ 4D71227301DD8D09097B9E4CC6527E5A, 193D47ADCB722B581CC0F29B794AB3E455B6E9BEA367CE9A5216A09E055B7F1E ] ProtectedStorage C:\Windows\system32\lsass.exe
03:06:35.0998 0x1734  ProtectedStorage - ok
03:06:36.0097 0x1734  [ A53A15A11EBFD21077463EE2C7AFEEF0, 6002B012A75045DEA62640A864A8721EADE2F8B65BEB5F5BA76D8CD819774489 ] ql2300          C:\Windows\system32\drivers\ql2300.sys
03:06:36.0133 0x1734  ql2300 - ok
03:06:36.0159 0x1734  [ 4F6D12B51DE1AAEFF7DC58C4D75423C8, FB6ABAB741CED66A79E31A45111649F2FA3E26CEE77209B5296F789F6F7D08DE ] ql40xx          C:\Windows\system32\drivers\ql40xx.sys
03:06:36.0162 0x1734  ql40xx - ok
03:06:36.0239 0x1734  [ 906191634E99AEA92C4816150BDA3732, A0305436384104C3B559F9C73902DA19B96B518413379E397C5CDAB0B2B9418F ] QWAVE           C:\Windows\system32\qwave.dll
03:06:36.0255 0x1734  QWAVE - ok
03:06:36.0278 0x1734  [ 76707BB36430888D9CE9D705398ADB6C, 35C1D1D05F98AC29A33D3781F497A0B40A3CB9CDF25FE1F28F574E40DDF70535 ] QWAVEdrv        C:\Windows\system32\drivers\qwavedrv.sys
03:06:36.0279 0x1734  QWAVEdrv - ok
03:06:36.0428 0x1734  [ E3D78F6FE54B27DE451E350AC908E8B4, 55F4EC8044E513640867DC9521279FA92D8C753807049D136C9C1D041B99E254 ] RalinkRegistryWriter C:\Program Files (x86)\Ralink\Common\RaRegistry.exe
03:06:36.0447 0x1734  RalinkRegistryWriter - ok
03:06:36.0479 0x1734  [ 956C8ADBCBCD003AEE3D34B10E94D04A, 25A419A8283D56BCCD743482696F1FB430CB201211127490E3120F2452D3B701 ] RalinkRegistryWriter64 C:\Program Files (x86)\Ralink\Common\RaRegistry64.exe
03:06:36.0490 0x1734  RalinkRegistryWriter64 - ok
03:06:36.0623 0x1734  [ 2977F7750EA2BECB3E623814D2C18800, A2FAE078FC18481C59D7D3B465D4E53756D85C1C49F6471D3840EEF49814EA19 ] RaMediaServer   C:\Program Files (x86)\Ralink\Common\RaMediaServer.exe
03:06:36.0667 0x1734  RaMediaServer - ok
03:06:36.0764 0x1734  [ 5A0DA8AD5762FA2D91678A8A01311704, 8A64EB5DBAB7048A9E42A21CEB62CCD5B007A80C199892D7F8C69B48E8A255EF ] RasAcd          C:\Windows\system32\DRIVERS\rasacd.sys
03:06:36.0766 0x1734  RasAcd - ok
03:06:36.0817 0x1734  [ 7ECFF9B22276B73F43A99A15A6094E90, 62C70DA127F48F796F8897BBFA23AB6EB080CC923F0F091DFA384A93F5C90CA1 ] RasAgileVpn     C:\Windows\system32\DRIVERS\AgileVpn.sys
03:06:36.0820 0x1734  RasAgileVpn - ok
03:06:36.0865 0x1734  [ 8F26510C5383B8DBE976DE1CD00FC8C7, 60E618C010E8A723960636415573FA17EA0BBEF79647196B3BC0B8DEE680E090 ] RasAuto         C:\Windows\System32\rasauto.dll
03:06:36.0871 0x1734  RasAuto - ok
03:06:36.0896 0x1734  [ 471815800AE33E6F1C32FB1B97C490CA, 27307265F743DE3A3A3EC1B2C472A3D85FDD0AEC458E0B1177593141EE072698 ] Rasl2tp         C:\Windows\system32\DRIVERS\rasl2tp.sys
03:06:36.0901 0x1734  Rasl2tp - ok
03:06:36.0941 0x1734  [ EE867A0870FC9E4972BA9EAAD35651E2, 1B848D81705081FD2E18AC762DA7F51455657DAF860BF363DC15925A148BCADA ] RasMan          C:\Windows\System32\rasmans.dll
03:06:36.0956 NCH Debut Video Capture 5.65 patch Archives RasMan - ok
03:06:36.0968 0x1734  [ 855C9B1CD4756C5E9A2AA58A15F58C25, A514F8A9C304D54BDA8DC60F5A64259B057EC83A1CAAF6D2B58CFD55E9561F72 ] RasPppoe        C:\Windows\system32\DRIVERS\raspppoe.sys
03:06:36.0972 0x1734  RasPppoe - ok
03:06:36.0982 0x1734  [ E8B1E447B008D07FF47D016C2B0EEECB, FEC789F82B912F3E14E49524D40FEAA4373B221156F14045E645D7C37859258C ] RasSstp         C:\Windows\system32\DRIVERS\rassstp.sys
03:06:36.0984 0x1734  RasSstp - ok
03:06:37.0039 0x1734  [ 77F665941019A1594D887A74F301FA2F, 1FDC6F6853400190C086042933F157814D915C54F26793CAD36CD2607D8810DA ] rdbss           C:\Windows\system32\DRIVERS\rdbss.sys
03:06:37.0054 0x1734  rdbss - ok
03:06:37.0074 0x1734  [ 302DA2A0539F2CF54D7C6CC30C1F2D8D, 1DF3501BBFFB56C3ECC39DBCC4287D3302216C2208CE22428B8C4967E5DE9D17 ] rdpbus          C:\Windows\system32\drivers\rdpbus.sys
03:06:37.0075 0x1734  rdpbus - ok
03:06:37.0092 0x1734  [ CEA6CC257FC9B7715F1C2B4849286D24, A78144D18352EA802C39D9D42921CF97A3E0211766B2169B6755C6FC2D77A804 ] RDPCDD          C:\Windows\system32\DRIVERS\RDPCDD.sys
03:06:37.0092 0x1734  RDPCDD - ok
03:06:37.0126 0x1734  [ BB5971A4F00659529A5C44831AF22365, 9AAA5C0D448E821FD85589505D99DF7749715A046BBD211F139E4E652ADDE41F ] RDPENCDD        C:\Windows\system32\drivers\rdpencdd.sys
03:06:37.0127 0x1734  RDPENCDD - ok
03:06:37.0138 0x1734  [ 216F3FA57533D98E1F74DED70113177A, 60C126A1409D1E9C39F1C9E95F70115BF4AF07780AB499F6E10A612540F173F4 ] RDPREFMP        C:\Windows\system32\drivers\rdprefmp.sys
03:06:37.0139 0x1734  RDPREFMP - ok
03:06:37.0198 0x1734  [ 313F68E1A3E6345A4F47A36B07062F34, B8318A0AE06BDE278931CA52F960B9FE226FD9894B076858DDB755AE26E1E66F ] RdpVideoMiniport C:\Windows\system32\drivers\rdpvideominiport.sys
03:06:37.0199 0x1734  RdpVideoMiniport - ok
03:06:37.0247 0x1734  [ E61608AA35E98999AF9AAEEEA6114B0A, F754CDE89DC96786D2A3C4D19EE2AEF1008E634E4DE3C0CBF927436DE90C04A6 ] RDPWD           C:\Windows\system32\drivers\RDPWD.sys
03:06:37.0259 0x1734  RDPWD - ok
03:06:37.0293 0x1734  [ 34ED295FA0121C241BFEF24764FC4520, AAEE5F00CAA763A5BA51CF56BD7262C03409CD72BD5601490E3EC3FFF929BB5F ] rdyboost        C:\Windows\system32\drivers\rdyboost.sys
03:06:37.0300 0x1734  rdyboost - ok
03:06:37.0346 0x1734  [ 254FB7A22D74E5511C73A3F6D802F192, 3D0FB5840364200DE394F8CC28DA0E334C2B5FA8FF28A41656EE72287F3D3836 ] RemoteAccess    C:\Windows\System32\mprdim.dll
03:06:37.0351 0x1734  RemoteAccess - ok
03:06:37.0375 0x1734  [ E4D94F24081440B5FC5AA556C7C62702, 147CAA03568DC480F9506E30B84891AB7E433B5EBC05F34FF10F72B00E1C6B22 ] RemoteRegistry  C:\Windows\system32\regsvc.dll
03:06:37.0381 0x1734  RemoteRegistry - ok
03:06:37.0461 0x1734  [ 9C3AC71A9934B884FAC567A8807E9C4D, 0B6B2970098E3C21E1E54A25785544903E8CD415B527FCEF86ABC7B33BEC83E7 ] Revoflt         C:\Windows\system32\DRIVERS\revoflt.sys
03:06:37.0463 0x1734  Revoflt - ok
03:06:37.0567 0x1734  [ 0B169FE016039571ECC6DB70073F8979, B80663433919C3DE83A02E376E5B3020856C6E9E98B5773D316FD9C1C02C1417 ] RichVideo64     C:\Program Files\CyberLink\Shared files\RichVideo64.exe
03:06:37.0582 0x1734  RichVideo64 - ok
03:06:37.0645 0x1734  [ 83A6C2CAFE236652D1559640594A0EA8, 52360F17C9C70C9CEA3316560B40C4D89FD705ED7E6B6088C99FC54D4CC35EB5 ] rpcapd          C:\Program Files (x86)\WinPcap\rpcapd.exe
03:06:37.0652 0x1734  rpcapd - ok
03:06:37.0672 0x1734  [ E4DC58CF7B3EA515AE917FF0D402A7BB, 665B5CD9FE905B0EE3F59A7B1A94760F5393EBEE729877D8584349754C2867E8 ] RpcEptMapper    C:\Windows\System32\RpcEpMap.dll
03:06:37.0677 0x1734  RpcEptMapper - ok
03:06:37.0717 0x1734  [ D5BA242D4CF8E384DB90E6A8ED850B8C, CB4CB2608B5E31B55FB1A2CF4051E6D08A0C2A5FB231B2116F95938D7577334E ] RpcLocator      C:\Windows\system32\locator.exe
03:06:37.0719 0x1734  RpcLocator - ok
03:06:37.0764 0x1734  [ 5C627D1B1138676C0A7AB2C2C190D123, C5003F2C912C5CA990E634818D3B4FD72F871900AF2948BD6C4D6400B354B401 ] RpcSs           C:\Windows\system32\rpcss.dll
03:06:37.0782 0x1734  RpcSs - ok
03:06:37.0851 0x1734  [ DDC86E4F8E7456261E637E3552E804FF, D250C69CCC75F2D88E7E624FCC51300E75637333317D53908CCA7E0F117173DD ] rspndr          C:\Windows\system32\DRIVERS\rspndr.sys
03:06:37.0856 0x1734  rspndr - ok
03:06:37.0975 0x1734  [ AC4CA62572CA516945AB92D6C9F501F4, 6CB4178DD1ED3D8224EA1F91CAA00AFBC756DCA2DFD71F399B05E511E79D5150 ] RTL8167         C:\Windows\system32\DRIVERS\Rt64win7.sys
03:06:38.0000 0x1734  RTL8167 - ok
03:06:38.0016 0x1734  [ 4D71227301DD8D09097B9E4CC6527E5A, 193D47ADCB722B581CC0F29B794AB3E455B6E9BEA367CE9A5216A09E055B7F1E ] SamSs           C:\Windows\system32\lsass.exe
03:06:38.0018 0x1734  SamSs - ok
03:06:38.0040 0x1734  [ AC03AF3329579FFFB455AA2DAABBE22B, 7AD3B62ADFEC166F9E256F9FF8BAA0568B2ED7308142BF8F5269E6EAA5E0A656 ] sbp2port        C:\Windows\system32\drivers\sbp2port.sys
03:06:38.0043 0x1734  sbp2port - ok
03:06:38.0074 0x1734  [ 9B7395789E3791A3B6D000FE6F8B131E, E5F067F3F212BF5481668BE1779CBEF053F511F8967589BE2E865ACB9A620024 ] SCardSvr        C:\Windows\System32\SCardSvr.dll
03:06:38.0081 0x1734  SCardSvr - ok
03:06:38.0094 0x1734  [ 253F38D0D7074C02FF8DEB9836C97D2B, CB5CAFCB8628BB22877F74ACF1DED0BBAED8F4573A74DA7FE94BBBA584889116 ] scfilter        C:\Windows\system32\DRIVERS\scfilter.sys
03:06:38.0095 0x1734  scfilter - ok
03:06:38.0164 0x1734  [ 262F6592C3299C005FD6BEC90FC4463A, 54095E37F0B6CC677A3E9BDD40F4647C713273D197DB341063AA7F342A60C4A7 ] Schedule        C:\Windows\system32\schedsvc.dll
03:06:38.0193 0x1734  Schedule - ok
03:06:38.0243 0x1734  [ F17D1D393BBC69C5322FBFAFACA28C7F, 62A1A92B3C52ADFD0B808D7F69DD50238B5F202421F1786F7EAEAA63F274B3E8 ] SCPolicySvc     C:\Windows\System32\certprop.dll
03:06:38.0245 0x1734  SCPolicySvc - ok
03:06:38.0276 0x1734  [ 6EA4234DC55346E0709560FE7C2C1972, 64011E044C16E2F92689E5F7E4666A075E27BBFA61F3264E5D51CE1656C1D5B8 ] SDRSVC          C:\Windows\System32\SDRSVC.dll
03:06:38.0282 0x1734  SDRSVC - ok
03:06:38.0329 0x1734  [ 3EA8A16169C26AFBEB544E0E48421186, 34BBB0459C96B3DE94CCB0D73461562935C583D7BF93828DA4E20A6BC9B7301D ] secdrv          C:\Windows\system32\drivers\secdrv.sys
03:06:38.0330 0x1734  secdrv - ok
03:06:38.0343 0x1734  [ BC617A4E1B4FA8DF523A061739A0BD87, 10C4057F6B321EB5237FF619747B74F5401BC17D15A8C7060829E8204A2297F9 ] seclogon        C:\Windows\system32\seclogon.dll
03:06:38.0346 0x1734  seclogon - ok
03:06:38.0359 0x1734  [ C32AB8FA018EF34C0F113BD501436D21, E0EB8E80B51E45CA7EB061E705DA0BC07878759418A8519AE6E12326FE79E7C7 ] SENS            C:\Windows\System32\sens.dll
03:06:38.0363 0x1734  SENS - ok
03:06:38.0376 0x1734  [ 0336CFFAFAAB87A11541F1CF1594B2B2, 8B8A6A33E78A12FB05E29B2E2775850626574AFD2EF88748D65E690A07B10B8D ] SensrSvc        C:\Windows\system32\sensrsvc.dll
03:06:38.0379 0x1734  SensrSvc - ok
03:06:38.0390 0x1734  [ CB624C0035412AF0DEBEC78C41F5CA1B, A4D937F11E06CAE914347CA1362F4C98EC5EE0C0C80321E360EA1ABD6726F8D4 ] Serenum         C:\Windows\system32\drivers\serenum.sys
03:06:38.0391 0x1734  Serenum - ok
03:06:38.0407 0x1734  [ C1D8E28B2C2ADFAEC4BA89E9FDA69BD6, 8F9776FB84C5D11068EAF1FF1D1A46466C655D64D256A8B1E31DC0C23B5DD22D ] Serial          C:\Windows\system32\drivers\serial.sys
03:06:38.0410 0x1734  Serial - ok
03:06:38.0466 0x1734  [ 1C545A7D0691CC4A027396535691C3E3, 065C30BE598FF4DC55C37E0BBE0CEDF10A370AE2BF5404B42EBBB867A3FFED6D ] sermouse        C:\Windows\system32\drivers\sermouse.sys
03:06:38.0468 0x1734  sermouse - ok
03:06:38.0518 0x1734  [ 0B6231BF38174A1628C4AC812CC75804, E569BF1F7F5689E2E917FA6516DB53388A5B8B1C6699DEE030147E853218811D ] SessionEnv      C:\Windows\system32\sessenv.dll
03:06:38.0523 0x1734  SessionEnv - ok
03:06:38.0780 0x1734  [ F1E263DE9C7A597F38B8C4E070F56139, DA5AFA6ED8D3B58729F04173BC799408BD4B9E559AA11136C13AEF8539ABC29B ] SEVPNCLIENT     C:\Program Files\SoftEther VPN Client\vpnclient_x64.exe
03:06:38.0882 0x1734  SEVPNCLIENT - ok
03:06:38.0984 0x1734  [ A554811BCD09279536440C964AE35BBF, DA8F893722F803E189D7D4D6C6232ED34505B63A64ED3A0132A5BB7A2BABDE55 ] sffdisk         NCH Debut Video Capture 5.65 patch Archives 03:06:38.0986 0x1734  sffdisk - ok
03:06:39.0007 0x1734  [ FF414F0BAEFEBA59BC6C04B3DB0B87BF, B81EF5D26AEB572CAB590F7AD7CA8C89F296420089EF5E6148E972F2DBCA1042 ] sffp_mmc        C:\Windows\system32\drivers\sffp_mmc.sys
03:06:39.0008 0x1734  sffp_mmc - ok
03:06:39.0028 0x1734  [ DD85B78243A19B59F0637DCF284DA63C, 6730D4F2BAE7E24615746ACC41B42D01DB6068D6504982008ADA1890DE900197 ] sffp_sd         C:\Windows\system32\drivers\sffp_sd.sys
03:06:39.0029 0x1734  sffp_sd - ok
03:06:39.0045 0x1734  [ A9D601643A1647211A1EE2EC4E433FF4, 7AC60B4AB48D4BBF1F9681C12EC2A75C72E6E12D30FABC564A24394310E9A5F9 ] sfloppy         C:\Windows\system32\drivers\sfloppy.sys
03:06:39.0046 0x1734  sfloppy - ok
03:06:39.0112 0x1734  [ B95F6501A2F8B2E78C697FEC401970CE, 758B73A32902299A313348CE7EC189B20EB4CB398D0180E4EE24B84DAD55F291 ] SharedAccess    C:\Windows\System32\ipnathlp.dll
03:06:39.0127 0x1734  SharedAccess NCH Debut Video Capture 5.65 patch Archives ok
03:06:39.0186 0x1734  [ AAF932B4011D14052955D4B212A4DA8D, 2A3BFD0FA9569288E91AE3E72CA1EC39E1450D01E6473CE51157E0F138257923 ] ShellHWDetection C:\Windows\System32\shsvcs.dll
03:06:39.0197 0x1734  ShellHWDetection - ok
03:06:39.0228 0x1734  [ 843CAF1E5FDE1FFD5FF768F23A51E2E1, 89CA9F516E42A6B905474D738CDA2C121020A07DBD4E66CFE569DD77D79D7820 ] SiSRaid2        C:\Windows\system32\drivers\SiSRaid2.sys
03:06:39.0229 0x1734  SiSRaid2 - ok
03:06:39.0240 0x1734  [ 6A6C106D42E9FFFF8B9FCB4F754F6DA4, 87B85C66DF7EB6FDB8A2341D05FAA5261FF68A90CCFC63F0E4A03824F1E33E5E ] SiSRaid4        C:\Windows\system32\drivers\sisraid4.sys
03:06:39.0243 0x1734  SiSRaid4 - ok
03:06:39.0353 0x1734  [ 50D9949020E02B847CD48F1243FCB895, 5BDAD5E44DE5B412645142810C5FCE4B2D9685F928FF4A6B836A9DCE7725BD78 ] SkypeUpdate     C:\Program Files (x86)\Skype\Updater\Updater.exe
03:06:39.0362 0x1734  SkypeUpdate - ok
03:06:39.0397 0x1734  [ 548260A7B8654E024DC30BF8A7C5BAA4, 4A7E58331D7765A12F53DC2371739DC9A463940B13E16157CE10DB80E958D740 ] Smb             C:\Windows\system32\DRIVERS\smb.sys
03:06:39.0401 0x1734  Smb - ok
03:06:39.0485 0x1734  [ 39951F935C2FF77C6F4262DC5851F253, E8CBEAED3F018B29368F8CD59B55B3C9AB31561422300233B4F7626FAA79231D ] SmbDrvI         C:\Windows\system32\DRIVERS\Smb_driver_Intel.sys
03:06:39.0487 0x1734  SmbDrvI - ok
03:06:39.0584 0x1734  [ 7AE8BCA90539ECBDE87AC45BA1436BE3, E599200C44ECA5EB06475F90F67A58723B30C3C2887BD12ED7C31FF1042382EA ] smserial        C:\Windows\system32\DRIVERS\SmSerl64.sys
03:06:39.0613 0x1734  smserial - ok
03:06:39.0679 0x1734  [ 10450F432811D7FDA60A97FCC674D7B2, FD6245B06DD81C6E287DA47173D622357D86D84E3A5444CD34645973FE2E8BF5 ] snapman         C:\Windows\system32\DRIVERS\snapman.sys
03:06:39.0693 0x1734  snapman - ok
03:06:39.0747 0x1734  [ 6313F223E817CC09AA41811DAA7F541D, D787061043BEEDB9386B048CB9E680E6A88A1CBAE9BD4A8C0209155BFB76C630 ] SNMPTRAP        C:\Windows\System32\snmptrap.exe
03:06:39.0749 0x1734  SNMPTRAP - ok
03:06:39.0807 0x1734  [ B9E31E5CACDFE584F34F730A677803F9, 21A5130BD00089C609522A372018A719F8E37103D2DD22C59EACB393BE35A063 ] spldr           C:\Windows\system32\drivers\spldr.sys
03:06:39.0808 0x1734  spldr - ok
03:06:39.0916 0x1734  [ 85DAA09A98C9286D4EA2BA8D0E644377, F9C324E2EF81193FE831C7EECC44A100CA06F82FA731BF555D9EA4D91DA13329 ] NCH Debut Video Capture 5.65 patch Archives C:\Windows\System32\spoolsv.exe
03:06:39.0938 0x1734  Spooler - ok
03:06:40.0061 0x1734  [ DD1471053A74F62A6E656D4F5B1EEF70, F485F9A52B0BF8FE987DC4A3F1DB7E13157B3266EC04F4A0B8C74D52EECF49F1 ] SpotfluxUpdateService C:\Program Files (x86)\Spotflux\services\SpotfluxUpdateService.exe
03:06:40.0062 0x1734  SpotfluxUpdateService - ok
03:06:40.0220 0x1734  [ E17E0188BB90FAE42D83E98707EFA59C, FC075F7B39E86CC8EF6DA4E339FE946917E319C347AC70FB0C50AAF36F97E27F ] sppsvc          C:\Windows\system32\sppsvc.exe
03:06:40.0305 0x1734  sppsvc - ok
03:06:40.0360 0x1734  [ 93D7D61317F3D4BC4F4E9F8A96A7DE45, 36D48B23B8243BE5229707375FCD11C2DCAC96983199345365F065A0CBF33314 ] sppuinotify     C:\Windows\system32\sppuinotify.dll
03:06:40.0369 0x1734  sppuinotify - ok
03:06:40.0440 0x1734  [ 441FBA48BFF01FDB9D5969EBC1838F0B, 306128F1AD489F87161A089D1BDC1542A4CB742D91A0C12A7CD1863FDB8932C0 ] srv             C:\Windows\system32\DRIVERS\srv.sys
03:06:40.0452 0x1734  srv - ok
03:06:40.0471 0x1734  [ B4ADEBBF5E3677CCE9651E0F01F7CC28, 726DB2283113AB2A9681E8E9F61132303D6D86E9CD034C40EE4A8C9DB29E87F7 ] srv2            C:\Windows\system32\DRIVERS\srv2.sys
03:06:40.0483 0x1734  srv2 - ok
03:06:40.0531 0x1734  [ 27E461F0BE5BFF5FC737328F749538C3, AFA4704ED8FFC1A0BAB40DFB81D3AE3F3D933A3C9BF54DDAF39FF9AF3646D9E6 ] srvnet          C:\Windows\system32\DRIVERS\srvnet.sys
03:06:40.0536 0x1734  srvnet - ok
03:06:40.0585 0x1734  [ 51B52FBD583CDE8AA9BA62B8B4298F33, 2E2403F8AA39E79D1281CA006B51B43139C32A5FDD64BD34DAA4B935338BD740 ] SSDPSRV         C:\Windows\System32\ssdpsrv.dll
03:06:40.0592 0x1734  SSDPSRV - ok
03:06:40.0614 0x1734  [ AB7AEBF58DAD8DAAB7A6C45E6A8885CB, D21CDBC4C2AA0DB5B4455D5108B0CAF4282A2E664B9035708F212CC094569D9D ] SstpSvc         C:\Windows\system32\sstpsvc.dll
03:06:40.0619 0x1734  SstpSvc - ok
03:06:40.0662 0x1734  [ C270C64B4F6CA87DAC2D7F68ED57A141, A224264B90FCA9C597ED7D7923EBC34A3AD14885245D570CBEE8F24E27C91DC8 ] stdriver        C:\Windows\system32\DRIVERS\stdriver64.sys
03:06:40.0668 0x1734  stdriver - ok
03:06:40.0706 0x1734  [ F3817967ED533D08327DC73BC4D5542A, 1B204454408A690C0A86447F3E4AA9E7C58A9CFB567C94C17C21920BA648B4D5 ] stexstor        C:\Windows\system32\drivers\stexstor.sys
03:06:40.0707 0x1734  stexstor - ok
03:06:40.0786 0x1734  [ 8DD52E8E6128F4B2DA92CE27402871C1, 1101C38BE8FC383B5F2F9FA402F9652B23B88A764DE2B584DFE62B88B11DEF92 ] stisvc          C:\Windows\System32\wiaservc.dll
03:06:40.0804 0x1734  stisvc - ok
03:06:40.0822 0x1734  [ D01EC09B6711A5F8E7E6564A4D0FBC90, 3CB922291DBADC92B46B9E28CCB6810CD8CCDA3E74518EC9522B58B998E1F969 ] swenum          C:\Windows\system32\DRIVERS\swenum.sys
03:06:40.0823 0x1734  swenum - ok
03:06:40.0860 0x1734  [ E08E46FDD841B7184194011CA1955A0B, 9C3725BB1F08F92744C980A22ED5C874007D3B5863C7E1F140F50061052AC418 ] swprv           C:\Windows\System32\swprv.dll
03:06:40.0875 0x1734  swprv - ok
03:06:40.0949 0x1734  [ 8080114C4B1954456BB1904000BCC293, B112509C5A6CC29318ACEA57D2F2711820C4C45F1BE698F097BF82D315001A09 ] SynTP           C:\Windows\system32\DRIVERS\SynTP.sys
03:06:40.0961 0x1734  NCH Debut Video Capture 5.65 patch Archives - ok
03:06:41.0070 0x1734  [ BF9CCC0BF39B418C8D0AE8B05CF95B7D, 3C13217548BE61F2BDB8BD41F77345CDDA1F97BF0AE17241C335B9807EB3DBB8 ] SysMain         C:\Windows\system32\sysmain.dll
03:06:41.0114 0x1734  SysMain - ok
03:06:41.0161 0x1734  [ E3C61FD7B7C2557E1F1B0B4CEC713585, 01F0E116606D185BF93B540868075BFB1A398197F6AABD994983DBFF56B3A8A0 ] TabletInputService C:\Windows\System32\TabSvc.dll
03:06:41.0165 0x1734  TabletInputService - ok
03:06:41.0236 0x1734  [ 3C32FF010F869BC184DF71290477384E, 55CFCEC7F026C6E2E96A2FBE846AB513BB12BB0348735274FE1B71AF019C837B ] tap0901         C:\Windows\system32\DRIVERS\tap0901.sys
03:06:41.0239 0x1734  tap0901 - ok
03:06:41.0274 0x1734  [ 40F0849F65D13EE87B9A9AE3C1DD6823, E251A7EF3D0FD2973AF33A62FC457A7E8D5E8694208F811F52455F7C2426121F ] TapiSrv         C:\Windows\System32\tapisrv.dll
03:06:41.0288 0x1734  TapiSrv - ok
03:06:41.0351 0x1734  [ 185C2170CFD84F9D708276FBB5ABD77D, FCA00B5CC62F2C160326DBA2F6BF31746324BBE7D5E96291C345DCF2583CE324 ] tapSF0901       C:\Windows\system32\DRIVERS\tapSF0901.sys
03:06:41.0354 0x1734  tapSF0901 - ok
03:06:41.0389 0x1734  [ 1BE03AC720F4D302EA01D40F588162F6, AB644862BF1D2E824FD846180DEC4E2C0FAFCC517451486DE5A92E5E78A952E4 ] TBS             C:\Windows\System32\tbssvc.dll
03:06:41.0395 0x1734  TBS - ok
03:06:41.0517 0x1734  [ 40AF23633D197905F03AB5628C558C51, 644656A15236E964E4BE57B42225EAA5643C4CF1FFF6D306813A000716F9D72C ] Tcpip           C:\Windows\system32\drivers\tcpip.sys
03:06:41.0563 0x1734  Tcpip - ok
03:06:41.0675 0x1734  [ 40AF23633D197905F03AB5628C558C51, 644656A15236E964E4BE57B42225EAA5643C4CF1FFF6D306813A000716F9D72C ] TCPIP6          C:\Windows\system32\DRIVERS\tcpip.sys
03:06:41.0720 0x1734  TCPIP6 - ok
03:06:41.0782 0x1734  [ 1B16D0BD9841794A6E0CDE0CEF744ABC, 7EB8BA97339199EEE7F2B09DA2DA6279DA64A510D4598D42CF86415D67CD674C ] tcpipreg        C:\Windows\system32\drivers\tcpipreg.sys
03:06:41.0785 0x1734  tcpipreg - ok
03:06:41.0835 0x1734  [ 3371D21011695B16333A3934340C4E7C, 7416F9BBFC1BA9D875EA7D1C7A0D912FC6977B49A865D67E3F9C4E18A965082D ] TDPIPE          C:\Windows\system32\drivers\tdpipe.sys
03:06:41.0836 0x1734  TDPIPE - ok
03:06:41.0947 0x1734  [ 99527D49EE0A96FC25537C61B270A372, 519E23F86EC86349F92C4A88DBD19C097AEE0A6E152776B32B45D293ED14946B ] tdrpman273      C:\Windows\system32\DRIVERS\tdrpm273.sys
03:06:41.0977 0x1734  tdrpman273 - ok
03:06:42.0023 0x1734  [ 51C5ECEB1CDEE2468A1748BE550CFBC8, 4E8F83877330B421F7B5D8393D34BC44C6450E69209DAA95B29CB298166A5DF9 ] TDTCP           C:\Windows\system32\drivers\tdtcp.sys
03:06:42.0025 0x1734  TDTCP - ok
03:06:42.0048 0x1734  [ DDAD5A7AB24D8B65F8D724F5C20FD806, B71F2967A4EE7395E4416C1526CB85368AEA988BDD1F2C9719C48B08FAFA9661 ] tdx             C:\Windows\system32\DRIVERS\tdx.sys
03:06:42.0051 0x1734  tdx - ok
NCH Debut Video Capture 5.65 patch Archives 0x1734  [ C9B9373A0A430C11F0213E359D0772B2, 819D967B58987E1BBF0D4E6DDE0FB4800EDA6273762756A4BABB128566FED33B ] TeamViewer7     C:\Program Files (x86)\TeamViewer\Version7\TeamViewer_Service.exe
03:06:42.0318 0x1734  TeamViewer7 - ok
03:06:42.0345 0x1734  [ 561E7E1F06895D78DE991E01DD0FB6E5, 83BFA50A528762EC52A011302AC3874636FB7E26628CD7ACFBF2BDC9FAA8110D ] TermDD          C:\Windows\system32\DRIVERS\termdd.sys
03:06:42.0347 0x1734  TermDD - ok
03:06:42.0427 0x1734  [ 2E648163254233755035B46DD7B89123, NCH Debut Video Capture 5.65 patch Archives, 6FA0D07CE18A3A69D82EE49D875F141E39406E92C34EAC76AC4EB052E6EBCBCD ] TermService     C:\Windows\System32\termsrv.dll
03:06:42.0447 0x1734  TermService - ok
03:06:42.0491 0x1734  [ NCH Debut Video Capture 5.65 patch Archives, DB9886C2C858FAF45AEA15F8E42860343F73EB8685C53EC2E8CCC10586CB0832 ] Themes          C:\Windows\system32\themeservice.dll
03:06:42.0494 0x1734  Themes - ok
03:06:42.0551 0x1734  [ E40E80D0304A73E8D269F7141D77250B, NCH Debut Video Capture 5.65 patch Archives, 0DB4AC13A264F19A84DC0BCED54E8E404014CC09C993B172002B1561EC7E265A ] THREADORDER     C:\Windows\system32\mmcss.dll
03:06:42.0557 0x1734  THREADORDER - ok
03:06:42.0577 0x1734  [ 7E7AFD841694F6AC397E99D75CEAD49D, DE87F203FD8E6BDCCFCA1860A85F283301A365846FB703D9BB86278D8AC96B07 ] TrkWks          C:\Windows\System32\trkwks.dll
03:06:42.0585 0x1734  TrkWks - ok
03:06:42.0659 0x1734  [ 773212B2AAA24C1E31F10246B15B276C, F2EF85F5ABA307976D9C649D710B408952089458DDE97D4DEF321DF14E46A046 ] TrustedInstaller C:\Windows\servicing\TrustedInstaller.exe
03:06:42.0664 0x1734  TrustedInstaller - ok
03:06:42.0707 0x1734  [ 4CE278FC9671BA81A138D70823FCAA09, NCH Debut Video Capture 5.65 patch Archives, CBE501436696E32A3701B9F377B823AC36647B6626595F76CC63E2396AD7D300 ] tssecsrv        C:\Windows\system32\DRIVERS\tssecsrv.sys
03:06:42.0708 0x1734  tssecsrv - ok
03:06:42.0765 0x1734  [ E9981ECE8D894CEF7038FD1D040EB426, DCDDCE933CAECE8180A3447199B07F2F0413704EEC1A09606EE357901A84A7CF ] TsUsbFlt        C:\Windows\system32\drivers\tsusbflt.sys
03:06:42.0769 0x1734  TsUsbFlt - ok
03:06:42.0810 0x1734  [ AD64450A4ABE076F5CB34CC08EEACB07, B5C386635441A19178E7FEEE299BA430C8D72F9110866C13A216B12A1080AD12 ] TsUsbGD         C:\Windows\system32\drivers\TsUsbGD.sys
03:06:42.0812 0x1734  TsUsbGD - ok
03:06:42.0866 0x1734  [ 3566A8DAAFA27AF944F5D705EAA64894, AE9D8B648DA08AF667B9456C3FE315489859C157510A258559F18238F2CC92B8 ] tunnel          C:\Windows\system32\DRIVERS\tunnel.sys
03:06:42.0870 0x1734  tunnel - ok
03:06:42.0895 0x1734  [ B4DD609BD7E282BFC683CEC7EAAAAD67, EF131DB6F6411CAD36A989A421AF93F89DD61601AC524D2FF11C10FF6E3E9123 ] uagp35          C:\Windows\system32\drivers\uagp35.sys
03:06:42.0898 0x1734  uagp35 - ok
03:06:42.0929 0x1734  [ FF4232A1A64012BAA1FD97C7B67DF593, D8591B4EB056899C7B604E4DD852D82D4D9809F508ABCED4A03E1BE6D5D456E3 ] udfs            C:\Windows\system32\DRIVERS\udfs.sys
03:06:42.0938 0x1734  udfs - ok
03:06:42.0983 0x1734  [ 3CBDEC8D06B9968ABA702EBA076364A1, B8DAB8AA804FC23021BFEBD7AE4D40FBE648D6C6BA21CC008E26D1C084972F9B ] UI0Detect       C:\Windows\system32\UI0Detect.exe
03:06:42.0986 0x1734  UI0Detect - ok
03:06:43.0030 0x1734  [ 4BFE1BC28391222894CBF1E7D0E42320, 5918B1ED2030600DF77BDACF1C808DF6EADDD8BF3E7003AF1D72050D8B102B3A ] uliagpkx        C:\Windows\system32\drivers\uliagpkx.sys
03:06:43.0033 0x1734  uliagpkx - ok
03:06:43.0057 0x1734  [ DC54A574663A895C8763AF0FA1FF7561, 09A3F3597E91CBEB2F38E96E75134312B60CAE5574B2AD4606C2D3E992AEDDFE ] umbus           C:\Windows\system32\DRIVERS\umbus.sys
03:06:43.0059 0x1734  umbus - ok
03:06:43.0074 0x1734  [ B2E8E8CB557B156DA5493BBDDCC1474D, F547509A08C0679ACB843E20C9C0CF51BED1B06530BBC529DFB0944504564A43 ] UmPass          C:\Windows\system32\drivers\umpass.sys
03:06:43.0075 0x1734  UmPass - ok
03:06:43.0313 0x1734  [ 765F2DD351BA064F657751D8D75E58C0, 954834FF6F05E065C2BE6CEC22136A0399026BFF9D91BE859E8E047C3ED8267F ] UNS             C:\Program Files (x86)\Intel\Intel® Management Engine Components\UNS\UNS.exe
03:06:43.0370 0x1734  UNS - ok
03:06:43.0399 0x1734  [ D47EC6A8E81633DD18D2436B19BAF6DE, 0FB461E2D5E0B75BB5958F6362F4880BFA4C36AD930542609BCAF574941AA7AE ] upnphost        C:\Windows\System32\upnphost.dll
03:06:43.0410 0x1734  upnphost - ok
03:06:43.0453 0x1734  [ DCA68B0943D6FA415F0C56C92158A83A, BEE5A5B33B22D1DF50B884D46D89FC3B8286EB16E38AD5A20F0A49E5C6766C57 ] usbccgp         C:\Windows\system32\DRIVERS\usbccgp.sys
03:06:43.0456 0x1734  usbccgp - ok
03:06:43.0518 0x1734  [ 80B0F7D5CCF86CEB5D402EAAF61FEC31, 140C62116A425DEAD25FE8D82DE283BC92C482A9F643658D512F9F67061F28AD ] usbcir          C:\Windows\system32\drivers\usbcir.sys
03:06:43.0521 0x1734  usbcir - ok
03:06:43.0567 0x1734  [ 18A85013A3E0F7E1755365D287443965, 811C5EDF38C765BCF71BCE25CB6626FF6988C3699F5EF1846240EA0052F34C33 ] usbehci         C:\Windows\system32\drivers\usbehci.sys
03:06:43.0569 0x1734  usbehci - ok
03:06:43.0625 0x1734  [ 8D1196CFBB223621F2C67D45710F25BA, B5D7AFE51833B24FC9576F3AED3D8A2B290E5846060E73F9FFFAC1890A8B6003 ] usbhub          C:\Windows\system32\DRIVERS\usbhub.sys
03:06:43.0635 0x1734  usbhub - ok
03:06:43.0682 NCH Debut Video Capture 5.65 patch Archives [ 765A92D428A8DB88B960DA5A8D6089DC, 56DE8A2ED58E53B202C399CA7BACB1551136303C2EE0AB426BDBBF880E3C542C ] usbohci         C:\Windows\system32\drivers\usbohci.sys
03:06:43.0684 0x1734  usbohci - ok
03:06:43.0762 0x1734  [ 73188F58FB384E75C4063D29413CEE3D, B485463933306036B1D490722CB1674DC85670753D79FA0EF7EBCA7BBAAD9F7C ] usbprint        C:\Windows\system32\DRIVERS\usbprint.sys
03:06:43.0764 0x1734  usbprint - ok
03:06:43.0820 0x1734  [ 9661DA76B4531B2DA272ECCE25A8AF24, FEA93254A21E71A7EB8AD35FCCAD2C1E41F7329EC33B1734F5B41307A34D8637 ] usbscan         C:\Windows\system32\DRIVERS\usbscan.sys
03:06:43.0823 0x1734  usbscan - ok
03:06:43.0885 0x1734  [ FED648B01349A3C8395A5169DB5FB7D6, DC4D7594C24ADD076927B9347F1B50B91CF03A4ABDB284248D5711D9C19DEB96 ] USBSTOR         C:\Windows\system32\DRIVERS\USBSTOR.SYS
03:06:43.0891 0x1734  USBSTOR - ok
03:06:43.0988 0x1734  [ DD253AFC3BC6CBA412342DE60C3647F3, 146F8613F1057AC054DC3593E84BC52899DA27EA33B0E72ACFB78C3699ADCDE7 ] usbuhci         C:\Windows\system32\drivers\usbuhci.sys
03:06:43.0990 0x1734  usbuhci - ok
03:06:44.0043 0x1734  [ EDBB23CBCF2CDF727D64FF9B51A6070E, 7202484C8E1BFB2AFD64D8C81668F3EDE0E3BF5EB27572877A0A7B337AE5AE42 ] UxSms           C:\Windows\System32\uxsms.dll
03:06:44.0046 0x1734  UxSms - ok
03:06:44.0060 0x1734  [ 4D71227301DD8D09097B9E4CC6527E5A, 193D47ADCB722B581CC0F29B794AB3E455B6E9BEA367CE9A5216A09E055B7F1E ] VaultSvc        C:\Windows\system32\lsass.exe
03:06:44.0062 0x1734  VaultSvc - ok

