Stránka 2 z 2

Re: pomalé nabíhání windows při startu

Napsal: 01 kvě 2010 12:11
od brankar
tady jsem skusil ještě ROOT REPEAL je tam toho dost červenyho


ROOTREPEAL (c) AD, 2007-2009
==================================================
Scan Time: 2010/05/01 13:08
Program Version: Version 1.3.0.0
Windows Version: Windows XP SP3
==================================================

SSDT
-------------------
#: 000 Function Name: NtAcceptConnectPort
Status: Not hooked

#: 001 Function Name: NtAccessCheck
Status: Not hooked

#: 002 Function Name: NtAccessCheckAndAuditAlarm
Status: Not hooked

#: 003 Function Name: NtAccessCheckByType
Status: Not hooked

#: 004 Function Name: NtAccessCheckByTypeAndAuditAlarm
Status: Not hooked

#: 005 Function Name: NtAccessCheckByTypeResultList
Status: Not hooked

#: 006 Function Name: NtAccessCheckByTypeResultListAndAuditAlarm
Status: Not hooked

#: 007 Function Name: NtAccessCheckByTypeResultListAndAuditAlarmByHandle
Status: Not hooked

#: 008 Function Name: NtAddAtom
Status: Not hooked

#: 009 Function Name: NtAddBootEntry
Status: Not hooked

#: 010 Function Name: NtAdjustGroupsToken
Status: Not hooked

#: 011 Function Name: NtAdjustPrivilegesToken
Status: Hooked by "C:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xba689bda

#: 012 Function Name: NtAlertResumeThread
Status: Not hooked

#: 013 Function Name: NtAlertThread
Status: Not hooked

#: 014 Function Name: NtAllocateLocallyUniqueId
Status: Not hooked

#: 015 Function Name: NtAllocateUserPhysicalPages
Status: Not hooked

#: 016 Function Name: NtAllocateUuids
Status: Not hooked

#: 017 Function Name: NtAllocateVirtualMemory
Status: Not hooked

#: 018 Function Name: NtAreMappedFilesTheSame
Status: Not hooked

#: 019 Function Name: NtAssignProcessToJobObject
Status: Not hooked

#: 020 Function Name: NtCallbackReturn
Status: Not hooked

#: 021 Function Name: NtCancelDeviceWakeupRequest
Status: Not hooked

#: 022 Function Name: NtCancelIoFile
Status: Not hooked

#: 023 Function Name: NtCancelTimer
Status: Not hooked

#: 024 Function Name: NtClearEvent
Status: Not hooked

#: 025 Function Name: NtClose
Status: Not hooked

#: 026 Function Name: NtCloseObjectAuditAlarm
Status: Not hooked

#: 027 Function Name: NtCompactKeys
Status: Not hooked

#: 028 Function Name: NtCompareTokens
Status: Not hooked

#: 029 Function Name: NtCompleteConnectPort
Status: Not hooked

#: 030 Function Name: NtCompressKey
Status: Not hooked

#: 031 Function Name: NtConnectPort
Status: Hooked by "C:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xba6891b8

#: 032 Function Name: NtContinue
Status: Not hooked

#: 033 Function Name: NtCreateDebugObject
Status: Not hooked

#: 034 Function Name: NtCreateDirectoryObject
Status: Not hooked

#: 035 Function Name: NtCreateEvent
Status: Not hooked

#: 036 Function Name: NtCreateEventPair
Status: Not hooked

#: 037 Function Name: NtCreateFile
Status: Hooked by "C:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xba689840

#: 038 Function Name: NtCreateIoCompletion
Status: Not hooked

#: 039 Function Name: NtCreateJobObject
Status: Not hooked

#: 040 Function Name: NtCreateJobSet
Status: Not hooked

#: 041 Function Name: NtCreateKey
Status: Hooked by "C:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xba68a35a

#: 042 Function Name: NtCreateMailslotFile
Status: Not hooked

#: 043 Function Name: NtCreateMutant
Status: Not hooked

#: 044 Function Name: NtCreateNamedPipeFile
Status: Not hooked

#: 045 Function Name: NtCreatePagingFile
Status: Not hooked

#: 046 Function Name: NtCreatePort
Status: Hooked by "C:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xba68909a

#: 047 Function Name: NtCreateProcess
Status: Not hooked

#: 048 Function Name: NtCreateProcessEx
Status: Not hooked

#: 049 Function Name: NtCreateProfile
Status: Not hooked

#: 050 Function Name: NtCreateSection
Status: Hooked by "C:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xba68b06a

#: 051 Function Name: NtCreateSemaphore
Status: Not hooked

#: 052 Function Name: NtCreateSymbolicLinkObject
Status: Hooked by "C:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xba68b302

#: 053 Function Name: NtCreateThread
Status: Hooked by "C:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xba688c60

#: 054 Function Name: NtCreateTimer
Status: Not hooked

#: 055 Function Name: NtCreateToken
Status: Not hooked

#: 056 Function Name: NtCreateWaitablePort
Status: Not hooked

#: 057 Function Name: NtDebugActiveProcess
Status: Not hooked

#: 058 Function Name: NtDebugContinue
Status: Not hooked

#: 059 Function Name: NtDelayExecution
Status: Not hooked

#: 060 Function Name: NtDeleteAtom
Status: Not hooked

#: 061 Function Name: NtDeleteBootEntry
Status: Not hooked

#: 062 Function Name: NtDeleteFile
Status: Not hooked

#: 063 Function Name: NtDeleteKey
Status: Hooked by "C:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xba689fc4

#: 064 Function Name: NtDeleteObjectAuditAlarm
Status: Not hooked

#: 065 Function Name: NtDeleteValueKey
Status: Hooked by "C:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xba68a174

#: 066 Function Name: NtDeviceIoControlFile
Status: Not hooked

#: 067 Function Name: NtDisplayString
Status: Not hooked

#: 068 Function Name: NtDuplicateObject
Status: Hooked by "C:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xba688a92

