Guest User

Untitled

a guest
Feb 18th, 2018
91
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.90 KB | None | 0 0
  1. 23:55:10.731 [I] usvfs dll 0.3.1.0-beta5 initialized in process 2216
  2. 23:55:10.731 [D] remove from process 2216
  3. 23:55:10.731 [I] create config in 2216
  4. 23:55:10.731 [I] 0 processes - 0
  5. 23:55:10.740 [I] mod_organizer_instance_1 created in process 2216
  6. 23:55:10.740 [I] attached to mod_organizer_instance_1 with 1 nodes, size 65536
  7. 23:55:10.740 [I] inv_mod_organizer_instance_1 created in process 2216
  8. 23:55:10.740 [I] attached to inv_mod_organizer_instance_1 with 1 nodes, size 65536
  9. 23:55:10.740 [D] context current shm: mod_organizer_instance (now 2 connections)
  10. 23:55:53.359 [I] injecting to process 5848 with same bitness
  11. 23:55:53.359 [I] dll path: D:\Gaming\MO2 Test\usvfs_x64.dll
  12. 23:55:56.504 [I] injection to same bitness process 5848 successfull
  13. 23:55:56.542 [I] usvfs dll 0.3.1.0-beta5 initialized in process 5848
  14. 23:55:56.542 [I] inithooks called mod_organizer_instance in process D:\Gaming\Steam\Steamcore\steamapps\common\Fallout 4\f4se_loader.exe:5848 (log level 0, dump type 1, dump path D:/Gaming/MO2 Test/crashDumps)
  15. 23:55:56.551 [I] access existing config in 5848
  16. 23:55:56.551 [I] 0 processes - 0
  17. 23:55:56.552 [I] mod_organizer_instance_1 opened in process 5848
  18. 23:55:56.552 [I] attached to mod_organizer_instance_1 with 45 nodes, size 65536
  19. 23:55:56.552 [I] inv_mod_organizer_instance_1 opened in process 5848
  20. 23:55:56.552 [I] attached to inv_mod_organizer_instance_1 with 1 nodes, size 65536
  21. 23:55:56.552 [D] context current shm: mod_organizer_instance_1 (now 3 connections)
  22. 23:55:56.552 [I] Process registered in shared process list : 5848
  23. 23:55:56.552 [I] Windows version 6.1.7601 sp 65536 platform 2 (7601.17730.amd64fre.win7sp1_gdr.111123-1510)
  24. 23:55:56.552 [D] kernel32.dll at 778c0000
  25. 23:55:56.552 [D] kernelbase.dll at 7fefdcf0000
  26. 23:55:56.553 [D] allocated trampoline buffer for jumps between 0x7fec0000000 and 7feffffffff at 0x7fec0000000(size 4096)
  27. 23:55:56.553 [I] hooked GetFileAttributesExW (0x7fefdcf8a60) in C:\Windows\system32\KERNELBASE.dll type 64-bit hot patch
  28. 23:55:56.553 [I] hooked GetFileAttributesW (0x7fefdcf3ca0) in C:\Windows\system32\KERNELBASE.dll type 64-bit hot patch
  29. 23:55:56.553 [I] hooked SetFileAttributesW (0x7fefdd066f0) in C:\Windows\system32\KERNELBASE.dll type 64-bit hot patch
  30. 23:55:56.554 [I] hooked CreateFileW (0x7fefdcf5260) in C:\Windows\system32\KERNELBASE.dll type 64-bit hot patch
  31. 23:55:56.554 [I] hooked CreateFileA (0x7fefdd2a9b0) in C:\Windows\system32\KERNELBASE.dll type 64-bit hot patch
  32. 23:55:56.554 [I] hooked CreateDirectoryW (0x7fefdcf92a0) in C:\Windows\system32\KERNELBASE.dll type 64-bit hot patch
  33. 23:55:56.554 [I] hooked RemoveDirectoryW (0x7fefdd2eb20) in C:\Windows\system32\KERNELBASE.dll type 64-bit hot patch
  34. 23:55:56.554 [I] hooked DeleteFileW (0x7fefdd06120) in C:\Windows\system32\KERNELBASE.dll type 64-bit hot patch
  35. 23:55:56.554 [I] hooked GetCurrentDirectoryA (0x7fefdd06010) in C:\Windows\system32\KERNELBASE.dll type 64-bit hot patch