Источник: [https://torrent-igruha.org/3551-portal.html]
,Message,#,4.,Who,here,is,using,hp,iLO?,Do,you,really,need,to,pay,for,an,access,https://www.reddit.com//who_here_is_using_hp_ilo_do_you_really_need_to/Dec,12,2014,4,points,(100%,upvoted).,Do,you,really,need,to,pay,for,an,access,key,to,use,the,ipmi,features?,There,is,an,‘iLO,Essentials’,license,that,is,WAY,cheaper,than,iLO,Advanced,that.,4,Digit,numbers,(9th,gen,and,below).,Ilo,4,advanced,license,keygenbjsofts.boxhost.me/ilo-2-license-key-crack-incl-crack.htmlJun,6,2015,Crack,Name,Rating;,Ulead,Video,Studio,11:,Alawar,Entertainment,Alien,Shooter,V2.,For,certain,features,you,need,an,advanced,license,key.,Ilo,4,License,Key,Generator,-,Software,Download,Blogbitizer.net/ilo-advanced-license-keySize:,5.1,MB,Ilo,4,License,Key,Generator,Make,confident,the,footer,of,website,CRACK,SOFTWARE,FREE,DOWNLOAD,SERIAL,PATCH,LICENSE,KEY,FULL .,mapinfo,8,license,keyforum.ru-board.com/topic.cgi?forum=5&topic=25275avast,bart,cd,license,deskzilla,license,general,public,license.,lm,license,file,license,code,acdsee,8.0,39,vnc,viewer,4,license,key,license,файл,лицензии,license,manager,terminal,service,licensing,2003,license,key,avast,ilo,license,crack.,How-to,Apply,VMware,Free,License,to,VMware,ESXi,-,ESX,https://habrahabr.ru/company/hpe/blog/144474/Mar,18,2015,Copy,the,license,key;,Download,the,Free,VMware,Hypervisor;,Download,the,You,can,burn,the,ISO,file,to,a,CD,or,you,can,use,a,remote,console,like,iLo,to,mount,directly,the,ISO,image.,November,23,2014,at,4:36,am.,Planet,V12n,-,VMware,Blogswarezfileshere.me/internet/hp-ilo-4-license-key-generator.html,products,that,ESXi,has,been,installed,on,them,and,the,products,have,iLO4.,this,is,a,maintenance,release,it,now,supports,vSphere,5.x,vCenter,license,keys.,I,finally,managed,to,crack,the,AWS,Certified,Solutions,Architect,Professional .,Ilo,4,Trial,Key,»,Free,Download,-,Etalkey,Programstomy-dl.net/2015/08/26/crack-awb-editor/Ilo,4,Trial,Key,Size:,5.8,MB,

NCH Debut Video Capture 5.65 patch Archives - for the

,User,Rating:,This,gives,me,the,oey,re,install,the,Lister,Download,Ilo,4,Trial,Key,serial,keygen,nocd,crack,activation,license.,gpsgate,server,license,crack,created,-,Imgurgnu.su/news.php?extend.1256,results,Related,software,with,serial,key,crack:,ilo,4,license,key;,GpsGate,-,GpsGate,Server,licenses,KEYGENS.CO,-,GpsGate,v1.03b,for,Windows,keygen,.,Проливая,свет,на,HP,ProLiant,iLO,Management,Engine,/,Блог,mood-events.com/blogg/2015/01/16/keygen-ilo-hp/24,май,2012,HP,iLO,Management,Engine,представляет,собой,полный,набор,С,выходом,iLO,4,появилась,возможность,управления,сервером,с .,HP,iLO,60,day,Trial,Key,-,Cochenowww.cocheno.com/2015/07/hp-ilo-60-day-trial-key/Jul,28,2015,My,Trial,key,for,Advanced,features,(like,Virtual,Media),seems,working,multiples,times,on,different,servers,thanks,HP!,License,Key,for,a,60,day .,HP,iLO,Advanced ,Hewlett,Packard,Enterprise®www8.hp.com/us/en/products/server-software/product-detail.html?oidProduct,detail,–,:HP,iLO,Advanced,Includes,features,specifications,and,warranty,Easier,iLO,license,key,activation,with,iLO,Federation,iLO,4,Firmware.,Ilo,4,advanced,license,key,crack,-,appblogyx.tkwarezfilesaremine.me/digital-photo/ilo-4-license-key-generator.htmlBuy,a,HPE,OneView,with,iLO,Advanced,-,license,or,other,Network,Management,Software,at,CDW,lights-out,ilo,proprietary,embedded,management,technology .,Hp,ilo,4,advanced,license,keygen,-,Google,Docstakefreestuffplease.us/page.php?id=ilo-4-license-key-generatorAdvanced,options.,ilo,federation,.,Download,crack,jurassic,park,operation,genesis,pc.,hp,ilo,2,advanced,license,key,ilo3,advanced,license,key,crack,keygen .,поделитесь,HP,ILO,Activation,key,-,SYSAdmins.ruhttps://www.scribd.com//HP-iLO-Advanced-Evaluation-License-Z7550-00528поделитесь,HP,ILO,Activation,key.,а,на,iLO,3,нет,ключика,?,а,то,консоли,только,секунд,на,30,хватает,),а,на,iLO4,кто,нить,разжился,сабжем?.,Ilo,Advanced,License,Key,-,Bitizer.netpuppersoftware.net/ilo4-activation-key.htmlTags:,ilo4,activation,key;,iLO,4,Advanced,activation,key;,ilo,4,advanced,key;,ILO,4,License,Activation,Key;,ilo4,serial,crack; .,Ilo,Advanced,Crack,-,beinsa.netmoviesslickqu.cf/ilo-4-license-activation-key-1172Crack,Full,download,reset,and,being,it,based,Remote,Ilo,1,Now,A,case,Key,crack,keygen,serial,key,activation,Title:,Ilo,Advanced,License,Key,Size:,4.,Ilo,4,License,Key,Crack,99143,-,nhobbit.rucrackspider.net/crack.shtml?q=ilo4Papa,dragon,age,2,patches,xbox,360,soldats,animxE9;s,par,l'ardeur,Ilo,4,License,Key,Crack.,Сброс,пароля,iLO,HP,-,computersvc.ruwww.findeen.co.uk/ilo_4_license_key.htmliLO,(Integrated,Lights,Out),–,аппаратно,программный,комплекс,присутствующий,практически,во,Заранее,напишу,самый,простой,способ,для,Windows,это,2й,смотри,пункт,4.,License,Key:,35DPH-SVSXJ-HGBJN-C7N5R-2SS4W.,HP,Proliant,KeyGen,(Advanced,iLo,etc),:,Thuze,Community,pastebin.ca/3429721Aug,3,2014,Reinstall,the,old,version,of,HP,ProLiant,MicroServer,Gen8,iLO,4,Firmware,1.13.,with,Pack,Refurbished,that,iLO,integrates.,crack,1500.,management,How,is,Downloads,ILO2,ADVANCED,LICENSE,KEY,order,and,3790.,Сервачки,HP,и,Integrated,Lights-Out,-,полезная,шняга),-,Geek’s,kuangdai.weidaohang.org/-page-6/hp+ilo+4+license+key.html7,июл,2010,Integrated,Lights-Out,Activation,keys,Ключи,для,iLO.,Ключи,для,iLO,iLO100,iLO100i,iLO200,iLO200,MP.,iLO,2,Advanced,features,have ., 3518c04180 Gravity 2013 1080p BluRay x265 HEVC 10bit AAC 5.1-LordVako
Hp Ilo4 Trial License Key
Internet speed hack v 3.8
COD BLACK OPS 3 AWAKENING (XBOX360) JTAG-RGH
Jaheim.-.Struggle.Love.(2016).(320Kbps).(Pirate.Shovon)
Jab.comics.-.My.Hot.Ass.Neighbor.8.Update.20pics.

Hp Ilo 4 Trial License Key

Draw 50 Princesses
Garrys-Mod-13-v163
Fresh.Meat.Season.3.Episode.04.Series.3.Episode.4.2013.HDTV.XviD-LOL(VTV)
Brett Rossi Girls do it better
Gerald Kein Video

by Raffsyre on 2016-06-13 12:47:26

Overview

The HPE iLO trial license allows users to try HPE iLO Advanced features for a period of 60 days. HPE iLO Advanced enhances HPE iLO capabilities that enable users configure, monitor and update HPE servers seamlessly from anywhere. With the convenience of full remote capability via your browser or mobile device, HPE iLO Advanced enables your server do more for your business ..

The HPE iLO trial license allows users to try HPE iLO Advanced features for a period of 60 days. HPE iLO Advanced enhances HPE iLO capabilities that enable users configure, monitor and update HPE servers seamlessly from anywhere. With the convenience of full remote capability via your browser or mobile device, HPE iLO Advanced enables your server do more for your business in less time.

Hp Ilo4 Trial License Key Generator

HPE iLO Advanced Licenses are supported on the following servers:

Hp Ilo4 Trial License Key

2020
  • All ProLiant Servers (DL, ML, Moonshot)
  • Apollo Servers
  • Edgeline Converged Edge Systems

Hp Ilo4 Trial License Key Free

Onvifer pro apk serial box. Key Features:

Hp Ilo4 Trial License Key Code

  • Integrated Remote Console and Virtual Media
  • Directory Integration
  • iLO Federation – rapid discovery, inventory and management at scale


image

Contoh Soal Ujian Mandiri Soshum Pdf

image

Clay Formation. Retrouvez tous les messages sur formations Art Clay sur Pâte dArgent Cours et Formations. Brief Glimpse of Guams Colorful Clay Formations.

Soshum
  1. Download Contoh Soal Ujian Mandiri UNDIP Persiapan UM 2021/2022. Kumpulan Soal UM (Ujian Mandiri) terbaik untuk mengikuti jalur seleksi UM di Universitas Diponegoro. Selain menggunakan jalur SNMPTN, dan SBMPTN untuk masuk UNDIP. Kamu bisa masuk melalui jalur Mandiri ini.
  2. Contoh Soal Ujian Mandiri Soshum Pdf Ilmu Pengetahuan 8. Soal Usm Unsri 2017 Revisi Sekolah. Usm Unsri Soal Mandiri Unsri Kimia 2016 Kode 333 Nomor 35 40 Youtube. Jurusan Di Unsri 2020 2021 Akreditasi Biaya Kuliah Passing Grade. Contoh Soal Ujian Mandiri. Contoh Soal Jalur Mandiri Unri Soal Soal Cute766. Soal Usm Unsri 2017 Rismax.
  3. Soal ujian mandiri uns. Mengapa di tahun 2018 kembali dibuka Ujian Mandiri. Contoh soal ujian mandiri iain. Ujian masuks s1 ugm universitas gadjah mada. Download Soal D3 UnairEduexpo Unair 2019 Universitas Airlangga merupakan Perguruan Tinggi Negeri favorit bagi para siswa-siswi SMAMA SMK dan yang sederajat untuk melanjutkan studi.
Tes

Nucleation and formation of clay mine-rals. Isson and Planavsky 2018. Les autres formations constitutives des Hastings Les lits sont sous.

Contoh Soal Ujian Mandiri Soshum Pdf

2004 the cells extrude the polysaccharide strands to localize FeOOH precipitation in proximity to the cell membrane.

Contoh Soal Ujian Mandiri Soshum Pdf 2017

Clay a été créé pour rendre la pratique de la céramique plus accessible. 2004 the cells extrude the polysaccharide strands to localize FeOOH precipitation in proximity to the cell membrane. Formations à la carte. By using our services you agree to our use of cookies.

Contoh Soal Ujian Mandiri Soshum Pdf Online

Contoh Soal Simama Poltekkes Gratis Persiapan 2021 Pagunpost from 1.bp.blogspot.com 2 days ago soal seleksi ujian tahun 2021 snmptn utbk sbmnptn seleksi mandiri.kelompok ujian campuran dengan materi ujian tkpa tkd saintek dan tkd soshum. Contoh soal ujian mandiri iain ips ilmu pengetahuan 8.



image

Janome Digitizer Mbx Cracked Screen

image


Many downloads like Janome Digitizer Mbx may also include a serial number, cd key or keygen. If this is the case then it’s usually included in the full crack download archive itself. If you are still having trouble finding Janome Digitizer Mbx after simplifying your search term then we highly recommend using the alternative full download sites. Aug 22, 2016 - This video will show how to create embroidery using the corel graphics mode. This is an introduction to this feature, there is more in section 5 of this DVD. Digitizer V5 Download Crack. Age of empires 2 romans. This project could use fuller instructions. Right now the readme just says follow the on-screen instructions, but the on-screen instructions are extremely brief and don’t really take the user through the process.

  1. Janome Digitizer Mbx Cracked Screens
  2. Janome Digitizer Mbx Cracked Screen Repair
  3. Janome Digitizer Mbx Cracked Screen Replacement

In addition to numerous bug fixes, optimizations, changes for compatibility, and so forth, this release brings some important enhancements for Anzio Lite, and numerous enhancements for AnzioWin.

Janome Digitizer Mbx Cracked Screen

In both Anzio Lite and AnzioWin:

– IPv6 support. We add support for this expanded Internet Protocol. Requires no change to little change to operate, once your infrastructure allows IPv6.

– For multi touch screens, we offer sizing and moving the main Anzio Window.

– For large screens, we offer up to 1000 columns of text.

– For small screens, user can control sizing of tool buttons, etc. for easier touch. Also a screen magnifier.

– For keyboard less units (Windows tablets, etc.) we can control on-screen keyboard position. Also, the Anzio window can slide around to keep the input area visible.

– For mobile users and others, wireless network connection awareness.

Cracked

– It’s now easier to have Anzio remember and automate your login and password.

– Support for thumbnail of screen image in the toolbar of Windows Vista, 7 & 8. With multiple sessions open, you can more easily pick and choose.

More in AnzioWin:

– Enhancement and easier setup of SSH backchannel printing.

– In various printing scenarios, automatic file type detection.

Mbx

– Numerous improvements in the floating image window capability allow more uses of AnzioWin as a image-enabled application client. Images and documents in this viewer can be zoomed and panned by multi-touch or mouse. A popup menu allows printing, opening the document externally, etc. There is support for video and also playlists, with multiple options. All operations can be scripted from the host.

– Support for location reporting in PC’s with GPS.

In AnzioWin’s Print Wizard feature set:

– Pan and zoom in the print preview window.

– View and print PDF files inside AnzioWin.

– Use almost any PDF as an overlay.

– Okidata, Epson, and IBM Microline printer emulation.

– Preview all kinds of print files, including images and PCL files.

– Adjust placement of overlay and main file before printing.

– Output smaller, more efficient PDF files.

– Email through Outlook now supports 2010 & 2013 versions.

– Masking – blocking certain areas from printing, prompt for inputs, etc.

– Sign a document on-screen, create a new output PDF, achieve paperless document signing.

– Includes virtually all core enhancements in freestanding Print Wizard product up through its version 4.1.

Janome Digitizer Easy Edit software, free download

Janome Digitizer MB Version 2.0 embroidery Multi-needle software- up-gradable. From editing individual stitches to layouts of large, multi-hoop designs and. From editing individual stitches to layours of large, multi-hoop designs and full stitch-out simulations, Digitizer MB can handle it all with ease. Whether you are. Mar 17, 2016 - Janome Accessories Catalogue FREE DOWNLOAD from Bargain Box $0.00. Developer, Janome’s Digitizer MBX software combines easy-to-use functionality. From editing individual stitches to layouts of large, multi-hoop.

New Software

WinToHDD 3.5
Published: 20 May, 2019 12:15
WinToHDD is a free software which can help you install,..

DataNumen SQL Recovery 4.1
Published: 20 May, 2019 11:54
DataNumen SQL Recovery is a powerful tool to repair and..

Maiar 72.0.59.100
Published: 20 May, 2019 11:46
Maiar is a blazing fast, privacy first browser for the..

VyprVPN for Windows 2.16.3
Published: 20 May, 2019 11:39
The VyprVPN for Windows application automatically..

System Mechanic Free 18.5.1.278.0
Published: 20 May, 2019 11:34
System Mechanic Free provides complete Windows..

Nba 2k13 pc torrent download. LPAR2RRD 6.02
Published: 20 May, 2019 09:28
Free performance monitoring for VMware, oVirt, RedHat..

Super Moto Racers 1.99
Published: 19 May, 2019 10:11
3D motorcycle racing game. It’s time to become the best..

Rons CSV Editor 2019.04.10.1446
Published: 19 May, 2019 09:57
Rons CSV Editor is the ultimate CSV editor designed to..

WinToUSB 4.8
Published: 16 May, 2019 11:32
WinToUSB allows you to install/clone Windows 10/8.1/8/7..

ProVide 12.16
Published: 16 May, 2019 11:30
ProVide is a user-friendly solution to safely and..

New Reviews

Aquarium Lab 2012.0.2(Usha)
My aquarium water condition is being monitored by this..

TextSeek (Mac) 2.5.1583(Zesi_Tom)
Deep indexing of desktop computer’s documents is..

Janome Software Download

RPM Remote Print Manager Elite 32 Bit 6.1.0.439(tintin)
Takes care of any printing job to be converted and saved..

Nutrigenic Helper 1.0(Simsiak)
As a dietician I use this software to plan a nutrient..

Radmin 3.5.2.1(Jefferson)
Can control the computers from distance location even if..

JavaScript Diagram 3.2.0(Xeviers)
Lots of flow diagrams can be drawn in short time with..

WarpPro 1.0(Rownok)
Reproduces any record after fixing the timing error of..

HueScope Separator 1.0(Kislu)
Separates the colors from an watercolor image which is..

ERD Concepts 8.0(Tintin)
For backend database design it is the perfect one, manual..

MindView 7.0.15506.0(Zerin)
Can easily note down any new ideas or plans for future..

Popular Software

FreeCommander 2009.02b(6206)
Released: 08 November, 2011
FreeCommander is an advanced file manager program. It can..

AbiWord 2.8.6(1809)
Released: 05 December, 2011
AbiWord is a free word processor for all major operating..

TestDisk and PhotoRec 6.14(2836)
Released: 24 October, 2012
TestDisk is a powerful free data recovery software!

NetBeans IDE 7.4(1056)
Released: 02 December, 2013
Free and open source IDE for programmers in almost all..

Safari for Windows 5.1.7(3982)
Released: 04 December, 2013
Experience the fastest web browsing in your windows PC..

GeekUninstaller 1.1.1.21(1381)
Released: 08 December, 2013
GeekUninstaller is a free small sized uninstaller program..

SeaMonkey 2.23(1590)
Released: 07 January, 2014
Advanced Internet user, web developer and corporate..

Ahnenblatt 2.74(86)
Released: 15 November, 2012
Ahnenblatt is a free and easy-to-use genealogy software..

Janome digitizer mbx

Related Software

Recent Software

Freeware: Janome Digitizer Software Free

Downloads: All Freeware iPhone


Janome digitizer mbx cracked screen cleaner
Express Burn Disc Burning Software Free 5.15License: Freeware

Express Burn Disc Burning SoftwareFree lets you create and record discs quickly and easily. Perfect audio quality is maintained through direct digital recording.
Author:NCH Software
Date: 03 November, 2016
OS Support: Windows , Windows 8 , WinXP , Windows 10

Homepage
Screenshot
Report Link

Download
(855.8 KB)

Express Burn Disc Burning Software Free 5.06License: Freeware

Express Burn Disc Burning SoftwareFree lets you create and record discs quickly and easily. Perfect audio quality is maintained through direct digital recording.
Author:NCH Software
Date: 20 June, 2016
OS Support: Windows , Windows 8 , WinXP , Windows 10

Homepage
Screenshot
Report Link

Download
(845.8 KB)

Wavepad Audio Editing Software Free 7.01License: Freeware

WavePad Free Audio Editor is a full-featured professional audio and music editor. You can record and edit music, voice, and other audio recordings. With this freesoftware you can cut, copy, and paste parts of recordings.
Author:NCH Software
Date: 25 January, 2017
OS Support: Windows , Windows 8 , WinXP , Windows 10

Homepage
Screenshot
Report Link

Download
(1.1 MB)

PhotoStage Photo Slideshow Software Free 5.00License: Freeware

PhotoStage Free Slideshow Software lets you create a slideshow from your digital photos and videos on Windows and apply effects such as fade, crossfade, zoom and much more. Burn your slideshow to DVD for playback on TV.
Author:NCH Software
Date: 08 January, 2018
OS Support: Windows , Windows 8 , WinXP , Windows 10

Homepage
Screenshot
Report Link

Download
(4.8 MB)

Debut Video Capture Software Free 3.07License: Freeware

Debut Video Capture SoftwareFree for Windows allows you to capture video from your PC. Debut Free can record video from almost any source. You can use pre-production features, such as color, resolution, and output settings.
Author:NCH Software
Date: 15 November, 2016
OS Support: Windows , Windows 8 , WinXP , Windows 10

Homepage
Screenshot
Report Link

Download
(1.6 MB)

Zulu DJ Software Free 3.70License: Freeware

Zulu is a free professional DJ mixing software for Windows PCs. Mix and broadcast live music, audio and mp3s. Allow the software to scan for the BPM of each track and sync the two turntables for a seamless crossover.
Author:NCH Software
Date: 10 August, 2016
OS Support: Windows , Windows 8 , WinXP , Windows 10

Homepage
Screenshot
Report Link

Download
(1.7 MB)

PhotoStage Slideshow Software Free 3.20License: Freeware

PhotoStage Free Slideshow Software lets you create a slideshow from your digital photos and videos on Windows and apply effects such as fade, crossfade, zoom and much more. Burn your slideshow to DVD for playback on TV.
Author:NCH Software
Date: 09 June, 2015
OS Support: Windows , Windows 8 , WinXP

Homepage
Screenshot
Report Link

Download
(5.3 MB)

Debut Video Capture Software Free 2.26License: Freeware

Debut Video Capture SoftwareFree for Windows allows you to capture video from your PC. Debut Free can record video from almost any source. You can use pre-production features, such as color, resolution, and output settings.
Author:NCH Software
Date: 30 December, 2015
OS Support: Windows , Windows 8 , WinXP , Windows 10

Homepage
Screenshot
Report Link

Download
(1.5 MB)

Disketch Disc Label Software Free 3.39License: Freeware

Use Disketch Free Disc Label Software to quickly create professional labels and covers. Personalize labels with your own photos and artwork. Easily arrange and format label images and text with Disketch Free.
Author:NCH Software
Date: 29 October, 2015
OS Support: Windows , Windows 8 , WinXP , Windows 10

Homepage
Screenshot
Report Link

Download
(678.8 KB)

Zulu DJ Software Free 3.53License: Freeware

Zulu is a free professional DJ mixing software for Windows PCs. Mix and broadcast live music, audio and mp3s. Allow the software to scan for the BPM of each track and sync the two turntables for a seamless crossover.
Author:NCH Software
Date: 14 July, 2015
OS Support: Windows , Windows 8 , WinXP

Homepage
Screenshot
Report Link

Download
(955.2 KB)

Wavepad Audio Editing Software Free 6.55License: Freeware

WavePad Free Audio Editor is a full-featured professional audio and music editor. You can record and edit music, voice, and other audio recordings. With this freesoftware you can cut, copy, and paste parts of recordings.
Author:NCH Software
Date: 03 August, 2016
OS Support: Windows , Windows 8 , WinXP , Windows 10

Homepage
Screenshot
Report Link

Download
(1.1 MB)

Type 99 arisaka serial numbers. But i dont want to be the first guy that some anti gun liberal picks randomly off of the internet to mess with!!!Yes, pretty much paranoid. But do what you like! It’s still a pretty much free country. You will find scores of rifles ID’d by their full serial number online; here, on online auctions, in books, too many to count, of course this is JMO and the opinion of most of us on the boards.

PhotoStage Photo Slideshow Software Free 3.38License: Freeware

PhotoStage Free Slideshow Software lets you create a slideshow from your digital photos and videos on Windows and apply effects such as fade, crossfade, zoom and much more. Burn your slideshow to DVD for playback on TV.
Author:NCH Software
Date: 24 February, 2016
OS Support: Windows , Windows 8 , WinXP , Windows 10

Homepage
Screenshot
Report Link

Download
(5.3 MB)

Voxal Voice Changer Software Free 1.32License: Freeware

Voxal is free voice changer software for Windows designed to enhance any game or application that uses a microphone. Change your voice and add effects such as pitch or echo in real-time as you talk into the microphone on your Windows PC.
Author:NCH Software
Date: 06 July, 2016
OS Support: Windows , Windows 8 , WinXP , Windows 10

Homepage
Screenshot
Report Link

Download
(973.7 KB)

Zulu DJ Software Free 4.10License: Freeware

Zulu is a free professional DJ mixing software for Windows PCs. Mix and broadcast live music, audio and mp3s. Allow the software to scan for the BPM of each track and sync the two turntables for a seamless crossover.
Author:NCH Software
Date: 02 January, 2018
OS Support: Windows , Windows 8 , WinXP , Windows 10

Homepage
Screenshot
Report Link

Download
(4.9 MB)

Ahsay Backup Software Free Edition 5.5.3License: Freeware

Ahsay Backup SoftwareFree Edition 5.5.3 is such a useful tool that is designed for home users and small companies who have 2 desktop or laptop computers to back up.It comes with 2 AhsayACB and 1 AhsayOBS.
Author:Ahsay Online Backup Software
Date: 05 December, 2011
OS Support: Windows , Windows Vista

Homepage
Report Link

Download
(321.6 MB)

Patch adams girlfriend killed. Dec 14, 2009 - This week’s movie: Patch Adams Hunter “Patch” Adams is an American. I know what you are thinking.did the Skeptical Samurai just. By actress Monica Potter) was murdered by a psychiatric patient. This situation of the psychiatric patient killing Patch’s girlfriend was actually based on a real event. Feb 13, 2017 - I remember the first time I saw the movie Patch Adams, starring the late. However, Patch believes that patients should not be treated conventionally, but. In actually helping the world, rather than ruling it — but he does share great. Patch is a dear friend. Gary Webb: Murdered For Exposing The Truth. Mar 31, 2018 - In the late 60s, one of his closest friends (a man, not a woman as depicted in the Patch Adams film) was murdered I couldn’t find the name of. Jan 10, 2018 - did patch adams really have a girlfriend who was murdered. Patch Adams said that whenever the film’s production would get stressful, Robin.

Pixillion Image Converter Software Free 5.02License: Freeware

Pixillion Image Converter SoftwareFree is perfect for converting your image files for posting on the web, emailing to friends, or storing on your mobile phone. Convert or compress multiple photos at once with batch conversion.
Author:NCH Software
Date: 16 February, 2018
OS Support: Windows , Windows 8 , WinXP , Windows 10

Homepage
Screenshot
Report Link

Download
(869.7 KB)

Express Accounts Accounting Free 5.24License: Freeware

Express Accounts Accounting SoftwareFree is professional business accounting software. This product is perfect small businesses needing to report and document incoming and outgoing cash flow including sales, receipts, purchases, and payments.
Author:NCH Software
Date: 23 September, 2016
OS Support: Windows , Windows 8 , WinXP , Windows 10

Homepage
Screenshot
Report Link

Download
(1012.8 KB)

MoneyLine Personal Finance Software Free 2.02License: Freeware

MoneyLine personal finance software tracks your bank accounts, money, and spending in one place. This software helps you stay organized and in control of your finances.
Author:NCH Software
Date: 02 May, 2016
OS Support: Windows , Windows 8 , WinXP , Windows 10

Homepage
Screenshot
Report Link

Download
(516.3 KB)

Pixillion Image Converter Software Free 2.96License: Freeware

Pixillion Image Converter SoftwareFree is perfect for converting your image files for posting on the web, emailing to friends, or storing on your mobile phone. Convert or compress multiple photos at once with batch conversion.
Author:NCH Software
Date: 24 December, 2015
OS Support: Windows , Windows 8 , WinXP , Windows 10

Homepage
Screenshot
Report Link

Download
(579.3 KB)

Express Accounts Accounting Free 5.20License: Freeware

Express Accounts Accounting SoftwareFree is professional business accounting software. This product is perfect small businesses needing to report and document incoming and outgoing cash flow including sales, receipts, purchases, and payments.
Author:NCH Software
Date: 31 May, 2016
OS Support: Windows , Windows 8 , WinXP , Windows 10

Homepage
Screenshot
Report Link

Download
(992.3 KB)

HHD Software Free Hex Editor 3.1License: Freeware

HHD SoftwareFree Hex Editor 3.1 is a powerful binary editor, you can use for editing binary files. This is the smartest tool to work with multiple files with out any interruption.
Author:HHD Software
Date: 08 November, 2011
OS Support: Windows

Homepage
Report Link

Download
(8.3 MB)

HHD Software Free Virtual Serial Ports 2.01.0.165License: Freeware

HHD SoftwareFree Virtual Serial Ports is an application package that allows you to create virtual COM ports. This device driver implements the functionality of the virtual serial port devices.
Author:HHD Software, Ltd.
Date: 03 May, 2011
OS Support: Windows

Homepage
Screenshot
Report Link

Download
(5.1 MB)

DreamPlan Home Design Software Free 1.70License: Freeware

Home Plan and Landscape Design Software for Windows that’s free and easy to use. See your dream floor plan with customized kitchens, bathrooms and bedrooms for a home or apartment. Plan out your landscape. Customize paint, textures and decorations.
Author:NCH Software
Date: 17 August, 2016
OS Support: Windows , Windows 8 , WinXP , Windows 10

Homepage
Screenshot
Report Link

Download
(4.4 MB)

DreamPlan Home Design Software Free 1.64License: Freeware

Home Plan and Landscape Design Software for Windows that’s free and easy to use. See your dream floor plan with customized kitchens, bathrooms and bedrooms for a home or apartment. Plan out your landscape. Customize paint, textures and decorations.
Author:NCH Software
Date: 24 March, 2016
OS Support: Windows , Windows 8 , WinXP , Windows 10

Homepage
Screenshot
Report Link

Download
(4.3 MB)

Copper Point of Sale Software Free 2.00License: Freeware

Free POS Software - Retail Point of Sale Software System. Streamline the retail checkout process with a cash register system to stores product information, record all sales transactions, print receipts for customers and manage pricing and discounts.
Author:NCH Software
Date: 21 September, 2017
OS Support: Windows , Windows 8 , WinXP , Windows 10

Homepage
Screenshot
Report Link

Download
(516.2 KB)


Janome Digitizer Mbx Cracked Screens

Download Collection.com periodically updates software information from the publisher. You can visit publisher website by clicking Homepage link. Software piracy is theft. Using ‘janome digitizer software free’ crack, key, serial numbers, registration codes is illegal. The download file hosted at publisher website. We do not provide any download link points to Rapidshare, Depositfiles, Mediafire, Filefactory, etc. or obtained from file sharing programs such as Limewire, Kazaa, Imesh, Ares, BearShare, BitTorrent, WinMX etc.

Janome Digitizer Mbx Cracked Screen Repair

  • Graph Digitizer 2.1 is considered as a smart and useful application that is used for digitization of orthogonal graphs (scanned from books, papers). The input graph image file should be in BMP, JPEG, TIFF, or GIF format. Image of the graph can be. ..

    • Graph Digitizer
    • Nickolay Rodionov
    • Trial ($50.00)
    • 1.7 Mb
    • Windows 95, Windows Me, Windows XP, Windows 2
  • The Digital ArcHound PDF Digitizer Printer can be used with the suite of DA Document Manager Client Consoles for archiving any document that can be printed. Simply print any of your documents, pictures, financial statements, etc, while DA Document Manager application is running and your digitized copy will be instantly included in your console for archiving. It really is that simple.

    • setupdigitizer.msi
    • Group Seven Technology, Inc.
    • Shareware ($)
    • 11.32 Mb
    • WinXP, Win Vista, Windows 7,Windows Vista, Windows 7 x64, Windows 8
  • Graph Digitizer Scout automatically converts hard-copy graphs, oscillograms, charts, plots, into X,Y. Different recognition methods including manual correction mode. Data can be exported to Excel, CSV format and other applications.

    • graphdigitizerscout.zip
    • ByteScout
    • Demo ($35.00)
    • 5.19 Mb
    • Win95, Win98, WinME, WinXP, Windows2000, Windows2003
  • Precision Image Digitizer - Trace & record the coordinates of your selected points in a JPG, GIF, or BMP. Point and click on the points in the image that you would like to record. Export points to text or AutoCad DXF file.

    • pid-setup.exe
    • Michael Robinson
    • Shareware ($10.00)
    • 4.28 Mb
    • Windows 9X, ME, 2K, XP, 2003
  • Digitizer Capture is a volatile sound recorder. This software can record up to 5 Minutes of sound and play it back. The recorded sound CANNOT be saved. It has a Built-In timer for automated sound recording and send to Notification Area feature to. ..

    • Digitizer Capture
    • Reohix
    • Freeware (Free)
    • Win 3.1x, Win95, Win98, WinME, WinNT 3.x, WinNT 4.x, WinXP
  • ImageDIG consists of three integrated modules which allow the user to convert 2D flat images into 3D (x,y,z) data or if a graph, convert the graph in image form into 2 dimensional numerical data. The third module is a full analysis plotting utility. ..

    • ImageDIG 2D/3D ImageDigitizer
    • SciCepts Engineering
    • Shareware ($49.95)
    • 5.88 Mb
    • Windows XP, 2000, 98, Me, NT
  • The 'xyExtract’ software is used for to extract data from a 2D graph (orthogonal and nonorthogonal axes) contained in a graphic file (scanned, PDF document or in a some file like gif, jpg, etc). The graphic file must be saved in a bitmap file. Then,. ..

    • xyExtract_Install.zip
    • Wilton Pereira da Silva
    • Shareware ($25.00)
    • Win95, Win98, WinME, WinNT 4.x, WinXP, Windows2000
  • This digitizing software tool converts an image file showing a graph or map, into numbers. The image file can come from a scanner, digital camera or screenshot. The numbers can be read on the screen, and written or copied to a. ..

    • digit-exe-windows-4_1.zip
    • digitizer
    • Freeware (Free)
    • 6.97 Mb
    • Windows; BSD; Mac; Solaris; Linux
  • An easy to use Java program that allows you to digitize data points off of scanned plots, scaled drawings, or orthographic photographs. Includes an automatic digitization feature that can automatically digitize many types of functional. ..

    • PlotDigitizer_2.5.1_Linux_and_Others.tgz
    • plotdigitizer
    • Freeware (Free)
    • 850 Kb
    • Windows; Mac; Linux
  • ImageDIG consists of three integrated modules which allow the user to convert 2D flat images into 3D (x,y,z) data or if a graph, convert the graph in image form into 2 dimensional numerical data for further analysis. The third is 2D analyis plotter.

    • install.exe
    • SciCepts Engineering
    • Shareware ($89.95)
    • 5.65 Mb
    • Win95, Win98, WinME, WinNT 4.x, WinXP, Windows2000
  • Curve fitting (fit), nonlinear regression, treatment of data, basic statistics, error propagation, 2D and 3D graphs, confidence band, uncertainty, error bars, extrapolation, chi-square, correlation coefficient tests, covariance matrix, math tools.

    • LABFit.zip
    • Wilton Pereira da Silva
    • Shareware ($60.00)
    • 2.94 Mb
    • Win95, Win98, WinME, WinNT 4.x, WinXP, Windows2000
  • Digitizer will convert any image into a colorized textual representation of that image. The result is a neat effect and can be very stunning and beautiful given the right image and options. You are encouraged to experiment with the settings and. ..

    • digitizer.msi
    • Brian Friesen
    • Freeware (Free)
    • 192 Kb
    • Windows XP, 2000, 98, Me, NT

Related:Janome Digitizer Mb - Janome Digitizer - Janome Digitizer Software - Janome Digitizer Pro - Janome Digitizer Mb Free

Janome Digitizer Mbx Cracked Screen Replacement




image

Onvifer Pro Apk Serial

image


Adobe captivate 2017 (x86 / x64) full + crack medi. Download eset smart security premium 11 full + ser. Download adobe acrobat xi pro 11.0.23 full mediafi. Download football manager mobile 2017 v8.0 apk for. Download adobe after effects cc 2015 v13.5 serial. Download adobe.premiere.pro.cc.2015 + crack mediaf. Jul 11, 2021 Download Onvier apk 16.17 for Android. Modern IP Camera Video Management System, Support 10,000+ models, Hi-Performance.

Nov 02, 2018 Download ONVIF IP Camera Monitor (Onvifer) APK 12.77 for Android. Modern IP Camera Video Management System Support 10,000+ models, Hi-Performance. Onvif Ip Camera Monitor Onvifer Girlies22, La-002 @iMGSRC.RU VERIFIED Emberlee, Screenshot20216 @iMGSRC.RU ^NEW^ AudioEase Speakerphone Standalone Plugin 1.03 Fix Download Photoshop Cs5 Trial Version For Mac DayPilot Pro 7.2.2765 For ASP.NET WebForms adinarenn Balancing-daily-life-everfi-answers-quizlet chrysbapt. If you have made the smart choice of owning future-proof ONVIF conformant network cameras and a versatile Android device, Onvifer is your next smart choice. Discover - View - Control - Explore - Configure. Main features: ONVIF - Potentially compatible with over 5000 NVT devices (e.g. Network cameras, servers).

Use HappyMod to download Mod APK with 3x speed.
Download Onvier - IP Camera Monitor Mod APK on HappyModDownload.

Mod Info:(What’s modded?)

Onvier - IP Camera Monitor Mod Apk:

Onvifer pro apk serial code
  • - Version: 14.05
  • - Size: 10.61 MB
  • - Price: Free
  • - Root needed: No Need
  • - Offers In-App Purchase: No
  • - Price: Free

Onvier - IP Camera Monitor Mod Apk 14.05 (Pro) Features:

Onvier - IP Camera Monitor Mod ONVIF IP Camera Monitor (Onvifer) Mod APK 14.05 Features:
Pro
Monitor, control, explore and configure IP cameras.It is much more than a simple IP camera viewer.Support all modern (i.e. ONVIF conformant) IP cameras.Support older cameras via generic RTSP and MJPEGPlease note: IP CENTCOM is the name of our Windows 8.1/10, Windows Phone versions.Main features:ONVIF - Potentially compatible with over 5000 NVT devices (e.g. network cameras, servers).Generic RTSP/MJPEG - Support non-ONVIF IP cameras as generic RTSP or MJPEG streams.RTSP over HTTP - Help viewers traverse firewalls, and save servers from complex port configuration.Explore - In-depth exploration of device properties.H.264 - (a.k.a. Advanced Video Coding) The same format used by Blu-ray, YouTube. High compression allows smoother video for limited bandwidth..Audio Support both AAC and G.711.MP4 - Recording in standard MP4 format with H.264 video encoding and AAC audio encoding for high quality and player compatibility. Discovery - Discover all ONVIF devices instantly. Adding a camera can be as simple as a few button clicks.PTZ - Flick to pan/tilt, click to zoom.Digital PTZ for non-PTZ cameras (Pro version).Widget - Snapshot preview on Android home screen, and one-click to start video streaming.Snapshot Preview - App home screen with snapshots updated periodically.Multi-view - Viewing multiple cameras simultaneously.Portrait/Landscape - Support both portrait and landscape, fit and crop-and-fill viewing.App’s web page:https://www.ipcent.com/Mobile/onvifer

Onvifer Pro Apk Serial

Read More

Full Specifications

Download Infomation

Onvifer Pro Apk Serial
Onvifer
Size10.6MB
Version14.05
Version Code1405
Langafamarasazbebgbnbscacsdadeelen-AUen-CAen-GBen-INen-XCeses-USeteufafifrfr-CAgaglguhihrhuhyinisitiwjajpkakkkmknkokyloltlvmkmlmnmrmsmynbnenlorpaplptpt-BRpt-PTrorusiskslsqsrsr-Latnsvswtatethtltrukuruzvizh-CNzh-HKzh-TWzu
PermissionWAKE_LOCKACCESS_NETWORK_STATEWRITE_EXTERNAL_STORAGEREAD_EXTERNAL_STORAGEBILLINGREAD_PHONE_STATEREAD_GSERVICESINTERNETACCESS_WIFI_STATECHANGE_WIFI_MULTICAST_STATERECORD_AUDIORECEIVE_BOOT_COMPLETEDFOREGROUND_SERVICEMOUNT_UNMOUNT_FILESYSTEMS
Permission TextOTHER:
Allows using PowerManager WakeLocks to keep processor from sleeping or screen from dimming.
Allows applications to access information about networks.
Allows applications to open network sockets.
Allows applications to access information about Wi-Fi networks.
Allows applications to enter Wi-Fi Multicast mode.
Allows an application to receive the ACTION_BOOT_COMPLETED that is broadcast after the system finishes booting.
Allows mounting and unmounting file systems for removable storage.
STORAGE:
Allows an application to write to external storage.
Allows an application to read from external storage.
PHONE:
Allows read only access to phone state, including the phone number of the device, current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device.
MICROPHONE:
Allows an application to record audio.

Operation Systems

Min Sdk17
Min Sdk TxtAndroid 4.2、4.2.2 (JELLY_BEAN_MR1)
Target Sdk28
Target Sdk TxtAndroid 9.0
Multi WindowNo
Supports Screenssmall, normal, large, xlarge
Open Gl Int0
Supports Any DensityYes
Densities120, 160, 213, 240, 320, 480, 640, 65534

User Features

Uses FeatureWi-Fi hardware features:
The app uses 802.11 networking (Wi-Fi) features on the device.
Uses Not FeatureMedia software features:
The app presents a UI that is designed for viewing on a large screen, such as a television.
Uses implied FeatureThe app uses 802.11 networking (Wi-Fi) features on the device.#:

Signature

Md5E89B158E4BCF988EBD09EB83F5378E87
Signature61ED377E85D386A8DFEE6B864BD85B0BFAA5AF81
Sha256A40DA80A59D170CAA950CF15C18C454D47A39B26989D8B640ECD745BA71BF5DC
Valid FromFri Feb 29 02:33:46 CET 2008 until: Tue Jul 17 03:33:46 CEST 2035
Serial Number936eacbe07f201df

Developer

DeveloperAndroid
OuAndroid
OrganizationAndroid
LocaleMountain View
CountryUS
CityCalifornia

Read More

Onvifer Pro Apk

Download Links:

Like This

Almost all newer models of IP cameras from all major manufacturers are ONVIF conformant.