#: 069 Function Name: NtDuplicateToken
Status: Not hooked

#: 070 Function Name: NtEnumerateBootEntries
Status: Not hooked

#: 071 Function Name: NtEnumerateKey
Status: Not hooked

#: 072 Function Name: NtEnumerateSystemEnvironmentValuesEx
Status: Not hooked

#: 073 Function Name: NtEnumerateValueKey
Status: Not hooked

#: 074 Function Name: NtExtendSection
Status: Not hooked

#: 075 Function Name: NtFilterToken
Status: Not hooked

#: 076 Function Name: NtFindAtom
Status: Not hooked

#: 077 Function Name: NtFlushBuffersFile
Status: Not hooked

#: 078 Function Name: NtFlushInstructionCache
Status: Not hooked

#: 079 Function Name: NtFlushKey
Status: Not hooked

#: 080 Function Name: NtFlushVirtualMemory
Status: Not hooked

#: 081 Function Name: NtFlushWriteBuffer
Status: Not hooked

#: 082 Function Name: NtFreeUserPhysicalPages
Status: Not hooked

#: 083 Function Name: NtFreeVirtualMemory
Status: Not hooked

#: 084 Function Name: NtFsControlFile
Status: Not hooked

#: 085 Function Name: NtGetContextThread
Status: Not hooked

#: 086 Function Name: NtGetDevicePowerState
Status: Not hooked

#: 087 Function Name: NtGetPlugPlayEvent
Status: Not hooked

#: 088 Function Name: NtGetWriteWatch
Status: Not hooked

#: 089 Function Name: NtImpersonateAnonymousToken
Status: Not hooked

#: 090 Function Name: NtImpersonateClientOfPort
Status: Not hooked

#: 091 Function Name: NtImpersonateThread
Status: Not hooked

#: 092 Function Name: NtInitializeRegistry
Status: Not hooked

#: 093 Function Name: NtInitiatePowerAction
Status: Not hooked

#: 094 Function Name: NtIsProcessInJob
Status: Not hooked

#: 095 Function Name: NtIsSystemResumeAutomatic
Status: Not hooked

#: 096 Function Name: NtListenPort
Status: Not hooked

#: 097 Function Name: NtLoadDriver
Status: Hooked by "C:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xba68acec

#: 098 Function Name: NtLoadKey
Status: Not hooked

#: 099 Function Name: NtLoadKey2
Status: Not hooked

#: 100 Function Name: NtLockFile
Status: Not hooked

#: 101 Function Name: NtLockProductActivationKeys
Status: Not hooked

#: 102 Function Name: NtLockRegistryKey
Status: Not hooked

#: 103 Function Name: NtLockVirtualMemory
Status: Not hooked

#: 104 Function Name: NtMakePermanentObject
Status: Not hooked

#: 105 Function Name: NtMakeTemporaryObject
Status: Hooked by "C:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xba68943c

#: 106 Function Name: NtMapUserPhysicalPages
Status: Not hooked

#: 107 Function Name: NtMapUserPhysicalPagesScatter
Status: Not hooked

#: 108 Function Name: NtMapViewOfSection
Status: Not hooked

#: 109 Function Name: NtModifyBootEntry
Status: Not hooked

#: 110 Function Name: NtNotifyChangeDirectoryFile
Status: Not hooked

#: 111 Function Name: NtNotifyChangeKey
Status: Not hooked

#: 112 Function Name: NtNotifyChangeMultipleKeys
Status: Not hooked

#: 113 Function Name: NtOpenDirectoryObject
Status: Not hooked

#: 114 Function Name: NtOpenEvent
Status: Not hooked

#: 115 Function Name: NtOpenEventPair
Status: Not hooked

#: 116 Function Name: NtOpenFile
Status: Hooked by "C:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xba689a1c

#: 117 Function Name: NtOpenIoCompletion
Status: Not hooked

#: 118 Function Name: NtOpenJobObject
Status: Not hooked

#: 119 Function Name: NtOpenKey
Status: Not hooked

#: 120 Function Name: NtOpenMutant
Status: Not hooked

#: 121 Function Name: NtOpenObjectAuditAlarm
Status: Not hooked

#: 122 Function Name: NtOpenProcess
Status: Hooked by "C:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xba6887c2

#: 123 Function Name: NtOpenProcessToken
Status: Not hooked

#: 124 Function Name: NtOpenProcessTokenEx
Status: Not hooked

#: 125 Function Name: NtOpenSection
Status: Hooked by "C:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xba6896cc

#: 126 Function Name: NtOpenSemaphore
Status: Not hooked

#: 127 Function Name: NtOpenSymbolicLinkObject
Status: Not hooked

#: 128 Function Name: NtOpenThread
Status: Hooked by "C:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xba68893a