  36. 23:55:56.586 [I] hooked GetCurrentDirectoryW (0x7fefdd00020) in C:\Windows\system32\KERNELBASE.dll type 64-bit hot patch
  37. 23:55:56.586 [I] hooked SetCurrentDirectoryA (0x7fefdd2acb0) in C:\Windows\system32\KERNELBASE.dll type 64-bit hot patch
  38. 23:55:56.586 [I] hooked SetCurrentDirectoryW (0x7fefdd00070) in C:\Windows\system32\KERNELBASE.dll type 64-bit hot patch
  39. 23:55:56.586 [D] allocated trampoline buffer for jumps between 0x40000000 and 7fffffff at 0x40000000(size 4096)
  40. 23:55:56.586 [I] hooked ExitProcess (0x77b040f0) in C:\Windows\system32\KERNELBASE.dll type 64-bit hot patch
  41. 23:55:56.586 [I] hooked CreateProcessInternalW (0x778de7b0) in C:\Windows\system32\kernel32.dll type 64-bit hot patch
  42. 23:55:56.586 [I] hooked MoveFileA (0x7794f950) in C:\Windows\system32\kernel32.dll type 64-bit hot patch
  43. 23:55:56.586 [I] hooked MoveFileW (0x7794f7f0) in C:\Windows\system32\kernel32.dll type 64-bit hot patch
  44. 23:55:56.586 [I] hooked MoveFileExA (0x7794f920) in C:\Windows\system32\kernel32.dll type 64-bit hot patch
  45. 23:55:56.586 [I] hooked MoveFileExW (0x778c3060) in C:\Windows\system32\kernel32.dll type 64-bit hot patch
  46. 23:55:56.586 [I] hooked MoveFileWithProgressA (0x7794f8f0) in C:\Windows\system32\kernel32.dll type 64-bit hot patch
  47. 23:55:56.586 [I] hooked MoveFileWithProgressW (0x7794f6f0) in C:\Windows\system32\kernel32.dll type 64-bit hot patch
  48. 23:55:56.587 [I] hooked CopyFileExW (0x778d23d0) in C:\Windows\system32\kernel32.dll type 64-bit hot patch
  49. 23:55:56.587 [I] hooked GetPrivateProfileStringA (0x77941720) in C:\Windows\system32\kernel32.dll type 64-bit hot patch
  50. 23:55:56.587 [I] hooked GetPrivateProfileStringW (0x778c6bf0) in C:\Windows\system32\kernel32.dll type 64-bit hot patch
  51. 23:55:56.587 [I] hooked GetPrivateProfileSectionA (0x77941600) in C:\Windows\system32\kernel32.dll type 64-bit hot patch
  52. 23:55:56.587 [I] hooked GetPrivateProfileSectionW (0x778c6720) in C:\Windows\system32\kernel32.dll type 64-bit hot patch
  53. 23:55:56.587 [I] hooked WritePrivateProfileStringA (0x779416b0) in C:\Windows\system32\kernel32.dll type 64-bit hot patch
  54. 23:55:56.587 [I] hooked WritePrivateProfileStringW (0x77941460) in C:\Windows\system32\kernel32.dll type 64-bit hot patch
  55. 23:55:56.587 [I] hooked GetFullPathNameA (0x7fefdd0af50) in C:\Windows\system32\KERNELBASE.dll type 64-bit hot patch
  56. 23:55:56.587 [I] hooked GetFullPathNameW (0x7fefdcf6310) in C:\Windows\system32\KERNELBASE.dll type 64-bit hot patch
  57. 23:55:56.587 [I] hooked FindFirstFileExW (0x7fefdcf5740) in C:\Windows\system32\KERNELBASE.dll type 64-bit hot patch
  58. 23:55:56.587 [D] ntdll.dll at 77ae0000
  59. 23:55:56.587 [I] hooked NtQueryFullAttributesFile (0x77b32470) in C:\Windows\SYSTEM32\ntdll.dll type overwrite
  60. 23:55:56.587 [I] hooked NtQueryAttributesFile (0x77b316e0) in C:\Windows\SYSTEM32\ntdll.dll type overwrite
  61. 23:55:56.587 [I] hooked NtQueryDirectoryFile (0x77b31660) in C:\Windows\SYSTEM32\ntdll.dll type overwrite
  62. 23:55:56.587 [I] hooked NtOpenFile (0x77b31640) in C:\Windows\SYSTEM32\ntdll.dll type overwrite
  63. 23:55:56.587 [D] allocated trampoline buffer for jumps between 0x40000000 and 7fffffff at 0x40010000(size 4096)
Add Comment
Please, Sign In to add comment