If you have made the smart choice of owning future-proof ONVIF conformant network cameras and a versatile Android device, Onvifer is your next smart choice.

Discover - View - Control - Explore - Configure

Main features:

Pro

ONVIF - Potentially compatible with over 5000 NVT devices (e.g. network cameras, servers)

RTSP over HTTP -Helps viewers traverse firewalls, and saves servers from complex port router configuration
Configure - In-app device configuration for both video, audio.

Onvifer Pro Apk Serial Key

H.264 - (a.k.a. Advanced Video Coding) The same format used by Blu-ray, YouTube. High compression allows smoother video for limited bandwidth.

Audio - Support both AAC and G.711.

MP4 - Recording in standard MP4 format with H.264 video encoding and AAC audio encoding for high quality and video viewer compatibility.

Onvifer Pro Apk Serial Number

Discovery - Adding a camera can be as simple as a few button clicks.

PTZ - Flick to pan/tilt, click to zoom.

Onvifer Pro Apk Serial Code

Widget - Snapshot preview on Android home screen, and one-click to start video streaming.

Snapshot Preview - Home screen with snapshots updated periodically.

Multi-view - Viewing multiple cameras simultaneously.

Onvifer Pro Apk Serial Key

Portrait/Landscape - Support both portrait and landscape, fit and crop-and-fill viewing.

Onvifer Pro Apk Serial Free

Explore - In-depth exploration of device properties.

Onvifer Pro

Free download from Shareware Connection - Almost all newer models of IP cameras from all major manufacturers are ONVIF conformant.If you have made the smart choice of owning future-proof ONVIF conformant network cameras and a versatile Android device, Onvifer is your next smart choice….



image

Centurion Gate Motor Doss Fault

image


Yes makes perfect sense. The oils seals fail, oil leaks into the sensor chamber and the motor can no longer sense where the gate is in its cycle. Requires an overhaul by Centurion. Gate Motor Accessories. Centurion D5 / D10 / A10 Oil 75ml. Part No: GA25-2. Brand: Centurion. Regal Account holders please Sign Up or Login to view trade pricing. Motor safe anti theft cage for centurion d5 / evo & e.T. Sliding gate motors Johannesburg, Gauteng Heavy duty anti theft cage / bracket electroplating lock not included cagesfor e.T. 500/ 600 centurion d5 / evo call michelle: 083 746 6142. Centurion Systems (Pty)Ltd D10 OPERATION MANUAL 4 In both modes of operation, any input that causes the gate to alter the opening operation while Autoclos e is being overridden (while TRG is held and the gate is opening) will cause the system. This could be due to: The motor not being connected to the contrdler, or the motor fuse could be or the motor is faulty. Check motor by connecting motor leads directly to the battery. Correct the problem, remove and refit the set link and start from step 17. The manual release mechanism is still in manual.

No1

Problems due to cold weather and low temperatures

There are several problems your gate motor might experience when the low temperatures strike. You might notice some delay in opening of your gate, or even the inability to open at all.

Metal components will contract as the temperature drops and unless you are using grease specially intended for lower temperatures, the grease will thicken, too. All this makes it harder for the gate to move and open since it requires more power.

Another problem is the battery since it is inside a metal box. Due to this, as the temperature gets lower outside, the internal temperature of the battery will also drop and this will make it harder for the battery to start because of the reduction of the electro-chemical reaction. This reaction is meant to produce the electrical current which allows the gate system to operate. You may have noticed that if you try to open it a couple of times, it will finally work.

No2

Centurion gate motor doss fault diagram

The gate is not reacting, moving or making any sound

  • First you should check if the breaker and the switch are working properly.
  • Check the outlet in which the gate is plugged. You can use some other device to see if they work when plugged in the same outlet.
  • Then look at all your outlets to see if their ground fault interrupter is tripping. You have to check all of them because if GFI is tripping this action will cause power to be cut from any device in the GFI’s circuit.
  • The problem might be the remote controller, maybe it’s broken, the batteries are dead and need replacement or it has run out of its “working hours”.

No3

Centurion gate motor doss fault diagram

The gate doesn’t stop where it is supposed to

If your gate doesn’t stop where it is supposed to it is mainly due to the limit switch nut or cam failing to hit the limit switch at the designated time. If you have a slide gate you’ll notice that a lever is holding the limit nut in place. It’s riding inside the slots of the limit nut. To solve this problem you have to press it back out of the slot on the limit shaft. This will put it back in its correct place.

No4

The gate doesn’t open unless there is someone standing next to it

This problem can occur in two scenarios.

  • One reason might be the antenna which was cut or just shortened. Try to put it as high as you can and be careful not to let it touch any other metal surface.
  • The other might be that some other source of transmitting is interfering with your source. Check to see if there is any possible source of radio transmitting near where you live. This could be a radio station, a military base, a flight path or an airport. If it happens that you do have these sources near you, then you will have to get a special receiver and an antenna.

Check the face of your receiver cover. It is common that gate openers have separate receivers. Look for the names like Multi Code, Liftmaster, Linear and Mega code. Check your remote clicker because it will have the same name as the receiver cover does. While pressing the remote you should listen and wait for the click coming from the rec receiver.

No5

The gate doesn’t close

  • Check to see if there is something blocking the gate physically. Check the wheel bearings to see if they are broken and check the chain and track too to see if they is any visible damage on them. For a swing gate you should check the gate arm for damage, as well as the hinges since they could be stuck or even broken.
  • If you still can’t find the cause then do the next thing. After making sure that the power supply is off, detach the chain for a sliding gate or detach the gate arm for a swing gate. Now try to move the gate to open/close it. If it can be done it means that there is nothing mechanical causing the problem. If you can’t move it means that there is a mechanical issue involved and that it would be smart to call a professional technician.

No6

Remote controller doesn’t work

As on any remote controllers, there is a little red light on the top part of it. This light will be lit when you give a command to the gate to open or close. If the light didn’t lit up when you pressed the remote key, then you problem can either be the batteries or the life span of the controller. Try changing the batteries with the new ones. If the problem continues after you have replaced the batteries then it is obvious that you need to buy a new remote controller since the old one has probably run out of its “working hours”. You can call a technician or a supplier from who you bought it. The technician will program the new remote controller and your problem will be solved.

Centurion Gate Motor Doss Fault
  • First check to see if any of the other house residents have maybe entered the “hold open” command and you didn’t know about this.
  • Then you should check for the key switch. Maybe the corrosion took its toll on the electrical switch on the back of the key cylinder, or the fire department came to your house without you knowing it to test the fire department key switch and they simply forgot to put it back to its regular operation.
  • This problem can also occur when devices like the photo eye or any other are preventing the gate from closing. You can check to see if the photo eye is working properly. First check to see if the safety LED light is lit. You should find this light on the opener control board. Look at the reflector if you have one. Maybe it is misaligned or even wet. By waving your hand in front of the photo eye, you will find out if it is working properly or not. The clicking sound means that everything is in order. Sometimes insects can cause malfunction of the photo safety sensors and control boxes since they prefer warm places. You should check from time to time and clean them with a dry cloth.
  • You should check the edge transmitters. These will be found on the gates with reversing edges. There could be a battery issue which means you will have to change the battery. Make sure you buy the right type of battery depending on the type of your edge transmitter. If there is nothing wrong with the battery, then the problem is the transmitter itself. The corrosion might have gotten to it or if it might be damaged in some other way. You would have to replace that transmitter with a new one if this is the case.
  • You should use the breaker to cut all power off. This action will automatically cause the gate to be released. Make sure to look at the loop detectors when you turn the motor on. The lights on the loop detector will tell you if you have a loop problem. It is possible that something is putting pressure to the loop too. If the lights are lit red, then you’ll know that you have one of these two situations on your hands.

The best way to get your gate fixed is certainly to to fix it.

No9

When to use Manual Release Mode?

There will be situations when you will have to put your gate into manual mode. You may experience a power outage or your gate isn’t working because it’s broken or you forgot to do an annual service and it’s showing difficulties in its operating. If the power is off this mode will allow the gate to open and close. You should have a manual release key in your possession and the gate should have been tested to see if it works in manual mode.

No8

The swinging gate doesn’t open

There can be three causes for this problem.

  • The first one is because the remote controller is broken, its batteries are dead and they need replacement or it’s just run out of its “working hours”.
  • Then it could be your ascending driveway’s fault. If this is the situation you are in, then either make the gate open to the other side if it’s possible or just hang the gate to a higher post so it doesn’t reach the driveway as it opens.
  • Since the gate safety loop sensor is present at most gates, you should check it to see if this sensor is the cause of malfunction. It is made to prevent the gate from harming any person, animal or object that might be on its path. If the sensor notices an obstacle it reverses the gate process/disables it. If the sensors aren’t working properly, you should call a technician.

No9

The gate keeps making a beeping sound

If your gate keeps beeping, especially during the night after the storm and making battery low sounds, you should try to add one more battery, that is, more power. It is possible that after the storm your battery might make sounds as if it is dead but the next day everything will be fine. This might occur with Mighty Mule Gate openers. If the trick with adding the second battery doesn’t work, then you can just contact the company’s customer support.

Finally No10

Centurion Gate Motor Doss Fault Codes

Mr DIY

Centurion Gate Motor Doss Fault Diagram

Trying to fix it yourself and lying about it when you finally do get a technician out ~ Let Us deal with it before it gets irreparable.



image

Basingstoke For Mac

image


We’ve got you covered

All of our IT support packages come with the following proactive solutions that take care of your business systems 24/7.

You can also buy Universalis for £6.99 (or $9.99 or €10.99) from the Mac App Store. It is cheaper because it has a few limitations: It can’t create e-books. It doesn’t give you a registration code you can use for other Universalis apps and programs. It can’t give you a discount on a registration code. The Discovery Centre 19-20 Westminster House Potters Walk, Town Centre (Festival Place) Basingstoke, RG21 7LS. Advice Line: 0300 3309 064 (same local call cost) Admin Line: 01256 329 984 Email: [email protected]

Basingstoke’s Regeneration and Netzen

Basingstoke Council launched a 25m fund to help regenerate the local area, aimed at improving residential, commercial and infrastructure (including broadband) facilities in the city centre. Unlike other IT companies in Basingstoke, Netzen are getting involved by supporting the rollout of fibre optic connections to businesses through the sale of high speed leased lines. The rollout allows businesses to get into the fast lane and make the most of all the internet has to offer by using services such as cloud backup, server monitoring, cloud storage, Office 365. If you are looking to bring the best available technology to your business and want to chat feel free to give us a call.

IT Consultants in Basingstoke

With offices in Basingstoke centre, Netzen have been providing IT consulting services to Basingstoke businesses since 2005. Over that time we’ve helped support businesses of all sizes, from small four and five person startups to medium sized enterprises with as many as 250 people power forward with the latest technology.

We don’t believe in a one size fits all approach, which is why our IT support contracts are customised for our client’s specific requirements and business model whilst remaining flexible enough to adapt as their businesses grow and develop.

Depending on the services you require, we can provide you with a dedicated technical consultant, who will provide all the technical support your business network, servers, PCs and laptops require

We have consultants in Basingstoke who can help with:

  • IT infrastructure projects
  • Network design and configuration
  • Custom website design that looks awesome on desktop and mobile devices
  • Cyber Security and threat mitigation
  • Web design and Search Engine Optimisation
  • IT Support and on-going maintenance
  • Web applications build
  • Fully managed dedicated server hosting
  • Sage/Xero and other accountancy software solutions
  • VoIP systems that are simple with fixed minutes per handset per month
  • On-site ‘hands’ for data centre work

Instant Remote IT Support

No matter the size of your business, we can respond rapidly with our instant remote support solution. We provide remote server support and remote desktop support services for machines running Windows, Linux, Mac and Cisco operating systems. We can also provide technical support services for smartphones and tablets if you need it.

Our team of IT support engineers based in Basingstoke have expertise in Windows, Linux and Mac systems that are standing by and ready to assist you. They also have all the relevant Microsoft and Linux certifications you would expect from one of Basingstoke’s leading IT support companies.

We use award winning, simple yet powerful remote IT support software that lets us connect to any device you need help with. With TeamViewer we can view your screen from our offices, take control of your mouse and fix any issues you have rapidly, reducing costs and time spent on fixing problems. You you wish to see how TeamViewer works, check out this Youtube Video link for a demonstration.

Do you need to work from home?

Do you need to work remotely or work from home? Netzen can help setup your office infrastructure/servers so that you can work from home and still be as productive as if you were in the office. We have vast experience in implementing remote working / home working solutions and can help implement these solutions into your business operations. Specifically we can help with the following remote working solutions:

  • Access work servers from home
  • Access work PC from home
  • Video conferencing and remote video meetings
  • Remote office file server or database access
  • Access to all your office files from home
  • Remote desktop access to your PC screen in the office
  • Remote telephone systems / VoIP systems that let you

Why use Netzen?

Netzen will provide a custom IT Support contract for your company, here are some key reasons why you should use Netzen for your BasingstokeIT Support:

Fixed price IT Support

Mcdonald’s Basingstoke

The same monthly fee no matter how often your company uses Netzen’s IT Services.

Unlimited telephone support

Call our local office on 01256 831020 as often as you want to get IT support.

Unlimited remote support

Super fast remote support, quick remote login software, allowing for fast fix support anywhere in the world.

Free web hosting

We can save you money and bundle in free web hosting with your IT support package.

Server monitoring

With all our support packages we connect up critical devices like servers to our monitoring software solution to proactively fix major issues before they impact the business.

Backup monitoring

Basingstoke Formulary

Basingstoke For Mac

We offer daily off-site remote backup solutions that are monitored every morning to ensure they have been successful.

Fast response times

We can instantly fix problems via remote support, but also offer a range of Service Level Agreements (SLAs) to guarantee a response within a set time-frame i.e. 2 or 4 hours.

Windows, Mac and Linux support

We support Windows, Mac & Linux and have extensive operating system knowledge within our team to offer full support for all PC/Server platforms.

Basingstoke Machete

New PC’s and Servers at trade prices

Basingstoke Maccies

We are registered Dell Partners and offer great prices on new hardware, that all come with 3 or 5 years next business day warranty support.

Basingstoke For Macbook

Certified professionals

Netzen’s Basingstoke IT Support team have a multitude or Microsoft and Linux certifications so you are in safe hands.

Basingstoke For Mac

Would you like to discuss IT Support for your Basingstoke business?

Call our local office for a chat about your companies IT requirements today on 01256 831020.

Basingstoke For Mac

Interested in using Netzen for your IT Support?

Apple Store Basingstoke Telephone number: 01256 696000 and to contact Apple-Bay call 01252 375167

If you are looking to get an appointment with the Apple Store in Basingstoke and you have even tried to call or chat with Apple, you could find their website here: Apple Store Festival Place.

However, if you are interested in having an Apple Certified Macintosh Technician, that specialises in Apple Computers and has more than 15 years of experience, get in contact with us at Apple-Bay in Mytchett, Camberley GU16 6DJ.

We are an Independent Apple Service provider, and we provide you with an alternative service. And because we are independent we can do our best to sort your Apple Computer needs.

We can repair liquid damage on all Apple laptops. We’ve had customers with water damage, juice damage, coca-cola damage, chicken soup damage, milk damage. So, do not hesitate to bring it to our shop at Unit J, Linsford Business Park, Linsford Lane, Mytchett, Camberley GU16 6DJ

We can repair logic board faults when at the Apple Store they will charge you a lot for a brand new one; we will fix your logic board.

Apple-Bay Limited provides professional Apple Mac IT Support Service for all customers in Surrey, Hampshire, Berkshire and London.

Do not hesitate to get in touch as soon as possible with us on 01252 375167 or you could place a booking here: Free Collection service

We have many good reviews from our customers here: Google Maps reviews

If you are looking for a professional and specialist in Apple Mac Computers look no further we can help with software updates, hard drive upgrades, iMac computer installation service, Mac support iCloud Apple IT Support.

Free diagnostics in Basingstoke, Hampshire.
Free diagnostics in Mytchett, Camberley, Surrey
Apple Mac IT Consultancy service for home users and small business.
Microsoft Windows PC to Apple Mac helps and support with PC to Mac migrations.



image

Viki Spotter: Professions Crack

image


Viki Spotter: Zoo. From PCGamingWiki, the wiki about fixing PC games This page is. Viki Spotter: Zoo: 2018: Viki Spotter: Professions: 2018: General information. Steam Community Discussions. 1 Availability; 2 Game data. 2.1 Configuration file(s) location; 2.2 Save game data location.

  1. Viki Spotter: Professions Crack Online
  2. Viki Spotter: Professions Crack Download
  3. Viki Spotter: Professions Crack Torrent
  4. Viki Spotter: Professions Crack Filler

Viki Spotter: Professions. All Discussions Screenshots Artwork Broadcasts Videos News Guides Reviews 0 in Group Chat View Stats. Puzzle game in which you have to look for differences between two similar pictures. The theme of this game is different professions and occupations. OS: Ubuntu 12.04/SteamOS: CPU: Quad Core: メモリ: 2048 MB RAM: グラフィック: OpenGL 2.1+, GLSL 1.2+, 256 MB VRAM: Storage: 700 MB available space. OS: Ubuntu 12.04/SteamOS: CPU: Quad Core: メモリ: 2048 MB RAM: グラフィック: OpenGL 2.1+, GLSL 1.2+, 256 MB VRAM: Storage: 700 MB available space. Viki Spotter – Professions. Sep 30, 2018 Leave a Comment. In this game you have to go on a journey into the adult world. Together with the brave girl Viki you will.

■ Ended … Started

Bundle page, Steamgifts.com, IsThereAnyDeal

Titles📖🏆$
single tier: $2.99
28303210003.99
Viki Spotter: Megapolis↗2980379703.99
2501710003.99
Viki Spotter: School↗28404210003.99
27903510003.99
Viki Spotter: Space Mission↗27908210013.99
2980398413.99
Viki Spotter: Undersea↗

$0

2980419003.99
250298903.99

855

284

  • tradable (supply)
  • library
  • blacklist
  • wishlist (demand)

☷ Updates for this Bundle

  • ✽± Roger added tradables from DIG Weekly Bundle 284
  • ✽pshea40 added tradables from DIG Weekly Bundle 284
  • ✽Joker The ????? added tradables from DIG Weekly Bundle 284
  • 🕑Barter.vg extended end time of DIG Weekly Bundle 284 by 1 day
  • 🕑🍒 Lilly (🌸◠‿◠) extended end time of DIG Weekly Bundle 284 by 15 hours 36 minutes
  • +🍒 Lilly (🌸◠‿◠) added Viki Spotter: Professions to DIG Weekly Bundle 284
  • +🍒 Lilly (🌸◠‿◠) added Viki Spotter: Zoo to DIG Weekly Bundle 284
  • +🍒 Lilly (🌸◠‿◠) added Viki Spotter: Space Mission to DIG Weekly Bundle 284
  • +🍒 Lilly (🌸◠‿◠) added Viki Spotter: Shopping to DIG Weekly Bundle 284
  • +🍒 Lilly (🌸◠‿◠) added Viki Spotter: Around The World to DIG Weekly Bundle 284
  • +🍒 Lilly (🌸◠‿◠) added Viki Spotter: School to DIG Weekly Bundle 284
  • +🍒 Lilly (🌸◠‿◠) added Viki Spotter: Megapolis to DIG Weekly Bundle 284
  • +🍒 Lilly (🌸◠‿◠) added Viki Spotter: Undersea to DIG Weekly Bundle 284
  • +🍒 Lilly (🌸◠‿◠) added Viki Spotter: The Farm to DIG Weekly Bundle 284
  • ✐🍒 Lilly (🌸◠‿◠) modified DIG Weekly Bundle 284
  • ✽🍒 Lilly (🌸◠‿◠) posted DIG Weekly Bundle 284

ⓘ About Bundles on Barter.vg

A list of nearly every Steam key game bundle published since Humble Indie Bundle #1 in 2010.
22064 games and items in 4516 bundles from 76 stores. Comprehensiveness is the goal, therefore the inclusions of bundles or stores are not endorsements. For recommendations, visit /r/GameDeals.

Help editors by reporting errors, problems, and missing bundles.

📖 Collections

Icons indicate if you own or want the games.These will appear if signed in.
📚 library; ★ wishlist; ⇄ tradable; X blacklist; ⇌ traded; ⌫ revoked; 📋 scratchpad

User Reviews

Percent of positive reviews from players that bought the game on Steam. If you purchased a key from a bundle or another store, your review would be excluded from this score. Games that do not have at least 10 reviews will not have a score. Click the review score to view the full listing of reviews.

Steam Trading Cards

Total number of Steam trading cards in the set. You’ll receive half that number of cards from playing for several hours, e.g. if the set has 5 cards, you will receive 3 cards as you play.
Learn about trading cards. Card data (cached daily) provided by Steam.tools.

✽ Bundle Count

Number of times the game has been in a bundle. Some bundles listed on Barter are not included in this count due to price or other aspect of the bundle. Not counted list.

US$ Retail Price

The non-discounted US Steam store price from the appdetail API. For global prices, see Steamdb.info.

Viki spotter: professions crack 2019

Disk Drill Pro 4.1.555.0 Crack Download With Torrent

Disk Drill Pro Crack as you know, each technology has its importance, own features, and also the functionality. But each user wants to use that technology and software, which will help them in the encasement of work effectiveness and efficiency. Everyone wants to use those applications which help to improve their services.

New technologies are the most attractive and eye-catching. One application not only performs one function, but it has more than one feature. We are here with the best apps which Users can use for different purposes or in various professions.

Disk Drill Basic is the best software nowadays, which was introduced by Clever files. Through this software, users can get maximum advantages; it helps you in the recovery of data. If the data which you keep in storage files are lost due to virus or some other reason by using this software you can recollect your information quickly.

Viki spotter: professions crack 2019

If you install this software, it means it is like a protector, defender of all your essential files. You can use this application in mobile; if your mobile goes on restore mode, this software automatically can protect your data because you can easily backup all your data.

With this software Disk Drill Pro Torrent, you cannot need to use hardware separately, but this disk drill software helps you to protect your data step by step.

Disk Drill Pro Activation Key Features:

  • You can also use it in film-making.
  • It allows you to take support at any time to restore the data.
  • You can use it for your demands you can take for office work, only for entertainment, and also for playing videos.
  • Helpful in saving time and essential data Disk Drill Pro Activation Code.
  • You do not need to waste your hours for the backup of your data; users can do this task in minutes.
  • These applications have the best feature, which is that you can lock your devices for your protection.
  • This software will save you money, so you do not need to buy other software.
  • You do not need to use any drive USB or Hard disk to keep data secure
  • The scanning of your document is high-speed and reliable.
  • If you feel that your files of documents are creating problems in the opening, you can delete this without any fear because you have the best software behind you.
  • Best for professionals and also for companies to secure private data.
  • With this game, you can make the best visual environment and also the best interface.
  • This software does the best work than the use of a recycle bin.
  • Disk Drill will help you with how to release stress about the loss of data.
  • You can use this software with high performance.
  • It gives your facility to use this application in any window; it does not require any specific window.
  • This software is straightforward to use Disk Drill Pro Serial Key.
  • Anyone can get to know it and can use it to solve their problem.
  • Reachable for everyone,
  • Extraordinary qualities.

Characteristics:

  1. It acts as a safeguard for the loss of data future.
  2. You feel satisfied with your data.
  3. Users can also use it not only for backup of files but also for songs and movies if the user deletes it mistakenly.
  4. With this software, you can try to use many formats of files.
  5. This work is so easily new users can use it as same as old users.
  6. It does more work with minimum time Disk Drill Pro License Key.
  7. It increases creativity on how to explore essential files if you lost your critical data.
  8. This software helps you if your window crashes, and you are depressed about your data.
  9. This application is free from any type of malware.
  10. Through this game, you can learn to bring the effectiveness of your work.
  11. You can reconstruct the audio and video format according to your own choice.
  12. You can not only use this software on window seven, but it is best for all versions.
  13. There is not any complicated method to install, but you can install it on your computers with a single click.
  14. You can have a user-friendly environment from this game
  15. Users can enjoy more than one functionality in one application.
  16. It does not only require one specific method of scanning, but you can use more than one way which you feel is comfortable for you.

Pros:

  • Best and cheapest tool.
  • Everyone can get it quickly.
  • Your deleted photos and videos it keeps safe in albums.
  • It gives you the maximum time till 30 days old to delete files you can recover.

It includes followings tools to recover data:

  1. Pandora Data Recovery
  2. Care Data Recovery
  3. Stellar Data Recovery
  4. Recuva Recovery
  5. Recover it Data.

Recuva Recovery:

It is software which you can use to back up your mp3 data, memory cards and also music and

Pictures.

Conclusion:

Источник: [https://torrent-igruha.org/3551-portal.html]

Cannot delete a Trojan (see screenshot)

step 2 - TDSSKiller log.txt results

 

 

 

 