#: 129 Function Name: NtOpenThreadToken
Status: Not hooked

#: 130 Function Name: NtOpenThreadTokenEx
Status: Not hooked

#: 131 Function Name: NtOpenTimer
Status: Not hooked

#: 132 Function Name: NtPlugPlayControl
Status: Not hooked

#: 133 Function Name: NtPowerInformation
Status: Not hooked

#: 134 Function Name: NtPrivilegeCheck
Status: Not hooked

#: 135 Function Name: NtPrivilegeObjectAuditAlarm
Status: Not hooked

#: 136 Function Name: NtPrivilegedServiceAuditAlarm
Status: Not hooked

#: 137 Function Name: NtProtectVirtualMemory
Status: Not hooked

#: 138 Function Name: NtPulseEvent
Status: Not hooked

#: 139 Function Name: NtQueryAttributesFile
Status: Not hooked

#: 140 Function Name: NtQueryBootEntryOrder
Status: Not hooked

#: 141 Function Name: NtQueryBootOptions
Status: Not hooked

#: 142 Function Name: NtQueryDebugFilterState
Status: Not hooked

#: 143 Function Name: NtQueryDefaultLocale
Status: Not hooked

#: 144 Function Name: NtQueryDefaultUILanguage
Status: Not hooked

#: 145 Function Name: NtQueryDirectoryFile
Status: Not hooked

#: 146 Function Name: NtQueryDirectoryObject
Status: Not hooked

#: 147 Function Name: NtQueryEaFile
Status: Not hooked

#: 148 Function Name: NtQueryEvent
Status: Not hooked

#: 149 Function Name: NtQueryFullAttributesFile
Status: Not hooked

#: 150 Function Name: NtQueryInformationAtom
Status: Not hooked

#: 151 Function Name: NtQueryInformationFile
Status: Not hooked

#: 152 Function Name: NtQueryInformationJobObject
Status: Not hooked

#: 153 Function Name: NtQueryInformationPort
Status: Not hooked

#: 154 Function Name: NtQueryInformationProcess
Status: Not hooked

#: 155 Function Name: NtQueryInformationThread
Status: Not hooked

#: 156 Function Name: NtQueryInformationToken
Status: Not hooked

#: 157 Function Name: NtQueryInstallUILanguage
Status: Not hooked

#: 158 Function Name: NtQueryIntervalProfile
Status: Not hooked

#: 159 Function Name: NtQueryIoCompletion
Status: Not hooked

#: 160 Function Name: NtQueryKey
Status: Not hooked

#: 161 Function Name: NtQueryMultipleValueKey
Status: Not hooked

#: 162 Function Name: NtQueryMutant
Status: Not hooked

#: 163 Function Name: NtQueryObject
Status: Not hooked

#: 164 Function Name: NtQueryOpenSubKeys
Status: Not hooked

#: 165 Function Name: NtQueryPerformanceCounter
Status: Not hooked

#: 166 Function Name: NtQueryQuotaInformationFile
Status: Not hooked

#: 167 Function Name: NtQuerySection
Status: Not hooked

#: 168 Function Name: NtQuerySecurityObject
Status: Not hooked

#: 169 Function Name: NtQuerySemaphore
Status: Not hooked

#: 170 Function Name: NtQuerySymbolicLinkObject
Status: Not hooked

#: 171 Function Name: NtQuerySystemEnvironmentValue
Status: Not hooked

#: 172 Function Name: NtQuerySystemEnvironmentValueEx
Status: Not hooked

#: 173 Function Name: NtQuerySystemInformation
Status: Not hooked

#: 174 Function Name: NtQuerySystemTime
Status: Not hooked

#: 175 Function Name: NtQueryTimer
Status: Not hooked

#: 176 Function Name: NtQueryTimerResolution
Status: Not hooked

#: 177 Function Name: NtQueryValueKey
Status: Not hooked

#: 178 Function Name: NtQueryVirtualMemory
Status: Not hooked

#: 179 Function Name: NtQueryVolumeInformationFile
Status: Not hooked

#: 180 Function Name: NtQueueApcThread
Status: Not hooked

#: 181 Function Name: NtRaiseException
Status: Not hooked

#: 182 Function Name: NtRaiseHardError
Status: Not hooked

#: 183 Function Name: NtReadFile
Status: Not hooked

#: 184 Function Name: NtReadFileScatter
Status: Not hooked

#: 185 Function Name: NtReadRequestData
Status: Not hooked

#: 186 Function Name: NtReadVirtualMemory
Status: Not hooked

#: 187 Function Name: NtRegisterThreadTerminatePort
Status: Not hooked

#: 188 Function Name: NtReleaseMutant
Status: Not hooked

#: 189 Function Name: NtReleaseSemaphore
Status: Not hooked

#: 190 Function Name: NtRemoveIoCompletion
Status: Not hooked

#: 191 Function Name: NtRemoveProcessDebug
Status: Not hooked

#: 192 Function Name: NtRenameKey
Status: Hooked by "C:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xba68a720

#: 193 Function Name: NtReplaceKey
Status: Not hooked

#: 194 Function Name: NtReplyPort
Status: Not hooked

#: 195 Function Name: NtReplyWaitReceivePort
Status: Not hooked

#: 196 Function Name: NtReplyWaitReceivePortEx
Status: Not hooked

#: 197 Function Name: NtReplyWaitReplyPort
Status: Not hooked

#: 198 Function Name: NtRequestDeviceWakeup
Status: Not hooked

#: 199 Function Name: NtRequestPort
Status: Not hooked

#: 200 Function Name: NtRequestWaitReplyPort
Status: Hooked by "C:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xba68b648

#: 201 Function Name: NtRequestWakeupLatency
Status: Not hooked

#: 202 Function Name: NtResetEvent
Status: Not hooked

#: 203 Function Name: NtResetWriteWatch
Status: Not hooked

#: 204 Function Name: NtRestoreKey
Status: Not hooked

#: 205 Function Name: NtResumeProcess
Status: Not hooked

#: 206 Function Name: NtResumeThread
Status: Not hooked

#: 207 Function Name: NtSaveKey
Status: Not hooked

#: 208 Function Name: NtSaveKeyEx
Status: Not hooked

#: 209 Function Name: NtSaveMergedKeys
Status: Not hooked

#: 210 Function Name: NtSecureConnectPort
Status: Hooked by "C:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xba68aa88

#: 211 Function Name: NtSetBootEntryOrder
Status: Not hooked

#: 212 Function Name: NtSetBootOptions
Status: Not hooked

#: 213 Function Name: NtSetContextThread
Status: Not hooked

#: 214 Function Name: NtSetDebugFilterState
Status: Not hooked

#: 215 Function Name: NtSetDefaultHardErrorPort
Status: Not hooked

#: 216 Function Name: NtSetDefaultLocale
Status: Not hooked

#: 217 Function Name: NtSetDefaultUILanguage
Status: Not hooked

#: 218 Function Name: NtSetEaFile
Status: Not hooked

#: 219 Function Name: NtSetEvent
Status: Not hooked

#: 220 Function Name: NtSetEventBoostPriority
Status: Not hooked

#: 221 Function Name: NtSetHighEventPair
Status: Not hooked

#: 222 Function Name: NtSetHighWaitLowEventPair
Status: Not hooked

#: 223 Function Name: NtSetInformationDebugObject
Status: Not hooked

#: 224 Function Name: NtSetInformationFile
Status: Not hooked

#: 225 Function Name: NtSetInformationJobObject
Status: Not hooked

#: 226 Function Name: NtSetInformationKey
Status: Not hooked

#: 227 Function Name: NtSetInformationObject
Status: Not hooked

#: 228 Function Name: NtSetInformationProcess
Status: Not hooked

#: 229 Function Name: NtSetInformationThread
Status: Not hooked

#: 230 Function Name: NtSetInformationToken
Status: Not hooked

#: 231 Function Name: NtSetIntervalProfile
Status: Not hooked

#: 232 Function Name: NtSetIoCompletion
Status: Not hooked

#: 233 Function Name: NtSetLdtEntries
Status: Not hooked

#: 234 Function Name: NtSetLowEventPair
Status: Not hooked

#: 235 Function Name: NtSetLowWaitHighEventPair
Status: Not hooked

#: 236 Function Name: NtSetQuotaInformationFile
Status: Not hooked

#: 237 Function Name: NtSetSecurityObject
Status: Hooked by "C:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xba689dc0

#: 238 Function Name: NtSetSystemEnvironmentValue
Status: Not hooked

#: 239 Function Name: NtSetSystemEnvironmentValueEx
Status: Not hooked

#: 240 Function Name: NtSetSystemInformation
Status: Hooked by "C:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xba68ae9a

#: 241 Function Name: NtSetSystemPowerState
Status: Not hooked

#: 242 Function Name: NtSetSystemTime
Status: Not hooked

#: 243 Function Name: NtSetThreadExecutionState
Status: Not hooked

#: 244 Function Name: NtSetTimer
Status: Not hooked

#: 245 Function Name: NtSetTimerResolution
Status: Not hooked

#: 246 Function Name: NtSetUuidSeed
Status: Not hooked

#: 247 Function Name: NtSetValueKey
Status: Hooked by "C:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xba68a520

#: 248 Function Name: NtSetVolumeInformationFile
Status: Not hooked

#: 249 Function Name: NtShutdownSystem
Status: Hooked by "C:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xba6893d6

#: 250 Function Name: NtSignalAndWaitForSingleObject
Status: Not hooked

#: 251 Function Name: NtStartProfile
Status: Not hooked

#: 252 Function Name: NtStopProfile
Status: Not hooked

#: 253 Function Name: NtSuspendProcess
Status: Not hooked

#: 254 Function Name: NtSuspendThread
Status: Not hooked

#: 255 Function Name: NtSystemDebugControl
Status: Hooked by "C:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xba6895c0

