Advertisement
Guest User

skyrim_steam_deck_Crashlog

a guest
Jun 4th, 2024
60
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 34.42 KB | None | 0 0
  1. SkyrimSE v1.6.1170
  2. trainwreck v1.4.0
  3.  
  4. Unhandled exception "EXCEPTION_ACCESS_VIOLATION" at 0x000000000000
  5.  
  6. SYSTEM SPECS:
  7. OS: Microsoft Windows 10 Pro 21H1 19043
  8. CPU: AuthenticAMD AMD Custom APU 0405
  9. GPU #1: AMD Custom GPU 0405 (RADV VANGOGH)
  10. RAM: 7.66 GiB/11.51 GiB
  11. PAGE FILE: 8.62 GiB/12.51 GiB
  12.  
  13. PROBABLE CALL STACK:
  14. [0 ] 0x000000B99820 dxgi.dll+01B9820
  15. mov r15,[rsp+1A0h]
  16. [1 ] 0x0001EFE038A7 WINHTTP.dll+00038A7
  17. test eax,eax
  18. [2 ] 0x0001EFE03B2B WINHTTP.dll+0003B2B
  19. mov edx,[rsp+80h]
  20. [3 ] 0x0001EFE0503A WINHTTP.dll+000503A
  21. mov esi,eax
  22. [4 ] 0x0001EFE1362F WINHTTP.dll+001362F
  23. mov esi,eax
  24. [5 ] 0x0001EFE13CB2 WINHTTP.dll+0013CB2
  25. mov rcx,[rbx+28h]
  26. [6 ] 0x0001EFE095F8 WINHTTP.dll+00095F8
  27. mov rdx,rbx
  28. [7 ] 0x000170064DEA ntdll.dll+0064DEA RtlProcessFlsData
  29. test byte ptr [0A0A6h],8
  30. [8 ] 0x00017006512D ntdll.dll+006512D RtlProcessFlsData
  31. mov eax,[r15+7Ch]
  32. [9 ] 0x00007B62A239 kernel32.dll+002A239
  33. mov ecx,eax
  34. [10] 0x000170061AA7 ntdll.dll+0061AA7 RtlUserThreadStart
  35. int3
  36.  
  37. REGISTERS:
  38. RAX 0x0 (size_t)
  39. RBX 0xE3 (size_t)
  40. RCX 0x850 (size_t)
  41. RDX 0x1002EF940 (void*)
  42. RSI 0x0 (size_t)
  43. RDI 0x1002EF940 (void*)
  44. RBP 0x1 (size_t)
  45. RSP 0x1002EF758 (void*)
  46. R8 0x1 (size_t)
  47. R9 0x1002EF93C (char*) "\x01"
  48. R10 0x0 (size_t)
  49. R11 0x1002EF8E8 (void*)
  50. R12 0x2C49FE10 (char*) "@"
  51. R13 0x2C498C88 (char*) "\x03"
  52. R14 0x850 (size_t)
  53. R15 0x1002EF93C (char*) "\x01"
  54.  
  55. STACK:
  56. [RSP+0 ] 0xB99820 (void* -> dxgi.dll+01B9820)
  57. mov r15,[rsp+1A0h]
  58. [RSP+8 ] 0x1002EF6F8 (void*)
  59. [RSP+10 ] 0x1002EF6F4 (void*)
  60. [RSP+18 ] 0x1002EF6FC (void*)
  61. [RSP+20 ] 0x0 (size_t)
  62. [RSP+28 ] 0x2C00000000 (size_t)
  63. [RSP+30 ] 0x0 (size_t)
  64. [RSP+38 ] 0x0 (size_t)
  65. [RSP+40 ] 0x0 (size_t)
  66. [RSP+48 ] 0x1002EFA00 (void*)
  67. [RSP+50 ] 0x2C498C88 (char*) "\x03"
  68. [RSP+58 ] 0x0 (size_t)
  69. [RSP+60 ] 0x1002EF9EC (void*)
  70. [RSP+68 ] 0x0 (size_t)
  71. [RSP+70 ] 0x3AFEF99E1 (void* -> secur32.dll+00099E1)
  72. add rsp,88h
  73. [RSP+78 ] 0x2 (size_t)
  74. [RSP+80 ] 0x17002D2C9 (void* -> ntdll.dll+002D2C9 RtlAllocateHeap)
  75. mov r12,rax
  76. [RSP+88 ] 0x2C00000000 (size_t)
  77. [RSP+90 ] 0x2BF20000 (void*)
  78. [RSP+98 ] 0x20202020008013C (size_t)
  79. [RSP+A0 ] 0x1002EFAF0 (char*) "\x04"
  80. [RSP+A8 ] 0x1002EFA00 (void*)
  81. [RSP+B0 ] 0x1002EF9EC (void*)
  82. [RSP+B8 ] 0x0 (size_t)
  83. [RSP+C0 ] 0x1EFE24A20 (char*) "netconn_negotiate"
  84. [RSP+C8 ] 0x3 (size_t)
  85. [RSP+D0 ] 0x1EFE220E0 (void* -> WINHTTP.dll+00220E0)
  86. add [rdi+69h],dh
  87. [RSP+D8 ] 0x3F9F0000 (void*)
  88. [RSP+E0 ] 0x1EFE24A20 (char*) "netconn_negotiate"
  89. [RSP+E8 ] 0x1EFE220E0 (void* -> WINHTTP.dll+00220E0)
  90. add [rdi+69h],dh
  91. [RSP+F0 ] 0x1002EF990 (void*)
  92. [RSP+F8 ] 0x1002EFA00 (void*)
  93. [RSP+100] 0x170061CD7 (void* -> ntdll.dll+0061CD7 __wine_dbg_header)
  94. movzx eax,al
  95. [RSP+108] 0x1002EFAF0 (char*) "\x04"
  96. [RSP+110] 0x0 (size_t)
  97. [RSP+118] 0x318F7A60 (void*)
  98. [RSP+120] 0x0 (size_t)
  99. [RSP+128] 0x2C498C88 (char*) "\x03"
  100. [RSP+130] 0x8013C (void*)
  101. [RSP+138] 0x0 (size_t)
  102. [RSP+140] 0x3AFF00140 (void* -> secur32.dll+0010140)
  103. test eax,eax
  104. [RSP+148] 0x1EFE24A20 (char*) "netconn_negotiate"
  105. [RSP+150] 0x2C307B80 (void*)
  106. [RSP+158] 0x1002EFAF0 (char*) "\x04"
  107. [RSP+160] 0x2C37E4C0 (char*) "a"
  108. [RSP+168] 0x3 (size_t)
  109. [RSP+170] 0x1EFE220E0 (void* -> WINHTTP.dll+00220E0)
  110. add [rdi+69h],dh
  111. [RSP+178] 0x90312 (void*)
  112. [RSP+180] 0x1002EFAF0 (char*) "\x04"
  113. [RSP+188] 0x2C37E4C0 (char*) "a"