03:06:02.0502 0x1250  TDSS rootkit removing tool 3.0.0.31 Apr 11 2014 08:55:10
03:06:05.0913 0x1250  ============================================================
03:06:05.0913 0x1250  Current date / time: 2014/04/18 03:06:05.0913
03:06:05.0913 0x1250  SystemInfo:
03:06:05.0913 0x1250  
03:06:05.0913 0x1250  OS Version: 6.1.7601 ServicePack: 1.0
03:06:05.0913 0x1250  Product type: Workstation
03:06:05.0913 0x1250  ComputerName: MSI-MSI
03:06:05.0914 0x1250  UserName: msi
03:06:05.0914 0x1250  Windows directory: C:\Windows
03:06:05.0914 0x1250  System windows directory: C:\Windows
03:06:05.0914 0x1250  Running under WOW64
03:06:05.0914 0x1250  Processor architecture: Intel x64
03:06:05.0914 0x1250  Number of processors: 4
03:06:05.0914 0x1250  Page size: 0x1000
03:06:05.0914 0x1250  Boot type: Normal boot
03:06:05.0914 0x1250  ============================================================
03:06:08.0099 0x1250  KLMD registered as C:\Windows\system32\drivers\37102115.sys
03:06:08.0338 0x1250  System UUID: {5EECFF24-F63B-2512-7B57-ADEF81ECC520}
03:06:09.0015 0x1250  Drive \Device\Harddisk0\DR0 - Size: 0x7470C06000 (465.76 Gb), SectorSize: 0x200, Cylinders: 0xED81, SectorsPerTrack: 0x3F, TracksPerCylinder: 0xFF, Type 'K0', Flags 0x00000040
03:06:09.0366 0x1250  Drive \Device\Harddisk1\DR3 - Size: 0xE8DED00000 (931.48 Gb), SectorSize: 0x200, Cylinders: 0x1DAFD, SectorsPerTrack: 0x3F, TracksPerCylinder: 0xFF, Type 'W'
03:06:09.0369 0x1250  ============================================================
03:06:09.0369 0x1250  \Device\Harddisk0\DR0:
03:06:09.0369 0x1250  MBR partitions:
03:06:09.0369 0x1250  \Device\Harddisk0\DR0\Partition1: MBR, Type 0x7, StartLBA 0x1832800, BlocksNum 0x22064800
03:06:09.0369 0x1250  \Device\Harddisk0\DR0\Partition2: MBR, Type 0x7, StartLBA 0x23897000, BlocksNum 0x16AEE800
03:06:09.0369 0x1250  \Device\Harddisk1\DR3:
03:06:09.0370 0x1250  MBR partitions:
03:06:09.0370 0x1250  \Device\Harddisk1\DR3\Partition1: MBR, Type 0x7, StartLBA 0x800, BlocksNum 0x746F6000
03:06:09.0370 0x1250  ============================================================
03:06:09.0421 0x1250  C: <-> \Device\Harddisk0\DR0\Partition1
03:06:09.0466 0x1250  D: <-> \Device\Harddisk0\DR0\Partition2
03:06:09.0481 0x1250  Y: <-> \Device\Harddisk1\DR3\Partition1
03:06:09.0481 0x1250  ============================================================
03:06:09.0481 0x1250  Initialize success
03:06:09.0481 0x1250  ============================================================
03:06:10.0514 0x1734  ============================================================
03:06:10.0514 0x1734  Scan started
03:06:10.0514 0x1734  Mode: Manual;
03:06:10.0514 0x1734  ============================================================
03:06:10.0514 0x1734  KSN ping started
03:06:13.0004 0x1734  KSN ping finished: true
03:06:13.0954 0x1734  ================ Scan system memory ========================
03:06:13.0954 0x1734  System memory - ok
03:06:13.0956 0x1734  ================ Scan services =============================
03:06:14.0278 0x1734  [ A87D604AEA360176311474C87A63BB88, B1507868C382CD5D2DBC0D62114FCFBF7A780904A2E3CA7C7C1DD0844ADA9A8F ] 1394ohci        C:\Windows\system32\drivers\1394ohci.sys
03:06:14.0285 0x1734  1394ohci - ok
03:06:14.0543 0x1734  [ ADC420616C501B45D26C0FD3EF1E54E4, 29FC41D40A35AC5476E2A673CE5B12684E0CFA12A1AEBEEBE5883FBA5CA68B67 ] ACDaemon        C:\Program Files (x86)\Common Files\ArcSoft\Connection Service\Bin\ACService.exe
03:06:14.0549 0x1734  ACDaemon - ok
03:06:14.0583 0x1734  [ D81D9E70B8A6DD14D42D7B4EFA65D5F2, FDAAB7E23012B4D31537C5BDEF245BB0A12FA060A072C250E21C68E18B22E002 ] ACPI            C:\Windows\system32\drivers\ACPI.sys
03:06:14.0595 0x1734  ACPI - ok
03:06:14.0614 0x1734  [ 99F8E788246D495CE3794D7E7821D2CA, F91615463270AD2601F882CAED43B88E7EDA115B9FD03FC56320E48119F15F76 ] AcpiPmi         C:\Windows\system32\drivers\acpipmi.sys
03:06:14.0614 0x1734  AcpiPmi - ok
03:06:14.0783 0x1734  [ AD1EE24224F770E598794ECABA26E8F3, 7ABD9895311FA257CBF1AFA196FB1A4AEC760252B8B364D4BB69877B704E2019 ] AcrSch2Svc      C:\Program Files (x86)\Common Files\Acronis\Schedule2\schedul2.exe
03:06:14.0812 0x1734  AcrSch2Svc - ok
03:06:14.0876 0x1734  [ B362181ED3771DC03B4141927C80F801, 69514E5177A0AEA89C27C2234712F9F82E8D8F99E1FD4273898C9324C6FF7472 ] AdobeARMservice C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe
03:06:14.0880 0x1734  AdobeARMservice - ok
03:06:15.0093 0x1734  [ C2CE3311D2477B1B24CFB67020AD49B6, 5F800CDD69BA4E8813876BE82FC9FED3F2584DB8C8ADED345F7B5C2A32F809AE ] AdobeFlashPlayerUpdateSvc C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe
03:06:15.0100 0x1734  AdobeFlashPlayerUpdateSvc - ok
03:06:15.0176 0x1734  [ 2F6B34B83843F0C5118B63AC634F5BF4, 43E3F5FBFB5D33981AC503DEE476868EC029815D459E7C36C4ABC2D2F75B5735 ] adp94xx         C:\Windows\system32\drivers\adp94xx.sys
03:06:15.0189 0x1734  adp94xx - ok
03:06:15.0263 0x1734  [ 597F78224EE9224EA1A13D6350CED962, DA7FD99BE5E3B7B98605BF5C13BF3F1A286C0DE1240617570B46FE4605E59BDC ] adpahci         C:\Windows\system32\drivers\adpahci.sys
03:06:15.0272 0x1734  adpahci - ok
03:06:15.0297 0x1734  [ E109549C90F62FB570B9540C4B148E54, E804563735153EA00A00641814244BC8A347B578E7D63A16F43FB17566EE5559 ] adpu320         C:\Windows\system32\drivers\adpu320.sys
03:06:15.0302 0x1734  adpu320 - ok
03:06:15.0384 0x1734  [ 4B78B431F225FD8624C5655CB1DE7B61, 198A5AF2125C7C41F531A652D200C083A55A97DC541E3C0B5B253C7329949156 ] AeLookupSvc     C:\Windows\System32\aelupsvc.dll
03:06:15.0389 0x1734  AeLookupSvc - ok
03:06:15.0481 0x1734  [ AE1FCE2CD1E99BEA89183BA8CD320872, 96F14BCA0C2479F39A5027A71922907D0F35CAD8E9A5037674DF7995BBDB2B51 ] afcdp           C:\Windows\system32\DRIVERS\afcdp.sys
03:06:15.0496 0x1734  afcdp - ok
03:06:15.0688 0x1734  [ AF44F7E027037628F1FAC3C13CDE73E6, 56A95EBF2241C275FD401487C5F0E86859F8637D8B1BD01B7157EE9BC22B1907 ] afcdpsrv        C:\Program Files (x86)\Common Files\Acronis\CDP\afcdpsrv.exe
03:06:15.0775 0x1734  afcdpsrv - ok
03:06:15.0892 0x1734  [ 79059559E89D06E8B80CE2944BE20228, 6E041D2FED2D0C3D8E16E56CB61D3245F9144EA92F5BDC9A4AA30598D1C8E6EE ] AFD             C:\Windows\system32\drivers\afd.sys
03:06:15.0909 0x1734  AFD - ok
03:06:15.0948 0x1734  [ 608C14DBA7299D8CB6ED035A68A15799, 45360F89640BF1127C82A32393BD76205E4FA067889C40C491602F370C09282A ] agp440          C:\Windows\system32\drivers\agp440.sys
03:06:15.0950 0x1734  agp440 - ok
03:06:15.0965 0x1734  [ 3290D6946B5E30E70414990574883DDB, 0E9294E1991572256B3CDA6B031DB9F39CA601385515EE59F1F601725B889663 ] ALG             C:\Windows\System32\alg.exe
03:06:15.0967 0x1734  ALG - ok
03:06:16.0010 0x1734  [ 5812713A477A3AD7363C7438CA2EE038, A7316299470D2E57A11499C752A711BF4A71EB11C9CBA731ED0945FF6A966721 ] aliide          C:\Windows\system32\drivers\aliide.sys
03:06:16.0011 0x1734  aliide - ok
03:06:16.0065 0x1734  [ AA04E9011C4CFEC60AF3734BF64EB50F, 9297758DC7CF6F9EA61CB28A4E52C9B8BDA8732F293237711850422F3A391A9F ] AMD External Events Utility C:\Windows\system32\atiesrxx.exe
03:06:16.0076 0x1734  AMD External Events Utility - ok
03:06:16.0095 0x1734  [ 1FF8B4431C353CE385C875F194924C0C, 3EA3A7F426B0FFC2461EDF4FDB4B58ACC9D0730EDA5B728D1EA1346EA0A02720 ] amdide          C:\Windows\system32\drivers\amdide.sys
03:06:16.0096 0x1734  amdide - ok
03:06:16.0136 0x1734  [ 7024F087CFF1833A806193EF9D22CDA9, E7F27E488C38338388103D3B7EEDD61D05E14FB140992AEE6F492FFC821BF529 ] AmdK8           C:\Windows\system32\drivers\amdk8.sys
03:06:16.0138 0x1734  AmdK8 - ok
03:06:16.0456 0x1734  [ 0D0AF6574E723334F8BDE3E631145D18, 46BE3216ADC1FA7165B81F4C1671429B51866533CF3E59242BC97C8BC0B4C978 ] amdkmdag        C:\Windows\system32\DRIVERS\atikmdag.sys
03:06:16.0633 0x1734  amdkmdag - ok
03:06:16.0769 0x1734  [ 693D7A53BCA6433FDC660CEA0AD20153, 10BEFEA463DAB99ED8DF9A816846773405A1F22CC920D0113D6A6007334BCAB8 ] amdkmdap        C:\Windows\system32\DRIVERS\atikmpag.sys
03:06:16.0778 0x1734  amdkmdap - ok
03:06:16.0796 0x1734  [ 1E56388B3FE0D031C44144EB8C4D6217, E88CA76FD47BA0EB427D59CB9BE040DE133D89D4E62D03A8D622624531D27487 ] AmdPPM          C:\Windows\system32\drivers\amdppm.sys
03:06:16.0798 0x1734  AmdPPM - ok
03:06:16.0853 0x1734  [ D4121AE6D0C0E7E13AA221AA57EF2D49, 626F43C099BD197BE56648C367B711143C2BCCE96496BBDEF19F391D52FA01D0 ] amdsata         C:\Windows\system32\drivers\amdsata.sys
03:06:16.0856 0x1734  amdsata - ok
03:06:16.0883 0x1734  [ F67F933E79241ED32FF46A4F29B5120B, D6EF539058F159CC4DD14CA9B1FD924998FEAC9D325C823C7A2DD21FEF1DC1A8 ] amdsbs          C:\Windows\system32\drivers\amdsbs.sys
03:06:16.0889 0x1734  amdsbs - ok
03:06:16.0959 0x1734  [ 540DAF1CEA6094886D72126FD7C33048, 296578572A93F5B74E1AD443E000B79DC99D1CBD25082E02704800F886A3065F ] amdxata         C:\Windows\system32\drivers\amdxata.sys
03:06:16.0961 0x1734  amdxata - ok
03:06:17.0004 0x1734  [ 89A69C3F2F319B43379399547526D952, 8ABDB4B8E106F96EBBA0D4D04C4F432296516E107E7BA5644ED2E50CF9BB491A ] AppID           C:\Windows\system32\drivers\appid.sys
03:06:17.0006 0x1734  AppID - ok
03:06:17.0069 0x1734  [ 0BC381A15355A3982216F7172F545DE1, C33AF13CB218F7BF52E967452573DF2ADD20A95C6BF99229794FEF07C4BBE725 ] AppIDSvc        C:\Windows\System32\appidsvc.dll
03:06:17.0070 0x1734  AppIDSvc - ok
03:06:17.0120 0x1734  [ 9D2A2369AB4B08A4905FE72DB104498F, D6FA1705018BABABFA2362E05691A0D6408D14DE7B76129B16D0A1DAD6378E58 ] Appinfo         C:\Windows\System32\appinfo.dll
03:06:17.0123 0x1734  Appinfo - ok
03:06:17.0169 0x1734  [ C484F8CEB1717C540242531DB7845C4E, C507CE26716EB923B864ED85E8FA0B24591E2784A2F4F0E78AEED7E9953311F6 ] arc             C:\Windows\system32\drivers\arc.sys
03:06:17.0172 0x1734  arc - ok
03:06:17.0187 0x1734  [ 019AF6924AEFE7839F61C830227FE79C, 5926B9DDFC9198043CDD6EA0B384C83B001EC225A8125628C4A45A3E6C42C72A ] arcsas          C:\Windows\system32\drivers\arcsas.sys
03:06:17.0190 0x1734  arcsas - ok
03:06:17.0245 0x1734  [ C130BC4A51B1382B2BE8E44579EC4C0A, CC1FD33ED7CAD87A504D8678F8482CAECACD18C727BB97FFB86F39255563EEF2 ] ArcSoftKsUFilter C:\Windows\system32\DRIVERS\ArcSoftKsUFilter.sys
03:06:17.0246 0x1734  ArcSoftKsUFilter - ok
03:06:17.0466 0x1734  [ 9A262EDD17F8473B91B333D6B031A901, 05DFBD3A7D83FDE1D062EA719ACA9EC48CB7FD42D17DDD88B82E5D25469ADD23 ] aspnet_state    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
03:06:17.0468 0x1734  aspnet_state - ok
03:06:17.0487 0x1734  [ 769765CE2CC62867468CEA93969B2242, 0D8F19D49869DF93A3876B4C2E249D12E83F9CE11DAE8917D368E292043D4D26 ] AsyncMac        C:\Windows\system32\DRIVERS\asyncmac.sys
03:06:17.0488 0x1734  AsyncMac - ok
03:06:17.0524 0x1734  [ 02062C0B390B7729EDC9E69C680A6F3C, 0261683C6DC2706DCE491A1CDC954AC9C9E649376EC30760BB4E225E18DC5273 ] atapi           C:\Windows\system32\drivers\atapi.sys
03:06:17.0525 0x1734  atapi - ok
03:06:17.0697 0x1734  [ B4174564AD5834A1680610572477878C, EA8687C90FE871AA427B4139BEE425E6DC4CFBC4CF3DCE29695EB9B967D9872F ] athr            C:\Windows\system32\DRIVERS\athrx.sys
03:06:17.0763 0x1734  athr - ok
03:06:17.0919 0x1734  [ F23FEF6D569FCE88671949894A8BECF1, FCE7B156ED663471CF9A736915F00302E93B50FC647563D235313A37FCE8F0F6 ] AudioEndpointBuilder C:\Windows\System32\Audiosrv.dll
03:06:17.0940 0x1734  AudioEndpointBuilder - ok
03:06:17.0972 0x1734  [ F23FEF6D569FCE88671949894A8BECF1, FCE7B156ED663471CF9A736915F00302E93B50FC647563D235313A37FCE8F0F6 ] AudioSrv        C:\Windows\System32\Audiosrv.dll
03:06:17.0989 0x1734  AudioSrv - ok
03:06:18.0017 0x1734  [ A6BF31A71B409DFA8CAC83159E1E2AFF, CBB83F73FFD3C3FB4F96605067739F8F7A4A40B2B05417FA49E575E95628753F ] AxInstSV        C:\Windows\System32\AxInstSV.dll
03:06:18.0020 0x1734  AxInstSV - ok
03:06:18.0105 0x1734  [ 3E5B191307609F7514148C6832BB0842, DE011CB7AA4A2405FAF21575182E0793A1D83DFFC44E9A7864D59F3D51D8D580 ] b06bdrv         C:\Windows\system32\drivers\bxvbda.sys
03:06:18.0125 0x1734  b06bdrv - ok
03:06:18.0242 0x1734  [ B5ACE6968304A3900EEB1EBFD9622DF2, 1DAA118D8CA3F97B34DF3D3CDA1C78EAB2ED225699FEABE89D331AE0CB7679FA ] b57nd60a        C:\Windows\system32\DRIVERS\b57nd60a.sys
03:06:18.0259 0x1734  b57nd60a - ok
03:06:18.0397 0x1734  [ C68EF736CB6E92E885B9A085536B8C6F, F8821F5ECAAA25457619AB11B46AF372B1E7AED7491D2C640C1C4A67CB1E0D77 ] BBSvc           C:\Program Files (x86)\Microsoft\BingBar\7.1.352.0\BBSvc.exe
03:06:18.0403 0x1734  BBSvc - ok
03:06:18.0433 0x1734  [ D4B0EE780CF3C1918A8FF65865D3B91F, 6ECA1E43C114D6E449D0A509CA3A8B762F53C5BC23B4D37F877B8DB2367010E5 ] BBUpdate        C:\Program Files (x86)\Microsoft\BingBar\7.1.352.0\SeaPort.exe
03:06:18.0439 0x1734  BBUpdate - ok
03:06:18.0492 0x1734  [ FDE360167101B4E45A96F939F388AEB0, 8D1457E866BBD645C4B9710DFBFF93405CC1193BF9AE42326F2382500B713B82 ] BDESVC          C:\Windows\System32\bdesvc.dll
03:06:18.0499 0x1734  BDESVC - ok
03:06:18.0517 0x1734  [ 16A47CE2DECC9B099349A5F840654746, 77C008AEDB07FAC66413841D65C952DDB56FE7DCA5E9EF9C8F4130336B838024 ] Beep            C:\Windows\system32\drivers\Beep.sys
03:06:18.0518 0x1734  Beep - ok
03:06:18.0579 0x1734  [ 82974D6A2FD19445CC5171FC378668A4, 075D25F47C0D2277E40AF8615571DAA5EB16B1824563632A9A7EC62505C29A4A ] BFE             C:\Windows\System32\bfe.dll
03:06:18.0599 0x1734  BFE - ok
03:06:18.0673 0x1734  [ 1EA7969E3271CBC59E1730697DC74682, D511A34D63A6E0E6E7D1879068E2CD3D87ABEAF4936B2EA8CDDAD9F79D60FA04 ] BITS            C:\Windows\System32\qmgr.dll
03:06:18.0697 0x1734  BITS - ok
03:06:18.0729 0x1734  [ 61583EE3C3A17003C4ACD0475646B4D3, 17E4BECC309C450E7E44F59A9C0BBC24D21BDC66DFBA65B8F198A00BB47A9811 ] blbdrive        C:\Windows\system32\DRIVERS\blbdrive.sys
03:06:18.0731 0x1734  blbdrive - ok
03:06:19.0014 0x1734  [ 9928D0CDD422213432C28EB22A856299, 7D419BA2096CF4C8919D86CAFF2BF55E8979870EE268CEE88E7937A4BF7454A3 ] Bluetooth Device Manager C:\Program Files\Motorola\Bluetooth\devmgrsrv.exe
03:06:19.0112 0x1734  Bluetooth Device Manager - ok
03:06:19.0178 0x1734  [ 21B1CB06C0254BBC08B8C30D8F282E69, 96119169E4CFE89F52F80E5B2C27988EB4B5E9F1AB41A58F1C42BD8DB473099E ] Bluetooth Media Service C:\Program Files\Motorola\Bluetooth\audiosrv.exe
03:06:19.0207 0x1734  Bluetooth Media Service - ok
03:06:19.0245 0x1734  [ 0BC0DC720F22A9D6D721FD5B7D15E84F, B1BD408A3A97AD6D8AFF17065FE5DFD7F156DC80D4FA9B6F471E220924ACDE5E ] Bluetooth OBEX Service C:\Program Files\Motorola\Bluetooth\obexsrv.exe
03:06:19.0261 0x1734  Bluetooth OBEX Service - ok
03:06:19.0309 0x1734  [ 6C02A83164F5CC0A262F4199F0871CF5, AD4632A6A203CB40970D848315D8ADB9C898349E20D8DF4107C2AE2703A2CF28 ] bowser          C:\Windows\system32\DRIVERS\bowser.sys
03:06:19.0312 0x1734  bowser - ok
03:06:19.0369 0x1734  [ F09EEE9EDC320B5E1501F749FDE686C8, 66691114C42E12F4CC6DC4078D4D2FA4029759ACDAF1B59D17383487180E84E3 ] BrFiltLo        C:\Windows\system32\drivers\BrFiltLo.sys
03:06:19.0370 0x1734  BrFiltLo - ok
03:06:19.0389 0x1734  [ B114D3098E9BDB8BEA8B053685831BE6, 0ED23C1897F35FA00B9C2848DE4ED200E18688AA7825674888054BBC3A3EB92C ] BrFiltUp        C:\Windows\system32\drivers\BrFiltUp.sys
03:06:19.0390 0x1734  BrFiltUp - ok
03:06:19.0466 0x1734  [ 05F5A0D14A2EE1D8255C2AA0E9E8E694, 40011138869F5496A3E78D38C9900B466B6F3877526AC22952DCD528173F4645 ] Browser         C:\Windows\System32\browser.dll
03:06:19.0473 0x1734  Browser - ok
03:06:19.0565 0x1734  [ 43BEA8D483BF1870F018E2D02E06A5BD, 4E6F5A5FD8C796A110B0DC9FF29E31EA78C04518FC1C840EF61BABD58AB10272 ] Brserid         C:\Windows\System32\Drivers\Brserid.sys
03:06:19.0578 0x1734  Brserid - ok
03:06:19.0616 0x1734  [ A6ECA2151B08A09CACECA35C07F05B42, E2875BB7768ABAF38C3377007AA0A3C281503474D1831E396FB6599721586B0C ] BrSerWdm        C:\Windows\System32\Drivers\BrSerWdm.sys
03:06:19.0618 0x1734  BrSerWdm - ok
03:06:19.0636 0x1734  [ B79968002C277E869CF38BD22CD61524, 50631836502237AF4893ECDCEA43B9031C3DE97433F594D46AF7C3C77F331983 ] BrUsbMdm        C:\Windows\System32\Drivers\BrUsbMdm.sys
03:06:19.0637 0x1734  BrUsbMdm - ok
03:06:19.0656 0x1734  [ A87528880231C54E75EA7A44943B38BF, 4C8BBB29FDA76A96840AA47A8613C15D4466F9273A13941C19507008629709C9 ] BrUsbSer        C:\Windows\System32\Drivers\BrUsbSer.sys
03:06:19.0656 0x1734  BrUsbSer - ok
03:06:19.0671 0x1734  [ 9DA669F11D1F894AB4EB69BF546A42E8, B498B8B6CEF957B73179D1ADAF084BBB57BB3735D810F9BE2C7B1D58A4FD25A4 ] BTHMODEM        C:\Windows\system32\drivers\bthmodem.sys
03:06:19.0674 0x1734  BTHMODEM - ok
03:06:19.0741 0x1734  [ 95F9C2976059462CBBF227F7AAB10DE9, 2797AE919FF7606B070FB039CECDB0707CD2131DCAC09C5DF14F443D881C9F34 ] bthserv         C:\Windows\system32\bthserv.dll
03:06:19.0745 0x1734  bthserv - ok
03:06:19.0819 0x1734  [ 6D3FF2B480F7AB8DA103CBC7FBEACD48, 549EAF2A6362DD7FE3B9B3A6644CF89D6BEEC9C4D71296580799B5399C4304D1 ] BTMCOM          C:\Windows\system32\Drivers\btmcom.sys
03:06:19.0822 0x1734  BTMCOM - ok
03:06:19.0926 0x1734  [ 30F82ED1690986E9E49357A1F6F6D14A, 87B4A0FBD3F9A3DA1C96210D986D734BE2D83A40BBD562133A9355B3AA162A8F ] BTMUSB          C:\Windows\system32\Drivers\btmusb.sys
03:06:19.0940 0x1734  BTMUSB - ok
03:06:20.0210 0x1734  [ 72551A9AE5F68905DFC3CBA0D5242566, 15C273519C3AD1B2AF68F669125AFE607A86A60D680E299631D5E893C3CAA7E7 ] c2cautoupdatesvc C:\Program Files (x86)\Skype\Toolbars\AutoUpdate\SkypeC2CAutoUpdateSvc.exe
03:06:20.0244 0x1734  c2cautoupdatesvc - ok
03:06:20.0348 0x1734  [ 6B669A00A431FF6CDCE67458933F5F0F, 81419EB18BB4EB96E48C99A1D45B0267E779E135427B3AEC872A1A5DD810B23F ] c2cpnrsvc       C:\Program Files (x86)\Skype\Toolbars\PNRSvc\SkypeC2CPNRSvc.exe
03:06:20.0391 0x1734  c2cpnrsvc - ok
03:06:20.0453 0x1734  [ B8BD2BB284668C84865658C77574381A, 6C55BA288B626DF172FDFEA0BD7027FAEBA1F44EF20AB55160D7C7DC6E717D65 ] cdfs            C:\Windows\system32\DRIVERS\cdfs.sys
03:06:20.0458 0x1734  cdfs - ok
03:06:20.0496 0x1734  [ F036CE71586E93D94DAB220D7BDF4416, BD07AAD9E20CEAF9FC84E4977C55EA2C45604A2C682AC70B9B9A2199B6713D5B ] cdrom           C:\Windows\system32\DRIVERS\cdrom.sys
03:06:20.0503 0x1734  cdrom - ok
03:06:20.0557 0x1734  [ F17D1D393BBC69C5322FBFAFACA28C7F, 62A1A92B3C52ADFD0B808D7F69DD50238B5F202421F1786F7EAEAA63F274B3E8 ] CertPropSvc     C:\Windows\System32\certprop.dll
03:06:20.0563 0x1734  CertPropSvc - ok
03:06:20.0744 0x1734  [ 6A61DFC83D7BB41F376CBB16124D480B, BF6FEB177D892BA4EE2973596A99A5F23DE28EE164FBF47EAC7A601EDD103EDD ] CGVPNCliSrvc    C:\Program Files\CyberGhost VPN\CGVPNCliService.exe
03:06:20.0802 0x1734  CGVPNCliSrvc - ok
03:06:20.0824 0x1734  [ D7CD5C4E1B71FA62050515314CFB52CF, 513B5A849899F379F0BC6AB3A8A05C3493C2393C95F036612B96EC6E252E1C64 ] circlass        C:\Windows\system32\drivers\circlass.sys
03:06:20.0826 0x1734  circlass - ok
03:06:20.0850 0x1734  [ FE1EC06F2253F691FE36217C592A0206, B9F122DB5E665ECDF29A5CB8BB6B531236F31A54A95769D6C5C1924C87FE70CE ] CLFS            C:\Windows\system32\CLFS.sys
03:06:20.0859 0x1734  CLFS - ok
03:06:20.0947 0x1734  [ D88040F816FDA31C3B466F0FA0918F29, 39D3630E623DA25B8444B6D3AAAB16B98E7E289C5619E19A85D47B74C71449F3 ] clr_optimization_v2.0.50727_32 C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
03:06:20.0952 0x1734  clr_optimization_v2.0.50727_32 - ok
03:06:21.0048 0x1734  [ D1CEEA2B47CB998321C579651CE3E4F8, 654013B8FD229A50017B08DEC6CA19C7DDA8CE0771260E057A92625201D539B1 ] clr_optimization_v2.0.50727_64 C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
03:06:21.0053 0x1734  clr_optimization_v2.0.50727_64 - ok
03:06:21.0177 0x1734  [ E87213F37A13E2B54391E40934F071D0, 7EB221127EFB5BF158FB03D18EFDA2C55FB6CE3D1A1FE69C01D70DBED02C87E5 ] clr_optimization_v4.0.30319_32 C:\windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
03:06:21.0183 0x1734  clr_optimization_v4.0.30319_32 - ok
03:06:21.0231 0x1734  [ 4AEDAB50F83580D0B4D6CF78191F92AA, D113C47013B018B45161911B96E93AF96A2F3B34FA47061BF6E7A71FBA03194A ] clr_optimization_v4.0.30319_64 C:\windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
03:06:21.0236 0x1734  clr_optimization_v4.0.30319_64 - ok
03:06:21.0259 0x1734  [ 0840155D0BDDF1190F84A663C284BD33, 696039FA63CFEB33487FAA8FD7BBDB220141E9C6E529355D768DFC87999A9C3A ] CmBatt          C:\Windows\system32\DRIVERS\CmBatt.sys
03:06:21.0260 0x1734  CmBatt - ok
03:06:21.0301 0x1734  [ E19D3F095812725D88F9001985B94EDD, 46243C5CCC4981CAC6FA6452FFCEC33329BF172448F1852D52592C9342E0E18B ] cmdide          C:\Windows\system32\drivers\cmdide.sys
03:06:21.0302 0x1734  cmdide - ok
03:06:21.0363 0x1734  [ EBF28856F69CF094A902F884CF989706, AD6C9F0BC20AA49EEE5478DA0F856F0EA2B414B63208C5FFB03C9D7F5B59765F ] CNG             C:\Windows\system32\Drivers\cng.sys
03:06:21.0377 0x1734  CNG - ok
03:06:21.0437 0x1734  [ 102DE219C3F61415F964C88E9085AD14, CD74CB703381F1382C32CF892FF2F908F4C9412E1BC77234F8FEA5D4666E1BF1 ] Compbatt        C:\Windows\system32\DRIVERS\compbatt.sys
03:06:21.0438 0x1734  Compbatt - ok
03:06:21.0453 0x1734  [ 03EDB043586CCEBA243D689BDDA370A8, 0E4523AA332E242D5C2C61C5717DBA5AB6E42DADB5A7E512505FC2B6CC224959 ] CompositeBus    C:\Windows\system32\DRIVERS\CompositeBus.sys
03:06:21.0455 0x1734  CompositeBus - ok
03:06:21.0461 0x1734  COMSysApp - ok
03:06:21.0476 0x1734  [ 1C827878A998C18847245FE1F34EE597, 41EF7443D8B2733AA35CAC64B4F5F74FAC8BB0DA7D3936B69EC38E2DC3972E60 ] crcdisk         C:\Windows\system32\drivers\crcdisk.sys
03:06:21.0477 0x1734  crcdisk - ok
03:06:21.0533 0x1734  [ 6B400F211BEE880A37A1ED0368776BF4, 2F27C6FA96A1C8CBDA467846DA57E63949A7EA37DB094B13397DDD30114295BD ] CryptSvc        C:\Windows\system32\cryptsvc.dll
03:06:21.0538 0x1734  CryptSvc - ok
03:06:21.0598 0x1734  [ 5C627D1B1138676C0A7AB2C2C190D123, C5003F2C912C5CA990E634818D3B4FD72F871900AF2948BD6C4D6400B354B401 ] DcomLaunch      C:\Windows\system32\rpcss.dll
03:06:21.0613 0x1734  DcomLaunch - ok
03:06:21.0663 0x1734  [ 3CEC7631A84943677AA8FA8EE5B6B43D, 32061DAC9ED6C1EBA3B367B18D0E965AEEC2DF635DCF794EC39D086D32503AC5 ] defragsvc       C:\Windows\System32\defragsvc.dll
03:06:21.0671 0x1734  defragsvc - ok
03:06:21.0706 0x1734  [ 9BB2EF44EAA163B29C4A4587887A0FE4, 03667BC3EA5003F4236929C10F23D8F108AFCB29DB5559E751FB26DFB318636F ] DfsC            C:\Windows\system32\Drivers\dfsc.sys
03:06:21.0709 0x1734  DfsC - ok
03:06:21.0736 0x1734  [ 43D808F5D9E1A18E5EEB5EBC83969E4E, C10D1155D71EABE4ED44C656A8F13078A8A4E850C4A8FBB92D52D173430972B8 ] Dhcp            C:\Windows\system32\dhcpcore.dll
03:06:21.0744 0x1734  Dhcp - ok
03:06:21.0763 0x1734  [ 13096B05847EC78F0977F2C0F79E9AB3, 1E44981B684F3E56F5D2439BB7FA78BD1BC876BB2265AE089AEC68F241B05B26 ] discache        C:\Windows\system32\drivers\discache.sys
03:06:21.0764 0x1734  discache - ok
03:06:21.0798 0x1734  [ 9819EEE8B5EA3784EC4AF3B137A5244C, 571BC886E87C888DA96282E381A746D273B58B9074E84D4CA91275E26056D427 ] Disk            C:\Windows\system32\drivers\disk.sys
03:06:21.0800 0x1734  Disk - ok
03:06:21.0882 0x1734  [ 16835866AAA693C7D7FCEBA8FFF706E4, 15891558F7C1F2BB57A98769601D447ED0D952354A8BB347312D034DC03E0242 ] Dnscache        C:\Windows\System32\dnsrslvr.dll
03:06:21.0891 0x1734  Dnscache - ok
03:06:21.0951 0x1734  [ B1FB3DDCA0FDF408750D5843591AFBC6, AB6AD9C5E7BA2E3646D0115B67C4800D1CB43B4B12716397657C7ADEEE807304 ] dot3svc         C:\Windows\System32\dot3svc.dll
03:06:21.0964 0x1734  dot3svc - ok
03:06:21.0996 0x1734  [ B26F4F737E8F9DF4F31AF6CF31D05820, 394BBBED4EC7FAD4110F62A43BFE0801D4AC56FFAC6C741C69407B26402311C7 ] DPS             C:\Windows\system32\dps.dll
03:06:22.0001 0x1734  DPS - ok
03:06:22.0057 0x1734  [ 9B19F34400D24DF84C858A421C205754, 967AF267B4124BADA8F507CEBF25F2192D146A4D63BE71B45BFC03C5DA7F21A7 ] drmkaud         C:\Windows\system32\drivers\drmkaud.sys
03:06:22.0057 0x1734  drmkaud - ok
03:06:22.0173 0x1734  [ 88612F1CE3BF42256913BF6E61C70D52, 7CF190F83FA8F15C33008EB381D3E345CEF37CBC046227DED26B36799EF4D9A7 ] DXGKrnl         C:\Windows\System32\drivers\dxgkrnl.sys
03:06:22.0196 0x1734  DXGKrnl - ok
03:06:22.0250 0x1734  [ E2DDA8726DA9CB5B2C4000C9018A9633, 0C967DBC3636A76A696997192A158AA92A1AF19F01E3C66D5BF91818A8FAEA76 ] EapHost         C:\Windows\System32\eapsvc.dll
03:06:22.0258 0x1734  EapHost - ok
03:06:22.0434 0x1734  [ DC5D737F51BE844D8C82C695EB17372F, 6D4022D9A46EDE89CEF0FAEADCC94C903234DFC460C0180D24FF9E38E8853017 ] ebdrv           C:\Windows\system32\drivers\evbda.sys
03:06:22.0513 0x1734  ebdrv - ok
03:06:22.0574 0x1734  [ 4D71227301DD8D09097B9E4CC6527E5A, 193D47ADCB722B581CC0F29B794AB3E455B6E9BEA367CE9A5216A09E055B7F1E ] EFS             C:\Windows\System32\lsass.exe
03:06:22.0578 0x1734  EFS - ok
03:06:22.0701 0x1734  [ C4002B6B41975F057D98C439030CEA07, 3D2484FBB832EFB90504DD406ED1CF3065139B1FE1646471811F3A5679EF75F1 ] ehRecvr         C:\Windows\ehome\ehRecvr.exe
03:06:22.0722 0x1734  ehRecvr - ok
03:06:22.0752 0x1734  [ 4705E8EF9934482C5BB488CE28AFC681, 359E9EC5693CE0BE89082E1D5D8F5C5439A5B985010FF0CB45C11E3CFE30637D ] ehSched         C:\Windows\ehome\ehsched.exe
03:06:22.0755 0x1734  ehSched - ok
03:06:22.0843 0x1734  [ 0E5DA5369A0FCAEA12456DD852545184, 9A64AC5396F978C3B92794EDCE84DCA938E4662868250F8C18FA7C2C172233F8 ] elxstor         C:\Windows\system32\drivers\elxstor.sys
03:06:22.0865 0x1734  elxstor - ok
03:06:22.0917 0x1734  [ 6106653B08F4F72EEAA7F099E7C408A4, 96B77284744F8761C4F2558388E0AEE2140618B484FF53FA8B222B340D2A9C84 ] epmntdrv        C:\windows\system32\epmntdrv.sys
03:06:22.0918 0x1734  epmntdrv - ok
03:06:22.0936 0x1734  [ 34A3C54752046E79A126E15C51DB409B, 7D5B5E150C7C73666F99CBAFF759029716C86F16B927E0078D77F8A696616D75 ] ErrDev          C:\Windows\system32\drivers\errdev.sys
03:06:22.0937 0x1734  ErrDev - ok
03:06:23.0009 0x1734  [ 991C04A31777ED77CB92A4F96F14C2E2, 6CC2A311D8E67032D0847D70B20DCA87B52B2B7FB3C380B3A5AB6C233E955DD2 ] EuGdiDrv        C:\windows\system32\EuGdiDrv.sys
03:06:23.0010 0x1734  EuGdiDrv - ok
03:06:23.0101 0x1734  [ 4166F82BE4D24938977DD1746BE9B8A0, 24121751B7306225AD1C808442D7B030DEF377E9316AA0A3C5C7460E87317881 ] EventSystem     C:\Windows\system32\es.dll
03:06:23.0114 0x1734  EventSystem - ok
03:06:23.0138 0x1734  [ A510C654EC00C1E9BDD91EEB3A59823B, 76CD277730F7B08D375770CD373D786160F34D1481AF0536BA1A5D2727E255F5 ] exfat           C:\Windows\system32\drivers\exfat.sys
03:06:23.0144 0x1734  exfat - ok
03:06:23.0169 0x1734  [ 0ADC83218B66A6DB380C330836F3E36D, 798D6F83B5DBCC1656595E0A96CF12087FCCBE19D1982890D0CE5F629B328B29 ] fastfat         C:\Windows\system32\drivers\fastfat.sys
03:06:23.0175 0x1734  fastfat - ok
03:06:23.0268 0x1734  [ DBEFD454F8318A0EF691FDD2EAAB44EB, 7F52AE222FF28503B6FC4A5852BD0CAEAF187BE69AF4B577D3DE474C24366099 ] Fax             C:\Windows\system32\fxssvc.exe
03:06:23.0291 0x1734  Fax - ok
03:06:23.0330 0x1734  [ D765D19CD8EF61F650C384F62FAC00AB, 9F0A483A043D3BA873232AD3BA5F7BF9173832550A27AF3E8BD433905BD2A0EE ] fdc             C:\Windows\system32\drivers\fdc.sys
03:06:23.0331 0x1734  fdc - ok
03:06:23.0359 0x1734  [ 0438CAB2E03F4FB61455A7956026FE86, 6D4DDC2973DB25CE0C7646BC85EFBCC004EBE35EA683F62162AE317C6F1D8DFE ] fdPHost         C:\Windows\system32\fdPHost.dll
03:06:23.0361 0x1734  fdPHost - ok
03:06:23.0374 0x1734  [ 802496CB59A30349F9A6DD22D6947644, 52D59D3D628D5661F83F090F33F744F6916E0CC1F76E5A33983E06EB66AE19F8 ] FDResPub        C:\Windows\system32\fdrespub.dll
03:06:23.0375 0x1734  FDResPub - ok
03:06:23.0383 0x1734  [ 655661BE46B5F5F3FD454E2C3095B930, 549C8E2A2A37757E560D55FFA6BFDD838205F17E40561E67F0124C934272CD1A ] FileInfo        C:\Windows\system32\drivers\fileinfo.sys
03:06:23.0386 0x1734  FileInfo - ok
03:06:23.0401 0x1734  [ 5F671AB5BC87EEA04EC38A6CD5962A47, 6B61D3363FF3F9C439BD51102C284972EAE96ACC0683B9DC7E12D25D0ADC51B6 ] Filetrace       C:\Windows\system32\drivers\filetrace.sys
03:06:23.0402 0x1734  Filetrace - ok
03:06:23.0495 0x1734  [ 3D9B36631032FDE0FFEA0DC0260E4E35, 48B574A67D3FA015EBD078715CEC3E2B63B939D379CD4B40BFBB80397A2C58B3 ] FLEXnet Licensing Service C:\Program Files (x86)\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
03:06:23.0511 0x1734  FLEXnet Licensing Service - ok
03:06:23.0643 0x1734  [ 52C0312AB35EB7187015FB6A99136BB5, 54A45B0BF8108D018C86FD0542DA92E7A6F58CDB92C9E3674E115CD770031732 ] FLEXnet Licensing Service 64 C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService64.exe
03:06:23.0668 0x1734  FLEXnet Licensing Service 64 - ok
03:06:23.0689 0x1734  [ C172A0F53008EAEB8EA33FE10E177AF5, 9175A95B323696D1B35C9EFEB7790DD64E6EE0B7021E6C18E2F81009B169D77B ] flpydisk        C:\Windows\system32\drivers\flpydisk.sys
03:06:23.0690 0x1734  flpydisk - ok
03:06:23.0715 0x1734  [ DA6B67270FD9DB3697B20FCE94950741, F621A4462C9F2904063578C427FAF22D7D66AE9967605C11C798099817CE5331 ] FltMgr          C:\Windows\system32\drivers\fltmgr.sys
03:06:23.0723 0x1734  FltMgr - ok
03:06:23.0841 0x1734  [ C4C183E6551084039EC862DA1C945E3D, 0874A2ACDD24D64965AA9A76E9C818E216880AE4C9A2E07ED932EE404585CEE6 ] FontCache       C:\Windows\system32\FntCache.dll
03:06:23.0870 0x1734  FontCache - ok
03:06:23.0950 0x1734  [ A8B7F3818AB65695E3A0BB3279F6DCE6, 89FCF10F599767E67A1E011753E34DA44EAA311F105DBF69549009ED932A60F0 ] FontCache3.0.0.0 C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe
03:06:23.0953 0x1734  FontCache3.0.0.0 - ok
03:06:23.0972 0x1734  [ D43703496149971890703B4B1B723EAC, F06397B2EDCA61629249D2EF1CBB7827A8BEAB8488246BD85EF6AE1363C0DA6E ] FsDepends       C:\Windows\system32\drivers\FsDepends.sys
03:06:23.0975 0x1734  FsDepends - ok
03:06:24.0029 0x1734  [ 768FAE6C348E5538B370FA62AB1B43B1, F1BEE8AE7A55745314A31734C0FAEE6141B423B55275322AB92DC258E7170CFB ] fspad_wlh64     C:\Windows\system32\DRIVERS\fspad_wlh64.sys
03:06:24.0032 0x1734  fspad_wlh64 - ok
03:06:24.0093 0x1734  [ 768FAE6C348E5538B370FA62AB1B43B1, F1BEE8AE7A55745314A31734C0FAEE6141B423B55275322AB92DC258E7170CFB ] fspad_xp64      C:\Windows\system32\DRIVERS\fspad_xp64.sys
03:06:24.0097 0x1734  fspad_xp64 - ok
03:06:24.0138 0x1734  [ 6BD9295CC032DD3077C671FCCF579A7B, 83622FBB0CB923798E7E584BF53CAAF75B8C016E3FF7F0FA35880FF34D1DFE33 ] Fs_Rec          C:\Windows\system32\drivers\Fs_Rec.sys
03:06:24.0139 0x1734  Fs_Rec - ok
03:06:24.0209 0x1734  [ 8F6322049018354F45F05A2FD2D4E5E0, 73BF0FB4EBD7887E992DDEBB79E906958D6678F8D1107E8C368F5A0514D80359 ] fvevol          C:\Windows\system32\DRIVERS\fvevol.sys
03:06:24.0219 0x1734  fvevol - ok
03:06:24.0279 0x1734  [ 8C778D335C9D272CFD3298AB02ABE3B6, 85F0B13926B0F693FA9E70AA58DE47100E4B6F893772EBE4300C37D9A36E6005 ] gagp30kx        C:\Windows\system32\drivers\gagp30kx.sys