#: 256 Function Name: NtTerminateJobObject
Status: Not hooked

#: 257 Function Name: NtTerminateProcess
Status: Hooked by "C:\Program Files\SUPERAntiSpyware\SASKUTIL.SYS" at address 0xba482320

#: 258 Function Name: NtTerminateThread
Status: Hooked by "C:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xba688e32

#: 259 Function Name: NtTestAlert
Status: Not hooked

#: 260 Function Name: NtTraceEvent
Status: Not hooked

#: 261 Function Name: NtTranslateFilePath
Status: Not hooked

#: 262 Function Name: NtUnloadDriver
Status: Not hooked

#: 263 Function Name: NtUnloadKey
Status: Not hooked

#: 264 Function Name: NtUnloadKeyEx
Status: Not hooked

#: 265 Function Name: NtUnlockFile
Status: Not hooked

#: 266 Function Name: NtUnlockVirtualMemory
Status: Not hooked

#: 267 Function Name: NtUnmapViewOfSection
Status: Not hooked

#: 268 Function Name: NtVdmControl
Status: Not hooked

#: 269 Function Name: NtWaitForDebugEvent
Status: Not hooked

#: 270 Function Name: NtWaitForMultipleObjects
Status: Not hooked

#: 271 Function Name: NtWaitForSingleObject
Status: Not hooked

#: 272 Function Name: NtWaitHighEventPair
Status: Not hooked

#: 273 Function Name: NtWaitLowEventPair
Status: Not hooked

#: 274 Function Name: NtWriteFile
Status: Not hooked

#: 275 Function Name: NtWriteFileGather
Status: Not hooked

#: 276 Function Name: NtWriteRequestData
Status: Not hooked

#: 277 Function Name: NtWriteVirtualMemory
Status: Not hooked

#: 278 Function Name: NtYieldExecution
Status: Not hooked

#: 279 Function Name: NtCreateKeyedEvent
Status: Not hooked

#: 280 Function Name: NtOpenKeyedEvent
Status: Not hooked

#: 281 Function Name: NtReleaseKeyedEvent
Status: Not hooked

#: 282 Function Name: NtWaitForKeyedEvent
Status: Not hooked

#: 283 Function Name: NtQueryPortInformationProcess
Status: Not hooked

Re: pomalé nabíhání windows při startu

Napsal: 01 kvě 2010 12:17
od brankar
AROOTREPEAL (c) AD, 2007-2009
==================================================
Scan Time: 2010/05/01 13:15
Program Version: Version 1.3.0.0
Windows Version: Windows XP SP3
==================================================

Stealth Objects
-------------------
Object: Hidden Module [Name: DEM.Graphics.I0600.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04d70000 Size: 28672

Object: Hidden Module [Name: CLI.Aspect.DeviceCV2.Graphics.Runtime.dll]
Process: CLI.EXE (PID: 1676) Address: 0x048d0000 Size: 69632

Object: Hidden Module [Name: CLI.Aspect.Radeon3DLegacy.Graphics.Runtime.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04510000 Size: 53248

Object: Hidden Module [Name: ATICCCom.dll]
Process: CLI.EXE (PID: 1676) Address: 0x037f0000 Size: 28672

Object: Hidden Module [Name: LOG.Foundation.Shared.dll]
Process: CLI.EXE (PID: 1676) Address: 0x03420000 Size: 28672

Object: Hidden Module [Name: CLI.Implementation.dll]
Process: CLI.EXE (PID: 1676) Address: 0x00e90000 Size: 45056

Object: Hidden Module [Name: LOG.Foundation.dll]
Process: CLI.EXE (PID: 1676) Address: 0x01390000 Size: 45056

Object: Hidden Module [Name: CLI.Foundation.dll]
Process: CLI.EXE (PID: 1676) Address: 0x013c0000 Size: 77824

Object: Hidden Module [Name: LOG.Foundation.Service.dll]
Process: CLI.EXE (PID: 1676) Address: 0x013f0000 Size: 53248

Object: Hidden Module [Name: CLI.Foundation.XManifestation.dll]
Process: CLI.EXE (PID: 1676) Address: 0x03440000 Size: 36864

Object: Hidden Module [Name: System.Runtime.Remoting.dll]
Process: CLI.EXE (PID: 1676) Address: 0x03460000 Size: 307200

Object: Hidden Module [Name: CLI.Component.Runtime.dll]
Process: CLI.EXE (PID: 1676) Address: 0x037c0000 Size: 94208

Object: Hidden Module [Name: AEM.Foundation.dll]
Process: CLI.EXE (PID: 1676) Address: 0x03810000 Size: 36864

Object: Hidden Module [Name: CLI.Component.Runtime.Shared.dll]
Process: CLI.EXE (PID: 1676) Address: 0x03a90000 Size: 45056

Object: Hidden Module [Name: CLI.Caste.Graphics.Runtime.dll]
Process: CLI.EXE (PID: 1676) Address: 0x03a30000 Size: 307200

Object: Hidden Module [Name: CLI.Caste.Graphics.Shared.dll]
Process: CLI.EXE (PID: 1676) Address: 0x039d0000 Size: 61440

Object: Hidden Module [Name: DEM.Graphics.I0601.dll]
Process: CLI.EXE (PID: 1676) Address: 0x03ad0000 Size: 53248

Object: Hidden Module [Name: DEM.Foundation.dll]
Process: CLI.EXE (PID: 1676) Address: 0x03ab0000 Size: 28672

Object: Hidden Module [Name: ACE.Graphics.DisplaysManager.Shared.dll]
Process: CLI.EXE (PID: 1676) Address: 0x03af0000 Size: 36864

Object: Hidden Module [Name: ATIDEMGR.dll]
Process: CLI.EXE (PID: 1676) Address: 0x03e90000 Size: 315392

Object: Hidden Module [Name: CLI.Aspect.MultiVPU3.Graphics.Runtime.dll]
Process: CLI.EXE (PID: 1676) Address: 0x03d70000 Size: 45056

Object: Hidden Module [Name: CLI.Aspect.MultiVPU3.Graphics.Shared.dll]
Process: CLI.EXE (PID: 1676) Address: 0x03d90000 Size: 36864

Object: Hidden Module [Name: CLI.Aspect.MultiVPU2.Graphics.Runtime.dll]
Process: CLI.EXE (PID: 1676) Address: 0x03db0000 Size: 45056

Object: Hidden Module [Name: CLI.Aspect.MultiVPU2.Graphics.Shared.dll]
Process: CLI.EXE (PID: 1676) Address: 0x03dd0000 Size: 36864

Object: Hidden Module [Name: CLI.Aspect.MultiVPU.Graphics.Runtime.dll]
Process: CLI.EXE (PID: 1676) Address: 0x03df0000 Size: 45056