  114. [RSP+190] 0x1EFE038A7 (void* -> WINHTTP.dll+00038A7)
  115. test eax,eax
  116. [RSP+198] 0x0 (size_t)
  117. [RSP+1A0] 0x0 (size_t)
  118. [RSP+1A8] 0x1002EFA00 (void*)
  119. [RSP+1B0] 0xE3 (size_t)
  120. [RSP+1B8] 0x100000000 (void*)
  121. [RSP+1C0] 0x0 (size_t)
  122. [RSP+1C8] 0x0 (size_t)
  123. [RSP+1D0] 0x0 (size_t)
  124. [RSP+1D8] 0x2C307B80 (void*)
  125. [RSP+1E0] 0x1002EFAF0 (char*) "\x04"
  126. [RSP+1E8] 0xE3 (size_t)
  127. [RSP+1F0] 0x2ABE85A0 (char*) "\x16\x03\x03"
  128. [RSP+1F8] 0x800 (size_t)
  129. [RSP+200] 0x2C307B80 (void*)
  130. [RSP+208] 0x2C49FE10 (char*) "@"
  131. [RSP+210] 0x1EFE03B2B (void* -> WINHTTP.dll+0003B2B)
  132. mov edx,[rsp+80h]
  133. [RSP+218] 0x0 (size_t)
  134. [RSP+220] 0x1002EFAD0 (char*) "\x19"
  135. [RSP+228] 0x17006E620 (void* -> ntdll.dll+006E620)
  136. loopne 0FFFFFFFFFFFFFFE7h
  137. [RSP+230] 0x2C (size_t)
  138. [RSP+238] 0xE3 (size_t)
  139. [RSP+240] 0x0 (size_t)
  140. [RSP+248] 0x0 (size_t)
  141. [RSP+250] 0x0 (size_t)
  142. [RSP+258] 0x1002EFAF0 (char*) "\x04"
  143. [RSP+260] 0x1002EFA00 (void*)
  144. [RSP+268] 0x1002EF9EC (void*)
  145. [RSP+270] 0x0 (size_t)
  146. [RSP+278] 0x1002EF9EC (void*)
  147. [RSP+280] 0x2C74953A0 (void* -> ucrtbase.dll+00253A0 _assert)
  148. push r14
  149. [RSP+288] 0x2C5CD100 (char*) "M"
  150. [RSP+290] 0x8811C7002C4CB (size_t)
  151. [RSP+298] 0x2000000E3 (size_t)
  152. [RSP+2A0] 0x2ABE85A0 (char*) "\x16\x03\x03"
  153. [RSP+2A8] 0x100000000 (void*)
  154. [RSP+2B0] 0x1002EF9F0 (void*)
  155. [RSP+2B8] 0x200000000 (size_t)
  156. [RSP+2C0] 0x1002EFA20 (void*)
  157. [RSP+2C8] 0x200000000 (size_t)
  158. [RSP+2D0] 0x0 (size_t)
  159. [RSP+2D8] 0x0 (size_t)
  160. [RSP+2E0] 0x0 (size_t)
  161. [RSP+2E8] 0x1EFE4B844 (char*) "secur32.dll"
  162. [RSP+2F0] 0x2C307B80 (void*)
  163. [RSP+2F8] 0x0 (size_t)
  164. [RSP+300] 0x2C37E4C0 (char*) "a"
  165. [RSP+308] 0x2C37C230 (char*) "\x02"
  166. [RSP+310] 0x0 (size_t)
  167. [RSP+318] 0x1002EFAF0 (char*) "\x04"
  168. [RSP+320] 0x2451B0F0 (char*) "5"
  169. [RSP+328] 0x800000 (void* -> d3dx9_42.dll+00A0000)
  170. sub edx,esi
  171. [RSP+330] 0x1EFE0503A (void* -> WINHTTP.dll+000503A)
  172. mov esi,eax
  173. [RSP+338] 0x318F7A60 (void*)
  174. [RSP+340] 0x3AFEF98B1 (void* -> secur32.dll+00098B1)
  175. add rsp,70h
  176. [RSP+348] 0x100000002 (void*)
  177. [RSP+350] 0x1002EFAC0 (void*)
  178. [RSP+358] 0x0 (size_t)
  179. [RSP+360] 0x1002EFAF0 (char*) "\x04"
  180. [RSP+368] 0x1EFE25D18 (char*) "M"
  181. [RSP+370] 0xFFFFFFFF (void*)
  182. [RSP+378] 0x1001A0019 (void*)
  183. [RSP+380] 0x1EFE25D18 (char*) "M"
  184. [RSP+388] 0x7B610798 (void* -> kernel32.dll+0010798 lstrcmpiW)
  185. lea rsp,[rsp]
  186. [RSP+390] 0x3AFEFC486 (void* -> secur32.dll+000C486)
  187. test eax,eax
  188. [RSP+398] 0x4 (size_t)
  189. [RSP+3A0] 0x318F7A60 (void*)
  190. [RSP+3A8] 0x0 (size_t)
  191. [RSP+3B0] 0x0 (size_t)
  192. [RSP+3B8] 0x2 (size_t)
  193. [RSP+3C0] 0x0 (size_t)
  194. [RSP+3C8] 0x0 (size_t)
  195. [RSP+3D0] 0x1EFE25D18 (char*) "M"
  196. [RSP+3D8] 0x0 (size_t)
  197. [RSP+3E0] 0x3AFEFFC42 (void* -> secur32.dll+000FC42)
  198. test eax,eax
  199. [RSP+3E8] 0x2C37C230 (char*) "\x02"
  200. [RSP+3F0] 0x2C498BC0 (char*) "\x03"
  201. [RSP+3F8] 0x2C32CDC0 (void*)
  202. [RSP+400] 0x2451B0F0 (char*) "5"
  203. [RSP+408] 0x1002EFC90 (char*) "\x04"
  204. [RSP+410] 0x0 (size_t)
  205. [RSP+418] 0x0 (size_t)
  206. [RSP+420] 0x2C498C88 (char*) "\x03"
  207. [RSP+428] 0x0 (size_t)
  208. [RSP+430] 0x7B60C8B0 (void* -> kernel32.dll+000C8B0 DelayLoadFailureHook)
  209. lea rsp,[rsp]
  210. [RSP+438] 0x1EFE4A8D0 (void* -> WINHTTP.dll+004A8D0)
  211. nop
  212. [RSP+440] 0x100000000 (void*)
  213. [RSP+448] 0x2C37C230 (char*) "\x02"
  214. [RSP+450] 0x1EFE1FB77 (void* -> WINHTTP.dll+001FB77)
  215. mov r9,[rsp+28h]
  216. [RSP+458] 0x2C32CDC0 (void*)
  217. [RSP+460] 0x2C498C88 (char*) "\x03"
  218. [RSP+468] 0x2C498C88 (char*) "\x03"
  219. [RSP+470] 0x0 (size_t)
  220. [RSP+478] 0x2C74A37C0 (void* -> ucrtbase.dll+00337C0 free)