03:06:24.0282 0x1734  gagp30kx - ok
03:06:24.0349 0x1734  [ 8E98D21EE06192492A5671A6144D092F, B8F656B34D361EA5AFB47F3A67AB2221580DADA59C8CD0CB83181E4AD8B562B4 ] GEARAspiWDM     C:\Windows\system32\DRIVERS\GEARAspiWDM.sys
03:06:24.0351 0x1734  GEARAspiWDM - ok
03:06:24.0455 0x1734  [ 277BBC7E1AA1EE957F573A10ECA7EF3A, 2EE60B924E583E847CC24E78B401EF95C69DB777A5B74E1EC963E18D47B94D24 ] gpsvc           C:\Windows\System32\gpsvc.dll
03:06:24.0474 0x1734  gpsvc - ok
03:06:24.0622 0x1734  [ 506708142BC63DABA64F2D3AD1DCD5BF, 9C36A08D9E7932FF4DA7B5F24E6B42C92F28685B8ABE964C870E8D7670FD531A ] gupdate         C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
03:06:24.0629 0x1734  gupdate - ok
03:06:24.0640 0x1734  [ 506708142BC63DABA64F2D3AD1DCD5BF, 9C36A08D9E7932FF4DA7B5F24E6B42C92F28685B8ABE964C870E8D7670FD531A ] gupdatem        C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
03:06:24.0645 0x1734  gupdatem - ok
03:06:24.0659 0x1734  [ F2523EF6460FC42405B12248338AB2F0, B2F3DE8DE1F512D871BC2BC2E8D0E33AB03335BFBC07627C5F88B65024928E19 ] hcw85cir        C:\Windows\system32\drivers\hcw85cir.sys
03:06:24.0661 0x1734  hcw85cir - ok
03:06:24.0735 0x1734  [ 975761C778E33CD22498059B91E7373A, 8304E15FBE6876BE57263A03621365DA8C88005EAC532A770303C06799D915D9 ] HdAudAddService C:\Windows\system32\drivers\HdAudio.sys
03:06:24.0753 0x1734  HdAudAddService - ok
03:06:24.0784 0x1734  [ 97BFED39B6B79EB12CDDBFEED51F56BB, 3CF981D668FB2381E52AF2E51E296C6CFB47B0D62249645278479D0111A47955 ] HDAudBus        C:\Windows\system32\DRIVERS\HDAudBus.sys
03:06:24.0787 0x1734  HDAudBus - ok
03:06:24.0842 0x1734  [ B6AC71AAA2B10848F57FC49D55A651AF, 4FAD833654E86F9FAF972AC8AF87FD4A9A765B26B96F096BBD63506B5D521A91 ] HECIx64         C:\Windows\system32\DRIVERS\HECIx64.sys
03:06:24.0846 0x1734  HECIx64 - ok
03:06:24.0861 0x1734  [ 78E86380454A7B10A5EB255DC44A355F, 11F3ED7ACFFA3024B9BD504F81AC39F5B4CED5A8A425E8BADF7132EFEDB9BD64 ] HidBatt         C:\Windows\system32\drivers\HidBatt.sys
03:06:24.0863 0x1734  HidBatt - ok
03:06:24.0883 0x1734  [ 7FD2A313F7AFE5C4DAB14798C48DD104, 94CBFD4506CBDE4162CEB3367BAB042D19ACA6785954DC0B554D4164B9FCD0D4 ] HidBth          C:\Windows\system32\drivers\hidbth.sys
03:06:24.0886 0x1734  HidBth - ok
03:06:24.0906 0x1734  [ 0A77D29F311B88CFAE3B13F9C1A73825, 8615DC6CEFB591505CE16E054A71A4F371B827DDFD5E980777AB4233DCFDA01D ] HidIr           C:\Windows\system32\drivers\hidir.sys
03:06:24.0908 0x1734  HidIr - ok
03:06:24.0946 0x1734  [ BD9EB3958F213F96B97B1D897DEE006D, 4D01CBF898B528B3A4E5A683DF2177300AFABD7D4CB51F1A7891B1B545499631 ] hidserv         C:\Windows\system32\hidserv.dll
03:06:24.0949 0x1734  hidserv - ok
03:06:25.0013 0x1734  [ 9592090A7E2B61CD582B612B6DF70536, FD11D5E02C32D658B28FCC35688AB66CCB5D3A0A0D74C82AE0F0B6C67B568A0F ] HidUsb          C:\Windows\system32\DRIVERS\hidusb.sys
03:06:25.0016 0x1734  HidUsb - ok
03:06:25.0536 0x1734  [ 7B3BE448BCACBF31FA486FAA67BF28C4, 62F523148F13FD8522895173B15CA81C2BFBF06C1F274929CEF591A644318ED0 ] HitmanPro37CrusaderBoot C:\Program Files\HitmanPro\HitmanPro.exe
03:06:25.0792 0x1734  HitmanPro37CrusaderBoot - ok
03:06:25.0920 0x1734  [ 760B03AE5E3244E22FFC3C1AE1F5264A, 1D926E28B95394C211CC29B898ECF3C3E19814EF4D09B04DBF9BDFB2596BD1AB ] HitmanProScheduler C:\Program Files\HitmanPro\hmpsched.exe
03:06:25.0927 0x1734  HitmanProScheduler - ok
03:06:25.0979 0x1734  [ 387E72E739E15E3D37907A86D9FF98E2, 9935BE2E58788E79328293AF2F202CB0F6042441B176F75ACC5AEA93C8E05531 ] hkmsvc          C:\Windows\system32\kmsvc.dll
03:06:25.0985 0x1734  hkmsvc - ok
03:06:26.0029 0x1734  [ EFDFB3DD38A4376F93E7985173813ABD, 70402FA73A5A2A8BB557AAC8F531E373077D28DE5F40A1F3F14B940BE01CD2E1 ] HomeGroupListener C:\Windows\system32\ListSvc.dll
03:06:26.0040 0x1734  HomeGroupListener - ok
03:06:26.0120 0x1734  [ 908ACB1F594274965A53926B10C81E89, 7D34A742AC486294D82676F8465A3EF26C8AC3317C32B63F62031CB007CFC208 ] HomeGroupProvider C:\Windows\system32\provsvc.dll
03:06:26.0129 0x1734  HomeGroupProvider - ok
03:06:26.0206 0x1734  [ 39D2ABCD392F3D8A6DCE7B60AE7B8EFC, E9E6A1665740CFBC2DD321010007EF42ABA2102AEB9772EE8AA3354664B1E205 ] HpSAMD          C:\Windows\system32\drivers\HpSAMD.sys
03:06:26.0211 0x1734  HpSAMD - ok
03:06:26.0283 0x1734  [ 0EA7DE1ACB728DD5A369FD742D6EEE28, 21C489412EB33A12B22290EB701C19BA57006E8702E76F730954F0784DDE9779 ] HTTP            C:\Windows\system32\drivers\HTTP.sys
03:06:26.0301 0x1734  HTTP - ok
03:06:26.0316 0x1734  [ A5462BD6884960C9DC85ED49D34FF392, 53E65841AF5B06A2844D0BB6FC4DD3923A323FFA0E4BFC89B3B5CAFB592A3D53 ] hwpolicy        C:\Windows\system32\drivers\hwpolicy.sys
03:06:26.0317 0x1734  hwpolicy - ok
03:06:26.0346 0x1734  [ FA55C73D4AFFA7EE23AC4BE53B4592D3, 65CDDC62B89A60E942C5642C9D8B539EFB69DA8069B4A2E54978154B314531CD ] i8042prt        C:\Windows\system32\DRIVERS\i8042prt.sys
03:06:26.0349 0x1734  i8042prt - ok
03:06:26.0415 0x1734  [ AAAF44DB3BD0B9D1FB6969B23ECC8366, 805AA4A9464002D1AB3832E4106B2AAA1331F4281367E75956062AAE99699385 ] iaStorV         C:\Windows\system32\drivers\iaStorV.sys
03:06:26.0434 0x1734  iaStorV - ok
03:06:26.0536 0x1734  [ 5988FC40F8DB5B0739CD1E3A5D0D78BD, 2B9512324DBA4A97F6AC34E8067EE08E3B6874CD60F6CB4209AFC22A34D2BE99 ] idsvc           C:\Windows\Microsoft.NET\Framework64\v3.0\Windows Communication Foundation\infocard.exe
03:06:26.0560 0x1734  idsvc - ok
03:06:26.0601 0x1734  IEEtwCollectorService - ok
03:06:26.0618 0x1734  [ 5C18831C61933628F5BB0EA2675B9D21, 5CD9DE2F8C0256623A417B5C55BF55BB2562BD7AB2C3C83BB3D9886C2FBDA4E4 ] iirsp           C:\Windows\system32\drivers\iirsp.sys
03:06:26.0619 0x1734  iirsp - ok
03:06:26.0727 0x1734  [ 344789398EC3EE5A4E00C52B31847946, 3DA5F08E4B46F4E63456AA588D49E39A6A09A97D0509880C00F327623DB6122D ] IKEEXT          C:\Windows\System32\ikeext.dll
03:06:26.0750 0x1734  IKEEXT - ok
03:06:26.0783 0x1734  [ 4B6363CD4610BB848531BB260B15DFCC, 13A8AA9571497086341AC00797EFF212FF76EE62F9CFF758D3C08B377EC7BF04 ] Impcd           C:\Windows\system32\DRIVERS\Impcd.sys
03:06:26.0787 0x1734  Impcd - ok
03:06:27.0003 0x1734  [ 69976169745EDFB3225D9ABEB5E91155, D1AFF69AF178B46FD9F319AA9DF8738ACB03559DE24C1114EEF46A22D01F0982 ] IntcAzAudAddService C:\Windows\system32\drivers\RTKVHD64.sys
03:06:27.0093 0x1734  IntcAzAudAddService - ok
03:06:27.0188 0x1734  [ 58CF58DEE26C909BD6F977B61D246295, 0CE27B81C091961A22B75478449D654F9C1A68E43DF80C699DB8DD3D1B288461 ] IntcDAud        C:\Windows\system32\DRIVERS\IntcDAud.sys
03:06:27.0203 0x1734  IntcDAud - ok
03:06:27.0230 0x1734  [ F00F20E70C6EC3AA366910083A0518AA, E2F3E9FFD82C802C8BAC309893A3664ACF16A279959C0FDECCA64C3D3C60FD22 ] intelide        C:\Windows\system32\drivers\intelide.sys
03:06:27.0231 0x1734  intelide - ok
03:06:27.0968 0x1734  [ 09CE164AFA8483E41808784D7FCA154E, 43557E44C8339469BD34B54D2080AF041356F0201A7ECA3A6EEEA9C9C7D78F87 ] intelkmd        C:\Windows\system32\DRIVERS\igdpmd64.sys
03:06:28.0212 0x1734  intelkmd - ok
03:06:28.0358 0x1734  [ ADA036632C664CAA754079041CF1F8C1, F2386CC09AC6DE4C54189154F7D91C1DB7AA120B13FAE8BA5B579ACF99FCC610 ] intelppm        C:\Windows\system32\DRIVERS\intelppm.sys
03:06:28.0362 0x1734  intelppm - ok
03:06:28.0409 0x1734  [ 098A91C54546A3B878DAD6A7E90A455B, 044CCE2A0DF56EBE1EFD99B4F6F0A5B9EE12498CA358CF4B2E3A1CFD872823AA ] IPBusEnum       C:\Windows\system32\ipbusenum.dll
03:06:28.0413 0x1734  IPBusEnum - ok
03:06:28.0435 0x1734  [ C9F0E1BD74365A8771590E9008D22AB6, 728BC5A6AAE499FDC50EB01577AF16D83C2A9F3B09936DD2A89C01E074BA8E51 ] IpFilterDriver  C:\Windows\system32\DRIVERS\ipfltdrv.sys
03:06:28.0438 0x1734  IpFilterDriver - ok
03:06:28.0514 0x1734  [ 08C2957BB30058E663720C5606885653, E13EDF6701512E2A9977A531454932CA5023087CB50E1D2F416B8BCDD92B67BE ] iphlpsvc        C:\Windows\System32\iphlpsvc.dll
03:06:28.0536 0x1734  iphlpsvc - ok
03:06:28.0550 0x1734  [ 0FC1AEA580957AA8817B8F305D18CA3A, 7161E4DE91AAFC3FA8BF24FAE4636390C2627DB931505247C0D52C75A31473D9 ] IPMIDRV         C:\Windows\system32\drivers\IPMIDrv.sys
03:06:28.0552 0x1734  IPMIDRV - ok
03:06:28.0571 0x1734  [ AF9B39A7E7B6CAA203B3862582E9F2D0, 67128BE7EADBE6BD0205B050F96E268948E8660C4BAB259FB0BE03935153D04E ] IPNAT           C:\Windows\system32\drivers\ipnat.sys
03:06:28.0574 0x1734  IPNAT - ok
03:06:28.0594 0x1734  [ 3ABF5E7213EB28966D55D58B515D5CE9, A352BCC5B6B9A28805B15CAFB235676F1FAFF0D2394F88C03089EB157D6188AE ] IRENUM          C:\Windows\system32\drivers\irenum.sys
03:06:28.0595 0x1734  IRENUM - ok
03:06:28.0610 0x1734  [ 2F7B28DC3E1183E5EB418DF55C204F38, D40410A760965925D6F10959B2043F7BD4F68EAFCF5E743AF11AD860BD136548 ] isapnp          C:\Windows\system32\drivers\isapnp.sys
03:06:28.0611 0x1734  isapnp - ok
03:06:28.0654 0x1734  [ 96BB922A0981BC7432C8CF52B5410FE6, 236C05509B1040059B15021CBBDBDAF3B9C0F00910142BE5887B2C7561BAAFBA ] iScsiPrt        C:\Windows\system32\drivers\msiscsi.sys
03:06:28.0670 0x1734  iScsiPrt - ok
03:06:28.0714 0x1734  [ BC02336F1CBA7DCC7D1213BB588A68A5, 450C5BAD54CCE2AFCDFF1B6E7F8E1A8446D9D3255DF9D36C29A8F848048AAD93 ] kbdclass        C:\Windows\system32\DRIVERS\kbdclass.sys
03:06:28.0717 0x1734  kbdclass - ok
03:06:28.0748 0x1734  [ 0705EFF5B42A9DB58548EEC3B26BB484, 86C6824ED7ED6FA8F306DB6319A0FD688AA91295AE571262F9D8E96A32225E99 ] kbdhid          C:\Windows\system32\DRIVERS\kbdhid.sys
03:06:28.0751 0x1734  kbdhid - ok
03:06:28.0772 0x1734  [ 4D71227301DD8D09097B9E4CC6527E5A, 193D47ADCB722B581CC0F29B794AB3E455B6E9BEA367CE9A5216A09E055B7F1E ] KeyIso          C:\Windows\system32\lsass.exe
03:06:28.0776 0x1734  KeyIso - ok
03:06:28.0820 0x1734  [ 8F489706472F7E9A06BAAA198703FA64, F020406690FB38EABD82D63B91D33039CC93ED52A5497AE12BAF475F22D0B08A ] KSecDD          C:\Windows\system32\Drivers\ksecdd.sys
03:06:28.0825 0x1734  KSecDD - ok
03:06:28.0843 0x1734  [ 868A2CAAB12EFC7A021682BCA0EEC54C, 12C4925B5B3D6EA7B6410C01F33158C6EAB50CBD6AF445F8B04ED9899720C2DD ] KSecPkg         C:\Windows\system32\Drivers\ksecpkg.sys
03:06:28.0850 0x1734  KSecPkg - ok
03:06:28.0866 0x1734  [ 6869281E78CB31A43E969F06B57347C4, 866A23E69B32A78D378D6CB3B3DA3695FFDFF0FEC3C9F68C8C3F988DF417044B ] ksthunk         C:\Windows\system32\drivers\ksthunk.sys
03:06:28.0867 0x1734  ksthunk - ok
03:06:28.0921 0x1734  [ 6AB66E16AA859232F64DEB66887A8C9C, 5F2B579BEA8098A2994B0DECECDAE7B396E7B5DC5F09645737B9F28BEEA77FFF ] KtmRm           C:\Windows\system32\msdtckrm.dll
03:06:28.0932 0x1734  KtmRm - ok
03:06:29.0089 0x1734  [ B4D3522E89DB87F0DF722D73842B2513, 98FD5DE14D0F17A813F2D0285AAF6C4E8C152ED6A673D836C8D235C16932C73F ] LaCieDesktopManagerService C:\Program Files\LaCie\Desktop Manager\lacie_dm_service.exe
03:06:29.0123 0x1734  LaCieDesktopManagerService - ok
03:06:29.0190 0x1734  [ D9F42719019740BAA6D1C6D536CBDAA6, 8757599D0AE5302C4CE50861BEBA3A8DD14D7B0DBD916FD5404133688CDFCC40 ] LanmanServer    C:\Windows\system32\srvsvc.dll
03:06:29.0198 0x1734  LanmanServer - ok
03:06:29.0247 0x1734  [ 851A1382EED3E3A7476DB004F4EE3E1A, B1C67F47DD594D092E6E258F01DF5E7150227CE3131A908A244DEE9F8A1FABF9 ] LanmanWorkstation C:\Windows\System32\wkssvc.dll
03:06:29.0254 0x1734  LanmanWorkstation - ok
03:06:29.0285 0x1734  [ 1538831CF8AD2979A04C423779465827, E1729B0CC4CEEE494A0B8817A8E98FF232E3A32FB023566EF0BC71A090262C0C ] lltdio          C:\Windows\system32\DRIVERS\lltdio.sys
03:06:29.0287 0x1734  lltdio - ok
03:06:29.0343 0x1734  [ C1185803384AB3FEED115F79F109427F, 0414FE73532DCAB17E906438A14711E928CECCD5F579255410C62984DD652700 ] lltdsvc         C:\Windows\System32\lltdsvc.dll
03:06:29.0352 0x1734  lltdsvc - ok
03:06:29.0368 0x1734  [ F993A32249B66C9D622EA5592A8B76B8, EE64672A990C6145DC5601E2B8CDBE089272A72732F59AF9865DCBA8B1717E70 ] lmhosts         C:\Windows\System32\lmhsvc.dll
03:06:29.0370 0x1734  lmhosts - ok
03:06:29.0477 0x1734  [ 7485FBCEF9136F530953575E2977859D, 5A6A67EE407C6ECE637C2B2AC21259BB86D032E47CE59F77AAF48D687B74CFCB ] LMS             C:\Program Files (x86)\Intel\Intel® Management Engine Components\LMS\LMS.exe
03:06:29.0484 0x1734  LMS - ok
03:06:29.0518 0x1734  [ 1A93E54EB0ECE102495A51266DCDB6A6, DB6AA86AA36C3A7988BE96E87B5D3251BE7617C54EE8F894D9DC2E267FE3255B ] LSI_FC          C:\Windows\system32\drivers\lsi_fc.sys
03:06:29.0521 0x1734  LSI_FC - ok
03:06:29.0569 0x1734  [ 1047184A9FDC8BDBFF857175875EE810, F2251EDB7736A26D388A0C5CC2FE5FB9C5E109CBB1E3800993554CB21D81AE4B ] LSI_SAS         C:\Windows\system32\drivers\lsi_sas.sys
03:06:29.0572 0x1734  LSI_SAS - ok
03:06:29.0590 0x1734  [ 30F5C0DE1EE8B5BC9306C1F0E4A75F93, 88D5740A4E9CC3FA80FA18035DAB441BDC5A039622D666BFDAA525CC9686BD06 ] LSI_SAS2        C:\Windows\system32\drivers\lsi_sas2.sys
03:06:29.0592 0x1734  LSI_SAS2 - ok
03:06:29.0609 0x1734  [ 0504EACAFF0D3C8AED161C4B0D369D4A, 4D272237C189646F5C80822FD3CBA7C2728E482E2DAAF7A09C8AEF811C89C54D ] LSI_SCSI        C:\Windows\system32\drivers\lsi_scsi.sys
03:06:29.0612 0x1734  LSI_SCSI - ok
03:06:29.0649 0x1734  [ 43D0F98E1D56CCDDB0D5254CFF7B356E, 5BA498183B5C4996C694CB0A9A6B66CE6C7A460F6C91BEB9F305486FCC3B7B22 ] luafv           C:\Windows\system32\drivers\luafv.sys
03:06:29.0652 0x1734  luafv - ok
03:06:29.0699 0x1734  [ 0BE09CD858ABF9DF6ED259D57A1A1663, 2FD28889B93C8E801F74C1D0769673A461671E0189D0A22C94509E3F0EEB7428 ] Mcx2Svc         C:\Windows\system32\Mcx2Svc.dll
03:06:29.0705 0x1734  Mcx2Svc - ok
03:06:29.0797 0x1734  [ CF17A39BA7D1D1E386FD0C1303642B91, 8C7F6530F30C56241D54FC0799347E586332C1299DE1222AC9C08AD523E9CD96 ] MDA_NTDRV       C:\Windows\system32\MDA_NTDRV.sys
03:06:29.0800 0x1734  MDA_NTDRV - ok
03:06:29.0821 0x1734  [ A55805F747C6EDB6A9080D7C633BD0F4, 2DA0E83BF3C8ADEF6F551B6CC1C0A3F6149CDBE6EC60413BA1767C4DE425A728 ] megasas         C:\Windows\system32\drivers\megasas.sys
03:06:29.0823 0x1734  megasas - ok
03:06:29.0858 0x1734  [ BAF74CE0072480C3B6B7C13B2A94D6B3, 85CBB4949C090A904464F79713A3418338753D20D7FB811E68F287FDAC1DD834 ] MegaSR          C:\Windows\system32\drivers\MegaSR.sys
03:06:29.0869 0x1734  MegaSR - ok
03:06:30.0021 0x1734  [ 123271BD5237AB991DC5C21FDF8835EB, 004F8F9228EE291A0E36CE33078D572D61733516F9AA5CFC832AF204C6869E89 ] Microsoft Office Groove Audit Service C:\Program Files (x86)\Microsoft Office\Office12\GrooveAuditService.exe
03:06:30.0026 0x1734  Microsoft Office Groove Audit Service - ok
03:06:30.0086 0x1734  [ E40E80D0304A73E8D269F7141D77250B, 0DB4AC13A264F19A84DC0BCED54E8E404014CC09C993B172002B1561EC7E265A ] MMCSS           C:\Windows\system32\mmcss.dll
03:06:30.0092 0x1734  MMCSS - ok
03:06:30.0114 0x1734  [ 800BA92F7010378B09F9ED9270F07137, 94F9AF9E1BE80AE6AC39A2A74EF9FAB115DCAACC011D07DFA8D6A1DDC8A93342 ] Modem           C:\Windows\system32\drivers\modem.sys
03:06:30.0116 0x1734  Modem - ok
03:06:30.0170 0x1734  [ B03D591DC7DA45ECE20B3B467E6AADAA, 701FB0CAD8138C58507BE28845D3E24CE269A040737C29885944A0D851238732 ] monitor         C:\Windows\system32\DRIVERS\monitor.sys
03:06:30.0172 0x1734  monitor - ok
03:06:30.0191 0x1734  [ 7D27EA49F3C1F687D357E77A470AEA99, 7FE7CAF95959F127C6D932C01D539C06D80273C49A09761F6E8331C05B1A7EE7 ] mouclass        C:\Windows\system32\DRIVERS\mouclass.sys
03:06:30.0194 0x1734  mouclass - ok
03:06:30.0226 0x1734  [ D3BF052C40B0C4166D9FD86A4288C1E6, 5E65264354CD94E844BF1838CA1B8E49080EFA34605A32CF2F6A47A2B97FC183 ] mouhid          C:\Windows\system32\DRIVERS\mouhid.sys
03:06:30.0228 0x1734  mouhid - ok
03:06:30.0244 0x1734  [ 32E7A3D591D671A6DF2DB515A5CBE0FA, 47CED0B9067AE8BF5EEF60B17ADEE5906BEDCC56E4CB460B7BFBC12BB9A69E63 ] mountmgr        C:\Windows\system32\drivers\mountmgr.sys
03:06:30.0248 0x1734  mountmgr - ok
03:06:30.0370 0x1734  [ C8F70DDFD2CAA5B624CABF267304215D, 1734BC28470D5CAEC6154BA9BC44ADE25D55653C897724EFB93C74F73E45DAF7 ] MozillaMaintenance C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
03:06:30.0379 0x1734  MozillaMaintenance - ok
03:06:30.0456 0x1734  [ 9EB89625A82AC961F25E7C865947BF9A, 91DB9530CDE883DC60BE621AC4210ACD069631D9466E37411D9D6AEE587098D9 ] MpFilter        C:\Windows\system32\DRIVERS\MpFilter.sys
03:06:30.0471 0x1734  MpFilter - ok
03:06:30.0492 0x1734  [ A44B420D30BD56E145D6A2BC8768EC58, B1E4DCA5A1008FA7A0492DC091FB2B820406AE13FD3D44F124E89B1037AF09B8 ] mpio            C:\Windows\system32\drivers\mpio.sys
03:06:30.0496 0x1734  mpio - ok
03:06:30.0534 0x1734  [ 6C38C9E45AE0EA2FA5E551F2ED5E978F, 5A3FA2F110029CB4CC4384998EDB59203FDD65EC45E01B897FB684F8956EAD20 ] mpsdrv          C:\Windows\system32\drivers\mpsdrv.sys
03:06:30.0536 0x1734  mpsdrv - ok
03:06:30.0637 0x1734  [ 54FFC9C8898113ACE189D4AA7199D2C1, 65F585C87F3F710FD5793FDFA96B740AD8D4317B0C120F4435CCF777300EA4F2 ] MpsSvc          C:\Windows\system32\mpssvc.dll
03:06:30.0658 0x1734  MpsSvc - ok
03:06:30.0710 0x1734  [ 1A4F75E63C9FB84B85DFFC6B63FD5404, 01AFA6DBB4CDE55FE4EA05BBE8F753A4266F8D072EA1EE01DB79F5126780C21F ] MRxDAV          C:\Windows\system32\drivers\mrxdav.sys
03:06:30.0714 0x1734  MRxDAV - ok
03:06:30.0798 0x1734  [ A5D9106A73DC88564C825D317CAC68AC, 0457B2AEA4E05A91D0E43F317894A614434D8CEBE35020785387F307E231FBE4 ] mrxsmb          C:\Windows\system32\DRIVERS\mrxsmb.sys
03:06:30.0807 0x1734  mrxsmb - ok
03:06:30.0836 0x1734  [ D711B3C1D5F42C0C2415687BE09FC163, 9B3013AC60BD2D0FF52086658BA5FF486ADE15954A552D7DD590580E8BAE3EFF ] mrxsmb10        C:\Windows\system32\DRIVERS\mrxsmb10.sys
03:06:30.0845 0x1734  mrxsmb10 - ok
03:06:30.0905 0x1734  [ 9423E9D355C8D303E76B8CFBD8A5C30C, 220B33F120C2DD937FE4D5664F4B581DC0ACF78D62EB56B7720888F67B9644CC ] mrxsmb20        C:\Windows\system32\DRIVERS\mrxsmb20.sys
03:06:30.0912 0x1734  mrxsmb20 - ok
03:06:30.0974 0x1734  [ C25F0BAFA182CBCA2DD3C851C2E75796, 643E158A0948DF331807AEAA391F23960362E46C0A0CF6D22A99020EAE7B10F8 ] msahci          C:\Windows\system32\drivers\msahci.sys
03:06:30.0976 0x1734  msahci - ok
03:06:31.0044 0x1734  [ DB801A638D011B9633829EB6F663C900, B34FD33A215ACCF2905F4B7D061686CDB1CB9C652147AF56AE14686C1F6E3C74 ] msdsm           C:\Windows\system32\drivers\msdsm.sys
03:06:31.0053 0x1734  msdsm - ok
03:06:31.0089 0x1734  [ DE0ECE52236CFA3ED2DBFC03F28253A8, 2FBBEC4CACB5161F68D7C2935852A5888945CA0F107CF8A1C01F4528CE407DE3 ] MSDTC           C:\Windows\System32\msdtc.exe
03:06:31.0099 0x1734  MSDTC - ok
03:06:31.0139 0x1734  [ AA3FB40E17CE1388FA1BEDAB50EA8F96, 69F93E15536644C8FD679A20190CFE577F4985D3B1B4A4AA250A168615AE1E99 ] Msfs            C:\Windows\system32\drivers\Msfs.sys
03:06:31.0141 0x1734  Msfs - ok
03:06:31.0172 0x1734  [ F9D215A46A8B9753F61767FA72A20326, 6F76642B45E0A7EF6BCAB8B37D55CCE2EAA310ED07B76D43FCB88987C2174141 ] mshidkmdf       C:\Windows\System32\drivers\mshidkmdf.sys
03:06:31.0173 0x1734  mshidkmdf - ok
03:06:31.0195 0x1734  [ D916874BBD4F8B07BFB7FA9B3CCAE29D, B229DA150713DEDBC4F05386C9D9DC3BC095A74F44F3081E88311AB73BC992A1 ] msisadrv        C:\Windows\system32\drivers\msisadrv.sys
03:06:31.0196 0x1734  msisadrv - ok
03:06:31.0248 0x1734  [ 808E98FF49B155C522E6400953177B08, F873F5BFF0984C5165DF67E92874D3F6EB8D86F9B5AD17013A0091CA33A1A3D5 ] MSiSCSI         C:\Windows\system32\iscsiexe.dll
03:06:31.0259 0x1734  MSiSCSI - ok
03:06:31.0264 0x1734  msiserver - ok
03:06:31.0439 0x1734  [ C23F5F6865AD25DD70A00A32DEA2D0A9, 5C284AC9ABED799D6668096D3FBA9C26C9BDA844B91D93CB057048725CAA56B5 ] MSI_SuperCharger C:\Program Files (x86)\MSI\Super-Charger\ChargeService.exe
03:06:31.0447 0x1734  MSI_SuperCharger - ok
03:06:31.0474 0x1734  [ 49CCF2C4FEA34FFAD8B1B59D49439366, E5752EA57C7BDAD5F53E3BC441A415E909AC602CAE56234684FB8789A20396C7 ] MSKSSRV         C:\Windows\system32\drivers\MSKSSRV.sys
03:06:31.0475 0x1734  MSKSSRV - ok
03:06:31.0588 0x1734  [ 89F2AEDC2788696702141AB82C3E7866, E166CBD8D3C708737C37172221945D8E56C25C2CC750889C3CE14AA2DE750F33 ] MsMpSvc         C:\Program Files\Microsoft Security Client\MsMpEng.exe
03:06:31.0590 0x1734  MsMpSvc - ok
03:06:31.0603 0x1734  [ BDD71ACE35A232104DDD349EE70E1AB3, 27464A66868513BE6A01B75D7FC5B0D6B71842E4E20CE3F76B15C071A0618BBB ] MSPCLOCK        C:\Windows\system32\drivers\MSPCLOCK.sys
03:06:31.0604 0x1734  MSPCLOCK - ok
03:06:31.0615 0x1734  [ 4ED981241DB27C3383D72092B618A1D0, E12F121E641249DB3491141851B59E1496F4413EDF58E863388F1C229838DFCC ] MSPQM           C:\Windows\system32\drivers\MSPQM.sys
03:06:31.0615 0x1734  MSPQM - ok
03:06:31.0639 0x1734  [ 759A9EEB0FA9ED79DA1FB7D4EF78866D, 64E3BC613EC4872B1B344CBF71EE15BE195592E3244C1EE099C6F8B95A40F133 ] MsRPC           C:\Windows\system32\drivers\MsRPC.sys
03:06:31.0648 0x1734  MsRPC - ok
03:06:31.0663 0x1734  [ 0EED230E37515A0EAEE3C2E1BC97B288, B1D8F8A75006B6E99214CA36D27A8594EF8D952F315BEB201E9BAC9DE3E64D42 ] mssmbios        C:\Windows\system32\DRIVERS\mssmbios.sys
03:06:31.0664 0x1734  mssmbios - ok
03:06:31.0679 0x1734  [ 2E66F9ECB30B4221A318C92AC2250779, DF175E1AB6962303E57F26DAE5C5C1E40B8640333F3E352A64F6A5F1301586CD ] MSTEE           C:\Windows\system32\drivers\MSTEE.sys
03:06:31.0680 0x1734  MSTEE - ok
03:06:31.0696 0x1734  [ 7EA404308934E675BFFDE8EDF0757BCD, 306CD02D89CFCFE576242360ED5F9EEEDCAFC43CD43B7D2977AE960F9AEC3232 ] MTConfig        C:\Windows\system32\drivers\MTConfig.sys
03:06:31.0697 0x1734  MTConfig - ok
03:06:31.0715 0x1734  [ F9A18612FD3526FE473C1BDA678D61C8, 32F7975B5BAA447917F832D9E3499B4B6D3E90D73F478375D0B70B36C524693A ] Mup             C:\Windows\system32\Drivers\mup.sys
03:06:31.0717 0x1734  Mup - ok
03:06:31.0794 0x1734  [ 582AC6D9873E31DFA28A4547270862DD, BD540499F74E8F59A020D935D18E36A3A97C1A6EC59C8208436469A31B16B260 ] napagent        C:\Windows\system32\qagentRT.dll
03:06:31.0809 0x1734  napagent - ok
03:06:31.0854 0x1734  [ 1EA3749C4114DB3E3161156FFFFA6B33, 54C2E77BCE1037711A11313AC25B8706109098C10A31AA03AEB7A185E97800D7 ] NativeWifiP     C:\Windows\system32\DRIVERS\nwifi.sys
03:06:31.0863 0x1734  NativeWifiP - ok
03:06:31.0993 0x1734  [ 1BBBF640BC0E0B750537BAECE8D66C18, 621C1130B0C48AA900D78097E1685507A614AA9953644972C572DE267B2A6348 ] NAUpdate        C:\Program Files (x86)\Nero\Update\NASvc.exe
03:06:32.0016 0x1734  NAUpdate - ok
03:06:32.0133 0x1734  [ 760E38053BF56E501D562B70AD796B88, F856E81A975D44F8684A6F2466549CEEDFAEB3950191698555A93A1206E0A42D ] NDIS            C:\Windows\system32\drivers\ndis.sys
03:06:32.0156 0x1734  NDIS - ok
03:06:32.0169 0x1734  [ 9F9A1F53AAD7DA4D6FEF5BB73AB811AC, D7E5446E83909AE25506BB98FBDD878A529C87963E3C1125C4ABAB25823572BC ] NdisCap         C:\Windows\system32\DRIVERS\ndiscap.sys
03:06:32.0170 0x1734  NdisCap - ok
03:06:32.0199 0x1734  [ 30639C932D9FEF22B31268FE25A1B6E5, 32873D95339600F6EEFA51847D12C563FF01F320DC59055B242FA2887C99F9D6 ] NdisTapi        C:\Windows\system32\DRIVERS\ndistapi.sys
03:06:32.0200 0x1734  NdisTapi - ok
03:06:32.0213 0x1734  [ 136185F9FB2CC61E573E676AA5402356, BA3AD0A33416DA913B4242C6BE8C3E5812AD2B20BA6C11DD3094F2E8EB56E683 ] Ndisuio         C:\Windows\system32\DRIVERS\ndisuio.sys
03:06:32.0215 0x1734  Ndisuio - ok
03:06:32.0233 0x1734  [ 53F7305169863F0A2BDDC49E116C2E11, 881E9346D3C02405B7850ADC37E720990712EC9C666A0CE96E252A487FD2CE77 ] NdisWan         C:\Windows\system32\DRIVERS\ndiswan.sys
03:06:32.0238 0x1734  NdisWan - ok
03:06:32.0254 0x1734  [ 015C0D8E0E0421B4CFD48CFFE2825879, 4242E2D42CCFC859B2C0275C5331798BC0BDA68E51CF4650B6E64B1332071023 ] NDProxy         C:\Windows\system32\drivers\NDProxy.sys
03:06:32.0256 0x1734  NDProxy - ok
03:06:32.0303 0x1734  [ 62B511C3920978B4CE087F7E01DAD9A3, EF1B4F1471F384E16A95F03AAC1DFB8E0CED4264C4A12B9CF02A37CCD30B75A0 ] Neo_VPN-test    C:\Windows\system32\DRIVERS\Neo_0053.sys
03:06:32.0304 0x1734  Neo_VPN-test - ok
03:06:32.0321 0x1734  [ 86743D9F5D2B1048062B14B1D84501C4, DBF6D6A60AB774FCB0F464FF2D285A7521D0A24006687B243AB46B17D8032062 ] NetBIOS         C:\Windows\system32\DRIVERS\netbios.sys
03:06:32.0323 0x1734  NetBIOS - ok
03:06:32.0349 0x1734  [ 09594D1089C523423B32A4229263F068, 7426A9B8BA27D3225928DDEFBD399650ABB90798212F56B7D12158AC22CCCE37 ] NetBT           C:\Windows\system32\DRIVERS\netbt.sys
03:06:32.0356 0x1734  NetBT - ok
03:06:32.0372 0x1734  [ 4D71227301DD8D09097B9E4CC6527E5A, 193D47ADCB722B581CC0F29B794AB3E455B6E9BEA367CE9A5216A09E055B7F1E ] Netlogon        C:\Windows\system32\lsass.exe
03:06:32.0374 0x1734  Netlogon - ok
03:06:32.0441 0x1734  [ 847D3AE376C0817161A14A82C8922A9E, 37AE692B3481323134125EF58F2C3CBC20177371AF2F5874F53DD32A827CB936 ] Netman          C:\Windows\System32\netman.dll
03:06:32.0462 0x1734  Netman - ok
03:06:32.0513 0x1734  [ 21318671BCAD3ACF16638F98D4D00973, CEA6E3B6BCB4B74A9ACACBEEA12EEA967BBC2240398E2EBC04D7910109CACA11 ] NetMsmqActivator C:\windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe
03:06:32.0517 0x1734  NetMsmqActivator - ok
03:06:32.0535 0x1734  [ 21318671BCAD3ACF16638F98D4D00973, CEA6E3B6BCB4B74A9ACACBEEA12EEA967BBC2240398E2EBC04D7910109CACA11 ] NetPipeActivator C:\windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe
03:06:32.0539 0x1734  NetPipeActivator - ok
03:06:32.0558 0x1734  [ 5F28111C648F1E24F7DBC87CDEB091B8, 2E8645285921EDB98BB2173E11E57459C888D52E80D85791D169C869DE8813B9 ] netprofm        C:\Windows\System32\netprofm.dll
03:06:32.0571 0x1734  netprofm - ok
03:06:32.0733 0x1734  [ 78DFEAB988E0B0EA4ECF29D908D09AF6, E7D447CBBF4B3B561D5062CE5B7B26E8430D2A0DA7E0F59CC3A07839B37E8136 ] netr28ux        C:\Windows\system32\DRIVERS\netr28ux.sys
03:06:32.0787 0x1734  netr28ux - ok
03:06:32.0812 0x1734  [ 21318671BCAD3ACF16638F98D4D00973, CEA6E3B6BCB4B74A9ACACBEEA12EEA967BBC2240398E2EBC04D7910109CACA11 ] NetTcpActivator C:\windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe
03:06:32.0817 0x1734  NetTcpActivator - ok
03:06:32.0824 0x1734  [ 21318671BCAD3ACF16638F98D4D00973, CEA6E3B6BCB4B74A9ACACBEEA12EEA967BBC2240398E2EBC04D7910109CACA11 ] NetTcpPortSharing C:\windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe
03:06:32.0828 0x1734  NetTcpPortSharing - ok
03:06:32.0894 0x1734  [ 77889813BE4D166CDAB78DDBA990DA92, 2EF531AE502B943632EEC66A309A8BFCDD36120A5E1473F4AAF3C2393AD0E6A3 ] nfrd960         C:\Windows\system32\drivers\nfrd960.sys
03:06:32.0899 0x1734  nfrd960 - ok
03:06:32.0949 0x1734  [ C3E0696C3B42F694C5822776AA6FFFDF, 80C3DEC2C48500F96C9E677450EFC1ADA9FE9FBB70F4CC2D7D9244B1A515418B ] NisDrv          C:\Windows\system32\DRIVERS\NisDrvWFP.sys
03:06:32.0957 0x1734  NisDrv - ok
03:06:33.0033 0x1734  [ DCEE3592299B2229A0DB98CB415059A2, 709AAA095DF44DDCB6159CE1635AB05EC666D845445790E569F56B297DC64AC3 ] NisSrv          C:\Program Files\Microsoft Security Client\NisSrv.exe
03:06:33.0045 0x1734  NisSrv - ok
03:06:33.0099 0x1734  [ 8AD77806D336673F270DB31645267293, E23F324913554A23CD043DD27D4305AF62F48C0561A0FC7B7811E55B74B1BE79 ] NlaSvc          C:\Windows\System32\nlasvc.dll
03:06:33.0118 0x1734  NlaSvc - ok
03:06:33.0175 0x1734  [ DE7FCC77F4A503AF4CA6A47D49B3713D, 4BFAA99393F635CD05D91A64DE73EDB5639412C129E049F0FE34F88517A10FC6 ] NPF             C:\Windows\system32\drivers\npf.sys
03:06:33.0178 0x1734  NPF - ok
03:06:33.0199 0x1734  [ 1E4C4AB5C9B8DD13179BBDC75A2A01F7, D8957EF7060A69DBB3CD6B2C45B1E4143592AB8D018471E17AC04668157DC67F ] Npfs            C:\Windows\system32\drivers\Npfs.sys
03:06:33.0202 0x1734  Npfs - ok
03:06:33.0261 0x1734  [ D54BFDF3E0C953F823B3D0BFE4732528, 497A1DCC5646EC22119273216DF10D5442D16F83E4363770F507518CF6EAA53A ] nsi             C:\Windows\system32\nsisvc.dll
03:06:33.0265 0x1734  nsi - ok
03:06:33.0294 0x1734  [ E7F5AE18AF4168178A642A9247C63001, 133023B7E4BA8049C4CAED3282BDD25571D1CC25FAC3B820C7F981D292689D76 ] nsiproxy        C:\Windows\system32\drivers\nsiproxy.sys
03:06:33.0296 0x1734  nsiproxy - ok
03:06:33.0440 0x1734  [ 1A29A59A4C5BA6F8C85062A613B7E2B2, CC137F499A12C724D4166C2D85E9F447413419A0683DAC6F1A802B7F210C77F1 ] Ntfs            C:\Windows\system32\drivers\Ntfs.sys
03:06:33.0481 0x1734  Ntfs - ok
03:06:33.0541 0x1734  [ 23CF3DA010497EB2BF39A5C5A57E437C, 39CFDE7D401EFCE4F550E0A9461F5FC4D71FA07235E1336E4F0B4882BD76550E ] NTIOLib_1_0_3   C:\Program Files (x86)\MSI\Super-Charger\NTIOLib_X64.sys
03:06:33.0542 0x1734  NTIOLib_1_0_3 - ok
03:06:33.0637 0x1734  [ 1B32C54B95121AB1683C7B83B2DB4B96, 99F4994A0E5BD1BF6E3F637D3225C69FF4CD620557E23637533E7F18D7D6CBA1 ] NTIOLib_1_0_4   C:\Program Files (x86)\msi\Live Update 5\NTIOLib_X64.sys
03:06:33.0638 0x1734  NTIOLib_1_0_4 - ok
03:06:33.0660 0x1734  [ 9899284589F75FA8724FF3D16AED75C1, 181188599FD5D4DE33B97010D9E0CAEABAB9A3EF50712FE7F9AA0735CD0666D6 ] Null            C:\Windows\system32\drivers\Null.sys
03:06:33.0660 0x1734  Null - ok
03:06:33.0693 0x1734  [ 0A92CB65770442ED0DC44834632F66AD, 581327F07A68DBD5CC749214BE5F1211FC2CE41C7A4F0656B680AFB51A35ACE7 ] nvraid          C:\Windows\system32\drivers\nvraid.sys
03:06:33.0699 0x1734  nvraid - ok
03:06:33.0781 0x1734  [ DAB0E87525C10052BF65F06152F37E4A, AD9BFF0D5FD3FFB95C758B478E1F6A9FE45E7B37AEC71EB5070D292FEAAEDF37 ] nvstor          C:\Windows\system32\drivers\nvstor.sys
03:06:33.0789 0x1734  nvstor - ok
03:06:33.0825 0x1734  [ 270D7CD42D6E3979F6DD0146650F0E05, 752489E54C9004EDCBE1F1F208FFD864DA5C83E59A2DDE6B3E0D63ECA996F76F ] nv_agp          C:\Windows\system32\drivers\nv_agp.sys
03:06:33.0830 0x1734  nv_agp - ok
03:06:33.0996 0x1734  [ 785F487A64950F3CB8E9F16253BA3B7B, 02445344BD214370A6D48B1CA04921D8EFCB13E676B5648266DD0E076C0822B6 ] odserv          C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE12\ODSERV.EXE
03:06:34.0015 0x1734  odserv - ok
03:06:34.0036 0x1734  [ 3589478E4B22CE21B41FA1BFC0B8B8A0, AD2469FC753FE552CB809FF405A9AB23E7561292FE89117E3B3B62057EFF0203 ] ohci1394        C:\Windows\system32\drivers\ohci1394.sys
03:06:34.0038 0x1734  ohci1394 - ok
03:06:34.0101 0x1734  [ 5A432A042DAE460ABE7199B758E8606C, 6E5D1F477D290905BE27CEBF9572BAC6B05FFEF2FAD901D3C8E11F665F8B9A71 ] ose             C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE
03:06:34.0109 0x1734  ose - ok
03:06:34.0441 0x1734  [ 61BFFB5F57AD12F83AB64B7181829B34, 1DD0DD35E4158F95765EE6639F217DF03A0A19E624E020DBA609268C08A13846 ] osppsvc         C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE
03:06:34.0558 0x1734  osppsvc - ok
03:06:34.0648 0x1734  [ 3EAC4455472CC2C97107B5291E0DCAFE, E51F373F2DBEAEE516B42BAE8C1B5BB68D00B881323E842CB6EDEC0A183CFFC3 ] p2pimsvc        C:\Windows\system32\pnrpsvc.dll
03:06:34.0662 0x1734  p2pimsvc - ok
03:06:34.0734 0x1734  [ 927463ECB02179F88E4B9A17568C63C3, FEFD3447692C277D59EEC7BF218552C8BB6B8C98C26E973675549628408B94CE ] p2psvc          C:\Windows\system32\p2psvc.dll
03:06:34.0749 0x1734  p2psvc - ok
03:06:34.0769 0x1734  [ 0086431C29C35BE1DBC43F52CC273887, 0D116D49EF9ABB57DA005764F25E692622210627FC2048F06A989B12FA8D0A80 ] Parport         C:\Windows\system32\drivers\parport.sys
03:06:34.0772 0x1734  Parport - ok
03:06:34.0829 0x1734  [ E9766131EEADE40A27DC27D2D68FBA9C, 63C295EC96DBD25F1A8B908295CCB86B54F2A77A02AAA11E5D9160C2C1A492B6 ] partmgr         C:\Windows\system32\drivers\partmgr.sys
03:06:34.0833 0x1734  partmgr - ok
03:06:34.0864 0x1734  [ 3AEAA8B561E63452C655DC0584922257, 04C072969B58657602EB0C21CEDF24FCEE14E61B90A0F758F93925EF2C9FC32D ] PcaSvc          C:\Windows\System32\pcasvc.dll
03:06:34.0874 0x1734  PcaSvc - ok
03:06:34.0898 0x1734  pccsmcfd - ok
03:06:34.0966 0x1734  [ 94575C0571D1462A0F70BDE6BD6EE6B3, 7139BAC653EA94A3DD3821CAB35FC5E22F4CCA5ACC2BAABDAA27E4C3C8B27FC9 ] pci             C:\Windows\system32\drivers\pci.sys
03:06:34.0976 0x1734  pci - ok
03:06:35.0022 0x1734  [ B5B8B5EF2E5CB34DF8DCF8831E3534FA, F2A7CC645B96946CC65BF60E14E70DC09C848D27C7943CE5DEA0C01A6B863480 ] pciide          C:\Windows\system32\drivers\pciide.sys
03:06:35.0024 0x1734  pciide - ok
03:06:35.0052 0x1734  [ B2E81D4E87CE48589F98CB8C05B01F2F, 6763BEE7270A4873B3E131BFB92313E2750FCBD0AD73C23D1C4F98F7DF73DE14 ] pcmcia          C:\Windows\system32\drivers\pcmcia.sys
03:06:35.0063 0x1734  pcmcia - ok
03:06:35.0089 0x1734  [ D6B9C2E1A11A3A4B26A182FFEF18F603, BBA5FE08B1DDD6243118E11358FD61B10E850F090F061711C3CB207CE5FBBD36 ] pcw             C:\Windows\system32\drivers\pcw.sys
03:06:35.0091 0x1734  pcw - ok
03:06:35.0161 0x1734  [ 68769C3356B3BE5D1C732C97B9A80D6E, FB2D61145980A2899D1B7729184C54070315B0E63C9A22400A76CCD39E00029C ] PEAUTH          C:\Windows\system32\drivers\peauth.sys
03:06:35.0177 0x1734  PEAUTH - ok
03:06:35.0314 0x1734  [ E495E408C93141E8FC72DC0C6046DDFA, 489B957DADA0DC128A09468F1AD082DCC657E86053208EA06A12937BE86FB919 ] PerfHost        C:\Windows\SysWow64\perfhost.exe
03:06:35.0317 0x1734  PerfHost - ok
03:06:35.0451 0x1734  [ C7CF6A6E137463219E1259E3F0F0DD6C, 08D7244F52AA17DD669AA6F77C291DAC88E7B2D1887DE422509C1F83EC85F3DD ] pla             C:\Windows\system32\pla.dll
03:06:35.0487 0x1734  pla - ok
03:06:35.0560 0x1734  [ 25FBDEF06C4D92815B353F6E792C8129, 57D9764AE6BCE33B242C399CDFC10DD405975BD6411CA8C75FBCD06EEB8442A9 ] PlugPlay        C:\Windows\system32\umpnpmgr.dll
03:06:35.0574 0x1734  PlugPlay - ok
03:06:35.0585 0x1734  [ 7195581CEC9BB7D12ABE54036ACC2E38, 9C4E5D6EA984148F2663DC529083408B2248DFF6DAAC85D9195F80A722782315 ] PNRPAutoReg     C:\Windows\system32\pnrpauto.dll
03:06:35.0588 0x1734  PNRPAutoReg - ok
03:06:35.0617 0x1734  [ 3EAC4455472CC2C97107B5291E0DCAFE, E51F373F2DBEAEE516B42BAE8C1B5BB68D00B881323E842CB6EDEC0A183CFFC3 ] PNRPsvc         C:\Windows\system32\pnrpsvc.dll
03:06:35.0626 0x1734  PNRPsvc - ok
03:06:35.0701 0x1734  [ 4F15D75ADF6156BF56ECED6D4A55C389, 2ADA3EA69A5D7EC2A4D2DD89178DB94EAFDDF95F07B0070D654D9F7A5C12A044 ] PolicyAgent     C:\Windows\System32\ipsecsvc.dll
03:06:35.0714 0x1734  PolicyAgent - ok
03:06:35.0785 0x1734  [ 6BA9D927DDED70BD1A9CADED45F8B184, 66203CE70A5EDE053929A940F38924C6792239CCCE10DD2C1D90D5B4D6748B55 ] Power           C:\Windows\system32\umpo.dll
03:06:35.0797 0x1734  Power - ok
03:06:35.0848 0x1734  [ F92A2C41117A11A00BE01CA01A7FCDE9, 38ADC6052696D110CA5F393BC586791920663F5DA66934C2A824DDA9CD89C763 ] PptpMiniport    C:\Windows\system32\DRIVERS\raspptp.sys
03:06:35.0854 0x1734  PptpMiniport - ok
03:06:35.0903 0x1734  [ 0D922E23C041EFB1C3FAC2A6F943C9BF, 855418A6A58DCAFB181A1A68613B3E203AFB0A9B3D9D26D0C521F9F613B4EAD5 ] Processor       C:\Windows\system32\drivers\processr.sys
03:06:35.0906 0x1734  Processor - ok
03:06:35.0967 0x1734  [ 53E83F1F6CF9D62F32801CF66D8352A8, 1225FED810BE8E0729EEAE5B340035CCBB9BACD3EF247834400F9B72D05ACE48 ] ProfSvc         C:\Windows\system32\profsvc.dll
03:06:35.0980 0x1734  ProfSvc - ok
03:06:35.0995 0x1734  [ 4D71227301DD8D09097B9E4CC6527E5A, 193D47ADCB722B581CC0F29B794AB3E455B6E9BEA367CE9A5216A09E055B7F1E ] ProtectedStorage C:\Windows\system32\lsass.exe
03:06:35.0998 0x1734  ProtectedStorage - ok
03:06:36.0097 0x1734  [ A53A15A11EBFD21077463EE2C7AFEEF0, 6002B012A75045DEA62640A864A8721EADE2F8B65BEB5F5BA76D8CD819774489 ] ql2300          C:\Windows\system32\drivers\ql2300.sys
03:06:36.0133 0x1734  ql2300 - ok
03:06:36.0159 0x1734  [ 4F6D12B51DE1AAEFF7DC58C4D75423C8, FB6ABAB741CED66A79E31A45111649F2FA3E26CEE77209B5296F789F6F7D08DE ] ql40xx          C:\Windows\system32\drivers\ql40xx.sys
03:06:36.0162 0x1734  ql40xx - ok
03:06:36.0239 0x1734  [ 906191634E99AEA92C4816150BDA3732, A0305436384104C3B559F9C73902DA19B96B518413379E397C5CDAB0B2B9418F ] QWAVE           C:\Windows\system32\qwave.dll
03:06:36.0255 0x1734  QWAVE - ok
03:06:36.0278 0x1734  [ 76707BB36430888D9CE9D705398ADB6C, 35C1D1D05F98AC29A33D3781F497A0B40A3CB9CDF25FE1F28F574E40DDF70535 ] QWAVEdrv        C:\Windows\system32\drivers\qwavedrv.sys
03:06:36.0279 0x1734  QWAVEdrv - ok
03:06:36.0428 0x1734  [ E3D78F6FE54B27DE451E350AC908E8B4, 55F4EC8044E513640867DC9521279FA92D8C753807049D136C9C1D041B99E254 ] RalinkRegistryWriter C:\Program Files (x86)\Ralink\Common\RaRegistry.exe
03:06:36.0447 0x1734  RalinkRegistryWriter - ok
03:06:36.0479 0x1734  [ 956C8ADBCBCD003AEE3D34B10E94D04A, 25A419A8283D56BCCD743482696F1FB430CB201211127490E3120F2452D3B701 ] RalinkRegistryWriter64 C:\Program Files (x86)\Ralink\Common\RaRegistry64.exe
03:06:36.0490 0x1734  RalinkRegistryWriter64 - ok
03:06:36.0623 0x1734  [ 2977F7750EA2BECB3E623814D2C18800, A2FAE078FC18481C59D7D3B465D4E53756D85C1C49F6471D3840EEF49814EA19 ] RaMediaServer   C:\Program Files (x86)\Ralink\Common\RaMediaServer.exe
03:06:36.0667 0x1734  RaMediaServer - ok
03:06:36.0764 0x1734  [ 5A0DA8AD5762FA2D91678A8A01311704, 8A64EB5DBAB7048A9E42A21CEB62CCD5B007A80C199892D7F8C69B48E8A255EF ] RasAcd          C:\Windows\system32\DRIVERS\rasacd.sys
03:06:36.0766 0x1734  RasAcd - ok
03:06:36.0817 0x1734  [ 7ECFF9B22276B73F43A99A15A6094E90, 62C70DA127F48F796F8897BBFA23AB6EB080CC923F0F091DFA384A93F5C90CA1 ] RasAgileVpn     C:\Windows\system32\DRIVERS\AgileVpn.sys
03:06:36.0820 0x1734  RasAgileVpn - ok
03:06:36.0865 0x1734  [ 8F26510C5383B8DBE976DE1CD00FC8C7, 60E618C010E8A723960636415573FA17EA0BBEF79647196B3BC0B8DEE680E090 ] RasAuto         C:\Windows\System32\rasauto.dll
03:06:36.0871 0x1734  RasAuto - ok
03:06:36.0896 0x1734  [ 471815800AE33E6F1C32FB1B97C490CA, 27307265F743DE3A3A3EC1B2C472A3D85FDD0AEC458E0B1177593141EE072698 ] Rasl2tp         C:\Windows\system32\DRIVERS\rasl2tp.sys
03:06:36.0901 0x1734  Rasl2tp - ok
03:06:36.0941 0x1734  [ EE867A0870FC9E4972BA9EAAD35651E2, 1B848D81705081FD2E18AC762DA7F51455657DAF860BF363DC15925A148BCADA ] RasMan          C:\Windows\System32\rasmans.dll
03:06:36.0956 0x1734  RasMan - ok
03:06:36.0968 0x1734  [ 855C9B1CD4756C5E9A2AA58A15F58C25, A514F8A9C304D54BDA8DC60F5A64259B057EC83A1CAAF6D2B58CFD55E9561F72 ] RasPppoe        C:\Windows\system32\DRIVERS\raspppoe.sys
03:06:36.0972 0x1734  RasPppoe - ok
03:06:36.0982 0x1734  [ E8B1E447B008D07FF47D016C2B0EEECB, FEC789F82B912F3E14E49524D40FEAA4373B221156F14045E645D7C37859258C ] RasSstp         C:\Windows\system32\DRIVERS\rassstp.sys
03:06:36.0984 0x1734  RasSstp - ok
03:06:37.0039 0x1734  [ 77F665941019A1594D887A74F301FA2F, 1FDC6F6853400190C086042933F157814D915C54F26793CAD36CD2607D8810DA ] rdbss           C:\Windows\system32\DRIVERS\rdbss.sys
03:06:37.0054 0x1734  rdbss - ok
03:06:37.0074 0x1734  [ 302DA2A0539F2CF54D7C6CC30C1F2D8D, 1DF3501BBFFB56C3ECC39DBCC4287D3302216C2208CE22428B8C4967E5DE9D17 ] rdpbus          C:\Windows\system32\drivers\rdpbus.sys
03:06:37.0075 0x1734  rdpbus - ok
03:06:37.0092 0x1734  [ CEA6CC257FC9B7715F1C2B4849286D24, A78144D18352EA802C39D9D42921CF97A3E0211766B2169B6755C6FC2D77A804 ] RDPCDD          C:\Windows\system32\DRIVERS\RDPCDD.sys
03:06:37.0092 0x1734  RDPCDD - ok
03:06:37.0126 0x1734  [ BB5971A4F00659529A5C44831AF22365, 9AAA5C0D448E821FD85589505D99DF7749715A046BBD211F139E4E652ADDE41F ] RDPENCDD        C:\Windows\system32\drivers\rdpencdd.sys
03:06:37.0127 0x1734  RDPENCDD - ok
03:06:37.0138 0x1734  [ 216F3FA57533D98E1F74DED70113177A, 60C126A1409D1E9C39F1C9E95F70115BF4AF07780AB499F6E10A612540F173F4 ] RDPREFMP        C:\Windows\system32\drivers\rdprefmp.sys
03:06:37.0139 0x1734  RDPREFMP - ok
03:06:37.0198 0x1734  [ 313F68E1A3E6345A4F47A36B07062F34, B8318A0AE06BDE278931CA52F960B9FE226FD9894B076858DDB755AE26E1E66F ] RdpVideoMiniport C:\Windows\system32\drivers\rdpvideominiport.sys
03:06:37.0199 0x1734  RdpVideoMiniport - ok
03:06:37.0247 0x1734  [ E61608AA35E98999AF9AAEEEA6114B0A, F754CDE89DC96786D2A3C4D19EE2AEF1008E634E4DE3C0CBF927436DE90C04A6 ] RDPWD           C:\Windows\system32\drivers\RDPWD.sys
03:06:37.0259 0x1734  RDPWD - ok
03:06:37.0293 0x1734  [ 34ED295FA0121C241BFEF24764FC4520, AAEE5F00CAA763A5BA51CF56BD7262C03409CD72BD5601490E3EC3FFF929BB5F ] rdyboost        C:\Windows\system32\drivers\rdyboost.sys
03:06:37.0300 0x1734  rdyboost - ok
03:06:37.0346 0x1734  [ 254FB7A22D74E5511C73A3F6D802F192, 3D0FB5840364200DE394F8CC28DA0E334C2B5FA8FF28A41656EE72287F3D3836 ] RemoteAccess    C:\Windows\System32\mprdim.dll
03:06:37.0351 0x1734  RemoteAccess - ok
03:06:37.0375 0x1734  [ E4D94F24081440B5FC5AA556C7C62702, 147CAA03568DC480F9506E30B84891AB7E433B5EBC05F34FF10F72B00E1C6B22 ] RemoteRegistry  C:\Windows\system32\regsvc.dll
03:06:37.0381 0x1734  RemoteRegistry - ok
03:06:37.0461 0x1734  [ 9C3AC71A9934B884FAC567A8807E9C4D, 0B6B2970098E3C21E1E54A25785544903E8CD415B527FCEF86ABC7B33BEC83E7 ] Revoflt         C:\Windows\system32\DRIVERS\revoflt.sys
03:06:37.0463 0x1734  Revoflt - ok
03:06:37.0567 0x1734  [ 0B169FE016039571ECC6DB70073F8979, B80663433919C3DE83A02E376E5B3020856C6E9E98B5773D316FD9C1C02C1417 ] RichVideo64     C:\Program Files\CyberLink\Shared files\RichVideo64.exe
03:06:37.0582 0x1734  RichVideo64 - ok
03:06:37.0645 0x1734  [ 83A6C2CAFE236652D1559640594A0EA8, 52360F17C9C70C9CEA3316560B40C4D89FD705ED7E6B6088C99FC54D4CC35EB5 ] rpcapd          C:\Program Files (x86)\WinPcap\rpcapd.exe
03:06:37.0652 0x1734  rpcapd - ok
03:06:37.0672 0x1734  [ E4DC58CF7B3EA515AE917FF0D402A7BB, 665B5CD9FE905B0EE3F59A7B1A94760F5393EBEE729877D8584349754C2867E8 ] RpcEptMapper    C:\Windows\System32\RpcEpMap.dll
03:06:37.0677 0x1734  RpcEptMapper - ok
03:06:37.0717 0x1734  [ D5BA242D4CF8E384DB90E6A8ED850B8C, CB4CB2608B5E31B55FB1A2CF4051E6D08A0C2A5FB231B2116F95938D7577334E ] RpcLocator      C:\Windows\system32\locator.exe
03:06:37.0719 0x1734  RpcLocator - ok
03:06:37.0764 0x1734  [ 5C627D1B1138676C0A7AB2C2C190D123, C5003F2C912C5CA990E634818D3B4FD72F871900AF2948BD6C4D6400B354B401 ] RpcSs           C:\Windows\system32\rpcss.dll
03:06:37.0782 0x1734  RpcSs - ok
03:06:37.0851 0x1734  [ DDC86E4F8E7456261E637E3552E804FF, D250C69CCC75F2D88E7E624FCC51300E75637333317D53908CCA7E0F117173DD ] rspndr          C:\Windows\system32\DRIVERS\rspndr.sys
03:06:37.0856 0x1734  rspndr - ok
03:06:37.0975 0x1734  [ AC4CA62572CA516945AB92D6C9F501F4, 6CB4178DD1ED3D8224EA1F91CAA00AFBC756DCA2DFD71F399B05E511E79D5150 ] RTL8167         C:\Windows\system32\DRIVERS\Rt64win7.sys
03:06:38.0000 0x1734  RTL8167 - ok
03:06:38.0016 0x1734  [ 4D71227301DD8D09097B9E4CC6527E5A, 193D47ADCB722B581CC0F29B794AB3E455B6E9BEA367CE9A5216A09E055B7F1E ] SamSs           C:\Windows\system32\lsass.exe
03:06:38.0018 0x1734  SamSs - ok
03:06:38.0040 0x1734  [ AC03AF3329579FFFB455AA2DAABBE22B, 7AD3B62ADFEC166F9E256F9FF8BAA0568B2ED7308142BF8F5269E6EAA5E0A656 ] sbp2port        C:\Windows\system32\drivers\sbp2port.sys
03:06:38.0043 0x1734  sbp2port - ok
03:06:38.0074 0x1734  [ 9B7395789E3791A3B6D000FE6F8B131E, E5F067F3F212BF5481668BE1779CBEF053F511F8967589BE2E865ACB9A620024 ] SCardSvr        C:\Windows\System32\SCardSvr.dll
03:06:38.0081 0x1734  SCardSvr - ok
03:06:38.0094 0x1734  [ 253F38D0D7074C02FF8DEB9836C97D2B, CB5CAFCB8628BB22877F74ACF1DED0BBAED8F4573A74DA7FE94BBBA584889116 ] scfilter        C:\Windows\system32\DRIVERS\scfilter.sys
03:06:38.0095 0x1734  scfilter - ok
03:06:38.0164 0x1734  [ 262F6592C3299C005FD6BEC90FC4463A, 54095E37F0B6CC677A3E9BDD40F4647C713273D197DB341063AA7F342A60C4A7 ] Schedule        C:\Windows\system32\schedsvc.dll
03:06:38.0193 0x1734  Schedule - ok
03:06:38.0243 0x1734  [ F17D1D393BBC69C5322FBFAFACA28C7F, 62A1A92B3C52ADFD0B808D7F69DD50238B5F202421F1786F7EAEAA63F274B3E8 ] SCPolicySvc     C:\Windows\System32\certprop.dll
03:06:38.0245 0x1734  SCPolicySvc - ok
03:06:38.0276 0x1734  [ 6EA4234DC55346E0709560FE7C2C1972, 64011E044C16E2F92689E5F7E4666A075E27BBFA61F3264E5D51CE1656C1D5B8 ] SDRSVC          C:\Windows\System32\SDRSVC.dll
03:06:38.0282 0x1734  SDRSVC - ok
03:06:38.0329 0x1734  [ 3EA8A16169C26AFBEB544E0E48421186, 34BBB0459C96B3DE94CCB0D73461562935C583D7BF93828DA4E20A6BC9B7301D ] secdrv          C:\Windows\system32\drivers\secdrv.sys
03:06:38.0330 0x1734  secdrv - ok
03:06:38.0343 0x1734  [ BC617A4E1B4FA8DF523A061739A0BD87, 10C4057F6B321EB5237FF619747B74F5401BC17D15A8C7060829E8204A2297F9 ] seclogon        C:\Windows\system32\seclogon.dll
03:06:38.0346 0x1734  seclogon - ok
03:06:38.0359 0x1734  [ C32AB8FA018EF34C0F113BD501436D21, E0EB8E80B51E45CA7EB061E705DA0BC07878759418A8519AE6E12326FE79E7C7 ] SENS            C:\Windows\System32\sens.dll
03:06:38.0363 0x1734  SENS - ok
03:06:38.0376 0x1734  [ 0336CFFAFAAB87A11541F1CF1594B2B2, 8B8A6A33E78A12FB05E29B2E2775850626574AFD2EF88748D65E690A07B10B8D ] SensrSvc        C:\Windows\system32\sensrsvc.dll
03:06:38.0379 0x1734  SensrSvc - ok
03:06:38.0390 0x1734  [ CB624C0035412AF0DEBEC78C41F5CA1B, A4D937F11E06CAE914347CA1362F4C98EC5EE0C0C80321E360EA1ABD6726F8D4 ] Serenum         C:\Windows\system32\drivers\serenum.sys
03:06:38.0391 0x1734  Serenum - ok
03:06:38.0407 0x1734  [ C1D8E28B2C2ADFAEC4BA89E9FDA69BD6, 8F9776FB84C5D11068EAF1FF1D1A46466C655D64D256A8B1E31DC0C23B5DD22D ] Serial          C:\Windows\system32\drivers\serial.sys
03:06:38.0410 0x1734  Serial - ok
03:06:38.0466 0x1734  [ 1C545A7D0691CC4A027396535691C3E3, 065C30BE598FF4DC55C37E0BBE0CEDF10A370AE2BF5404B42EBBB867A3FFED6D ] sermouse        C:\Windows\system32\drivers\sermouse.sys
03:06:38.0468 0x1734  sermouse - ok
03:06:38.0518 0x1734  [ 0B6231BF38174A1628C4AC812CC75804, E569BF1F7F5689E2E917FA6516DB53388A5B8B1C6699DEE030147E853218811D ] SessionEnv      C:\Windows\system32\sessenv.dll
03:06:38.0523 0x1734  SessionEnv - ok
03:06:38.0780 0x1734  [ F1E263DE9C7A597F38B8C4E070F56139, DA5AFA6ED8D3B58729F04173BC799408BD4B9E559AA11136C13AEF8539ABC29B ] SEVPNCLIENT     C:\Program Files\SoftEther VPN Client\vpnclient_x64.exe
03:06:38.0882 0x1734  SEVPNCLIENT - ok
03:06:38.0984 0x1734  [ A554811BCD09279536440C964AE35BBF, DA8F893722F803E189D7D4D6C6232ED34505B63A64ED3A0132A5BB7A2BABDE55 ] sffdisk         C:\Windows\system32\drivers\sffdisk.sys
03:06:38.0986 0x1734  sffdisk - ok
03:06:39.0007 0x1734  [ FF414F0BAEFEBA59BC6C04B3DB0B87BF, B81EF5D26AEB572CAB590F7AD7CA8C89F296420089EF5E6148E972F2DBCA1042 ] sffp_mmc        C:\Windows\system32\drivers\sffp_mmc.sys
03:06:39.0008 0x1734  sffp_mmc - ok
03:06:39.0028 0x1734  [ DD85B78243A19B59F0637DCF284DA63C, 6730D4F2BAE7E24615746ACC41B42D01DB6068D6504982008ADA1890DE900197 ] sffp_sd         C:\Windows\system32\drivers\sffp_sd.sys
03:06:39.0029 0x1734  sffp_sd - ok
03:06:39.0045 0x1734  [ A9D601643A1647211A1EE2EC4E433FF4, 7AC60B4AB48D4BBF1F9681C12EC2A75C72E6E12D30FABC564A24394310E9A5F9 ] sfloppy         C:\Windows\system32\drivers\sfloppy.sys
03:06:39.0046 0x1734  sfloppy - ok
03:06:39.0112 0x1734  [ B95F6501A2F8B2E78C697FEC401970CE, 758B73A32902299A313348CE7EC189B20EB4CB398D0180E4EE24B84DAD55F291 ] SharedAccess    C:\Windows\System32\ipnathlp.dll
03:06:39.0127 0x1734  SharedAccess - ok
03:06:39.0186 0x1734  [ AAF932B4011D14052955D4B212A4DA8D, 2A3BFD0FA9569288E91AE3E72CA1EC39E1450D01E6473CE51157E0F138257923 ] ShellHWDetection C:\Windows\System32\shsvcs.dll
03:06:39.0197 0x1734  ShellHWDetection - ok
03:06:39.0228 0x1734  [ 843CAF1E5FDE1FFD5FF768F23A51E2E1, 89CA9F516E42A6B905474D738CDA2C121020A07DBD4E66CFE569DD77D79D7820 ] SiSRaid2        C:\Windows\system32\drivers\SiSRaid2.sys
03:06:39.0229 0x1734  SiSRaid2 - ok
03:06:39.0240 0x1734  [ 6A6C106D42E9FFFF8B9FCB4F754F6DA4, 87B85C66DF7EB6FDB8A2341D05FAA5261FF68A90CCFC63F0E4A03824F1E33E5E ] SiSRaid4        C:\Windows\system32\drivers\sisraid4.sys
03:06:39.0243 0x1734  SiSRaid4 - ok
03:06:39.0353 0x1734  [ 50D9949020E02B847CD48F1243FCB895, 5BDAD5E44DE5B412645142810C5FCE4B2D9685F928FF4A6B836A9DCE7725BD78 ] SkypeUpdate     C:\Program Files (x86)\Skype\Updater\Updater.exe
03:06:39.0362 0x1734  SkypeUpdate - ok
03:06:39.0397 0x1734  [ 548260A7B8654E024DC30BF8A7C5BAA4, 4A7E58331D7765A12F53DC2371739DC9A463940B13E16157CE10DB80E958D740 ] Smb             C:\Windows\system32\DRIVERS\smb.sys
03:06:39.0401 0x1734  Smb - ok
03:06:39.0485 0x1734  [ 39951F935C2FF77C6F4262DC5851F253, E8CBEAED3F018B29368F8CD59B55B3C9AB31561422300233B4F7626FAA79231D ] SmbDrvI         C:\Windows\system32\DRIVERS\Smb_driver_Intel.sys
03:06:39.0487 0x1734  SmbDrvI - ok
03:06:39.0584 0x1734  [ 7AE8BCA90539ECBDE87AC45BA1436BE3, E599200C44ECA5EB06475F90F67A58723B30C3C2887BD12ED7C31FF1042382EA ] smserial        C:\Windows\system32\DRIVERS\SmSerl64.sys
03:06:39.0613 0x1734  smserial - ok
03:06:39.0679 0x1734  [ 10450F432811D7FDA60A97FCC674D7B2, FD6245B06DD81C6E287DA47173D622357D86D84E3A5444CD34645973FE2E8BF5 ] snapman         C:\Windows\system32\DRIVERS\snapman.sys
03:06:39.0693 0x1734  snapman - ok
03:06:39.0747 0x1734  [ 6313F223E817CC09AA41811DAA7F541D, D787061043BEEDB9386B048CB9E680E6A88A1CBAE9BD4A8C0209155BFB76C630 ] SNMPTRAP        C:\Windows\System32\snmptrap.exe
03:06:39.0749 0x1734  SNMPTRAP - ok
03:06:39.0807 0x1734  [ B9E31E5CACDFE584F34F730A677803F9, 21A5130BD00089C609522A372018A719F8E37103D2DD22C59EACB393BE35A063 ] spldr           C:\Windows\system32\drivers\spldr.sys
03:06:39.0808 0x1734  spldr - ok
03:06:39.0916 0x1734  [ 85DAA09A98C9286D4EA2BA8D0E644377, F9C324E2EF81193FE831C7EECC44A100CA06F82FA731BF555D9EA4D91DA13329 ] Spooler         C:\Windows\System32\spoolsv.exe
03:06:39.0938 0x1734  Spooler - ok
03:06:40.0061 0x1734  [ DD1471053A74F62A6E656D4F5B1EEF70, F485F9A52B0BF8FE987DC4A3F1DB7E13157B3266EC04F4A0B8C74D52EECF49F1 ] SpotfluxUpdateService C:\Program Files (x86)\Spotflux\services\SpotfluxUpdateService.exe
03:06:40.0062 0x1734  SpotfluxUpdateService - ok
03:06:40.0220 0x1734  [ E17E0188BB90FAE42D83E98707EFA59C, FC075F7B39E86CC8EF6DA4E339FE946917E319C347AC70FB0C50AAF36F97E27F ] sppsvc          C:\Windows\system32\sppsvc.exe
03:06:40.0305 0x1734  sppsvc - ok
03:06:40.0360 0x1734  [ 93D7D61317F3D4BC4F4E9F8A96A7DE45, 36D48B23B8243BE5229707375FCD11C2DCAC96983199345365F065A0CBF33314 ] sppuinotify     C:\Windows\system32\sppuinotify.dll
03:06:40.0369 0x1734  sppuinotify - ok
03:06:40.0440 0x1734  [ 441FBA48BFF01FDB9D5969EBC1838F0B, 306128F1AD489F87161A089D1BDC1542A4CB742D91A0C12A7CD1863FDB8932C0 ] srv             C:\Windows\system32\DRIVERS\srv.sys
03:06:40.0452 0x1734  srv - ok
03:06:40.0471 0x1734  [ B4ADEBBF5E3677CCE9651E0F01F7CC28, 726DB2283113AB2A9681E8E9F61132303D6D86E9CD034C40EE4A8C9DB29E87F7 ] srv2            C:\Windows\system32\DRIVERS\srv2.sys
03:06:40.0483 0x1734  srv2 - ok
03:06:40.0531 0x1734  [ 27E461F0BE5BFF5FC737328F749538C3, AFA4704ED8FFC1A0BAB40DFB81D3AE3F3D933A3C9BF54DDAF39FF9AF3646D9E6 ] srvnet          C:\Windows\system32\DRIVERS\srvnet.sys
03:06:40.0536 0x1734  srvnet - ok
03:06:40.0585 0x1734  [ 51B52FBD583CDE8AA9BA62B8B4298F33, 2E2403F8AA39E79D1281CA006B51B43139C32A5FDD64BD34DAA4B935338BD740 ] SSDPSRV         C:\Windows\System32\ssdpsrv.dll
03:06:40.0592 0x1734  SSDPSRV - ok
03:06:40.0614 0x1734  [ AB7AEBF58DAD8DAAB7A6C45E6A8885CB, D21CDBC4C2AA0DB5B4455D5108B0CAF4282A2E664B9035708F212CC094569D9D ] SstpSvc         C:\Windows\system32\sstpsvc.dll
03:06:40.0619 0x1734  SstpSvc - ok
03:06:40.0662 0x1734  [ C270C64B4F6CA87DAC2D7F68ED57A141, A224264B90FCA9C597ED7D7923EBC34A3AD14885245D570CBEE8F24E27C91DC8 ] stdriver        C:\Windows\system32\DRIVERS\stdriver64.sys
03:06:40.0668 0x1734  stdriver - ok
03:06:40.0706 0x1734  [ F3817967ED533D08327DC73BC4D5542A, 1B204454408A690C0A86447F3E4AA9E7C58A9CFB567C94C17C21920BA648B4D5 ] stexstor        C:\Windows\system32\drivers\stexstor.sys
03:06:40.0707 0x1734  stexstor - ok
03:06:40.0786 0x1734  [ 8DD52E8E6128F4B2DA92CE27402871C1, 1101C38BE8FC383B5F2F9FA402F9652B23B88A764DE2B584DFE62B88B11DEF92 ] stisvc          C:\Windows\System32\wiaservc.dll
03:06:40.0804 0x1734  stisvc - ok
03:06:40.0822 0x1734  [ D01EC09B6711A5F8E7E6564A4D0FBC90, 3CB922291DBADC92B46B9E28CCB6810CD8CCDA3E74518EC9522B58B998E1F969 ] swenum          C:\Windows\system32\DRIVERS\swenum.sys
03:06:40.0823 0x1734  swenum - ok
03:06:40.0860 0x1734  [ E08E46FDD841B7184194011CA1955A0B, 9C3725BB1F08F92744C980A22ED5C874007D3B5863C7E1F140F50061052AC418 ] swprv           C:\Windows\System32\swprv.dll
03:06:40.0875 0x1734  swprv - ok
03:06:40.0949 0x1734  [ 8080114C4B1954456BB1904000BCC293, B112509C5A6CC29318ACEA57D2F2711820C4C45F1BE698F097BF82D315001A09 ] SynTP           C:\Windows\system32\DRIVERS\SynTP.sys
03:06:40.0961 0x1734  SynTP - ok
03:06:41.0070 0x1734  [ BF9CCC0BF39B418C8D0AE8B05CF95B7D, 3C13217548BE61F2BDB8BD41F77345CDDA1F97BF0AE17241C335B9807EB3DBB8 ] SysMain         C:\Windows\system32\sysmain.dll
03:06:41.0114 0x1734  SysMain - ok
03:06:41.0161 0x1734  [ E3C61FD7B7C2557E1F1B0B4CEC713585, 01F0E116606D185BF93B540868075BFB1A398197F6AABD994983DBFF56B3A8A0 ] TabletInputService C:\Windows\System32\TabSvc.dll
03:06:41.0165 0x1734  TabletInputService - ok
03:06:41.0236 0x1734  [ 3C32FF010F869BC184DF71290477384E, 55CFCEC7F026C6E2E96A2FBE846AB513BB12BB0348735274FE1B71AF019C837B ] tap0901         C:\Windows\system32\DRIVERS\tap0901.sys
03:06:41.0239 0x1734  tap0901 - ok
03:06:41.0274 0x1734  [ 40F0849F65D13EE87B9A9AE3C1DD6823, E251A7EF3D0FD2973AF33A62FC457A7E8D5E8694208F811F52455F7C2426121F ] TapiSrv         C:\Windows\System32\tapisrv.dll
03:06:41.0288 0x1734  TapiSrv - ok
03:06:41.0351 0x1734  [ 185C2170CFD84F9D708276FBB5ABD77D, FCA00B5CC62F2C160326DBA2F6BF31746324BBE7D5E96291C345DCF2583CE324 ] tapSF0901       C:\Windows\system32\DRIVERS\tapSF0901.sys
03:06:41.0354 0x1734  tapSF0901 - ok
03:06:41.0389 0x1734  [ 1BE03AC720F4D302EA01D40F588162F6, AB644862BF1D2E824FD846180DEC4E2C0FAFCC517451486DE5A92E5E78A952E4 ] TBS             C:\Windows\System32\tbssvc.dll
03:06:41.0395 0x1734  TBS - ok
03:06:41.0517 0x1734  [ 40AF23633D197905F03AB5628C558C51, 644656A15236E964E4BE57B42225EAA5643C4CF1FFF6D306813A000716F9D72C ] Tcpip           C:\Windows\system32\drivers\tcpip.sys
03:06:41.0563 0x1734  Tcpip - ok
03:06:41.0675 0x1734  [ 40AF23633D197905F03AB5628C558C51, 644656A15236E964E4BE57B42225EAA5643C4CF1FFF6D306813A000716F9D72C ] TCPIP6          C:\Windows\system32\DRIVERS\tcpip.sys
03:06:41.0720 0x1734  TCPIP6 - ok
03:06:41.0782 0x1734  [ 1B16D0BD9841794A6E0CDE0CEF744ABC, 7EB8BA97339199EEE7F2B09DA2DA6279DA64A510D4598D42CF86415D67CD674C ] tcpipreg        C:\Windows\system32\drivers\tcpipreg.sys
03:06:41.0785 0x1734  tcpipreg - ok
03:06:41.0835 0x1734  [ 3371D21011695B16333A3934340C4E7C, 7416F9BBFC1BA9D875EA7D1C7A0D912FC6977B49A865D67E3F9C4E18A965082D ] TDPIPE          C:\Windows\system32\drivers\tdpipe.sys
03:06:41.0836 0x1734  TDPIPE - ok
03:06:41.0947 0x1734  [ 99527D49EE0A96FC25537C61B270A372, 519E23F86EC86349F92C4A88DBD19C097AEE0A6E152776B32B45D293ED14946B ] tdrpman273      C:\Windows\system32\DRIVERS\tdrpm273.sys
03:06:41.0977 0x1734  tdrpman273 - ok
03:06:42.0023 0x1734  [ 51C5ECEB1CDEE2468A1748BE550CFBC8, 4E8F83877330B421F7B5D8393D34BC44C6450E69209DAA95B29CB298166A5DF9 ] TDTCP           C:\Windows\system32\drivers\tdtcp.sys
03:06:42.0025 0x1734  TDTCP - ok
03:06:42.0048 0x1734  [ DDAD5A7AB24D8B65F8D724F5C20FD806, B71F2967A4EE7395E4416C1526CB85368AEA988BDD1F2C9719C48B08FAFA9661 ] tdx             C:\Windows\system32\DRIVERS\tdx.sys
03:06:42.0051 0x1734  tdx - ok
03:06:42.0249 0x1734  [ C9B9373A0A430C11F0213E359D0772B2, 819D967B58987E1BBF0D4E6DDE0FB4800EDA6273762756A4BABB128566FED33B ] TeamViewer7     C:\Program Files (x86)\TeamViewer\Version7\TeamViewer_Service.exe
03:06:42.0318 0x1734  TeamViewer7 - ok
03:06:42.0345 0x1734  [ 561E7E1F06895D78DE991E01DD0FB6E5, 83BFA50A528762EC52A011302AC3874636FB7E26628CD7ACFBF2BDC9FAA8110D ] TermDD          C:\Windows\system32\DRIVERS\termdd.sys
03:06:42.0347 0x1734  TermDD - ok
03:06:42.0427 0x1734  [ 2E648163254233755035B46DD7B89123, 6FA0D07CE18A3A69D82EE49D875F141E39406E92C34EAC76AC4EB052E6EBCBCD ] TermService     C:\Windows\System32\termsrv.dll
03:06:42.0447 0x1734  TermService - ok
03:06:42.0491 0x1734  [ F0344071948D1A1FA732231785A0664C, DB9886C2C858FAF45AEA15F8E42860343F73EB8685C53EC2E8CCC10586CB0832 ] Themes          C:\Windows\system32\themeservice.dll
03:06:42.0494 0x1734  Themes - ok
03:06:42.0551 0x1734  [ E40E80D0304A73E8D269F7141D77250B, 0DB4AC13A264F19A84DC0BCED54E8E404014CC09C993B172002B1561EC7E265A ] THREADORDER     C:\Windows\system32\mmcss.dll
03:06:42.0557 0x1734  THREADORDER - ok
03:06:42.0577 0x1734  [ 7E7AFD841694F6AC397E99D75CEAD49D, DE87F203FD8E6BDCCFCA1860A85F283301A365846FB703D9BB86278D8AC96B07 ] TrkWks          C:\Windows\System32\trkwks.dll
03:06:42.0585 0x1734  TrkWks - ok
03:06:42.0659 0x1734  [ 773212B2AAA24C1E31F10246B15B276C, F2EF85F5ABA307976D9C649D710B408952089458DDE97D4DEF321DF14E46A046 ] TrustedInstaller C:\Windows\servicing\TrustedInstaller.exe
03:06:42.0664 0x1734  TrustedInstaller - ok
03:06:42.0707 0x1734  [ 4CE278FC9671BA81A138D70823FCAA09, CBE501436696E32A3701B9F377B823AC36647B6626595F76CC63E2396AD7D300 ] tssecsrv        C:\Windows\system32\DRIVERS\tssecsrv.sys
03:06:42.0708 0x1734  tssecsrv - ok
03:06:42.0765 0x1734  [ E9981ECE8D894CEF7038FD1D040EB426, DCDDCE933CAECE8180A3447199B07F2F0413704EEC1A09606EE357901A84A7CF ] TsUsbFlt        C:\Windows\system32\drivers\tsusbflt.sys
03:06:42.0769 0x1734  TsUsbFlt - ok
03:06:42.0810 0x1734  [ AD64450A4ABE076F5CB34CC08EEACB07, B5C386635441A19178E7FEEE299BA430C8D72F9110866C13A216B12A1080AD12 ] TsUsbGD         C:\Windows\system32\drivers\TsUsbGD.sys
03:06:42.0812 0x1734  TsUsbGD - ok
03:06:42.0866 0x1734  [ 3566A8DAAFA27AF944F5D705EAA64894, AE9D8B648DA08AF667B9456C3FE315489859C157510A258559F18238F2CC92B8 ] tunnel          C:\Windows\system32\DRIVERS\tunnel.sys
03:06:42.0870 0x1734  tunnel - ok
03:06:42.0895 0x1734  [ B4DD609BD7E282BFC683CEC7EAAAAD67, EF131DB6F6411CAD36A989A421AF93F89DD61601AC524D2FF11C10FF6E3E9123 ] uagp35          C:\Windows\system32\drivers\uagp35.sys
03:06:42.0898 0x1734  uagp35 - ok
03:06:42.0929 0x1734  [ FF4232A1A64012BAA1FD97C7B67DF593, D8591B4EB056899C7B604E4DD852D82D4D9809F508ABCED4A03E1BE6D5D456E3 ] udfs            C:\Windows\system32\DRIVERS\udfs.sys
03:06:42.0938 0x1734  udfs - ok
03:06:42.0983 0x1734  [ 3CBDEC8D06B9968ABA702EBA076364A1, B8DAB8AA804FC23021BFEBD7AE4D40FBE648D6C6BA21CC008E26D1C084972F9B ] UI0Detect       C:\Windows\system32\UI0Detect.exe
03:06:42.0986 0x1734  UI0Detect - ok
03:06:43.0030 0x1734  [ 4BFE1BC28391222894CBF1E7D0E42320, 5918B1ED2030600DF77BDACF1C808DF6EADDD8BF3E7003AF1D72050D8B102B3A ] uliagpkx        C:\Windows\system32\drivers\uliagpkx.sys
03:06:43.0033 0x1734  uliagpkx - ok
03:06:43.0057 0x1734  [ DC54A574663A895C8763AF0FA1FF7561, 09A3F3597E91CBEB2F38E96E75134312B60CAE5574B2AD4606C2D3E992AEDDFE ] umbus           C:\Windows\system32\DRIVERS\umbus.sys
03:06:43.0059 0x1734  umbus - ok
03:06:43.0074 0x1734  [ B2E8E8CB557B156DA5493BBDDCC1474D, F547509A08C0679ACB843E20C9C0CF51BED1B06530BBC529DFB0944504564A43 ] UmPass          C:\Windows\system32\drivers\umpass.sys
03:06:43.0075 0x1734  UmPass - ok
03:06:43.0313 0x1734  [ 765F2DD351BA064F657751D8D75E58C0, 954834FF6F05E065C2BE6CEC22136A0399026BFF9D91BE859E8E047C3ED8267F ] UNS             C:\Program Files (x86)\Intel\Intel® Management Engine Components\UNS\UNS.exe
03:06:43.0370 0x1734  UNS - ok
03:06:43.0399 0x1734  [ D47EC6A8E81633DD18D2436B19BAF6DE, 0FB461E2D5E0B75BB5958F6362F4880BFA4C36AD930542609BCAF574941AA7AE ] upnphost        C:\Windows\System32\upnphost.dll
03:06:43.0410 0x1734  upnphost - ok
03:06:43.0453 0x1734  [ DCA68B0943D6FA415F0C56C92158A83A, BEE5A5B33B22D1DF50B884D46D89FC3B8286EB16E38AD5A20F0A49E5C6766C57 ] usbccgp         C:\Windows\system32\DRIVERS\usbccgp.sys
03:06:43.0456 0x1734  usbccgp - ok
03:06:43.0518 0x1734  [ 80B0F7D5CCF86CEB5D402EAAF61FEC31, 140C62116A425DEAD25FE8D82DE283BC92C482A9F643658D512F9F67061F28AD ] usbcir          C:\Windows\system32\drivers\usbcir.sys
03:06:43.0521 0x1734  usbcir - ok
03:06:43.0567 0x1734  [ 18A85013A3E0F7E1755365D287443965, 811C5EDF38C765BCF71BCE25CB6626FF6988C3699F5EF1846240EA0052F34C33 ] usbehci         C:\Windows\system32\drivers\usbehci.sys
03:06:43.0569 0x1734  usbehci - ok
03:06:43.0625 0x1734  [ 8D1196CFBB223621F2C67D45710F25BA, B5D7AFE51833B24FC9576F3AED3D8A2B290E5846060E73F9FFFAC1890A8B6003 ] usbhub          C:\Windows\system32\DRIVERS\usbhub.sys
03:06:43.0635 0x1734  usbhub - ok
03:06:43.0682 0x1734  [ 765A92D428A8DB88B960DA5A8D6089DC, 56DE8A2ED58E53B202C399CA7BACB1551136303C2EE0AB426BDBBF880E3C542C ] usbohci         C:\Windows\system32\drivers\usbohci.sys
03:06:43.0684 0x1734  usbohci - ok
03:06:43.0762 0x1734  [ 73188F58FB384E75C4063D29413CEE3D, B485463933306036B1D490722CB1674DC85670753D79FA0EF7EBCA7BBAAD9F7C ] usbprint        C:\Windows\system32\DRIVERS\usbprint.sys
03:06:43.0764 0x1734  usbprint - ok
03:06:43.0820 0x1734  [ 9661DA76B4531B2DA272ECCE25A8AF24, FEA93254A21E71A7EB8AD35FCCAD2C1E41F7329EC33B1734F5B41307A34D8637 ] usbscan         C:\Windows\system32\DRIVERS\usbscan.sys
03:06:43.0823 0x1734  usbscan - ok
03:06:43.0885 0x1734  [ FED648B01349A3C8395A5169DB5FB7D6, DC4D7594C24ADD076927B9347F1B50B91CF03A4ABDB284248D5711D9C19DEB96 ] USBSTOR         C:\Windows\system32\DRIVERS\USBSTOR.SYS
03:06:43.0891 0x1734  USBSTOR - ok
03:06:43.0988 0x1734  [ DD253AFC3BC6CBA412342DE60C3647F3, 146F8613F1057AC054DC3593E84BC52899DA27EA33B0E72ACFB78C3699ADCDE7 ] usbuhci         C:\Windows\system32\drivers\usbuhci.sys
03:06:43.0990 0x1734  usbuhci - ok
03:06:44.0043 0x1734  [ EDBB23CBCF2CDF727D64FF9B51A6070E, 7202484C8E1BFB2AFD64D8C81668F3EDE0E3BF5EB27572877A0A7B337AE5AE42 ] UxSms           C:\Windows\System32\uxsms.dll
03:06:44.0046 0x1734  UxSms - ok
03:06:44.0060 0x1734  [ 4D71227301DD8D09097B9E4CC6527E5A, 193D47ADCB722B581CC0F29B794AB3E455B6E9BEA367CE9A5216A09E055B7F1E ] VaultSvc        C:\Windows\system32\lsass.exe
03:06:44.0062 0x1734  VaultSvc - ok

Источник: [https://torrent-igruha.org/3551-portal.html]
operator evaluates @INC in a scalar context, and thus @INC has only an integer value. CVE-2021-36763In CODESYS V3 web server before 3.5.17.10, files or directories are accessible to External Parties. CVE-2021-36753sharkdp BAT before 0.18.2 executes less.exe from the current working directory. CVE-2021-36744Trend Micro Security (Consumer) 2021 and 2020 are vulnerable to a directory junction vulnerability which could allow an attacker to exploit the system to escalate privileges and create a denial of service. CVE-2021-36717Synerion TimeNet version 9.21 contains a directory traversal vulnerability where, on the "Name" parameter, the attacker can return to the root directory and open the host file. This might give the attacker the ability to view restricted files, which could provide the attacker with more information required to further compromise the system. CVE-2021-36376dandavison delta before 0.8.3 on Windows resolves an executable's pathname as a relative path from the current directory. CVE-2021-36286Dell SupportAssist Client Consumer versions 3.9.13.0 and any versions prior to 3.9.13.0 contain an arbitrary file deletion vulnerability that can be exploited by using the Windows feature of NTFS called Symbolic links. Symbolic links can be created by any(non-privileged) user under some object directories, but by themselves are not sufficient to successfully escalate privileges. However, combining them with a different object, such as the NTFS junction point allows for the exploitation. Support assist clean files functionality do not distinguish junction points from the physical folder and proceeds to clean the target of the junction that allows nonprivileged users to create junction points and delete arbitrary files on the system which can be accessed only by the admin. CVE-2021-36168A Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Fortinet FortiPortal 6.x before 6.0.5, FortiPortal 5.3.x before 5.3.6 and any FortiPortal before 6.2.5 allows authenticated attacker to disclosure information via crafted GET request with malicious parameter values. CVE-2021-36157An issue was discovered in Grafana Cortex through 1.9.0. The header value X-Scope-OrgID is used to construct file paths for rules files, and if crafted to conduct directory traversal such as ae ../../sensitive/path/in/deployment pathname, then Cortex will attempt to parse a rules file at that location and include some of the contents in the error message. (Other Cortex API requests can also be sent a malicious OrgID header, e.g., tricking the ingester into writing metrics to a different location, but the effect is nuisance rather than information disclosure.) CVE-2021-36156An issue was discovered in Grafana Loki through 2.2.1. The header value X-Scope-OrgID is used to construct file paths for rules files, and if crafted to conduct directory traversal such as ae ../../sensitive/path/in/deployment pathname, then Loki will attempt to parse a rules file at that location and include some of the contents in the error message. CVE-2021-36121An issue was discovered in Echo ShareCare 8.15.5. The file-upload feature in Access/DownloadFeed_Mnt/FileUpload_Upd.cfm is susceptible to an unrestricted upload vulnerability via the name1 parameter, when processing remote input from an authenticated user, leading to the ability for arbitrary files to be written to arbitrary filesystem locations via ../ Directory Traversal on the Z: drive (a hard-coded drive letter where ShareCare application files reside) and remote code execution as the ShareCare service user (NT AUTHORITY\SYSTEM). CVE-2021-36041Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by an improper input validation vulnerability. An attacker with admin privileges could upload a specially crafted file in the 'pub/media` directory could lead to remote code execution. CVE-2021-36002Adobe Captivate version 11.5.5 (and earlier) is affected by an Creation of Temporary File In Directory With Incorrect Permissions vulnerability that could result in privilege escalation in the context of the current user. The attacker must plant a malicious file in a particular location of the victim's machine. Exploitation of this issue requires user interaction in that a victim must launch the Captivate Installer. CVE-2021-35973NETGEAR WAC104 devices before 1.0.4.15 are affected by an authentication bypass vulnerability in /usr/sbin/mini_httpd, allowing an unauthenticated attacker to invoke any action by adding the &currentsetting.htm substring to the HTTP query, a related issue to CVE-2020-27866. This directly allows the attacker to change the web UI password, and eventually to enable debug mode (telnetd) and gain a shell on the device as the admin limited-user account (however, escalation to root is simple because of weak permissions on the /etc/ directory). CVE-2021-35968The directory list page parameter of the Orca HCM digital learning platform fails to filter special characters properly. Remote attackers can access the system directory thru Path Traversal with users&#8217; privileges. CVE-2021-35967The directory page parameter of the Orca HCM digital learning platform does not filter special characters. Remote attackers can access the system directory thru Path Traversal without logging in. CVE-2021-3533A flaw was found in Ansible if an ansible user sets ANSIBLE_ASYNC_DIR to a subdirectory of a world writable directory. When this occurs, there is a race condition on the managed machine. A malicious, non-privileged account on the remote machine can exploit the race condition to access the async result data. This flaw affects Ansible Tower 3.7 and Ansible Automation Platform 1.2. CVE-2021-3532A flaw was found in Ansible where the secret information present in async_files are getting disclosed when the user changes the jobdir to a world readable directory. Any secret information in an async status file will be readable by a malicious user on that system. This flaw affects Ansible Tower 3.7 and Ansible Automation Platform 1.2. CVE-2021-35027A directory traversal vulnerability in the web server of the Zyxel VPN2S firmware version 1.12 could allow a remote attacker to gain access to sensitive information. CVE-2021-34820Web Path Directory Traversal in the Novus HTTP Server. The Novus HTTP Server is affected by the Directory Traversal for Arbitrary File Access vulnerability. A remote, unauthenticated attacker using an HTTP GET request may be able to exploit this issue to access sensitive data. The issue was discovered in the NMS (Novus Management System) software through 1.51.2 CVE-2021-3480A flaw was found in slapi-nis in versions before 0.56.7. A NULL pointer dereference during the parsing of the Binding DN could allow an unauthenticated attacker to crash the 389-ds-base directory server. The highest threat from this vulnerability is to system availability. CVE-2021-34765A vulnerability in the web UI for Cisco Nexus Insights could allow an authenticated, remote attacker to view and download files related to the web application. The attacker requires valid device credentials. This vulnerability exists because proper role-based access control (RBAC) filters are not applied to file download actions. An attacker could exploit this vulnerability by logging in to the application and then navigating to the directory listing and download functions. A successful exploit could allow the attacker to download sensitive files that should be restricted, which could result in disclosure of sensitive information. CVE-2021-34762A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to perform a directory traversal attack on an affected device. The attacker would require valid device credentials. The vulnerability is due to insufficient input validation of the HTTPS URL by the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTPS request that contains directory traversal character sequences to an affected device. A successful exploit could allow the attacker to read or write arbitrary files on the device. CVE-2021-34724A vulnerability in the Cisco IOS XE SD-WAN Software CLI could allow an authenticated, local attacker to elevate privileges and execute arbitrary code on the underlying operating system as the root user. An attacker must be authenticated on an affected device as a PRIV15 user. This vulnerability is due to insufficient file system protection and the presence of a sensitive file in the bootflash directory on an affected device. An attacker could exploit this vulnerability by overwriting an installer file stored in the bootflash directory with arbitrary commands that can be executed with root-level privileges. A successful exploit could allow the attacker to read and write changes to the configuration database on the affected device. CVE-2021-34701A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM &amp; Presence Service (Unified CM IM&amp;P), and Cisco Unity Connection could allow an authenticated, remote attacker to access sensitive data on an affected device. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request that contains directory traversal character sequences to an affected system. A successful exploit could allow the attacker to access sensitive files on the affected system. CVE-2021-34638Authenticated Directory Traversal in WordPress Download Manager <= 3.1.24 allows authenticated (Contributor+) users to obtain sensitive configuration file information, as well as allowing Author+ users to perform XSS attacks, by setting Download template to a file containing configuration information or an uploaded JavaScript with an image extension This issue affects: WordPress Download Manager version 3.1.24 and prior versions. CVE-2021-34597Improper Input Validation vulnerability in PC Worx Automation Suite of Phoenix Contact up to version 1.88 could allow an attacker with a manipulated project file to unpack arbitrary files outside of the selected project directory. CVE-2021-34429For Eclipse Jetty versions 9.4.37-9.4.42, 10.0.1-10.0.5 & 11.0.1-11.0.5, URIs can be crafted using some encoded characters to access the content of the WEB-INF directory and/or bypass some security constraints. This is a variation of the vulnerability reported in CVE-2021-28164/GHSA-v7ff-8wcx-gmc5. CVE-2021-34413All versions of the Zoom Plugin for Microsoft Outlook for MacOS before 5.3.52553.0918 contain a Time-of-check Time-of-use (TOC/TOU) vulnerability during the plugin installation process. This could allow a standard user to write their own malicious application to the plugin directory, allowing the malicious application to execute in a privileged context. CVE-2021-34408The Zoom Client for Meetings for Windows in all versions before version 5.3.2 writes log files to a user writable directory as a privileged user during the installation or update of the client. This could allow for potential privilege escalation if a link was created between the user writable directory used and a non-user writable directory. CVE-2021-34218Directory Indexing in Login Portal of Login Portal of TOTOLINK-A702R-V1.0.0-B20161227.1023 allows attacker to access /add/ , /img/, /js/, and /mobile directories via GET Parameter. CVE-2021-34129LaikeTui 3.5.0 allows remote authenticated users to delete arbitrary files, as demonstrated by deleting install.lock in order to reinstall the product in an attacker-controlled manner. This deletion is possible via directory traversal in the uploadImg, oldpic, or imgurl parameter. CVE-2021-33900While investigating DIRSTUDIO-1219 it was noticed that configured StartTLS encryption was not applied when any SASL authentication mechanism (DIGEST-MD5, GSSAPI) was used. While investigating DIRSTUDIO-1220 it was noticed that any configured SASL confidentiality layer was not applied. This issue affects Apache Directory Studio version 2.0.0.v20210213-M16 and prior versions. CVE-2021-33896Dino before 0.1.2 and 0.2.x before 0.2.1 allows Directory Traversal (only for creation of new files) via URI-encoded path separators. CVE-2021-33884An Unrestricted Upload of File with Dangerous Type vulnerability in B. Braun SpaceCom2 prior to 012U000062 allows remote attackers to upload any files to the /tmp directory of the device through the webpage API. This can result in critical files being overwritten. CVE-2021-33807Cartadis Gespage through 8.2.1 allows Directory Traversal in gespage/doDownloadData and gespage/webapp/doDownloadData. CVE-2021-33800In Druid 1.2.3, visiting the path with parameter in a certain function can lead to directory traversal. CVE-2021-3374Directory traversal in RStudio Shiny Server before 1.5.16 allows attackers to read the application source code, involving an encoded slash. CVE-2021-33726A vulnerability has been identified in SINEC NMS (All versions < V1.0 SP2 Update 1). The affected system allows to download arbitrary files under a user controlled path and does not correctly check if the relative path is still within the intended target directory. CVE-2021-33725A vulnerability has been identified in SINEC NMS (All versions < V1.0 SP2 Update 1). The affected system allows to delete arbitrary files or directories under a user controlled path and does not correctly check if the relative path is still within the intended target directory. CVE-2021-33724A vulnerability has been identified in SINEC NMS (All versions < V1.0 SP2 Update 1). The affected system contains an Arbitrary File Deletion vulnerability that possibly allows to delete an arbitrary file or directory under a user controlled path. CVE-2021-33692SAP Cloud Connector, version - 2.0, allows the upload of zip files as backup. This backup file can be tricked to inject special elements such as '..' and '/' separators, for attackers to escape outside of the restricted location to access files or directories. CVE-2021-33685SAP Business One version - 10.0 allows low-level authorized attacker to traverse the file system to access files or directories that are outside of the restricted directory. A successful attack allows access to high level sensitive data CVE-2021-33673Under certain conditions, SAP Contact Center - version 700,does not sufficiently encode user-controlled inputs and persists in them. This allows an attacker to exploit a Stored Cross-Site Scripting (XSS) vulnerability when a user browses through the employee directory and to execute arbitrary code on the victim's browser. Due to the usage of ActiveX in the application, the attacker can further execute operating system level commands. CVE-2021-33540In certain devices of the Phoenix Contact AXL F BK and IL BK product families an undocumented password protected FTP access to the root directory exists. CVE-2021-33497Dutchcoders transfer.sh before 1.2.4 allows Directory Traversal for deleting files. CVE-2021-33215An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. The API allows Directory Traversal. CVE-2021-33211A Directory Traversal vulnerability in the Unzip feature in Elements-IT HTTP Commander 5.3.3 allows remote authenticated users to write files to arbitrary directories via relative paths in ZIP archives. CVE-2021-33205Western Digital EdgeRover before 0.25 has an escalation of privileges vulnerability where a low privileged user could load malicious content into directories with higher privileges, because of how Node.js is used. An attacker can gain admin privileges and carry out malicious activities such as creating a fake library and stealing user credentials. CVE-2021-33203Django before 2.2.24, 3.x before 3.1.12, and 3.2.x before 3.2.4 has a potential directory traversal via django.contrib.admindocs. Staff members could use the TemplateDetailView view to check the existence of arbitrary files. Additionally, if (and only if) the default admindocs templates have been customized by application developers to also show file contents, then not only the existence but also the file contents would have been exposed. In other words, there is directory traversal outside of the template root directories. CVE-2021-33183Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability container volume management component in Synology Docker before 18.09.0-0515 allows local users to read or write arbitrary files via unspecified vectors. CVE-2021-33182Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in PDF Viewer component in Synology DiskStation Manager (DSM) before 6.2.4-25553 allows remote authenticated users to read limited files via unspecified vectors. CVE-2021-32954Advantech WebAccess/SCADA Versions 9.0.1 and prior is vulnerable to a directory traversal, which may allow an attacker to remotely read arbitrary files on the file system. CVE-2021-32814Skytable is a NoSQL database with automated snapshots and TLS. Versions prior to 0.5.1 are vulnerable to a a directory traversal attack enabling remotely connected clients to destroy and/or manipulate critical files on the host's file system. This security bug has been patched in version 0.5.1. There are no known workarounds aside from upgrading. CVE-2021-3281In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by "startapp --template" and "startproject --template") allows directory traversal via an archive with absolute paths or relative paths with dot segments. CVE-2021-32803The npm package "tar" (aka node-tar) before versions 6.1.2, 5.0.7, 4.4.15, and 3.2.3 has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory. This order of operations resulted in the directory being created and added to the `node-tar` directory cache. When a directory is present in the directory cache, subsequent calls to mkdir for that directory are skipped. However, this is also where `node-tar` checks for symlinks occur. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass `node-tar` symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.3, 4.4.15, 5.0.7 and 6.1.2. CVE-2021-32769Micronaut is a JVM-based, full stack Java framework designed for building JVM applications. A path traversal vulnerability exists in versions prior to 2.5.9. With a basic configuration, it is possible to access any file from a filesystem, using "/../../" in the URL. This occurs because Micronaut does not restrict file access to configured paths. The vulnerability is patched in version 2.5.9. As a workaround, do not use `**` in mapping, use only `*`, which exposes only flat structure of a directory not allowing traversal. If using Linux, another workaround is to run micronaut in chroot. CVE-2021-32708Flysystem is an open source file storage library for PHP. The whitespace normalisation using in 1.x and 2.x removes any unicode whitespace. Under certain specific conditions this could potentially allow a malicious user to execute code remotely. The conditions are: A user is allowed to supply the path or filename of an uploaded file, the supplied path or filename is not checked against unicode chars, the supplied pathname checked against an extension deny-list, not an allow-list, the supplied path or filename contains a unicode whitespace char in the extension, the uploaded file is stored in a directory that allows PHP code to be executed. Given these conditions are met a user can upload and execute arbitrary code on the system under attack. The unicode whitespace removal has been replaced with a rejection (exception). For 1.x users, upgrade to 1.1.4. For 2.x users, upgrade to 2.1.1. CVE-2021-32706Pi-hole's Web interface provides a central location to manage a Pi-hole instance and review performance statistics. Prior to Pi-hole Web interface version 5.5.1, the `validDomainWildcard` preg_match filter allows a malicious character through that can be used to execute code, list directories, and overwrite sensitive files. The issue lies in the fact that one of the periods is not escaped, allowing any character to be used in its place. A patch for this vulnerability was released in version 5.5.1. CVE-2021-32643Http4s is a Scala interface for HTTP services. `StaticFile.fromUrl` can leak the presence of a directory on a server when the `URL` scheme is not `file://`, and the URL points to a fetchable resource under its scheme and authority. The function returns `F[None]`, indicating no resource, if `url.getFile` is a directory, without first checking the scheme or authority of the URL. If a URL connection to the scheme and URL would return a stream, and the path in the URL exists as a directory on the server, the presence of the directory on the server could be inferred from the 404 response. The contents and other metadata about the directory are not exposed. This affects http4s versions: 0.21.7 through 0.21.23, 0.22.0-M1 through 0.22.0-M8, 0.23.0-M1, and 1.0.0-M1 through 1.0.0-M22. The [patch](https://github.com/http4s/http4s/commit/52e1890665410b4385e37b96bc49c5e3c708e4e9) is available in the following versions: v0.21.24, v0.22.0-M9, v0.23.0-M2, v1.0.0-M23. As a workaround users can avoid calling `StaticFile.fromUrl` with non-file URLs. CVE-2021-32572Speco Web Viewer through 2021-05-12 allows Directory Traversal via GET request for a URI with /.. at the beginning, as demonstrated by reading the /etc/passwd file. CVE-2021-32515Directory listing vulnerability in share_link in QSAN Storage Manager allows attackers to list arbitrary directories and further access credential information. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3. CVE-2021-32511QSAN Storage Manager through directory listing vulnerability in ViewBroserList allows remote authenticated attackers to list arbitrary directories via the file path parameter. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3. CVE-2021-32510QSAN Storage Manager through directory listing vulnerability in antivirus function allows remote authenticated attackers to list arbitrary directories by injecting file path parameter. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3. CVE-2021-32466An uncontrolled search path element privilege escalation vulnerability in Trend Micro HouseCall for Home Networks version 5.3.1225 and below could allow an attacker to escalate privileges by placing a custom crafted file in a specific directory to load a malicious library. Please note that an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability. CVE-2021-3223Node-RED-Dashboard before 2.26.2 allows ui_base/js/..%2f directory traversal to read files. CVE-2021-32018An issue was discovered in JUMP AMS 3.6.0.04.009-2487. The JUMP SOAP API was vulnerable to arbitrary file reading due to an improper limitation of file loading on the server filesystem, aka directory traversal. CVE-2021-32017An issue was discovered in JUMP AMS 3.6.0.04.009-2487. A JUMP SOAP endpoint permitted the listing of the content of the remote file system. This can be used to identify the complete server filesystem structure, i.e., identifying all the directories and files. CVE-2021-32016An issue was discovered in JUMP AMS 3.6.0.04.009-2487. A JUMP SOAP endpoint permitted the writing of arbitrary files to a user-controlled location on the remote filesystem (with user-controlled content) via directory traversal, potentially leading to remote code and command execution. CVE-2021-3199Directory traversal with remote code execution can occur in /upload in ONLYOFFICE Document Server before 5.6.3, when JWT is used, via a /.. sequence in an image upload parameter. CVE-2021-3195** DISPUTED ** bitcoind in Bitcoin Core through 0.21.0 can create a new file in an arbitrary directory (e.g., outside the ~/.bitcoin directory) via a dumpwallet RPC call. NOTE: this reportedly does not violate the security model of Bitcoin Core, but can violate the security model of a fork that has implemented dumpwallet restrictions. CVE-2021-31933A remote code execution vulnerability exists in Chamilo through 1.11.14 due to improper input sanitization of a parameter used for file uploads, and improper file-extension filtering for certain filenames (e.g., .phar or .pht). A remote authenticated administrator is able to upload a file containing arbitrary PHP code into specific directories via main/inc/lib/fileUpload.lib.php directory traversal to achieve PHP code execution. CVE-2021-31894A vulnerability has been identified in SIMATIC PCS 7 V8.2 and earlier (All versions), SIMATIC PCS 7 V9.X (All versions), SIMATIC PDM (All versions), SIMATIC STEP 7 V5.X (All versions < V5.7), SINAMICS STARTER (containing STEP 7 OEM version) (All versions < V5.4 SP2 HF1). A directory containing metafiles relevant to devices' configurations has write permissions. An attacker could leverage this vulnerability by changing the content of certain metafiles and subsequently manipulate parameters or behavior of devices that would be later configured by the affected software. CVE-2021-31847Improper access control vulnerability in the repair process for McAfee Agent for Windows prior to 5.7.4 could allow a local attacker to perform a DLL preloading attack using unsigned DLLs. This would result in elevation of privileges and the ability to execute arbitrary code as the system user, through not correctly protecting a temporary directory used in the repair process and not checking the DLL signature. CVE-2021-31800Multiple path traversal vulnerabilities exist in smbserver.py in Impacket through 0.9.22. An attacker that connects to a running smbserver instance can list and write to arbitrary files via ../ directory traversal. This could potentially be abused to achieve arbitrary code execution by replacing /etc/shadow or an SSH authorized key. CVE-2021-31776Aviatrix VPN Client before 2.14.14 on Windows has an unquoted search path that enables local privilege escalation to the SYSTEM user, if the machine is misconfigured to allow unprivileged users to write to directories that are supposed to be restricted to administrators. CVE-2021-31769MyQ Server in MyQ X Smart before 8.2 allows remote code execution by unprivileged users because administrative session data can be read in the %PROGRAMFILES%\MyQ\PHP\Sessions directory. The "Select server file" feature is only intended for administrators but actually does not require authorization. An attacker can inject arbitrary OS commands (such as commands to create new .php files) via the Task Scheduler component. CVE-2021-31731A directory traversal issue in KiteCMS 1.1.1 allows remote administrators to overwrite arbitrary files via ../ in the path parameter to index.php/admin/Template/fileedit, with PHP code in the html parameter. CVE-2021-31542In Django 2.2 before 2.2.21, 3.1 before 3.1.9, and 3.2 before 3.2.1, MultiPartParser, UploadedFile, and FieldFile allowed directory traversal via uploaded files with suitably crafted file names. CVE-2021-31540Wowza Streaming Engine through 4.8.5 (in a default installation) has incorrect file permissions of configuration files in the conf/ directory. A regular local user is able to read and write to all the configuration files, e.g., modify the application server configuration. CVE-2021-3152** DISPUTED ** Home Assistant before 2021.1.3 does not have a protection layer that can help to prevent directory-traversal attacks against custom integrations. NOTE: the vendor's perspective is that the vulnerability itself is in custom integrations written by third parties, not in Home Assistant; however, Home Assistant does have a security update that is worthwhile in addressing this situation. CVE-2021-31411Insecure temporary directory usage in frontend build functionality of com.vaadin:flow-server versions 2.0.9 through 2.5.2 (Vaadin 14.0.3 through Vaadin 14.5.2), 3.0 prior to 6.0 (Vaadin 15 prior to 19), and 6.0.0 through 6.0.5 (Vaadin 19.0.0 through 19.0.4) allows local users to inject malicious code into frontend resources during application rebuilds. CVE-2021-3139In Open-iSCSI tcmu-runner 1.3.x, 1.4.x, and 1.5.x through 1.5.2, xcopy_locate_udev in tcmur_cmd_handler.c lacks a check for transport-layer restrictions, allowing remote attackers to read or write files via directory traversal in an XCOPY request. For example, an attack can occur over a network if the attacker has access to one iSCSI LUN. NOTE: relative to CVE-2020-28374, this is a similar mistake in a different algorithm. CVE-2021-31385An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in J-Web of Juniper Networks Junos OS allows any low-privileged authenticated attacker to elevate their privileges to root. This issue affects: Juniper Networks Junos OS 12.3 versions prior to 12.3R12-S19; 15.1 versions prior to 15.1R7-S10; 18.3 versions prior to 18.3R3-S5; 18.4 versions prior to 18.4R3-S9; 19.1 versions prior to 19.1R3-S6; 19.2 versions prior to 19.2R1-S7, 19.2R3-S3; 19.3 versions prior to 19.3R3-S3; 19.4 versions prior to 19.4R3-S5; 20.1 versions prior to 20.1R2-S2, 20.1R3-S1; 20.2 versions prior to 20.2R3-S2; 20.3 versions prior to 20.3R3; 20.4 versions prior to 20.4R2-S1, 20.4R3; 21.1 versions prior to 21.1R1-S1, 21.1R2. CVE-2021-31272SerenityOS before commit 3844e8569689dd476064a0759d704bc64fb3ca2c contains a directory traversal vulnerability in tar/unzip that may lead to command execution or privilege escalation. CVE-2021-31154pleaseedit in please before 0.4 uses predictable temporary filenames in /tmp and the target directory. This allows a local attacker to gain full root privileges by staging a symlink attack. CVE-2021-31153please before 0.4 allows a local unprivileged attacker to gain knowledge about the existence of files or directories in privileged locations via the search_path function, the --check option, or the -d option. CVE-2021-30635Sonatype Nexus Repository Manager 3.x before 3.30.1 allows a remote attacker to get a list of files and directories that exist in a UI-related folder via directory traversal (no customer-specific data is exposed). CVE-2021-30494Multiple system services installed alongside the Razer Synapse 3 software suite perform privileged operations on entries within the Razer Chroma SDK subkey. These privileged operations consist of file name concatenation of a runtime log file that is used to store runtime log information. In other words, an attacker can create a file in an unintended directory (with some limitations). CVE-2021-30493Multiple system services installed alongside the Razer Synapse 3 software suite perform privileged operations on entries within the ChromaBroadcast subkey. These privileged operations consist of file name concatenation of a runtime log file that is used to store runtime log information. In other words, an attacker can create a file in an unintended directory (with some limitations). CVE-2021-30483isomorphic-git before 1.8.2 allows Directory Traversal via a crafted repository. CVE-2021-30465runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The problem occurs via a symlink-exchange attack that relies on a race condition. CVE-2021-30463VestaCP through 0.9.8-24 allows attackers to gain privileges by creating symlinks to files for which they lack permissions. After reading the RKEY value from user.conf under the /usr/local/vesta/data/users/admin directory, the admin password can be changed via a /reset/?action=confirm&user=admin&code= URI. This occurs because chmod is used unsafely. CVE-2021-3042A local privilege escalation (PE) vulnerability exists in the Palo Alto Networks Cortex XDR agent on Windows platforms that enables an authenticated local Windows user to execute programs with SYSTEM privileges. Exploiting this vulnerability requires the user to have file creation privilege in the Windows root directory (such as C:\). This issue impacts: All versions of Cortex XDR agent 6.1 without content update 181 or a later version; All versions of Cortex XDR agent 7.2 without content update 181 or a later version; All versions of Cortex XDR agent 7.3 without content update 181 or a later version. Cortex XDR agent 5.0 versions are not impacted by this issue. Content updates are required to resolve this issue and are automatically applied for the agent. CVE-2021-3041A local privilege escalation vulnerability exists in the Palo Alto Networks Cortex XDR agent on Windows platforms that enables an authenticated local Windows user to execute programs with SYSTEM privileges. This requires the user to have the privilege to create files in the Windows root directory or to manipulate key registry values. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.11; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.8; Cortex XDR agent 7.2 versions earlier than Cortex XDR agent 7.2.3; All versions of Cortex XDR agent 7.2 without content update release 171 or a later version. CVE-2021-3019ffay lanproxy 0.1 allows Directory Traversal to read /../conf/config.properties to obtain credentials for a connection to the intranet. CVE-2021-3013ripgrep before 13 on Windows allows attackers to trigger execution of arbitrary programs from the current working directory via the -z/--search-zip or --pre flag. CVE-2021-30048Directory Traversal in the fileDownload function in com/java2nb/common/controller/FileController.java in Novel-plus (&#23567;&#35828;&#31934;&#21697;&#23627;-plus) 3.5.1 allows attackers to read arbitrary files via the filePath parameter. CVE-2021-29949When loading the shared library that provides the OTR protocol implementation, Thunderbird will initially attempt to open it using a filename that isn't distributed by Thunderbird. If a computer has already been infected with a malicious library of the alternative filename, and the malicious library has been copied to a directory that is contained in the search path for executable libraries, then Thunderbird will load the incorrect library. This vulnerability affects Thunderbird < 78.9.1. CVE-2021-29695IBM Host firmware for LC-class Systems could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request that would allow them to delete arbitrary files on the system. IBM X-Force ID: 200558. CVE-2021-29643PRTG Network Monitor before 21.3.69.1333 allows stored XSS via an unsanitized string imported from a User Object in a connected Active Directory instance. CVE-2021-29641Directus 8 before 8.8.2 allows remote authenticated users to execute arbitrary code because file-upload permissions include the ability to upload a .php file to the main upload directory and/or upload a .php file and a .htaccess file to a subdirectory. Exploitation succeeds only for certain installations with the Apache HTTP Server and the local-storage driver (e.g., when the product was obtained from hub.docker.com). CVE-2021-29429In Gradle before version 7.0, files created with open permissions in the system temporary directory can allow an attacker to access information downloaded by Gradle. Some builds could be vulnerable to a local information disclosure. Remote files accessed through TextResourceFactory are downloaded into the system temporary directory first. Sensitive information contained in these files can be exposed to other local users on the same system. If you do not use the `TextResourceFactory` API, you are not vulnerable. As of Gradle 7.0, uses of the system temporary directory have been moved to the Gradle User Home directory. By default, this directory is restricted to the user running the build. As a workaround, set a more restrictive umask that removes read access to other users. When files are created in the system temporary directory, they will not be accessible to other users. If you are unable to change your system's umask, you can move the Java temporary directory by setting the System Property `java.io.tmpdir`. The new path needs to limit permissions to the build user only. CVE-2021-29428In Gradle before version 7.0, on Unix-like systems, the system temporary directory can be created with open permissions that allow multiple users to create and delete files within it. Gradle builds could be vulnerable to a local privilege escalation from an attacker quickly deleting and recreating files in the system temporary directory. This vulnerability impacted builds using precompiled script plugins written in Kotlin DSL and tests for Gradle plugins written using ProjectBuilder or TestKit. If you are on Windows or modern versions of macOS, you are not vulnerable. If you are on a Unix-like operating system with the "sticky" bit set on your system temporary directory, you are not vulnerable. The problem has been patched and released with Gradle 7.0. As a workaround, on Unix-like operating systems, ensure that the "sticky" bit is set. This only allows the original user (or root) to delete a file. If you are unable to change the permissions of the system temporary directory, you can move the Java temporary directory by setting the System Property `java.io.tmpdir`. The new path needs to limit permissions to the build user only. For additional details refer to the referenced GitHub Security Advisory. CVE-2021-29425In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like "//../foo", or "\\..\foo", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus "limited" path traversal), if the calling code would use the result to construct a path value. CVE-2021-29417gitjacker before 0.1.0 allows remote attackers to execute arbitrary code via a crafted .git directory because of directory traversal. CVE-2021-29338Integer Overflow in OpenJPEG v2.4.0 allows remote attackers to crash the application, causing a Denial of Service (DoS). This occurs when the attacker uses the command line option "-ImgDir" on a directory that contains 1048576 files. CVE-2021-29246BTCPay Server through 1.0.7.0 suffers from directory traversal, which allows an attacker with admin privileges to achieve code execution. The attacker must craft a malicious plugin file with special characters to upload the file outside of the restricted directory. CVE-2021-29221A local privilege escalation vulnerability was discovered in Erlang/OTP prior to version 23.2.3. By adding files to an existing installation's directory, a local attacker could hijack accounts of other users running Erlang programs or possibly coerce a service running with "erlsrv.exe" to execute arbitrary code as Local System. This can occur only under specific conditions on Windows with unsafe filesystem permissions. CVE-2021-29212A remote unauthenticated directory traversal security vulnerability has been identified in HPE iLO Amplifier Pack versions 1.80, 1.81, 1.90 and 1.95. The vulnerability could be remotely exploited to allow an unauthenticated user to run arbitrary code leading complete impact to confidentiality, integrity, and availability of the iLO Amplifier Pack appliance. CVE-2021-29105A stored Cross Site Scripting (XSS) vulnerability in Esri ArcGIS Server Services Directory version 10.8.1 and below may allow a remote authenticated attacker to pass and store malicious strings in the ArcGIS Services Directory. CVE-2021-29101ArcGIS GeoEvent Server versions 10.8.1 and below has a read-only directory path traversal vulnerability that could allow an unauthenticated, remote attacker to perform directory traversal attacks and read arbitrary files on the system. CVE-2021-29091Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in file management component in Synology Photo Station before 6.8.14-3500 allows remote authenticated users to write arbitrary files via unspecified vectors. CVE-2021-29088Improper limitation of a pathname to a restricted directory ('Path Traversal') in cgi component in Synology DiskStation Manager (DSM) before 6.2.4-25553 allows local users to execute arbitrary code via unspecified vectors. CVE-2021-29087Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in webapi component in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers to write arbitrary files via unspecified vectors. CVE-2021-29024In InvoicePlane 1.5.11 a misconfigured web server allows unauthenticated directory listing and file download. Allowing an attacker to directory traversal and download files suppose to be private without authentication. CVE-2021-29022In InvoicePlane 1.5.11, the upload feature discloses the full path of the file upload directory. CVE-2021-28959Zoho ManageEngine Eventlog Analyzer through 12147 is vulnerable to unauthenticated directory traversal via an entry in a ZIP archive. This leads to remote code execution. CVE-2021-28955git-bug before 0.7.2 has an Uncontrolled Search Path Element. It will execute git.bat from the current directory in certain PATH situations (most often seen on Windows). CVE-2021-28931Arbitrary file upload vulnerability in Fork CMS 5.9.2 allows attackers to create or replace arbitrary files in the /themes directory via a crafted zip file uploaded to the Themes panel. CVE-2021-28927The text-to-speech engine in libretro RetroArch for Windows 1.9.0 passes unsanitized input to PowerShell through platform_win32.c via the accessibility_speak_windows function, which allows attackers who have write access on filesystems that are used by RetroArch to execute code via command injection using specially a crafted file and directory names. CVE-2021-28658In Django 2.2 before 2.2.20, 3.0 before 3.0.14, and 3.1 before 3.1.8, MultiPartParser allowed directory traversal via uploaded files with suitably crafted file names. Built-in upload handlers were not affected by this vulnerability. CVE-2021-28650autoar-extractor.c in GNOME gnome-autoar before 0.3.1, as used by GNOME Shell, Nautilus, and other software, allows Directory Traversal during extraction because it lacks a check of whether a file's parent is a symlink in certain complex situations. NOTE: this issue exists because of an incomplete fix for CVE-2020-36241. CVE-2021-28547Adobe Creative Cloud Desktop Application for macOS version 5.3 (and earlier) is affected by a privilege escalation vulnerability that could allow a normal user to delete the OOBE directory and get permissions of any directory under the administrator authority. CVE-2021-28374The Debian courier-authlib package before 0.71.1-2 for Courier Authentication Library creates a /run/courier/authdaemon directory with weak permissions, allowing an attacker to read user information. This may include a cleartext password in some configurations. In general, it includes the user's existence, uid and gids, home and/or Maildir directory, quota, and some type of password information (such as a hash). CVE-2021-28197The Active Directory configuration function in ASUS BMC&#8217;s firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service. CVE-2021-28184The Active Directory configuration function in ASUS BMC&#8217;s firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service. CVE-2021-28169For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, it is possible for requests to the ConcatServlet with a doubly encoded path to access protected resources within the WEB-INF directory. For example a request to `/concat?/%2557EB-INF/web.xml` can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application. CVE-2021-28168Eclipse Jersey 2.28 to 2.33 and Eclipse Jersey 3.0.0 to 3.0.1 contains a local information disclosure vulnerability. This is due to the use of the File.createTempFile which creates a file inside of the system temporary directory with the permissions: -rw-r--r--. Thus the contents of this file are viewable by all other users locally on the system. As such, if the contents written is security sensitive, it can be disclosed to other local users. CVE-2021-28164In Eclipse Jetty 9.4.37.v20210219 to 9.4.38.v20210224, the default compliance mode allows requests with URIs that contain %2e or %2e%2e segments to access protected resources within the WEB-INF directory. For example a request to /context/%2e/WEB-INF/web.xml can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application. CVE-2021-28163In Eclipse Jetty 9.4.32 to 9.4.38, 10.0.0.beta2 to 10.0.1, and 11.0.0.beta2 to 11.0.1, if a user uses a webapps directory that is a symlink, the contents of the webapps directory is deployed as a static webapp, inadvertently serving the webapps themselves and anything else that might be in that directory. CVE-2021-28149Hongdian H8922 3.0.5 devices allow Directory Traversal. The /log_download.cgi log export handler does not validate user input and allows a remote attacker with minimal privileges to download any file from the device by substituting ../ (e.g., ../../etc/passwd) This can be carried out with a web browser by changing the file name accordingly. Upon visiting log_download.cgi?type=../../etc/passwd and logging in, the web server will allow a download of the contents of the /etc/passwd file. CVE-2021-28099In Netflix OSS Hollow, since the Files.exists(parent) is run before creating the directories, an attacker can pre-create these directories with wide permissions. Additionally, since an insecure source of randomness is used, the file names to be created can be deterministically calculated. CVE-2021-28090Tor before 0.4.5.7 allows a remote attacker to cause Tor directory authorities to exit with an assertion failure, aka TROVE-2021-002. CVE-2021-28089Tor before 0.4.5.7 allows a remote participant in the Tor directory protocol to exhaust CPU resources on a target, aka TROVE-2021-001. CVE-2021-28042Deutsche Post Mailoptimizer 4.3 before 2020-11-09 allows Directory Traversal via a crafted ZIP archive to the Upload feature or the MO Connect component. This can lead to remote code execution. CVE-2021-27956Zoho ManageEngine ADSelfService Plus before 6104 allows stored XSS on the /webclient/index.html#/directory-search user search page via the e-mail address field. CVE-2021-27851A security vulnerability that can lead to local privilege escalation has been found in &#8217;guix-daemon&#8217;. It affects multi-user setups in which &#8217;guix-daemon&#8217; runs locally. The attack consists in having an unprivileged user spawn a build process, for instance with `guix build`, that makes its build directory world-writable. The user then creates a hardlink to a root-owned file such as /etc/shadow in that build directory. If the user passed the --keep-failed option and the build eventually fails, the daemon changes ownership of the whole build tree, including the hardlink, to the user. At that point, the user has write access to the target file. Versions after and including v0.11.0-3298-g2608e40988, and versions prior to v1.2.0-75109-g94f0312546 are vulnerable. CVE-2021-27402The SAS Admin portal of Mitel MiCollab before 9.2 FP2 could allow an unauthenticated attacker to access (view and modify) user data by injecting arbitrary directory paths due to improper URL validation, aka Directory Traversal. CVE-2021-27367Controller/Backend/FileEditController.php and Controller/Backend/FilemanagerController.php in Bolt before 4.1.13 allow Directory Traversal. CVE-2021-27330Triconsole Datepicker Calendar <3.77 is affected by cross-site scripting (XSS) in calendar_form.php. Attackers can read authentication cookies that are still active, which can be used to perform further attacks such as reading browser history, directory listings, and file contents. CVE-2021-27328Yeastar NeoGate TG400 91.3.0.3 devices are affected by Directory Traversal. An authenticated user can decrypt firmware and can read sensitive information, such as a password or decryption key. CVE-2021-27241This vulnerability allows local attackers to delete arbitrary directories on affected installations of Avast Premium Security 20.8.2429 (Build 20.8.5653.561). An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the AvastSvc.exe module. By creating a directory junction, an attacker can abuse the service to delete a directory. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-12082. CVE-2021-27230ExpressionEngine before 5.4.2 and 6.x before 6.0.3 allows PHP Code Injection by certain authenticated users who can leverage Translate::save() to write to an _lang.php file under the system/user/language directory. CVE-2021-27184Pelco Digital Sentry Server 7.18.72.11464 has an XML External Entity vulnerability (exploitable via the DTD parameter entities technique), resulting in disclosure and retrieval of arbitrary data on the affected node via an out-of-band (OOB) attack. The vulnerability is triggered when input passed to the XML parser is not sanitized while parsing the ControlPointCacheShare.xml file (in a %APPDATA%\Pelco directory) when DSControlPoint.exe is executed. CVE-2021-27030A user may be tricked into opening a malicious FBX file which may exploit a Directory Traversal Remote Code Execution vulnerability in FBX&#8217;s Review causing it to run arbitrary code on the system. CVE-2021-26999NetApp Cloud Manager versions prior to 3.9.9 log sensitive information when an Active Directory connection fails. The logged information is available only to authenticated users. Customers with auto-upgrade enabled should already be on a fixed version while customers using on-prem connectors with auto-upgrade disabled are advised to upgrade to a fixed version. CVE-2021-26988Clustered Data ONTAP versions prior to 9.3P21, 9.5P16, 9.6P12, 9.7P8 and 9.8 are susceptible to a vulnerability which could allow unauthorized tenant users to discover information related to converting a 7-Mode directory to Cluster-mode such as Storage Virtual Machine (SVM) names, volume names, directory paths and Job IDs. CVE-2021-26917** DISPUTED ** PyBitmessage through 0.6.3.2 allows attackers to write screen captures to Potentially Unwanted Directories via a crafted apinotifypath value. NOTE: the discoverer states "security mitigation may not be necessary as there is no evidence yet that these screen intercepts are actually transported away from the local host." NOTE: it is unclear whether there are any common use cases in which apinotifypath is controlled by an attacker. CVE-2021-26719A directory traversal issue was discovered in Gradle gradle-enterprise-test-distribution-agent before 1.3.2, test-distribution-gradle-plugin before 1.3.2, and gradle-enterprise-maven-extension before 1.8.2. A malicious actor (with certain credentials) can perform a registration step such that crafted TAR archives lead to extraction of files into arbitrary filesystem locations. CVE-2021-26714The Enterprise License Manager portal in Mitel MiContact Center Enterprise before 9.4 could allow a user to access restricted files and folders due to insufficient access control. A successful exploit could allow an attacker to view and modify application data via Directory Traversal. CVE-2021-26294An issue was discovered in AfterLogic Aurora through 7.7.9 and WebMail Pro through 7.7.9. They allow directory traversal to read files (such as a data/settings/settings.xml file containing admin panel credentials), as demonstrated by dav/server.php/files/personal/%2e%2e when using the caldav_public_user account (with caldav_public_user as its password). CVE-2021-26293An issue was discovered in AfterLogic Aurora through 8.5.3 and WebMail Pro through 8.5.3, when DAV is enabled. They allow directory traversal to create new files (such as an executable file under the web root). This is related to DAVServer.php in 8.x and DAV/Server.php in 7.x. CVE-2021-26075The Jira importers plugin AttachTemporaryFile rest resource in Jira Server and Data Center before version 8.5.12, from version 8.6.0 before 8.13.4, and from version 8.14.0 before 8.15.1 allowed remote authenticated attackers to obtain the full path of the Jira application data directory via an information disclosure vulnerability in the error message when presented with an invalid filename. CVE-2021-26067Affected versions of Atlassian Bamboo allow an unauthenticated remote attacker to view a stack trace that may reveal the path for the home directory in disk and if certain files exists on the tmp directory, via a Sensitive Data Exposure vulnerability in the /chart endpoint. The affected versions are before version 7.2.2. CVE-2021-25864node-red-contrib-huemagic 3.0.0 is affected by hue/assets/..%2F Directory Traversal.in the res.sendFile API, used in file hue-magic.js, to fetch an arbitrary file. CVE-2021-25741A security issue was discovered in Kubernetes where a user may be able to create a container with subpath volume mounts to access files & directories outside of the volume, including on the host filesystem. CVE-2021-25699The OpenSSL component of the Teradici PCoIP Software Client prior to version 21.07.0 was compiled without the no-autoload-config option, which allowed an attacker to elevate to the privileges of the running process via placing a specially crafted dll in a build configuration directory. CVE-2021-25698The OpenSSL component of the Teradici PCoIP Standard Agent prior to version 21.07.0 was compiled without the no-autoload-config option, which allowed an attacker to elevate to the privileges of the running process via placing a specially crafted dll in a build configuration directory. CVE-2021-25652An information disclosure vulnerability was discovered in the directory and file management of Avaya Aura Appliance Virtualization Platform Utilities (AVPU). This vulnerability may potentially allow any local user to access system functionality and configuration information that should only be available to a privileged user. Affects versions 8.0.0.0 through 8.1.3.1 of AVPU. CVE-2021-25649** UNSUPPORTED WHEN ASSIGNED ** An information disclosure vulnerability was discovered in the directory and file management of Avaya Aura Utility Services. This vulnerability may potentially allow any local user to access system functionality and configuration information that should only be available to a privileged user. Affects all 7.x versions of Avaya Aura Utility Services. CVE-2021-25353Using empty PendingIntent in Galaxy Themes prior to version 5.2.00.1215 allows local attackers to read/write private file directories of Galaxy Themes application without permission via hijacking the PendingIntent. CVE-2021-25311condor_credd in HTCondor before 8.9.11 allows Directory Traversal outside the SEC_CREDENTIAL_DIRECTORY_OAUTH directory, as demonstrated by creating a file under /etc that will later be executed by root. CVE-2021-25282An issue was discovered in through SaltStack Salt before 3002.5. The salt.wheel.pillar_roots.write method is vulnerable to directory traversal. CVE-2021-25276In SolarWinds Serv-U before 15.2.2 Hotfix 1, there is a directory containing user profile files (that include users' password hashes) that is world readable and writable. An unprivileged Windows user (having access to the server's filesystem) can add an FTP user by copying a valid profile file to this directory. For example, if this profile sets up a user with a C:\ home directory, then the attacker obtains access to read or replace arbitrary files with LocalSystem privileges. CVE-2021-25216In BIND 9.5.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.11.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch, BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting values for the tkey-gssapi-keytab or tkey-gssapi-credential configuration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. For servers that meet these conditions, the ISC SPNEGO implementation is vulnerable to various attacks, depending on the CPU architecture for which BIND was built: For named binaries compiled for 64-bit platforms, this flaw can be used to trigger a buffer over-read, leading to a server crash. For named binaries compiled for 32-bit platforms, this flaw can be used to trigger a server crash due to a buffer overflow and possibly also to achieve remote code execution. We have determined that standard SPNEGO implementations are available in the MIT and Heimdal Kerberos libraries, which support a broad range of operating systems, rendering the ISC implementation unnecessary and obsolete. Therefore, to reduce the attack surface for BIND users, we will be removing the ISC SPNEGO implementation in the April releases of BIND 9.11 and 9.16 (it had already been dropped from BIND 9.17). We would not normally remove something from a stable ESV (Extended Support Version) of BIND, but since system libraries can replace the ISC SPNEGO implementation, we have made an exception in this case for reasons of stability and security. CVE-2021-25156A remote arbitrary directory create vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba Instant 6.4.x: 6.4.4.8-4.2.4.17 and below; Aruba Instant 6.5.x: 6.5.4.18 and below; Aruba Instant 8.3.x: 8.3.0.14 and below; Aruba Instant 8.5.x: 8.5.0.11 and below; Aruba Instant 8.6.x: 8.6.0.6 and below; Aruba Instant 8.7.x: 8.7.1.0 and below. Aruba has released patches for Aruba Instant that address this security vulnerability. CVE-2021-25140A potential security vulnerability has been identified in the HPE Moonshot Provisioning Manager v1.20. The HPE Moonshot Provisioning Manager is an application that is installed in a VMWare or Microsoft Hyper-V environment that is used to setup and configure an HPE Moonshot 1500 chassis. This vulnerability could be remotely exploited by an unauthenticated user to cause a directory traversal in user supplied input to the `khuploadfile.cgi` CGI ELF. The directory traversal could lead to Remote Code Execution, Denial of Service, and/or compromise system integrity. **Note:** HPE recommends that customers discontinue the use of the HPE Moonshot Provisioning Manager. The HPE Moonshot Provisioning Manager application is discontinued, no longer supported, is not available to download from the HPE Support Center, and no patch is available. CVE-2021-24794The Connections Business Directory WordPress plugin before 10.4.3 does not escape the Address settings when creating an Entry, which could allow high privilege users to perform Cross-Site Scripting when the unfiltered_html capability is disallowed. CVE-2021-24720The GeoDirectory Business Directory WordPress plugin before 2.1.1.3 was vulnerable to Authenticated Stored Cross-Site Scripting (XSS). CVE-2021-24663The Simple Schools Staff Directory WordPress plugin through 1.1 does not validate uploaded logo pictures to ensure that are indeed images, allowing high privilege users such as admin to upload arbitrary file like PHP, leading to RCE CVE-2021-24549The AceIDE WordPress plugin through 2.6.2 does not sanitise or validate the user input which is appended to system paths before using it in various actions, such as to read arbitrary files from the server. This allows high privilege users such as administrator to access any file on the web server outside of the blog directory via a path traversal attack. CVE-2021-24499The Workreap WordPress theme before 2.2.2 AJAX actions workreap_award_temp_file_uploader and workreap_temp_file_uploader did not perform nonce checks, or validate that the request is from a valid user in any other way. The endpoints allowed for uploading arbitrary files to the uploads/workreap-temp directory. Uploaded files were neither sanitized nor validated, allowing an unauthenticated visitor to upload executable code such as php scripts. CVE-2021-24378The Autoptimize WordPress plugin before 2.7.8 does not check for malicious files such as .html in the archive uploaded via the 'Import Settings' feature. As a result, it is possible for a high privilege user to upload a malicious file containing JavaScript code inside an archive which will execute when a victim visits index.html inside the plugin directory. CVE-2021-24376The Autoptimize WordPress plugin before 2.7.8 attempts to delete malicious files (such as .php) form the uploaded archive via the "Import Settings" feature, after its extraction. However, the extracted folders are not checked and it is possible to upload a zip which contained a directory with PHP file in it and then it is not removed from the disk. It is a bypass of CVE-2020-24948 which allows sending a PHP file via the "Import Settings" functionality to achieve Remote Code Execution. CVE-2021-24321The Bello - Directory & Listing WordPress theme before 1.6.0 did not sanitise the bt_bb_listing_field_price_range_to, bt_bb_listing_field_now_open, bt_bb_listing_field_my_lng, listing_list_view and bt_bb_listing_field_my_lat parameters before using them in a SQL statement, leading to SQL Injection issues CVE-2021-24320The Bello - Directory & Listing WordPress theme before 1.6.0 did not properly sanitise and escape its listing_list_view, bt_bb_listing_field_my_lat, bt_bb_listing_field_my_lng, bt_bb_listing_field_distance_value, bt_bb_listing_field_my_lat_default, bt_bb_listing_field_keyword, bt_bb_listing_field_location_autocomplete, bt_bb_listing_field_price_range_from and bt_bb_listing_field_price_range_to parameter in ints listing page, leading to reflected Cross-Site Scripting issues. CVE-2021-24319The Bello - Directory & Listing WordPress theme before 1.6.0 did not properly sanitise its post_excerpt parameter before outputting it back in the shop/my-account/bello-listing-endpoint/ page, leading to a Cross-Site Scripting issue CVE-2021-24284The Kaswara Modern VC Addons WordPress plugin through 3.0.1 allows unauthenticated arbitrary file upload via the 'uploadFontIcon' AJAX action. The supplied zipfile being unzipped in the wp-content/uploads/kaswara/fonts_icon directory with no checks for malicious files such as PHP. CVE-2021-24251The Business Directory Plugin &#8211; Easy Listing Directories for WordPress WordPress plugin before 5.11.2 suffered from a Cross-Site Request Forgery issue, allowing an attacker to make a logged in administrator update arbitrary payment history, such as change their status (from pending to completed to example) CVE-2021-24250The Business Directory Plugin &#8211; Easy Listing Directories for WordPress WordPress plugin before 5.11.2 suffered from lack of sanitisation in the label of the Form Fields, leading to Authenticated Stored Cross-Site Scripting issues across various pages of the plugin. CVE-2021-24249The Business Directory Plugin &#8211; Easy Listing Directories for WordPress WordPress plugin before 5.11.2 suffered from a Cross-Site Request Forgery issue, allowing an attacker to make a logged in administrator export files, which could then be downloaded by the attacker to get access to PII, such as email, home addresses etc CVE-2021-24248The Business Directory Plugin &#8211; Easy Listing Directories for WordPress WordPress plugin before 5.11.1 did not properly check for imported files, forbidding certain extension via a blacklist approach, allowing administrator to import an archive with a .php4 inside for example, leading to RCE CVE-2021-24223The N5 Upload Form WordPress plugin through 1.0 suffers from an arbitrary file upload issue in page where a Form from the plugin is embed, as any file can be uploaded. The uploaded filename might be hard to guess as it's generated with md5(uniqid(rand())), however, in the case of misconfigured servers with Directory listing enabled, accessing it is trivial. CVE-2021-24179The Business Directory Plugin &#8211; Easy Listing Directories for WordPress WordPress plugin before 5.11 suffered from a Cross-Site Request Forgery issue, allowing an attacker to make a logged in administrator import files. As the plugin also did not validate uploaded files, it could lead to RCE. CVE-2021-24178The Business Directory Plugin &#8211; Easy Listing Directories for WordPress WordPress plugin before 5.11.1 suffered from Cross-Site Request Forgery issues, allowing an attacker to make a logged in administrator add, edit or delete form fields, which could also lead to Stored Cross-Site Scripting issues. CVE-2021-24160In the Reponsive Menu (free and Pro) WordPress plugins before 4.0.4, subscribers could upload zip archives containing malicious PHP files that would get extracted to the /rmp-menu/ directory. These files could then be accessed via the front end of the site to trigger remote code execution and ultimately allow an attacker to execute commands to further infect a WordPress site. CVE-2021-24010Improper limitation of a pathname to a restricted directory vulnerabilities in FortiSandbox 3.2.0 through 3.2.2, and 3.1.0 through 3.1.4 may allow an authenticated user to obtain unauthorized access to files and data via specifially crafted web requests. CVE-2021-23977Firefox for Android suffered from a time-of-check-time-of-use vulnerability that allowed a malicious application to read sensitive data from application directories. Note: This issue is only affected Firefox for Android. Other operating systems are unaffected. This vulnerability affects Firefox < 86. CVE-2021-23956An ambiguous file picker design could have confused users who intended to select and upload a single file into uploading a whole directory. This was addressed by adding a new prompt. This vulnerability affects Firefox < 85. CVE-2021-23827Keybase Desktop Client before 5.6.0 on Windows and macOS, and before 5.6.1 on Linux, allows an attacker to obtain potentially sensitive media (such as private pictures) in the Cache and uploadtemps directories. It fails to effectively clear cached pictures, even after deletion via normal methodology within the client, or by utilizing the "Explode message/Explode now" functionality. Local filesystem access is needed by the attacker. CVE-2021-23430All versions of package startserver are vulnerable to Directory Traversal due to missing sanitization. CVE-2021-23428This affects all versions of package elFinder.NetCore. The Path.Combine(...) method is used to create an absolute file path. Due to missing sanitation of the user input and a missing check of the generated path its possible to escape the Files directory via path traversal CVE-2021-23357All versions of package github.com/tyktechnologies/tyk/gateway are vulnerable to Directory Traversal via the handleAddOrUpdateApi function. This function is able to delete arbitrary JSON files on the disk where Tyk is running via the management API. The APIID is provided by the user and this value is then used to create a file on disk. If there is a file found with the same name then it will be deleted and then re-created with the contents of the API creation request. CVE-2021-23331This affects all versions of package com.squareup:connect. The method prepareDownloadFilecreates creates a temporary file with the permissions bits of -rw-r--r-- on unix-like systems. On unix-like systems, the system temporary directory is shared between users. As such, the contents of the file downloaded by downloadFileFromResponse will be visible to all other users on the local system. A workaround fix for this issue is to set the system property java.io.tmpdir to a safe directory as remediation. Note: This version of the SDK is end of life and no longer maintained, please upgrade to the latest version. CVE-2021-23242MERCUSYS Mercury X18G 1.0.5 devices allow Directory Traversal via ../ to the UPnP server, as demonstrated by the /../../conf/template/uhttpd.json URI. CVE-2021-23241MERCUSYS Mercury X18G 1.0.5 devices allow Directory Traversal via ../ in conjunction with a loginLess or login.htm URI (for authentication bypass) to the web server, as demonstrated by the /loginLess/../../etc/passwd URI. CVE-2021-23239The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path. CVE-2021-23043On BIG-IP, on all versions of 16.1.x, 16.0.x, 15.1.x, 14.1.x, 13.1.x, 12.1.x, and 11.6.x, a directory traversal vulnerability exists in an undisclosed page of the BIG-IP Configuration utility that allows an attacker to access arbitrary files. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. CVE-2021-23014On versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.3, and 14.1.x before 14.1.4, BIG-IP Advanced WAF and ASM are missing authorization checks for file uploads to a specific directory within the REST API which might allow Authenticated users with guest privileges to upload files. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. CVE-2021-23008On version 15.1.x before 15.1.3, 14.1.x before 14.1.4, 13.1.x before 13.1.4, 12.1.x before 12.1.6, and all versions of 16.0.x and 11.6.x., BIG-IP APM AD (Active Directory) authentication can be bypassed via a spoofed AS-REP (Kerberos Authentication Service Response) response sent over a hijacked KDC (Kerberos Key Distribution Center) connection or from an AD server compromised by an attacker. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. CVE-2021-22980In Edge Client version 7.2.x before 7.2.1.1, 7.1.9.x before 7.1.9.8, and 7.1.x-7.1.8.x before 7.1.8.5, an untrusted search path vulnerability in the BIG-IP APM Client Troubleshooting Utility (CTU) for Windows could allow an attacker to load a malicious DLL library from its current directory. User interaction is required to exploit this vulnerability in that the victim must run this utility on the Windows system. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated. CVE-2021-22968A bypass of adding remote files in Concrete CMS (previously concrete5) File Manager leads to remote code execution in Concrete CMS (concrete5) versions 8.5.6 and below.The external file upload feature stages files in the public directory even if they have disallowed file extensions. They are stored in a directory with a random name, but it's possible to stall the uploads and brute force the directory name. You have to be an admin with the ability to upload files, but this bug gives you the ability to upload restricted file types and execute them depending on server configuration.To fix this, a check for allowed file extensions was added before downloading files to a tmp directory.Concrete CMS Security Team gave this a CVSS v3.1 score of 5.4 AV:N/AC:H/PR:H/UI:R/S:C/C:N/I:H/A:NThis fix is also in Concrete version 9.0.0 CVE-2021-22926libcurl-using applications can ask for a specific client certificate to be used in a transfer. This is done with the `CURLOPT_SSLCERT` option (`--cert` with the command line tool).When libcurl is built to use the macOS native TLS library Secure Transport, an application can ask for the client certificate by name or with a file name - using the same option. If the name exists as a file, it will be used instead of by name.If the appliction runs with a current working directory that is writable by other users (like `/tmp`), a malicious user can create a file name with the same name as the app wants to use by name, and thereby trick the application to use the file based cert instead of the one referred to by name making libcurl send the wrong client certificate in the TLS connection handshake. CVE-2021-22921Node.js before 16.4.1, 14.17.2, and 12.22.2 is vulnerable to local privilege escalation attacks under certain conditions on Windows platforms. More specifically, improper configuration of permissions in the installation directory allows an attacker to perform two different escalation attacks: PATH and DLL hijacking. CVE-2021-22857The CGE page with download function contains a Directory Traversal vulnerability. Attackers can use this loophole to download system files arbitrarily. CVE-2021-22769A CWE-552: Files or Directories Accessible to External Parties vulnerability exists in Easergy T300 with firmware V2.7.1 and older that could expose files or directory content when access from an attacker is not restricted or incorrectly restricted. CVE-2021-22762A CWE-22: Improper Limitation of a Pathname to a Restricted Directory vulnerability exists inIGSS Definition (Def.exe) V15.0.0.21140 and prior that could result in remote code execution, when a malicious CGF or WSP file is being parsed by IGSS Definition. CVE-2021-22736Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists in homeLYnk (Wiser For KNX) and spaceLYnk V2.60 and prior which could cause a denial of service when an unauthorized file is uploaded. CVE-2021-22720A CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists in C-Bus Toolkit (V1.15.7 and prior) that could allow a remote code execution when restoring a project. CVE-2021-22719A CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists in C-Bus Toolkit (V1.15.7 and prior) that could allow a remote code execution when a file is uploaded. CVE-2021-22718A CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists in C-Bus Toolkit (V1.15.7 and prior) that could allow a remote code execution when restoring project files. CVE-2021-22717A CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists in C-Bus Toolkit (V1.15.7 and prior) that could allow a remote code execution when processing config files. CVE-2021-22704A CWE-22: Improper Limitation of a Pathname to a Restricted Directory vulnerability exists in Harmony/HMI Products Configured by Vijeo Designer (all versions prior to V6.2 SP11 ), Vijeo Designer Basic (all versions prior to V1.2), or EcoStruxure Machine Expert (all versions prior to V2.0) that could cause a Denial of Service or unauthorized access to system information when connecting to the Harmony HMI over FTP. CVE-2021-22674The affected product is vulnerable to a relative path traversal condition, which may allow an attacker access to unauthorized files and directories on the WebAccess/SCADA (WebAccess/SCADA versions prior to 8.4.5, WebAccess/SCADA versions prior to 9.0.1). CVE-2021-22656Advantech iView versions prior to v5.7.03.6112 are vulnerable to directory traversal, which may allow an attacker to read sensitive files. CVE-2021-22651When loading a specially crafted file, Luxion KeyShot versions prior to 10.1, Luxion KeyShot Viewer versions prior to 10.1, Luxion KeyShot Network Rendering versions prior to 10.1, and Luxion KeyVR versions prior to 10.1 are, while processing the extraction of temporary files, suffering from a directory traversal vulnerability, which allows an attacker to store arbitrary scripts into automatic startup folders. CVE-2021-22535Unauthorized information security disclosure vulnerability on Micro Focus Directory and Resource Administrator (DRA) product, affecting all DRA versions prior to 10.1 Patch 1. The vulnerability could lead to unauthorized information disclosure. CVE-2021-22440There is a path traversal vulnerability in some Huawei products. The vulnerability is due to that the software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly validate the pathname. Successful exploit could allow the attacker to access a location that is outside of the restricted directory by a crafted filename. Affected product versions include:HUAWEI Mate 20 9.0.0.195(C01E195R2P1), 9.1.0.139(C00E133R3P1);HUAWEI Mate 20 Pro 9.0.0.187(C432E10R1P16), 9.0.0.188(C185E10R2P1), 9.0.0.245(C10E10R2P1), 9.0.0.266(C432E10R1P16), 9.0.0.267(C636E10R2P1), 9.0.0.268(C635E12R1P16), 9.0.0.278(C185E10R2P1); Hima-L29C 9.0.0.105(C10E9R1P16), 9.0.0.105(C185E9R1P16), 9.0.0.105(C636E9R1P16); Laya-AL00EP 9.1.0.139(C786E133R3P1); OxfordS-AN00A 10.1.0.223(C00E210R5P1); Tony-AL00B 9.1.0.257(C00E222R2P1). CVE-2021-22404There is a Directory traversal vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. CVE-2021-22118In Spring Framework, versions 5.2.x prior to 5.2.15 and versions 5.3.x prior to 5.3.7, a WebFlux application is vulnerable to a privilege escalation: by (re)creating the temporary storage directory, a locally authenticated malicious user can read or modify files that have been uploaded to the WebFlux application, or overwrite arbitrary files with multipart request data. CVE-2021-22117RabbitMQ installers on Windows prior to version 3.8.16 do not harden plugin directory permissions, potentially allowing attackers with sufficient local filesystem permissions to add arbitrary plugins. CVE-2021-22114Addresses partial fix in CVE-2018-1263. Spring-integration-zip, versions prior to 1.0.4, exposes an arbitrary file write vulnerability, that can be achieved using a specially crafted zip archive (affects other archives as well, bzip2, tar, xz, war, cpio, 7z), that holds path traversal filenames. So when the filename gets concatenated to the target extraction directory, the final path ends up outside of the target folder. CVE-2021-22038On Windows, the uninstaller binary copies itself to a fixed temporary location, which is then executed (the originally called uninstaller exits, so it does not block the installation directory). This temporary location is not randomized and does not restrict access to Administrators only so a potential attacker could plant a binary to replace the copied binary right before it gets called, thus gaining Administrator privileges (if the original uninstaller was executed as Administrator). The vulnerability only affects Windows installers. CVE-2021-22015The vCenter Server contains multiple local privilege escalation vulnerabilities due to improper permissions of files and directories. An authenticated local user with non-administrative privilege may exploit these issues to elevate their privileges to root on vCenter Server Appliance. CVE-2021-21999VMware Tools for Windows (11.x.y prior to 11.2.6), VMware Remote Console for Windows (12.x prior to 12.0.1) , VMware App Volumes (2.x prior to 2.18.10 and 4 prior to 2103) contain a local privilege escalation vulnerability. An attacker with normal access to a virtual machine may exploit this issue by placing a malicious file renamed as `openssl.cnf' in an unrestricted directory which would allow code to be executed with elevated privileges. CVE-2021-21740There is an information leak vulnerability in the digital media player (DMS) of ZTE's residential gateway product. The attacker could insert the USB disk with the symbolic link into the residential gateway, and access unauthorized directory information through the symbolic link, causing information leak. CVE-2021-21725A ZTE product has an information leak vulnerability. An attacker with higher authority can go beyond their authority to access files in other directories by performing specific operations, resulting in information leak. This affects: ZXHN H196Q V9.1.0C2. CVE-2021-21706In PHP versions 7.3.x below 7.3.31, 7.4.x below 7.4.24 and 8.0.x below 8.0.11, in Microsoft Windows environment, ZipArchive::extractTo may be tricked into writing a file outside target directory when extracting a ZIP file, thus potentially causing files to be created or overwritten, subject to OS permissions. CVE-2021-21697Jenkins 2.318 and earlier, LTS 2.303.2 and earlier allows any agent to read and write the contents of any build directory stored in Jenkins with very few restrictions. CVE-2021-21696Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not limit agent read/write access to the libs/ directory inside build directories when using the FilePath APIs, allowing attackers in control of agent processes to replace the code of a trusted library with a modified variant. This results in unsandboxed code execution in the Jenkins controller process. CVE-2021-21695FilePath#listFiles lists files outside directories that agents are allowed to access when following symbolic links in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier. CVE-2021-21686File path filters in the agent-to-controller security subsystem of Jenkins 2.318 and earlier, LTS 2.303.2 and earlier do not canonicalize paths, allowing operations to follow symbolic links to outside allowed directories. CVE-2021-21685Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not check agent-to-controller access to create parent directories in FilePath#mkdirs. CVE-2021-21528Dell EMC PowerScale OneFS versions 9.1.0, 9.2.0.x, 9.2.1.x contain an Exposure of Information through Directory Listing vulnerability. This vulnerability is triggered when upgrading from a previous versions. CVE-2021-21501Improper configuration will cause ServiceComb ServiceCenter Directory Traversal problem in ServcieCenter 1.x.x versions and fixed in 2.0.0. CVE-2021-21492SAP NetWeaver Application Server Java(HTTP Service), versions - 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not sufficiently validate logon group in URLs, resulting in a content spoofing vulnerability when directory listing is enabled. CVE-2021-21484LDAP authentication in SAP HANA Database version 2.0 can be bypassed if the attached LDAP directory server is configured to enable unauthenticated bind. CVE-2021-21475Under specific circumstances SAP Master Data Management, versions - 710, 710.750, allows an unauthorized attacker to exploit insufficient validation of path information provided by users, thus characters representing 'traverse to parent directory' are passed through to the file APIs. Due to this Directory Traversal vulnerability the attacker could read content of arbitrary files on the remote server and expose sensitive data. CVE-2021-21472SAP Software Provisioning Manager 1.0 (SAP NetWeaver Master Data Management Server 7.1) does not have an option to set password during its installation, this allows an authenticated attacker to perform various security attacks like Directory Traversal, Password Brute force Attack, SMB Relay attack, Security Downgrade. CVE-2021-21364swagger-codegen is an open-source project which contains a template-driven engine to generate documentation, API clients and server stubs in different languages by parsing your OpenAPI / Swagger definition. In swagger-codegen before version 2.4.19, on Unix-Like systems, the system temporary directory is shared between all local users. When files/directories are created, the default `umask` settings for the process are respected. As a result, by default, most processes/apis will create files/directories with the permissions `-rw-r--r--` and `drwxr-xr-x` respectively, unless an API that explicitly sets safe file permissions is used. Because this vulnerability impacts generated code, the generated code will remain vulnerable until fixed manually! This vulnerability is fixed in version 2.4.19. Note this is a distinct vulnerability from CVE-2021-21363. CVE-2021-21363swagger-codegen is an open-source project which contains a template-driven engine to generate documentation, API clients and server stubs in different languages by parsing your OpenAPI / Swagger definition. In swagger-codegen before version 2.4.19, on Unix like systems, the system's temporary directory is shared between all users on that system. A collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory. This vulnerability is local privilege escalation because the contents of the `outputFolder` can be appended to by an attacker. As such, code written to this directory, when executed can be attacker controlled. For more details refer to the referenced GitHub Security Advisory. This vulnerability is fixed in version 2.4.19. Note this is a distinct vulnerability from CVE-2021-21364. CVE-2021-21357TYPO3 is an open source PHP based web content management system. In TYPO3 before versions 8.7.40, 9.5.25, 10.4.14, 11.1.1 due to improper input validation, attackers can by-pass restrictions of predefined options and submit arbitrary data in the Form Designer backend module of the Form Framework. In the default configuration of the Form Framework this allows attackers to explicitly allow arbitrary mime-types for file uploads - however, default _fileDenyPattern_ successfully blocked files like _.htaccess_ or _malicious.php_. Besides that, attackers can persist those files in any writable directory of the corresponding TYPO3 installation. A valid backend user account with access to the form module is needed to exploit this vulnerability. This is fixed in versions 8.7.40, 9.5.25, 10.4.14, 11.1.1. CVE-2021-21331The Java client for the Datadog API before version 1.0.0-beta.9 has a local information disclosure of sensitive information downloaded via the API using the API Client. The Datadog API is executed on a unix-like system with multiple users. The API is used to download a file containing sensitive information. This sensitive information is exposed locally to other users. This vulnerability exists in the API Client for version 1 and 2. The method `prepareDownloadFilecreates` creates a temporary file with the permissions bits of `-rw-r--r--` on unix-like systems. On unix-like systems, the system temporary directory is shared between users. As such, the contents of the file downloaded via the `downloadFileFromResponse` method will be visible to all other users on the local system. Analysis of the finding determined that the affected code was unused, meaning that the exploitation likelihood is low. The unused code has been removed, effectively mitigating this issue. This issue has been patched in version 1.0.0-beta.9. As a workaround one may specify `java.io.tmpdir` when starting the JVM with the flag `-Djava.io.tmpdir`, specifying a path to a directory with `drw-------` permissions owned by `dd-agent`. CVE-2021-21290Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In Netty before version 4.1.59.Final there is a vulnerability on Unix-like systems involving an insecure temp file. When netty's multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled. On unix-like systems, the temporary directory is shared between all user. As such, writing to this directory using APIs that do not explicitly set the file/directory permissions can lead to information disclosure. Of note, this does not impact modern MacOS Operating Systems. The method "File.createTempFile" on unix-like systems creates a random file, but, by default will create this file with the permissions "-rw-r--r--". Thus, if sensitive information is written to this file, other local users can read this information. This is the case in netty's "AbstractDiskHttpData" is vulnerable. This has been fixed in version 4.1.59.Final. As a workaround, one may specify your own "java.io.tmpdir" when you start the JVM or use "DefaultHttpDataFactory.setBaseDir(...)" to set the directory to something that is only readable by the current user. CVE-2021-21272ORAS is open source software which enables a way to push OCI Artifacts to OCI Conformant registries. ORAS is both a CLI for initial testing and a Go Module. In ORAS from version 0.4.0 and before version 0.9.0, there is a "zip-slip" vulnerability. The directory support feature allows the downloaded gzipped tarballs to be automatically extracted to the user-specified directory where the tarball can have symbolic links and hard links. A well-crafted tarball or tarballs allow malicious artifact providers linking, writing, or overwriting specific files on the host filesystem outside of the user-specified directory unexpectedly with the same permissions as the user who runs `oras pull`. Users of the affected versions are impacted if they are `oras` CLI users who runs `oras pull`, or if they are Go programs, which invoke `github.com/deislabs/oras/pkg/content.FileStore`. The problem has been fixed in version 0.9.0. For `oras` CLI users, there is no workarounds other than pulling from a trusted artifact provider. For `oras` package users, the workaround is to not use `github.com/deislabs/oras/pkg/content.FileStore`, and use other content stores instead, or pull from a trusted artifact provider. CVE-2021-21237Git LFS is a command line extension for managing large files with Git. On Windows, if Git LFS operates on a malicious repository with a git.bat or git.exe file in the current directory, that program would be executed, permitting the attacker to execute arbitrary code. This does not affect Unix systems. This is the result of an incomplete fix for CVE-2020-27955. This issue occurs because on Windows, Go includes (and prefers) the current directory when the name of a command run does not contain a directory separator. Other than avoiding untrusted repositories or using a different operating system, there is no workaround. This is fixed in v2.13.2. CVE-2021-21234spring-boot-actuator-logview in a library that adds a simple logfile viewer as spring boot actuator endpoint. It is maven package "eu.hinsch:spring-boot-actuator-logview". In spring-boot-actuator-logview before version 0.2.13 there is a directory traversal vulnerability. The nature of this library is to expose a log file directory via admin (spring boot actuator) HTTP endpoints. Both the filename to view and a base folder (relative to the logging folder root) can be specified via request parameters. While the filename parameter was checked to prevent directory traversal exploits (so that `filename=../somefile` would not work), the base folder parameter was not sufficiently checked, so that `filename=somefile&base=../` could access a file outside the logging base directory). The vulnerability has been patched in release 0.2.13. Any users of 0.2.12 should be able to update without any issues as there are no other changes in that release. There is no workaround to fix the vulnerability other than updating or removing the dependency. However, removing read access of the user the application is run with to any directory not required for running the application can limit the impact. Additionally, access to the logview endpoint can be limited by deploying the application behind a reverse proxy. CVE-2021-20993In multiple managed switches by WAGO in different versions the activated directory listing provides an attacker with the index of the resources located inside the directory. CVE-2021-20796Directory traversal vulnerability in the management screen of Cybozu Remote Service 3.1.8 allows a remote authenticated attacker to upload an arbitrary file via unspecified vectors. CVE-2021-20793Untrusted search path vulnerability in the installer of Sony Audio USB Driver V1.10 and prior and the installer of HAP Music Transfer Ver.1.3.0 and prior allows an attacker to gain privileges and execute arbitrary code via a Trojan horse DLL in an unspecified directory. CVE-2021-20726Untrusted search path vulnerability in The Installer of Overwolf 2.168.0.n and earlier allows an attacker to gain privileges and execute arbitrary code with the privilege of the user invoking the installer via a Trojan horse DLL in an unspecified directory. CVE-2021-20722Untrusted search path vulnerability in the installers of ScanSnap Manager prior to versions V7.0L20 and the Software Download Installer prior to WinSSInst2JP.exe and WinSSInst2iX1500JP.exe allows an attacker to gain privileges and execute arbitrary code with the privilege of the user invoking the installer via a Trojan horse DLL in an unspecified directory. CVE-2021-20714Directory traversal vulnerability in WP Fastest Cache versions prior to 0.9.1.7 allows a remote attacker with administrator privileges to delete arbitrary files on the server via unspecified vectors. CVE-2021-20692Directory traversal vulnerability in Archive collectively operation utility Ver.2.10.1.0 and earlier allows an attacker to create or overwrite files by leading a user to expand a malicious ZIP archives. CVE-2021-20674Untrusted search path vulnerability in Installer of MagicConnect Client program distributed before 2021 March 1 allows an attacker to gain privileges and via a Trojan horse DLL in an unspecified directory and to execute arbitrary code with the privilege of the user invoking the installer when a terminal is connected remotely using Remote desktop. CVE-2021-20661Directory traversal vulnerability in SolarView Compact SV-CPT-MC310 prior to Ver.6.5 allows authenticated attackers to delete arbitrary files and/or directories on the server via unspecified vectors. CVE-2021-20656Exposure of information through directory listing in SolarView Compact SV-CPT-MC310 prior to Ver.6.5 allows an authenticated attacker to obtain the information inside the system, such as directories and/or file configurations via unspecified vectors. CVE-2021-20652Cross-site request forgery (CSRF) vulnerability in Name Directory 1.17.4 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors. CVE-2021-20651Directory traversal vulnerability in ELECOM File Manager all versions allows remote attackers to create an arbitrary file or overwrite an existing file in a directory which can be accessed with the application privileges via unspecified vectors. CVE-2021-20616Untrusted search path vulnerability in the installer of SKYSEA Client View Ver.1.020.05b to Ver.16.001.01g allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. CVE-2021-20532IBM Spectrum Protect Client 8.1.0.0 through 8.1.11.0 could allow a local user to escalate their privileges to take full control of the system due to insecure directory permissions. IBM X-Force ID: 198811. CVE-2021-20517IBM WebSphere Application Server Network Deployment 8.5 and 9.0 could allow a remote authenticated attacker to traverse directories. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to read and delete arbitrary files on the system. IBM X-Force ID: 198435. CVE-2021-20511IBM Security Verify Access Docker 10.0.0 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 198300. CVE-2021-20354IBM WebSphere Application Server 8.0, 8.5, and 9.0 could allow a remote attacker to traverse directories. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 194883. CVE-2021-20202A flaw was found in keycloak. Directories can be created prior to the Java process creating them in the temporary directory, but with wider user permissions, allowing the attacker to have access to the contents that keycloak stores in this directory. The highest threat from this vulnerability is to data confidentiality and integrity. CVE-2021-20125An arbitrary file upload and directory traversal vulnerability exists in the file upload functionality of DownloadFileServlet in Draytek VigorConnect 1.6.0-B3. An unauthenticated attacker could leverage this vulnerability to upload files to any location on the target operating system with root privileges. CVE-2021-20114When installed following the default/recommended settings, TCExam <= 14.8.1 allowed unauthenticated users to access the /cache/backup/ directory, which included sensitive database backup files. CVE-2021-20078Manage Engine OpManager builds below 125346 are vulnerable to a remote denial of service vulnerability due to a path traversal issue in spark gateway component. This allows a remote attacker to remotely delete any directory or directories on the OS. CVE-2021-20072Racom's MIDGE Firmware 4.4.40.105 contains an issue that allows attackers to arbitrarily access and delete files via an authenticated directory traveral. CVE-2021-1815A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. A local user may be able to modify protected parts of the file system. CVE-2021-1740A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in Security Update 2021-002 Catalina, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5, macOS Big Sur 11.3. A local user may be able to modify protected parts of the file system. CVE-2021-1739A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in Security Update 2021-002 Catalina, Security Update 2021-003 Mojave, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5, macOS Big Sur 11.3. A local user may be able to modify protected parts of the file system. CVE-2021-1677Azure Active Directory Pod Identity Spoofing Vulnerability CVE-2021-1593A vulnerability in Cisco Packet Tracer for Windows could allow an authenticated, local attacker to perform a DLL injection attack on an affected device. To exploit this vulnerability, the attacker must have valid credentials on the Windows system. This vulnerability is due to incorrect handling of directory paths at run time. An attacker could exploit this vulnerability by inserting a configuration file in a specific path on the system, which can cause a malicious DLL file to be loaded when the application starts. A successful exploit could allow an attacker with normal user privileges to execute arbitrary code on the affected system with the privileges of another user&rsquo;s account. CVE-2021-1536A vulnerability in Cisco Webex Meetings Desktop App for Windows, Cisco Webex Meetings Server, Cisco Webex Network Recording Player for Windows, and Cisco Webex Teams for Windows could allow an authenticated, local attacker to perform a DLL injection attack on an affected device. To exploit this vulnerability, the attacker must have valid credentials on the Windows system. This vulnerability is due to incorrect handling of directory paths at run time. An attacker could exploit this vulnerability by inserting a configuration file in a specific path in the system, which can cause a malicious DLL file to be loaded when the application starts. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of another user account. CVE-2021-1492The Duo Authentication Proxy installer prior to 5.2.1 did not properly validate file installation paths. This allows an attacker with local user privileges to coerce the installer to write to arbitrary privileged directories. If successful, an attacker can manipulate files used by Duo Authentication Proxy installer, cause Denial of Service (DoS) by deleting file(s), or replace system files to potentially achieve elevation of privileges. This is only exploitable during new installations, while the installer is running, and is not exploitable once installation has finished. Versions 5.2.1 of Duo Authentication Proxy installer addresses this issue. CVE-2021-1386A vulnerability in the dynamic link library (DLL) loading mechanism in Cisco Advanced Malware Protection (AMP) for Endpoints Windows Connector, ClamAV for Windows, and Immunet could allow an authenticated, local attacker to perform a DLL hijacking attack on an affected Windows system. To exploit this vulnerability, the attacker would need valid credentials on the system. The vulnerability is due to insufficient validation of directory search paths at run time. An attacker could exploit this vulnerability by placing a malicious DLL file on an affected system. A successful exploit could allow the attacker to execute arbitrary code with SYSTEM privileges. CVE-2021-1385A vulnerability in the Cisco IOx application hosting environment of multiple Cisco platforms could allow an authenticated, remote attacker to conduct directory traversal attacks and read and write files on the underlying operating system or host system. This vulnerability occurs because the device does not properly validate URIs in IOx API requests. An attacker could exploit this vulnerability by sending a crafted API request that contains directory traversal character sequences to an affected device. A successful exploit could allow the attacker to read or write arbitrary files on the underlying operating system. CVE-2021-1306A vulnerability in the restricted shell of Cisco Evolved Programmable Network (EPN) Manager, Cisco Identity Services Engine (ISE), and Cisco Prime Infrastructure could allow an authenticated, local attacker to identify directories and write arbitrary files to the file system. This vulnerability is due to improper validation of parameters that are sent to a CLI command within the restricted shell. An attacker could exploit this vulnerability by logging in to the device and issuing certain CLI commands. A successful exploit could allow the attacker to identify file directories on the affected device and write arbitrary files to the file system on the affected device. To exploit this vulnerability, the attacker must be an authenticated shell user. CVE-2021-1297Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV160, RV160W, RV260, RV260P, and RV260W VPN Routers could allow an unauthenticated, remote attacker to conduct directory traversal attacks and overwrite certain files that should be restricted on an affected system. These vulnerabilities are due to insufficient input validation. An attacker could exploit these vulnerabilities by using the web-based management interface to upload a file to location on an affected device that they should not have access to. A successful exploit could allow the attacker to overwrite files on the file system of the affected device. CVE-2021-1296Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV160, RV160W, RV260, RV260P, and RV260W VPN Routers could allow an unauthenticated, remote attacker to conduct directory traversal attacks and overwrite certain files that should be restricted on an affected system. These vulnerabilities are due to insufficient input validation. An attacker could exploit these vulnerabilities by using the web-based management interface to upload a file to location on an affected device that they should not have access to. A successful exploit could allow the attacker to overwrite files on the file system of the affected device. CVE-2021-1280A vulnerability in the loading mechanism of specific DLLs of Cisco Advanced Malware Protection (AMP) for Endpoints for Windows and Immunet for Windows could allow an authenticated, local attacker to perform a DLL hijacking attack. To exploit this vulnerability, the attacker would need valid credentials on the Windows system. This vulnerability is due to incorrect handling of directory search paths at run time. An attacker could exploit this vulnerability by placing a malicious DLL file on the targeted system. This file will execute when the vulnerable application launches. A successful exploit could allow the attacker to execute arbitrary code on the targeted system with SYSTEM privileges. CVE-2021-1259A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct path traversal attacks and obtain write access to sensitive files on an affected system. The vulnerability is due to insufficient validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request that contains directory traversal character sequences to an affected system. A successful exploit could allow the attacker to write arbitrary files on the affected system. CVE-2021-1256
Источник: [https://torrent-igruha.org/3551-portal.html]
NCH Debut Video Capture 5.32 Crack

Debut Video Capture Crack + Registration Code Free Download NCH Debut Video Capture Crack is a great and very powerful software that enables you to get videos from any linked device on your pc in an effective way. This software permits you to track record what your webcam is seeing. Shoot video documents on your Macintosh… Read More »

Category: MACMultimediaWindowsTags: Debut Video Capture 6.38 Crack, Debut Video Capture 6.47 Crack, Debut Video Capture 6.49 Crack, Debut Video Capture 6.60 Crack, Download Debut Video Capture 6.49 Crack, NCH Debut Video Capture 5.32 Crack, NCH Debut Video Capture 5.32 registration code, NCH Debut Video Capture 5.32 serial key, NCH Debut Video Capture 5.32 torrent, NCH Debut Video Capture 5.65 crack, NCH Debut Video Capture 5.65 keygen, NCH Debut Video Capture 5.65 license key, NCH Debut Video Capture 5.65 patch, NCH Debut Video Capture Crack, NCH Debut Video Capture free download, NCH Debut Video Capture full version, NCH Debut Video Capture mac, NCH Debut Video Capture registration code, NCH Debut Video Capture registration key, NCH Debut Video Capture serial key, NCH Debut Video Capture torrent, NCH Debut Video Capture windows

Iconic One Theme Powered by Wordpress

Источник: [https://torrent-igruha.org/3551-portal.html]
NCH Debut Video Capture 5.65 patch Archives

1 comments

Leave a Reply

Your email address will not be published. Required fields are marked *