Object: Hidden Module [Name: CLI.Aspect.MultiVPU.Graphics.Shared.dll]
Process: CLI.EXE (PID: 1676) Address: 0x03e10000 Size: 36864

Object: Hidden Module [Name: System.Management.dll]
Process: CLI.EXE (PID: 1676) Address: 0x03ee0000 Size: 380928

Object: Hidden Module [Name: CLI.Aspect.VeryLargeDesktop.Graphics.Shared.dll]
Process: CLI.EXE (PID: 1676) Address: 0x044b0000 Size: 36864

Object: Hidden Module [Name: CLI.Aspect.VeryLargeDesktop.Graphics.Runtime.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04490000 Size: 45056

Object: Hidden Module [Name: CLI.Aspect.Radeon3D.Graphics.Runtime.dll]
Process: CLI.EXE (PID: 1676) Address: 0x044e0000 Size: 69632

Object: Hidden Module [Name: CLI.Aspect.WorkstationConfig.Graphics.Runtime.dll]
Process: CLI.EXE (PID: 1676) Address: 0x046c0000 Size: 45056

Object: Hidden Module [Name: CLI.Aspect.DisplaysColour.Graphics.Runtime.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04570000 Size: 53248

Object: Hidden Module [Name: CLI.Aspect.DisplaysColour2.Graphics.Shared.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04550000 Size: 36864

Object: Hidden Module [Name: CLI.Aspect.DisplaysColour2.Graphics.Runtime.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04530000 Size: 53248

Object: Hidden Module [Name: CLI.Aspect.MMVideo.Graphics.Runtime.dll]
Process: CLI.EXE (PID: 1676) Address: 0x045b0000 Size: 53248

Object: Hidden Module [Name: CLI.Aspect.DisplaysColour.Graphics.Shared.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04590000 Size: 36864

Object: Hidden Module [Name: CLI.Aspect.MMVideo.Graphics.Shared.dll]
Process: CLI.EXE (PID: 1676) Address: 0x045d0000 Size: 45056

Object: Hidden Module [Name: ACE.Graphics.VideoOverlay.Shared.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04640000 Size: 28672

Object: Hidden Module [Name: CLI.Aspect.VideoOverlay.Graphics.Shared.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04620000 Size: 36864

Object: Hidden Module [Name: CLI.Aspect.VideoOverlay.Graphics.Runtime.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04600000 Size: 45056

Object: Hidden Module [Name: CLI.Aspect.VPURecover.Graphics.Runtime.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04680000 Size: 36864

Object: Hidden Module [Name: CLI.Aspect.SmartGart.Graphics.Runtime.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04660000 Size: 36864

Object: Hidden Module [Name: CLI.Aspect.VPURecover.Graphics.Shared.dll]
Process: CLI.EXE (PID: 1676) Address: 0x046a0000 Size: 36864

Object: Hidden Module [Name: CLI.Aspect.DeviceLCD.Graphics.Runtime.dll]
Process: CLI.EXE (PID: 1676) Address: 0x047c0000 Size: 36864

Object: Hidden Module [Name: CLI.Aspect.DeviceCRT.Graphics.Shared.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04720000 Size: 69632

Object: Hidden Module [Name: CLI.Aspect.DeviceCRT.Graphics.Runtime.dll]
Process: CLI.EXE (PID: 1676) Address: 0x046f0000 Size: 45056

Object: Hidden Module [Name: CLI.Aspect.DeviceCRT2.Graphics.Runtime.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04750000 Size: 45056

Object: Hidden Module [Name: CLI.Aspect.DeviceCRT2.Graphics.Shared.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04790000 Size: 69632

Object: Hidden Module [Name: CLI.Aspect.DeviceLCD2.Graphics.Shared.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04820000 Size: 36864

Object: Hidden Module [Name: CLI.Aspect.DeviceLCD2.Graphics.Runtime.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04800000 Size: 36864

Object: Hidden Module [Name: CLI.Aspect.DeviceLCD.Graphics.Shared.dll]
Process: CLI.EXE (PID: 1676) Address: 0x047e0000 Size: 36864

Object: Hidden Module [Name: CLI.Aspect.DeviceCV.Graphics.Shared.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04880000 Size: 45056

Object: Hidden Module [Name: CLI.Aspect.DeviceCV.Graphics.Runtime.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04850000 Size: 69632

Object: Hidden Module [Name: CLI.Aspect.CustomFormats.Graphics.Shared.dll]
Process: CLI.EXE (PID: 1676) Address: 0x048a0000 Size: 36864

Object: Hidden Module [Name: CLI.Aspect.PowerPlay3.Graphics.Runtime.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04bc0000 Size: 61440

Object: Hidden Module [Name: CLI.Aspect.DeviceDFP.Graphics.Shared.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04ad0000 Size: 53248

Object: Hidden Module [Name: CLI.Aspect.DeviceTV2.Graphics.Runtime.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04940000 Size: 69632

Object: Hidden Module [Name: CLI.Aspect.DeviceCV2.Graphics.Shared.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04900000 Size: 53248

Object: Hidden Module [Name: CLI.Aspect.DeviceTV.Graphics.Runtime.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04a80000 Size: 69632

Object: Hidden Module [Name: CLI.Aspect.DeviceDFP.Graphics.Runtime.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04ab0000 Size: 53248

Object: Hidden Module [Name: CLI.Aspect.OverDrive3.Graphics.Runtime.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04b40000 Size: 86016

Object: Hidden Module [Name: CLI.Aspect.DeviceDFP2.Graphics.Shared.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04b10000 Size: 53248

Object: Hidden Module [Name: CLI.Aspect.DeviceDFP2.Graphics.Runtime.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04af0000 Size: 53248

Object: Hidden Module [Name: CLI.Aspect.OverDrive2.Graphics.Runtime.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04b90000 Size: 36864

Object: Hidden Module [Name: CLI.Aspect.OverDrive3.Graphics.Shared.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04b70000 Size: 36864

Object: Hidden Module [Name: CLI.Aspect.HotkeysHandling.Graphics.Shared.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04ca0000 Size: 28672

Object: Hidden Module [Name: CLI.Aspect.IntegratedUMAFrameBuffer.Graphics.Runtime.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04c20000 Size: 28672

Object: Hidden Module [Name: CLI.Aspect.DisplaysOptions.Graphics.Runtime.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04c00000 Size: 45056

Object: Hidden Module [Name: CLI.Aspect.PowerPlay3.Graphics.Shared.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04be0000 Size: 36864

Object: Hidden Module [Name: CLI.Aspect.InfoCentre.Graphics.Shared.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04c60000 Size: 36864

Object: Hidden Module [Name: CLI.Aspect.InfoCentre.Graphics.Runtime.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04c40000 Size: 45056

Object: Hidden Module [Name: CLI.Aspect.HotkeysHandling.Graphics.Runtime.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04c80000 Size: 28672