  221. lea rsp,[rsp]
  222. [RSP+480] 0x2C37C230 (char*) "\x02"
  223. [RSP+488] 0x2C498BC0 (char*) "\x03"
  224. [RSP+490] 0x2C32CDC0 (void*)
  225. [RSP+498] 0x2451B0F0 (char*) "5"
  226. [RSP+4A0] 0x1EFE1362F (void* -> WINHTTP.dll+001362F)
  227. mov esi,eax
  228. [RSP+4A8] 0x27F (size_t)
  229. [RSP+4B0] 0x0 (size_t)
  230. [RSP+4B8] 0xFFFFFFFF (void*)
  231. [RSP+4C0] 0x1F80 (size_t)
  232. [RSP+4C8] 0x100000000 (void*)
  233. [RSP+4D0] 0x0 (size_t)
  234. [RSP+4D8] 0x0 (size_t)
  235. [RSP+4E0] 0x2C498C88 (char*) "\x03"
  236. [RSP+4E8] 0x0 (size_t)
  237. [RSP+4F0] 0x0 (size_t)
  238. [RSP+4F8] 0x0 (size_t)
  239. [RSP+500] 0x80000000000000 (size_t)
  240. [RSP+508] 0x170061750 (void* -> ntdll.dll+0061750 RtlLeaveCriticalSection)
  241. push r12
  242. [RSP+510] 0x2C37C230 (char*) "\x02"
  243. [RSP+518] 0x0 (size_t)
  244. [RSP+520] 0x0 (size_t)
  245. [RSP+528] 0x0 (size_t)
  246. [RSP+530] 0x2C307B80 (void*)
  247. [RSP+538] 0x4 (size_t)
  248. [RSP+540] 0x0 (size_t)
  249. [RSP+548] 0x0 (size_t)
  250. [RSP+550] 0x0 (size_t)
  251. [RSP+558] 0x0 (size_t)
  252. [RSP+560] 0x0 (size_t)
  253. [RSP+568] 0x0 (size_t)
  254. [RSP+570] 0x800 (size_t)
  255. [RSP+578] 0x0 (size_t)
  256. [RSP+580] 0x0 (size_t)
  257. [RSP+588] 0x2C49AD00 (void*)
  258. [RSP+590] 0x2C5CBFA0 (void*)
  259. [RSP+598] 0x2C49AD00 (void*)
  260. [RSP+5A0] 0x1002EFE60 (void*)
  261. [RSP+5A8] 0x2C74A37C0 (void* -> ucrtbase.dll+00337C0 free)
  262. lea rsp,[rsp]
  263. [RSP+5B0] 0x2C498BC0 (char*) "\x03"
  264. [RSP+5B8] 0x1002EFE60 (void*)
  265. [RSP+5C0] 0x1002EFF28 (void*)
  266. [RSP+5C8] 0x1F40550 (char*) "\x0b"
  267. [RSP+5D0] 0x1EFE13CB2 (void* -> WINHTTP.dll+0013CB2)
  268. mov rcx,[rbx+28h]
  269. [RSP+5D8] 0x2C49AD00 (void*)
  270. [RSP+5E0] 0x1002EFE60 (void*)
  271. [RSP+5E8] 0x2C49AD00 (void*)
  272. [RSP+5F0] 0x0 (size_t)
  273. [RSP+5F8] 0x0 (size_t)
  274. [RSP+600] 0x0 (size_t)
  275. [RSP+608] 0x2C4179E0 (void*)
  276. [RSP+610] 0x1 (size_t)
  277. [RSP+618] 0x0 (size_t)
  278. [RSP+620] 0x2C5CBFA0 (void*)
  279. [RSP+628] 0x2C5CBFA0 (void*)
  280. [RSP+630] 0x1EFE095F8 (void* -> WINHTTP.dll+00095F8)
  281. mov rdx,rbx
  282. [RSP+638] 0x0 (size_t)
  283. [RSP+640] 0x0 (size_t)
  284. [RSP+648] 0x0 (size_t)
  285. [RSP+650] 0x0 (size_t)
  286. [RSP+658] 0x0 (size_t)
  287. [RSP+660] 0x0 (size_t)
  288. [RSP+668] 0x2A5D6080 (char*) "\\"
  289. [RSP+670] 0x0 (size_t)
  290. [RSP+678] 0x0 (size_t)
  291. [RSP+680] 0x1F405A8 (void*)
  292. [RSP+688] 0x1F40560 (void*)
  293. [RSP+690] 0x170064DEA (void* -> ntdll.dll+0064DEA RtlProcessFlsData)
  294. test byte ptr [0A0A6h],8
  295. [RSP+698] 0x0 (size_t)
  296. [RSP+6A0] 0x0 (size_t)
  297. [RSP+6A8] 0x0 (size_t)
  298. [RSP+6B0] 0x0 (size_t)
  299. [RSP+6B8] 0x0 (size_t)
  300. [RSP+6C0] 0x0 (size_t)
  301. [RSP+6C8] 0x0 (size_t)
  302. [RSP+6D0] 0x0 (size_t)
  303. [RSP+6D8] 0x0 (size_t)
  304. [RSP+6E0] 0x0 (size_t)
  305. [RSP+6E8] 0x0 (size_t)
  306. [RSP+6F0] 0x0 (size_t)
  307. [RSP+6F8] 0x0 (size_t)
  308. [RSP+700] 0x0 (size_t)
  309. [RSP+708] 0x2A5D6080 (char*) "\\"
  310. [RSP+710] 0x10000039C (void*)
  311. [RSP+718] 0x0 (size_t)
  312. [RSP+720] 0x0 (size_t)
  313. [RSP+728] 0x0 (size_t)
  314. [RSP+730] 0x0 (size_t)
  315. [RSP+738] 0x100000000 (void*)
  316. [RSP+740] 0x0 (size_t)
  317. [RSP+748] 0x0 (size_t)
  318. [RSP+750] 0x0 (size_t)
  319. [RSP+758] 0x2A5D60F0 (void*)
  320. [RSP+760] 0x1F40588 (void*)
  321. [RSP+768] 0x1F40598 (void*)
  322. [RSP+770] 0x1F40560 (void*)
  323. [RSP+778] 0x2A5D6080 (char*) "\\"
  324. [RSP+780] 0x17006512D (void* -> ntdll.dll+006512D RtlProcessFlsData)
  325. mov eax,[r15+7Ch]
  326. [RSP+788] 0x0 (size_t)
  327. [RSP+790] 0x0 (size_t)
  328. [RSP+798] 0x0 (size_t)
  329. [RSP+7A0] 0x0 (size_t)
  330. [RSP+7A8] 0x0 (size_t)
  331. [RSP+7B0] 0x0 (size_t)
  332. [RSP+7B8] 0x0 (size_t)
  333. [RSP+7C0] 0x1F405B8 (char*) "\x01"
  334. [RSP+7C8] 0x0 (size_t)
  335. [RSP+7D0] 0x0 (size_t)
  336. [RSP+7D8] 0x0 (size_t)
  337. [RSP+7E0] 0x0 (size_t)