Object: Hidden Module [Name: CLI.Aspect.Radeon3D.Graphics.Shared.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04cf0000 Size: 69632

Object: Hidden Module [Name: CLI.Aspect.Radeon3DLegacy.Graphics.Shared.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04d30000 Size: 61440

Object: Hidden Module [Name: CLI.Aspect.DeviceTV.Graphics.Shared.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04ed0000 Size: 69632

Object: Hidden Module [Name: CLI.Aspect.DeviceProperty2.Graphics.Shared.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04e20000 Size: 28672

Object: Hidden Module [Name: CLI.Aspect.WorkstationConfig.Graphics.Shared.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04dc0000 Size: 45056

Object: Hidden Module [Name: CLI.Aspect.SmartGart.Graphics.Shared.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04d90000 Size: 36864

Object: Hidden Module [Name: CLI.Aspect.DeviceProperty.Graphics.Shared.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04e00000 Size: 28672

Object: Hidden Module [Name: DEM.Graphics.I0602.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04de0000 Size: 28672

Object: Hidden Module [Name: CLI.Aspect.DeviceTV2.Graphics.Shared.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04e90000 Size: 69632

Object: Hidden Module [Name: CLI.Aspect.DisplaysOptions.Graphics.Shared.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04f30000 Size: 36864

Object: Hidden Module [Name: CLI.Aspect.OverDrive2.Graphics.Shared.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04f10000 Size: 28672

Object: Hidden Module [Name: CLI.Aspect.IntegratedUMAFrameBuffer.Graphics.Shared.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04f50000 Size: 28672

Object: Hidden Module [Name: APM.Foundation.dll]
Process: CLI.EXE (PID: 1676) Address: 0x04f90000 Size: 36864

Object: Hidden Module [Name: ACE.Graphics.DisplaysManager.Shared.dll]
Process: cli.exe (PID: 3604) Address: 0x03930000 Size: 36864

Object: Hidden Module [Name: LOG.Foundation.Shared.dll]
Process: cli.exe (PID: 3604) Address: 0x03420000 Size: 28672

Object: Hidden Module [Name: CLI.Implementation.dll]
Process: cli.exe (PID: 3604) Address: 0x00e90000 Size: 45056

Object: Hidden Module [Name: LOG.Foundation.dll]
Process: cli.exe (PID: 3604) Address: 0x01390000 Size: 45056

Object: Hidden Module [Name: CLI.Foundation.dll]
Process: cli.exe (PID: 3604) Address: 0x013c0000 Size: 77824

Object: Hidden Module [Name: LOG.Foundation.Service.dll]
Process: cli.exe (PID: 3604) Address: 0x013f0000 Size: 53248

Object: Hidden Module [Name: CLI.Foundation.XManifestation.dll]
Process: cli.exe (PID: 3604) Address: 0x03440000 Size: 36864

Object: Hidden Module [Name: System.Runtime.Remoting.dll]
Process: cli.exe (PID: 3604) Address: 0x03460000 Size: 307200

Object: Hidden Module [Name: CLI.Caste.Graphics.Shared.dll]
Process: cli.exe (PID: 3604) Address: 0x03570000 Size: 61440

Object: Hidden Module [Name: CLI.Component.Runtime.dll]
Process: cli.exe (PID: 3604) Address: 0x038e0000 Size: 94208

Object: Hidden Module [Name: CLI.Component.Systemtray.dll]
Process: cli.exe (PID: 3604) Address: 0x03870000 Size: 438272

Object: Hidden Module [Name: ATICCCom.dll]
Process: cli.exe (PID: 3604) Address: 0x03910000 Size: 28672

Object: Hidden Module [Name: APM.Foundation.dll]
Process: cli.exe (PID: 3604) Address: 0x03970000 Size: 36864

Object: Hidden Module [Name: AEM.Foundation.dll]
Process: cli.exe (PID: 3604) Address: 0x03950000 Size: 36864

Object: Hidden Module [Name: CLI.Aspect.DeviceDFP.Graphics.Shared.dll]
Process: cli.exe (PID: 3612) Address: 0x06b30000 Size: 53248

Object: Hidden Module [Name: CLI.Aspect.DeviceLCD.Graphics.Shared.dll]
Process: cli.exe (PID: 3612) Address: 0x068a0000 Size: 36864

Object: Hidden Module [Name: CLI.Aspect.IntegratedUMAFrameBuffer.Graphics.Dashboard.dll]
Process: cli.exe (PID: 3612) Address: 0x061c0000 Size: 315392

Object: Hidden Module [Name: CLI.Aspect.DeviceDFP.Graphics.Dashboard.dll]
Process: cli.exe (PID: 3612) Address: 0x04ca0000 Size: 438272

Object: Hidden Module [Name: CLI.Aspect.Welcome.Local.Dashboard.dll]
Process: cli.exe (PID: 3612) Address: 0x03be0000 Size: 118784

Object: Hidden Module [Name: CLI.Implementation.dll]
Process: cli.exe (PID: 3612) Address: 0x00e90000 Size: 45056

Object: Hidden Module [Name: LOG.Foundation.dll]
Process: cli.exe (PID: 3612) Address: 0x01390000 Size: 45056

Object: Hidden Module [Name: CLI.Foundation.dll]
Process: cli.exe (PID: 3612) Address: 0x013c0000 Size: 77824

Object: Hidden Module [Name: LOG.Foundation.Service.dll]
Process: cli.exe (PID: 3612) Address: 0x013f0000 Size: 53248

Object: Hidden Module [Name: LOG.Foundation.Shared.dll]
Process: cli.exe (PID: 3612) Address: 0x03420000 Size: 28672

Object: Hidden Module [Name: CLI.Foundation.XManifestation.dll]
Process: cli.exe (PID: 3612) Address: 0x03440000 Size: 36864

Object: Hidden Module [Name: System.Runtime.Remoting.dll]
Process: cli.exe (PID: 3612) Address: 0x03460000 Size: 307200

Object: Hidden Module [Name: CLI.Foundation.Clients.dll]
Process: cli.exe (PID: 3612) Address: 0x03550000 Size: 53248

Object: Hidden Module [Name: CLI.Component.Dashboard.Shared.dll]
Process: cli.exe (PID: 3612) Address: 0x03570000 Size: 36864

Object: Hidden Module [Name: AEM.Foundation.dll]
Process: cli.exe (PID: 3612) Address: 0x03af0000 Size: 36864

Object: Hidden Module [Name: CLI.Component.Dashboard.dll]
Process: cli.exe (PID: 3612) Address: 0x03950000 Size: 1200128

Object: Hidden Module [Name: ATICCCom.dll]
Process: cli.exe (PID: 3612) Address: 0x03ab0000 Size: 28672

Object: Hidden Module [Name: CLI.Component.Runtime.dll]
Process: cli.exe (PID: 3612) Address: 0x03a80000 Size: 94208