  338. [RSP+7E8] 0x0 (size_t)
  339. [RSP+7F0] 0x0 (size_t)
  340. [RSP+7F8] 0x0 (size_t)
  341. [RSP+800] 0x0 (size_t)
  342. [RSP+808] 0x0 (size_t)
  343. [RSP+810] 0x0 (size_t)
  344. [RSP+818] 0x0 (size_t)
  345. [RSP+820] 0x7B62A239 (void* -> kernel32.dll+002A239)
  346. mov ecx,eax
  347. [RSP+828] 0x0 (size_t)
  348. [RSP+830] 0x0 (size_t)
  349. [RSP+838] 0x0 (size_t)
  350. [RSP+840] 0x0 (size_t)
  351. [RSP+848] 0x0 (size_t)
  352. [RSP+850] 0x170061AA7 (void* -> ntdll.dll+0061AA7 RtlUserThreadStart)
  353. int3
  354. [RSP+858] 0x0 (size_t)
  355. [RSP+860] 0x0 (size_t)
  356. [RSP+868] 0x0 (size_t)
  357. [RSP+870] 0x0 (size_t)
  358. [RSP+878] 0x0 (size_t)
  359. [RSP+880] 0x0 (size_t)
  360. [RSP+888] 0x0 (size_t)
  361. [RSP+890] 0x0 (size_t)
  362. [RSP+898] 0x0 (size_t)
  363. [RSP+8A0] 0x0 (size_t)
  364.  
  365. MODULES:
  366. ADVAPI32.dll
  367. Address: 0x0001D8C90000
  368. SHA: 80077D605AAA4CB3277F4815C37F0A7F5FFCA6981FCEBDD69A20D88DFCE630E2E878B95D41EB8376DC1CE027BED851CEA1BD8AE201884ED4D949632FFCDB7EDD
  369. Version: v10.0.10240.16384
  370. AnimationMotionRevolution.dll
  371. Address: 0x000025350000
  372. SHA: 4A3A00073E3A94CA73C9F4216572DF7AE7B24ACC39112138DA70D140B404AD0069589588E7C2FF784DAACDFA1500C5DF7A0037548A6FEA3D9A8315054D71F647
  373. AutoParallax.dll
  374. Address: 0x000025B50000
  375. SHA: 6CBF236692831140B2CE524211149BF535CD685FF4EC53DA36A31237E5181A2137605BFA17385DE99D3A25B415CCF73164E6D6E43DC3DA52C4956B3FF34CB44A
  376. Version: v1.0.7
  377. avrt.dll
  378. Address: 0x00031B140000
  379. SHA: 42DF1BD0AC6D210A1BAA6F0E0ED8F33D631A3E3F2A1BF955F809ACAB1736375BAD0A8BCD3A57E20717938B99E5CF9AF025D8710AA08518893F0A94941C89B2A4
  380. bcrypt.dll
  381. Address: 0x0002EE630000
  382. SHA: EA9250193B211384E23BD74336B60257A66476EB43E82FB2FF97F3EB3C88144BF6B2F8889A5B876C209E8F79FCAACC97E874C5AC33DFF2765CCABEB4C9B741FC
  383. Version: v6.0.6000.16386
  384. bink2w64.dll
  385. Address: 0x000180000000
  386. SHA: 3369CC043EE6CBCA63F820E558BAC93E6B137A18C052416F18CC741BD888AF27A3AD98B83AF8BFD3C9705F7E823A9D32C17188BB4C0D797B82ACAFF123902E2C
  387. Version: v2.7.1.300
  388. combase.dll
  389. Address: 0x00031C5D0000
  390. SHA: FE2B4EB2132E7598EDB2EF9C5BF03B86332848680F5FCA7E685A45E6A1ACCECD6919B598B058EDFE26FD7FE373C802EE11906654B1D735483BF5F2BA6D5E0231
  391. comctl32.dll
  392. Address: 0x0002FB3C0000
  393. SHA: 9384E76299629F65EB33AC83C90141BEF2A424C3E4E62ECAB510965676FEF0A286FE7E50701364911569C0C96B3219435C98840C56034EAE70DC81F955A33664
  394. Version: v6.0.4704.1100
  395. CommunityShaders.dll
  396. Address: 0x000026270000
  397. SHA: 8999034E443108B5135C257C45EF4B79725FD1898E24EE6810638FDCBD737AF018BCF493BCE88FE8C4655E2337A25504B6F0DB083950E8AC1CA59956C4BA2494
  398. Version: v0.8.7
  399. crypt32.dll
  400. Address: 0x0002964D0000
  401. SHA: 5C60009FB383D58AEDEE9647E43F799180D280F09A0B46A7359E5B020F844981DA7F0809EE304460B634FA7D490D15DC72C0406E48B82318C7ED395A3E5DF778
  402. Version: v5.131.2600.1243
  403. d3d11.dll
  404. Address: 0x000359050000
  405. SHA: 508AE5B00115917FC7E31E03C7251A726F91E8F405EB78DE7944120F3D2628F9FE62FB7C5A908B4DB6F77D3B7BB18E6A82C47A5205B186445779E078D15D58FC
  406. Version: v10.0.17763.1
  407. D3DCOMPILER_47.dll
  408. Address: 0x0000264A0000
  409. SHA: 3F7968BE921F4D1D1B1D9DF116DB40F006FB212D4E5F522D882F38570F1C04FB373531E42AE3C06E6F9CD2EEA628EC4AC0ED03AB880D430750C9EC5643509E91
  410. Version: v10.0.15063.674
  411. d3dx9_42.dll
  412. Address: 0x000000760000
  413. SHA: 92CF7AE0DFE1437227F8BE37F50D84A6B18876485CB953C6A972A2F0C9F10D940941F34E8C8188559523B69BF2F6AD463526F87DE52F8F142337031E753F6F0D
  414. Version: v9.27.952.3001
  415. dbghelp.dll
  416. Address: 0x00023ECB0000
  417. SHA: 8AE707568D33D5CC6DB196082EC38AC6BCE0D4634F4AC1CF13149632E13A0EC33FD17BB3D5382A503CF336CADCF8170D2BA9F240A52F283FEF92CBCD530A8BD4
  418. Version: v6.1.7601.17514
  419. DINPUT8.dll
  420. Address: 0x000267710000
  421. SHA: B154DD30B7E5B8AF383CCF81133A60BF8A65F398A60EC03B5CA067D050CC2A7D5FB48B47C64E27D5E91F4A413404467EB3B47695BCC984B4F79AEEAAC48116EC
  422. Version: v5.1.2600.881
  423. DSOUND.DLL
  424. Address: 0x000343520000
  425. SHA: B1C0B14B4DF7006143BCD9FBCB279E9EDEC2158003722303AEA59C1BF3D3EBA2679CB8CC4C61B6BC0F972B044C6EC5CA425C0510E50B71B72B1074B8A2C3E9C7
  426. Version: v5.3.1.904
  427. dwmapi.dll
  428. Address: 0x0002EF230000
  429. SHA: 6A633C808C94B0087CE66CC5025B36981F7933E2EA8FB8D08E0FCE85A4B8135DA5E699E858A5EF204C6E1E9E2BA8384EEABABA293A6B769C68D9FE1E47338220
  430. Version: v6.0.6000.16386
  431. dxgi.dll
  432. Address: 0x0000009E0000
  433. SHA: 9CB94C3A9CBEA0F30BE4622E04FE27224A74A9765036646E27A4217C23640230378806114E6A389A0718403E39928524776B72B37F7E1B44AE7C6EB0B2D78E81
  434. Version: v6.1.1.1848
  435. dxgi.dll
  436. Address: 0x0002EDF00000
  437. SHA: D8F9F0162F2E7E538C2E6423F89A205D7675BCFEBA9316F8624EEDF0E7E793985AA4B89980D1AD3C974B32AF4B9217EE73D57C6A098D358FEC0A5A49963782DC
  438. Version: v10.0.17763.1
  439. DynamicAnimationReplacer.dll
  440. Address: 0x000027F70000
  441. SHA: 576F880E9331E6ACB4821F36323D10A6EA2EA0A009B5C8EC43EE95EDC4114D6987A7E8EB096EE852EDD70A51EE37636C787D05D770D1478C23C9BD6A8E93E89C
  442. Version: v1.1.3
  443. EVLaS.dll
  444. Address: 0x000027FE0000
  445. SHA: F0748EDC83749066D83872B7B5E0803726A3B00B3EA73412448172BDA815DDEA74E0EAEF7C9D378177E91E587F525AE5D3EB8F79F02C06ABD0F43F2315E755FE
  446. Version: v1.3.1
  447. gameoverlayrenderer64.dll
  448. Address: 0x000030F40000
  449. SHA: 1F641859D042875BBB3FF8B15620D916988C02A3851BC510F6F063EC89EBC83A61051DBB6B2D29C06F5FCD465FF2F4C06C95D322DEB5685D686A7DC24FF1586C
  450. Version: v8.92.64.3
  451. gdi32.dll
  452. Address: 0x0002BB0A0000
  453. SHA: 49EBB0DDAE383E626498788F0A0937A603AFE4CF4CF215BD671F5FD3AC2CB6AF2E208E1B51471D7C3ADAEF246B945213B2D3E3C2DD76904392CE6B922C4F1460
  454. Version: v1.0.0
  455. hdtSMP64.dll
  456. Address: 0x000028010000
  457. SHA: DE470B8B9D17B22338B951690557EAF015E69F1EB6083AD0D24BAD4FB36289BAB4C563358F97D9D8098A1191B25F28480498154FC80CC2BCFEC3EAFC7AF524F5
  458. hid.dll
  459. Address: 0x0002E0D50000
  460. SHA: C1D1B7E6C222AFAE045F84EB37BADCF2BC9FFCFA97EDB5A519BC067FD77F89C209378ED770CE4817791B91EE057E6A4F81D713C43736A7C01B7F6DFC000DE120
  461. Version: v10.0.0
  462. imm32.dll
  463. Address: 0x000393730000
  464. SHA: D9E80070EA1394F33D12159FF51F3233D5833DAD80958CF7F05ED0C509AF788EC48C1CBA69FD910B31270F987F3675EBC3FADC6377295CD4F4B18E63056DFCD4
  465. Version: v5.1.2600.2180
  466. jsproxy.dll
  467. Address: 0x0002EB680000
  468. SHA: B8DA376164801AFBFFC39FB9D46A4FCCD977B644C78FAD2CBAFC0C8129C7B11CFC9FE668776941EB3C429F9E8D363D85294903DA3BA608826740AD934CF7CC25
  469. Kerberos.dll
  470. Address: 0x0001CE760000
  471. SHA: 87A5E7131AB5DF6D41753534963DB5E683CAEF0CD60595774422EEC5C189A548F7992FFA2D801C5B99E22525544B64BA6BD39BC18217220D87318474919329EA
  472. kernel32.dll
  473. Address: 0x00007B600000
  474. SHA: 83D8B874AD9C04129AB9BFF91A7EFC1D1D8243726796BE4B11310442AFF975BFF40B3A4BCE953EB959719373C688A2D6E8B9917B549FCC4B307157E271749FFB
  475. Version: v10.0.19043.1466
  476. kernelbase.dll
  477. Address: 0x00007B000000
  478. SHA: 9F747B3D315EDC69E2FF1988BD89B850A68EFCDA13C5D61E0A3294BCD012F289F017AF51343BA0CD156F6B0D84845A1990B85C311015B02A5E77661E79DD70CA
  479. lsteamclient.dll
  480. Address: 0x7FF705540000
  481. SHA: 1ABA79FCC4CA2C093157C171CFBB234DD0246636243ACCB8423B15F368CBAEE1B0439480E77EF198C7D2424A001ECE956AB50E23CBD44BF90D3ED5D864AC7A85
  482. MCMHelper.dll
  483. Address: 0x0000293D0000
  484. SHA: 64B46A09756154AE6D0D03975F59D2EEC27A9128ED07EA0E6B5D1D7ED2E29050E16D46294359F6EC130B206A8AFDACC1FAEB3CDCFBC38382ADD1283E5519F31C
  485. Version: v1.5.0
  486. MCO.dll
  487. Address: 0x000029B40000
  488. SHA: 2F12C00952BC501DAF2BEC2A5BFD983B0C12687EB37785ED7828AE2A23F137280D645F25F9F3DE281BF9DB0788FA740EF681B26CD2A60EC60ADE5CC84D6E9DCB
  489. Version: v1.0.0
  490. mmdevapi.dll
  491. Address: 0x00020F400000
  492. SHA: D75CD612F045CB9FB007D289396880E471344D6E1AFCFDD9BF59F8638604B35ED2A20C3B93255C6FDA2DD7E842F572A593410477225C8BE9F4FAC51109E29C74