Object: Hidden Module [Name: CLI.Caste.Graphics.Shared.dll]
Process: cli.exe (PID: 3612) Address: 0x03ad0000 Size: 61440

Object: Hidden Module [Name: CLI.Caste.Graphics.Dashboard.dll]
Process: cli.exe (PID: 3612) Address: 0x03b60000 Size: 69632

Object: Hidden Module [Name: CLI.Caste.Local.Dashboard.dll]
Process: cli.exe (PID: 3612) Address: 0x03b30000 Size: 28672

Object: Hidden Module [Name: ACE.Graphics.DisplaysManager.Shared.dll]
Process: cli.exe (PID: 3612) Address: 0x03b10000 Size: 36864

Object: Hidden Module [Name: CLI.Caste.Graphics.Dashboard.Shared.dll]
Process: cli.exe (PID: 3612) Address: 0x03ba0000 Size: 28672

Object: Hidden Module [Name: CLI.Aspect.VeryLargeDesktop.Graphics.Dashboard.dll]
Process: cli.exe (PID: 3612) Address: 0x03ef0000 Size: 307200

Object: Hidden Module [Name: CLI.Aspect.DisplaysManager.Graphics.Dashboard.dll]
Process: cli.exe (PID: 3612) Address: 0x03db0000 Size: 937984

Object: Hidden Module [Name: CLI.Aspect.InfoCentre.Graphics.Dashboard.dll]
Process: cli.exe (PID: 3612) Address: 0x03c60000 Size: 356352

Object: Hidden Module [Name: CLI.Aspect.DeviceCRT.Graphics.Dashboard.dll]
Process: cli.exe (PID: 3612) Address: 0x04040000 Size: 626688

Object: Hidden Module [Name: CLI.Aspect.DisplaysOptions.Graphics.Dashboard.dll]
Process: cli.exe (PID: 3612) Address: 0x03f70000 Size: 192512

Object: Hidden Module [Name: CLI.Aspect.DeviceCRT2.Graphics.Dashboard.dll]
Process: cli.exe (PID: 3612) Address: 0x04180000 Size: 634880

Object: Hidden Module [Name: CLI.Aspect.DeviceCV.Graphics.Dashboard.dll]
Process: cli.exe (PID: 3612) Address: 0x044e0000 Size: 806912

Object: Hidden Module [Name: CLI.Aspect.DeviceLCD2.Graphics.Dashboard.dll]
Process: cli.exe (PID: 3612) Address: 0x043a0000 Size: 454656

Object: Hidden Module [Name: CLI.Aspect.DeviceLCD.Graphics.Dashboard.dll]
Process: cli.exe (PID: 3612) Address: 0x042c0000 Size: 446464

Object: Hidden Module [Name: CLI.Aspect.DeviceTV2.Graphics.Dashboard.dll]
Process: cli.exe (PID: 3612) Address: 0x04870000 Size: 1265664

Object: Hidden Module [Name: CLI.Aspect.DeviceCV2.Graphics.Dashboard.dll]
Process: cli.exe (PID: 3612) Address: 0x04670000 Size: 749568

Object: Hidden Module [Name: CLI.Aspect.DeviceTV.Graphics.Dashboard.dll]
Process: cli.exe (PID: 3612) Address: 0x04af0000 Size: 1249280

Object: Hidden Module [Name: CLI.Aspect.VideoOverlay.Graphics.Dashboard.dll]
Process: cli.exe (PID: 3612) Address: 0x05980000 Size: 2797568

Object: Hidden Module [Name: CLI.Aspect.Radeon3DLegacy.Graphics.Dashboard.dll]
Process: cli.exe (PID: 3612) Address: 0x050a0000 Size: 454656

Object: Hidden Module [Name: CLI.Aspect.Radeon3D.Graphics.Dashboard.dll]
Process: cli.exe (PID: 3612) Address: 0x04f20000 Size: 1052672

Object: Hidden Module [Name: CLI.Aspect.DeviceDFP2.Graphics.Dashboard.dll]
Process: cli.exe (PID: 3612) Address: 0x04d90000 Size: 503808

Object: Hidden Module [Name: CLI.Aspect.DisplaysColour.Graphics.Dashboard.dll]
Process: cli.exe (PID: 3612) Address: 0x05390000 Size: 880640

Object: Hidden Module [Name: CLI.Aspect.DisplaysColour2.Graphics.Dashboard.dll]
Process: cli.exe (PID: 3612) Address: 0x051e0000 Size: 823296

Object: Hidden Module [Name: CLI.Aspect.MMVideo.Graphics.Dashboard.dll]
Process: cli.exe (PID: 3612) Address: 0x055a0000 Size: 1183744

Object: Hidden Module [Name: CLI.Aspect.VPURecover.Graphics.Dashboard.dll]
Process: cli.exe (PID: 3612) Address: 0x05dc0000 Size: 151552

Object: Hidden Module [Name: CLI.Aspect.SmartGart.Graphics.Dashboard.dll]
Process: cli.exe (PID: 3612) Address: 0x05d30000 Size: 364544

Object: Hidden Module [Name: CLI.Aspect.PowerPlay3.Graphics.Dashboard.dll]
Process: cli.exe (PID: 3612) Address: 0x05c80000 Size: 282624

Object: Hidden Module [Name: CLI.Aspect.OverDrive3.Graphics.Dashboard.dll]
Process: cli.exe (PID: 3612) Address: 0x05f30000 Size: 905216

Object: Hidden Module [Name: CLI.Aspect.WorkstationConfig.Graphics.Dashboard.dll]
Process: cli.exe (PID: 3612) Address: 0x05e20000 Size: 176128

Object: Hidden Module [Name: CLI.Aspect.OverDrive2.Graphics.Dashboard.dll]
Process: cli.exe (PID: 3612) Address: 0x060c0000 Size: 708608

Object: Hidden Module [Name: CLI.Aspect.DeviceProperty.Graphics.Shared.dll]
Process: cli.exe (PID: 3612) Address: 0x06600000 Size: 28672

Object: Hidden Module [Name: CLI.Aspect.MultiVPU.Graphics.Dashboard.dll]
Process: cli.exe (PID: 3612) Address: 0x06490000 Size: 512000

Object: Hidden Module [Name: CLI.Aspect.MultiVPU2.Graphics.Dashboard.dll]
Process: cli.exe (PID: 3612) Address: 0x06390000 Size: 512000

Object: Hidden Module [Name: CLI.Aspect.MultiVPU3.Graphics.Dashboard.dll]
Process: cli.exe (PID: 3612) Address: 0x06290000 Size: 520192

Object: Hidden Module [Name: CLI.Aspect.InfoCentre.Graphics.Shared.dll]
Process: cli.exe (PID: 3612) Address: 0x06440000 Size: 36864