  493. mpr.dll
  494. Address: 0x000250CD0000
  495. SHA: C3363649CA2F808A633CE99FCAE5F66DA6BEDB41CF02E7E1E81488E9D6FAB71BE6E4296FB0987E03E4A3D8A4D8BB297314F5EE79096038F7971A8A3257E6758B
  496. Version: v5.0.2195.6611
  497. msacm32.dll
  498. Address: 0x000351A60000
  499. SHA: 02B06ACE62157BEBA56E84281149C4F82A3639A60703A38B3C824538D1BF79F97F50B6DE2B245FBBDE04E66FD95C5446DED5ADBBCA00B635F6511C8F21CA655E
  500. MSVCP140.dll
  501. Address: 0x0000006A0000
  502. SHA: 2A66BDDB9B6768419C6BAACBF8BB19CDA5662F5B1A1A3CA760B1D9D7EA7D65D19C29F48B7621362107EEF819D692F1D2A55A6D7D0217ECEA91EB6E150F6AB646
  503. Version: v14.0.24215.1
  504. MSVCP140_ATOMIC_WAIT.dll
  505. Address: 0x00029EF90000
  506. SHA: 2B30E558279634F3091489A5D8F42C31EBFA7A3D5D365246527823A58EC4D5589D1F0D5B5F940D1E406D78ECE82315BE1161EB4B41E3549957971F4C4995A1DB
  507. msvcrt.dll
  508. Address: 0x000228280000
  509. SHA: 094EDF6717569AA4DBE0C816835E76BC85D9721F65B70D48A605DB4F620808AF393D1CE46668F80A54B4E45D2FB516E0742F8404A3BD882E425148A3D2B0641C
  510. Version: v7.0.2600
  511. ntdll.dll
  512. Address: 0x000170000000
  513. SHA: 106FBFFEC9146733672DB9D98DF9F1DA366077A73F240E39A59CA7D9377C97CA15C6E8F3796E023C5785EBA82507321CCA09E3A81A2FFC4A445B88E7429AD8F0
  514. Version: v6.1.7601.24059
  515. ole32.dll
  516. Address: 0x00020B860000
  517. SHA: D52D7F12D7614A94F5EDA65EA6EAF8048E921CF68728BDAE1F8DF6E035ABFE09D6D4F98A46430B605C809D8D7160B60AEBF68B2CEA5D7BE922B8EF98EAF27B60
  518. Version: v10.0.0
  519. oleaut32.dll
  520. Address: 0x0001D0E20000
  521. SHA: 265EC3639215B2E57AFC24EEE8832CAACA39F1A8E5E8F3CF33AC421EB8970C0EBE306E9013A0BCDC01EF402FCAFF845595285145E8B1A0C2E6DBF51D1E7FE4EC
  522. Version: v6.0.6001.18000
  523. OneClickPowerAttack.dll
  524. Address: 0x000029BD0000
  525. SHA: D9566FA19D141BA13B8877C1DCB909C554D16B34C82153FA6C398F46C6A485DC96E1F1AAC970CA2C146A0C09CA12D625F87377992917DEF696E5BEE66DC0185D
  526. Version: v1.0.0
  527. PayloadInterpreter.dll
  528. Address: 0x000029C40000
  529. SHA: D5DBC2A619FC1C4AFE6A7967D4225F8EAF409BCE7F3DED56AFDA3D667AA7AE716096E39D2347CB144F9FB0A2F092BB9B1698DBDA7643F850DF8B86C056711139
  530. Version: v1.0.0
  531. po3_PapyrusExtender.dll
  532. Address: 0x000029CB0000
  533. SHA: 227DE1C02FB50B77C39B649718D820AD13BE95C72A1BADF19F8934ABE79C1867F45B09BAE5D65ED2A686270E98B8D0F06DF89466AD7AE450C41AEF7D858B7F91
  534. Version: v5.6.1.1
  535. Precision.dll
  536. Address: 0x00002BC70000
  537. SHA: 7238FD553247730D2D33898CA53ACCC46C1DDA6E455EF320511E3C458FA44CF8FE8A77DC513732F8CAAAF3AA052345CEAF8A68C91127A434FC703DEF05152E37
  538. Version: v2.0.4
  539. psapi.dll
  540. Address: 0x000267930000
  541. SHA: 21713B8E1464F63A8439D19379D02856F66F297EF55C1DFBC27E3BCD302109412A0921EC552D4E07DF3C7FE712C88C6F4766FCA27064D31DD51DFB3459B9C9D3
  542. Version: v5.1.2600.3264
  543. rpcrt4.dll
  544. Address: 0x000368420000
  545. SHA: 214EB216C8493534FCEE0057B26A5D4B88EB529E84B6A001EA7EF6364CA13D3C08B4C81874CAE88370EF2863A10B8EE450F8FFF1C689F7579DC77C1CB2500340
  546. Version: v5.1.2600.2180
  547. rsaenh.dll
  548. Address: 0x0001CCDD0000
  549. SHA: 6F888C472A09FDAC4045D79AE49BD059DE7147CC7B4C2E90E47C4427B0A610ED932D438CD1F765FE79B7C632597FBC9398E843FE6E3D3915C62470814742A776
  550. Version: v5.1.2600.2180
  551. schannel.dll
  552. Address: 0x00025C0B0000
  553. SHA: A95233B19CFE8C29158422D03ABA689C782C472F8FBB3AE53DD4D917F6CD96707382D1EAC447A47DC690BBEEF7BEC1EA0B7A4CB2DE7015F387839574CC93CB88
  554. Version: v5.1.2600.2180
  555. sechost.dll
  556. Address: 0x0001EAF60000
  557. SHA: C00787051FE213FDBF682EAE8B98574C6D468568D225C663A9FA51B0055FFA41DBA07544A0B0E5CC5F6D1E50F879481EDE6056FAFEB66E7F0882ACA499145AD7
  558. secur32.dll
  559. Address: 0x0003AFEF0000
  560. SHA: A4268B7CBEACB3F4E362DB6B29E81F2AD466D65D40B4E9741F8FDCF1E4AD29D84BD6F3F9C7616F8CEC106E3E4E9C184DAE0DB7AB90FC1B3EB7DE59F5BA4B22E7
  561. setupapi.dll
  562. Address: 0x00036D860000
  563. SHA: 137AE585289C8565427FE2097D6CCD6098B11D5710DE855EE25AB92E5E6D5226FF9C80E95045B3F0EDE4E23AF3432F3037D36A7546C8BCBEBE2DA6DC1464BF28
  564. shcore.dll
  565. Address: 0x0002BDE30000
  566. SHA: 9C965DC9F0248527B87CAD699EB2162D3172E09F472753FF883D15EA1F54B25E3FFBCD92D6C0873E9F2EEAE11B976C5DC7E4BA9B297987536A8A8E73D58D957F
  567. SHELL32.dll
  568. Address: 0x00023BC00000
  569. SHA: 8C46E33E23550639C87F5C9C76C524211BA8F194F77E9A0105A1006A033D1399F13F4FD97D5C1F74E75BE3DBA7769C3EBDD4340D0C87AE31BA4258CFFB4943C5
  570. Version: v6.0.2900.6242
  571. shlwapi.dll
  572. Address: 0x0002A2380000
  573. SHA: C47F8EC1819E49885CF423972E2C84C7EBF49ADBDEE89900DD63358D38EB06376071095EFCC9AA74EA908CE7C3EF0A790AB875126856E14200D4925079610B70
  574. Version: v6.0.2800.1692
  575. skee64.dll
  576. Address: 0x00002E2A0000
  577. SHA: C9BBFBC96194BAB0C3E9D78636E06D1C29BB0EC68E7C84A853E4C4A33673635C2EB5660021CD0010F8526F4871C307F22B65CC1FDC0212039B8574AC96B449F1
  578. Version: v0.4.19.16
  579. skse64_1_6_1170.dll
  580. Address: 0x000001DE0000
  581. SHA: F88C10E637F67131775414DE7691884E1BD181C750DCB7B9CE69FED616285BC69BF2F5E81177EBF2CB42BF590F709A33D722BE42CAE1809B49729FFFFFB75567
  582. Version: v0.2.2.6
  583. SkyrimSE.exe
  584. Address: 0x000140000000
  585. SHA: F7A77A0646E83A078FF8A2004C39533D132B5B45B93A3C0F4B7F0FE01977E79D4028336439DA03258B1A01FE01EF23C9D30F6DF59BBF0AC0113A14EF15A4B58A
  586. Version: v1.6.1170
  587. SmoothCam.dll
  588. Address: 0x00002EC50000
  589. SHA: B3E41421B12842533E80874A904E08F280ED8C683F68DD1FE280B93BE036A1965E0031E4FBFF22A1197B6B5A285FADF8FEF1DAFCEDA6BED243885BD1B37A6646
  590. SMP-NPC crash fix.dll
  591. Address: 0x000029F20000
  592. SHA: 5229FCAF4398F7863E41B2A63B3E45B10EF4CC94C542898F029124DA109331F0D740C901034351558C2ED1FBA6FDEEC53136D1B015C337F245BD7B7A2EFACFD4
  593. SSEDisplayTweaks.dll
  594. Address: 0x00002BE50000
  595. SHA: 9D2BB0CA409F63C72E6D8D3D48347EBED959F9833236C01E8285E5BC7F06D18380CDD08FA4EFF6666A15252131E2465CE2EC87793E775E6950E4D859400C889E
  596. steam_api64.dll
  597. Address: 0x00013B400000
  598. SHA: C08DE8C6E331D13DFE868AB340E41552FC49123A9F782A5A63B95795D5D979E68B5A6AB171153978679C0791DC3E3809C883471A05864041CE60B240CCDD4C21
  599. Version: v7.40.51.27
  600. steamclient64.dll
  601. Address: 0x000138000000
  602. SHA: 04985ED30B1DD9D000ACA9BE472256FEABEEAC2E15920233CD7C228C055ECAC25429E633E23C20F620E5002D27D76677297A89A7F4EA33F669DE2185999BD06A
  603. Version: v8.92.64.3
  604. trainwreck.dll
  605. Address: 0x00002F450000
  606. SHA: 261801A85D41236E35C820A78E4BC3E775EBF0C19336EF1D518A61DA20429BB30B707181606675C1BC650D678CA0A27DC585DFA35BDDD717EB830459BFF60333
  607. Version: v1.4.0
  608. TrueDirectionalMovement.dll
  609. Address: 0x00002F560000
  610. SHA: 1B38886B3753001D49B95157E2569FDDF2C66C4C14BC12F79908DD26D3AAB88529DE025BAD2BDE683EC012B36D557608F79520FCED02E96573BB98A21FB424BD
  611. Version: v2.2.5
  612. TrueHUD.dll
  613. Address: 0x00002FCC0000
  614. SHA: FFB0DC0E2F00AF463572A36A861498F6D213C34D35815FEA9921F014AEB15515ED736784D36562ACA44895111AADF73DD9CA2549A0A2EDE8E825404C507FD871
  615. Version: v1.1.9
  616. ucrtbase.dll
  617. Address: 0x0002C7470000
  618. SHA: E19256BD389CC62001A49650049186A302EA5875E551A337E222A08726A662F5249C9DB4116CEA865A39EC1DD93BA3157BA04A63537FD093CC22F375313F0A16
  619. Version: v10.0.14393.2247
  620. user32.dll
  621. Address: 0x0002169D0000
  622. SHA: DEF105A5FBD56A5A936349DEBF1AFE11EA7F250D6DDA17D3F0FF0004140283D599341B492E1594B9EDBC17F1058E3F200E4FB7EA849339B7DA038A02B8E03D05
  623. Version: v5.1.2600.2180
  624. usvfs_x64.dll
  625. Address: 0x000002EE0000
  626. SHA: 0238C06C4C1A4FCB0CE89A230EECC86E6B11CE415EF36F815ABB88AF45BBFDD4362CDDB1BF9DB371435460B5CB64784083DDF42A696ADF710E023792A711DB05
  627. uxtheme.dll
  628. Address: 0x00026C230000
  629. SHA: E8E2BC9970F717C927B27F22515FF7D48B01EB5C82FD50C11D85240D2E51D48037E06BC5095C20054C9FDF8637B9FDC7C888F474ECB00CA5CA867986D378EAEA
  630. Version: v10.0.0
  631. valhallaCombat.dll
  632. Address: 0x000030410000