Object: Hidden Module [Name: CLI.Aspect.HotkeysHandling.Graphics.Shared.dll]
Process: cli.exe (PID: 3612) Address: 0x06460000 Size: 28672

Object: Hidden Module [Name: CLI.Aspect.VeryLargeDesktop.Graphics.Shared.dll]
Process: cli.exe (PID: 3612) Address: 0x06480000 Size: 36864

Object: Hidden Module [Name: CLI.Aspect.DisplaysOptions.Graphics.Shared.dll]
Process: cli.exe (PID: 3612) Address: 0x065a0000 Size: 36864

Object: Hidden Module [Name: CLI.Aspect.DeviceCRT.Graphics.Shared.dll]
Process: cli.exe (PID: 3612) Address: 0x065d0000 Size: 69632

Object: Hidden Module [Name: CLI.Aspect.DeviceProperty2.Graphics.Shared.dll]
Process: cli.exe (PID: 3612) Address: 0x06870000 Size: 28672

Object: Hidden Module [Name: CLI.Aspect.DeviceCRT2.Graphics.Shared.dll]
Process: cli.exe (PID: 3612) Address: 0x06840000 Size: 69632

Object: Hidden Module [Name: CLI.Aspect.DeviceCV.Graphics.Shared.dll]
Process: cli.exe (PID: 3612) Address: 0x068e0000 Size: 45056

Object: Hidden Module [Name: CLI.Aspect.DeviceLCD2.Graphics.Shared.dll]
Process: cli.exe (PID: 3612) Address: 0x068c0000 Size: 36864

Object: Hidden Module [Name: CLI.Aspect.CustomFormats.Graphics.Shared.dll]
Process: cli.exe (PID: 3612) Address: 0x06910000 Size: 36864

Object: Hidden Module [Name: CLI.Aspect.DeviceTV2.Graphics.Shared.dll]
Process: cli.exe (PID: 3612) Address: 0x06aa0000 Size: 69632

Object: Hidden Module [Name: CLI.Aspect.DeviceCV2.Graphics.Shared.dll]
Process: cli.exe (PID: 3612) Address: 0x06a60000 Size: 53248

Object: Hidden Module [Name: CLI.Aspect.DeviceTV.Graphics.Shared.dll]
Process: cli.exe (PID: 3612) Address: 0x06af0000 Size: 69632

Object: Hidden Module [Name: CLI.Aspect.Radeon3DLegacy.Graphics.Shared.dll]
Process: cli.exe (PID: 3612) Address: 0x06bb0000 Size: 61440

Object: Hidden Module [Name: CLI.Aspect.Radeon3D.Graphics.Shared.dll]
Process: cli.exe (PID: 3612) Address: 0x06b80000 Size: 69632

Object: Hidden Module [Name: CLI.Aspect.DeviceDFP2.Graphics.Shared.dll]
Process: cli.exe (PID: 3612) Address: 0x06b50000 Size: 53248

Object: Hidden Module [Name: CLI.Aspect.DisplaysColour.Graphics.Shared.dll]
Process: cli.exe (PID: 3612) Address: 0x06bf0000 Size: 36864

Object: Hidden Module [Name: CLI.Aspect.DisplaysColour2.Graphics.Shared.dll]
Process: cli.exe (PID: 3612) Address: 0x06bd0000 Size: 36864

Object: Hidden Module [Name: CLI.Aspect.MMVideo.Graphics.Shared.dll]
Process: cli.exe (PID: 3612) Address: 0x06c10000 Size: 45056

Object: Hidden Module [Name: CLI.Aspect.SmartGart.Graphics.Shared.dll]
Process: cli.exe (PID: 3612) Address: 0x06c80000 Size: 36864

Object: Hidden Module [Name: CLI.Aspect.PowerPlay3.Graphics.Shared.dll]
Process: cli.exe (PID: 3612) Address: 0x06c60000 Size: 36864

Object: Hidden Module [Name: CLI.Aspect.VideoOverlay.Graphics.Shared.dll]
Process: cli.exe (PID: 3612) Address: 0x06c40000 Size: 36864

Object: Hidden Module [Name: CLI.Aspect.VPURecover.Graphics.Shared.dll]
Process: cli.exe (PID: 3612) Address: 0x06cb0000 Size: 36864

Object: Hidden Module [Name: CLI.Aspect.OverDrive3.Graphics.Shared.dll]
Process: cli.exe (PID: 3612) Address: 0x06cf0000 Size: 36864

Object: Hidden Module [Name: CLI.Aspect.WorkstationConfig.Graphics.Shared.dll]
Process: cli.exe (PID: 3612) Address: 0x06cd0000 Size: 45056

Object: Hidden Module [Name: CLI.Aspect.IntegratedUMAFrameBuffer.Graphics.Shared.dll]
Process: cli.exe (PID: 3612) Address: 0x06d30000 Size: 28672

Object: Hidden Module [Name: CLI.Aspect.OverDrive2.Graphics.Shared.dll]
Process: cli.exe (PID: 3612) Address: 0x06d10000 Size: 28672

Object: Hidden Module [Name: CLI.Aspect.MultiVPU3.Graphics.Shared.dll]
Process: cli.exe (PID: 3612) Address: 0x06d50000 Size: 36864

Object: Hidden Module [Name: CLI.Aspect.MultiVPU2.Graphics.Shared.dll]
Process: cli.exe (PID: 3612) Address: 0x06d70000 Size: 36864

Object: Hidden Module [Name: CLI.Aspect.MultiVPU.Graphics.Shared.dll]
Process: cli.exe (PID: 3612) Address: 0x06da0000 Size: 36864

Re: pomalé nabíhání windows při startu

Napsal: 01 kvě 2010 12:32
od brankar
ROOTREPEAL (c) AD, 2007-2009
==================================================
Scan Time: 2010/05/01 13:31
Program Version: Version 1.3.0.0
Windows Version: Windows XP SP3
==================================================

Hidden/Locked Files
-------------------
Path: C:\Program Files\COMODO\COMODO Internet Security\Quarantine
Status: Locked to the Windows API!

Path: C:\WINDOWS\system32\drivers\sfi.dat
Status: Locked to the Windows API!

Path: C:\Documents and Settings\user\Data aplikací\Sports Interactive\Installer Launcher
Status: Locked to the Windows API!

Path: \\?\C:\Program Files\COMODO\COMODO Internet Security\Quarantine\*
Status: Could not enumerate files with the Windows API (0x00000005)!

Re: pomalé nabíhání windows při startu

Napsal: 01 kvě 2010 18:03
od Rudy
Nic nebezpečného nevidím. Kam vám to odepírá přístup?

Re: pomalé nabíhání windows při startu

Napsal: 02 kvě 2010 13:15
od brankar
Rudy zatím dík zatím to nedělá uvidim později

Re: pomalé nabíhání windows při startu

Napsal: 02 kvě 2010 18:08
od Rudy
Zatím není zač!