  633. SHA: D2C73B21C67B49A476D21527A8B4B590B89EAC199DA5033464ECEC9216613D99E9FA43CE85DAA191C7F815A286CA8623E66D233BB704BCA4FC6EB6AEFE671315
  634. Version: v1.0.0
  635. VCRUNTIME140.dll
  636. Address: 0x000000740000
  637. SHA: 01B3F320FEAE9BCF3F540AC369515EA73249BA39630C117127FF9D0DE6307F5D062246B799E48627C9735A80B9A4E0A2F7F293DF187BA607D91A6AE64796CD64
  638. Version: v14.0.24215.1
  639. VCRUNTIME140_1.dll
  640. Address: 0x0002AC810000
  641. SHA: 0EF9499A8105019CE1C48B0450AAD009C4B5A954B2ED747D31213F40AFCFDE2DF6ACF2B082ECCE9AE50954AB4E5FDE1E2C9EFD94BED5C21E1237DFFDB43F4311
  642. version.dll
  643. Address: 0x00025DC30000
  644. SHA: 57222818B57E9EC0755E871D53294BC7549CB1D103ECC0A53A3FB9C200AC0126BCFE09B5CC2CF9E7A6721F0A708683E0FE1DBC404B4BAE454F363CC79DCFF6C8
  645. Version: v5.1.2600.2180
  646. win32u.dll
  647. Address: 0x0002C73A0000
  648. SHA: A54F7CFE16146F5322EB45B86B9BACD2A6246CBB06AC9A8AFF44815F4D32695ED56FED66C3DE4A866D6AC42DA2D1333907D14F8E4CFB4D8352FB2E00B2B1467F
  649. winepulse.drv
  650. Address: 0x0002EB230000
  651. SHA: B06434894308EE64F30CB43DF7D2B5EB8969D3C8E7C6EEB4AF505C17E20BF6F20AD4C2EBABB372DD725042245A5DB287230227A5F375AB2FD87FE046261D730A
  652. winevulkan.dll
  653. Address: 0x0002D4AD0000
  654. SHA: 89001E9BCC26E00ACEC93FA2A1324F56F5D7803C0AEDFF45A5932F67D0A9BEE9736015D0BE9A74030029DD4A66D7B56EE7A37524FC653F7A10DC3A66F692D1AC
  655. Version: v8.0.0
  656. winex11.drv
  657. Address: 0x000251D80000
  658. SHA: 5C3B9E0C23C8F880FBDA27EA9DF9B75BDA9895EF417DEEAAD245DDE2B6F714209B8964F08160F1EC5C2A8D2BB8CA50A7B2226BD3DFE3E004BDD546365D50F7F5
  659. Version: v10.0.0
  660. WINHTTP.dll
  661. Address: 0x0001EFE00000
  662. SHA: 2B40F1A0D73216631FF7D313E45696F36BA53E8AC64818C11D631EE0F17FF61E7ABB95522C4AA1B2FF9CC871D4E658EA2D5A176B30811F27C91DB41C9BA0FCD9
  663. Version: v5.1.2600.2180
  664. WININET.dll
  665. Address: 0x000345640000
  666. SHA: 47BE3183D2F88466149929B9DC3DF0CD612381BC981C4FE340DB02F6D7D4C9A653ADDDA1D8A0BE768EC7837271B6E87D71EAD9F08B1A90FA3DB7C01560508582
  667. Version: v8.0.7601.17601
  668. WINMM.dll
  669. Address: 0x0002945E0000
  670. SHA: 05E2AE3CA7D9199EE72569284AD3B4271A3FC67768E482B6C79A5D5FA022EE2691E152542DE3915075615715466EB9ECCF17F980EB72610E4E6FB5FB3E2CCF7C
  671. WS2_32.dll
  672. Address: 0x000370F70000
  673. SHA: 809D151525D60D5C22CCFAF9153E1F0DFF5EFB5DB5B529550BB89E5EEFC829D2402B4B96357AFD41B8D65C6A2D92645E90FB708F4F60F07182F0002D95198CC6
  674. Version: v5.1.2600.5512
  675. X3DAudio1_7.dll
  676. Address: 0x000000690000
  677. SHA: CEF31793E1B1714826AA95D256EBBEC457E8CF9003767DB46909BF879AF86F954F475AC84E1EE8CCCF1DCFE4A52624E3D7E8BFAFF5F567E97CAB19207DB7F913
  678. XAudio2_7.dll
  679. Address: 0x0000002F0000
  680. SHA: 2CF5EA114546236F55B9CBB49643F719D892EBA8649343BC3E72FE08C998E88E26C010232CA27BCA255629AE7D0D1E068D6ED1DBD76096B1ED09362F65F5401D
  681. XINPUT1_3.dll
  682. Address: 0x0002E99A0000
  683. SHA: CE2EAD2480A3942081AF4DF4BAEE32DE18862B5F0288169B9E8135CC710EB128F9A2B8A36BDA87212C53FD4317359349C94D38B5DA082638230DCB5669EFEDE9
  684. Version: v9.15.779
  685. xinput1_4.dll
  686. Address: 0x000259D90000
  687. SHA: 228A167D29859DCC82B606532CAD61DED262705D68564F91BC4ABB1C8EE1DB8DBF3645E4B4702028A46E5A19040FA094BD05E472BACC5CECAF949388FBA2A4FC
  688. Version: v6.3.9600.16384
  689.  
  690. SCRIPT EXTENDER PLUGINS:
  691. AnimationMotionRevolution.dll
  692. AutoParallax.dll v1.0.7
  693. CommunityShaders.dll v0.8.7
  694. DynamicAnimationReplacer.dll v1.1.3
  695. EVLaS.dll v1.3.1
  696. hdtSMP64.dll
  697. MCMHelper.dll v1.5.0
  698. MCO.dll v1.0.0
  699. OneClickPowerAttack.dll v1.0.0
  700. PayloadInterpreter.dll v1.0.0
  701. po3_PapyrusExtender.dll v5.6.1.1
  702. Precision.dll v2.0.4
  703. skee64.dll v0.4.19.16
  704. skse64_1_6_1170.dll v0.2.2.6
  705. SmoothCam.dll
  706. SMP-NPC crash fix.dll
  707. SSEDisplayTweaks.dll
  708. trainwreck.dll v1.4.0
  709. TrueDirectionalMovement.dll v2.2.5
  710. TrueHUD.dll v1.1.9
  711. valhallaCombat.dll v1.0.0
  712.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement