I have done a clean install, redownloaded all mods. Even a no-mod load into a new game crashes at the same point... the music just starts plays about 2-2.5 bars then CTD
Unhandled exception "EXCEPTION_ACCESS_VIOLATION" at 0x7FF7B6C4DD5D Starfield.exe+078DD5D
I'm not sure what the reason is, but the crash logs aren't appearing in the place they're supposed to. I have tried installing this both manually and with MO2, but neither work.
Ok, this unfortunately happens, with my older savegames, pre-SS, I dont really wanna play them, but since we got the Ship Vendor Framework now, I wanna go in, and take screens and Info of everything, to save them as "blueprints"...
And why is this necessary if it is not clear which file, which mod was the reason? Do the numbers mean anything to anyone? All this information is also available in regular logs. In the middle of the file.
185 comments
I have done a clean install, redownloaded all mods. Even a no-mod load into a new game crashes at the same point... the music just starts plays about 2-2.5 bars then CTD
Unhandled exception "EXCEPTION_ACCESS_VIOLATION" at 0x7FF7B6C4DD5D Starfield.exe+078DD5D
PROBABLE CALL STACK:
[0] 0x7FF7DDA30A24 Starfield.exe+2540A24
xor [rax-77h],ecx
this is the full crash log, if it's of any help
https://pastebin.com/LU14PNw6
Any chance for a reupload of the ASI version? Don't care that it misses bug fixes, it was nice to have.
I should really learn how to read.Getting consistent crashes when entering the MAST district. Anyone?
https://pastebin.com/z2JKguge
https://pastebin.com/F3tZNhiA
Please help :D
trainwreck v1.4.0
Unhandled exception "EXCEPTION_ACCESS_VIOLATION" at 0x02B1513E0300
SYSTEM SPECS:
OS: Microsoft Windows 11 Home 23H2 22631.4460
CPU: AuthenticAMD AMD Ryzen 7 5800X 8-Core Processor
GPU #1: NVIDIA GeForce RTX 3060 Ti
GPU #2: Microsoft Basic Render Driver
GPU #3: Microsoft Basic Render Driver
RAM: 16.07 GiB/31.92 GiB
PAGE FILE: 30.43 GiB/36.67 GiB
PROBABLE CALL STACK:
[0] 0x7FF6D38E2D33 Starfield.exe+27A2D33
lea rdx,[rsp+30h]
[1] 0x7FF6D4596A9D Starfield.exe+3456A9D
mov rdx,rbx
[2] 0x7FF6D45976F9 Starfield.exe+34576F9
jmp short 0000000000000078h
[3] 0x7FF6D4595810 Starfield.exe+3455810
mov ecx,[31C3464h]
[4] 0x7FF6D4597CAE Starfield.exe+3457CAE
xor eax,eax
[5] 0x7FF6D408D411 Starfield.exe+2F4D411
mov rcx,[3AFF2CFh]
[6] 0x7FFB3BAD259D KERNEL32.DLL+001259D BaseThreadInitThunk
mov ecx,eax
[7] 0x7FFB3CF6AF38 ntdll.dll+005AF38 RtlUserThreadStart
jmp short 0000000000000021h
REGISTERS:
RAX 0x2B9E0649C80 (void*)
RBX 0x2B9E0649C80 (void*)
RCX 0x2B9E0649CA8 (void*)
RDX 0x2B108912C00 (void*)
RSI 0x2B160C1A300 (void*)
RDI 0xD5B735F950 (void*)
RBP 0x1404D2248AB7 (size_t)
RSP 0xD5B735F868 (void*)
R8 0x1986C9E (size_t)
R9 0x2B160C1A300 (void*)
R10 0x1986C9E (size_t)
R11 0x2B160C1A300 (void*)
R12 0x0 (size_t)
R13 0x0 (size_t)
R14 0x0 (size_t)
R15 0x0 (size_t)
STACK:
[RSP+0 ] 0x7FF6D38E2D33 (void* -> Starfield.exe+27A2D33)
lea rdx,[rsp+30h]
[RSP+8 ] 0x2B9E0649D98 (BSJobs2::Detail::TNodeJob<void (&)(NiPointer<Actor> const &,bool),NiPointer<Actor> const &,bool>*)
[RSP+10 ] 0x7FF6D4596BDD (void* -> Starfield.exe+3456BDD)
mov rcx,[rax]
[RSP+18 ] 0xD5B735F900 (void*)
[RSP+20 ] 0x2B108912CE8 (stl::unique_function_impl::detail::TypeErasedFuncImpl<<lambda_8291e7d1e643b42ca1ce574da97d71a6>,void *>*)
[RSP+28 ] 0x2B108912CE8 (stl::unique_function_impl::detail::TypeErasedFuncImpl<<lambda_8291e7d1e643b42ca1ce574da97d71a6>,void *>*)
[RSP+30 ] 0x7FF6D4596A9D (void* -> Starfield.exe+3456A9D)
mov rdx,rbx
[RSP+38 ] 0x2B108912CE8 (stl::unique_function_impl::detail::TypeErasedFuncImpl<<lambda_8291e7d1e643b42ca1ce574da97d71a6>,void *>*)
[RSP+40 ] 0x7FF6D7283780 (char*) "1"
[RSP+48 ] 0x0 (size_t)
[RSP+50 ] 0x0 (size_t)
[RSP+58 ] 0x7FF6D9E9F140 (char*) "OG@"
[RSP+60 ] 0x7FF6D45976F9 (void* -> Starfield.exe+34576F9)
jmp short 0000000000000078h
[RSP+68 ] 0x0 (size_t)
[RSP+70 ] 0x2B9E0649C81 (void*)
[RSP+78 ] 0x1404D2248AB7 (size_t)
[RSP+80 ] 0x2B160C1A300 (void*)
[RSP+88 ] 0x7FF6D66D9E00 (void* -> Starfield.exe+5599E00)
[RSP+90 ] 0x2B160C1A938 (BSJobs2::Detail::GroupThread*)
[RSP+98 ] 0x2B9E0649C81 (void*)
[RSP+A0 ] 0x2 (size_t)
[RSP+A8 ] 0x0 (size_t)
[RSP+B0 ] 0x2B160C1A938 (BSJobs2::Detail::GroupThread*)
[RSP+B8 ] 0x7FF6D66D9E08 (void* -> Starfield.exe+5599E08)
adc [rbp+35h],ch
[RSP+C0 ] 0x0 (size_t)
[RSP+C8 ] 0x7FF6D7BBBA40 (BSFixedSizeBlockAllocator::TAlloc<4294967296,16777216,128>*)
[RSP+D0 ] 0x7FF6D4595810 (void* -> Starfield.exe+3455810)
mov ecx,[31C3464h]
[RSP+D8 ] 0x1404D2248AB7 (size_t)
[RSP+E0 ] 0x0 (size_t)
[RSP+E8 ] 0x2B9E0649C81 (void*)
[RSP+F0 ] 0x1 (size_t)
[RSP+F8 ] 0x0 (size_t)
[RSP+100] 0x7FF6D4597CAE (void* -> Starfield.exe+3457CAE)
xor eax,eax
[RSP+108] 0x0 (size_t)
[RSP+110] 0x0 (size_t)
[RSP+118] 0x2B160C1A938 (BSJobs2::Detail::GroupThread*)
[RSP+120] 0x7FF6D66D9E08 (void* -> Starfield.exe+5599E08)
adc [rbp+35h],ch
[RSP+128] 0x2B160C1A938 (BSJobs2::Detail::GroupThread*)
[RSP+130] 0x7FF6D408D411 (void* -> Starfield.exe+2F4D411)
mov rcx,[3AFF2CFh]
[RSP+138] 0x7FF6D7BBBA40 (BSFixedSizeBlockAllocator::TAlloc<4294967296,16777216,128>*)
[RSP+140] 0x7FF6D66D9E08 (void* -> Starfield.exe+5599E08)
adc [rbp+35h],ch
[RSP+148] 0x0 (size_t)
[RSP+150] 0x7FF6D9C784C8 (BSThreadEvent::`anonymous namespace'::Source*)
[RSP+158] 0x2B160C1A938 (BSJobs2::Detail::GroupThread*)
[RSP+160] 0x0 (size_t)
[RSP+168] 0x0 (size_t)
[RSP+170] 0x0 (size_t)
[RSP+178] 0x7FF6D66D9E08 (void* -> Starfield.exe+5599E08)
adc [rbp+35h],ch
[RSP+180] 0xD5B735F9C0 (void*)
[RSP+188] 0x7FF6D9C784C8 (BSThreadEvent::`anonymous namespace'::Source*)
[RSP+190] 0x0 (size_t)
[RSP+198] 0x0 (size_t)
[RSP+1A0] 0x0 (size_t)
[RSP+1A8] 0x0 (size_t)
[RSP+1B0] 0x7FFB3BAD259D (void* -> KERNEL32.DLL+001259D BaseThreadInitThunk)
mov ecx,eax
[RSP+1B8] 0x0 (size_t)
[RSP+1C0] 0x0 (size_t)
[RSP+1C8] 0x0 (size_t)
[RSP+1D0] 0x0 (size_t)
[RSP+1D8] 0x0 (size_t)
[RSP+1E0] 0x7FFB3CF6AF38 (void* -> ntdll.dll+005AF38 RtlUserThreadStart)
jmp short 0000000000000021h
[RSP+1E8] 0x0 (size_t)
[RSP+1F0] 0x0 (size_t)
[RSP+1F8] 0x0 (size_t)
[RSP+200] 0x0 (size_t)
[RSP+208] 0x0 (size_t)
[RSP+210] 0x0 (size_t)
[RSP+218] 0xB8109DAF00000000 (size_t)
[RSP+220] 0x0 (size_t)
[RSP+228] 0x4F0FFFFFB30 (size_t)
[RSP+230] 0x7FFB3A8BBE00 (void* -> KERNELBASE.dll+016BE00 UnhandledExceptionFilter)
mov [rsp+10h],rbx
[RSP+238] 0xD5B735E980 (void*)
[RSP+240] 0xFFF70536475E0000 (size_t)
[RSP+248] 0x7FFB829B23AF (size_t)
[RSP+250] 0xD5B735E980 (void*)
[RSP+258] 0x0 (size_t)
[RSP+260] 0x0 (size_t)
[RSP+268] 0x0 (size_t)
[RSP+270] 0x0 (size_t)
[RSP+278] 0x0 (size_t)
[RSP+280] 0x0 (size_t)
[RSP+288] 0x0 (size_t)
[RSP+290] 0x0 (size_t)
[RSP+298] 0x0 (size_t)
[RSP+2A0] 0x0 (size_t)
[RSP+2A8] 0x0 (size_t)
[RSP+2B0] 0x0 (size_t)
[RSP+2B8] 0x0 (size_t)
[RSP+2C0] 0x0 (size_t)
[RSP+2C8] 0x0 (size_t)
[RSP+2D0] 0x0 (size_t)
[RSP+2D8] 0x0 (size_t)
[RSP+2E0] 0x0 (size_t)
[RSP+2E8] 0x0 (size_t)
[RSP+2F0] 0x0 (size_t)
[RSP+2F8] 0x0 (size_t)
[RSP+300] 0x0 (size_t)
[RSP+308] 0x0 (size_t)
[RSP+310] 0x0 (size_t)
[RSP+318] 0x0 (size_t)
[RSP+320] 0x0 (size_t)
[RSP+328] 0x0 (size_t)
[RSP+330] 0x0 (size_t)
[RSP+338] 0x0 (size_t)
[RSP+340] 0x0 (size_t)
[RSP+348] 0x0 (size_t)
[RSP+350] 0x0 (size_t)
[RSP+358] 0x0 (size_t)
[RSP+360] 0x0 (size_t)
[RSP+368] 0x0 (size_t)
[RSP+370] 0x0 (size_t)
[RSP+378] 0x0 (size_t)
[RSP+380] 0x0 (size_t)
[RSP+388] 0x0 (size_t)
[RSP+390] 0x0 (size_t)
[RSP+398] 0x0 (size_t)
[RSP+3A0] 0x0 (size_t)
[RSP+3A8] 0x0 (size_t)
[RSP+3B0] 0x0 (size_t)
[RSP+3B8] 0x0 (size_t)
[RSP+3C0] 0x0 (size_t)
[RSP+3C8] 0x0 (size_t)
[RSP+3D0] 0x0 (size_t)
[RSP+3D8] 0x0 (size_t)
[RSP+3E0] 0x0 (size_t)
[RSP+3E8] 0x0 (size_t)
[RSP+3F0] 0x0 (size_t)
[RSP+3F8] 0x0 (size_t)
[RSP+400] 0x0 (size_t)
[RSP+408] 0x0 (size_t)
[RSP+410] 0x0 (size_t)
[RSP+418] 0x0 (size_t)
[RSP+420] 0x0 (size_t)
[RSP+428] 0x0 (size_t)
[RSP+430] 0x0 (size_t)
[RSP+438] 0x0 (size_t)
[RSP+440] 0x0 (size_t)
[RSP+448] 0x0 (size_t)
[RSP+450] 0x0 (size_t)
[RSP+458] 0x0 (size_t)
[RSP+460] 0x0 (size_t)
[RSP+468] 0x0 (size_t)
[RSP+470] 0x0 (size_t)
[RSP+478] 0x0 (size_t)
[RSP+480] 0x0 (size_t)
[RSP+488] 0x0 (size_t)
[RSP+490] 0x0 (size_t)
[RSP+498] 0x0 (size_t)
[RSP+4A0] 0x0 (size_t)
[RSP+4A8] 0x0 (size_t)
[RSP+4B0] 0x0 (size_t)
[RSP+4B8] 0x0 (size_t)
[RSP+4C0] 0x0 (size_t)
[RSP+4C8] 0x0 (size_t)
[RSP+4D0] 0x0 (size_t)
[RSP+4D8] 0x0 (size_t)
[RSP+4E0] 0x0 (size_t)
[RSP+4E8] 0x0 (size_t)
[RSP+4F0] 0x0 (size_t)
[RSP+4F8] 0x0 (size_t)
[RSP+500] 0x0 (size_t)
[RSP+508] 0x0 (size_t)
[RSP+510] 0x0 (size_t)
[RSP+518] 0x0 (size_t)
[RSP+520] 0x0 (size_t)
[RSP+528] 0x0 (size_t)
[RSP+530] 0x0 (size_t)
[RSP+538] 0x0 (size_t)
[RSP+540] 0x0 (size_t)
[RSP+548] 0x0 (size_t)
[RSP+550] 0x0 (size_t)
[RSP+558] 0x0 (size_t)
[RSP+560] 0x0 (size_t)
[RSP+568] 0x0 (size_t)
[RSP+570] 0x0 (size_t)
[RSP+578] 0x0 (size_t)
[RSP+580] 0x0 (size_t)
[RSP+588] 0x0 (size_t)
[RSP+590] 0x0 (size_t)
[RSP+598] 0x0 (size_t)
[RSP+5A0] 0x0 (size_t)
[RSP+5A8] 0x0 (size_t)
[RSP+5B0] 0x0 (size_t)
[RSP+5B8] 0x0 (size_t)
[RSP+5C0] 0x0 (size_t)
[RSP+5C8] 0x0 (size_t)
[RSP+5D0] 0x0 (size_t)
[RSP+5D8] 0x0 (size_t)
[RSP+5E0] 0x0 (size_t)
[RSP+5E8] 0x0 (size_t)
[RSP+5F0] 0x0 (size_t)
[RSP+5F8] 0x0 (size_t)
[RSP+600] 0x0 (size_t)
[RSP+608] 0x0 (size_t)
[RSP+610] 0x0 (size_t)
[RSP+618] 0x0 (size_t)
[RSP+620] 0x0 (size_t)
[RSP+628] 0x0 (size_t)
[RSP+630] 0x0 (size_t)
[RSP+638] 0x0 (size_t)
[RSP+640] 0x0 (size_t)
[RSP+648] 0x0 (size_t)
[RSP+650] 0x0 (size_t)
[RSP+658] 0x0 (size_t)
[RSP+660] 0x0 (size_t)
[RSP+668] 0x0 (size_t)
[RSP+670] 0x0 (size_t)
[RSP+678] 0x0 (size_t)
[RSP+680] 0x0 (size_t)
[RSP+688] 0x0 (size_t)
[RSP+690] 0x0 (size_t)
[RSP+698] 0x0 (size_t)
[RSP+6A0] 0x0 (size_t)
[RSP+6A8] 0x0 (size_t)
[RSP+6B0] 0x0 (size_t)
[RSP+6B8] 0x0 (size_t)
[RSP+6C0] 0x0 (size_t)
[RSP+6C8] 0x0 (size_t)
[RSP+6D0] 0x0 (size_t)
[RSP+6D8] 0x0 (size_t)
[RSP+6E0] 0x0 (size_t)
[RSP+6E8] 0x0 (size_t)
[RSP+6F0] 0x0 (size_t)
[RSP+6F8] 0x0 (size_t)
[RSP+700] 0x0 (size_t)
[RSP+708] 0x0 (size_t)
[RSP+710] 0x0 (size_t)
[RSP+718] 0x0 (size_t)
[RSP+720] 0x0 (size_t)
[RSP+728] 0x0 (size_t)
[RSP+730] 0x0 (size_t)
[RSP+738] 0x0 (size_t)
[RSP+740] 0x0 (size_t)
[RSP+748] 0x0 (size_t)
[RSP+750] 0x0 (size_t)
[RSP+758] 0x0 (size_t)
[RSP+760] 0x0 (size_t)
[RSP+768] 0x0 (size_t)
[RSP+770] 0x0 (size_t)
[RSP+778] 0x0 (size_t)
[RSP+780] 0x0 (size_t)
[RSP+788] 0x0 (size_t)
[RSP+790] 0x0 (size_t)
MODULES:
_nvngx.dll
Address: 0x7FFAE12B0000
SHA: BBDA687DCDFA37212C43A4BD9850CCE9F1FB952A9492FC94BB2DFE77D02D39781154AC0621B68DDD97F1E4149E9F5C9AC5CA0A42DD0FF532401EAB11CBAEB0FB
Version: v32.0.15.6614
ADVAPI32.dll
Address: 0x7FFB3AE50000
SHA: 8F3A43C518284C94A9AB7E4E24A5262CAC8B197DFC6C810E7DEDF69EAC5C98E978C3360B8F661D0E4938C91E0FA27EC6F4FD8D2EEAF14530A4B68008685EE73A
Version: v10.0.22621.1
amsi.dll
Address: 0x7FFB2D960000
SHA: 4CFABD93F9704F6D560C2D5236927C1372F8E341B039BC9FDF8A0A06F7EFEC664ADCDC73CE5010A2ADA2994D12D6A8D679CBBD8075352FF0741AB42E1D1CD2D1
Version: v10.0.22621.3527
aswAMSI.dll
Address: 0x7FFAD1A10000
SHA: A6F2680501394A763663F6062AA3A6B8EB0381E674AAEF65BF567A5944E82A98FF3B2137917100D2120C95B9B088B34EDBE775C6523711A2D9469D9371568224
Version: v24.11.9615
aswhook.dll
Address: 0x7FFAE5420000
SHA: C67B66F13204C3FD21F63C742F5503873C3151C40F239656D825C3516754A993E5B05C920F0E1D4E23E72A74BFF17BDC010AAD90ACC0A5A494AB56AD2920A4AA
Version: v24.11.9615
AUDIOSES.DLL
Address: 0x7FFB14830000
SHA: 203FBDF694AB7D878625D6AEAB66AFD1CC04F4857A30E36D77FCB61CA66A8DC7ABAA80FD5DD2287E3A6309725AF480A4C77CAFA1585AE90628D2454EB726E33D
Version: v10.0.22621.1
BakaAchievementEnabler.dll
Address: 0x7FFB10960000
SHA: BD9B907DB16E30FC74B219B129AA75DEDD294F7239222FCFD09FBE498A2EFD60A09CA3BDE021F7AE4FBAF6AC8AC9F9EA6C6DF243D6E948645BE8D26BD959836A
Version: v5.0.0
bcrypt.dll
Address: 0x7FFB3A540000
SHA: FCA82D2A0034F24DA7D6771A9019747614A2F9BBBAC8212B39D22C9654F4E4052958E20E755B96F591692E807784F2BB9D612F0741E1B376A2C9ABF877BEF89B
Version: v10.0.22621.1
bcryptPrimitives.dll
Address: 0x7FFB3A210000
SHA: 53EE624AA4F3EBA079AB163880E6BF030DC20B3EAE926DB87FAE8462F3C5BA6BA06120DD337EA8C138B55966C582A50D34C02E02590669B3329D6219CB1947FE
Version: v10.0.22621.4317
BetterConsole.dll
Address: 0x7FFB0D5D0000
SHA: E147A21D21BACA4B511CA13ADDCBC15818E3CD946CD34A9910E8642FC04FCD7ABD4CD8CFFF15A39E28E0AB516B3E3214F4790DE677D12959F475370DA0415977
Version: v1.4.3
bink2w64.dll
Address: 0x7FFB206B0000
SHA: 61AB61B895332AE98F5491D07975E5D6A1E42747DE1AE292298CB008AB63AB410F8A7684DB7DDA694EBCC351783D68EDB167B4EEEAB74DBEC6C1BB238E62BEED
Version: v2023.2.0
CFGMGR32.dll
Address: 0x7FFB39F00000
SHA: 49888965143C96F2F210B95D16BAD1C039C0470340D8F908EDA6F693929DBBA1E66269B951D402F395185C8EB989E21B28F14244322A5FFDB459B39E462D2EDA
Version: v10.0.22621.2506
clbcatq.dll
Address: 0x7FFB3CC00000
SHA: F82356DD39C9D04C82ADE46F9544B21ED07610ABF9DFB39C5531BCF7C86A144157502A75CEFA15CC82FC8FF9B0FC25CF9EF4EA96BC01C5E12F8D561FACA4BA75
Version: v2001.12.10941.16384
combase.dll
Address: 0x7FFB3C4F0000
SHA: 09F423C60B28B10F50A0055781F7A344036D7A1EAB68D9F658BB080BDA02F05F866A3C42F2D24C5E85AF4F86A19D4E21CCE1D0CCD66A44C74D1F02A73049B820
Version: v10.0.22621.1
CONCRT140.dll
Address: 0x7FFB30750000
SHA: 6E95D9909346A2CD2AF6FE4AE9BA94E5377888988F280BF9E123F250B37E636ED35371A3CCAE4E6227DA6627357374A636A394148DA445BAFA190408CCDAF71C
Version: v14.40.33810
ConsoleCommandRunner.dll
Address: 0x7FFB05140000
SHA: 5F68B9580420F4122D92D98E4C8A6E096CB4E120972A2A896B72C7C12B5DA2FC4A605867EAA1676FC763ABD074548825EE2EA3721922D6B73D3C56230BE3AD99
Version: v1.4.8
CoreMessaging.dll
Address: 0x7FFB33D00000
SHA: B80CCED81E5FDD1FF95EC1565656A8E6F001C262233AA7314E19A2E5B38E8E2C91A30633DDB3058533ADCF1100FEACC2CC80A42E60094B1DCA3C4B0DE45C867F
Version: v10.0.22621.4391
CoreUIComponents.dll
Address: 0x7FFB1D350000
SHA: EC0113A0FB265FA894C82649C2AB624D255161685BED7C11DD6B3468FFE2FFDEA1E6A8DFD4D2190F48D0CE3A3F51AE3658ABD7B409CD57E58B435922972CD155
Version: v10.0.22621.4391
CRYPT32.dll
Address: 0x7FFB3A570000
SHA: 757FE9C4474786C6CC560F32C8BF5D53FAD1342E066FCD404073FD12B7BD13A278E4FDDE6DEA1251D956108F434B2BFA4F3AF1D0FF438D9AE1003FCDF1757901
Version: v10.0.22621.1
CRYPTBASE.DLL
Address: 0x7FFB39A10000
SHA: BB20B86B3C424DB0156791092017E34835C66CCBDD2EE6C939C86F5627FFEBA351E8D8E7BDDE20332D3068F30EE893F02288B8801B1906B8CBB111BCCA0D24C7
Version: v10.0.22621.1
cryptnet.dll
Address: 0x7FFB34100000
SHA: 9D956FA294D7778EDBBC4967D16302383E2F4A92905C43BB61CFF8494C1BACBC052A2D8729FA3600C69A8DA37F90EBEAFF0B4115BC0F5F3E0754508BDE18E9DA
Version: v10.0.22621.1
cryptsp.dll
Address: 0x7FFB39A20000
SHA: B0DE63D441195DF2B7FDEA9DCC4D87968887480AB962F40DF37F2419A74A27062ACE4D8F4823F70FEE5BE329206ADD2C81472A130E300987861CFB65CC786FF5
Version: v10.0.22621.3672
d3d11.dll
Address: 0x7FFB32B70000
SHA: 255F5E5141AE811D24C73BFD6A33E781B08921ADB776D58FAD488CF04E518EA54D7B0C17B45C78A95401D7BDD6C42319BB51D760BDAC99848FAC4087D9F01238
Version: v10.0.22621.4391
d3d11on12.dll
Address: 0x7FFAF6330000
SHA: 357C17DACBBC600625CF1D201C46F525429C0248F12ED1A1FE98D03136F18DE513F3139D9C372663290903DEA02D3D3A56671BFE278B41353DFF1EEA639A7DB7
Version: v10.0.22621.2506
d3d12.dll
Address: 0x7FFB2A650000
SHA: C30800809A566A228867C72190B3E35A3FEBA05997224C6234D908C6DB6EE2C1BB1A2B2989122AA6B3F756D074CBF786689EBB318933C576CE818189D85D785F
Version: v10.0.22621.4391
D3D12Core.dll
Address: 0x7FFADCE10000
SHA: B44437ED5E2BCC9ADF44E7458312C0EF0C7B6548231542F31664B9E51DB932DFD40C8F7D17470ED0DA938D73FEE5ADDBD6184B91A66BD0B8EEA0B206137A0388
Version: v1.608.2
D3DCOMPILER_47.dll
Address: 0x7FFB32500000
SHA: D0F083D13CA42C25CBC4DEC6056845C8BA345B3E4F132090653CFF7A4E84B67EFEFAC77689FD7BEF09165C58923B6AEC30F1CBDFFDF674A00F825398B21E3C2C
Version: v10.0.22621.2506
d3dcompiler_47_64.dll
Address: 0x7FFABE3A0000
SHA: 8F98A3B4A95B0A20A57F50CED1BC62A05834674BCDD54A55818BDBA89CE558EA351E3C37783BFA1A0212438D5F2B19B312A785441E95FBFD9DED41AC1B7FFE55
Version: v6.3.9600.16384
D3DSCache.dll
Address: 0x7FFB2A020000
SHA: 78A36EE90B5CCC76B3112B428CF59C536660217848573B6C6830E19D39E78F08371F4430B1633E493BEAEAFF700AA496F3E290E55E1D5BDF830501C18513B2DE
Version: v10.0.22621.1
Daimos22_BMC_C.dll
Address: 0x7FFB31840000
SHA: A1F1FADF3065DAA7C39FD218E9409CA548A0E00FD473FF03D900EF93D4AB0A1B4313F532E78C1E3825487F0F6E74461F8F2B17E40D6A08B74073994DB33A798A
dbgcore.DLL
Address: 0x7FFB32150000
SHA: 60AAF521309B6B697B5DB66FB6101AEC6DA0B6F59706E2C7622D12339B65393958A35D4CC97B1AD88A4D75D7E30098FAE1F4909FE80340C39104325B7895EA0C
Version: v10.0.22621.1
dbghelp.dll
Address: 0x7FFB37A50000
SHA: 4ADA171665E5E4596A02EDE87EAD13A7C4581DA86CAA173629562F0798ABE05F1CA701D526F59ED923203D156BDC284DE007985B3DE1299E8DF9815AE51C357F
Version: v10.0.22621.3593
dcomp.dll
Address: 0x7FFB333C0000
SHA: 0CF3941BC587B39688DF7D1E31915F487BBB7B66E1FC0AF659D4BD4E5728389CF7952815EC858F1C8957C38C8F1FFA4675052C9EB46601C8E55A95278113CAED
Version: v10.0.22621.4249
devobj.dll
Address: 0x7FFB39ED0000
SHA: 5364886DFC402E74153B7EC2987BBC041B615C3AB2FD74EB161B6B49EEDD2F7538D2A56D0B06E99984B3E1B745E9DD04BB90099EB37E4BF31F0006C022630681
Version: v10.0.22621.2506
DEVRTL.dll
Address: 0x7FFB31C40000
SHA: F776E1810BA33A3F7097E21E8F1779A8C1CD899B9A6455F13C605B363A3358C4A01AF367132C6E792735A02066AA16F8BEAFCE4A3753A2196EF9ECE819676687
Version: v10.0.22621.1
dhcpcsvc.DLL
Address: 0x7FFB351E0000
SHA: 0D2FF4781343BD06D9DF0862195DD9C3EFBA01C16D86978CFCBD9586D8A36A688132EA6E8037E89E57CBEE6BCDD9D7D0BA315361D7F9FE156C1684C9FC455848
Version: v10.0.22621.1
DINPUT8.dll
Address: 0x7FFB1FE00000
SHA: B1F50A3AC4833CE262CEAE40E29F6D02CBD4519A0542522FEB66F3972ED13D0FE146332D3F411D125D21E90601B01E9575A5B25CB2D7ECF570ACFDDBA34DE863
Version: v10.0.22621.1
directxdatabasehelper.dll
Address: 0x7FFB27210000
SHA: 910265FCD602DA066118142D23D26573EEE60C2E1FCF1F2F23563F10E254AF930AAFBEFDAEB718F23A83EA12CEDB4A0B6AEC298A8E4047F94326D28D2F7229B9
Version: v10.0.22621.4391
DNSAPI.dll
Address: 0x7FFB38DB0000
SHA: 029E529C1A88B120B9B4C43AB8BDEEF40A3137E597DE594A31D4A30B94E0E2BE2549F62DFDE94263B4B68BDFB5C466010A387AB4BC662188ACE2D6A1D0E3D9E3
Version: v10.0.22621.1
DPAPI.DLL
Address: 0x7FFB39F70000
SHA: 2531BC636C0722966C94B8B9DD154800E16AA7C67C6256AA23794A437E215BE56DA3E6AAB61E156839AB4534A7CDFE1E2991934365F24E50FCCDBDCE2176CA90
Version: v10.0.22621.1
drvstore.dll
Address: 0x7FFB33770000
SHA: 0409C32E38BFCA7ED379C94F5A687167B8B8EA4E542C23BBF286653FAE1A102F698A16ADA4DE5E625C4558384A6BD58543CB2609786FE3269686091771D552DB
Version: v10.0.22621.4391
DSOUND.DLL
Address: 0x7FFAE0CE0000
SHA: AAF8CA5B8C80EF990FBD1DC6A4FF41175A433B3A6547622EC1576B1689E7A322ECCB74E9F279DA61D035494DF3EEAC99BD64CED7CD45DBBFBF21EEFC84E97800
Version: v10.0.22621.1
dwmapi.dll
Address: 0x7FFB375C0000
SHA: 344E3789ABFDA5418FF84052514E9D6FF0A4FA4A1C29EB078DE68FBCCA6407DDBA2A54FF5E34BEBCBBF1F635DD6298D9934845458ECB48B156C38AA00304FE3D
Version: v10.0.22621.1
dxcore.dll
Address: 0x7FFB37370000
SHA: D6AE096036B9F39D0CEEB56327EF27763B61EC749F0A42D79DE45CA70FF101B55710B83D9BF21D22B7CE43C12CD21FD91ECE6A613A6356969174C496EBFF2B25
Version: v10.0.22621.4391
dxgi.dll
Address: 0x7FFB373B0000
SHA: E751C589041D20B47519DE74331EC89F73F5FFDD0B67248B139503B292633B0689F4A8306244206AC7597F3A371C4B354758929216408A0FB5C8DEA81AB8B47D
Version: v10.0.22621.4036
fastprox.dll
Address: 0x7FFB2DA40000
SHA: 8FBD098A5918015C6A3E6AEDE0F954CBABAC980177346D6FF2565F53F28B14F2A1A3377FCA2272740E36DF8691D16D44627C585E0950080E7CE089330543C35E
Version: v10.0.22621.4391
fwpuclnt.dll
Address: 0x7FFB345F0000
SHA: 0D480CDC9B320B701B17E23127A016957409F066E879D2BE31FBB2A0D610D66C4C066BF98375BB7E2BB01237104E61AC5991A6EFB7BFA326F8FE793DABEDC8CD
Version: v10.0.22621.2506
gameoverlayrenderer64.dll
Address: 0x7FFB00ED0000
SHA: B77C73F41B8560FE648F07CC386086BF38FB2D73EB5AE7AF78B047A610789FB3D4A73A2693F267E2E7DE390A94E71E6763956B1D24EF00F55302400F46B46E07
Version: v9.38.28.26
GDI32.dll
Address: 0x7FFB3C360000
SHA: 64ACC27DFD47368408BC8FC683F66BD9DAD59C7FC79971F515C501465646C4370B792F0696B97493267FA7F85F7BE29F5B67E77BB4BAF5A5F4D67BC3934A125C
Version: v10.0.22621.4036
gdi32full.dll
Address: 0x7FFB3AB10000
SHA: D1753D5FD3AD805DE7B9A9B271BCBF01E26B7706C403C3447B49CF6969FF642FCC489DBC74AB7806D99BA43A53AE1A76034EFFF4E99B091F5BA5908E7A2AA743
Version: v10.0.22621.4391
gpapi.dll
Address: 0x7FFB39850000
SHA: 93C9C09EE978C2AFE25B4397B2D73DBCCF8039BD46D158C493629D912E6FBFFF0C7DC2E44C144FB9157EFE7A6B3BD1BAC17B0373755995677C184429A2850D06
Version: v10.0.22621.1
HID.DLL
Address: 0x7FFB38A60000
SHA: 9E10C2F2137EC58F25E645B4DE81AF9E271D541ABD8DEFCFA6189D02609E0B4BA97544E3FF2917116735840E4A9F35F5C6ED70B9B0042C2FF991BC2171B91D99
Version: v10.0.22621.1
iertutil.dll
Address: 0x7FFB2BFE0000
SHA: 41970D42E35B30ACF09F0D66AF08469342CB70CFD9D1B17AA27DEF395925D5D8EFE361E292A950A1F1EEC1927214D58729F6F2788AD83481CFAA1330F64F4A11
Version: v11.0.22621.1
imagehlp.dll
Address: 0x7FFB3CA10000
SHA: F85AFA9E507F82C34E27325C85238102C0DF17B255D95F4A7B3FE6257C4B2BF3647C74950C9C87D446EFEAAF2200230D980DAD98D9FB3501FC07F3C0469F4874
Version: v10.0.22621.1
IMM32.dll
Address: 0x7FFB3CBC0000
SHA: F247393C1AE1D0A0BF01571B26C743A9444F44B0E71C1327447AAF808F8FD0AD3A108708021D0E11AF9E0623D8DF9A5C2C814CBC0E700F6F7504D4D151138D0B
Version: v10.0.22621.3374
inputhost.dll
Address: 0x7FFB21A20000
SHA: 7EEEB46B293424AC0B5FBCEEA309952E5DEA74FE6A15F8AA0014FB5CC637954FC4B8B9CCC5EAE6FECAEE1F11DA267A2197469B4AD4082D76624A519886E5FC31
Version: v10.0.22621.4391
IPHLPAPI.DLL
Address: 0x7FFB38D40000
SHA: F65711439F5C50CD79295CB987757CA203C8AD418A807D5C0BC912E6D62133E89EB3725DF10998D8FE0589A5C9FF8A6E5303029BE0BA6C5935A1ED8C6C1D0E15
Version: v10.0.22621.1
kernel.appcore.dll
Address: 0x7FFB39340000
SHA: 64397B1FD0344BE78054711E72DD954503A0E4E3E123C13FD3E5CBB0ABC8779673A3D4A08AEBCDAA7A024AA15DA0BCB38C9A20E3353BBAF2FE4002E20413E58A
Version: v10.0.22621.3958
KERNEL32.DLL
Address: 0x7FFB3BAC0000
SHA: 3FB6807C1092F412042FD50ED8244B7F31C142BB58F17CD9E8673B5759A9027684F40A68EE236395BB93376DE9D94690ADDD344692CA5F8F0200B535BF0EAB3D
Version: v10.0.22621.4391
KERNELBASE.dll
Address: 0x7FFB3A750000
SHA: 579AA2199D4C6E158C23AAF92A254046C13FDBAE88A30FC22DF6AB716FB55F71C88A1FE74B75B00FD47547AB42AEFB202B6AA826D32AFA1388D08A24CB9B2924
Version: v10.0.22621.4391
libxess.dll
Address: 0x7FFAA6DE0000
SHA: FF63203BC0DF4975771A13622CB88617D0B90EDA81BC22A1BB21BDEF5E60DE89A959766ADAE453D447449993847BCA211E9FDF32F068F5D4DCD3C1786310833E
Version: v1.2.0.13
MessageBus.dll
Address: 0x7FFB05230000
SHA: 0783076531BF04E0AA7E5DEBFC0D1403A7D8A05DBD7EF524CB3DF7BBAF6BD13CA611742BB229BA24103DC1147BA69A7E26FDC46F2BD64A159A328C8E6B20CDD8
MMDevApi.dll
Address: 0x7FFB31B00000
SHA: 025B359050759834C4AB27336D08A5B9EE0B5049DBDC6E918A500548F074A839AE67264A1F67E1C9819A4F42B2F71E65F8D52092FB5DF7F75DE8B862FA9E40D6
Version: v10.0.22621.1
msasn1.dll
Address: 0x7FFB39EB0000
SHA: 8BC051B2C0A9D7ACF7199786F7D7B8F9AD844FBFEAE975EC37446EB39626C9092C149F292FB8F0F8F1383F97E66D7A6E729295AFA2DA5601E32488FF500B6FB1
Version: v10.0.22621.2506
MSCTF.dll
Address: 0x7FFB3C880000
SHA: 05160AA9E762B48813AFDDA9DB404B82E09CA06A2C652A81F22BEE17C93B640425DC4456536346CB9B49702C0486FBFF018C99C69F23569BC99CA2C9C69210BA
Version: v10.0.22621.4317
msdmo.dll
Address: 0x7FFB315B0000
SHA: F84E214D0AB3CE95B79C8FF0BB0F76A23F616437F593D885DDEA40AF6F6239E7B5DFC67D96626F2FC67959FD4C9E33606D65EA876FEB44131ABFBCCF1FA2A8BC
Version: v10.0.22621.1
MSVCP140.dll
Address: 0x7FFB23810000
SHA: 6D53634BC51BD383358E0D55988D70AEE6ED3897BC6AE5E0D2413BED27ECFF4C8092020682CD089859023B02D9A1858AC42E64D59C38BA90FBAF89B656C539A6
Version: v14.40.33810
MSVCP140_ATOMIC_WAIT.dll
Address: 0x7FFB359C0000
SHA: EB4B035AD1A7750B213A8D7AD4D026A09BF2E2A934C60434C43176565E24CCDEEC5FCF2C8A9B693021BE435A64D4682B951622B4037F444F4ED32DB8B3669267
Version: v14.40.33810
msvcp_win.dll
Address: 0x7FFB3A4A0000
SHA: 4646B1C9633FC03E5AB6CB90C977CC3D778E73D8ADE58D019C22CA11A3367B8FAA3A18A4E2F4738A75DF80A5A788F956A2A0C33DFD6B48272674D03899A9F5D2
Version: v10.0.22621.3374
msvcrt.dll
Address: 0x7FFB3B070000
SHA: 0AAA0877CBD1FF9CCDF5CE8466DBC968D17A306384DBF87F9BD2281B585149B0821B67B8CFCDDFB8BA2C4E6B78C5B7C163B31A284DFB90CF4D027D1BBF4BAFBF
Version: v7.0.22621.2506
MSWSOCK.dll
Address: 0x7FFB397C0000
SHA: 4854DB2070AA5DECAFF796C2049B2BB725BD4DB63DC6A25FF24B89AB725DD2FC251C0C9D24B75363906101DDC2981AB791467A17465337544F1D7FC1D5A94E22
Version: v10.0.22621.1
napinsp.dll
Address: 0x7FFB0AD40000
SHA: 2E4AED6935FB2A52A6793523A91305CCE4B9F40C2DB9A0F82765BF3D36DF1B2D9CBBF4BFCED5537F4C93052241D154FA0940441F680E7F374273F0D0B47CC5A6
Version: v10.0.22621.1
ncrypt.dll
Address: 0x7FFB39BB0000
SHA: 6D15C8C7A630C500D77C6D01396C7128250262C2F5946232E95DF9DD981BCE92F909943EEC09C1A69C2C41685C4933562E8BB859654FC7777585CA7C3C9A0DAD
Version: v10.0.22621.1
ncryptsslp.dll
Address: 0x7FFB2BE50000
SHA: 71CCF5B407BB5D5EE27A0D13912B39883BB1943629296621D0BA34AE8B9C82A41BD812F18560B2908B0AE4C1E209071D761D6B8C191C10976FB43CCAD811038F
Version: v10.0.22621.2506
netprofm.dll
Address: 0x7FFB36C80000
SHA: DD71992A74E449B170EC3F0F43845BCE893F2AA98F249F0D1CE5A94941B1BA6E0AB630E23CE34520165868688050EA62A88D653AF380D6AB2E11C66C6779FADA
Version: v10.0.22621.1
netutils.dll
Address: 0x7FFB38D30000
SHA: 5AA288FCFBECD42FAFCB4A487B6BD5DBAECF9DA2E40D822F8158FDD5BDA1E6DC6B823981C0FD612809C883A244AE6E921F06C51F800F1AE9560E80FEBBD8ACE4
Version: v10.0.22621.2506
nlansp_c.dll
Address: 0x7FFB07A80000
SHA: 6C6DF2219E77A29C59808FF1191543EA7C41861C9B01FDC106C1391EBD3BC897D8FD914BC461F1F5D68D74CDD644BB32F4FDBC2D3F115335AC739AE8923632AA
Version: v10.0.22621.4391
npmproxy.dll
Address: 0x7FFB344C0000
SHA: 78E57333DB7E243F92B917E7135FE5960E91A1B678D8C5F9B655FB1D90DB8B7AABD751E2F0D753AB86C92929044CBE4DAC47DD3D38AEA3985FA9896D78F1795C
Version: v10.0.22621.3527
NSI.dll
Address: 0x7FFB3BE50000
SHA: F22EA147F31552A36EC647796129C17BE8F61BC2CD40FCFF05B77CB8749C142EE121C5E28ED5432EF235D509E53A3E738EE9CDBCB25D5987EE296EE0CB192059
Version: v10.0.22621.1
NTASN1.dll
Address: 0x7FFB39B70000
SHA: 203657805FBB142F95915CE0032A3518A165D384E472C6BBD9B97921146E48386A1DF75F9025A77ACC79D06AEEDAEEAC39643B859FE763964315FD97F6FCE874
Version: v10.0.22621.1
ntdll.dll
Address: 0x7FFB3CF10000
SHA: 751D2B693BCC1FDF883717DB4D8220EA4992D3E345D409A8A7FD8594E870C296AD5A652C465C836631F0F02EFC7DA1797D7ADF2589625A7015F8A55A13EACF68
Version: v10.0.22621.4249
ntmarta.dll
Address: 0x7FFB39450000
SHA: C086490EE7AD1B25884378823E54315D3ADAF9E7EAF0966F4C1407C4D54C2D98486E2034EC6323DC76204058E3D079D69EE518F0946A7893C1C38FF212238BFC
Version: v10.0.22621.1
nvapi64.dll
Address: 0x7FFAFBDD0000
SHA: 2A9CC855A8CE8D8DB167BF9E748EC67FCF1F8BF9E6BA09FFDBF6847BEB697CBC227328F6B4C59B697D131C1CC0E38B08FF3639085CCFDA559CDEF2C071E34047
Version: v32.0.15.6614
NvCamera64.dll
Address: 0x7FFAC23E0000
SHA: F7D7F30C1BA56D336AEAE06C6006698FAA90186C4EB7649603EDE8C1A37A5EF844C62880415AF59F8035B3D975B3586DC373EAC0CF86E736CA5F5B6E48E6B8B1
Version: v7.1.0
nvcuda.dll
Address: 0x7FFAC7930000
SHA: 008EE0BAF6BD5EDC4D7D3FAB43134C7A1F4BFD4D424B0ED9E36A7EC25FF507CD88AFA2D191652AFF96FA2E0C708A10181398B39E7DAA4F16894C60DC90F1EC11
Version: v32.0.15.6614
nvcuda64.dll
Address: 0x7FFABF210000
SHA: 16B8F8743278B4C6648E2770CF8DAFD9E534F828B0CF40A1B1878A83D048B1193EAA524450B5FA2738FDF1E756016E96C214BF04FABE7137BE0A63669CD39331
Version: v32.0.15.6614
nvdxgdmal64.dll
Address: 0x7FFB06280000
SHA: 0331D6E2EDFDC7B6D0E1427148009084D4B981F425CF716CB1E76061148C4B876E7F146E3D27A632910BDF4FF548FF407C3C657C54D9573EFBF474CCBDB699AE
nvgpucomp64.dll
Address: 0x7FFAA2E50000
SHA: A50A985DE0F2060EBE708A9200A2F208BAC79878B6E3E9CDAEBF7B47C304863593D9736B787E39A535DA0C176207EB16021C818AF2903D98A35B63FD99A4BDDF
Version: v32.0.15.6614
nvldumdx.dll
Address: 0x7FFB270D0000
SHA: 415A5DD90DF9EB3803ACC4A7829341B2EC811DCAB9FB0DB050A2CF5A46390332F78D6029753367F150AB22E7F56CDA9F23616A5E245CD6331B855526399479C2
Version: v32.0.15.6614
NvMessageBus.dll
Address: 0x7FFB2DDE0000
SHA: 3278F8562BAC098FB609123CB55F3F64D9F8478D266B9F351319E2D373F578318CE37F66B2812FC676D617E83850376B3B30AB3D93426BF6B5FE5B928B83032A
nvngx_dlss.dll
Address: 0x7FFA9FCD0000
SHA: 56037EF9ACEA29A074CFBD63D2F4B15325864DAC8F871EDED336D8EE50A4EDE7652212090009420A1A8E2EE4541DB238E17586DD0246FEE3F6A935B140B68BD7
Version: v3.5.0
nvngx_dlssg.dll
Address: 0x7FFAC14B0000
SHA: E7E49E838D14190D80B748ECD6168F58C64421B50EFFA9F930C08F28BF24ADD8D88226E0268B63DB61B80385052BA991AB24626F517F96C99B6B8B8670319751
Version: v3.5.0
nvppex.dll
Address: 0x7FFB1AFD0000
SHA: FA4D9BA15A8ED57D7C52CF8E92A0B1D94F75495B3D3C2B7B10632EFC995FE1C62575C7BF8C4F7198F3359B116B161CF129EF88FCBBE447B510A17EB7EE5DB45E
Version: v32.0.15.6614
nvspcap64.dll
Address: 0x7FFAE0800000
SHA: C7FEF0DED9656BEA8C3D13790E5A83E50A4EE312EF5194C3692CFCE130A6AAC862F7B93DCC7DE228A1A6EABFB7A8CA43C615CEE3919EFD7FE48918D47385AF1B
Version: v11.0.1.184
NvTelemetryAPI64.dll
Address: 0x7FFB01270000
SHA: 8FF86731C012A317C76C5A698008FA9AAB080B5E35CCBA530476C8EDA8171D54EFF8FF7B1593F3EE242F9302FCAC07936CF32215C549DFEDFB4CBAEA6D1BA1A9
Version: v19.4.12
NvTelemetryBridge64.dll
Address: 0x7FFB29460000
SHA: 21D85DF682F10793114F1DAF07D06FFD4FEC40BB5C8FA6904971FEE33952548BE5522726D8D588CE9C4222A125C6D692FFB9384D2709AF241FE7DB6DE3C164DD
Version: v19.4.12
nvwgf2umx.dll
Address: 0x7FFA7D3C0000
SHA: EEE2B922A271D95144F92083D9F53C30A43F1D327822A176F59AC0F6C28392F026420C3DC6BA5A18CA3475AA5793F5694D7428FAA6D049F1939275DF45405351
Version: v32.0.15.6614
ole32.dll
Address: 0x7FFB3BCA0000
SHA: 4F68EAA30EDE930DB6AEB04D3CA83F8546C48828A36B04A4D2108F2492D9DC3A2230FCE1DC9B7D9E95EDAD39C8B859CAF5D35CCC7F333392E2C25041C91EB1A8
Version: v10.0.22621.1
OLEAUT32.dll
Address: 0x7FFB3C410000
SHA: 4E49E803897B110DA04A97275B68A863350C2E6FC2D1242E3AC1856DCA9428C29C1C20A4FC14DDF9880592279DB81E57C376BCD8CA3E13E52871527DEA157861
Version: v10.0.22621.3672
ondemandconnroutehelper.dll
Address: 0x7FFB19220000
SHA: 573325EE426F6172427556AEA69C30046655BF34734E6BF74F58A0A6A4223A9AAC647465B1CCD8005246859E1D8CBF8C02DF24D665FEBE6E59B8DF2D20C075B6
Version: v10.0.22621.3527
pnrpnsp.dll
Address: 0x7FFB0AD20000
SHA: 472C3B112C7B70C694801C9FD4CF8493E3205C06682C58B21F06F8A79B4D4DBCA7697B81A1CDCC9088F533B18599D54C5D898FC04ABD8CFC5C69FCD36739AB74
Version: v10.0.22621.1
powrprof.dll
Address: 0x7FFB390A0000
SHA: 624CB3D2CCAF9CF7C94AB9B1A5A2AD139E082D0ABDD836CA2A0F92C98B9D87A1EF394FFA1818393B73C90ECADD1FD9F1089DF158859BD005856FBDEB5EEB8B61
Version: v10.0.22621.3374
profapi.dll
Address: 0x7FFB3A140000
SHA: 5E525BFE767D8347244385A3E9B91C2EF26E1AB86593608F5D4F5EAE7C87A3A4C0A915BB2D3F686B66508B24DA273CCFCF5308A780294E3FC00FD66A0D7C3E10
Version: v10.0.22621.4391
PSAPI.DLL
Address: 0x7FFB3AE40000
SHA: E9F89DE9A1AB74BB4358FB636C389356554C84AF4128BC5834681BBFD897D69B12FE5B1521F3846D65726D4E1C62DD87EBEB7DDD3BB1FA940150F9B5AF19FB17
Version: v10.0.22621.1
rasadhlp.dll
Address: 0x7FFB35910000
SHA: E1E34DF6475CA787D2340A340659854D2144D72BE0856C3262E98E170843E7C26874544ACFA5D186623C1C8DEC70232FC73033416F3E2A9A4076EF0820356681
Version: v10.0.22621.1
ResampleDmo.DLL
Address: 0x7FFAE0C20000
SHA: C6F24BA3BCD0FBE293293BE4166F18CBE9EE1F97CCAF5DBAD7B758D0B7C15FDE1E26155E07A077324B3D06B483337CADC8D2A10A4ACE00ECA69881608D770046
Version: v10.0.22621.2506
resourcepolicyclient.dll
Address: 0x7FFB37730000
SHA: 8A7DF98B158FC4E2C52954171182AF32D4867B7AE8FE249D016C4F673A429A526207B77F41AE396B2440402565E77F51BFBFD1ABACD404A89F39C93921DFDDB8
Version: v10.0.22621.3527
RPCRT4.dll
Address: 0x7FFB3B120000
SHA: A896819F1E5AF2DDED42780C1D372900907D20F7619AE60E35DCF3C7284761CED4DEB3F8D844B7DA445F5C0D211879573981AAA6108D44946F52585D9972AB96
Version: v10.0.22621.2506
rsaenh.dll
Address: 0x7FFB392A0000
SHA: 9F2883635FDE2CF2C616AC7F9E22B574967397403F8E481D82573298DA36C869939D885A34A1192415B4D94E9886072AC8724D07D3782C962F3076944B1C60AD
Version: v10.0.22621.1
schannel.DLL
Address: 0x7FFB39190000
SHA: 62D54ED0940DADDE58945B3DBB2CEC50B05334A9C14FA9FDE363EBF6ED6323186E0364DD32110F8A647A48595B0D3FF4EAC4D03DDB3D7C8A439254FE65554114
Version: v10.0.22621.1
sechost.dll
Address: 0x7FFB3BBF0000
SHA: EE22C8D249B17AB34616A425D5DB6A2F5319C6542D26A4AB6C18F5219C4C5275876C86BC92ABFAEDA519E26FDA077BDE275D1833938E9F9EC5F85A4A23F1B841
Version: v10.0.22621.1
Secur32.dll
Address: 0x7FFB39110000
SHA: E296A462AFD8980A9497EF9E1D3EC4F81285D450BF8A8BCC3AC056A39F85B0E12F59653688EBE60E302FA5B8819F4ABACE722C791954D3EA81D85182E85264CA
Version: v10.0.22621.1
SETUPAPI.dll
Address: 0x7FFB3BEE0000
SHA: 4C618C9C7E16D701A03B901AF668E5927E8BAC2CD160D1D072EFCD2EB9DB62ABAA1422A57B19F9896A2E6CD8D64DC8A80BD1FC54302447601CBF94D977C62CCA
Version: v10.0.22621.1
sfee.dll
Address: 0x7FFB04170000
SHA: 91CF1E24CF384285CA8CC824087C811C932730FE6C39443D023CBD5D46E35265789B7604E8C8B7FC51BC170CC13BE8FC9B7CED12632E2C1C1FEF5D5F0D17FD66
Version: v1.1.0.18
SFPluginsTxtEnabler.dll
Address: 0x7FFB15AA0000
SHA: 1D6E65F1E00F6E69B271DA0C1CF8AF28E9F2C6BD22ECEBA3EEB3E0606DE853164C09E083A73847E999D93FE8576543F7E35F0B252F644E79B8E5C18E5502B746
sfse_1_14_74.dll
Address: 0x7FFB2E630000
SHA: 03BB3C30F8EB54834EA3CB180DBA72CF144D7E5EF821052F8A5FE6AF3D28A9897654CE8D87E0308B40895ACD6FA6E949BAC223C05DE3D775FE5C06E66150917E
Version: v0.0.2.16
SHCORE.dll
Address: 0x7FFB3AF70000
SHA: C87DB1D6A65E53D39636E7364B294FA45329904274964070ECC17BADB99CB902C9490FFF7F24630C3CD22DE32902C7E19C9AA165F089E9E6D8D5F2A9785AB4B7
Version: v10.0.22621.1
SHELL32.dll
Address: 0x7FFB3B240000
SHA: 251A618BDF5A1B5AF56784D28434409D788FE4FD1A9DFC72521D88CA27A7BBD2526266FF91C24CFFE206142B65444B6D6C0D4597351007ADE68669A6A5F8E6E1
Version: v10.0.22621.4249
SHLWAPI.dll
Address: 0x7FFB3CE70000
SHA: 8ACA03769C06CFC295F41CF3B09E2F8DD0114DF48D326E0550ED8AE7B44B76594B8678F0608CBD402E75072C266350D55450052E4ED4160532F4A79B5257D96D
Version: v10.0.22621.1
sl.common.dll
Address: 0x7FFAFD9A0000
SHA: 843457A2F9F0BA83B6C2FEA37FB05F1C52F715C2046232C904DF79B1ED30F3725B967163EBFE5B3F01DAABBD9CAC27799C80DBF8269211F5319FD62F3EEF7B3E
Version: v2.2.0
sl.dlss.dll
Address: 0x7FFB26220000
SHA: 54B6D2F71B8D16114AE1A576A37E64683BA91CD8BB8AA379706D5AE21DF4571B6B4126F1085E6E5A2448D7E8B169539642AD5D7A31012C4FDEB9AC38B62ED7B8
Version: v2.2.0
sl.interposer.dll
Address: 0x7FFB20DD0000
SHA: 4197A38D36FE41A21B11814B00F17F5BF2AE7F418DC5CCB94A6C097615B87B9C5B530DFA0296CA0580BB5618D0AB43AC02C2E1FC08E07D55B5E8BBFF8DA7160A
Version: v2.2.0
sl.reflex.dll
Address: 0x7FFB29750000
SHA: C5DF9877DEDFCC443ECAD9A8EA0F10C5DC8C97C4F6F10A1BEA1831AF6EB27D89C695F67B55E451603A6550EBA084E0CD7B676FE8C56E302324025D9A97ED7FC5
Version: v2.2.0
SPINF.dll
Address: 0x7FFB2B070000
SHA: 675E09DAA5DA999ABD859B10A3FDA32D33F74B61BBDDF49BC88CB35B365D535459BF170A2E8ABBA503B00AAA1F2849D1F7D242D2F7F4A13E665E44C807678185
Version: v10.0.22621.1
srvcli.dll
Address: 0x7FFB2C2A0000
SHA: 8F2FCB418CC0484BD092BB500B36AC2F0AA6435E1F1693C13C44A24E54A1C9F53B4728EFC6E6339F26BE3F781995379A178461C52107B2A1336C74DC9D69F512
Version: v10.0.22621.4249
SSPICLI.DLL
Address: 0x7FFB395A0000
SHA: EF56182FD07DDA26E24F26A8D132C8698E5D72FCEA33C55A6A06005BF4D08F8B61A7686F4AAAE94683C2F39B0276D77DC23C7F66436CAA48A573FE673CFB2E13
Version: v10.0.22621.3810
Starfield.exe
Address: 0x7FF6D1140000
SHA: 5D1F236406E6AB1E079046ECDC92C3848DF121CE3DBA463E02469D42502D93AF72C608588E232BA9720B868BC72CCCB658C9877ABA4CEDFE5E914EBB387A2178
Version: v1.14.74
StarfieldEngineFixes.dll
Address: 0x7FFAFCFD0000
SHA: 455D28BC6F00EE59F08F3B31A2B82761BD65DA79CE3B607399AEBECC165623608804B369A49A90B5E906B77C4876A57E564B42A852E9DEF2E68E8DDE0723405E
Version: v6.2.0
steam_api64.dll
Address: 0x7FFB30F60000
SHA: C08DE8C6E331D13DFE868AB340E41552FC49123A9F782A5A63B95795D5D979E68B5A6AB171153978679C0791DC3E3809C883471A05864041CE60B240CCDD4C21
Version: v7.40.51.27
steamclient64.dll
Address: 0x7FFAC31F0000
SHA: 27D76247E8DC43D999E417DFA0768DBCE192C2FE3B7E9B90B2055B3A1A9BB6934B6C667A70A5046546A4B2E9A621337E40EC2D46D2332ACAEF3A92BF8AC15E65
Version: v9.38.28.26
textinputframework.dll
Address: 0x7FFB218D0000
SHA: B31089CA2460C790B1798703B63283C8BEA493E3F9B59B175A010A86D377994E5B5451B40F098D25EACF0F1D7A9588A0F2AB5692CC9295A559C4C559E585CD19
Version: v10.0.22621.4391
tier0_s64.dll
Address: 0x7FFB04DE0000
SHA: 96C09A9F4130FF8B2DF63A71A04711809049153A17147011A51CA80096DCF5D296FAD9B6CFC598EAAAACF22665958C1870F6D29A30722CB109A3B5065E7A913E
Version: v9.38.28.26
trainwreck.dll
Address: 0x7FFB04CD0000
SHA: 261801A85D41236E35C820A78E4BC3E775EBF0C19336EF1D518A61DA20429BB30B707181606675C1BC650D678CA0A27DC585DFA35BDDD717EB830459BFF60333
Version: v1.4.0
twinapi.appcore.dll
Address: 0x7FFB1BD50000
SHA: 505B1E76CA814583BE926F9051F46282B66FCE9F0551D364A7EE3C13E4D7F88CC6565CC38AF3EC5F618B86804BDFAB5D87608248C2DD047C454519C7DF4609C3
Version: v10.0.22621.1
ucrtbase.dll
Address: 0x7FFB3A290000
SHA: 7F0563E814CC4AAF292683403888340BB5D95E6A7BDD35D81EEBBD10BFB8E4E5130D0A626B8FB07FF3CAFAAE4A2698CF7103AABCAE74E5D13449DB482EC49BC9
Version: v10.0.22621.3593
UMPDC.dll
Address: 0x7FFB39080000
SHA: 8981D794A568A6674E504AAAC4FD9C6CC9A04DA5AA7A870E4107D2E157786D6BA51C48C4E177B31C09068D03F28715DE27790EB0DACBA2F3297B7AF3A8A1BF97
Version: v10.0.22621.1
urlmon.dll
Address: 0x7FFB2C2E0000
SHA: 02445BD02531502E30C3FD61BA2B16718D0888050E145C0D020924B90A9DC30B6CC03AFE377669A2ACBE44B1609074A6A0DCF1FA3E48A6F4D1A47552A6166462
Version: v11.0.22621.2506
user32.dll
Address: 0x7FFB3AC30000
SHA: 25E71575EE47F7D6676FF51136887296096CC0601BB78323124ED2394180550BBCC6625534F8DA30E6C4BE9D319FFAD4AD6D5FF3D347E44FA3766B9053F1796D
Version: v10.0.22621.1
USERENV.dll
Address: 0x7FFB398B0000
SHA: BCDBC3F7B06797315E0DDD55EC0E3F39732391C0100D5260D409C8E78379658096D20476C493D67ED4FA2CA2DD51787C1DADDEA228D2E22077DB3D46E25EA11F
Version: v10.0.22621.1
uxtheme.dll
Address: 0x7FFB37220000
SHA: 2F15DFD2AB9E9E89C16AAA43F7A3C89D22DE940E20D5328B8BD4C31DED2A5E82C5CA898706D09C5F7A0CBF980C205E6C7D2D88BA5148E63CC24CB7003087ADE5
Version: v10.0.22621.1
VCRUNTIME140.dll
Address: 0x7FFB28730000
SHA: 32AC84642A9656609C45A6B649B222829BE572B5FDEB6D5D93ACEA203E02816CF6C06063334470E8106871BDC9F2F3C7F0D1D3E554DA1832BA1490F644E18362
Version: v14.40.33810
VCRUNTIME140_1.dll
Address: 0x7FFB28720000
SHA: ABBD3EB628D5B7809F49AE08E2436AF3D1B69F8A38DE71EDE3D0CB6E771C7758E35986A0DC0743B763AD91FD8190084EE5A5FBE1AC6159EB03690CCC14C64542
Version: v14.40.33810
VERSION.dll
Address: 0x7FFB34140000
SHA: FDB97254817D6793A4C5854A4CFA53DDED1B25E578167C2AB9A8EEC67396F4CBC825ACBF61D915B57998C415F9A00F1AE2C40536C53EA45D4037B64F3E1343D7
Version: v10.0.22621.1
vstdlib_s64.dll
Address: 0x7FFB1E650000
SHA: C3C0092F6EEC47BEA1D3F5F4D2C66F9B0D48ADBFBC98A9D66DE89D050A04FC002164AFC1EC48ADB8AF8C61B597550DD181C634B15012E5C97E81DFFA766A71BB
Version: v9.38.28.26
vulkan-1.dll
Address: 0x02B10E310000
SHA: 5C1BD98FE58A69D88674C0D827FF981A5DF844CD5D0A8AA9E8CD7A98E259F6FD39DA942DE8727978F6D530591759D2B3795A441C1CFF832D979517691A93679A
Version: v1.3.290
wbemcomn.dll
Address: 0x7FFB31E60000
SHA: 2FF9B8EC7D0F3A167084E4AE0FCC936008BD7D6690B59F601D75E5C328ADDDC67496461A53F8B4BDA755CAEFEAA77E4038AF7CF93DA135590C6C37A9F52DD055
Version: v10.0.22621.2506
wbemprox.dll
Address: 0x7FFB31EE0000
SHA: 0EF373EAF240CE872BEF5FF7BF88C3199AD92DF701DD8CAB3E6E8C6480A22CC9FD522E487AA651F45D714C48B1E54608AE143ECF356801D50F4F264D404F1B36
Version: v10.0.22621.3672
wbemsvc.dll
Address: 0x7FFB2DA20000
SHA: C0C9CD1006C4FA0C62EC0845D84438E5B1D1D82B3A2DC99CB3858375E4C2380F6A3B78F852CCD811F1A50A2EB28E4FE3FAB0F0C5342A9470E8B61DD589271611
Version: v10.0.22621.3672
webio.dll
Address: 0x7FFB2A720000
SHA: 144C8BE53207D27F4506603D319F50276C92BC00DED0307B76C63AFDDAFB130F0D5C8C68801F487752F667FB604FBC71A7BEC244CEE4FA69BEA518A1A0E8AC5A
Version: v10.0.22621.1
win32u.dll
Address: 0x7FFB3A470000
SHA: FE3902E9F2541FBE428F7924047B21BA817D7D77169BFD596AA26294AFB5B8AC3B4B5BA144BAC83D46A5D3873483194698BFE935DDB6AD0A6CC85CB64A50D633
Version: v10.0.22621.4460
Windows.Gaming.Input.dll
Address: 0x7FFB1C0A0000
SHA: 7D3DB945ADF8E0BC825BDA2AD7C540ECE7CD8948BB9FA48A10913BD46A252D73CE5C3DAF6998700261769E2E2ADA346911F5A2E67CC9849CCA2BF2D57BA6E2BC
Version: v10.0.22621.1
windows.storage.dll
Address: 0x7FFB38150000
SHA: 8E3972596DEFB36382EF34CBDC7024C23D2D9F9633ED7749EDDA09E958723266B894DAC879C2AFE4D0D452CBDA125B7F18DC0D71973B067F0AE1A0E20E2196B0
Version: v10.0.22621.3527
Windows.UI.dll
Address: 0x7FFB1ACB0000
SHA: 2D725E97C7C2EC316DBD550692D95F875D8A3D38C5D4FD937A495AD1CF717F6C7B77D1858F7ACDAB665970C1518EE015AEF090E52F67E18DE6957D84F1F3EB5B
Version: v10.0.22621.1
WindowsCodecs.dll
Address: 0x7FFB36FB0000
SHA: 5578B6ACDEFF911CDE8719BA1805DCA5D92CDCE56C004B88CE1B02D427CD1BDEDCA1BC68CD93F628A971D5D1331D0E43AA2E1B19451B427AE0D27371CB61967D
Version: v10.0.22621.4455
WINHTTP.dll
Address: 0x7FFB35430000
SHA: 40B075A4F996750DCD6A11ECCF6A4C8312BC271F0129D5E78860BD7653789906ACD827648D78D1560D2059EB4C1DB659218F2DE4682C625F709FC8BC49F1D6D7
Version: v10.0.22621.1
WININET.dll
Address: 0x7FFB1A7B0000
SHA: A3B8C6CD911961B0802E977C6C8E1A8E47246AA9D9E82B7597B40B57FBCA6CBC28E55B797AB0123E5B47347A5A8BF0B0F31D701FEAF05C098AF1704977BB0339
Version: v11.0.22621.1
WINMM.dll
Address: 0x7FFB348A0000
SHA: A07DC1B42FEECDB2A19D1B38009920FE48AF057E0DA20E16A9B699973EEF4D8E01F8ED1334152BF250237FF5F9B3488D910ED3C4D914B403CF70D054519DE124
Version: v10.0.22621.1
winmmbase.dll
Address: 0x7FFAEBCC0000
SHA: 9AA1B67EE51054D7CB09B3F574BC50CF072E3559D0779C894C55253E16E16AB4966D46BA5F2B3297F8693B308511D41F11A867BE5178C03269E74DF6ACFA3215
Version: v10.0.22621.1
WINNSI.DLL
Address: 0x7FFB37210000
SHA: B4032A92D43AFEDF8C97B29519366DC0046BD804359BE616C4B844903F67A0D11C0DA42970FCE7D35772AFAEE5AFA8251EBBA5C2BEB0B9ABCED405927CB53775
Version: v10.0.22621.1
winrnr.dll
Address: 0x7FFB0AD00000
SHA: 9418D0135EC807E73EA6D33F2A149EF220A0104FBA1F6BF21C2D86498BFA4EA4D35E217C8F14868EBE4779BC6BD587543E8D9B846DA65766E5E0AF83B9FDC7EC
Version: v10.0.22621.1
wintrust.dll
Address: 0x7FFB3A6E0000
SHA: B5E1D231DA2CC3FC2D931D78C2B6CFA493F101D5FEF3A43A491B9DFE5AA3694D163BB2D88442A2ECBB59FBDC3691E9331D38D620FC2C2A97FC581FC0C1C0E1D0
Version: v10.0.22621.4391
wintypes.dll
Address: 0x7FFB38010000
SHA: 250140684EE603BE5B42BB7EAA35D38301D63F7C3DD86C54E0E2640DBF01083899CAF9FA823DA6E7963BE29C593E50623553F6D1D3FFE6F9F79B851E169335B6
Version: v10.0.22621.1
WLDAP32.dll
Address: 0x7FFB3ADE0000
SHA: E5E4D04E129A5B6D3CFA0DF9FAB766871C17BA365E9761CFC729E6B671339540535FA01E630408225FCA0CA64D6E1334B6E6A7D5A5696182DB9746788D2FCA34
Version: v10.0.22621.2506
wldp.dll
Address: 0x7FFB39AC0000
SHA: C5E79AAC54B327CD708EC35C0F7EE69466DDE0C4411ABB56828698015F4516E1840E751E0498D7299886BB44DAEC87C3EF87AF89C75C0718FBFF2F997AB0FF8A
Version: v10.0.22621.2506
WS2_32.dll
Address: 0x7FFB3BE60000
SHA: 1319EA1AE10DC1BD0E378E611107071B5A11E51FCB1A2B3EE26CE69D648B334541F795F33ABB6F070D760FE60ADF7962CC6D7C902A37EA5C7797A8DE88270E4B
Version: v10.0.22621.1
wshbth.dll
Address: 0x7FFB34B60000
SHA: 1C367472454B9A1A644E6113850D158CDF95294DA9B4E66915A82012FDABD8EE58A46EE2E96B7100D6EFD8CD4A9C5DFF8A8699FCC7C3417B5E4429C47BB68A09
Version: v10.0.22621.3958
WSOCK32.dll
Address: 0x7FFB12720000
SHA: D2DDA7DE4D1F4905614AF1244534D9A30407AAFE6DEC400053544050745494925352378ED44D4779268E5F0D502A04D08A02BD6D9BD44AB791F3E6A06BEB01A0
Version: v10.0.22621.1
XInput1_4.dll
Address: 0x7FFB35120000
SHA: 4EEDFEA0C84997494227BDA221FA3605898D5453461A9C274C72F96C2890D6AA74A252BC498472D994C32C86BB68F254E92AB23DF5153377CC721028F517823E
Version: v10.0.22621.1
XINPUT9_1_0.dll
Address: 0x7FFB35200000
SHA: 6FABF948ABE6292FCA6FD3BB29ABC6B624E8FF9E2BBF2BA39E6B8ABB42C4D2A29A31C1089C29DCB59DB2EE6B1CFE0880EBFF2575DC540D149CEAFFC422512FDF
Version: v10.0.22621.1
SCRIPT EXTENDER PLUGINS:
BakaAchievementEnabler.dll v5.0.0
BetterConsole.dll v1.4.3
ConsoleCommandRunner.dll v1.4.8
Daimos22_BMC_C.dll
sfee.dll v1.1.0.18
SFPluginsTxtEnabler.dll
sfse_1_14_74.dll v0.0.2.16
StarfieldEngineFixes.dll v6.2.0
trainwreck.dll v1.4.0
This is Greek...
I gotta lay down.....
WHAT DOES IT MEAN!?!?!
Starfield v1.14.74
trainwreck v1.4.0
Unhandled exception "EXCEPTION_ACCESS_VIOLATION" at 0x7FF69330EC5D Starfield.exe+215EC5D
SYSTEM SPECS:
OS: Microsoft Windows 11 Home 23H2 22631.4751
CPU: GenuineIntel 12th Gen Intel(R) Core(TM) i9-12900K
GPU #1: NVIDIA GeForce RTX 4070 Ti SUPER
GPU #2: Microsoft Basic Render Driver
RAM: 26.34 GiB/31.75 GiB
PAGE FILE: 54.60 GiB/65.75 GiB
PROBABLE CALL STACK:
[0 ] 0x7FF69330EC5D Starfield.exe+215EC5D
dec dword ptr [r8+rcx*8+20h]
[1 ] 0x7FF6937528A0 Starfield.exe+25A28A0
mov eax,0FFFFh
[2 ] 0x7FF69363D0E1 Starfield.exe+248D0E1
test r14,r14
[3 ] 0x7FF693653991 Starfield.exe+24A3991
mov rcx,[rdi]
[4 ] 0x7FF6936561A5 Starfield.exe+24A61A5
nop
[5 ] 0x7FF6938B0AB5 Starfield.exe+2700AB5
mov rdx,[r14+8]
[6 ] 0x7FF6938365FC Starfield.exe+26865FC
lea rdx,[rdi+4DDh]
[7 ] 0x7FF69391E592 Starfield.exe+276E592
mov r13d,1
[8 ] 0x7FF69370D2ED Starfield.exe+255D2ED
lea rcx,[rsp+310h]
[9 ] 0x7FF693736177 Starfield.exe+2586177
movzx r12d,al
[10] 0x7FF69372A899 Starfield.exe+257A899
mov rcx,[rbx]
[11] 0x7FF6937390B6 Starfield.exe+25890B6
nop
[12] 0x7FF694606A9D Starfield.exe+3456A9D
mov rdx,rbx
[13] 0x7FF6946076F9 Starfield.exe+34576F9
jmp short 0000000000000078h
[14] 0x7FF694605810 Starfield.exe+3455810
mov ecx,[31C3464h]
[15] 0x7FF694607CAE Starfield.exe+3457CAE
xor eax,eax
[16] 0x7FF6940FD411 Starfield.exe+2F4D411
mov rcx,[3AFF2CFh]
[17] 0x7FFAC72B259D KERNEL32.DLL+001259D BaseThreadInitThunk
mov ecx,eax
[18] 0x7FFAC884AF38 ntdll.dll+005AF38 RtlUserThreadStart
jmp short 0000000000000021h
REGISTERS:
RAX 0x0 (size_t)
RBX 0x297B11A1050 (void*)
RCX 0x3034A (size_t)
RDX 0xD9D (size_t)
RSI 0x29FF9840220 (SpellItem*)
RDI 0x9A42 (size_t)
RBP 0xA361AFE040 (void*)
RSP 0xA361AFDF90 (void*)
R8 0x29BC157C3C0 (void*)
R9 0x0 (size_t)
R10 0x0 (size_t)
R11 0xA361AFDF80 (void*)
R12 0x1 (size_t)
R13 0x0 (size_t)
R14 0x0 (size_t)
R15 0xFFFFFFFF (size_t)
STACK:
[RSP+0 ] 0x0 (size_t)
[RSP+8 ] 0x297B5F7A030 (void*)
[RSP+10 ] 0xA361AFE9A0 (void*)
[RSP+18 ] 0x7FF693752D33 (void* -> Starfield.exe+25A2D33)
nop
[RSP+20 ] 0xCFC7 (size_t)
[RSP+28 ] 0x7FF6937528A0 (void* -> Starfield.exe+25A28A0)
mov eax,0FFFFh
[RSP+30 ] 0x297B11A1084 (char*) "\x01"
[RSP+38 ] 0xA361AFE970 (BGSLoadFormBuffer*)
[RSP+40 ] 0x7FF69650FC88 (void* -> Starfield.exe+535FC88)
rol byte ptr [rcx-6Eh],1
[RSP+48 ] 0xA361AFE9A0 (void*)
[RSP+50 ] 0xA361AFE970 (BGSLoadFormBuffer*)
[RSP+58 ] 0x7FF69363D0E1 (void* -> Starfield.exe+248D0E1)
test r14,r14
[RSP+60 ] 0x0 (size_t)
[RSP+68 ] 0x0 (size_t)
[RSP+70 ] 0xA361AFE970 (BGSLoadFormBuffer*)
[RSP+78 ] 0x29BC8121200 (char*) "\x14"
[RSP+80 ] 0x0 (size_t)
[RSP+88 ] 0x7FF693750300 (void* -> Starfield.exe+25A0300)
mov r8,[r8]
[RSP+90 ] 0x3E5ED3640000056B (size_t)
[RSP+98 ] 0x1194F100000025 (size_t)
[RSP+A0 ] 0x7FF600008809 (size_t)
[RSP+A8 ] 0xA361AFE970 (BGSLoadFormBuffer*)
[RSP+B0 ] 0x0 (size_t)
[RSP+B8 ] 0x297E67B2248 (void*)
[RSP+C0 ] 0xA361AFE170 (void*)
[RSP+C8 ] 0x297B5F7A030 (void*)
[RSP+D0 ] 0x297E67B1FE8 (void*)
[RSP+D8 ] 0xA361AFE168 (void*)
[RSP+E0 ] 0xA361AFE1C0 (void*)
[RSP+E8 ] 0x7FF693653991 (void* -> Starfield.exe+24A3991)
mov rcx,[rdi]
[RSP+F0 ] 0x297E67B1FE0 (void*)
[RSP+F8 ] 0x29FC7DC7C20 (void*)
[RSP+100 ] 0x29FC7DC7C30 (void*)
[RSP+108 ] 0x7FF69174A9FF (void* -> Starfield.exe+059A9FF)
jmp short 0000000000000080h
[RSP+110 ] 0x2970000008F (size_t)
[RSP+118 ] 0x7FF69194BAF1 (void* -> Starfield.exe+079BAF1)
add rsp,28h
[RSP+120 ] 0xA361AFE120 (void*)
[RSP+128 ] 0x7FF69248A0DD (void* -> Starfield.exe+12DA0DD)
jmp short 6
[RSP+130 ] 0x0 (size_t)
[RSP+138 ] 0xA361AFE170 (void*)
[RSP+140 ] 0x297B5F7A028 (void*)
[RSP+148 ] 0x7FF693656828 (void* -> Starfield.exe+24A6828)
add rsp,20h
[RSP+150 ] 0x297B5F7A02C (void*)
[RSP+158 ] 0x297B5F7A028 (void*)
[RSP+160 ] 0xA361AFE970 (BGSLoadFormBuffer*)
[RSP+168 ] 0x29FD88C7838 (void*)
[RSP+170 ] 0x1 (size_t)
[RSP+178 ] 0x2981E69E150 (PlayerCharacter*)
[RSP+180 ] 0xA (size_t)
[RSP+188 ] 0x297B5F79E58 (char*) "\n"
[RSP+190 ] 0x297B5F7A028 (void*)
[RSP+198 ] 0x7FF6936561A5 (void* -> Starfield.exe+24A61A5)
nop
[RSP+1A0 ] 0x1000 (size_t)
[RSP+1A8 ] 0x29700000000 (size_t)
[RSP+1B0 ] 0xA361AFE170 (void*)
[RSP+1B8 ] 0x297B5F7A028 (void*)
[RSP+1C0 ] 0x56 (size_t)
[RSP+1C8 ] 0x7FF6938B0AB5 (void* -> Starfield.exe+2700AB5)
mov rdx,[r14+8]
[RSP+1D0 ] 0x297B5F7A028 (void*)
[RSP+1D8 ] 0xA361AFE970 (BGSLoadFormBuffer*)
[RSP+1E0 ] 0xA361AFE168 (void*)
[RSP+1E8 ] 0x7FF600000000 (size_t)
[RSP+1F0 ] 0xA300000000 (size_t)
[RSP+1F8 ] 0x297B11A0D00 (char*) "T"
[RSP+200 ] 0x0 (size_t)
[RSP+208 ] 0x7FF692C3E3DD (void* -> Starfield.exe+1A8E3DD)
mov rax,rbx
[RSP+210 ] 0x30000000 (size_t)
[RSP+218 ] 0x7FF69381219A (void* -> Starfield.exe+266219A)
mov al,dil
[RSP+220 ] 0xA361AFE210 (void*)
[RSP+228 ] 0x2A01B1AE7F8 (void*)
[RSP+230 ] 0xA361AFE970 (BGSLoadFormBuffer*)
[RSP+238 ] 0xA361AFE970 (BGSLoadFormBuffer*)
[RSP+240 ] 0x0 (size_t)
[RSP+248 ] 0x0 (size_t)
[RSP+250 ] 0x2981E69E150 (PlayerCharacter*)
[RSP+258 ] 0x340449B (size_t)
[RSP+260 ] 0xA361AFE300 (void*)
[RSP+268 ] 0x7FF6938365FC (void* -> Starfield.exe+26865FC)
lea rdx,[rdi+4DDh]
[RSP+270 ] 0x2A01B1AE820 (BGSModelMaterialSwap*)
[RSP+278 ] 0x30000000 (size_t)
[RSP+280 ] 0xA361AFE970 (BGSLoadFormBuffer*)
[RSP+288 ] 0x56 (size_t)
[RSP+290 ] 0x297B11A0F40 (void*)
[RSP+298 ] 0x7FF693752AFC (void* -> Starfield.exe+25A2AFC)
lea r11,[rsp+110h]
[RSP+2A0 ] 0x56 (size_t)
[RSP+2A8 ] 0x340449B (size_t)
[RSP+2B0 ] 0xA361AFE970 (BGSLoadFormBuffer*)
[RSP+2B8 ] 0x7FF692B47170 (void* -> Starfield.exe+1997170)
neg al
[RSP+2C0 ] 0x0 (size_t)
[RSP+2C8 ] 0x2981E69E150 (PlayerCharacter*)
[RSP+2D0 ] 0x1D6B (size_t)
[RSP+2D8 ] 0x0 (size_t)
[RSP+2E0 ] 0x0 (size_t)
[RSP+2E8 ] 0x0 (size_t)
[RSP+2F0 ] 0x0 (size_t)
[RSP+2F8 ] 0x0 (size_t)
[RSP+300 ] 0x0 (size_t)
[RSP+308 ] 0x0 (size_t)
[RSP+310 ] 0x0 (size_t)
[RSP+318 ] 0x298FFFFFFFF (void*)
[RSP+320 ] 0x0 (size_t)
[RSP+328 ] 0x0 (size_t)
[RSP+330 ] 0x0 (size_t)
[RSP+338 ] 0x0 (size_t)
[RSP+340 ] 0x0 (size_t)
[RSP+348 ] 0x0 (size_t)
[RSP+350 ] 0x0 (size_t)
[RSP+358 ] 0x0 (size_t)
[RSP+360 ] 0x0 (size_t)
[RSP+368 ] 0x0 (size_t)
[RSP+370 ] 0x0 (size_t)
[RSP+378 ] 0x0 (size_t)
[RSP+380 ] 0x14 (size_t)
[RSP+388 ] 0x0 (size_t)
[RSP+390 ] 0x297B11A0D00 (char*) "T"
[RSP+398 ] 0x7FF69194BAF1 (void* -> Starfield.exe+079BAF1)
add rsp,28h
[RSP+3A0 ] 0xFFFFFFFF (size_t)
[RSP+3A8 ] 0x29FF5F4C180 (void*)
[RSP+3B0 ] 0x8 (size_t)
[RSP+3B8 ] 0x8 (size_t)
[RSP+3C0 ] 0x8 (size_t)
[RSP+3C8 ] 0x7FF69370E4D5 (void* -> Starfield.exe+255E4D5)
mov rbx,[rsp+38h]
[RSP+3D0 ] 0x297B11A0D00 (char*) "T"
[RSP+3D8 ] 0x2 (size_t)
[RSP+3E0 ] 0x29FF5F4C540 (void*)
[RSP+3E8 ] 0x8 (size_t)
[RSP+3F0 ] 0x8 (size_t)
[RSP+3F8 ] 0x8 (size_t)
[RSP+400 ] 0x7FF697873F78 (void* -> Starfield.exe+66C3F78)
add [rax],al
[RSP+408 ] 0x0 (size_t)
[RSP+410 ] 0x2A025362548 (void*)
[RSP+418 ] 0xEDBB (size_t)
[RSP+420 ] 0x2981E69E150 (PlayerCharacter*)
[RSP+428 ] 0x2981E69E150 (PlayerCharacter*)
[RSP+430 ] 0x297B11A0D00 (char*) "T"
[RSP+438 ] 0x14 (size_t)
[RSP+440 ] 0xA361AFE4E0 (void*)
[RSP+448 ] 0x7FF69391E592 (void* -> Starfield.exe+276E592)
mov r13d,1
[RSP+450 ] 0x2E00 (size_t)
[RSP+458 ] 0x29BC8121100 (void*)
[RSP+460 ] 0x24 (size_t)
[RSP+468 ] 0x122021A2 (size_t)
[RSP+470 ] 0x6A0 (size_t)
[RSP+478 ] 0xA361AFE4B0 (char*) "\x0f"
[RSP+480 ] 0x29BCA07BEE0 (void*)
[RSP+488 ] 0x29BCA07BEE0 (void*)
[RSP+490 ] 0x2 (size_t)
[RSP+498 ] 0x29799B6AE80 (void*)
[RSP+4A0 ] 0x200CA07BE00 (size_t)
[RSP+4A8 ] 0x7FF600000004 (size_t)
[RSP+4B0 ] 0x1 (size_t)
[RSP+4B8 ] 0x0 (size_t)
[RSP+4C0 ] 0x0 (size_t)
[RSP+4C8 ] 0x6CEBD (size_t)
[RSP+4D0 ] 0x0 (size_t)
[RSP+4D8 ] 0xC330000000000000 (size_t)
[RSP+4E0 ] 0x42700004427AFFFC (size_t)
[RSP+4E8 ] 0x0 (size_t)
[RSP+4F0 ] 0x2040490FDB (size_t)
[RSP+4F8 ] 0x2979A270080 (SharedHeapAllocator*)
[RSP+500 ] 0x29FB1DB4AF8 (TESObjectCELL*)
[RSP+508 ] 0x7FF6941015B3 (void* -> Starfield.exe+2F515B3)
mov rbx,[rsp+38h]
[RSP+510 ] 0x0 (size_t)
[RSP+518 ] 0x1 (size_t)
[RSP+520 ] 0xF (size_t)
[RSP+528 ] 0x29BC8138E01 (char*) "n\x02"
[RSP+530 ] 0x2979A270080 (SharedHeapAllocator*)
[RSP+538 ] 0x7FF69173DAA0 (void* -> Starfield.exe+058DAA0)
mov rbx,rax
[RSP+540 ] 0x2979A270490 (void*)
[RSP+548 ] 0x0 (size_t)
[RSP+550 ] 0x7FF69778A500 (char*) "\x01"
[RSP+558 ] 0x69C (size_t)
[RSP+560 ] 0x297B11A1000 (void*)
[RSP+568 ] 0x29BC8138E28 (void*)
[RSP+570 ] 0x5600000000 (size_t)
[RSP+578 ] 0x7FF6941006EC (void* -> Starfield.exe+2F506EC)
jmp short 000000000000000Ah
[RSP+580 ] 0x34E (size_t)
[RSP+588 ] 0x2A025362548 (void*)
[RSP+590 ] 0x0 (size_t)
[RSP+598 ] 0x0 (size_t)
[RSP+5A0 ] 0x0 (size_t)
[RSP+5A8 ] 0x0 (size_t)
[RSP+5B0 ] 0x0 (size_t)
[RSP+5B8 ] 0x7FF600000006 (size_t)
[RSP+5C0 ] 0xA361AFE430 (void*)
[RSP+5C8 ] 0x7FF69330CF7E (void* -> Starfield.exe+215CF7E)
lea rax,[rsi+rbp*2]
[RSP+5D0 ] 0x7FF697C38080 (void* -> Starfield.exe+6A88080)
add ch,ah
[RSP+5D8 ] 0x7FF694100456 (void* -> Starfield.exe+2F50456)
and qword ptr [r12],0
[RSP+5E0 ] 0x2A01E5FE620 (void*)
[RSP+5E8 ] 0xA361AFE970 (BGSLoadFormBuffer*)
[RSP+5F0 ] 0x0 (size_t)
[RSP+5F8 ] 0x0 (size_t)
[RSP+600 ] 0xA361AFE9F8 (void*)
[RSP+608 ] 0x7FF69330E2F0 (void* -> Starfield.exe+215E2F0)
mov rcx,[rbx+18h]
[RSP+610 ] 0x2A025362560 (void*)
[RSP+618 ] 0x297B11A0D00 (char*) "T"
[RSP+620 ] 0xA361AFEA10 (void*)
[RSP+628 ] 0x7FF691753A12 (void* -> Starfield.exe+05A3A12)
jmp short 0000000000000039h
[RSP+630 ] 0xA361AFE9F8 (void*)
[RSP+638 ] 0x7FF6937043E7 (void* -> Starfield.exe+25543E7)
mov eax,[rsi+40h]
[RSP+640 ] 0x0 (size_t)
[RSP+648 ] 0x0 (size_t)
[RSP+650 ] 0x2A025362548 (void*)
[RSP+658 ] 0x7FF69193960B (void* -> Starfield.exe+078960B)
mov rbx,[rsp+38h]
[RSP+660 ] 0x0 (size_t)
[RSP+668 ] 0x0 (size_t)
[RSP+670 ] 0x0 (size_t)
[RSP+678 ] 0x0 (size_t)
[RSP+680 ] 0x0 (size_t)
[RSP+688 ] 0x0 (size_t)
[RSP+690 ] 0x2A025362548 (void*)
[RSP+698 ] 0xEDBB (size_t)
[RSP+6A0 ] 0x2981E69E150 (PlayerCharacter*)
[RSP+6A8 ] 0x29FA19AA000 (char*) "Save113_FCC5A6C6_426174746F736169_071559_20240120202545_156_0_4"
[RSP+6B0 ] 0x297B11A0D00 (char*) "T"
[RSP+6B8 ] 0x14 (size_t)
[RSP+6C0 ] 0xA361AFEFD0 (void*)
[RSP+6C8 ] 0x7FF69370D2ED (void* -> Starfield.exe+255D2ED)
lea rcx,[rsp+310h]
[RSP+6D0 ] 0xA361AFE970 (BGSLoadFormBuffer*)
[RSP+6D8 ] 0xA361AFE970 (BGSLoadFormBuffer*)
[RSP+6E0 ] 0xA361AFEFD0 (void*)
[RSP+6E8 ] 0x297B11A0D00 (char*) "T"
[RSP+6F0 ] 0x7FF600000001 (size_t)
[RSP+6F8 ] 0x499F8BAD00000001 (size_t)
[RSP+700 ] 0x3084BAD01724CFCE (size_t)
[RSP+708 ] 0x297B11A0FE8 (void*)
[RSP+710 ] 0x297B11A0D00 (char*) "T"
[RSP+718 ] 0x0 (size_t)
[RSP+720 ] 0x2A00FFAD6C8 (MovementControllerRegisterInterface*)
[RSP+728 ] 0xB4990B09 (size_t)
[RSP+730 ] 0x2A01A4C0D68 (TESObjectCELL*)
[RSP+738 ] 0x56673F499CBB0E2 (size_t)
[RSP+740 ] 0x0 (size_t)
[RSP+748 ] 0x0 (size_t)
[RSP+750 ] 0x43E718263265E47F (size_t)
[RSP+758 ] 0x0 (size_t)
[RSP+760 ] 0x9294BD2600000056 (size_t)
[RSP+768 ] 0x297B11A10B8 (void*)
[RSP+770 ] 0x2A00FF72C80 (char*) "\x02"
[RSP+778 ] 0x2A00FFAD6C8 (MovementControllerRegisterInterface*)
[RSP+780 ] 0x400000004 (size_t)
[RSP+788 ] 0x29799B6DC10 (ScrapHeap*)
[RSP+790 ] 0x2A33B840080 (void*)
[RSP+798 ] 0x400000004 (size_t)
[RSP+7A0 ] 0x29799B6DC10 (ScrapHeap*)
[RSP+7A8 ] 0x2A33B840C90 (void*)
[RSP+7B0 ] 0x38C6A4CE7F2DA9D8 (size_t)
[RSP+7B8 ] 0x2A023C744E0 (void*)
[RSP+7C0 ] 0x0 (size_t)
[RSP+7C8 ] 0x0 (size_t)
[RSP+7D0 ] 0x0 (size_t)
[RSP+7D8 ] 0x3496B9263FC90FD9 (size_t)
[RSP+7E0 ] 0xC2060F0EC187FBFE (size_t)
[RSP+7E8 ] 0x84724CA2C1200000 (size_t)
[RSP+7F0 ] 0x0 (size_t)
[RSP+7F8 ] 0x0 (size_t)
[RSP+800 ] 0x2A00FFAD5F0 (void*)
[RSP+808 ] 0x2A00FFAD6C8 (MovementControllerRegisterInterface*)
[RSP+810 ] 0x2A00FFAD6C8 (MovementControllerRegisterInterface*)
[RSP+818 ] 0x29BBE7D0040 (void*)
[RSP+820 ] 0x7FF6955269E8 (void* -> Starfield.exe+43769E8)
fmul st,dword ptr [7FF69234h]
[RSP+828 ] 0xA361AFE710 (char*) "\x04"
[RSP+830 ] 0x4CF5F49C83326013 (size_t)
[RSP+838 ] 0xB5F9A4CB9C71437A (size_t)
[RSP+840 ] 0x29799B6E028 (stl::unique_function_impl::detail::TypeErasedFuncImpl<<lambda_8291e7d1e643b42ca1ce574da97d71a6>,void *>*)
[RSP+848 ] 0x7FF6940FCB3A (void* -> Starfield.exe+2F4CB3A)
lea rcx,[rbx+78h]
[RSP+850 ] 0x2A023A3D240 (char*) "\x02"
[RSP+858 ] 0x260D6270BEA4CD4A (size_t)
[RSP+860 ] 0x0 (size_t)
[RSP+868 ] 0x0 (size_t)
[RSP+870 ] 0x2A300008001 (void*)
[RSP+878 ] 0x2A023A3D240 (char*) "\x02"
[RSP+880 ] 0x260D6270BEA4CD4A (size_t)
[RSP+888 ] 0x2A33B8400C8 (void*)
[RSP+890 ] 0x2A33B8400C0 (void*)
[RSP+898 ] 0x1AD2640CBFB634A4 (size_t)
[RSP+8A0 ] 0x3C0EFD303991597 (size_t)
[RSP+8A8 ] 0x37A72900000C35 (size_t)
[RSP+8B0 ] 0x32ABF760082C572 (size_t)
[RSP+8B8 ] 0x1500000011 (size_t)
[RSP+8C0 ] 0x6BD7800000007 (size_t)
[RSP+8C8 ] 0x3C0EFDB00000000 (size_t)
[RSP+8D0 ] 0x0 (size_t)
[RSP+8D8 ] 0x0 (size_t)
[RSP+8E0 ] 0x0 (size_t)
[RSP+8E8 ] 0x0 (size_t)
[RSP+8F0 ] 0x0 (size_t)
[RSP+8F8 ] 0x0 (size_t)
[RSP+900 ] 0xA86A526600000000 (size_t)
[RSP+908 ] 0xF53BAC423262FE1F (size_t)
[RSP+910 ] 0x29BBEB2EC00 (void*)
[RSP+918 ] 0x4BA84BD2629EBE33 (size_t)
[RSP+920 ] 0x29799B6DC10 (ScrapHeap*)
[RSP+928 ] 0x2A33B8400C0 (void*)
[RSP+930 ] 0x2A33B8401C0 (void*)
[RSP+938 ] 0x2A33B8400C0 (void*)
[RSP+940 ] 0x0 (size_t)
[RSP+948 ] 0x2A33B8400C8 (void*)
[RSP+950 ] 0x2A33B8400C0 (void*)
[RSP+958 ] 0x2A000000001 (void*)
[RSP+960 ] 0x2A33B843D10 (void*)
[RSP+968 ] 0x2A33B845400 (void*)
[RSP+970 ] 0x2A33B845E60 (void*)
[RSP+978 ] 0xA361AFE801 (void*)
[RSP+980 ] 0x7FF696792AA8 (void* -> Starfield.exe+55E2AA8)
push rax
[RSP+988 ] 0x2A01BFEA730 (void*)
[RSP+990 ] 0x0 (size_t)
[RSP+998 ] 0x0 (size_t)
[RSP+9A0 ] 0x0 (size_t)
[RSP+9A8 ] 0x0 (size_t)
[RSP+9B0 ] 0x0 (size_t)
[RSP+9B8 ] 0x0 (size_t)
[RSP+9C0 ] 0x0 (size_t)
[RSP+9C8 ] 0x2A009C2F000 (char*) "\x01"
[RSP+9D0 ] 0x2A0000074C0 (void*)
[RSP+9D8 ] 0x0 (size_t)
[RSP+9E0 ] 0x7FF696531B08 (void* -> Starfield.exe+5381B08)
jl short 0FFFFFFFFFFFFFFA4h
[RSP+9E8 ] 0x2A33B845E80 (char*) "\x0c"
[RSP+9F0 ] 0x29799B6DC10 (ScrapHeap*)
[RSP+9F8 ] 0x95BCC714000159DE (size_t)
[RSP+A00 ] 0x121CFA000159DE (size_t)
[RSP+A08 ] 0x7FFAC5B11F6B (void* -> KERNELBASE.dll+0061F6B VirtualFree)
mov ecx,esi
[RSP+A10 ] 0x7FF600000000 (size_t)
[RSP+A18 ] 0x2A080000001 (void*)
[RSP+A20 ] 0x8809001194F1 (size_t)
[RSP+A28 ] 0x29BC8121200 (char*) "\x14"
[RSP+A30 ] 0x29BC8130B78 (void*)
[RSP+A38 ] 0x29BC8138E28 (void*)
[RSP+A40 ] 0x29BCA07BEE0 (void*)
[RSP+A48 ] 0x29BCA07BEE0 (void*)
[RSP+A50 ] 0x29BCA07C57C (char*) "\x14"
[RSP+A58 ] 0x29BCA07C5D2 (void*)
[RSP+A60 ] 0xA300000014 (size_t)
[RSP+A68 ] 0x0 (size_t)
[RSP+A70 ] 0x0 (size_t)
[RSP+A78 ] 0x0 (size_t)
[RSP+A80 ] 0x0 (size_t)
[RSP+A88 ] 0x0 (size_t)
[RSP+A90 ] 0x0 (size_t)
[RSP+A98 ] 0x0 (size_t)
[RSP+AA0 ] 0x9302E8F8FFFFFFFF (size_t)
[RSP+AA8 ] 0x159DE00000014 (size_t)
[RSP+AB0 ] 0x3800000000 (size_t)
[RSP+AB8 ] 0x2981E69E150 (PlayerCharacter*)
[RSP+AC0 ] 0x9001082398010927 (size_t)
[RSP+AC8 ] 0x2050495A6B4B0000 (size_t)
[RSP+AD0 ] 0xC530 (size_t)
[RSP+AD8 ] 0x1A2F3E0 (size_t)
[RSP+AE0 ] 0x60C0 (size_t)
[RSP+AE8 ] 0x485E3993206F5B80 (size_t)
[RSP+AF0 ] 0x0 (size_t)
[RSP+AF8 ] 0x8399329E0FAACA52 (size_t)
[RSP+B00 ] 0xFDBA758C9925EBC5 (size_t)
[RSP+B08 ] 0x8C99AF31B4964991 (size_t)
[RSP+B10 ] 0x2A6551C0000 (void*)
[RSP+B18 ] 0xC530 (size_t)
[RSP+B20 ] 0x66CA4C16AD769E8C (size_t)
[RSP+B28 ] 0xB598E4225267EBDD (size_t)
[RSP+B30 ] 0xCE4996D03365C64C (size_t)
[RSP+B38 ] 0x7BCBF2526635C42F (size_t)
[RSP+B40 ] 0x31DBDB4B7F2930EB (size_t)
[RSP+B48 ] 0x24B49967DBA587A9 (size_t)
[RSP+B50 ] 0x87D1AA6D264140AB (size_t)
[RSP+B58 ] 0xEA4C3CE75BAB3261 (size_t)
[RSP+B60 ] 0x0 (size_t)
[RSP+B68 ] 0x7FF694101E7D (void* -> Starfield.exe+2F51E7D)
mov rax,[rdi]
[RSP+B70 ] 0x0 (size_t)
[RSP+B78 ] 0x0 (size_t)
[RSP+B80 ] 0xA361AFED80 (char*) "29, EXE Version: 1.14.74.0, Save Version 27.143"
[RSP+B88 ] 0x7FF6945FD537 (void* -> Starfield.exe+344D537)
test eax,eax
[RSP+B90 ] 0x28D01 (size_t)
[RSP+B98 ] 0x7FF691779B89 (void* -> Starfield.exe+05C9B89)
mov rcx,[rbp+7]
[RSP+BA0 ] 0xA361AFED88 (char*) "Version: 1.14.74.0, Save Version 27.143"
[RSP+BA8 ] 0x7FF694101E7D (void* -> Starfield.exe+2F51E7D)
mov rax,[rdi]
[RSP+BB0 ] 0x3637333939343437 (size_t)
[RSP+BB8 ] 0x7FF6945FD700 (void* -> Starfield.exe+344D700)
lea edi,[rdi+1]
[RSP+BC0 ] 0x28D01 (size_t)
[RSP+BC8 ] 0x0 (size_t)
[RSP+BD0 ] 0x2A33B840000 (char*) "@"
[RSP+BD8 ] 0x7FF6941018DF (void* -> Starfield.exe+2F518DF)
mov rbx,[rsp+30h]
[RSP+BE0 ] 0x1 (size_t)
[RSP+BE8 ] 0x29799B6DC10 (ScrapHeap*)
[RSP+BF0 ] 0x2A33B850000 (void*)
[RSP+BF8 ] 0x7FF699D0E480 (void* -> Starfield.exe+8B5E480)
mov al,[500000029FA79739h]
[RSP+C00 ] 0x4000000000000000 (size_t)
[RSP+C08 ] 0x7FF6941016CF (void* -> Starfield.exe+2F516CF)
jmp short 000000000000000Dh
[RSP+C10 ] 0x29799B6DC10 (ScrapHeap*)
[RSP+C18 ] 0xA361AFED01 (void*)
[RSP+C20 ] 0x2A33B850000 (void*)
[RSP+C28 ] 0x2A33B840000 (char*) "@"
[RSP+C30 ] 0x29FA19AA000 (char*) "Save113_FCC5A6C6_426174746F736169_071559_20240120202545_156_0_4"
[RSP+C38 ] 0xA361AFEF10 (void*)
[RSP+C40 ] 0x5 (size_t)
[RSP+C48 ] 0x7FF691960BC9 (void* -> Starfield.exe+07B0BC9)
jmp short 000000000000003Fh
[RSP+C50 ] 0x2A33B840020 (void*)
[RSP+C58 ] 0x29799B6DC10 (ScrapHeap*)
[RSP+C60 ] 0xA361AFEDD0 (void*)
[RSP+C68 ] 0x4 (size_t)
[RSP+C70 ] 0x2A33B840020 (void*)
[RSP+C78 ] 0x7FF6940FA7E9 (void* -> Starfield.exe+2F4A7E9)
jmp short 0000000000000030h
[RSP+C80 ] 0x100 (size_t)
[RSP+C88 ] 0x29FA19A54F0 (void*)
[RSP+C90 ] 0xA361AFECD8 (char*) "V"
[RSP+C98 ] 0x7FF69194C13C (void* -> Starfield.exe+079C13C)
mov rsi,rax
[RSP+CA0 ] 0xA361AFED20 (void*)
[RSP+CA8 ] 0x7FF69261EBEC (void* -> Starfield.exe+146EBEC)
and dword ptr [rbx],0
[RSP+CB0 ] 0x0 (size_t)
[RSP+CB8 ] 0x29791DCDAB0 (SharedHeapAllocator*)
[RSP+CC0 ] 0x5F33313165766153 (size_t)
[RSP+CC8 ] 0x3643364135434346 (size_t)
[RSP+CD0 ] 0x373437313632345F (size_t)
[RSP+CD8 ] 0x3631363337463634 (size_t)
[RSP+CE0 ] 0x3935353137305F39 (size_t)
[RSP+CE8 ] 0x323130343230325F (size_t)
[RSP+CF0 ] 0x5F35343532303230 (size_t)
[RSP+CF8 ] 0x2E345F305F363531 (size_t)
[RSP+D00 ] 0xA300736673 (size_t)
[RSP+D08 ] 0x7FF692618162 (void* -> Starfield.exe+1468162)
lea rcx,[rbx+48h]
[RSP+D10 ] 0xA361AFECF0 (BGSLoadGameBufferSimple*)
[RSP+D18 ] 0xA361AFEDD0 (void*)
[RSP+D20 ] 0x4 (size_t)
[RSP+D28 ] 0x29FAA27BFF8 (char*) "Human"
[RSP+D30 ] 0x5 (size_t)
[RSP+D38 ] 0x7FF69372514B (void* -> Starfield.exe+257514B)
mov rbx,[rsp+208h]
[RSP+D40 ] 0x56 (size_t)
[RSP+D48 ] 0x56 (size_t)
[RSP+D50 ] 0x4 (size_t)
[RSP+D58 ] 0x4 (size_t)
[RSP+D60 ] 0x7FF696531B98 (void* -> Starfield.exe+5381B98)
in al,0A2h
[RSP+D68 ] 0x0 (size_t)
[RSP+D70 ] 0x0 (size_t)
[RSP+D78 ] 0x100000000 (size_t)
[RSP+D80 ] 0x8500000085 (size_t)
[RSP+D88 ] 0x7FF60000006B (size_t)
[RSP+D90 ] 0x2A600000000 (size_t)
[RSP+D98 ] 0x80000000 (size_t)
[RSP+DA0 ] 0x29799B6AE02 (void*)
[RSP+DA8 ] 0x0 (size_t)
[RSP+DB0 ] 0x0 (size_t)
[RSP+DB8 ] 0x0 (size_t)
[RSP+DC0 ] 0x0 (size_t)
[RSP+DC8 ] 0x0 (size_t)
[RSP+DD0 ] 0x5320666F206E6F53 (size_t)
[RSP+DD8 ] 0x202D206164726170 (size_t)
[RSP+DE0 ] 0x3230322F39312F31 (size_t)
[RSP+DE8 ] 0x3A33353A31322035 (size_t)
[RSP+DF0 ] 0x20455845202C3932 (size_t)
[RSP+DF8 ] 0x3A6E6F6973726556 (size_t)
[RSP+E00 ] 0x34372E34312E3120 (size_t)
[RSP+E08 ] 0x65766153202C302E (size_t)
[RSP+E10 ] 0x6E6F697372655620 (size_t)
[RSP+E18 ] 0x3334312E373220 (size_t)
[RSP+E20 ] 0x0 (size_t)
[RSP+E28 ] 0x0 (size_t)
[RSP+E30 ] 0x0 (size_t)
[RSP+E38 ] 0x0 (size_t)
[RSP+E40 ] 0x0 (size_t)
[RSP+E48 ] 0x0 (size_t)
[RSP+E50 ] 0x0 (size_t)
[RSP+E58 ] 0x0 (size_t)
[RSP+E60 ] 0x0 (size_t)
[RSP+E68 ] 0x0 (size_t)
[RSP+E70 ] 0x0 (size_t)
[RSP+E78 ] 0x0 (size_t)
[RSP+E80 ] 0x0 (size_t)
[RSP+E88 ] 0x7FF694100720 (void* -> Starfield.exe+2F50720)
test al,al
[RSP+E90 ] 0x0 (size_t)
[RSP+E98 ] 0x0 (size_t)
[RSP+EA0 ] 0x0 (size_t)
[RSP+EA8 ] 0x7FF691762DEE (void* -> Starfield.exe+05B2DEE)
xor eax,eax
[RSP+EB0 ] 0x7FF697C38080 (void* -> Starfield.exe+6A88080)
add ch,ah
[RSP+EB8 ] 0x7FF694100456 (void* -> Starfield.exe+2F50456)
and qword ptr [r12],0
[RSP+EC0 ] 0x29FA63FE440 (void*)
[RSP+EC8 ] 0xA361AFEFD0 (void*)
[RSP+ED0 ] 0x7FF697C2BA40 (BSFixedSizeBlockAllocator::TAlloc<4294967296,16777216,128>*)
[RSP+ED8 ] 0x7FF6917730B1 (void* -> Starfield.exe+05C30B1)
mov esi,0Ch
[RSP+EE0 ] 0x0 (size_t)
[RSP+EE8 ] 0x29799B6AE80 (void*)
[RSP+EF0 ] 0x0 (size_t)
[RSP+EF8 ] 0x0 (size_t)
[RSP+F00 ] 0x0 (size_t)
[RSP+F08 ] 0x29799B6AE80 (void*)
[RSP+F10 ] 0x29F9AF2D340 (char*) "Save113_FCC5A6C6_426174746F736169_071559_20240120202545_156_0_4"
[RSP+F18 ] 0x100 (size_t)
[RSP+F20 ] 0x29BA2B21A80 (BGSSaveLoadManager*)
[RSP+F28 ] 0x29FA19AA000 (char*) "Save113_FCC5A6C6_426174746F736169_071559_20240120202545_156_0_4"
[RSP+F30 ] 0x2A00BF10950 (char*) "\x02"
[RSP+F38 ] 0x7FF693736177 (void* -> Starfield.exe+2586177)
movzx r12d,al
[RSP+F40 ] 0x2A000000065 (void*)
[RSP+F48 ] 0x29FA19AA000 (char*) "Save113_FCC5A6C6_426174746F736169_071559_20240120202545_156_0_4"
[RSP+F50 ] 0x29F00000014 (void*)
[RSP+F58 ] 0x29FA19AA001 (char*) "ave113_FCC5A6C6_426174746F736169_071559_20240120202545_156_0_4"
[RSP+F60 ] 0xA361AFF800 (void*)
[RSP+F68 ] 0xA300000104 (size_t)
[RSP+F70 ] 0x44CAF53100000000 (size_t)
[RSP+F78 ] 0x7FFA00000002 (void* -> steamclient64.dll+0D40002)
test rcx,rcx
[RSP+F80 ] 0x29FA18148C0 (void*)
[RSP+F88 ] 0x2A00BF10950 (char*) "\x02"
[RSP+F90 ] 0x0 (size_t)
[RSP+F98 ] 0x29FF06EEAE0 (char*) "@\x03\xee\xa2\x9b\x02"
[RSP+FA0 ] 0x29FA19A54F0 (void*)
[RSP+FA8 ] 0x29FA6244260 (void*)
[RSP+FB0 ] 0x710000001B (size_t)
[RSP+FB8 ] 0x9C00000000 (size_t)
[RSP+FC0 ] 0x45F6E00045C16F00 (size_t)
[RSP+FC8 ] 0x0 (size_t)
[RSP+FD0 ] 0x95 (size_t)
[RSP+FD8 ] 0x0 (size_t)
[RSP+FE0 ] 0x1DA4BDED8DAA413 (size_t)
[RSP+FE8 ] 0x16B00000000 (size_t)
[RSP+FF0 ] 0xBBE4000000000056 (size_t)
[RSP+FF8 ] 0x7FF6C3257BC0 (size_t)
[RSP+1000] 0x0 (size_t)
[RSP+1008] 0x0 (size_t)
[RSP+1010] 0x7F7FFFFF (size_t)
[RSP+1018] 0x0 (size_t)
[RSP+1020] 0x0 (size_t)
[RSP+1028] 0x0 (size_t)
[RSP+1030] 0x0 (size_t)
[RSP+1038] 0x7FF693775DB2 (void* -> Starfield.exe+25C5DB2)
mov r13,rax
[RSP+1040] 0x3F800000 (size_t)
[RSP+1048] 0x0 (size_t)
[RSP+1050] 0x3F111EEC (size_t)
[RSP+1058] 0x0 (size_t)
[RSP+1060] 0x5F33313165766153 (size_t)
[RSP+1068] 0x3643364135434346 (size_t)
[RSP+1070] 0x373437313632345F (size_t)
[RSP+1078] 0x3631363337463634 (size_t)
[RSP+1080] 0x3935353137305F39 (size_t)
[RSP+1088] 0x323130343230325F (size_t)
[RSP+1090] 0x5F35343532303230 (size_t)
[RSP+1098] 0x345F305F363531 (size_t)
[RSP+10A0] 0x0 (size_t)
[RSP+10A8] 0x7FF6943DBC10 (void* -> Starfield.exe+322BC10)
vmovss xmm0,[rbx]
[RSP+10B0] 0x0 (size_t)
[RSP+10B8] 0x7FF693775DB2 (void* -> Starfield.exe+25C5DB2)
mov r13,rax
[RSP+10C0] 0x3E0B2E8C (size_t)
[RSP+10C8] 0x3BE14834 (size_t)
[RSP+10D0] 0xA361AFF1D0 (void*)
[RSP+10D8] 0xA361AFF110 (char*) "Sparda\\Documents\\My Games\\Starfield\\Saves\\"
[RSP+10E0] 0xA361AFF0C0 (void*)
[RSP+10E8] 0xA361AFF080 (void*)
[RSP+10F0] 0x44C9D156C44CDB11 (size_t)
[RSP+10F8] 0xC3257BC0 (size_t)
[RSP+1100] 0x44C9D156C44CDB11 (size_t)
[RSP+1108] 0xC44CDB11C322FC93 (size_t)
[RSP+1110] 0xC327FC9344C9D156 (size_t)
[RSP+1118] 0x0 (size_t)
[RSP+1120] 0xA361AFF390 (char*) "\x01"
[RSP+1128] 0x7FF6943D8127 (void* -> Starfield.exe+3228127)
vmovaps xmm14,[rsp+60h]
[RSP+1130] 0x0 (size_t)
[RSP+1138] 0x7FF693775DB2 (void* -> Starfield.exe+25C5DB2)
mov r13,rax
[RSP+1140] 0x3F800000 (size_t)
[RSP+1148] 0x0 (size_t)
[RSP+1150] 0xA361AFF1D8 (void*)
[RSP+1158] 0xA361AFF1D0 (void*)
[RSP+1160] 0x44C9D11DC44CDB4D (size_t)
[RSP+1168] 0xC3257BBF (size_t)
[RSP+1170] 0x73726573555C3A43 (size_t)
[RSP+1178] 0x20666F206E6F535C (size_t)
[RSP+1180] 0x445C616472617053 (size_t)
[RSP+1188] 0x73746E656D75636F (size_t)
[RSP+1190] 0x656D614720794D5C (size_t)
[RSP+1198] 0x6966726174535C73 (size_t)
[RSP+11A0] 0x657661535C646C65 (size_t)
[RSP+11A8] 0x5C73 (size_t)
[RSP+11B0] 0x0 (size_t)
[RSP+11B8] 0x7FF693775DB2 (void* -> Starfield.exe+25C5DB2)
mov r13,rax
[RSP+11C0] 0x3F800000 (size_t)
[RSP+11C8] 0x0 (size_t)
[RSP+11D0] 0x0 (size_t)
[RSP+11D8] 0x0 (size_t)
[RSP+11E0] 0x409EF4F83FFC1939 (size_t)
[RSP+11E8] 0xBBB0DAF8 (size_t)
[RSP+11F0] 0x3FF71C103E8D1608 (size_t)
[RSP+11F8] 0xBAF55B10 (size_t)
[RSP+1200] 0x0 (size_t)
[RSP+1208] 0x0 (size_t)
[RSP+1210] 0x0 (size_t)
[RSP+1218] 0x0 (size_t)
[RSP+1220] 0x0 (size_t)
[RSP+1228] 0x0 (size_t)
[RSP+1230] 0x0 (size_t)
[RSP+1238] 0x7FF693775DB2 (void* -> Starfield.exe+25C5DB2)
mov r13,rax
[RSP+1240] 0x0 (size_t)
[RSP+1248] 0x0 (size_t)
[RSP+1250] 0x0 (size_t)
[RSP+1258] 0x0 (size_t)
[RSP+1260] 0x3E125461 (size_t)
[RSP+1268] 0x0 (size_t)
[RSP+1270] 0xA361AFF2C0 (void*)
[RSP+1278] 0x2A01B640A80 (void*)
[RSP+1280] 0x5F33313165766153 (size_t)
[RSP+1288] 0x3643364135434346 (size_t)
[RSP+1290] 0x373437313632345F (size_t)
[RSP+1298] 0x3631363337463634 (size_t)
[RSP+12A0] 0x3935353137305F39 (size_t)
[RSP+12A8] 0x323130343230325F (size_t)
[RSP+12B0] 0x5F35343532303230 (size_t)
[RSP+12B8] 0x2E345F305F363531 (size_t)
[RSP+12C0] 0x736673 (size_t)
[RSP+12C8] 0x7FF694237A3A (void* -> Starfield.exe+3087A3A)
movzx ecx,al
[RSP+12D0] 0x2A01B640A80 (void*)
[RSP+12D8] 0x0 (size_t)
[RSP+12E0] 0x0 (size_t)
[RSP+12E8] 0x2A01934B400 (BSGeometry*)
[RSP+12F0] 0xA361AFF340 (void*)
[RSP+12F8] 0x2A01B640BD0 (void*)
[RSP+1300] 0x1 (size_t)
[RSP+1308] 0x7FF694237AFD (void* -> Starfield.exe+3087AFD)
mov al,[rsp+48h]
[RSP+1310] 0xA361AFFA00 (stl::local_function_detail::LocalFunctionImpl<<lambda_2f96550ffc2a7381fd9f6f8ab938e58e>,BSVisit::BSVisitControl,NiAVObject &>*)
[RSP+1318] 0x2A01B640D20 (void*)
[RSP+1320] 0x2A01B640A80 (void*)
[RSP+1328] 0x0 (size_t)
[RSP+1330] 0xA361AFFA00 (stl::local_function_detail::LocalFunctionImpl<<lambda_2f96550ffc2a7381fd9f6f8ab938e58e>,BSVisit::BSVisitControl,NiAVObject &>*)
[RSP+1338] 0xA361AFF2E8 (void*)
[RSP+1340] 0x0 (size_t)
[RSP+1348] 0x7FF694237A3A (void* -> Starfield.exe+3087A3A)
movzx ecx,al
[RSP+1350] 0x2A01B640BD0 (void*)
[RSP+1358] 0x0 (size_t)
[RSP+1360] 0x0 (size_t)
[RSP+1368] 0x2A019260A00 (BSGeometry*)
[RSP+1370] 0xA361AFF3C0 (void*)
[RSP+1378] 0x2A01DB96690 (TESObjectREFR*)
[RSP+1380] 0x1 (size_t)
[RSP+1388] 0x7FF694237AFD (void* -> Starfield.exe+3087AFD)
mov al,[rsp+48h]
[RSP+1390] 0xA361AFFA00 (stl::local_function_detail::LocalFunctionImpl<<lambda_2f96550ffc2a7381fd9f6f8ab938e58e>,BSVisit::BSVisitControl,NiAVObject &>*)
[RSP+1398] 0x2A01DB967E0 (TESObjectREFR*)
[RSP+13A0] 0x43800000 (size_t)
[RSP+13A8] 0x0 (size_t)
[RSP+13B0] 0xA361AFFA00 (stl::local_function_detail::LocalFunctionImpl<<lambda_2f96550ffc2a7381fd9f6f8ab938e58e>,BSVisit::BSVisitControl,NiAVObject &>*)
[RSP+13B8] 0xA361AFF368 (void*)
[RSP+13C0] 0x0 (size_t)
[RSP+13C8] 0x7FF694237A3A (void* -> Starfield.exe+3087A3A)
movzx ecx,al
[RSP+13D0] 0x2A01DB96690 (TESObjectREFR*)
[RSP+13D8] 0x0 (size_t)
[RSP+13E0] 0x0 (size_t)
[RSP+13E8] 0x2A029F91600 (void*)
[RSP+13F0] 0xA361AFF440 (void*)
[RSP+13F8] 0x2A01DBE5650 (char*) "0)#"
[RSP+1400] 0x1 (size_t)
[RSP+1408] 0x7FF694237AFD (void* -> Starfield.exe+3087AFD)
mov al,[rsp+48h]
[RSP+1410] 0xA361AFFA00 (stl::local_function_detail::LocalFunctionImpl<<lambda_2f96550ffc2a7381fd9f6f8ab938e58e>,BSVisit::BSVisitControl,NiAVObject &>*)
[RSP+1418] 0x2A01DBE57A0 (void*)
[RSP+1420] 0x2A01DB96690 (TESObjectREFR*)
[RSP+1428] 0x0 (size_t)
[RSP+1430] 0xA361AFFA00 (stl::local_function_detail::LocalFunctionImpl<<lambda_2f96550ffc2a7381fd9f6f8ab938e58e>,BSVisit::BSVisitControl,NiAVObject &>*)
[RSP+1438] 0xA361AFF3E8 (void*)
[RSP+1440] 0x0 (size_t)
[RSP+1448] 0x7FF694237A3A (void* -> Starfield.exe+3087A3A)
movzx ecx,al
[RSP+1450] 0x2A01DBE5650 (char*) "0)#"
[RSP+1458] 0x0 (size_t)
[RSP+1460] 0x0 (size_t)
[RSP+1468] 0x2A029B34200 (void*)
[RSP+1470] 0xA361AFF4C0 (char*) "eld\\Saves\\Save113_FCC5A6C6_426174746F736169_071559_20240120202545_156_0_4.sfs"
[RSP+1478] 0x2A01DBE57A0 (void*)
[RSP+1480] 0x1 (size_t)
[RSP+1488] 0x7FF694237AFD (void* -> Starfield.exe+3087AFD)
mov al,[rsp+48h]
[RSP+1490] 0xA361AFFA00 (stl::local_function_detail::LocalFunctionImpl<<lambda_2f96550ffc2a7381fd9f6f8ab938e58e>,BSVisit::BSVisitControl,NiAVObject &>*)
[RSP+1498] 0x2A01DBE58F0 (void*)
[RSP+14A0] 0x2A01DBE5650 (char*) "0)#"
[RSP+14A8] 0x2A3EC6A14C0 (void*)
[RSP+14B0] 0xA361AFFA00 (stl::local_function_detail::LocalFunctionImpl<<lambda_2f96550ffc2a7381fd9f6f8ab938e58e>,BSVisit::BSVisitControl,NiAVObject &>*)
[RSP+14B8] 0xA361AFF468 (void*)
[RSP+14C0] 0x0 (size_t)
[RSP+14C8] 0x7FF694237A3A (void* -> Starfield.exe+3087A3A)
movzx ecx,al
[RSP+14D0] 0x2A01DBE57A0 (void*)
[RSP+14D8] 0x0 (size_t)
[RSP+14E0] 0x2A0091ECD60 (char*) "\x19"
[RSP+14E8] 0x7FF6929830AF (void* -> Starfield.exe+17D30AF)
mov ecx,eax
[RSP+14F0] 0xA361AFF540 (void*)
[RSP+14F8] 0x2A01DBE58F0 (void*)
[RSP+1500] 0x73726573555C3A43 (size_t)
[RSP+1508] 0x20666F206E6F535C (size_t)
[RSP+1510] 0x445C616472617053 (size_t)
[RSP+1518] 0x73746E656D75636F (size_t)
[RSP+1520] 0x656D614720794D5C (size_t)
[RSP+1528] 0x6966726174535C73 (size_t)
[RSP+1530] 0x657661535C646C65 (size_t)
[RSP+1538] 0x3131657661535C73 (size_t)
[RSP+1540] 0x3641354343465F33 (size_t)
[RSP+1548] 0x37313632345F3643 (size_t)
[RSP+1550] 0x3633374636343734 (size_t)
[RSP+1558] 0x353137305F393631 (size_t)
[RSP+1560] 0x30343230325F3935 (size_t)
[RSP+1568] 0x3435323032303231 (size_t)
[RSP+1570] 0x5F305F3635315F35 (size_t)
[RSP+1578] 0x7366732E34 (size_t)
[RSP+1580] 0x1 (size_t)
[RSP+1588] 0x7FF694237AFD (void* -> Starfield.exe+3087AFD)
mov al,[rsp+48h]
[RSP+1590] 0xA361AFFA00 (stl::local_function_detail::LocalFunctionImpl<<lambda_2f96550ffc2a7381fd9f6f8ab938e58e>,BSVisit::BSVisitControl,NiAVObject &>*)
[RSP+1598] 0x2A01DB97110 (TESObjectREFR*)
[RSP+15A0] 0x2A01DBE58F0 (void*)
[RSP+15A8] 0x2A33B850000 (void*)
[RSP+15B0] 0xA361AFFA00 (stl::local_function_detail::LocalFunctionImpl<<lambda_2f96550ffc2a7381fd9f6f8ab938e58e>,BSVisit::BSVisitControl,NiAVObject &>*)
[RSP+15B8] 0xA361AFF568 (void*)
[RSP+15C0] 0x2 (size_t)
[RSP+15C8] 0x7FF694237A3A (void* -> Starfield.exe+3087A3A)
movzx ecx,al
[RSP+15D0] 0x2A01DBE53B0 (char*) "0)#"
[RSP+15D8] 0xA300000000 (size_t)
[RSP+15E0] 0x2A017BB0200 (BSGeometry*)
[RSP+15E8] 0x7FF694996B4C (void* -> Starfield.exe+37E6B4C)
add rsp,0A0h
[RSP+15F0] 0xA361AFF640 (void*)
[RSP+15F8] 0x2A01DBE5110 (void*)
[RSP+1600] 0x1 (size_t)
[RSP+1608] 0x7FF694237AFD (void* -> Starfield.exe+3087AFD)
mov al,[rsp+48h]
[RSP+1610] 0xA361AFFA00 (stl::local_function_detail::LocalFunctionImpl<<lambda_2f96550ffc2a7381fd9f6f8ab938e58e>,BSVisit::BSVisitControl,NiAVObject &>*)
[RSP+1618] 0x2A01DB97260 (TESObjectREFR*)
[RSP+1620] 0x2A01DBE53B0 (char*) "0)#"
[RSP+1628] 0x0 (size_t)
[RSP+1630] 0xA361AFFA00 (stl::local_function_detail::LocalFunctionImpl<<lambda_2f96550ffc2a7381fd9f6f8ab938e58e>,BSVisit::BSVisitControl,NiAVObject &>*)
[RSP+1638] 0xA361AFF5E8 (void*)
[RSP+1640] 0x2 (size_t)
[RSP+1648] 0x7FF694237A3A (void* -> Starfield.exe+3087A3A)
movzx ecx,al
[RSP+1650] 0x2A01DBE5110 (void*)
[RSP+1658] 0x7FF6946EA149 (void* -> Starfield.exe+353A149)
and ecx,0FFFFFFh
[RSP+1660] 0x0 (size_t)
[RSP+1668] 0x7FF69248D72F (void* -> Starfield.exe+12DD72F)
mov rdx,rax
[RSP+1670] 0xA361AFF6C0 (void*)
[RSP+1678] 0x2A01DB97260 (TESObjectREFR*)
[RSP+1680] 0xA361AFFA60 (char*) "pB\xe2\xba\x97\x02"
[RSP+1688] 0x7FF6949926DE (void* -> Starfield.exe+37E26DE)
add rsp,20h
[RSP+1690] 0x2A029F91E00 (char*) "\x01"
[RSP+1698] 0xA361AFF750 (void*)
[RSP+16A0] 0x2979C406300 (StorageTable::AsyncTableColumn<StorageTable::MorphData::Storage,BSStaticBitField<unsigned char> >*)
[RSP+16A8] 0x46 (size_t)
[RSP+16B0] 0x0 (size_t)
[RSP+16B8] 0x7FF693775DB2 (void* -> Starfield.exe+25C5DB2)
mov r13,rax
[RSP+16C0] 0x0 (size_t)
[RSP+16C8] 0x7FF694237A3A (void* -> Starfield.exe+3087A3A)
movzx ecx,al
[RSP+16D0] 0x2A01DB97260 (TESObjectREFR*)
[RSP+16D8] 0x0 (size_t)
[RSP+16E0] 0x0 (size_t)
[RSP+16E8] 0xFC (size_t)
[RSP+16F0] 0xA361AFF740 (void*)
[RSP+16F8] 0x2A01DBE4D20 (void*)
[RSP+1700] 0x1 (size_t)
[RSP+1708] 0x7FF694237AFD (void* -> Starfield.exe+3087AFD)
mov al,[rsp+48h]
[RSP+1710] 0xA361AFFA00 (stl::local_function_detail::LocalFunctionImpl<<lambda_2f96550ffc2a7381fd9f6f8ab938e58e>,BSVisit::BSVisitControl,NiAVObject &>*)
[RSP+1718] 0x2A01DB202A0 (TESObjectREFR*)
[RSP+1720] 0x2A01DB97260 (TESObjectREFR*)
[RSP+1728] 0x0 (size_t)
[RSP+1730] 0x0 (size_t)
[RSP+1738] 0xA361AFF6E8 (void*)
[RSP+1740] 0x29F9B6A2480 (void*)
[RSP+1748] 0x7FF694237A3A (void* -> Starfield.exe+3087A3A)
movzx ecx,al
[RSP+1750] 0x2A01DBE4D20 (void*)
[RSP+1758] 0x7FF6926CDB00 (void* -> Starfield.exe+151DB00)
ret
[RSP+1760] 0x0 (size_t)
[RSP+1768] 0x2A029D9B400 (void*)
[RSP+1770] 0xA361AFF7C0 (void*)
[RSP+1778] 0x2A01DB202A0 (TESObjectREFR*)
[RSP+1780] 0x1 (size_t)
[RSP+1788] 0x7FF694237AFD (void* -> Starfield.exe+3087AFD)
mov al,[rsp+48h]
[RSP+1790] 0xA361AFFA00 (stl::local_function_detail::LocalFunctionImpl<<lambda_2f96550ffc2a7381fd9f6f8ab938e58e>,BSVisit::BSVisitControl,NiAVObject &>*)
[RSP+1798] 0x2A01DB203F0 (TESObjectREFR*)
[RSP+17A0] 0x2A01DBE4D20 (void*)
[RSP+17A8] 0x29F9B6A2480 (void*)
[RSP+17B0] 0xA361AFFA00 (stl::local_function_detail::LocalFunctionImpl<<lambda_2f96550ffc2a7381fd9f6f8ab938e58e>,BSVisit::BSVisitControl,NiAVObject &>*)
[RSP+17B8] 0xA361AFF768 (void*)
[RSP+17C0] 0x0 (size_t)
[RSP+17C8] 0x7FF694237A3A (void* -> Starfield.exe+3087A3A)
movzx ecx,al
[RSP+17D0] 0x2A01DB202A0 (TESObjectREFR*)
[RSP+17D8] 0x7FF692656000 (void* -> Starfield.exe+14A6000)
mov rbp,rdx
[RSP+17E0] 0x7FF697CD9F40 (void* -> Starfield.exe+6B29F40)
jo short 0000000000000064h
[RSP+17E8] 0x7FF691961B04 (void* -> Starfield.exe+07B1B04)
add rsp,28h
[RSP+17F0] 0xA361AFF840 (void*)
[RSP+17F8] 0x2A01DB203F0 (TESObjectREFR*)
[RSP+1800] 0x1 (size_t)
[RSP+1808] 0x7FF694237AFD (void* -> Starfield.exe+3087AFD)
mov al,[rsp+48h]
[RSP+1810] 0xA361AFFA00 (stl::local_function_detail::LocalFunctionImpl<<lambda_2f96550ffc2a7381fd9f6f8ab938e58e>,BSVisit::BSVisitControl,NiAVObject &>*)
[RSP+1818] 0x2A01DB20540 (TESObjectREFR*)
[RSP+1820] 0x2A01DB202A0 (TESObjectREFR*)
[RSP+1828] 0x7FF692624E08 (void* -> Starfield.exe+1474E08)
mov al,bl
[RSP+1830] 0xA361AFFA00 (stl::local_function_detail::LocalFunctionImpl<<lambda_2f96550ffc2a7381fd9f6f8ab938e58e>,BSVisit::BSVisitControl,NiAVObject &>*)
[RSP+1838] 0xA361AFF7E8 (void*)
[RSP+1840] 0x0 (size_t)
[RSP+1848] 0x7FF694237A3A (void* -> Starfield.exe+3087A3A)
movzx ecx,al
[RSP+1850] 0x2A01DB203F0 (TESObjectREFR*)
[RSP+1858] 0x7FF693778F00 (void* -> Starfield.exe+25C8F00)
add eax,0B621F2E8h
[RSP+1860] 0x297E8FF74C0 (void*)
[RSP+1868] 0x0 (size_t)
[RSP+1870] 0xA361AFF8C0 (void*)
[RSP+1878] 0x2A01DB20540 (TESObjectREFR*)
[RSP+1880] 0x1 (size_t)
[RSP+1888] 0x7FF694237AFD (void* -> Starfield.exe+3087AFD)
mov al,[rsp+48h]
[RSP+1890] 0xA361AFFA00 (stl::local_function_detail::LocalFunctionImpl<<lambda_2f96550ffc2a7381fd9f6f8ab938e58e>,BSVisit::BSVisitControl,NiAVObject &>*)
[RSP+1898] 0x2A01DB20690 (TESObjectREFR*)
[RSP+18A0] 0x2A01DB203F0 (TESObjectREFR*)
[RSP+18A8] 0x0 (size_t)
[RSP+18B0] 0xA361AFFA00 (stl::local_function_detail::LocalFunctionImpl<<lambda_2f96550ffc2a7381fd9f6f8ab938e58e>,BSVisit::BSVisitControl,NiAVObject &>*)
[RSP+18B8] 0xA361AFF868 (void*)
[RSP+18C0] 0x0 (size_t)
[RSP+18C8] 0x7FF694237A3A (void* -> Starfield.exe+3087A3A)
movzx ecx,al
[RSP+18D0] 0x2A01DB20540 (TESObjectREFR*)
[RSP+18D8] 0x0 (size_t)
[RSP+18E0] 0x297E8FF74C0 (void*)
[RSP+18E8] 0x0 (size_t)
[RSP+18F0] 0x0 (size_t)
[RSP+18F8] 0x0 (size_t)
[RSP+1900] 0x0 (size_t)
[RSP+1908] 0x0 (size_t)
[RSP+1910] 0x0 (size_t)
[RSP+1918] 0x0 (size_t)
[RSP+1920] 0x43800000 (size_t)
[RSP+1928] 0x0 (size_t)
[RSP+1930] 0x469D72B9 (size_t)
[RSP+1938] 0x0 (size_t)
[RSP+1940] 0x55005C003A0043 (size_t)
[RSP+1948] 0x73007200650073 (size_t)
[RSP+1950] 0x6E006F0053005C (size_t)
[RSP+1958] 0x200066006F0020 (size_t)
[RSP+1960] 0x72006100700053 (size_t)
[RSP+1968] 0x44005C00610064 (size_t)
[RSP+1970] 0x6D00750063006F (size_t)
[RSP+1978] 0x730074006E0065 (size_t)
[RSP+1980] 0x200079004D005C (size_t)
[RSP+1988] 0x65006D00610047 (size_t)
[RSP+1990] 0x740053005C0073 (size_t)
[RSP+1998] 0x69006600720061 (size_t)
[RSP+19A0] 0x5C0064006C0065 (size_t)
[RSP+19A8] 0x65007600610053 (size_t)
[RSP+19B0] 0x5C0073 (size_t)
[RSP+19B8] 0xA361AFF968 (void*)
[RSP+19C0] 0x0 (size_t)
[RSP+19C8] 0x7FF694237A3A (void* -> Starfield.exe+3087A3A)
movzx ecx,al
[RSP+19D0] 0x2A029F91400 (ExtraMaterialSwap*)
[RSP+19D8] 0x7FF693823500 (void* -> Starfield.exe+2673500)
[RSP+19E0] 0xA361AFFA20 (void*)
[RSP+19E8] 0x7FF6923D0ABB (void* -> Starfield.exe+1220ABB)
add rsp,28h
[RSP+19F0] 0xA35ECFFB01 (void*)
[RSP+19F8] 0x2A029F88E70 (TESObjectREFR*)
[RSP+1A00] 0x2A00076D180 (void*)
[RSP+1A08] 0x7FF694237AFD (void* -> Starfield.exe+3087AFD)
mov al,[rsp+48h]
[RSP+1A10] 0xA361AFFA00 (stl::local_function_detail::LocalFunctionImpl<<lambda_2f96550ffc2a7381fd9f6f8ab938e58e>,BSVisit::BSVisitControl,NiAVObject &>*)
[RSP+1A18] 0x1 (size_t)
[RSP+1A20] 0x2A029F91400 (ExtraMaterialSwap*)
[RSP+1A28] 0x7FF6919590B9 (void* -> Starfield.exe+07A90B9)
mov rax,rbx
[RSP+1A30] 0xA361AFFA00 (stl::local_function_detail::LocalFunctionImpl<<lambda_2f96550ffc2a7381fd9f6f8ab938e58e>,BSVisit::BSVisitControl,NiAVObject &>*)
[RSP+1A38] 0xA361AFF9E8 (void*)
[RSP+1A40] 0x4 (size_t)
[RSP+1A48] 0x7FF693770A8C (void* -> Starfield.exe+25C0A8C)
xor ebp,ebp
[RSP+1A50] 0x2A029F88E70 (TESObjectREFR*)
[RSP+1A58] 0x7FF6938DAC00 (void* -> Starfield.exe+272AC00)
push rax
[RSP+1A60] 0x2A014327AE0 (void*)
[RSP+1A68] 0x7FF69193EF73 (void* -> Starfield.exe+078EF73)
test al,al
[RSP+1A70] 0x7FF6966AB588 (void* -> Starfield.exe+54FB588)
push rax
[RSP+1A78] 0xA361AFFA60 (char*) "pB\xe2\xba\x97\x02"
[RSP+1A80] 0x297BAE24270 (Actor*)
[RSP+1A88] 0x7FF69378EFE7 (void* -> Starfield.exe+25DEFE7)
add rsp,68h
[RSP+1A90] 0x2A029F88E70 (TESObjectREFR*)
[RSP+1A98] 0x297F71248E0 (void*)
[RSP+1AA0] 0xA361AFFA88 (char*) "pB\xe2\xba\x97\x02"
[RSP+1AA8] 0x2A00076D180 (void*)
[RSP+1AB0] 0xA361AFFAB8 (void*)
[RSP+1AB8] 0xA361AFFAC0 (void*)
[RSP+1AC0] 0xA361AFFAC8 (void*)
[RSP+1AC8] 0x7FF696508B78 (void* -> Starfield.exe+5358B78)
nop
[RSP+1AD0] 0x297BAE24270 (Actor*)
[RSP+1AD8] 0x297F71248E0 (void*)
[RSP+1AE0] 0x2A00076D180 (void*)
[RSP+1AE8] 0x7FF693000100 (void* -> Starfield.exe+1E50100)
sub esp,70h
[RSP+1AF0] 0x2A00076D101 (void*)
[RSP+1AF8] 0x297BAE24270 (Actor*)
[RSP+1B00] 0x1 (size_t)
[RSP+1B08] 0x2A00076D100 (char*) "\x05"
[RSP+1B10] 0x2A01DB77E00 (void*)
[RSP+1B18] 0x7FF69377C23E (void* -> Starfield.exe+25CC23E)
vmovaps xmm6,[rsp+40h]
[RSP+1B20] 0x0 (size_t)
[RSP+1B28] 0x0 (size_t)
[RSP+1B30] 0x0 (size_t)
[RSP+1B38] 0x7FF69178EC39 (void* -> Starfield.exe+05DEC39)
add rsp,28h
[RSP+1B40] 0x0 (size_t)
[RSP+1B48] 0x0 (size_t)
[RSP+1B50] 0x0 (size_t)
[RSP+1B58] 0x0 (size_t)
[RSP+1B60] 0x0 (size_t)
[RSP+1B68] 0x0 (size_t)
[RSP+1B70] 0x0 (size_t)
[RSP+1B78] 0xFFFFFFFF (size_t)
[RSP+1B80] 0x29BA2B21A80 (BGSSaveLoadManager*)
[RSP+1B88] 0x7FF69372A899 (void* -> Starfield.exe+257A899)
mov rcx,[rbx]
[RSP+1B90] 0x29F00000056 (void*)
[RSP+1B98] 0x2A003962D20 (void*)
[RSP+1BA0] 0x29BFFFFFFFF (void*)
[RSP+1BA8] 0x7FF600000000 (size_t)
[RSP+1BB0] 0x0 (size_t)
[RSP+1BB8] 0x1 (size_t)
[RSP+1BC0] 0xA361AFFC40 (void*)
[RSP+1BC8] 0x7FF6937390B6 (void* -> Starfield.exe+25890B6)
nop
[RSP+1BD0] 0x2A003962D10 (BSService::Detail::TCmd<<lambda_055a84c5d8274cbd6a12d9638d563d2f>,std::reference_wrapper<BGSSaveLoadManager>,int &,unsigned int &,bool &,bool &>*)
[RSP+1BD8] 0x1DD56A28681 (size_t)
[RSP+1BE0] 0x2979A27D240 (void*)
[RSP+1BE8] 0x0 (size_t)
[RSP+1BF0] 0x29799B6E028 (stl::unique_function_impl::detail::TypeErasedFuncImpl<<lambda_8291e7d1e643b42ca1ce574da97d71a6>,void *>*)
[RSP+1BF8] 0x7FF694606A9D (void* -> Starfield.exe+3456A9D)
mov rdx,rbx
[RSP+1C00] 0x0 (size_t)
[RSP+1C08] 0x29700000000 (size_t)
[RSP+1C10] 0x0 (size_t)
[RSP+1C18] 0x0 (size_t)
[RSP+1C20] 0x7FF699F0F140 (void* -> Starfield.exe+8D5F140)
xchg ebx,eax
[RSP+1C28] 0x7FF6946076F9 (void* -> Starfield.exe+34576F9)
jmp short 0000000000000078h
[RSP+1C30] 0x0 (size_t)
[RSP+1C38] 0x2A003962D10 (BSService::Detail::TCmd<<lambda_055a84c5d8274cbd6a12d9638d563d2f>,std::reference_wrapper<BGSSaveLoadManager>,int &,unsigned int &,bool &,bool &>*)
[RSP+1C40] 0x1DD56A28681 (size_t)
[RSP+1C48] 0x2979A27D240 (void*)
[RSP+1C50] 0x7FF696749E00 (void* -> Starfield.exe+5599E00)
[RSP+1C58] 0x2979A27DA08 (BSJobs2::Detail::GroupThread*)
[RSP+1C60] 0x2A003962D10 (BSService::Detail::TCmd<<lambda_055a84c5d8274cbd6a12d9638d563d2f>,std::reference_wrapper<BGSSaveLoadManager>,int &,unsigned int &,bool &,bool &>*)
[RSP+1C68] 0x2 (size_t)
[RSP+1C70] 0x0 (size_t)
[RSP+1C78] 0x2979A27DA08 (BSJobs2::Detail::GroupThread*)
[RSP+1C80] 0x7FF696749E08 (void* -> Starfield.exe+5599E08)
adc [rbp+3Ch],ch
[RSP+1C88] 0x0 (size_t)
[RSP+1C90] 0x7FF697C2BA40 (BSFixedSizeBlockAllocator::TAlloc<4294967296,16777216,128>*)
[RSP+1C98] 0x7FF694605810 (void* -> Starfield.exe+3455810)
mov ecx,[31C3464h]
[RSP+1CA0] 0x1DD56A28681 (size_t)
[RSP+1CA8] 0x0 (size_t)
[RSP+1CB0] 0x2A003962D10 (BSService::Detail::TCmd<<lambda_055a84c5d8274cbd6a12d9638d563d2f>,std::reference_wrapper<BGSSaveLoadManager>,int &,unsigned int &,bool &,bool &>*)
[RSP+1CB8] 0x1 (size_t)
[RSP+1CC0] 0x0 (size_t)
[RSP+1CC8] 0x7FF694607CAE (void* -> Starfield.exe+3457CAE)
xor eax,eax
[RSP+1CD0] 0x0 (size_t)
[RSP+1CD8] 0x0 (size_t)
[RSP+1CE0] 0x2979A27DA08 (BSJobs2::Detail::GroupThread*)
[RSP+1CE8] 0x7FF696749E08 (void* -> Starfield.exe+5599E08)
adc [rbp+3Ch],ch
[RSP+1CF0] 0x2979A27DA08 (BSJobs2::Detail::GroupThread*)
[RSP+1CF8] 0x7FF6940FD411 (void* -> Starfield.exe+2F4D411)
mov rcx,[3AFF2CFh]
[RSP+1D00] 0x7FF697C2BA40 (BSFixedSizeBlockAllocator::TAlloc<4294967296,16777216,128>*)
[RSP+1D08] 0x7FF696749E08 (void* -> Starfield.exe+5599E08)
adc [rbp+3Ch],ch
[RSP+1D10] 0x0 (size_t)
[RSP+1D18] 0x7FF699CE84C8 (BSThreadEvent::`anonymous namespace'::Source*)
[RSP+1D20] 0x2979A27DA08 (BSJobs2::Detail::GroupThread*)
[RSP+1D28] 0x0 (size_t)
[RSP+1D30] 0x0 (size_t)
[RSP+1D38] 0x0 (size_t)
[RSP+1D40] 0x7FF696749E08 (void* -> Starfield.exe+5599E08)
adc [rbp+3Ch],ch
[RSP+1D48] 0xA361AFFCB0 (void*)
[RSP+1D50] 0x7FF699CE84C8 (BSThreadEvent::`anonymous namespace'::Source*)
[RSP+1D58] 0x0 (size_t)
[RSP+1D60] 0x0 (size_t)
[RSP+1D68] 0x0 (size_t)
[RSP+1D70] 0x0 (size_t)
[RSP+1D78] 0x7FFAC72B259D (void* -> KERNEL32.DLL+001259D BaseThreadInitThunk)
mov ecx,eax
[RSP+1D80] 0x0 (size_t)
[RSP+1D88] 0x0 (size_t)
[RSP+1D90] 0x0 (size_t)
[RSP+1D98] 0x0 (size_t)
[RSP+1DA0] 0x0 (size_t)
[RSP+1DA8] 0x7FFAC884AF38 (void* -> ntdll.dll+005AF38 RtlUserThreadStart)
jmp short 0000000000000021h
[RSP+1DB0] 0x0 (size_t)
[RSP+1DB8] 0x0 (size_t)
[RSP+1DC0] 0x0 (size_t)
[RSP+1DC8] 0x0 (size_t)
[RSP+1DD0] 0x0 (size_t)
[RSP+1DD8] 0x0 (size_t)
[RSP+1DE0] 0x7BD43D3B00000000 (size_t)
[RSP+1DE8] 0x0 (size_t)
[RSP+1DF0] 0x4F0FFFFFB30 (size_t)
[RSP+1DF8] 0x7FFAC5C1D140 (void* -> KERNELBASE.dll+016D140 UnhandledExceptionFilter)
mov [rsp+10h],rbx
[RSP+1E00] 0xA361AFD0C0 (void*)
[RSP+1E08] 0xFFF57C2BD8F60 (size_t)
[RSP+1E10] 0x7FFABE15EC7B (size_t)
[RSP+1E18] 0xA361AFD0C0 (void*)
[RSP+1E20] 0x0 (size_t)
[RSP+1E28] 0x0 (size_t)
[RSP+1E30] 0x0 (size_t)
[RSP+1E38] 0x0 (size_t)
[RSP+1E40] 0x0 (size_t)
[RSP+1E48] 0x0 (size_t)
[RSP+1E50] 0x0 (size_t)
[RSP+1E58] 0x0 (size_t)
[RSP+1E60] 0x0 (size_t)
[RSP+1E68] 0x0 (size_t)
[RSP+1E70] 0x0 (size_t)
[RSP+1E78] 0x0 (size_t)
[RSP+1E80] 0x0 (size_t)
[RSP+1E88] 0x0 (size_t)
[RSP+1E90] 0x0 (size_t)
[RSP+1E98] 0x0 (size_t)
[RSP+1EA0] 0x0 (size_t)
[RSP+1EA8] 0x0 (size_t)
[RSP+1EB0] 0x0 (size_t)
[RSP+1EB8] 0x0 (size_t)
[RSP+1EC0] 0x0 (size_t)
[RSP+1EC8] 0x0 (size_t)
[RSP+1ED0] 0x0 (size_t)
[RSP+1ED8] 0x0 (size_t)
[RSP+1EE0] 0x0 (size_t)
[RSP+1EE8] 0x0 (size_t)
[RSP+1EF0] 0x0 (size_t)
[RSP+1EF8] 0x0 (size_t)
[RSP+1F00] 0x0 (size_t)
[RSP+1F08] 0x0 (size_t)
[RSP+1F10] 0x0 (size_t)
[RSP+1F18] 0x0 (size_t)
[RSP+1F20] 0x0 (size_t)
[RSP+1F28] 0x0 (size_t)
[RSP+1F30] 0x0 (size_t)
[RSP+1F38] 0x0 (size_t)
[RSP+1F40] 0x0 (size_t)
[RSP+1F48] 0x0 (size_t)
[RSP+1F50] 0x0 (size_t)
[RSP+1F58] 0x0 (size_t)
[RSP+1F60] 0x0 (size_t)
[RSP+1F68] 0x0 (size_t)
[RSP+1F70] 0x0 (size_t)
[RSP+1F78] 0x0 (size_t)
[RSP+1F80] 0x0 (size_t)
[RSP+1F88] 0x0 (size_t)
[RSP+1F90] 0x0 (size_t)
[RSP+1F98] 0x0 (size_t)
[RSP+1FA0] 0x0 (size_t)
[RSP+1FA8] 0x0 (size_t)
[RSP+1FB0] 0x0 (size_t)
[RSP+1FB8] 0x0 (size_t)
[RSP+1FC0] 0x0 (size_t)
[RSP+1FC8] 0x0 (size_t)
[RSP+1FD0] 0x0 (size_t)
[RSP+1FD8] 0x0 (size_t)
[RSP+1FE0] 0x0 (size_t)
[RSP+1FE8] 0x0 (size_t)
[RSP+1FF0] 0x0 (size_t)
[RSP+1FF8] 0x0 (size_t)
[RSP+2000] 0x0 (size_t)
[RSP+2008] 0x0 (size_t)
[RSP+2010] 0x0 (size_t)
[RSP+2018] 0x0 (size_t)
[RSP+2020] 0x0 (size_t)
[RSP+2028] 0x0 (size_t)
[RSP+2030] 0x0 (size_t)
[RSP+2038] 0x0 (size_t)
[RSP+2040] 0x0 (size_t)
[RSP+2048] 0x0 (size_t)
[RSP+2050] 0x0 (size_t)
[RSP+2058] 0x0 (size_t)
[RSP+2060] 0x0 (size_t)
[RSP+2068] 0x0 (size_t)
MODULES:
_nvngx.dll
Address: 0x7FFA32EE0000
SHA: BBDA687DCDFA37212C43A4BD9850CCE9F1FB952A9492FC94BB2DFE77D02D39781154AC0621B68DDD97F1E4149E9F5C9AC5CA0A42DD0FF532401EAB11CBAEB0FB
Version: v32.0.15.6614
ADVAPI32.dll
Address: 0x7FFAC70B0000
SHA: 8F3A43C518284C94A9AB7E4E24A5262CAC8B197DFC6C810E7DEDF69EAC5C98E978C3360B8F661D0E4938C91E0FA27EC6F4FD8D2EEAF14530A4B68008685EE73A
Version: v10.0.22621.4745
amsi.dll
Address: 0x7FFAB0600000
SHA: 4CFABD93F9704F6D560C2D5236927C1372F8E341B039BC9FDF8A0A06F7EFEC664ADCDC73CE5010A2ADA2994D12D6A8D679CBBD8075352FF0741AB42E1D1CD2D1
Version: v10.0.22621.3527
AUDIOSES.DLL
Address: 0x7FFAB8AF0000
SHA: 5A1D0704548BFEA37AA160CDC556E9BEA159DF837E96E3411AF22B80C50F6E03FCF32B813949C9358B392A6320B173D1A8E2FDE5F6E4FA2CED1D662D5B6BE42B
Version: v10.0.22621.4745
avamsi.dll
Address: 0x7FFAB0570000
SHA: 782351AB0DEBEBDBC3C508502AF2A027B5F82FCE772F818E54852641FE06D801A9FD32C899892B1731E2B8DF83C20DB3721AA590AD2C8806AC74C1DE4B455644
Version: v1.15702.2411.1255
BakaAchievementEnabler.dll
Address: 0x7FFA41120000
SHA: BD9B907DB16E30FC74B219B129AA75DEDD294F7239222FCFD09FBE498A2EFD60A09CA3BDE021F7AE4FBAF6AC8AC9F9EA6C6DF243D6E948645BE8D26BD959836A
Version: v5.0.0
BakaDisableMyGames.dll
Address: 0x7FFA40A30000
SHA: 069D082585A1ED7AB45FA4ED32C2F26E441D3E0068E65038595024079B446C799EEDF466A78EF81CBA186472E1D9695FDF136DAB990938890B646D1B1407CC90
Version: v5.0.0
BakaQuitGameFix.dll
Address: 0x7FFA3E2F0000
SHA: 830A96059D57B3AADE2CB29232A1F317BAD693C3D8C92ED3683909BCC7910C36B6DA00C76F449727176EF636EDAFB6295D0D773F0DB2AF96A5F3DE9940BE3C54
Version: v5.0.0
BayAndDocker-Count-Mod.dll
Address: 0x7FFAA99C0000
SHA: B85470BEECDC6570ABA30D358ACC0DD0AA297F01D210CEDA561042C8ED0CBE61C6BC91F768A875BAC3CB413BECBFFACC014AE66EB346D1AFA807EFB012EA00BA
bcrypt.dll
Address: 0x7FFAC63F0000
SHA: 6D03EC34F4DA7ED566416730865F2DDEE209FECFE454EE73A0EE025A4C49602BA52DDFBEC389D701F159E8C2C0F7F74044C608BEB28B9896C7F6CBCE1CA0643B
Version: v10.0.22621.4745
bcryptPrimitives.dll
Address: 0x7FFAC6370000
SHA: 53EE624AA4F3EBA079AB163880E6BF030DC20B3EAE926DB87FAE8462F3C5BA6BA06120DD337EA8C138B55966C582A50D34C02E02590669B3329D6219CB1947FE
Version: v10.0.22621.4317
BetterConsole.dll
Address: 0x7FFA64080000
SHA: E147A21D21BACA4B511CA13ADDCBC15818E3CD946CD34A9910E8642FC04FCD7ABD4CD8CFFF15A39E28E0AB516B3E3214F4790DE677D12959F475370DA0415977
Version: v1.4.3
bink2w64.dll
Address: 0x7FFA64BE0000
SHA: 61AB61B895332AE98F5491D07975E5D6A1E42747DE1AE292298CB008AB63AB410F8A7684DB7DDA694EBCC351783D68EDB167B4EEEAB74DBEC6C1BB238E62BEED
Version: v2023.2.0
CarryOverPlayerInventory.dll
Address: 0x7FFA62DB0000
SHA: 0872690B75CB2C285B492F1837E184939B4B49781268D8C307CC0F8152D918E18C37E0C17A217EC9B3E2A4E827D246D38E1A2EC55884E5C991E2F82C2D557B23
Version: v2.2.0
CassiopeiaPapyrusExtender.dll
Address: 0x7FFA34DE0000
SHA: 18FB00C8913E6B9D23FE4370C99F19B5F0FABFAC1A6C624B884E2C20834D2FAAA9BA24674776DE6193B027A5ACCF7833D3F05174990424720C9A0E50015EC7D1
Version: v2.7.0
CFGMGR32.dll
Address: 0x7FFAC57A0000
SHA: 49888965143C96F2F210B95D16BAD1C039C0470340D8F908EDA6F693929DBBA1E66269B951D402F395185C8EB989E21B28F14244322A5FFDB459B39E462D2EDA
Version: v10.0.22621.2506
clbcatq.dll
Address: 0x7FFAC8490000
SHA: F82356DD39C9D04C82ADE46F9544B21ED07610ABF9DFB39C5531BCF7C86A144157502A75CEFA15CC82FC8FF9B0FC25CF9EF4EA96BC01C5E12F8D561FACA4BA75
Version: v2001.12.10941.16384
combase.dll
Address: 0x7FFAC7530000
SHA: 1A3B54A3390FA1F938F16B94734D99651F266F158B6519EC0410F01D6F6CFA6F49460A2D1802A19EB5DE7560E2BA6E848D0327220D9C52C97C985E810621428D
Version: v10.0.22621.4745
COMCTL32.dll
Address: 0x7FFAAFF50000
SHA: B1CF5A636AECEEEDD90870F266787649A1A825AF0C90FFE8A36350F2544796B76D99F3837A0FA265306B8502EF408B7AC86F3ABD88684CC1CA201AF5DEACBA41
COMDLG32.dll
Address: 0x7FFAC6FB0000
SHA: 3374A8A7393D0C60CF541ACC7C5F32FC8C5A1D62DA0949DC67FC5AB8A001F2DC0EB3AD21D60FA8F85B546B0D7F3EAF74155FC610CC8AD15830E8CEC4B23D63CF
Version: v10.0.22621.4745
CONCRT140.dll
Address: 0x7FFAA4870000
SHA: 6F3EC746EC10334692E930B515A37F3D5BD342CA60A49C4298924BE933262D7D782DE8A11D4F865A30A5AA22C5515059E3E39A92A61AE5FAE53622CEAA7D5C4B
Version: v14.42.34433
ConsoleCommandRunner.dll
Address: 0x7FFA361E0000
SHA: 41C02A0A32FCD260B68C52BB5DF7CEC56432F72A09B67B0C422D339772EC6972E11EE8CC7B2775EF05C087361D2880A0BCEEABB48AB2BD008D8D219B674C2237
Version: v1.5.0
CoreMessaging.dll
Address: 0x7FFAC1240000
SHA: B325F6B5B76CD8FF3388F67B6EEB5DF3CC5DD2299B8435210596FBBFFA49CF29AD4DAB35A8AF769F7DD67C998A768AD0094B4FE010F37D35AE35F4C738E2DB67
Version: v10.0.22621.4541
CoreUIComponents.dll
Address: 0x7FFABD720000
SHA: F4865B83675EAE4D1CD5D1EC8FBC6CCDF7B62AA89EB3B844FFC0F6C9E57FE307F2C745F03E2D49232114CD3EAEB57149AF7F607C5EC04987C1D36E23C846ED46
Version: v10.0.22621.4541
CRYPT32.dll
Address: 0x7FFAC5F90000
SHA: B7397075B8F334049529541027784769CEEABB4E4DBED18F0203984D78E1348EE90188E568CDF55BC69D46BE63D726FA5B4AF59DBB1F144C516545D5CC6C3DA3
Version: v10.0.22621.4745
CRYPTBASE.DLL
Address: 0x7FFAC52B0000
SHA: AEBC7881579F95FF2238ECD7995694A222901D4AE1FF7EB44A5747C5EE0108A7A412258D034D5DBC2C18C82D37681D0358A25151D4507CADF68EA5E48DDFE8B5
Version: v10.0.22621.4746
cryptnet.dll
Address: 0x7FFABD6E0000
SHA: 9D956FA294D7778EDBBC4967D16302383E2F4A92905C43BB61CFF8494C1BACBC052A2D8729FA3600C69A8DA37F90EBEAFF0B4115BC0F5F3E0754508BDE18E9DA
Version: v10.0.22621.1
cryptsp.dll
Address: 0x7FFAC52C0000
SHA: B0DE63D441195DF2B7FDEA9DCC4D87968887480AB962F40DF37F2419A74A27062ACE4D8F4823F70FEE5BE329206ADD2C81472A130E300987861CFB65CC786FF5
Version: v10.0.22621.3672
d3d11.dll
Address: 0x7FFAC0810000
SHA: 554EAC4ABC69618A7D975CF359EC17CDBFABBCDB344987EC46AA01110E92B94292AB91A0E56F3B4790A7526FA00E83DC11EC27D3AB5C3626DA4701AA6105B183
Version: v10.0.22621.4541
d3d11on12.dll
Address: 0x7FFA32CE0000
SHA: 357C17DACBBC600625CF1D201C46F525429C0248F12ED1A1FE98D03136F18DE513F3139D9C372663290903DEA02D3D3A56671BFE278B41353DFF1EEA639A7DB7
Version: v10.0.22621.2506
d3d12.dll
Address: 0x7FFA978E0000
SHA: 7733C1E0C543325FE8C3BB634FB57EAF710650C72BACD8E07C634753D36948EC6AA03AC2FA1C744030B6F5B4CA0605924C86744DABCB47A01F90D281F33E50EA
Version: v10.0.22621.4541
D3D12Core.dll
Address: 0x7FFA33130000
SHA: B44437ED5E2BCC9ADF44E7458312C0EF0C7B6548231542F31664B9E51DB932DFD40C8F7D17470ED0DA938D73FEE5ADDBD6184B91A66BD0B8EEA0B206137A0388
Version: v1.608.2
D3DCOMPILER_47.dll
Address: 0x7FFABF7E0000
SHA: D0F083D13CA42C25CBC4DEC6056845C8BA345B3E4F132090653CFF7A4E84B67EFEFAC77689FD7BEF09165C58923B6AEC30F1CBDFFDF674A00F825398B21E3C2C
Version: v10.0.22621.2506
D3DSCache.dll
Address: 0x7FFA7A660000
SHA: D14571E6CF0638237D4C24DCC0B2083CC499F71652BFBF83D81EF52DC147683B72DF9C0E674D9D180228760CAB6E4EBB474D5E5E3E19A7FCAAE0A1C445BEEA63
Version: v10.0.22621.4745
dbgcore.DLL
Address: 0x7FFAA49C0000
SHA: 60AAF521309B6B697B5DB66FB6101AEC6DA0B6F59706E2C7622D12339B65393958A35D4CC97B1AD88A4D75D7E30098FAE1F4909FE80340C39104325B7895EA0C
Version: v10.0.22621.1
dbghelp.dll
Address: 0x7FFAB61A0000
SHA: 4ADA171665E5E4596A02EDE87EAD13A7C4581DA86CAA173629562F0798ABE05F1CA701D526F59ED923203D156BDC284DE007985B3DE1299E8DF9815AE51C357F
Version: v10.0.22621.3593
dcomp.dll
Address: 0x7FFAC0B20000
SHA: 5174EE1835754DF0FF21C022E3F4C9863E31C9E3C6DD7E82AC9E838400F8F8C313D5F74588D4B3BBCA36FC8B8063552EB03BE8A3BC2EBA06EA061A9F02CBA773
Version: v10.0.22621.4541
DEVOBJ.dll
Address: 0x7FFAC5770000
SHA: 5364886DFC402E74153B7EC2987BBC041B615C3AB2FD74EB161B6B49EEDD2F7538D2A56D0B06E99984B3E1B745E9DD04BB90099EB37E4BF31F0006C022630681
Version: v10.0.22621.2506
DEVRTL.dll
Address: 0x7FFAAFA10000
SHA: F776E1810BA33A3F7097E21E8F1779A8C1CD899B9A6455F13C605B363A3358C4A01AF367132C6E792735A02066AA16F8BEAFCE4A3753A2196EF9ECE819676687
Version: v10.0.22621.1
dhcpcsvc.DLL
Address: 0x7FFAC17E0000
SHA: 0D2FF4781343BD06D9DF0862195DD9C3EFBA01C16D86978CFCBD9586D8A36A688132EA6E8037E89E57CBEE6BCDD9D7D0BA315361D7F9FE156C1684C9FC455848
Version: v10.0.22621.4745
dinput8.dll
Address: 0x7FFA35FD0000
SHA: B1F50A3AC4833CE262CEAE40E29F6D02CBD4519A0542522FEB66F3972ED13D0FE146332D3F411D125D21E90601B01E9575A5B25CB2D7ECF570ACFDDBA34DE863
Version: v10.0.22621.4745
directxdatabasehelper.dll
Address: 0x7FFABDD60000
SHA: 2CF32D3DA5F1F7D588FF560135A5DB0B31920897001B27F66AD5E78062CA2F55F67CF189C3405E050D8720D4FA59B1223555D52E0BA92E8BD62F9750F44D0953
Version: v10.0.22621.4541
DNSAPI.dll
Address: 0x7FFAC4610000
SHA: E7EDB4DEF634BAE4DA117CCB1F20774D53D48619D72D06A936B1DF6494070A6D34958C66B0B2C70472B86D96BD52D19D60467F25C64F09163F6A2E713CC9A26A
Version: v10.0.22621.4745
DPAPI.DLL
Address: 0x7FFAC5810000
SHA: 2531BC636C0722966C94B8B9DD154800E16AA7C67C6256AA23794A437E215BE56DA3E6AAB61E156839AB4534A7CDFE1E2991934365F24E50FCCDBDCE2176CA90
Version: v10.0.22621.1
drvstore.dll
Address: 0x7FFABD570000
SHA: 1EA8C7D202D3207743B0430BF22BFE9D0DB7458B624D82D73252CAB5E0D521BCB44E6FF0326835530104CB2435E00BE18DBF27510AFC150072D7E614B0F581D0
Version: v10.0.22621.4541
DSOUND.DLL
Address: 0x7FFA238A0000
SHA: AAF8CA5B8C80EF990FBD1DC6A4FF41175A433B3A6547622EC1576B1689E7A322ECCB74E9F279DA61D035494DF3EEAC99BD64CED7CD45DBBFBF21EEFC84E97800
Version: v10.0.22621.4745
dwmapi.dll
Address: 0x7FFAC3190000
SHA: 871519937CD43D27EB6C23D6CEA8207D343A0ED456D73FDD2F26E58442ECE7D5F8EA5CD78727C1C3000986320FA3FDD72222E50B5738BB8038AE82A833A861EE
Version: v10.0.22621.4745
dxcore.dll
Address: 0x7FFAC3200000
SHA: AABB1317C688FFBCEDF2794B9A5C4EF642A0B2CF2334CB159F75CE0C5328882924DE296B6AF03F04923E96C1E639D3CBB46CA054F8CB2991FF1EA4C590E9BA25
Version: v10.0.22621.4541
dxgi.dll
Address: 0x7FFAC3080000
SHA: E751C589041D20B47519DE74331EC89F73F5FFDD0B67248B139503B292633B0689F4A8306244206AC7597F3A371C4B354758929216408A0FB5C8DEA81AB8B47D
Version: v10.0.22621.4036
Engine-Power-Mod.dll
Address: 0x7FFAA2B80000
SHA: 101EB11C633833E0B5C0E0B0E32C555371B8A2F71B83560B1D0768264DAAB02BB484E8020A7A3B6E8B4C5C42317B8B746899D72B1B7E26FDA5BEAFD6DF6822D5
fastprox.dll
Address: 0x7FFAB0D90000
SHA: 95409DE100DFEFF4B16373B845576ED8EAADD53683E2E794A8CBA06FA76DAB5000D26DB56F4DD14041B18B866D51B02F589F2152F12FE18C8B55EE20C738772D
Version: v10.0.22621.4541
fwpuclnt.dll
Address: 0x7FFABE840000
SHA: 0D480CDC9B320B701B17E23127A016957409F066E879D2BE31FBB2A0D610D66C4C066BF98375BB7E2BB01237104E61AC5991A6EFB7BFA326F8FE793DABEDC8CD
Version: v10.0.22621.4745
gameoverlayrenderer64.dll
Address: 0x7FFA13BB0000
SHA: B77C73F41B8560FE648F07CC386086BF38FB2D73EB5AE7AF78B047A610789FB3D4A73A2693F267E2E7DE390A94E71E6763956B1D24EF00F55302400F46B46E07
Version: v9.38.28.26
GDI32.dll
Address: 0x7FFAC8550000
SHA: 64ACC27DFD47368408BC8FC683F66BD9DAD59C7FC79971F515C501465646C4370B792F0696B97493267FA7F85F7BE29F5B67E77BB4BAF5A5F4D67BC3934A125C
Version: v10.0.22621.4036
gdi32full.dll
Address: 0x7FFAC6100000
SHA: D1753D5FD3AD805DE7B9A9B271BCBF01E26B7706C403C3447B49CF6969FF642FCC489DBC74AB7806D99BA43A53AE1A76034EFFF4E99B091F5BA5908E7A2AA743
Version: v10.0.22621.4391
gdiplus.dll
Address: 0x7FFAB01F0000
SHA: 21178F8C41AAA3F56CA2C3E56233721359073E2173B9BCF1BE9C34B54924D035091DE3B9BBBF4EE811D5C0A0337A92660DA9B582A109911F3F0703A9872DE0E0
Version: v10.0.22621.4746
gpapi.dll
Address: 0x7FFAC50F0000
SHA: 93C9C09EE978C2AFE25B4397B2D73DBCCF8039BD46D158C493629D912E6FBFFF0C7DC2E44C144FB9157EFE7A6B3BD1BAC17B0373755995677C184429A2850D06
Version: v10.0.22621.4745
HID.DLL
Address: 0x7FFAC4310000
SHA: 9E10C2F2137EC58F25E645B4DE81AF9E271D541ABD8DEFCFA6189D02609E0B4BA97544E3FF2917116735840E4A9F35F5C6ED70B9B0042C2FF991BC2171B91D99
Version: v10.0.22621.4745
iertutil.dll
Address: 0x7FFAB76D0000
SHA: C4C9D245065A3A7A72CB747272B78D4868CCE1F959C8B8325A6F1149CCE02DF594DBDA87D943CD4ABC1F06BEB8E25AFDB73621B4C3CFDD6BD03028F5448A1DE1
Version: v11.0.22621.4745
imagehlp.dll
Address: 0x7FFAC6EE0000
SHA: F85AFA9E507F82C34E27325C85238102C0DF17B255D95F4A7B3FE6257C4B2BF3647C74950C9C87D446EFEAAF2200230D980DAD98D9FB3501FC07F3C0469F4874
Version: v10.0.22621.1
IMM32.dll
Address: 0x7FFAC7370000
SHA: F247393C1AE1D0A0BF01571B26C743A9444F44B0E71C1327447AAF808F8FD0AD3A108708021D0E11AF9E0623D8DF9A5C2C814CBC0E700F6F7504D4D151138D0B
Version: v10.0.22621.3374
inputhost.dll
Address: 0x7FFAB6DB0000
SHA: 1F57FB379B1A2032084AF39BC6BA6ACB18EE9194C22E5548C1CF3E51D4DDF9320A8E125C835E5D85D9F01A90555D25EA575A0E25D792F05B01E8077E2F25CED8
Version: v10.0.22621.4541
IPHLPAPI.DLL
Address: 0x7FFAC45E0000
SHA: F65711439F5C50CD79295CB987757CA203C8AD418A807D5C0BC912E6D62133E89EB3725DF10998D8FE0589A5C9FF8A6E5303029BE0BA6C5935A1ED8C6C1D0E15
Version: v10.0.22621.4745
kernel.appcore.dll
Address: 0x7FFAC4BE0000
SHA: 64397B1FD0344BE78054711E72DD954503A0E4E3E123C13FD3E5CBB0ABC8779673A3D4A08AEBCDAA7A024AA15DA0BCB38C9A20E3353BBAF2FE4002E20413E58A
Version: v10.0.22621.3958
KERNEL32.DLL
Address: 0x7FFAC72A0000
SHA: 3FB6807C1092F412042FD50ED8244B7F31C142BB58F17CD9E8673B5759A9027684F40A68EE236395BB93376DE9D94690ADDD344692CA5F8F0200B535BF0EAB3D
Version: v10.0.22621.4745
KERNELBASE.dll
Address: 0x7FFAC5AB0000
SHA: 1A7B856F617F6A6B998C35B2F9B23D09E2455988A7BACB8A36FEE548A13E8C7E5BA1A51565DDDBCA62E5186D1D7BFC4DED603EE58E2C6BD5A6D3C963415B6E05
Version: v10.0.22621.4745
LandingGear-Count-Mod.dll
Address: 0x7FFA9F3B0000
SHA: 97EA07C564EB8F0A20BB22C62AE3ADA45E323125D74641546CFAE5246A3135C8A8D73E8CFA899877A01A7380A12E63DB66056BE33666AC4461BB2FE0C5351DB3
libStarfieldKit.dll
Address: 0x7FFA68910000
SHA: 4F73044DBC132AD6DC399D221241BECEB52C5B84D1CE30FA69EE5FEC7F84DB18C66FEDE872F94BF7DB996CD47330794DD1C1BB57B8024CD7C2A0DBC1F7D1B665
libxess.dll
Address: 0x7FF9C1240000
SHA: FF63203BC0DF4975771A13622CB88617D0B90EDA81BC22A1BB21BDEF5E60DE89A959766ADAE453D447449993847BCA211E9FDF32F068F5D4DCD3C1786310833E
Version: v1.2.0.13
Luma.dll
Address: 0x7FFA33DB0000
SHA: E53D4484C56E120351F2063DD1126393457DB905DC8C91C81989BEDD38875751EF4F3F7F660C9B23BC5E58272204D841A021B181EEB1E7F0E0E87FF50770F927
Version: v2.0.0
MMDevApi.dll
Address: 0x7FFABC540000
SHA: 025B359050759834C4AB27336D08A5B9EE0B5049DBDC6E918A500548F074A839AE67264A1F67E1C9819A4F42B2F71E65F8D52092FB5DF7F75DE8B862FA9E40D6
Version: v10.0.22621.4745
MPR.dll
Address: 0x7FFAA7010000
SHA: 8B84DDB52B5E354F10485587AD2DF768675E778C447DA933041DB039F699C354361A2DD12C37EC633487CC24ACAC9441E1E683D561488CCD53BB8B26DAD58AE0
Version: v10.0.22621.4745
MSASN1.dll
Address: 0x7FFAC5310000
SHA: 8BC051B2C0A9D7ACF7199786F7D7B8F9AD844FBFEAE975EC37446EB39626C9092C149F292FB8F0F8F1383F97E66D7A6E729295AFA2DA5601E32488FF500B6FB1
Version: v10.0.22621.2506
MSCTF.dll
Address: 0x7FFAC6D60000
SHA: 7FFCCCA8268AB19C977A82C03A6D5A68A4E68C8C6D087DDA3ECE4988EEE68CE46EB1E1312E499964A4A27221A247CE96BBE0A84972805AD53C2FE8C593BA18BB
Version: v10.0.22621.4745
msdmo.dll
Address: 0x7FFA79A00000
SHA: F84E214D0AB3CE95B79C8FF0BB0F76A23F616437F593D885DDEA40AF6F6239E7B5DFC67D96626F2FC67959FD4C9E33606D65EA876FEB44131ABFBCCF1FA2A8BC
Version: v10.0.22621.1
MSIMG32.dll
Address: 0x7FFABC4B0000
SHA: 92AC253ECA4C8EFEDCF63643EB03D871E566FFD4CDAFECC418B0AEA430EE951FBEAC869B5281C69D55B74C1198E9880C6146F4019D59F0DF0512F944E43976D2
Version: v10.0.22621.2506
MSVCP140.dll
Address: 0x7FFAA7050000
SHA: A81FEB56AE3E4939ABB21597F4F60429B704E04E6C20FAC402A0518FE7B29606BF8824347A7570D98F3C44684C15BF6B520E350321BFC2A42EC5597989215782
Version: v14.42.34433
MSVCP140_ATOMIC_WAIT.dll
Address: 0x7FFA23970000
SHA: 2D9FA95A068784A8E799362FAF97B42253DBD614DA504907ED01D1F7F3FDC56D1BB964B2009171EDA87149A595D84EC83D50DAFF30BE9BD6F7A3C76C75226C40
Version: v14.42.34433
msvcp_win.dll
Address: 0x7FFAC62D0000
SHA: 4646B1C9633FC03E5AB6CB90C977CC3D778E73D8ADE58D019C22CA11A3367B8FAA3A18A4E2F4738A75DF80A5A788F956A2A0C33DFD6B48272674D03899A9F5D2
Version: v10.0.22621.3374
msvcrt.dll
Address: 0x7FFAC7AA0000
SHA: 0AAA0877CBD1FF9CCDF5CE8466DBC968D17A306384DBF87F9BD2281B585149B0821B67B8CFCDDFB8BA2C4E6B78C5B7C163B31A284DFB90CF4D027D1BBF4BAFBF
Version: v7.0.22621.2506
MSWSOCK.dll
Address: 0x7FFAC5060000
SHA: 4854DB2070AA5DECAFF796C2049B2BB725BD4DB63DC6A25FF24B89AB725DD2FC251C0C9D24B75363906101DDC2981AB791467A17465337544F1D7FC1D5A94E22
Version: v10.0.22621.4745
napinsp.dll
Address: 0x7FFAA6AB0000
SHA: 2E4AED6935FB2A52A6793523A91305CCE4B9F40C2DB9A0F82765BF3D36DF1B2D9CBBF4BFCED5537F4C93052241D154FA0940441F680E7F374273F0D0B47CC5A6
Version: v10.0.22621.4745
ncrypt.dll
Address: 0x7FFAC5470000
SHA: 6D15C8C7A630C500D77C6D01396C7128250262C2F5946232E95DF9DD981BCE92F909943EEC09C1A69C2C41685C4933562E8BB859654FC7777585CA7C3C9A0DAD
Version: v10.0.22621.4745
ncryptsslp.dll
Address: 0x7FFA9B730000
SHA: 71CCF5B407BB5D5EE27A0D13912B39883BB1943629296621D0BA34AE8B9C82A41BD812F18560B2908B0AE4C1E209071D761D6B8C191C10976FB43CCAD811038F
Version: v10.0.22621.2506
NETAPI32.dll
Address: 0x7FFAA6F80000
SHA: E2FCDEC0CCBBB95D672F321C12BDAE5C7BA42A34BBCA6CD901D00F5DCD56BD0CC621ACEB59F7F7F92E7258C5C292989679A84B770C954C73240FCA1580283FF5
Version: v10.0.22621.2506
netprofm.dll
Address: 0x7FFAC2C40000
SHA: DD71992A74E449B170EC3F0F43845BCE893F2AA98F249F0D1CE5A94941B1BA6E0AB630E23CE34520165868688050EA62A88D653AF380D6AB2E11C66C6779FADA
Version: v10.0.22621.4745
NETUTILS.DLL
Address: 0x7FFAC45D0000
SHA: 5AA288FCFBECD42FAFCB4A487B6BD5DBAECF9DA2E40D822F8158FDD5BDA1E6DC6B823981C0FD612809C883A244AE6E921F06C51F800F1AE9560E80FEBBD8ACE4
Version: v10.0.22621.2506
nlansp_c.dll
Address: 0x7FFAA6440000
SHA: FEDE1CAD60266DADF81B0552AAE1CB3E6CA8BFFC61F9DAC66C23241B312114010DD36D366C882C0AFD272F8974DF6F6BE497D1A68B12B2EB97A115323E8D713F
Version: v10.0.22621.4541
npmproxy.dll
Address: 0x7FFABE0E0000
SHA: 78E57333DB7E243F92B917E7135FE5960E91A1B678D8C5F9B655FB1D90DB8B7AABD751E2F0D753AB86C92929044CBE4DAC47DD3D38AEA3985FA9896D78F1795C
Version: v10.0.22621.3527
NSI.dll
Address: 0x7FFAC7A90000
SHA: 4D09D8B1F54024413CD5B37F7148EAAB268C2485E78F90406AB312FF864EC340B862642F3B7C4F904A5A7618309E678DCA0B88D27E9C8812A050A4AAC7250894
Version: v10.0.22621.4746
NTASN1.dll
Address: 0x7FFAC5430000
SHA: 203657805FBB142F95915CE0032A3518A165D384E472C6BBD9B97921146E48386A1DF75F9025A77ACC79D06AEEDAEEAC39643B859FE763964315FD97F6FCE874
Version: v10.0.22621.4745
ntdll.dll
Address: 0x7FFAC87F0000
SHA: FE695C2E49915648D9B543053B3DFC2618C779F792CF7A000CC4C64D65DC99CE51A92741497B4AA9CF39090982A5E3D6A91F6498132D9F9E5725C68CB02D9423
Version: v10.0.22621.4745
ntmarta.dll
Address: 0x7FFAC4CF0000
SHA: C086490EE7AD1B25884378823E54315D3ADAF9E7EAF0966F4C1407C4D54C2D98486E2034EC6323DC76204058E3D079D69EE518F0946A7893C1C38FF212238BFC
Version: v10.0.22621.4745
nvapi64.dll
Address: 0x7FFAB5AA0000
SHA: 2A9CC855A8CE8D8DB167BF9E748EC67FCF1F8BF9E6BA09FFDBF6847BEB697CBC227328F6B4C59B697D131C1CC0E38B08FF3639085CCFDA559CDEF2C071E34047
Version: v32.0.15.6614
nvcuda.dll
Address: 0x7FFA23EB0000
SHA: 008EE0BAF6BD5EDC4D7D3FAB43134C7A1F4BFD4D424B0ED9E36A7EC25FF507CD88AFA2D191652AFF96FA2E0C708A10181398B39E7DAA4F16894C60DC90F1EC11
Version: v32.0.15.6614
nvcuda64.dll
Address: 0x7FFA206D0000
SHA: 16B8F8743278B4C6648E2770CF8DAFD9E534F828B0CF40A1B1878A83D048B1193EAA524450B5FA2738FDF1E756016E96C214BF04FABE7137BE0A63669CD39331
Version: v32.0.15.6614
nvdxgdmal64.dll
Address: 0x7FFA20500000
SHA: 0331D6E2EDFDC7B6D0E1427148009084D4B981F425CF716CB1E76061148C4B876E7F146E3D27A632910BDF4FF548FF407C3C657C54D9573EFBF474CCBDB699AE
nvgpucomp64.dll
Address: 0x7FFAB2D90000
SHA: A50A985DE0F2060EBE708A9200A2F208BAC79878B6E3E9CDAEBF7B47C304863593D9736B787E39A535DA0C176207EB16021C818AF2903D98A35B63FD99A4BDDF
Version: v32.0.15.6614
nvldumdx.dll
Address: 0x7FFABA890000
SHA: 415A5DD90DF9EB3803ACC4A7829341B2EC811DCAB9FB0DB050A2CF5A46390332F78D6029753367F150AB22E7F56CDA9F23616A5E245CD6331B855526399479C2
Version: v32.0.15.6614
NvMessageBus.dll
Address: 0x7FFAB12C0000
SHA: 3278F8562BAC098FB609123CB55F3F64D9F8478D266B9F351319E2D373F578318CE37F66B2812FC676D617E83850376B3B30AB3D93426BF6B5FE5B928B83032A
nvngx_dlss.dll
Address: 0x7FF9D8D00000
SHA: 56037EF9ACEA29A074CFBD63D2F4B15325864DAC8F871EDED336D8EE50A4EDE7652212090009420A1A8E2EE4541DB238E17586DD0246FEE3F6A935B140B68BD7
Version: v3.5.0
nvngx_dlssg.dll
Address: 0x7FF9E22D0000
SHA: E7E49E838D14190D80B748ECD6168F58C64421B50EFFA9F930C08F28BF24ADD8D88226E0268B63DB61B80385052BA991AB24626F517F96C99B6B8B8670319751
Version: v3.5.0
nvppex.dll
Address: 0x7FFA03640000
SHA: FA4D9BA15A8ED57D7C52CF8E92A0B1D94F75495B3D3C2B7B10632EFC995FE1C62575C7BF8C4F7198F3359B116B161CF129EF88FCBBE447B510A17EB7EE5DB45E
Version: v32.0.15.6614
nvspcap64.dll
Address: 0x7FFA03A00000
SHA: DEE3168BE3AD5564D434A15F5E5F5218913608DE87280F5744D6EAE2CC21F9AE88BC830951FC6E8CEFC80F60B5F341379F4513D102DE6C10EE896CC1B0B48F6A
Version: v11.0.1.163
NvTelemetryAPI64.dll
Address: 0x7FFAB95F0000
SHA: DF25585707E0E35F829318C0F5E272BEC4FDFE392AC2EF56FBEBFD78D687D69D220B00DC4047ACBD9AAE865DC1C9EA456600B65B518CA78B50DF3F837D97FB0F
Version: v19.4.12
NvTelemetryBridge64.dll
Address: 0x7FFA9A760000
SHA: 23AECD1E8798B1EF37E0D129FE708C2FC3D0CA0369663B5ED17B85FC6353D62804CD6FE13EAA82EB3152D8D015A68E3D6E404E2BE53BE154CCD1DBE6718AC1A3
Version: v19.4.12
nvwgf2umx.dll
Address: 0x7FFAAB590000
SHA: EEE2B922A271D95144F92083D9F53C30A43F1D327822A176F59AC0F6C28392F026420C3DC6BA5A18CA3475AA5793F5694D7428FAA6D049F1939275DF45405351
Version: v32.0.15.6614
ole32.dll
Address: 0x7FFAC8580000
SHA: 2EB5A5D3822B1E4B4D623937DD379F114C39A98E5270C80EC6C0C29B4853923E6F2911BB3E0D3C5757D698E16BDEF8260B60D7BB54185EAE4298CC3B1226DDFC
Version: v10.0.22621.4745
OLEAUT32.dll
Address: 0x7FFAC7CD0000
SHA: 4E49E803897B110DA04A97275B68A863350C2E6FC2D1242E3AC1856DCA9428C29C1C20A4FC14DDF9880592279DB81E57C376BCD8CA3E13E52871527DEA157861
Version: v10.0.22621.3672
ondemandconnroutehelper.dll
Address: 0x7FFAA47C0000
SHA: 573325EE426F6172427556AEA69C30046655BF34734E6BF74F58A0A6A4223A9AAC647465B1CCD8005246859E1D8CBF8C02DF24D665FEBE6E59B8DF2D20C075B6
Version: v10.0.22621.3527
pal.dll
Address: 0x7FFAA9B10000
SHA: 2EB3FEEC4F7BDE387810C521AA9584AA0A6D82C23BA9CB4AFCC0DF5900373C7A09BF23482CC4BC1B9029E377416ECC64B08EE3D78126AA3C4E87B349E033A808
pnrpnsp.dll
Address: 0x7FFAA69F0000
SHA: 472C3B112C7B70C694801C9FD4CF8493E3205C06682C58B21F06F8A79B4D4DBCA7697B81A1CDCC9088F533B18599D54C5D898FC04ABD8CFC5C69FCD36739AB74
Version: v10.0.22621.4745
po3_SimpleOffenseSuppression.dll
Address: 0x7FFA3E220000
SHA: BE21392FE4F533133E3F187994D93B86E8718507DDF7C982C02C9AB43713E71057B308311897B34245853CFB4F37AAF6D1FBFFCAE4CC802BE661C9B2A3C5CDE8
Version: v1.1.3
POWRPROF.dll
Address: 0x7FFAC4940000
SHA: 624CB3D2CCAF9CF7C94AB9B1A5A2AD139E082D0ABDD836CA2A0F92C98B9D87A1EF394FFA1818393B73C90ECADD1FD9F1089DF158859BD005856FBDEB5EEB8B61
Version: v10.0.22621.4745
pppl.dll
Address: 0x7FFA64270000
SHA: 7C532C186CDF82EBE743053229997F775AA4D54C5493ADE3D9D63CCF0A177C058DADC83F2FF9711DD182592F5A0AB1E3FBF41002724E94B7470F5F3FA0348904
profapi.dll
Address: 0x7FFAC59E0000
SHA: 5500F45A4044971812BC8B0C740359AA34883202855E0808F88521B0ED5436A9FD31E14D47519EABF676D55D10E7336C896E73E7B6392C84E41C2E8B640F65A5
Version: v10.0.22621.4541
PSAPI.DLL
Address: 0x7FFAC7170000
SHA: E9F89DE9A1AB74BB4358FB636C389356554C84AF4128BC5834681BBFD897D69B12FE5B1521F3846D65726D4E1C62DD87EBEB7DDD3BB1FA940150F9B5AF19FB17
Version: v10.0.22621.1
Qt5Core.dll
Address: 0x7FFA36AC0000
SHA: 63FFF0338D325F63431004F0FDF9E21A570536C1AC95CCD3F8A33C065D29D35D524EF6E2E5878D3986109E681480C03C2311B2447611003850D381BAE4707667
Version: v5.12.5
Qt5Gui.dll
Address: 0x7FFA34750000
SHA: 484E32832D69EC1799BD1BCC694418801C443C732ED59ECD76B3F67ABF0B1C97D64AE123728DFA99013DF846BA45BE310502EF6F8DA42155DA2E89F2A1E8CB2C
Version: v5.12.5
Qt5Widgets.dll
Address: 0x7FFA36570000
SHA: 73BEF89503CE032FBA278876B7DAB9EAC275632DF7A72C77093D433C932272DA997E8FBEB431A09D84BAAC7B2AB2E55222FF687893311949A5603E738BFA6617
Version: v5.12.5
rasadhlp.dll
Address: 0x7FFABA840000
SHA: E1E34DF6475CA787D2340A340659854D2144D72BE0856C3262E98E170843E7C26874544ACFA5D186623C1C8DEC70232FC73033416F3E2A9A4076EF0820356681
Version: v10.0.22621.1
ResampleDmo.DLL
Address: 0x7FFA237E0000
SHA: C6F24BA3BCD0FBE293293BE4166F18CBE9EE1F97CCAF5DBAD7B758D0B7C15FDE1E26155E07A077324B3D06B483337CADC8D2A10A4ACE00ECA69881608D770046
Version: v10.0.22621.2506
resourcepolicyclient.dll
Address: 0x7FFAC35A0000
SHA: 8A7DF98B158FC4E2C52954171182AF32D4867B7AE8FE249D016C4F673A429A526207B77F41AE396B2440402565E77F51BFBFD1ABACD404A89F39C93921DFDDB8
Version: v10.0.22621.3527
RPCRT4.dll
Address: 0x7FFAC7180000
SHA: A896819F1E5AF2DDED42780C1D372900907D20F7619AE60E35DCF3C7284761CED4DEB3F8D844B7DA445F5C0D211879573981AAA6108D44946F52585D9972AB96
Version: v10.0.22621.4745
rsaenh.dll
Address: 0x7FFAC4B40000
SHA: 9F2883635FDE2CF2C616AC7F9E22B574967397403F8E481D82573298DA36C869939D885A34A1192415B4D94E9886072AC8724D07D3782C962F3076944B1C60AD
Version: v10.0.22621.4745
ScannerPathImprovements.dll
Address: 0x7FFA9F1F0000
SHA: 4010D84571DEDC998AED0FCE19DACCB69714D5744698B5BFB17D7DBDA287287448ABAE7525E3F80187209BBE401E9F299FBCFB03EDDF03AAF3A0BF3B6EF3FA8B
Version: v2.4.0
schannel.DLL
Address: 0x7FFAC4A30000
SHA: 1027421A21AE5502EDF471B1D2DF97022BA0BBA0CA9A000DF7CFAC0DD51C1C63B99CD65E1F6F0BD3117D2526C9D1083FE6D5561A948ED05A7C88F73B551B946E
Version: v10.0.22621.4745
sechost.dll
Address: 0x7FFAC7C20000
SHA: D72E95406420ED200FBD1B76FF10C2C342A7009CB06363A2A406B8FF0A4A1E7126625BBBD3BCFD962971614D25757FBEEAC6B63D7BA67D8985BD38DE668681AC
Version: v10.0.22621.4745
Secur32.dll
Address: 0x7FFAC49B0000
SHA: E296A462AFD8980A9497EF9E1D3EC4F81285D450BF8A8BCC3AC056A39F85B0E12F59653688EBE60E302FA5B8819F4ABACE722C791954D3EA81D85182E85264CA
Version: v10.0.22621.1
SETUPAPI.dll
Address: 0x7FFAC8010000
SHA: 4C618C9C7E16D701A03B901AF668E5927E8BAC2CD160D1D072EFCD2EB9DB62ABAA1422A57B19F9896A2E6CD8D64DC8A80BD1FC54302447601CBF94D977C62CCA
Version: v10.0.22621.4745
SF-LongerNames.dll
Address: 0x7FFA33CC0000
SHA: B3AFB5E73F108317865F650B352F99CF1B13B0B2A0E8C19A7C7366BC9FA00489C72722C6C3C7C058C36266478F79B8E11DF0FD431E3D414DA16713DD8E38B21F
Version: v2.0.0
SFPluginsTxtEnabler.dll
Address: 0x7FFA68BC0000
SHA: 1D6E65F1E00F6E69B271DA0C1CF8AF28E9F2C6BD22ECEBA3EEB3E0606DE853164C09E083A73847E999D93FE8576543F7E35F0B252F644E79B8E5C18E5502B746
SFSE-Save-Unfinished-Ships.dll
Address: 0x7FFA33780000
SHA: 6E4E4C3A8C5071972A5E6AA42E5DF3088EFD1328A0588F9CBD32A24FC4230287AB7B413B180CFA7552EC669918CD39AF03A0C1007925DC2E2539944B3CF2AB85
sfse_1_14_74.dll
Address: 0x7FFA77D60000
SHA: 03BB3C30F8EB54834EA3CB180DBA72CF144D7E5EF821052F8A5FE6AF3D28A9897654CE8D87E0308B40895ACD6FA6E949BAC223C05DE3D775FE5C06E66150917E
Version: v0.0.2.16
sfse_plugin_console.dll
Address: 0x7FFAA9AE0000
SHA: E048BF47C25FBF3FE8FD6E7B0D60ECF7B43D361D20C5C06FB2682DF613A263CF5D9AD16D5C229F32474135A1E211025979E7E5683713726DE328919136599369
Version: v1.16.0
SFShaderInjector.dll
Address: 0x7FFA506F0000
SHA: C410B4143583CBBEDAF538BFF4C06F61E8CD43634AD8E30925630C2C39CB04D2ECE4F4D151D2BD3AE54D8B62DF603AD3CCA6C4AF4FC92B3C62C05F4F73E86A11
shcore.dll
Address: 0x7FFAC7430000
SHA: CE9558C0CBAFA81DD1039F9BAC335D9ED18698482F34472F85DD7B8CA659F1E07B36BA511E3D0D2CCFC1C032B9FB80B505FDF9C68593182192DB1DF7773A76E1
Version: v10.0.22621.4745
SHELL32.dll
Address: 0x7FFAC64E0000
SHA: 6942BB6E3E9CA6B8E4D3B3C58117E1B88565B392C70BC3C2F804EACA5930017FAA985C1D4CDED9DEC7E71BCF10F5A59A72C83D627B9C3750107208BF071ACD14
Version: v10.0.22621.4745
Shield-Count-Mod.dll
Address: 0x7FFA90A00000
SHA: E127C30B2B842CFE45F2AD4BF5D37E013D8EAF4218C053F22CB5B1F361EF32F9328BA9CD9A780A984E6D21D730AFC6C702D5E3AB26F4B3DE415DF2868DEA2E49
ShipBuilderNofifyMeAboutWarnings.dll
Address: 0x7FFA8FAB0000
SHA: D358DF9C9F5D20B125C7C1B9AFE0A1BBFFA1DA229A506AE4EA3C89E4600DDEC4812323D1E729BDF48A4781B27B903E839E8E4F0BB1A927D8A69D35CF86B4BADC
Version: v2.4.0
SHLWAPI.dll
Address: 0x7FFAC6F50000
SHA: 79707AC175BA3B011376047414664E4F24DFB38E7CAD244E09077A68D8FB66AD48C3CCCBBA9D0C0B02CCA0DC75D857BD8F4F3888EC85FACFAB8109C360FAD86C
Version: v10.0.22621.4745
sl.common.dll
Address: 0x7FFA33080000
SHA: 843457A2F9F0BA83B6C2FEA37FB05F1C52F715C2046232C904DF79B1ED30F3725B967163EBFE5B3F01DAABBD9CAC27799C80DBF8269211F5319FD62F3EEF7B3E
Version: v2.2.0
sl.dlss.dll
Address: 0x7FFA67520000
SHA: 54B6D2F71B8D16114AE1A576A37E64683BA91CD8BB8AA379706D5AE21DF4571B6B4126F1085E6E5A2448D7E8B169539642AD5D7A31012C4FDEB9AC38B62ED7B8
Version: v2.2.0
sl.dlss_g.dll
Address: 0x7FFA36180000
SHA: 97370DF420A6BA860BE92F895ED8B5DE9299E7FF7F7E955BB514A49CE591AA5ACDC1599BF46A93E1F87B6335EA7DCB7111671D9FCD20C9029EE82A1953FF44CF
Version: v2.2.0
sl.interposer.dll
Address: 0x7FFA68030000
SHA: 4197A38D36FE41A21B11814B00F17F5BF2AE7F418DC5CCB94A6C097615B87B9C5B530DFA0296CA0580BB5618D0AB43AC02C2E1FC08E07D55B5E8BBFF8DA7160A
Version: v2.2.0
sl.reflex.dll
Address: 0x7FFA71330000
SHA: C5DF9877DEDFCC443ECAD9A8EA0F10C5DC8C97C4F6F10A1BEA1831AF6EB27D89C695F67B55E451603A6550EBA084E0CD7B676FE8C56E302324025D9A97ED7FC5
Version: v2.2.0
SPINF.dll
Address: 0x7FFAAFD10000
SHA: 675E09DAA5DA999ABD859B10A3FDA32D33F74B61BBDDF49BC88CB35B365D535459BF170A2E8ABBA503B00AAA1F2849D1F7D242D2F7F4A13E665E44C807678185
Version: v10.0.22621.1
SprintStutteringFix.dll
Address: 0x7FFA41090000
SHA: CFD052DAAC6616D4806573309E4C8BE0B1044CF5E674D392158D27D963265F9DBFC28909608DB40645A5FC6FF5E8582AD5952D5684B66BB2976871C2E723AF88
Version: v1.0.5
SRVCLI.DLL
Address: 0x7FFAB76A0000
SHA: 8F2FCB418CC0484BD092BB500B36AC2F0AA6435E1F1693C13C44A24E54A1C9F53B4728EFC6E6339F26BE3F781995379A178461C52107B2A1336C74DC9D69F512
Version: v10.0.22621.4249
SSPICLI.DLL
Address: 0x7FFAC4E40000
SHA: EF56182FD07DDA26E24F26A8D132C8698E5D72FCEA33C55A6A06005BF4D08F8B61A7686F4AAAE94683C2F39B0276D77DC23C7F66436CAA48A573FE673CFB2E13
Version: v10.0.22621.3810
Starfield.exe
Address: 0x7FF6911B0000
SHA: 5D1F236406E6AB1E079046ECDC92C3848DF121CE3DBA463E02469D42502D93AF72C608588E232BA9720B868BC72CCCB658C9877ABA4CEDFE5E914EBB387A2178
Version: v1.14.74
StarfieldConsoleExtender.dll
Address: 0x7FFA33B50000
SHA: 1540CD96E4B5056AC539194940E785978D887C1CE1A289FF60EAB916ABA69222784ED970A366369E4EC62B0C26ED657EA0FE9C7FA3F26CFA6FE7ADFEA50AFC5D
Version: v4.0.0
steam_api64.dll
Address: 0x7FFA77350000
SHA: C08DE8C6E331D13DFE868AB340E41552FC49123A9F782A5A63B95795D5D979E68B5A6AB171153978679C0791DC3E3809C883471A05864041CE60B240CCDD4C21
Version: v7.40.51.27
steamclient64.dll
Address: 0x7FF9FF2C0000
SHA: 27D76247E8DC43D999E417DFA0768DBCE192C2FE3B7E9B90B2055B3A1A9BB6934B6C667A70A5046546A4B2E9A621337E40EC2D46D2332ACAEF3A92BF8AC15E65
Version: v9.38.28.26
textinputframework.dll
Address: 0x7FFAB6C60000
SHA: AEA81DCFE376A478EA8249951EB38FDD11162066C012809FE30F36B7BA9354E1DABC372AC2FB2EFBF071AEB38A16BF98795DF3802366BDBB2BBB1C940E099DB9
Version: v10.0.22621.4541
tier0_s64.dll
Address: 0x7FFA412F0000
SHA: 96C09A9F4130FF8B2DF63A71A04711809049153A17147011A51CA80096DCF5D296FAD9B6CFC598EAAAACF22665958C1870F6D29A30722CB109A3B5065E7A913E
Version: v9.38.28.26
trainwreck.dll
Address: 0x7FFA411E0000
SHA: 261801A85D41236E35C820A78E4BC3E775EBF0C19336EF1D518A61DA20429BB30B707181606675C1BC650D678CA0A27DC585DFA35BDDD717EB830459BFF60333
Version: v1.4.0
twinapi.appcore.dll
Address: 0x7FFABB2B0000
SHA: 2D3F2F82634C8E960C2D4EA547228BF5EA7CEBC7DDB939B2D055C0AB2C219BE46BE0F1BEA38CD02386C71A7E53DD490F66AC18D6C64A3EE31DEEE27C6FA330D4
Version: v10.0.22621.4745
ucrtbase.dll
Address: 0x7FFAC5E70000
SHA: 7F0563E814CC4AAF292683403888340BB5D95E6A7BDD35D81EEBBD10BFB8E4E5130D0A626B8FB07FF3CAFAAE4A2698CF7103AABCAE74E5D13449DB482EC49BC9
Version: v10.0.22621.3593
UltimateBooster.dll
Address: 0x7FFA33680000
SHA: 9DF4D415571682F3F0CA01FE01D646DE500EA1F26C29F1389F8EA63B6B8715A07570830DCC3D5415212C4524F1E38619536FFB617F4A68830A4CEFB7FE819F1A
Version: v1.0.0
UMPDC.dll
Address: 0x7FFAC4920000
SHA: 8981D794A568A6674E504AAAC4FD9C6CC9A04DA5AA7A870E4107D2E157786D6BA51C48C4E177B31C09068D03F28715DE27790EB0DACBA2F3297B7AF3A8A1BF97
Version: v10.0.22621.1
urlmon.dll
Address: 0x7FFAB7990000
SHA: 20C8CA03D6692F744C896247E80F8AD2485CD11B8AF12A6C360577DB4598D9C94DC34B9ADF803B274EC900921476E4CE8E4A5B4CC33F8D9D16B74AD68FA5C001
Version: v11.0.22621.4745
user32.dll
Address: 0x7FFAC7E60000
SHA: B262BA0FB4429B38AC12C30877E105D2C1176FF6F89A48FFF3FFB9299CD1004A9D967B5A7B4CF07E88A00C635DF73CB13537F0862BC56F85A85584C094AF4D4E
Version: v10.0.22621.4745
USERENV.dll
Address: 0x7FFAC5150000
SHA: BCDBC3F7B06797315E0DDD55EC0E3F39732391C0100D5260D409C8E78379658096D20476C493D67ED4FA2CA2DD51787C1DADDEA228D2E22077DB3D46E25EA11F
Version: v10.0.22621.4745
UxTheme.dll
Address: 0x7FFAC2F00000
SHA: 7B10DA49E6E6DC600F52C0B1ECC9C970E1E7D21C480DBB84B10EC33969993CEDFDED7F725D85460990456E68945417DB55412ED9CC0B582F201882ADE907D9DC
Version: v10.0.22621.4745
VCOMP140.DLL
Address: 0x7FFA7EEE0000
SHA: 28475DA6F70C355EC113CD41B2DB3CA0676B3F87495BEBFD76D916047D08B9F27DA7B7EC6F3EB9862BE1947DE163F68B96D12C6864EBD0036B997096728A8003
Version: v14.42.34433
VCRUNTIME140.dll
Address: 0x7FFAA7030000
SHA: 96E9F32E89AEE6FAEA6E5A3EDC411F467F13B35EE42DD6F071723DAEBA57F611DBD4FF2735BE26BB94223B5EC4EE1DFFEDF8DC744B936C32A27D17B471E37DCF
Version: v14.42.34433
VCRUNTIME140_1.dll
Address: 0x7FFABE120000
SHA: 0460CC66D06DF9A2941607473F3ECCFD909F2ADAB53A3328FADCEDD1B194B388ECA738C2C6C2E193DE33606925FBED1FE39EFA160015128E93F5E3A03C62170D
Version: v14.42.34433
VERSION.dll
Address: 0x7FFABF0C0000
SHA: FDB97254817D6793A4C5854A4CFA53DDED1B25E578167C2AB9A8EEC67396F4CBC825ACBF61D915B57998C415F9A00F1AE2C40536C53EA45D4037B64F3E1343D7
Version: v10.0.22621.1
VoltekLib.Detours.dll
Address: 0x7FFA64B60000
SHA: 7135D611374EC870DE29A2B37F1928A2308117C442DA8E22010F733E293A40F78D9692A240F654DA455B5E1A00A88FE38A892245E868C742078975190C9AFD35
Version: v1.0.0.5
VoltekLib.MemoryManager.dll
Address: 0x7FFA832C0000
SHA: 1FA03A99BA3468B95270356061F6CA005344DA43044E516914495C717142C0D319EFC3253F44DAF7D9F263061EC8BB0241C6185CF52D3744A792BC84AE85C34F
Version: v1.1.0.505
VoltekLib.RelocationDatabase.dll
Address: 0x7FFA7ED60000
SHA: 8BE16B7A11DCCD6193266938A63FB9D12689EECC9B0D77BEA0F7BEBFB7782018D71F927DD8FD5E5F0B7F9A7819DA4B858CFB73FD3D2B225DCBB4B520FD40F4F3
Version: v1.1.0.45
VoltekLib.UnicodeConverter.dll
Address: 0x7FFA8FDC0000
SHA: 6F7BCC8044F5288A606FD503D810BB8B33A9B3B9A36F259ABB95150D1CBE94EE0BA6E53E9BF72A16A827520BB8BA3838337E033F1A4880B9DBE38CFC2356EB67
Version: v1.0.0.1
vstdlib_s64.dll
Address: 0x7FFA63630000
SHA: C3C0092F6EEC47BEA1D3F5F4D2C66F9B0D48ADBFBC98A9D66DE89D050A04FC002164AFC1EC48ADB8AF8C61B597550DD181C634B15012E5C97E81DFFA766A71BB
Version: v9.38.28.26
vulkan-1.dll
Address: 0x7FFA32D70000
SHA: 5C1BD98FE58A69D88674C0D827FF981A5DF844CD5D0A8AA9E8CD7A98E259F6FD39DA942DE8727978F6D530591759D2B3795A441C1CFF832D979517691A93679A
Version: v1.3.290
wbemcomn.dll
Address: 0x7FFABC4C0000
SHA: 2FF9B8EC7D0F3A167084E4AE0FCC936008BD7D6690B59F601D75E5C328ADDDC67496461A53F8B4BDA755CAEFEAA77E4038AF7CF93DA135590C6C37A9F52DD055
Version: v10.0.22621.2506
wbemprox.dll
Address: 0x7FFABC8C0000
SHA: 0EF373EAF240CE872BEF5FF7BF88C3199AD92DF701DD8CAB3E6E8C6480A22CC9FD522E487AA651F45D714C48B1E54608AE143ECF356801D50F4F264D404F1B36
Version: v10.0.22621.3672
wbemsvc.dll
Address: 0x7FFAB0B80000
SHA: C0C9CD1006C4FA0C62EC0845D84438E5B1D1D82B3A2DC99CB3858375E4C2380F6A3B78F852CCD811F1A50A2EB28E4FE3FAB0F0C5342A9470E8B61DD589271611
Version: v10.0.22621.3672
Weapon-Power-Mod.dll
Address: 0x7FFA8EBC0000
SHA: A6B6A6DBE564FC14B35B888D3BC4C9B24724F6CBD85F39E49830A8793C406D1F226BA248ED60B9BD3FBD30E7D28C4FE3CB87E2C1075805B186604C8AC404FF0D
WeaponSwapStutteringFix.dll
Address: 0x7FFA33AB0000
SHA: 918FE888D96C04D50AB439BCCDBA9EBB823671F5522E9F417B22EB7E4EAD0E8A1AE65FA75969E850580FFADAD07B237E993EA05F4EA6DFF2138824684F7721CC
Version: v1.1.3
webio.dll
Address: 0x7FFAB89C0000
SHA: 144C8BE53207D27F4506603D319F50276C92BC00DED0307B76C63AFDDAFB130F0D5C8C68801F487752F667FB604FBC71A7BEC244CEE4FA69BEA518A1A0E8AC5A
Version: v10.0.22621.4745
win32u.dll
Address: 0x7FFAC62A0000
SHA: 911CE672F0DB3641F0FCC0C90EB834A74B5E5DCC2A5CD2203AC845B0B32CD4D725471851BD21BED040D4D53E6E3B5E74372BB70D4E60FE99832A83803A1D1AFB
Version: v10.0.22621.4601
Windows.Gaming.Input.dll
Address: 0x7FFABBF60000
SHA: 7D3DB945ADF8E0BC825BDA2AD7C540ECE7CD8948BB9FA48A10913BD46A252D73CE5C3DAF6998700261769E2E2ADA346911F5A2E67CC9849CCA2BF2D57BA6E2BC
Version: v10.0.22621.4745
windows.storage.dll
Address: 0x7FFAC3A00000
SHA: 9A5EE867A519CA553B16A0ED7BB82885D1643FDC8F98C91512C97C24D653468A20DC84FA50FE6202989E06942A439E2C899E5321B66D9DB460DB29E19E0A0BBE
Version: v10.0.22621.4745
Windows.UI.dll
Address: 0x7FFAB8090000
SHA: F01ACC834CDCAC19A94052ED091D370E5310F27DE458087AD6A7CD8566C811D8FB28983A0505575654184CDCFD4B706451BD3AD7174F9B3FE2857C82D5980729
Version: v10.0.22621.4745
windowscodecs.dll
Address: 0x7FFAC2D10000
SHA: 9C95716C06BA617829A58C8B432A4E1B26B84C18CA9411E09351F9676FBD34CA9FABE8A254D81549CDD049545A48D64EF87A98E4C4EB10F9C62D4346E8606517
Version: v10.0.22621.4541
WINHTTP.dll
Address: 0x7FFA370B0000
SHA: 8D6F7EE123049CF8135121930C16A49370241416003B1AE2BDCB945276C800DD95EB7D028D397BEF88CC459739BA9B512617AEAC772118985FD8CC040D1E6977
Version: v0.4.0.952
WINHTTP.DLL
Address: 0x7FFAC18C0000
SHA: 90B3EC4F13566DC8B6D71BD5DD54BCC0814D372EEA36AB1F6E6ABA954841A294A6256C7C17E22C1DCBF045D0FC1087953E63F3D9223108E1EE4CBEBC692F4074
Version: v10.0.22621.4745
WININET.dll
Address: 0x7FFA94860000
SHA: E0EB1FB029E25836536E4B7846A773EA258FF41F59D8958CD1D6F0E377F25B3439CEB94C596E2B7903A664733A65A2D11F8583F10C7750579D687FEB71C17592
Version: v11.0.22621.4745
WINMM.dll
Address: 0x7FFABE490000
SHA: EE7E3EFE17BD11B2BF673C973BCAD17D6DB2DD28E3A550B19806FCEAB82CC68857F9EF547CA2E64F7B446C937B9BF987F1F160C499024A7E901057EE47B6156D
Version: v10.0.22621.4745
winmmbase.dll
Address: 0x7FFA978B0000
SHA: 9AA1B67EE51054D7CB09B3F574BC50CF072E3559D0779C894C55253E16E16AB4966D46BA5F2B3297F8693B308511D41F11A867BE5178C03269E74DF6ACFA3215
Version: v10.0.22621.4745
WINNSI.DLL
Address: 0x7FFAC31C0000
SHA: FFCD141BF2D342EBCAD9F2B45607316E2DA14B5D1A3D1E79E551497131BFE07396C64E07615828964327ED55454EB23D7CB4950D48C3E4BF33126AA1856595AE
Version: v10.0.22621.4746
winrnr.dll
Address: 0x7FFAA64F0000
SHA: 9418D0135EC807E73EA6D33F2A149EF220A0104FBA1F6BF21C2D86498BFA4EA4D35E217C8F14868EBE4779BC6BD587543E8D9B846DA65766E5E0AF83B9FDC7EC
Version: v10.0.22621.1
WINTRUST.dll
Address: 0x7FFAC6220000
SHA: 6CA46DBDAF1CA80E79A454960089A862C0A179F249081D90453F068987CC672BA6D0C2E22F1F4A67BB89A3B10BEACED621DC80B27DBA150DB46A0F8644A0DCB1
Version: v10.0.22621.4746
wintypes.dll
Address: 0x7FFAC38C0000
SHA: 63D5BC695C1E1C2FA8E684CEDF5DE94F4EB78212F376F2677910094B6CBCDF2E6DE735D3EB32EACB1D49A54FB8874DF647FD0F5AB335B1ADFF5278D204590965
Version: v10.0.22621.4745
WLDAP32.dll
Address: 0x7FFAC7B50000
SHA: 674F0FEF3DD76C7CC4B09325A44782F6D3034C2CF8D76D6EA79914BA2554E15A4AD8CA4E385ADAC09E24D1A486341F17D1276447919B0B3CD8ED7C93E8C7A6F3
Version: v10.0.22621.4745
wldp.dll
Address: 0x7FFAC5380000
SHA: 523568ACADC345295761955F0BB46965B8B627CC8E5F51002C8A3BAE7A440FCCDE8806DADD930FD514CA0E37FF50A86618FEF84599FA16FDEB5F0793CE07CE5F
Version: v10.0.22621.4745
WS2_32.dll
Address: 0x7FFAC8730000
SHA: 3F668E1CC3A632C06A05DCF95B5E9BD91610662F7B74E0BADE567740F564B48D5815081CC87CF75B1BB2671B3989A12F03328384709C14518B8975F5E818B7A8
Version: v10.0.22621.4745
wshbth.dll
Address: 0x7FFABE550000
SHA: 1C367472454B9A1A644E6113850D158CDF95294DA9B4E66915A82012FDABD8EE58A46EE2E96B7100D6EFD8CD4A9C5DFF8A8699FCC7C3417B5E4429C47BB68A09
Version: v10.0.22621.3958
WSOCK32.dll
Address: 0x7FFABE030000
SHA: D2DDA7DE4D1F4905614AF1244534D9A30407AAFE6DEC400053544050745494925352378ED44D4779268E5F0D502A04D08A02BD6D9BD44AB791F3E6A06BEB01A0
Version: v10.0.22621.4745
XINPUT1_4.dll
Address: 0x7FFA8FA40000
SHA: 4EEDFEA0C84997494227BDA221FA3605898D5453461A9C274C72F96C2890D6AA74A252BC498472D994C32C86BB68F254E92AB23DF5153377CC721028F517823E
Version: v10.0.22621.4745
SCRIPT EXTENDER PLUGINS:
BakaAchievementEnabler.dll v5.0.0
BakaDisableMyGames.dll v5.0.0
BakaQuitGameFix.dll v5.0.0
BayAndDocker-Count-Mod.dll
BetterConsole.dll v1.4.3
CarryOverPlayerInventory.dll v2.2.0
CassiopeiaPapyrusExtender.dll v2.7.0
ConsoleCommandRunner.dll v1.5.0
Engine-Power-Mod.dll
LandingGear-Count-Mod.dll
libStarfieldKit.dll
Luma.dll v2.0.0
pal.dll
po3_SimpleOffenseSuppression.dll v1.1.3
pppl.dll
ScannerPathImprovements.dll v2.4.0
SF-LongerNames.dll v2.0.0
SFPluginsTxtEnabler.dll
SFSE-Save-Unfinished-Ships.dll
sfse_1_14_74.dll v0.0.2.16
sfse_plugin_console.dll v1.16.0
SFShaderInjector.dll
Shield-Count-Mod.dll
ShipBuilderNofifyMeAboutWarnings.dll v2.4.0
SprintStutteringFix.dll v1.0.5
StarfieldConsoleExtender.dll v4.0.0
trainwreck.dll v1.4.0
UltimateBooster.dll v1.0.0
Weapon-Power-Mod.dll
WeaponSwapStutteringFix.dll v1.1.3
Engine Fixes is mentioned several times in the log but i have a lot of trouble believing that that mod is the culprit.
Anyways, here's the crash log.
trainwreck v1.4.0
Unhandled exception "EXCEPTION_ACCESS_VIOLATION" at 0x01C407BFCB0C StarfieldEngineFixes.dll+005CB0C
SYSTEM SPECS:
OS: Windows 10 Home 23H2 22631.4460
CPU: GenuineIntel 12th Gen Intel(R) Core(TM) i7-12700KF
GPU #1: NVIDIA GeForce RTX 3080
GPU #2: Microsoft Basic Render Driver
RAM: 12.50 GiB/31.86 GiB
PAGE FILE: 23.47 GiB/33.86 GiB
PROBABLE CALL STACK:
[0 ] 0x01C407BFCB0C StarfieldEngineFixes.dll+005CB0C
mov edx,[rax+28h]
[1 ] 0x01C407C30664 StarfieldEngineFixes.dll+0090664
jmp 0000000000000801h
[2 ] 0x01C407C334B2 StarfieldEngineFixes.dll+00934B2
mov rbx,[rsi]
[3 ] 0x7FF7751299B3 Starfield.exe+2F499B3
test eax,eax
[4 ] 0x7FF775129C9A Starfield.exe+2F49C9A
mov rcx,r13
[5 ] 0x7FF77534CBDF Starfield.exe+316CBDF
add rsp,48h
[6 ] 0x7FF77534DDA8 Starfield.exe+316DDA8
nop
[7 ] 0x7FF7747C4DBE Starfield.exe+25E4DBE
test r13,r13
[8 ] 0x7FF7747BAAB1 Starfield.exe+25DAAB1
mov rcx,rdi
[9 ] 0x7FF7747BB004 Starfield.exe+25DB004
mov rax,gs:[58h]
[10] 0x7FF7747BE1A8 Starfield.exe+25DE1A8
jmp short 9
[11] 0x7FF7747C61DF Starfield.exe+25E61DF
call 0FFFFFFFFFFFF947Dh
[12] 0x7FF77330B4A6 Starfield.exe+112B4A6
mov ebx,eax
[13] 0x7FFF1CBE259D KERNEL32.DLL+001259D BaseThreadInitThunk
mov ecx,eax
[14] 0x7FFF1E68AF38 ntdll.dll+005AF38 RtlUserThreadStart
jmp short 0000000000000021h
REGISTERS:
RAX 0x68FB (size_t)
RBX 0x0 (size_t)
RCX 0x0 (size_t)
RDX 0x0 (size_t)
RSI 0x0 (size_t)
RDI 0x0 (size_t)
RBP 0xA5E6FE990 (void*)
RSP 0xA5E6FE890 (void*)
R8 0x1C847DA3C10 (TESNPC*)
R9 0x1C408F0D1C0 (void*)
R10 0x29E51 (size_t)
R11 0xA5E6FE860 (std::_System_error_category*)
R12 0x1C4585C7980 (PlayerCharacter*)
R13 0x1C847DA3C10 (TESNPC*)
R14 0x1 (size_t)
R15 0x1C407CE1A00 (void* -> StarfieldEngineFixes.dll+0141A00)
xor [rdx+rdi*4],bl
STACK:
[RSP+0 ] 0x29E51 (size_t)
[RSP+8 ] 0x0 (size_t)
[RSP+10 ] 0x0 (size_t)
[RSP+18 ] 0x0 (size_t)
[RSP+20 ] 0xA5E6FEA60 (void*)
[RSP+28 ] 0x0 (size_t)
[RSP+30 ] 0x0 (size_t)
[RSP+38 ] 0x0 (size_t)
[RSP+40 ] 0x1D2C0C27E10 (void*)
[RSP+48 ] 0x7FFF1E66B001 (void* -> ntdll.dll+003B001 RtlFreeHeap)
mov r9d,eax
[RSP+50 ] 0x1D2C0C27E00 (char*) "p"
[RSP+58 ] 0x1C439820000 (void*)
[RSP+60 ] 0x7FFE0358 (void*)
[RSP+68 ] 0x7FFF1E640873 (void* -> ntdll.dll+0010873 RtlGetSystemTimePrecise)
nop
[RSP+70 ] 0x1042CC6 (size_t)
[RSP+78 ] 0x7FF773221DA3 (void* -> Starfield.exe+1041DA3)
nop
[RSP+80 ] 0x1D2C0C27E10 (void*)
[RSP+88 ] 0x7FFF1BC0364B (void* -> ucrtbase.dll+001364B _free_base)
test eax,eax
[RSP+90 ] 0x0 (size_t)
[RSP+98 ] 0x0 (size_t)
[RSP+A0 ] 0x0 (size_t)
[RSP+A8 ] 0x0 (size_t)
[RSP+B0 ] 0x1C452ED6E00 (Main*)
[RSP+B8 ] 0x7FFF1BE92240 (char*) "\x0f\x1fD"
[RSP+C0 ] 0x14B6103B26 (size_t)
[RSP+C8 ] 0xA5E6FE9E0 (void*)
[RSP+D0 ] 0xA5E6FEAE0 (void*)
[RSP+D8 ] 0x0 (size_t)
[RSP+E0 ] 0x1D0D9762010 (void*)
[RSP+E8 ] 0x7FFF0F06AB66 (void* -> MSVCP140.dll+003AB66 __crtGetSystemTimePreciseAsFileTime)
nop
[RSP+F0 ] 0x1D0A5DC54E0 (void*)
[RSP+F8 ] 0x1D0A5DC54D0 (void*)
[RSP+100 ] 0x1D2C0C27E10 (void*)
[RSP+108 ] 0x1D2C0C27E20 (char*) "\x1d"
[RSP+110 ] 0x1D2C0C27E20 (char*) "\x1d"
[RSP+118 ] 0x7FFF0F042F4E (void* -> MSVCP140.dll+0012F4E _Xtime_get_ticks)
mov eax,[rsp+34h]
[RSP+120 ] 0x0 (size_t)
[RSP+128 ] 0x0 (size_t)
[RSP+130 ] 0x0 (size_t)
[RSP+138 ] 0xF (size_t)
[RSP+140 ] 0x1D0D9762010 (void*)
[RSP+148 ] 0x7FF7732224FB (void* -> Starfield.exe+10424FB)
lea r11,[rsp+0E20h]
[RSP+150 ] 0x1DB444000000000 (size_t)
[RSP+158 ] 0xA5E6FE970 (void*)
[RSP+160 ] 0xA5E6FEAE0 (void*)
[RSP+168 ] 0x1D0D9762010 (void*)
[RSP+170 ] 0x0 (size_t)
[RSP+178 ] 0x80000000 (size_t)
[RSP+180 ] 0x1CCC04BC000 (char*) "2\x03"
[RSP+188 ] 0x1C400000332 (void*)
[RSP+190 ] 0x1CCC04BC000 (char*) "2\x03"
[RSP+198 ] 0x1C400000332 (void*)
[RSP+1A0 ] 0x1CCC04BC000 (char*) "2\x03"
[RSP+1A8 ] 0x1C400000332 (void*)
[RSP+1B0 ] 0x1CCC04BC000 (char*) "2\x03"
[RSP+1B8 ] 0x1C400000332 (void*)
[RSP+1C0 ] 0x1C400000000 (void*)
[RSP+1C8 ] 0x7FF780000000 (size_t)
[RSP+1D0 ] 0xA5E6FEA70 (void*)
[RSP+1D8 ] 0x7FF775A5A720 (void* -> Starfield.exe+387A720)
test rcx,rcx
[RSP+1E0 ] 0x7FF77750B228 (void* -> Starfield.exe+532B228)
[RSP+1E8 ] 0x1C440864040 (void*)
[RSP+1F0 ] 0x1D338A32660 (Scaleform::GFx::AS3::ASVM*)
[RSP+1F8 ] 0xA5E6FEDC8 (void*)
[RSP+200 ] 0x1D338C14F40 (Scaleform::GFx::AS3::RefCountBaseGC<328>*)
[RSP+208 ] 0x7FF772FE0EDC (void* -> Starfield.exe+0E00EDC)
mov rcx,rbx
[RSP+210 ] 0x1D338C14F40 (Scaleform::GFx::AS3::RefCountBaseGC<328>*)
[RSP+218 ] 0xA5E6FEC39 (void*)
[RSP+220 ] 0x0 (size_t)
[RSP+228 ] 0x0 (size_t)
[RSP+230 ] 0x1D338C14F40 (Scaleform::GFx::AS3::RefCountBaseGC<328>*)
[RSP+238 ] 0x7FF77308E9B4 (void* -> Starfield.exe+0EAE9B4)
test dil,1
[RSP+240 ] 0x1D338C14F40 (Scaleform::GFx::AS3::RefCountBaseGC<328>*)
[RSP+248 ] 0xA00000054 (size_t)
[RSP+250 ] 0x1CCC3150000 (char*) "T"
[RSP+258 ] 0x54 (size_t)
[RSP+260 ] 0x1D338A32660 (Scaleform::GFx::AS3::ASVM*)
[RSP+268 ] 0xA5E6FEE38 (char*) "\x0c"
[RSP+270 ] 0x1D338BD9F00 (Scaleform::GFx::AS3::RefCountBaseGC<328>*)
[RSP+278 ] 0x7FF772FE0EDC (void* -> Starfield.exe+0E00EDC)
mov rcx,rbx
[RSP+280 ] 0x1D338BD9F00 (Scaleform::GFx::AS3::RefCountBaseGC<328>*)
[RSP+288 ] 0xA5E6FECA9 (void*)
[RSP+290 ] 0x0 (size_t)
[RSP+298 ] 0x7FF772FE0EDC (void* -> Starfield.exe+0E00EDC)
mov rcx,rbx
[RSP+2A0 ] 0x1D338BD9F00 (Scaleform::GFx::AS3::RefCountBaseGC<328>*)
[RSP+2A8 ] 0x1C407CE1A00 (void* -> StarfieldEngineFixes.dll+0141A00)
xor [rdx+rdi*4],bl
[RSP+2B0 ] 0x1C407CE1A00 (void* -> StarfieldEngineFixes.dll+0141A00)
xor [rdx+rdi*4],bl
[RSP+2B8 ] 0x1C407CE2380 (char*) "C:\\dev\\xse\\CommonLibSF\\CommonLibSF\\SFSEPluginCLib\\src\\Main.cpp"
[RSP+2C0 ] 0x1C407CF50D0 (char*) "{}"
[RSP+2C8 ] 0x0 (size_t)
[RSP+2D0 ] 0x0 (size_t)
[RSP+2D8 ] 0x0 (size_t)
[RSP+2E0 ] 0xA5E6FEC80 (char*) "\x01"
[RSP+2E8 ] 0x1C407C30664 (void* -> StarfieldEngineFixes.dll+0090664)
jmp 0000000000000801h
[RSP+2F0 ] 0x1C407CEE998 (char*) "void __cdecl Events::HandleLoadingMenuOpenClose(bool)"
[RSP+2F8 ] 0x1 (size_t)
[RSP+300 ] 0x0 (size_t)
[RSP+308 ] 0x0 (size_t)
[RSP+310 ] 0x1D3000001C2 (void*)
[RSP+318 ] 0xA5E6FEC00 (void*)
[RSP+320 ] 0x0 (size_t)
[RSP+328 ] 0x7FF772FDE668 (void* -> Starfield.exe+0DFE668)
mov rsi,[rsp+0E0h]
[RSP+330 ] 0x1D338BDE540 (Scaleform::GFx::AS3::RefCountBaseGC<328>*)
[RSP+338 ] 0x7FF773044365 (void* -> Starfield.exe+0E64365)
test dil,1
[RSP+340 ] 0x1D338BDE540 (Scaleform::GFx::AS3::RefCountBaseGC<328>*)
[RSP+348 ] 0x7FF772FE03F0 (void* -> Starfield.exe+0E003F0)
test rax,rax
[RSP+350 ] 0xA5E6FED10 (void*)
[RSP+358 ] 0x0 (size_t)
[RSP+360 ] 0x1D338A361D0 (Scaleform::GFx::AS3::InstanceTraits::fl::Function*)
[RSP+368 ] 0x7FF772FEB01B (void* -> Starfield.exe+0E0B01B)
mov rax,[rdi+0A0h]
[RSP+370 ] 0x1D338BDE540 (Scaleform::GFx::AS3::RefCountBaseGC<328>*)
[RSP+378 ] 0x1D338AAA490 (Scaleform::GFx::AS3::InstanceTraits::UserDefined*)
[RSP+380 ] 0x10000000 (size_t)
[RSP+388 ] 0x0 (size_t)
[RSP+390 ] 0x0 (size_t)
[RSP+398 ] 0x7FF772FDE668 (void* -> Starfield.exe+0DFE668)
mov rsi,[rsp+0E0h]
[RSP+3A0 ] 0x0 (size_t)
[RSP+3A8 ] 0x0 (size_t)
[RSP+3B0 ] 0xA5E6FEDD0 (void*)
[RSP+3B8 ] 0x4 (size_t)
[RSP+3C0 ] 0x1D00000000C (void*)
[RSP+3C8 ] 0xA5E6FED50 (void*)
[RSP+3D0 ] 0x1D338BAE901 (void*)
[RSP+3D8 ] 0x1D338A32660 (Scaleform::GFx::AS3::ASVM*)
[RSP+3E0 ] 0xA5E6FED60 (char*) "\x0c"
[RSP+3E8 ] 0x7FF772FE3178 (void* -> Starfield.exe+0E03178)
jmp short 0000000000000023h
[RSP+3F0 ] 0x1 (size_t)
[RSP+3F8 ] 0x1D338AAA490 (Scaleform::GFx::AS3::InstanceTraits::UserDefined*)
[RSP+400 ] 0xC (size_t)
[RSP+408 ] 0x0 (size_t)
[RSP+410 ] 0x0 (size_t)
[RSP+418 ] 0x1D338A32660 (Scaleform::GFx::AS3::ASVM*)
[RSP+420 ] 0x1D338AC0320 (void*)
[RSP+428 ] 0x3 (size_t)
[RSP+430 ] 0x0 (size_t)
[RSP+438 ] 0x0 (size_t)
[RSP+440 ] 0x0 (size_t)
[RSP+448 ] 0xA5E6FEDD0 (void*)
[RSP+450 ] 0x0 (size_t)
[RSP+458 ] 0xA5E6FF2B0 (void*)
[RSP+460 ] 0x0 (size_t)
[RSP+468 ] 0x7FF772FE112B (void* -> Starfield.exe+0E0112B)
mov rax,rdi
[RSP+470 ] 0x1D338AC0320 (void*)
[RSP+478 ] 0x0 (size_t)
[RSP+480 ] 0x1D338AC0320 (void*)
[RSP+488 ] 0x1D338A32660 (Scaleform::GFx::AS3::ASVM*)
[RSP+490 ] 0xA5E6FED60 (char*) "\x0c"
[RSP+498 ] 0x0 (size_t)
[RSP+4A0 ] 0x1D30000000C (void*)
[RSP+4A8 ] 0x0 (size_t)
[RSP+4B0 ] 0x1D338A34B40 (Scaleform::GFx::AS3::Instances::fl::Object*)
[RSP+4B8 ] 0x7FF772E748D6 (void* -> Starfield.exe+0C948D6)
test eax,eax
[RSP+4C0 ] 0x1D338AC0320 (void*)
[RSP+4C8 ] 0x3 (size_t)
[RSP+4D0 ] 0x1D00000000C (void*)
[RSP+4D8 ] 0x0 (size_t)
[RSP+4E0 ] 0x1D338A34B40 (Scaleform::GFx::AS3::Instances::fl::Object*)
[RSP+4E8 ] 0x7FF772E748D6 (void* -> Starfield.exe+0C948D6)
test eax,eax
[RSP+4F0 ] 0x1D338A32170 (Scaleform::GFx::AS3::MovieRoot*)
[RSP+4F8 ] 0x1D338A34B40 (Scaleform::GFx::AS3::Instances::fl::Object*)
[RSP+500 ] 0x1D33812D4A0 (void*)
[RSP+508 ] 0x1CC3FCFDF98 (char*) "DispatchEventToGame"
[RSP+510 ] 0x1D338A75E01 (void*)
[RSP+518 ] 0x7FF773015AFF (void* -> Starfield.exe+0E35AFF)
movzx eax,bl
[RSP+520 ] 0x1D338A75E01 (void*)
[RSP+528 ] 0x1D338A32660 (Scaleform::GFx::AS3::ASVM*)
[RSP+530 ] 0x1D338A75EE0 (void*)
[RSP+538 ] 0xA5E6FEEB0 (void*)
[RSP+540 ] 0x0 (size_t)
[RSP+548 ] 0x1D338A2E070 (Scaleform::GFx::AS3::Instances::fl::Namespace*)
[RSP+550 ] 0x7FF70000000A (size_t)
[RSP+558 ] 0x0 (size_t)
[RSP+560 ] 0x1D338A75EE0 (void*)
[RSP+568 ] 0x7FF772F6AE37 (void* -> Starfield.exe+0D8AE37)
test rax,rax
[RSP+570 ] 0x7FF70000000A (size_t)
[RSP+578 ] 0x0 (size_t)
[RSP+580 ] 0x1D338A75EE0 (void*)
[RSP+588 ] 0x7FF772F6AE37 (void* -> Starfield.exe+0D8AE37)
test rax,rax
[RSP+590 ] 0xA (size_t)
[RSP+598 ] 0x7FF772F6AE37 (void* -> Starfield.exe+0D8AE37)
test rax,rax
[RSP+5A0 ] 0x1D0DE7421D0 (void*)
[RSP+5A8 ] 0xC (size_t)
[RSP+5B0 ] 0x0 (size_t)
[RSP+5B8 ] 0x0 (size_t)
[RSP+5C0 ] 0x1D338A32660 (Scaleform::GFx::AS3::ASVM*)
[RSP+5C8 ] 0x7FF772FB5B10 (void* -> Starfield.exe+0DD5B10)
mov rax,[rsp+60h]
[RSP+5D0 ] 0xA (size_t)
[RSP+5D8 ] 0x7FF77512C43D (void* -> Starfield.exe+2F4C43D)
mov rax,rbx
[RSP+5E0 ] 0x1D33573FDA0 (Scaleform::Render::TreeContainer::NodeData*)
[RSP+5E8 ] 0x7FF77360AB47 (void* -> Starfield.exe+142AB47)
mov rax,r8
[RSP+5F0 ] 0x170 (size_t)
[RSP+5F8 ] 0x7FF77512C43D (void* -> Starfield.exe+2F4C43D)
mov rax,rbx
[RSP+600 ] 0xA5E6FEFC0 (void*)
[RSP+608 ] 0x7FF77360AB47 (void* -> Starfield.exe+142AB47)
mov rax,r8
[RSP+610 ] 0xA5E6FF2E0 (void*)
[RSP+618 ] 0x7FF77276DB79 (void* -> Starfield.exe+058DB79)
nop
[RSP+620 ] 0x7FF778C0E658 (UI*)
[RSP+628 ] 0x1CCB0BF9210 (CursorMenu::CursorGameEventShuttle*)
[RSP+630 ] 0x1CCB0BF9210 (CursorMenu::CursorGameEventShuttle*)
[RSP+638 ] 0x7FF77276DB79 (void* -> Starfield.exe+058DB79)
nop
[RSP+640 ] 0x1D338A32C90 (Scaleform::GFx::AS3::InstanceTraits::fl::Object*)
[RSP+648 ] 0x7FF772FE03F0 (void* -> Starfield.exe+0E003F0)
test rax,rax
[RSP+650 ] 0xA5E6FEF70 (void*)
[RSP+658 ] 0xA5E6FF030 (void*)
[RSP+660 ] 0xA5E6FF330 (void*)
[RSP+668 ] 0x7FF77535EBCA (void* -> Starfield.exe+317EBCA)
mov rcx,rbx
[RSP+670 ] 0x1C43E6BDCE0 (void*)
[RSP+678 ] 0x7FF778C0E670 (char*) "x6"
[RSP+680 ] 0x1CCB0BF9210 (CursorMenu::CursorGameEventShuttle*)
[RSP+688 ] 0x1CCB0BF9210 (CursorMenu::CursorGameEventShuttle*)
[RSP+690 ] 0x7FF778D09040 (void* -> Starfield.exe+6B29040)
add [rax],al
[RSP+698 ] 0x7FF77535E7BD (void* -> Starfield.exe+317E7BD)
mov rbx,[rsp+120h]
[RSP+6A0 ] 0x2000 (size_t)
[RSP+6A8 ] 0xA5E6FEF60 (void*)
[RSP+6B0 ] 0x7FF778D09040 (void* -> Starfield.exe+6B29040)
add [rax],al
[RSP+6B8 ] 0x7FF772FE2B24 (void* -> Starfield.exe+0E02B24)
xor r9d,r9d
[RSP+6C0 ] 0x7FF778D090C0 (void* -> Starfield.exe+6B290C0)
mov al,[7FF778C2C4h]
[RSP+6C8 ] 0xA5E6FEF60 (void*)
[RSP+6D0 ] 0x1CCE8038000 (void*)
[RSP+6D8 ] 0xE0000015E0 (size_t)
[RSP+6E0 ] 0x0 (size_t)
[RSP+6E8 ] 0x7FF777546DC0 (void* -> Starfield.exe+5366DC0)
sub al,0BAh
[RSP+6F0 ] 0x0 (size_t)
[RSP+6F8 ] 0x7FF77562E501 (void* -> Starfield.exe+344E501)
add rsp,20h
[RSP+700 ] 0x0 (size_t)
[RSP+708 ] 0x7FF777548108 (void* -> Starfield.exe+5368108)
mov esp,0F7734E61h
[RSP+710 ] 0x0 (size_t)
[RSP+718 ] 0xA5E6FF101 (void*)
[RSP+720 ] 0x1C400000000 (void*)
[RSP+728 ] 0x7FF777548108 (void* -> Starfield.exe+5368108)
mov esp,0F7734E61h
[RSP+730 ] 0x0 (size_t)
[RSP+738 ] 0x1CCB0BF9201 (void*)
[RSP+740 ] 0x1D300000000 (void*)
[RSP+748 ] 0x7FF777546E28 (void* -> Starfield.exe+5366E28)
add [rdx+7FF7734Dh],bh
[RSP+750 ] 0x0 (size_t)
[RSP+758 ] 0x7FF77360B701 (void* -> Starfield.exe+142B701)
[RSP+760 ] 0xAFFFFFFFF (size_t)
[RSP+768 ] 0x7FF777546E28 (void* -> Starfield.exe+5366E28)
add [rdx+7FF7734Dh],bh
[RSP+770 ] 0x7FF778C0E658 (UI*)
[RSP+778 ] 0x1CCB0BF9210 (CursorMenu::CursorGameEventShuttle*)
[RSP+780 ] 0x1CCB0BF9210 (CursorMenu::CursorGameEventShuttle*)
[RSP+788 ] 0x7FF77276DB79 (void* -> Starfield.exe+058DB79)
nop
[RSP+790 ] 0x0 (size_t)
[RSP+798 ] 0x1CCB0BF9201 (void*)
[RSP+7A0 ] 0xA5E6FF380 (void*)
[RSP+7A8 ] 0xA5E6FF150 (TUIValue<float>*)
[RSP+7B0 ] 0xA5E6FF150 (TUIValue<float>*)
[RSP+7B8 ] 0x7FF77535F10B (void* -> Starfield.exe+317F10B)
xor eax,eax
[RSP+7C0 ] 0xA5E6FF380 (void*)
[RSP+7C8 ] 0x0 (size_t)
[RSP+7D0 ] 0x0 (size_t)
[RSP+7D8 ] 0x7FF772EDC20B (void* -> Starfield.exe+0CFC20B)
mov rdi,rax
[RSP+7E0 ] 0x7FF777546DC0 (void* -> Starfield.exe+5366DC0)
sub al,0BAh
[RSP+7E8 ] 0x0 (size_t)
[RSP+7F0 ] 0x1C407CE1AC5 (void* -> StarfieldEngineFixes.dll+0141AC5)
add [rax],al
[RSP+7F8 ] 0x7FF778C0E590 (UI*)
[RSP+800 ] 0x0 (size_t)
[RSP+808 ] 0x0 (size_t)
[RSP+810 ] 0xA5E6FF1B0 (TUIValue<unsigned int>*)
[RSP+818 ] 0x1C407C334B2 (void* -> StarfieldEngineFixes.dll+00934B2)
mov rbx,[rsi]
[RSP+820 ] 0x1CCB9787E28 (void*)
[RSP+828 ] 0x0 (size_t)
[RSP+830 ] 0xA5E6FF570 (void*)
[RSP+838 ] 0x7FF778C0E590 (UI*)
[RSP+840 ] 0x7FF777546E28 (void* -> Starfield.exe+5366E28)
add [rdx+7FF7734Dh],bh
[RSP+848 ] 0x0 (size_t)
[RSP+850 ] 0x1D334390001 (void*)
[RSP+858 ] 0x7FFFFFFFFFFF (size_t)
[RSP+860 ] 0x7FF777546E28 (void* -> Starfield.exe+5366E28)
add [rdx+7FF7734Dh],bh
[RSP+868 ] 0x0 (size_t)
[RSP+870 ] 0x1 (size_t)
[RSP+878 ] 0x0 (size_t)
[RSP+880 ] 0x7FF700000000 (size_t)
[RSP+888 ] 0x0 (size_t)
[RSP+890 ] 0x10001 (size_t)
[RSP+898 ] 0x1D336AE0000 (void*)
[RSP+8A0 ] 0x7FF777546DC0 (void* -> Starfield.exe+5366DC0)
sub al,0BAh
[RSP+8A8 ] 0x0 (size_t)
[RSP+8B0 ] 0x1D0E4D91501 (void*)
[RSP+8B8 ] 0x0 (size_t)
[RSP+8C0 ] 0x7FF777548108 (void* -> Starfield.exe+5368108)
mov esp,0F7734E61h
[RSP+8C8 ] 0x0 (size_t)
[RSP+8D0 ] 0x7FF77871DD01 (void* -> Starfield.exe+653DD01)
js short 000000000000000Ch
[RSP+8D8 ] 0x7FF700000000 (size_t)
[RSP+8E0 ] 0x7FF777548108 (void* -> Starfield.exe+5368108)
mov esp,0F7734E61h
[RSP+8E8 ] 0x0 (size_t)
[RSP+8F0 ] 0x7FF778C0E901 (void* -> Starfield.exe+6A2E901)
add [rax],al
[RSP+8F8 ] 0x1CC00000000 (void*)
[RSP+900 ] 0x7FF777546E28 (void* -> Starfield.exe+5366E28)
add [rdx+7FF7734Dh],bh
[RSP+908 ] 0x0 (size_t)
[RSP+910 ] 0x1 (size_t)
[RSP+918 ] 0x7FF7FFFFFFFF (size_t)
[RSP+920 ] 0x7FF777546E28 (void* -> Starfield.exe+5366E28)
add [rdx+7FF7734Dh],bh
[RSP+928 ] 0x0 (size_t)
[RSP+930 ] 0x7FF77AD3E301 (char*) "\x03"
[RSP+938 ] 0x7FF700000000 (size_t)
[RSP+940 ] 0x7FF777546C98 (void* -> Starfield.exe+5366C98)
jo short 0FFFFFFFFFFFFFFBCh
[RSP+948 ] 0x0 (size_t)
[RSP+950 ] 0x7FF778C0E590 (UI*)
[RSP+958 ] 0x7FF7733F6F09 (void* -> Starfield.exe+1216F09)
mov rdx,[rsp+40h]
[RSP+960 ] 0xA5E6FF2C0 (void*)
[RSP+968 ] 0x7FF778CF9910 (MenuTopicManager*)
[RSP+970 ] 0xA5E6FF570 (void*)
[RSP+978 ] 0x1CCB04B1220 (void*)
[RSP+980 ] 0x7FF7775381E8 (void* -> Starfield.exe+53581E8)
xor [rsi-68h],bl
[RSP+988 ] 0xA5E6FF238 (void*)
[RSP+990 ] 0xA5E6FF570 (void*)
[RSP+998 ] 0x7FF77340518A (void* -> Starfield.exe+122518A)
test al,al
[RSP+9A0 ] 0x0 (size_t)
[RSP+9A8 ] 0xA5E6FF230 (void*)
[RSP+9B0 ] 0x7FF778CF9924 (void* -> Starfield.exe+6B19924)
add [rax],al
[RSP+9B8 ] 0x7FF775129E8E (void* -> Starfield.exe+2F49E8E)
jmp short 000000000000000Dh
[RSP+9C0 ] 0xA5E6FF2C0 (void*)
[RSP+9C8 ] 0x7FF7734048AF (void* -> Starfield.exe+12248AF)
nop
[RSP+9D0 ] 0x0 (size_t)
[RSP+9D8 ] 0x1CCBF8904C0 (void*)
[RSP+9E0 ] 0x0 (size_t)
[RSP+9E8 ] 0x2 (size_t)
[RSP+9F0 ] 0xA5E6FF318 (void*)
[RSP+9F8 ] 0x7FF7746A81AA (void* -> Starfield.exe+24C81AA)
mov al,bl
[RSP+A00 ] 0xA5E6FF2C0 (void*)
[RSP+A08 ] 0x7FF778C0E658 (UI*)
[RSP+A10 ] 0x0 (size_t)
[RSP+A18 ] 0x7FF7727AB727 (void* -> Starfield.exe+05CB727)
mov rbx,rax
[RSP+A20 ] 0x1CCB9787E00 (void*)
[RSP+A28 ] 0x7FF7746A9614 (void* -> Starfield.exe+24C9614)
test al,al
[RSP+A30 ] 0xA5E6FF430 (stl::local_function_detail::LocalFunctionImpl<<lambda_21489826080a198812dab652607bde1a>,BSEventNotifyControl,BSTEventDetail::SinkBase *>*)
[RSP+A38 ] 0x7FF778C0E590 (UI*)
[RSP+A40 ] 0x1C43E6BDCE0 (void*)
[RSP+A48 ] 0x7FF778C0E5A8 (void* -> Starfield.exe+6A2E5A8)
lock adc [rax],eax
[RSP+A50 ] 0x7FF778C0E590 (UI*)
[RSP+A58 ] 0x1C407D1D420 (Events::SFEngineFixes_MenuOpenCloseEventClass*)
[RSP+A60 ] 0x1CCB9787E48 (void*)
[RSP+A68 ] 0x7FF7751299B3 (void* -> Starfield.exe+2F499B3)
test eax,eax
[RSP+A70 ] 0x1CCB9787E28 (void*)
[RSP+A78 ] 0x1D0DE87D858 (FaderMenu*)
[RSP+A80 ] 0xA5E6FF3D0 (void*)
[RSP+A88 ] 0x0 (size_t)
[RSP+A90 ] 0x1C407D1D420 (Events::SFEngineFixes_MenuOpenCloseEventClass*)
[RSP+A98 ] 0x7FF778C0E590 (UI*)
[RSP+AA0 ] 0x0 (size_t)
[RSP+AA8 ] 0x7FF778C0E590 (UI*)
[RSP+AB0 ] 0x1C43E6BDCE0 (void*)
[RSP+AB8 ] 0x7FF775129C9A (void* -> Starfield.exe+2F49C9A)
mov rcx,r13
[RSP+AC0 ] 0xA5E6FF430 (stl::local_function_detail::LocalFunctionImpl<<lambda_21489826080a198812dab652607bde1a>,BSEventNotifyControl,BSTEventDetail::SinkBase *>*)
[RSP+AC8 ] 0xA5E6FF3D0 (void*)
[RSP+AD0 ] 0x7FF778C0E580 (UI*)
[RSP+AD8 ] 0x1 (size_t)
[RSP+AE0 ] 0xA5E6FF3F0 (char*) "\x01"
[RSP+AE8 ] 0x7FF7729797B0 (void* -> Starfield.exe+07997B0)
nop
[RSP+AF0 ] 0xAFFFFFFFF (size_t)
[RSP+AF8 ] 0xA5E6FF3C0 (void*)
[RSP+B00 ] 0x0 (size_t)
[RSP+B08 ] 0x0 (size_t)
[RSP+B10 ] 0x0 (size_t)
[RSP+B18 ] 0x7FF778C0E590 (UI*)
[RSP+B20 ] 0x0 (size_t)
[RSP+B28 ] 0x7FF775AA2E18 (void* -> Starfield.exe+38C2E18)
cmp [r8+0Ch],eax
[RSP+B30 ] 0x0 (size_t)
[RSP+B38 ] 0x0 (size_t)
[RSP+B40 ] 0x0 (size_t)
[RSP+B48 ] 0x7FF778C2EC01 (void* -> Starfield.exe+6A4EC01)
add [rax],al
[RSP+B50 ] 0x7FF778C0E998 (void* -> Starfield.exe+6A2E998)
add [rax],al
[RSP+B58 ] 0x1CC69D6F680 (void*)
[RSP+B60 ] 0x1 (size_t)
[RSP+B68 ] 0x7FF778C0E580 (UI*)
[RSP+B70 ] 0xA5E6FF560 (char*) "0"
[RSP+B78 ] 0x7FF77534CBDF (void* -> Starfield.exe+316CBDF)
add rsp,48h
[RSP+B80 ] 0x0 (size_t)
[RSP+B88 ] 0x7FF77534EE09 (void* -> Starfield.exe+316EE09)
mov ecx,edi
[RSP+B90 ] 0x0 (size_t)
[RSP+B98 ] 0x1CCBF8904C0 (void*)
[RSP+BA0 ] 0x7FF77779EAE0 (void* -> Starfield.exe+55BEAE0)
mov al,6Ch
[RSP+BA8 ] 0xA5E6FF570 (void*)
[RSP+BB0 ] 0x7FF778C0E590 (UI*)
[RSP+BB8 ] 0x7FF778C0E580 (UI*)
[RSP+BC0 ] 0x1 (size_t)
[RSP+BC8 ] 0x7FF77534DDA8 (void* -> Starfield.exe+316DDA8)
nop
[RSP+BD0 ] 0x0 (size_t)
[RSP+BD8 ] 0x7FF778C2EC0C (void* -> Starfield.exe+6A4EC0C)
add [rax],al
[RSP+BE0 ] 0x1CCBF8904C0 (void*)
[RSP+BE8 ] 0x0 (size_t)
[RSP+BF0 ] 0x0 (size_t)
[RSP+BF8 ] 0x7FF774CE7220 (void* -> Starfield.exe+2B07220)
mov [rsp+18h],rbx
[RSP+C00 ] 0x0 (size_t)
[RSP+C08 ] 0x1C401220D01 (void*)
[RSP+C10 ] 0x0 (size_t)
[RSP+C18 ] 0x1C43E81F7E0 (void*)
[RSP+C20 ] 0x1CC3F25B138 (void*)
[RSP+C28 ] 0x1CC69D6F680 (void*)
[RSP+C30 ] 0x1CC69D6F700 (char*) "\x0f"
[RSP+C38 ] 0x1CC69D6F700 (char*) "\x0f"
[RSP+C40 ] 0x0 (size_t)
[RSP+C48 ] 0x0 (size_t)
[RSP+C50 ] 0x0 (size_t)
[RSP+C58 ] 0x7FF778C2EC2C (char*) "\x01"
[RSP+C60 ] 0x7FF778C2EC2C (char*) "\x01"
[RSP+C68 ] 0x7FF77512C3C5 (void* -> Starfield.exe+2F4C3C5)
mov rax,[rsp+78h]
[RSP+C70 ] 0x1CCE8039510 (char*) "0"
[RSP+C78 ] 0x7FF778D090C0 (void* -> Starfield.exe+6B290C0)
mov al,[7FF778C2C4h]
[RSP+C80 ] 0x7FF778C2EC1C (void* -> Starfield.exe+6A4EC1C)
add [rax],al
[RSP+C88 ] 0x0 (size_t)
[RSP+C90 ] 0x7FF77767BF28 (void* -> Starfield.exe+549BF28)
jl short 0FFFFFFFFFFFFFFF2h
[RSP+C98 ] 0x7FF7734BA07D (void* -> Starfield.exe+12DA07D)
jmp short 6
[RSP+CA0 ] 0x1CC3F3414E4 (void*)
[RSP+CA8 ] 0x7FF77512AE12 (void* -> Starfield.exe+2F4AE12)
mov edx,eax
[RSP+CB0 ] 0x0 (size_t)
[RSP+CB8 ] 0x0 (size_t)
[RSP+CC0 ] 0x7FF778C2EC2C (char*) "\x01"
[RSP+CC8 ] 0x7FF778C0E9E8 (void* -> Starfield.exe+6A2E9E8)
mov al,36h
[RSP+CD0 ] 0x30 (size_t)
[RSP+CD8 ] 0x7FF772995DC9 (void* -> Starfield.exe+07B5DC9)
add rsp,28h
[RSP+CE0 ] 0x1C43E81F7E0 (void*)
[RSP+CE8 ] 0xA5E6FF500 (void*)
[RSP+CF0 ] 0x7FF778C0E580 (UI*)
[RSP+CF8 ] 0x1CC3F3414E8 (void*)
[RSP+D00 ] 0x1FC000001500 (size_t)
[RSP+D08 ] 0x7FF7000014D0 (size_t)
[RSP+D10 ] 0x1CC3F3414E0 (void*)
[RSP+D18 ] 0x1C4398273E4 (char*) "\x01"
[RSP+D20 ] 0x7FF778C0E580 (UI*)
[RSP+D28 ] 0x0 (size_t)
[RSP+D30 ] 0x0 (size_t)
[RSP+D38 ] 0x0 (size_t)
[RSP+D40 ] 0x7FF778CF9878 (GameUIModel*)
[RSP+D48 ] 0x0 (size_t)
[RSP+D50 ] 0xA5E6FF6F0 (void*)
[RSP+D58 ] 0x7FF7747C4DBE (void* -> Starfield.exe+25E4DBE)
test r13,r13
[RSP+D60 ] 0x0 (size_t)
[RSP+D68 ] 0x0 (size_t)
[RSP+D70 ] 0x1CC3F3414E0 (void*)
[RSP+D78 ] 0x7FF700000002 (size_t)
[RSP+D80 ] 0x1CCE41A6820 (BSService::Detail::TCmd<<lambda_f20812d747fc6158df19f3c32908e47e>,void (&)(void)>*)
[RSP+D88 ] 0x7FF77AF3F000 (void* -> Starfield.exe+8D5F000)
fwait
[RSP+D90 ] 0x1C439829F10 (ScrapHeap*)
[RSP+D98 ] 0x0 (size_t)
[RSP+DA0 ] 0x0 (size_t)
[RSP+DA8 ] 0xA5E6FF730 (void*)
[RSP+DB0 ] 0x0 (size_t)
[RSP+DB8 ] 0x1C439829F10 (ScrapHeap*)
[RSP+DC0 ] 0x0 (size_t)
[RSP+DC8 ] 0x0 (size_t)
[RSP+DD0 ] 0x7FF774CEA5D0 (void* -> Starfield.exe+2B0A5D0)
mov [rsp+18h],rbx
[RSP+DD8 ] 0x0 (size_t)
[RSP+DE0 ] 0x7FF778C5D101 (void* -> Starfield.exe+6A7D101)
cli
[RSP+DE8 ] 0x0 (size_t)
[RSP+DF0 ] 0x0 (size_t)
[RSP+DF8 ] 0x7FF774597310 (void* -> Starfield.exe+23B7310)
mov [rsp+18h],rbx
[RSP+E00 ] 0x0 (size_t)
[RSP+E08 ] 0x7FFEF64FDB01 (void* -> gameoverlayrenderer64.dll+009DB01)
call 00000000000120DFh
[RSP+E10 ] 0x0 (size_t)
[RSP+E18 ] 0x3 (size_t)
[RSP+E20 ] 0x0 (size_t)
[RSP+E28 ] 0x1CCB8CDDA80 (void*)
[RSP+E30 ] 0x0 (size_t)
[RSP+E38 ] 0x7FF77296E083 (void* -> Starfield.exe+078E083)
jmp short 000000000000003Dh
[RSP+E40 ] 0x0 (size_t)
[RSP+E48 ] 0xA5E6FF7E8 (void*)
[RSP+E50 ] 0x1C439D9CD70 (void*)
[RSP+E58 ] 0x7FFF1CCC1A19 (void* -> user32.dll+0021A19 PeekMessageA)
lea r11,[rsp+40h]
[RSP+E60 ] 0x3DFF (size_t)
[RSP+E68 ] 0x3 (size_t)
[RSP+E70 ] 0x0 (size_t)
[RSP+E78 ] 0x1CCB8CDDB40 (void*)
[RSP+E80 ] 0x1 (size_t)
[RSP+E88 ] 0x7FFE00000003 (size_t)
[RSP+E90 ] 0x1 (size_t)
[RSP+E98 ] 0x36B0 (size_t)
[RSP+EA0 ] 0x0 (size_t)
[RSP+EA8 ] 0xA5E6FF7E8 (void*)
[RSP+EB0 ] 0x14B61284BE (size_t)
[RSP+EB8 ] 0x0 (size_t)
[RSP+EC0 ] 0x0 (size_t)
[RSP+EC8 ] 0x7FFEF64FE2A0 (void* -> gameoverlayrenderer64.dll+009E2A0)
mov rbx,[rsp+40h]
[RSP+ED0 ] 0x36B0 (size_t)
[RSP+ED8 ] 0x0 (size_t)
[RSP+EE0 ] 0x0 (size_t)
[RSP+EE8 ] 0x7FF7727BEBD9 (void* -> Starfield.exe+05DEBD9)
add rsp,28h
[RSP+EF0 ] 0x7FF778C2EC2C (char*) "\x01"
[RSP+EF8 ] 0x7FF778C2EC2C (char*) "\x01"
[RSP+F00 ] 0x7FF778891518 (void* -> Starfield.exe+66B1518)
add [rax],al
[RSP+F08 ] 0x7FF77479BDD7 (void* -> Starfield.exe+25BBDD7)
test sil,sil
[RSP+F10 ] 0x1 (size_t)
[RSP+F18 ] 0x7FF77562C368 (void* -> Starfield.exe+344C368)
test edi,edi
[RSP+F20 ] 0x3 (size_t)
[RSP+F28 ] 0x7FF7727BEBD9 (void* -> Starfield.exe+05DEBD9)
add rsp,28h
[RSP+F30 ] 0xA5E6FF850 (void*)
[RSP+F38 ] 0x0 (size_t)
[RSP+F40 ] 0x0 (size_t)
[RSP+F48 ] 0x0 (size_t)
[RSP+F50 ] 0x0 (size_t)
[RSP+F58 ] 0x0 (size_t)
[RSP+F60 ] 0x0 (size_t)
[RSP+F68 ] 0x1C452ED6E00 (Main*)
[RSP+F70 ] 0x0 (size_t)
[RSP+F78 ] 0x7FF77AD0EF00 (BSPlatform::BSBethesdaPlatform*)
[RSP+F80 ] 0xA5E6FF850 (void*)
[RSP+F88 ] 0x7FF7747BAAB1 (void* -> Starfield.exe+25DAAB1)
mov rcx,rdi
[RSP+F90 ] 0x2A (size_t)
[RSP+F98 ] 0x14B6103B2D (size_t)
[RSP+FA0 ] 0x7FF778903B01 (void* -> Starfield.exe+6723B01)
[RSP+FA8 ] 0x1D0A53BB9A0 (void*)
[RSP+FB0 ] 0x0 (size_t)
[RSP+FB8 ] 0x1E68 (size_t)
[RSP+FC0 ] 0x0 (size_t)
[RSP+FC8 ] 0x7FF7747BB004 (void* -> Starfield.exe+25DB004)
mov rax,gs:[58h]
[RSP+FD0 ] 0x0 (size_t)
[RSP+FD8 ] 0x0 (size_t)
[RSP+FE0 ] 0x7FF77AD0EF00 (BSPlatform::BSBethesdaPlatform*)
[RSP+FE8 ] 0x1C452ED6E00 (Main*)
[RSP+FF0 ] 0x1C43982AD00 (void*)
[RSP+FF8 ] 0x7FF7747BE1A8 (void* -> Starfield.exe+25DE1A8)
jmp short 9
[RSP+1000] 0x100 (size_t)
[RSP+1008] 0x606F4 (size_t)
[RSP+1010] 0xA5E6FF8D0 (void*)
[RSP+1018] 0x0 (size_t)
[RSP+1020] 0x8171E46764C (size_t)
[RSP+1028] 0x5B8D80 (size_t)
[RSP+1030] 0x1CC3F000000 (void*)
[RSP+1038] 0x30000008D0 (size_t)
[RSP+1040] 0x1C43982ADA7 (void*)
[RSP+1048] 0x7FF7721E0000 (void* -> Starfield.exe+0000000)
pop r10
[RSP+1050] 0x0 (size_t)
[RSP+1058] 0x7FF7747C61DF (void* -> Starfield.exe+25E61DF)
call 0FFFFFFFFFFFF947Dh
[RSP+1060] 0x1CC00010001 (void*)
[RSP+1068] 0x1C400000002 (void*)
[RSP+1070] 0x8171E46764C (size_t)
[RSP+1078] 0xFFFFFFFFFFFFFFFF (size_t)
[RSP+1080] 0x1C400000002 (void*)
[RSP+1088] 0xA00000003 (size_t)
[RSP+1090] 0x0 (size_t)
[RSP+1098] 0x7FFF00000000 (void*)
[RSP+10A0] 0x0 (size_t)
[RSP+10A8] 0x0 (size_t)
[RSP+10B0] 0xFFFFF (size_t)
[RSP+10B8] 0xFFFFF (size_t)
[RSP+10C0] 0x0 (size_t)
[RSP+10C8] 0x7FF77330B4A6 (void* -> Starfield.exe+112B4A6)
mov ebx,eax
[RSP+10D0] 0xA (size_t)
[RSP+10D8] 0x0 (size_t)
[RSP+10E0] 0x7FF77B3BC310 (void* -> Starfield.exe+91DC310)
call 5
[RSP+10E8] 0xA5E414000 (void*)
[RSP+10F0] 0x0 (size_t)
[RSP+10F8] 0x0 (size_t)
[RSP+1100] 0x0 (size_t)
[RSP+1108] 0x7FFF1CBE259D (void* -> KERNEL32.DLL+001259D BaseThreadInitThunk)
mov ecx,eax
[RSP+1110] 0x0 (size_t)
[RSP+1118] 0x7FFEEF759230 (void* -> usvfs_x64.dll+0099230 InitHooks)
push rbx
[RSP+1120] 0x1 (size_t)
[RSP+1128] 0x3F9C (size_t)
[RSP+1130] 0x0 (size_t)
[RSP+1138] 0x7FFF1E68AF38 (void* -> ntdll.dll+005AF38 RtlUserThreadStart)
jmp short 0000000000000021h
[RSP+1140] 0x0 (size_t)
[RSP+1148] 0x0 (size_t)
[RSP+1150] 0x0 (size_t)
[RSP+1158] 0x0 (size_t)
[RSP+1160] 0x0 (size_t)
[RSP+1168] 0x0 (size_t)
[RSP+1170] 0x7068314500000000 (size_t)
[RSP+1178] 0x0 (size_t)
[RSP+1180] 0x0 (size_t)
[RSP+1188] 0x7FFF1BF9BE00 (void* -> KERNELBASE.dll+016BE00 UnhandledExceptionFilter)
mov [rsp+10h],rbx
[RSP+1190] 0xA5E6FD9C0 (void*)
[RSP+1198] 0x280003FFFB5C8C7A (size_t)
[RSP+11A0] 0x7FFF6B918F45 (size_t)
[RSP+11A8] 0xA5E6FD9C0 (void*)
[RSP+11B0] 0x7FFF1E68AF10 (void* -> ntdll.dll+005AF10 RtlUserThreadStart)
sub rsp,78h
[RSP+11B8] 0x0 (size_t)
[RSP+11C0] 0x0 (size_t)
[RSP+11C8] 0x0 (size_t)
[RSP+11D0] 0x0 (size_t)
[RSP+11D8] 0x0 (size_t)
[RSP+11E0] 0x0 (size_t)
[RSP+11E8] 0x0 (size_t)
[RSP+11F0] 0x0 (size_t)
[RSP+11F8] 0x0 (size_t)
[RSP+1200] 0x0 (size_t)
[RSP+1208] 0x0 (size_t)
[RSP+1210] 0x0 (size_t)
[RSP+1218] 0x0 (size_t)
[RSP+1220] 0x0 (size_t)
[RSP+1228] 0x0 (size_t)
[RSP+1230] 0x0 (size_t)
[RSP+1238] 0x0 (size_t)
[RSP+1240] 0x0 (size_t)
[RSP+1248] 0x0 (size_t)
[RSP+1250] 0x0 (size_t)
[RSP+1258] 0x0 (size_t)
[RSP+1260] 0x0 (size_t)
[RSP+1268] 0x0 (size_t)
[RSP+1270] 0x0 (size_t)
[RSP+1278] 0x0 (size_t)
[RSP+1280] 0x0 (size_t)
[RSP+1288] 0x0 (size_t)
[RSP+1290] 0x0 (size_t)
[RSP+1298] 0x0 (size_t)
[RSP+12A0] 0x0 (size_t)
[RSP+12A8] 0x0 (size_t)
[RSP+12B0] 0x0 (size_t)
[RSP+12B8] 0x0 (size_t)
[RSP+12C0] 0x0 (size_t)
[RSP+12C8] 0x0 (size_t)
[RSP+12D0] 0x0 (size_t)
[RSP+12D8] 0x0 (size_t)
[RSP+12E0] 0x0 (size_t)
[RSP+12E8] 0x0 (size_t)
[RSP+12F0] 0x0 (size_t)
[RSP+12F8] 0x0 (size_t)
[RSP+1300] 0x0 (size_t)
[RSP+1308] 0x0 (size_t)
[RSP+1310] 0x0 (size_t)
[RSP+1318] 0x0 (size_t)
[RSP+1320] 0x0 (size_t)
[RSP+1328] 0x0 (size_t)
[RSP+1330] 0x0 (size_t)
[RSP+1338] 0x0 (size_t)
[RSP+1340] 0x0 (size_t)
[RSP+1348] 0x0 (size_t)
[RSP+1350] 0x0 (size_t)
[RSP+1358] 0x0 (size_t)
[RSP+1360] 0x0 (size_t)
[RSP+1368] 0x0 (size_t)
[RSP+1370] 0x0 (size_t)
[RSP+1378] 0x0 (size_t)
[RSP+1380] 0x0 (size_t)
[RSP+1388] 0x0 (size_t)
[RSP+1390] 0x0 (size_t)
[RSP+1398] 0x0 (size_t)
[RSP+13A0] 0x0 (size_t)
[RSP+13A8] 0x0 (size_t)
[RSP+13B0] 0x0 (size_t)
[RSP+13B8] 0x0 (size_t)
[RSP+13C0] 0x0 (size_t)
[RSP+13C8] 0x0 (size_t)
[RSP+13D0] 0x0 (size_t)
[RSP+13D8] 0x0 (size_t)
[RSP+13E0] 0x0 (size_t)
[RSP+13E8] 0x0 (size_t)
[RSP+13F0] 0x0 (size_t)
[RSP+13F8] 0x0 (size_t)
[RSP+1400] 0x0 (size_t)
[RSP+1408] 0x0 (size_t)
[RSP+1410] 0x0 (size_t)
[RSP+1418] 0x0 (size_t)
[RSP+1420] 0x0 (size_t)
[RSP+1428] 0x0 (size_t)
[RSP+1430] 0x0 (size_t)
[RSP+1438] 0x0 (size_t)
[RSP+1440] 0x0 (size_t)
[RSP+1448] 0x0 (size_t)
[RSP+1450] 0x0 (size_t)
[RSP+1458] 0x0 (size_t)
[RSP+1460] 0x0 (size_t)
[RSP+1468] 0x0 (size_t)
[RSP+1470] 0x0 (size_t)
[RSP+1478] 0x0 (size_t)
[RSP+1480] 0x0 (size_t)
[RSP+1488] 0x0 (size_t)
[RSP+1490] 0x0 (size_t)
[RSP+1498] 0x0 (size_t)
[RSP+14A0] 0x0 (size_t)
[RSP+14A8] 0x0 (size_t)
[RSP+14B0] 0x0 (size_t)
[RSP+14B8] 0x0 (size_t)
[RSP+14C0] 0x0 (size_t)
[RSP+14C8] 0x0 (size_t)
[RSP+14D0] 0x0 (size_t)
[RSP+14D8] 0x0 (size_t)
[RSP+14E0] 0x0 (size_t)
[RSP+14E8] 0x0 (size_t)
[RSP+14F0] 0x0 (size_t)
[RSP+14F8] 0x0 (size_t)
[RSP+1500] 0x0 (size_t)
[RSP+1508] 0x0 (size_t)
[RSP+1510] 0x0 (size_t)
[RSP+1518] 0x0 (size_t)
[RSP+1520] 0x0 (size_t)
[RSP+1528] 0x0 (size_t)
[RSP+1530] 0x0 (size_t)
[RSP+1538] 0x0 (size_t)
[RSP+1540] 0x0 (size_t)
[RSP+1548] 0x0 (size_t)
[RSP+1550] 0x0 (size_t)
[RSP+1558] 0x0 (size_t)
[RSP+1560] 0x0 (size_t)
[RSP+1568] 0x0 (size_t)
[RSP+1570] 0x0 (size_t)
[RSP+1578] 0x0 (size_t)
[RSP+1580] 0x0 (size_t)
[RSP+1588] 0x0 (size_t)
[RSP+1590] 0x0 (size_t)
[RSP+1598] 0x0 (size_t)
[RSP+15A0] 0x0 (size_t)
[RSP+15A8] 0x0 (size_t)
[RSP+15B0] 0x0 (size_t)
[RSP+15B8] 0x0 (size_t)
[RSP+15C0] 0x0 (size_t)
[RSP+15C8] 0x0 (size_t)
[RSP+15D0] 0x0 (size_t)
[RSP+15D8] 0x0 (size_t)
[RSP+15E0] 0x0 (size_t)
[RSP+15E8] 0x0 (size_t)
[RSP+15F0] 0x0 (size_t)
[RSP+15F8] 0x0 (size_t)
[RSP+1600] 0x0 (size_t)
[RSP+1608] 0x0 (size_t)
[RSP+1610] 0x0 (size_t)
[RSP+1618] 0x0 (size_t)
[RSP+1620] 0x0 (size_t)
[RSP+1628] 0x0 (size_t)
[RSP+1630] 0x0 (size_t)
[RSP+1638] 0x0 (size_t)
[RSP+1640] 0x0 (size_t)
[RSP+1648] 0x0 (size_t)
[RSP+1650] 0x0 (size_t)
[RSP+1658] 0x0 (size_t)
[RSP+1660] 0x0 (size_t)
[RSP+1668] 0x0 (size_t)
[RSP+1670] 0x0 (size_t)
[RSP+1678] 0x0 (size_t)
[RSP+1680] 0x0 (size_t)
[RSP+1688] 0x0 (size_t)
[RSP+1690] 0x0 (size_t)
[RSP+1698] 0x0 (size_t)
[RSP+16A0] 0x0 (size_t)
[RSP+16A8] 0x0 (size_t)
[RSP+16B0] 0x0 (size_t)
[RSP+16B8] 0x0 (size_t)
[RSP+16C0] 0x0 (size_t)
[RSP+16C8] 0x0 (size_t)
[RSP+16D0] 0x0 (size_t)
[RSP+16D8] 0x0 (size_t)
[RSP+16E0] 0x0 (size_t)
[RSP+16E8] 0x0 (size_t)
[RSP+16F0] 0x0 (size_t)
[RSP+16F8] 0x0 (size_t)
[RSP+1700] 0x0 (size_t)
[RSP+1708] 0x0 (size_t)
[RSP+1710] 0x0 (size_t)
[RSP+1718] 0x0 (size_t)
[RSP+1720] 0x0 (size_t)
[RSP+1728] 0x0 (size_t)
[RSP+1730] 0x0 (size_t)
[RSP+1738] 0x0 (size_t)
[RSP+1740] 0x0 (size_t)
[RSP+1748] 0x0 (size_t)
[RSP+1750] 0x0 (size_t)
[RSP+1758] 0x0 (size_t)
[RSP+1760] 0x0 (size_t)
[RSP+1768] 0x0 (size_t)
MODULES:
_nvngx.dll
Address: 0x7FFE86C80000
SHA: F450A8C7847774514E59C37C18695C7D425D889F5960384B5F95F2B725828A36C4AA5DDCF5B3F8BD80F2B153571DB78CA110D433BB377A0FBEE461AEBA791881
Version: v32.0.15.6109
ADVAPI32.dll
Address: 0x7FFF1E510000
SHA: 8F3A43C518284C94A9AB7E4E24A5262CAC8B197DFC6C810E7DEDF69EAC5C98E978C3360B8F661D0E4938C91E0FA27EC6F4FD8D2EEAF14530A4B68008685EE73A
Version: v10.0.22621.1
amsi.dll
Address: 0x7FFF05770000
SHA: 4CFABD93F9704F6D560C2D5236927C1372F8E341B039BC9FDF8A0A06F7EFEC664ADCDC73CE5010A2ADA2994D12D6A8D679CBBD8075352FF0741AB42E1D1CD2D1
Version: v10.0.22621.3527
AUDIOSES.DLL
Address: 0x7FFF0CB50000
SHA: 203FBDF694AB7D878625D6AEAB66AFD1CC04F4857A30E36D77FCB61CA66A8DC7ABAA80FD5DD2287E3A6309725AF480A4C77CAFA1585AE90628D2454EB726E33D
Version: v10.0.22621.1
BakaDisableMyGames.dll
Address: 0x7FFE8D7F0000
SHA: 91F5C883FEEAA6A07277E700DA9B1049A8B004C53DD24333CC8A52EF837CC9ADB80BCF77A3BA0D22070FD7537B78FC02591370DD5926AB5BDEDDA03B49F95F56
Version: v4.0.0
bcrypt.dll
Address: 0x7FFF1B9E0000
SHA: FCA82D2A0034F24DA7D6771A9019747614A2F9BBBAC8212B39D22C9654F4E4052958E20E755B96F591692E807784F2BB9D612F0741E1B376A2C9ABF877BEF89B
Version: v10.0.22621.1
bcryptPrimitives.dll
Address: 0x7FFF1B930000
SHA: 53EE624AA4F3EBA079AB163880E6BF030DC20B3EAE926DB87FAE8462F3C5BA6BA06120DD337EA8C138B55966C582A50D34C02E02590669B3329D6219CB1947FE
Version: v10.0.22621.4317
bink2w64.dll
Address: 0x7FFE89050000
SHA: 61AB61B895332AE98F5491D07975E5D6A1E42747DE1AE292298CB008AB63AB410F8A7684DB7DDA694EBCC351783D68EDB167B4EEEAB74DBEC6C1BB238E62BEED
Version: v2023.2.0
CFGMGR32.dll
Address: 0x7FFF1B620000
SHA: 49888965143C96F2F210B95D16BAD1C039C0470340D8F908EDA6F693929DBBA1E66269B951D402F395185C8EB989E21B28F14244322A5FFDB459B39E462D2EDA
Version: v10.0.22621.2506
clbcatq.dll
Address: 0x7FFF1CAB0000
SHA: F82356DD39C9D04C82ADE46F9544B21ED07610ABF9DFB39C5531BCF7C86A144157502A75CEFA15CC82FC8FF9B0FC25CF9EF4EA96BC01C5E12F8D561FACA4BA75
Version: v2001.12.10941.16384
combase.dll
Address: 0x7FFF1D150000
SHA: 09F423C60B28B10F50A0055781F7A344036D7A1EAB68D9F658BB080BDA02F05F866A3C42F2D24C5E85AF4F86A19D4E21CCE1D0CCD66A44C74D1F02A73049B820
Version: v10.0.22621.1
CONCRT140.dll
Address: 0x7FFE89190000
SHA: 6E95D9909346A2CD2AF6FE4AE9BA94E5377888988F280BF9E123F250B37E636ED35371A3CCAE4E6227DA6627357374A636A394148DA445BAFA190408CCDAF71C
Version: v14.40.33810
CoreMessaging.dll
Address: 0x7FFF17E30000
SHA: B80CCED81E5FDD1FF95EC1565656A8E6F001C262233AA7314E19A2E5B38E8E2C91A30633DDB3058533ADCF1100FEACC2CC80A42E60094B1DCA3C4B0DE45C867F
Version: v10.0.22621.4391
CoreUIComponents.dll
Address: 0x7FFF13A90000
SHA: EC0113A0FB265FA894C82649C2AB624D255161685BED7C11DD6B3468FFE2FFDEA1E6A8DFD4D2190F48D0CE3A3F51AE3658ABD7B409CD57E58B435922972CD155
Version: v10.0.22621.4391
CRYPT32.dll
Address: 0x7FFF1BA10000
SHA: 757FE9C4474786C6CC560F32C8BF5D53FAD1342E066FCD404073FD12B7BD13A278E4FDDE6DEA1251D956108F434B2BFA4F3AF1D0FF438D9AE1003FCDF1757901
Version: v10.0.22621.4599
CRYPTBASE.DLL
Address: 0x7FFF1B090000
SHA: BB20B86B3C424DB0156791092017E34835C66CCBDD2EE6C939C86F5627FFEBA351E8D8E7BDDE20332D3068F30EE893F02288B8801B1906B8CBB111BCCA0D24C7
Version: v10.0.22621.1
cryptnet.dll
Address: 0x7FFF15B60000
SHA: 9D956FA294D7778EDBBC4967D16302383E2F4A92905C43BB61CFF8494C1BACBC052A2D8729FA3600C69A8DA37F90EBEAFF0B4115BC0F5F3E0754508BDE18E9DA
Version: v10.0.22621.1
cryptsp.dll
Address: 0x7FFF1B130000
SHA: B0DE63D441195DF2B7FDEA9DCC4D87968887480AB962F40DF37F2419A74A27062ACE4D8F4823F70FEE5BE329206ADD2C81472A130E300987861CFB65CC786FF5
Version: v10.0.22621.3672
d3d12.dll
Address: 0x7FFEFD290000
SHA: C30800809A566A228867C72190B3E35A3FEBA05997224C6234D908C6DB6EE2C1BB1A2B2989122AA6B3F756D074CBF786689EBB318933C576CE818189D85D785F
Version: v10.0.22621.4391
D3D12Core.dll
Address: 0x7FFE86E20000
SHA: B44437ED5E2BCC9ADF44E7458312C0EF0C7B6548231542F31664B9E51DB932DFD40C8F7D17470ED0DA938D73FEE5ADDBD6184B91A66BD0B8EEA0B206137A0388
Version: v1.608.2
D3DSCache.dll
Address: 0x7FFEFB280000
SHA: 78A36EE90B5CCC76B3112B428CF59C536660217848573B6C6830E19D39E78F08371F4430B1633E493BEAEAFF700AA496F3E290E55E1D5BDF830501C18513B2DE
Version: v10.0.22621.4599
dbgcore.DLL
Address: 0x7FFF0EDD0000
SHA: 60AAF521309B6B697B5DB66FB6101AEC6DA0B6F59706E2C7622D12339B65393958A35D4CC97B1AD88A4D75D7E30098FAE1F4909FE80340C39104325B7895EA0C
Version: v10.0.22621.1
dbghelp.dll
Address: 0x7FFF11650000
SHA: 4ADA171665E5E4596A02EDE87EAD13A7C4581DA86CAA173629562F0798ABE05F1CA701D526F59ED923203D156BDC284DE007985B3DE1299E8DF9815AE51C357F
Version: v10.0.22621.3593
dcomp.dll
Address: 0x7FFF179D0000
SHA: 0CF3941BC587B39688DF7D1E31915F487BBB7B66E1FC0AF659D4BD4E5728389CF7952815EC858F1C8957C38C8F1FFA4675052C9EB46601C8E55A95278113CAED
Version: v10.0.22621.4249
deviceaccess.dll
Address: 0x7FFEF5AB0000
SHA: 7B374792607AB1C27653C83C0F6B84BB255C6D885D531C802C37E7B91E381B8A562D95A477FF147F226C17DF1A650F8EFCF326B68A9703EF4E6AD110CA816177
Version: v10.0.22621.3672
devobj.dll
Address: 0x7FFF1B5F0000
SHA: 5364886DFC402E74153B7EC2987BBC041B615C3AB2FD74EB161B6B49EEDD2F7538D2A56D0B06E99984B3E1B745E9DD04BB90099EB37E4BF31F0006C022630681
Version: v10.0.22621.2506
DEVRTL.dll
Address: 0x7FFF029E0000
SHA: F776E1810BA33A3F7097E21E8F1779A8C1CD899B9A6455F13C605B363A3358C4A01AF367132C6E792735A02066AA16F8BEAFCE4A3753A2196EF9ECE819676687
Version: v10.0.22621.1
dhcpcsvc.DLL
Address: 0x7FFF16460000
SHA: 0D2FF4781343BD06D9DF0862195DD9C3EFBA01C16D86978CFCBD9586D8A36A688132EA6E8037E89E57CBEE6BCDD9D7D0BA315361D7F9FE156C1684C9FC455848
Version: v10.0.22621.1
dinput8.dll
Address: 0x7FFE8D2C0000
SHA: B1F50A3AC4833CE262CEAE40E29F6D02CBD4519A0542522FEB66F3972ED13D0FE146332D3F411D125D21E90601B01E9575A5B25CB2D7ECF570ACFDDBA34DE863
Version: v10.0.22621.1
directxdatabasehelper.dll
Address: 0x7FFF14B40000
SHA: 910265FCD602DA066118142D23D26573EEE60C2E1FCF1F2F23563F10E254AF930AAFBEFDAEB718F23A83EA12CEDB4A0B6AEC298A8E4047F94326D28D2F7229B9
Version: v10.0.22621.4391
DNSAPI.dll
Address: 0x7FFF1A480000
SHA: 029E529C1A88B120B9B4C43AB8BDEEF40A3137E597DE594A31D4A30B94E0E2BE2549F62DFDE94263B4B68BDFB5C466010A387AB4BC662188ACE2D6A1D0E3D9E3
Version: v10.0.22621.1
DPAPI.DLL
Address: 0x7FFF1B690000
SHA: 2531BC636C0722966C94B8B9DD154800E16AA7C67C6256AA23794A437E215BE56DA3E6AAB61E156839AB4534A7CDFE1E2991934365F24E50FCCDBDCE2176CA90
Version: v10.0.22621.1
drvstore.dll
Address: 0x7FFF159F0000
SHA: 0409C32E38BFCA7ED379C94F5A687167B8B8EA4E542C23BBF286653FAE1A102F698A16ADA4DE5E625C4558384A6BD58543CB2609786FE3269686091771D552DB
Version: v10.0.22621.4391
DSOUND.DLL
Address: 0x7FFE812C0000
SHA: AAF8CA5B8C80EF990FBD1DC6A4FF41175A433B3A6547622EC1576B1689E7A322ECCB74E9F279DA61D035494DF3EEAC99BD64CED7CD45DBBFBF21EEFC84E97800
Version: v10.0.22621.1
dwmapi.dll
Address: 0x7FFF19160000
SHA: 344E3789ABFDA5418FF84052514E9D6FF0A4FA4A1C29EB078DE68FBCCA6407DDBA2A54FF5E34BEBCBBF1F635DD6298D9934845458ECB48B156C38AA00304FE3D
Version: v10.0.22621.4599
dxcore.dll
Address: 0x7FFF18F10000
SHA: D6AE096036B9F39D0CEEB56327EF27763B61EC749F0A42D79DE45CA70FF101B55710B83D9BF21D22B7CE43C12CD21FD91ECE6A613A6356969174C496EBFF2B25
Version: v10.0.22621.4391
dxgi.dll
Address: 0x7FFF18F50000
SHA: E751C589041D20B47519DE74331EC89F73F5FFDD0B67248B139503B292633B0689F4A8306244206AC7597F3A371C4B354758929216408A0FB5C8DEA81AB8B47D
Version: v10.0.22621.4036
fastprox.dll
Address: 0x7FFF0C140000
SHA: 8FBD098A5918015C6A3E6AEDE0F954CBABAC980177346D6FF2565F53F28B14F2A1A3377FCA2272740E36DF8691D16D44627C585E0950080E7CE089330543C35E
Version: v10.0.22621.4391
ffbroker.dll
Address: 0x7FFEF5AF0000
SHA: 3F7F1A7BD8BAAF7703FCF8BA6ED7DD1452EDC89C95848E661E92CFA61E488DC68DE1FD4E15841948303B6E6DAB20C12B45D64E946943E81496A1E55752C66FB8
Version: v10.0.22621.1
fwpuclnt.dll
Address: 0x7FFF15520000
SHA: 0D480CDC9B320B701B17E23127A016957409F066E879D2BE31FBB2A0D610D66C4C066BF98375BB7E2BB01237104E61AC5991A6EFB7BFA326F8FE793DABEDC8CD
Version: v10.0.22621.2506
gameoverlayrenderer64.dll
Address: 0x7FFEF6460000
SHA: 2A7528D1E0792BEA5731A07355A1D3991057085536106C68D96FC9D1B41313FB63C4EE2D85029B55299B4C19FB5D9091F78CFC8BFAB0DCD15BD82090BBEFD40C
Version: v9.33.91.58
GDI32.dll
Address: 0x7FFF1C880000
SHA: 64ACC27DFD47368408BC8FC683F66BD9DAD59C7FC79971F515C501465646C4370B792F0696B97493267FA7F85F7BE29F5B67E77BB4BAF5A5F4D67BC3934A125C
Version: v10.0.22621.4036
gdi32full.dll
Address: 0x7FFF1BD10000
SHA: D1753D5FD3AD805DE7B9A9B271BCBF01E26B7706C403C3447B49CF6969FF642FCC489DBC74AB7806D99BA43A53AE1A76034EFFF4E99B091F5BA5908E7A2AA743
Version: v10.0.22621.4391
gpapi.dll
Address: 0x7FFF1AF00000
SHA: 93C9C09EE978C2AFE25B4397B2D73DBCCF8039BD46D158C493629D912E6FBFFF0C7DC2E44C144FB9157EFE7A6B3BD1BAC17B0373755995677C184429A2850D06
Version: v10.0.22621.4599
HID.DLL
Address: 0x7FFF1A140000
SHA: 9E10C2F2137EC58F25E645B4DE81AF9E271D541ABD8DEFCFA6189D02609E0B4BA97544E3FF2917116735840E4A9F35F5C6ED70B9B0042C2FF991BC2171B91D99
Version: v10.0.22621.4599
iertutil.dll
Address: 0x7FFF03F00000
SHA: 41970D42E35B30ACF09F0D66AF08469342CB70CFD9D1B17AA27DEF395925D5D8EFE361E292A950A1F1EEC1927214D58729F6F2788AD83481CFAA1330F64F4A11
Version: v11.0.22621.4599
imagehlp.dll
Address: 0x7FFF1D4E0000
SHA: F85AFA9E507F82C34E27325C85238102C0DF17B255D95F4A7B3FE6257C4B2BF3647C74950C9C87D446EFEAAF2200230D980DAD98D9FB3501FC07F3C0469F4874
Version: v10.0.22621.1
IMM32.dll
Address: 0x7FFF1D9D0000
SHA: F247393C1AE1D0A0BF01571B26C743A9444F44B0E71C1327447AAF808F8FD0AD3A108708021D0E11AF9E0623D8DF9A5C2C814CBC0E700F6F7504D4D151138D0B
Version: v10.0.22621.3374
inputhost.dll
Address: 0x7FFF03460000
SHA: 7EEEB46B293424AC0B5FBCEEA309952E5DEA74FE6A15F8AA0014FB5CC637954FC4B8B9CCC5EAE6FECAEE1F11DA267A2197469B4AD4082D76624A519886E5FC31
Version: v10.0.22621.4391
IPHLPAPI.DLL
Address: 0x7FFF1A410000
SHA: F65711439F5C50CD79295CB987757CA203C8AD418A807D5C0BC912E6D62133E89EB3725DF10998D8FE0589A5C9FF8A6E5303029BE0BA6C5935A1ED8C6C1D0E15
Version: v10.0.22621.1
kernel.appcore.dll
Address: 0x7FFF1AA20000
SHA: 64397B1FD0344BE78054711E72DD954503A0E4E3E123C13FD3E5CBB0ABC8779673A3D4A08AEBCDAA7A024AA15DA0BCB38C9A20E3353BBAF2FE4002E20413E58A
Version: v10.0.22621.3958
KERNEL32.DLL
Address: 0x7FFF1CBD0000
SHA: 3FB6807C1092F412042FD50ED8244B7F31C142BB58F17CD9E8673B5759A9027684F40A68EE236395BB93376DE9D94690ADDD344692CA5F8F0200B535BF0EAB3D
Version: v10.0.22621.4391
KERNELBASE.dll
Address: 0x7FFF1BE30000
SHA: 579AA2199D4C6E158C23AAF92A254046C13FDBAE88A30FC22DF6AB716FB55F71C88A1FE74B75B00FD47547AB42AEFB202B6AA826D32AFA1388D08A24CB9B2924
Version: v10.0.22621.4391
libxess.dll
Address: 0x7FFE891E0000
SHA: FF63203BC0DF4975771A13622CB88617D0B90EDA81BC22A1BB21BDEF5E60DE89A959766ADAE453D447449993847BCA211E9FDF32F068F5D4DCD3C1786310833E
Version: v1.2.0.13
Luma.dll
Address: 0x7FFE8D6E0000
SHA: E53D4484C56E120351F2063DD1126393457DB905DC8C91C81989BEDD38875751EF4F3F7F660C9B23BC5E58272204D841A021B181EEB1E7F0E0E87FF50770F927
Version: v2.0.0
MMDevApi.dll
Address: 0x7FFF15080000
SHA: 025B359050759834C4AB27336D08A5B9EE0B5049DBDC6E918A500548F074A839AE67264A1F67E1C9819A4F42B2F71E65F8D52092FB5DF7F75DE8B862FA9E40D6
Version: v10.0.22621.1
MpOav.dll
Address: 0x7FFF04F80000
SHA: D0812B9F0045A79DA8ED1B72E9884211CF0920950248B7D0458F7E815E9C9EE3A6F60FB530CE91745A1AF718ABC1B9F24235FE615E534B9BD8A2F974BC0AA100
Version: v4.18.24090.11
msasn1.dll
Address: 0x7FFF1B5D0000
SHA: 8BC051B2C0A9D7ACF7199786F7D7B8F9AD844FBFEAE975EC37446EB39626C9092C149F292FB8F0F8F1383F97E66D7A6E729295AFA2DA5601E32488FF500B6FB1
Version: v10.0.22621.2506
MSCTF.dll
Address: 0x7FFF1CE60000
SHA: 05160AA9E762B48813AFDDA9DB404B82E09CA06A2C652A81F22BEE17C93B640425DC4456536346CB9B49702C0486FBFF018C99C69F23569BC99CA2C9C69210BA
Version: v10.0.22621.4599
msdmo.dll
Address: 0x7FFEF6450000
SHA: F84E214D0AB3CE95B79C8FF0BB0F76A23F616437F593D885DDEA40AF6F6239E7B5DFC67D96626F2FC67959FD4C9E33606D65EA876FEB44131ABFBCCF1FA2A8BC
Version: v10.0.22621.1
MSVCP140.dll
Address: 0x7FFF0F030000
SHA: 6D53634BC51BD383358E0D55988D70AEE6ED3897BC6AE5E0D2413BED27ECFF4C8092020682CD089859023B02D9A1858AC42E64D59C38BA90FBAF89B656C539A6
Version: v14.40.33810
msvcp_win.dll
Address: 0x7FFF1C2B0000
SHA: 4646B1C9633FC03E5AB6CB90C977CC3D778E73D8ADE58D019C22CA11A3367B8FAA3A18A4E2F4738A75DF80A5A788F956A2A0C33DFD6B48272674D03899A9F5D2
Version: v10.0.22621.3374
msvcrt.dll
Address: 0x7FFF1C350000
SHA: 0AAA0877CBD1FF9CCDF5CE8466DBC968D17A306384DBF87F9BD2281B585149B0821B67B8CFCDDFB8BA2C4E6B78C5B7C163B31A284DFB90CF4D027D1BBF4BAFBF
Version: v7.0.22621.2506
MSWSOCK.dll
Address: 0x7FFF1AE90000
SHA: 4854DB2070AA5DECAFF796C2049B2BB725BD4DB63DC6A25FF24B89AB725DD2FC251C0C9D24B75363906101DDC2981AB791467A17465337544F1D7FC1D5A94E22
Version: v10.0.22621.1
napinsp.dll
Address: 0x7FFF0ECD0000
SHA: 2E4AED6935FB2A52A6793523A91305CCE4B9F40C2DB9A0F82765BF3D36DF1B2D9CBBF4BFCED5537F4C93052241D154FA0940441F680E7F374273F0D0B47CC5A6
Version: v10.0.22621.1
ncrypt.dll
Address: 0x7FFF1B2D0000
SHA: 6D15C8C7A630C500D77C6D01396C7128250262C2F5946232E95DF9DD981BCE92F909943EEC09C1A69C2C41685C4933562E8BB859654FC7777585CA7C3C9A0DAD
Version: v10.0.22621.1
ncryptsslp.dll
Address: 0x7FFF0D890000
SHA: 71CCF5B407BB5D5EE27A0D13912B39883BB1943629296621D0BA34AE8B9C82A41BD812F18560B2908B0AE4C1E209071D761D6B8C191C10976FB43CCAD811038F
Version: v10.0.22621.2506
netprofm.dll
Address: 0x7FFF189F0000
SHA: DD71992A74E449B170EC3F0F43845BCE893F2AA98F249F0D1CE5A94941B1BA6E0AB630E23CE34520165868688050EA62A88D653AF380D6AB2E11C66C6779FADA
Version: v10.0.22621.1
netutils.dll
Address: 0x7FFF1A400000
SHA: 5AA288FCFBECD42FAFCB4A487B6BD5DBAECF9DA2E40D822F8158FDD5BDA1E6DC6B823981C0FD612809C883A244AE6E921F06C51F800F1AE9560E80FEBBD8ACE4
Version: v10.0.22621.2506
nlansp_c.dll
Address: 0x7FFF0E4A0000
SHA: 6C6DF2219E77A29C59808FF1191543EA7C41861C9B01FDC106C1391EBD3BC897D8FD914BC461F1F5D68D74CDD644BB32F4FDBC2D3F115335AC739AE8923632AA
Version: v10.0.22621.4391
npmproxy.dll
Address: 0x7FFF15120000
SHA: 78E57333DB7E243F92B917E7135FE5960E91A1B678D8C5F9B655FB1D90DB8B7AABD751E2F0D753AB86C92929044CBE4DAC47DD3D38AEA3985FA9896D78F1795C
Version: v10.0.22621.3527
NSI.dll
Address: 0x7FFF1CE50000
SHA: F22EA147F31552A36EC647796129C17BE8F61BC2CD40FCFF05B77CB8749C142EE121C5E28ED5432EF235D509E53A3E738EE9CDBCB25D5987EE296EE0CB192059
Version: v10.0.22621.1
NTASN1.dll
Address: 0x7FFF1B290000
SHA: 203657805FBB142F95915CE0032A3518A165D384E472C6BBD9B97921146E48386A1DF75F9025A77ACC79D06AEEDAEEAC39643B859FE763964315FD97F6FCE874
Version: v10.0.22621.1
ntdll.dll
Address: 0x7FFF1E630000
SHA: 751D2B693BCC1FDF883717DB4D8220EA4992D3E345D409A8A7FD8594E870C296AD5A652C465C836631F0F02EFC7DA1797D7ADF2589625A7015F8A55A13EACF68
Version: v10.0.22621.4249
ntmarta.dll
Address: 0x7FFF1AB30000
SHA: C086490EE7AD1B25884378823E54315D3ADAF9E7EAF0966F4C1407C4D54C2D98486E2034EC6323DC76204058E3D079D69EE518F0946A7893C1C38FF212238BFC
Version: v10.0.22621.1
nvapi64.dll
Address: 0x7FFF10E50000
SHA: 91F76C7F014B45A0D21C8D93AF67242E07195965CEC23A20E025BFC1C9D89D76A2E2397277FAF3FA5788376A351C36292092BD44298BAAEE137DB4C41042BE67
Version: v32.0.15.6109
nvcuda.dll
Address: 0x7FFE829C0000
SHA: C3E8CCAE8F2E93E35A745E3923A3C24B813577CEF407B2053C5AC957326B3F3221D463E4EFC609577BBF6E6D61DCA6A6FED400331764BB7774AD86129E0F8CB5
Version: v32.0.15.6109
nvcuda64.dll
Address: 0x7FFE81F70000
SHA: C25019AD9AC09D9CCD12512F3EB8DA038EF7CB3ECF565A6330D0066B4433584D7772608C4D2EABE5C1B2A0DF347A23E55B9015CBAF45E4CF7A829E447766B1EB
Version: v32.0.15.6109
nvdxgdmal64.dll
Address: 0x7FFE81ED0000
SHA: A6A8178B5C9FFCC5D68212452ED2D403174F53EEF9518A931B1FB598C027C706653CB0D6DC319D281C3EFEFC50E2F741169CD7B6B8FC14B3AD3A903A09C59EA6
nvgpucomp64.dll
Address: 0x7FFF094B0000
SHA: E98B44933625718C0B1FD32C8598E273E9958DFC8AEF6181886EC201AF2D07EC3DF2B3B7AD179837E48F8EBF72830C720F40E71CE0CA11F33F6F2166DC5ACA50
Version: v32.0.15.6109
nvldumdx.dll
Address: 0x7FFF102B0000
SHA: E21CD0516020BDFF96281C64442145D6E85F9E8BECB52164683490E06DBE44AF4025D71917D97705CD62E8E428E42B054BDB58A950EF3B8C91A46FBFA0732D3F
Version: v32.0.15.6109
NvMessageBus.dll
Address: 0x7FFF0F9E0000
SHA: 2CEAE3ED83584AF8ED8379CCEA96FF892130DF8552D466C48A7438937E5FCBEC052731EB73D44BE831941BC905A93304744FDC755F3B71D5C4A8780F3494B5F8
nvngx_dlss.dll
Address: 0x7FFE83B00000
SHA: 56037EF9ACEA29A074CFBD63D2F4B15325864DAC8F871EDED336D8EE50A4EDE7652212090009420A1A8E2EE4541DB238E17586DD0246FEE3F6A935B140B68BD7
Version: v3.5.0
nvngx_dlssg.dll
Address: 0x7FFE82ED0000
SHA: E7E49E838D14190D80B748ECD6168F58C64421B50EFFA9F930C08F28BF24ADD8D88226E0268B63DB61B80385052BA991AB24626F517F96C99B6B8B8670319751
Version: v3.5.0
nvppex.dll
Address: 0x7FFEBD6C0000
SHA: 47FB5FB8253EF1B99D3B2D2AE2F757FFFD3C8BE88D18CAB038E088B1647707A1B7F84D1AA8B695841E36E66E759CE5985A6AA484D8F10CE885A8373981FFD6DE
Version: v32.0.15.6109
nvwgf2umx.dll
Address: 0x01D013F60000
SHA: 26610C2FF62BB713FC3A9F17C7F46E4A40302587C74915A31AFF44740E921FB6F27CA8F36309EEBF8ADE9C3C2AD13E610CBD816D236D97756396FBAEE12590A5
Version: v32.0.15.6109
ole32.dll
Address: 0x7FFF1D560000
SHA: 4F68EAA30EDE930DB6AEB04D3CA83F8546C48828A36B04A4D2108F2492D9DC3A2230FCE1DC9B7D9E95EDAD39C8B859CAF5D35CCC7F333392E2C25041C91EB1A8
Version: v10.0.22621.1
OLEAUT32.dll
Address: 0x7FFF1D070000
SHA: 4E49E803897B110DA04A97275B68A863350C2E6FC2D1242E3AC1856DCA9428C29C1C20A4FC14DDF9880592279DB81E57C376BCD8CA3E13E52871527DEA157861
Version: v10.0.22621.3672
ondemandconnroutehelper.dll
Address: 0x7FFF0DE80000
SHA: 573325EE426F6172427556AEA69C30046655BF34734E6BF74F58A0A6A4223A9AAC647465B1CCD8005246859E1D8CBF8C02DF24D665FEBE6E59B8DF2D20C075B6
Version: v10.0.22621.3527
PhotoMetadataHandler.dll
Address: 0x7FFEF5F50000
SHA: 40794D8434D33F6F11DD50B9719125FD7080AABEE3451B2C5443BFB61CD942DD1CBF3F49E91F9B517539D45DF0AC8043E1C08AD13BCA1B7D286EC2EC6F741652
Version: v10.0.22621.4391
pnrpnsp.dll
Address: 0x7FFF0EC50000
SHA: 472C3B112C7B70C694801C9FD4CF8493E3205C06682C58B21F06F8A79B4D4DBCA7697B81A1CDCC9088F533B18599D54C5D898FC04ABD8CFC5C69FCD36739AB74
Version: v10.0.22621.1
POWRPROF.dll
Address: 0x7FFF1A780000
SHA: 624CB3D2CCAF9CF7C94AB9B1A5A2AD139E082D0ABDD836CA2A0F92C98B9D87A1EF394FFA1818393B73C90ECADD1FD9F1089DF158859BD005856FBDEB5EEB8B61
Version: v10.0.22621.4599
profapi.dll
Address: 0x7FFF1B860000
SHA: 5E525BFE767D8347244385A3E9B91C2EF26E1AB86593608F5D4F5EAE7C87A3A4C0A915BB2D3F686B66508B24DA273CCFCF5308A780294E3FC00FD66A0D7C3E10
Version: v10.0.22621.4391
PROPSYS.dll
Address: 0x7FFF15DA0000
SHA: 4EDC62C0B03AF4873AB0293ED4C9A1F377FCB28AEBA6FFBE35E82DD84FA5CEF75FF7CACF743510D2898159FD866B09D728905D5E80EF33BC5D56029EE18C0C19
Version: v7.0.22621.4599
PSAPI.DLL
Address: 0x7FFF1E410000
SHA: E9F89DE9A1AB74BB4358FB636C389356554C84AF4128BC5834681BBFD897D69B12FE5B1521F3846D65726D4E1C62DD87EBEB7DDD3BB1FA940150F9B5AF19FB17
Version: v10.0.22621.1
rasadhlp.dll
Address: 0x7FFF0BFC0000
SHA: E1E34DF6475CA787D2340A340659854D2144D72BE0856C3262E98E170843E7C26874544ACFA5D186623C1C8DEC70232FC73033416F3E2A9A4076EF0820356681
Version: v10.0.22621.1
RealTimeFormPatcher.dll
Address: 0x7FFE8D4F0000
SHA: 4D3D13898E2A3172B001BA5F1EB483C84E18FF65BFDA608BAEC676CB13AD33CBA914267CC01FBB2AC219BB269A6BBF90BCB1D658EAB97FBAD46ACA8A43805C5F
Version: v1.0.0
ResampleDmo.DLL
Address: 0x7FFE81200000
SHA: C6F24BA3BCD0FBE293293BE4166F18CBE9EE1F97CCAF5DBAD7B758D0B7C15FDE1E26155E07A077324B3D06B483337CADC8D2A10A4ACE00ECA69881608D770046
Version: v10.0.22621.2506
resourcepolicyclient.dll
Address: 0x7FFF192D0000
SHA: 8A7DF98B158FC4E2C52954171182AF32D4867B7AE8FE249D016C4F673A429A526207B77F41AE396B2440402565E77F51BFBFD1ABACD404A89F39C93921DFDDB8
Version: v10.0.22621.3527
RPCRT4.dll
Address: 0x7FFF1C990000
SHA: A896819F1E5AF2DDED42780C1D372900907D20F7619AE60E35DCF3C7284761CED4DEB3F8D844B7DA445F5C0D211879573981AAA6108D44946F52585D9972AB96
Version: v10.0.22621.2506
rsaenh.dll
Address: 0x7FFF1A980000
SHA: 9F2883635FDE2CF2C616AC7F9E22B574967397403F8E481D82573298DA36C869939D885A34A1192415B4D94E9886072AC8724D07D3782C962F3076944B1C60AD
Version: v10.0.22621.1
schannel.DLL
Address: 0x7FFF1A870000
SHA: 62D54ED0940DADDE58945B3DBB2CEC50B05334A9C14FA9FDE363EBF6ED6323186E0364DD32110F8A647A48595B0D3FF4EAC4D03DDB3D7C8A439254FE65554114
Version: v10.0.22621.1
sechost.dll
Address: 0x7FFF1CFC0000
SHA: EE22C8D249B17AB34616A425D5DB6A2F5319C6542D26A4AB6C18F5219C4C5275876C86BC92ABFAEDA519E26FDA077BDE275D1833938E9F9EC5F85A4A23F1B841
Version: v10.0.22621.1
Secur32.dll
Address: 0x7FFF1A7F0000
SHA: E296A462AFD8980A9497EF9E1D3EC4F81285D450BF8A8BCC3AC056A39F85B0E12F59653688EBE60E302FA5B8819F4ABACE722C791954D3EA81D85182E85264CA
Version: v10.0.22621.1
SETUPAPI.dll
Address: 0x7FFF1C400000
SHA: 4C618C9C7E16D701A03B901AF668E5927E8BAC2CD160D1D072EFCD2EB9DB62ABAA1422A57B19F9896A2E6CD8D64DC8A80BD1FC54302447601CBF94D977C62CCA
Version: v10.0.22621.4599
sfee.dll
Address: 0x7FFE8D400000
SHA: 918AA79F05CA94B6137C04FF86EFB86A62DD2E65C7E6A55C24F9F4B8101FD72AC8530A9F73BB32DB367E23C9AC33B611775C334D8051637446478FB0248356BC
Version: v1.1.0.17
sfse_1_14_70.dll
Address: 0x7FFE89010000
SHA: CF8CF98634EF56D0BF4D3CBB4AEF21830FA1C8556524DA89AE3C67C1386CA5CE5D031046D0E2E66D8C01E0B666761E27C4476C2CE9C43BD61D4C1C72088164D9
Version: v0.0.2.13
SFShaderInjector.dll
Address: 0x7FFE8D9C0000
SHA: C410B4143583CBBEDAF538BFF4C06F61E8CD43634AD8E30925630C2C39CB04D2ECE4F4D151D2BD3AE54D8B62DF603AD3CCA6C4AF4FC92B3C62C05F4F73E86A11
SHCORE.dll
Address: 0x7FFF1D710000
SHA: C87DB1D6A65E53D39636E7364B294FA45329904274964070ECC17BADB99CB902C9490FFF7F24630C3CD22DE32902C7E19C9AA165F089E9E6D8D5F2A9785AB4B7
Version: v10.0.22621.4599
SHELL32.dll
Address: 0x7FFF1DA90000
SHA: 251A618BDF5A1B5AF56784D28434409D788FE4FD1A9DFC72521D88CA27A7BBD2526266FF91C24CFFE206142B65444B6D6C0D4597351007ADE68669A6A5F8E6E1
Version: v10.0.22621.4599
SHLWAPI.dll
Address: 0x7FFF1CB60000
SHA: 8ACA03769C06CFC295F41CF3B09E2F8DD0114DF48D326E0550ED8AE7B44B76594B8678F0608CBD402E75072C266350D55450052E4ED4160532F4A79B5257D96D
Version: v10.0.22621.4599
sl.common.dll
Address: 0x7FFE8D350000
SHA: 843457A2F9F0BA83B6C2FEA37FB05F1C52F715C2046232C904DF79B1ED30F3725B967163EBFE5B3F01DAABBD9CAC27799C80DBF8269211F5319FD62F3EEF7B3E
Version: v2.2.0
sl.dlss.dll
Address: 0x7FFE8D310000
SHA: 54B6D2F71B8D16114AE1A576A37E64683BA91CD8BB8AA379706D5AE21DF4571B6B4126F1085E6E5A2448D7E8B169539642AD5D7A31012C4FDEB9AC38B62ED7B8
Version: v2.2.0
sl.interposer.dll
Address: 0x7FFE890C0000
SHA: 4197A38D36FE41A21B11814B00F17F5BF2AE7F418DC5CCB94A6C097615B87B9C5B530DFA0296CA0580BB5618D0AB43AC02C2E1FC08E07D55B5E8BBFF8DA7160A
Version: v2.2.0
sl.reflex.dll
Address: 0x7FFE82990000
SHA: C5DF9877DEDFCC443ECAD9A8EA0F10C5DC8C97C4F6F10A1BEA1831AF6EB27D89C695F67B55E451603A6550EBA084E0CD7B676FE8C56E302324025D9A97ED7FC5
Version: v2.2.0
SPINF.dll
Address: 0x7FFF031C0000
SHA: 675E09DAA5DA999ABD859B10A3FDA32D33F74B61BBDDF49BC88CB35B365D535459BF170A2E8ABBA503B00AAA1F2849D1F7D242D2F7F4A13E665E44C807678185
Version: v10.0.22621.1
srvcli.dll
Address: 0x7FFF041C0000
SHA: 8F2FCB418CC0484BD092BB500B36AC2F0AA6435E1F1693C13C44A24E54A1C9F53B4728EFC6E6339F26BE3F781995379A178461C52107B2A1336C74DC9D69F512
Version: v10.0.22621.4249
SSPICLI.DLL
Address: 0x7FFF1AC80000
SHA: EF56182FD07DDA26E24F26A8D132C8698E5D72FCEA33C55A6A06005BF4D08F8B61A7686F4AAAE94683C2F39B0276D77DC23C7F66436CAA48A573FE673CFB2E13
Version: v10.0.22621.3810
Starfield.exe
Address: 0x7FF7721E0000
SHA: D57F668CC22FC5BD71BC9F586DAB47717799A14BDC6CABE4765F831B8C5C807C208289F946907E5AB8431024B3A8A4626369B86D1CEE9AFA932BD70D266C9192
Version: v1.14.70
StarfieldEngineFixes.dll
Address: 0x01C407BA0000
SHA: 3DCB8F390899A9B83AEE0577E74A5F90D3D7857898BCBA9F70F60DAABB5ACCD74A06C891AAC722F11059F648B9130FD8F38DFE40F89A7B877BA1FD7EDDFBB757
Version: v5.9.0
steam_api64.dll
Address: 0x7FFE89140000
SHA: C08DE8C6E331D13DFE868AB340E41552FC49123A9F782A5A63B95795D5D979E68B5A6AB171153978679C0791DC3E3809C883471A05864041CE60B240CCDD4C21
Version: v7.40.51.27
steamclient64.dll
Address: 0x7FFE87950000
SHA: 3F353A5205AABD74123AC68E27454838EB07E369DFF588B0C4F892AB66795FF82CFAEB144115BB86C3F3ECDB18782A6B511A33C9502C8153B143E3940DF77FEF
Version: v9.33.91.58
textinputframework.dll
Address: 0x7FFF0B6C0000
SHA: B31089CA2460C790B1798703B63283C8BEA493E3F9B59B175A010A86D377994E5B5451B40F098D25EACF0F1D7A9588A0F2AB5692CC9295A559C4C559E585CD19
Version: v10.0.22621.4391
tier0_s64.dll
Address: 0x7FFE877B0000
SHA: 4A2FC8262DBC2C79880E6CFD4D02FBFD39682027BF23D41DA2E35B2C549BB102E5178D8CCEFA8BDDF78EDBA8D2ADA122ED18F5E96539433A3DCF97B9DEBF4874
Version: v9.33.91.58
trainwreck.dll
Address: 0x7FFE8D8B0000
SHA: 261801A85D41236E35C820A78E4BC3E775EBF0C19336EF1D518A61DA20429BB30B707181606675C1BC650D678CA0A27DC585DFA35BDDD717EB830459BFF60333
Version: v1.4.0
twinapi.appcore.dll
Address: 0x7FFF109B0000
SHA: 505B1E76CA814583BE926F9051F46282B66FCE9F0551D364A7EE3C13E4D7F88CC6565CC38AF3EC5F618B86804BDFAB5D87608248C2DD047C454519C7DF4609C3
Version: v10.0.22621.1
ucrtbase.dll
Address: 0x7FFF1BBF0000
SHA: 7F0563E814CC4AAF292683403888340BB5D95E6A7BDD35D81EEBBD10BFB8E4E5130D0A626B8FB07FF3CAFAAE4A2698CF7103AABCAE74E5D13449DB482EC49BC9
Version: v10.0.22621.3593
UMPDC.dll
Address: 0x7FFF1A760000
SHA: 8981D794A568A6674E504AAAC4FD9C6CC9A04DA5AA7A870E4107D2E157786D6BA51C48C4E177B31C09068D03F28715DE27790EB0DACBA2F3297B7AF3A8A1BF97
Version: v10.0.22621.1
urlmon.dll
Address: 0x7FFF05040000
SHA: 02445BD02531502E30C3FD61BA2B16718D0888050E145C0D020924B90A9DC30B6CC03AFE377669A2ACBE44B1609074A6A0DCF1FA3E48A6F4D1A47552A6166462
Version: v11.0.22621.4599
user32.dll
Address: 0x7FFF1CCA0000
SHA: 25E71575EE47F7D6676FF51136887296096CC0601BB78323124ED2394180550BBCC6625534F8DA30E6C4BE9D319FFAD4AD6D5FF3D347E44FA3766B9053F1796D
Version: v10.0.22621.4599
USERENV.dll
Address: 0x7FFF1AF30000
SHA: BCDBC3F7B06797315E0DDD55EC0E3F39732391C0100D5260D409C8E78379658096D20476C493D67ED4FA2CA2DD51787C1DADDEA228D2E22077DB3D46E25EA11F
Version: v10.0.22621.1
usermgrproxy.dll
Address: 0x7FFF03730000
SHA: ED03B9382036CD329195C938B66A2242859AC28187277C4ADE7D850C161B6C78C53837BC059C9D7855F2A5C6D8931900A0C41D70492E6B4E779532C423AE420A
Version: v10.0.22621.3672
usvfs_x64.dll
Address: 0x7FFEEF6C0000
SHA: 34E9203FC1DD71C561682D53B4C041BB08B11F74A985075D773872D8F93CC7D26BF4C110A286CE66956B656B75950C83673A2D18735479C2F99C512CF2567BF9
uxtheme.dll
Address: 0x7FFF18DF0000
SHA: 2F15DFD2AB9E9E89C16AAA43F7A3C89D22DE940E20D5328B8BD4C31DED2A5E82C5CA898706D09C5F7A0CBF980C205E6C7D2D88BA5148E63CC24CB7003087ADE5
Version: v10.0.22621.4599
VCRUNTIME140.dll
Address: 0x7FFF17C50000
SHA: 32AC84642A9656609C45A6B649B222829BE572B5FDEB6D5D93ACEA203E02816CF6C06063334470E8106871BDC9F2F3C7F0D1D3E554DA1832BA1490F644E18362
Version: v14.40.33810
VCRUNTIME140_1.dll
Address: 0x7FFF164A0000
SHA: ABBD3EB628D5B7809F49AE08E2436AF3D1B69F8A38DE71EDE3D0CB6E771C7758E35986A0DC0743B763AD91FD8190084EE5A5FBE1AC6159EB03690CCC14C64542
Version: v14.40.33810
VERSION.dll
Address: 0x7FFF168E0000
SHA: FDB97254817D6793A4C5854A4CFA53DDED1B25E578167C2AB9A8EEC67396F4CBC825ACBF61D915B57998C415F9A00F1AE2C40536C53EA45D4037B64F3E1343D7
Version: v10.0.22621.1
vstdlib_s64.dll
Address: 0x7FFE876F0000
SHA: F7374822766DFBB1F5EF6A57CC824BCBC99908A87709083A611FA63E6E19A298C1F338A737A6EA953E35D2952C7174CEC282470C9DE062742225CC8068BF9D1F
Version: v9.33.91.58
vulkan-1.dll
Address: 0x7FFE82D60000
SHA: 36DE849942D9F998F691DD0A7D2C0912064E9727234A1DAB81DD0FD05C110BBC8BDC80A0B1AAC9B6CF4BF0DA22768E38AEAD25532A60879F36ADC06291EFFA76
Version: v1.3.280
wbemcomn.dll
Address: 0x7FFF10230000
SHA: 2FF9B8EC7D0F3A167084E4AE0FCC936008BD7D6690B59F601D75E5C328ADDDC67496461A53F8B4BDA755CAEFEAA77E4038AF7CF93DA135590C6C37A9F52DD055
Version: v10.0.22621.2506
wbemprox.dll
Address: 0x7FFF14F50000
SHA: 0EF373EAF240CE872BEF5FF7BF88C3199AD92DF701DD8CAB3E6E8C6480A22CC9FD522E487AA651F45D714C48B1E54608AE143ECF356801D50F4F264D404F1B36
Version: v10.0.22621.3672
wbemsvc.dll
Address: 0x7FFF0BF80000
SHA: C0C9CD1006C4FA0C62EC0845D84438E5B1D1D82B3A2DC99CB3858375E4C2380F6A3B78F852CCD811F1A50A2EB28E4FE3FAB0F0C5342A9470E8B61DD589271611
Version: v10.0.22621.3672
webio.dll
Address: 0x7FFF08B40000
SHA: 144C8BE53207D27F4506603D319F50276C92BC00DED0307B76C63AFDDAFB130F0D5C8C68801F487752F667FB604FBC71A7BEC244CEE4FA69BEA518A1A0E8AC5A
Version: v10.0.22621.1
win32u.dll
Address: 0x7FFF1B9B0000
SHA: FE3902E9F2541FBE428F7924047B21BA817D7D77169BFD596AA26294AFB5B8AC3B4B5BA144BAC83D46A5D3873483194698BFE935DDB6AD0A6CC85CB64A50D633
Version: v10.0.22621.4460
Windows.Gaming.Input.dll
Address: 0x7FFF10CE0000
SHA: 7D3DB945ADF8E0BC825BDA2AD7C540ECE7CD8948BB9FA48A10913BD46A252D73CE5C3DAF6998700261769E2E2ADA346911F5A2E67CC9849CCA2BF2D57BA6E2BC
Version: v10.0.22621.1
windows.storage.dll
Address: 0x7FFF19830000
SHA: 8E3972596DEFB36382EF34CBDC7024C23D2D9F9633ED7749EDDA09E958723266B894DAC879C2AFE4D0D452CBDA125B7F18DC0D71973B067F0AE1A0E20E2196B0
Version: v10.0.22621.4599
Windows.System.UserDeviceAssociation.dll
Address: 0x7FFF18560000
SHA: F398AB9539C00134837E42B7958D76E639B8438F91E3E3D84CA125DF02F6F8E11BC6A545179D31BD1E76EB70FACE6450808A7CE0C6CAA7978419A0E6268F5B97
Version: v10.0.22621.3527
Windows.UI.dll
Address: 0x7FFF0E9F0000
SHA: 2D725E97C7C2EC316DBD550692D95F875D8A3D38C5D4FD937A495AD1CF717F6C7B77D1858F7ACDAB665970C1518EE015AEF090E52F67E18DE6957D84F1F3EB5B
Version: v10.0.22621.1
windowscodecs.dll
Address: 0x7FFF18B80000
SHA: 5578B6ACDEFF911CDE8719BA1805DCA5D92CDCE56C004B88CE1B02D427CD1BDEDCA1BC68CD93F628A971D5D1331D0E43AA2E1B19451B427AE0D27371CB61967D
Version: v10.0.22621.4455
WINHTTP.dll
Address: 0x7FFF166D0000
SHA: 40B075A4F996750DCD6A11ECCF6A4C8312BC271F0129D5E78860BD7653789906ACD827648D78D1560D2059EB4C1DB659218F2DE4682C625F709FC8BC49F1D6D7
Version: v10.0.22621.1
WININET.dll
Address: 0x7FFF05270000
SHA: A3B8C6CD911961B0802E977C6C8E1A8E47246AA9D9E82B7597B40B57FBCA6CBC28E55B797AB0123E5B47347A5A8BF0B0F31D701FEAF05C098AF1704977BB0339
Version: v11.0.22621.4599
WINMM.dll
Address: 0x7FFF14270000
SHA: A07DC1B42FEECDB2A19D1B38009920FE48AF057E0DA20E16A9B699973EEF4D8E01F8ED1334152BF250237FF5F9B3488D910ED3C4D914B403CF70D054519DE124
Version: v10.0.22621.1
winmmbase.dll
Address: 0x7FFF05010000
SHA: 9AA1B67EE51054D7CB09B3F574BC50CF072E3559D0779C894C55253E16E16AB4966D46BA5F2B3297F8693B308511D41F11A867BE5178C03269E74DF6ACFA3215
Version: v10.0.22621.1
WINNSI.DLL
Address: 0x7FFF18DB0000
SHA: B4032A92D43AFEDF8C97B29519366DC0046BD804359BE616C4B844903F67A0D11C0DA42970FCE7D35772AFAEE5AFA8251EBBA5C2BEB0B9ABCED405927CB53775
Version: v10.0.22621.1
winrnr.dll
Address: 0x7FFF0E4F0000
SHA: 9418D0135EC807E73EA6D33F2A149EF220A0104FBA1F6BF21C2D86498BFA4EA4D35E217C8F14868EBE4779BC6BD587543E8D9B846DA65766E5E0AF83B9FDC7EC
Version: v10.0.22621.1
wintrust.dll
Address: 0x7FFF1BB80000
SHA: B5E1D231DA2CC3FC2D931D78C2B6CFA493F101D5FEF3A43A491B9DFE5AA3694D163BB2D88442A2ECBB59FBDC3691E9331D38D620FC2C2A97FC581FC0C1C0E1D0
Version: v10.0.22621.4391
wintypes.dll
Address: 0x7FFF196F0000
SHA: 250140684EE603BE5B42BB7EAA35D38301D63F7C3DD86C54E0E2640DBF01083899CAF9FA823DA6E7963BE29C593E50623553F6D1D3FFE6F9F79B851E169335B6
Version: v10.0.22621.1
WLDAP32.dll
Address: 0x7FFF1E420000
SHA: E5E4D04E129A5B6D3CFA0DF9FAB766871C17BA365E9761CFC729E6B671339540535FA01E630408225FCA0CA64D6E1334B6E6A7D5A5696182DB9746788D2FCA34
Version: v10.0.22621.2506
wldp.dll
Address: 0x7FFF1B170000
SHA: C5E79AAC54B327CD708EC35C0F7EE69466DDE0C4411ABB56828698015F4516E1840E751E0498D7299886BB44DAEC87C3EF87AF89C75C0718FBFF2F997AB0FF8A
Version: v10.0.22621.2506
WS2_32.dll
Address: 0x7FFF1DA10000
SHA: 1319EA1AE10DC1BD0E378E611107071B5A11E51FCB1A2B3EE26CE69D648B334541F795F33ABB6F070D760FE60ADF7962CC6D7C902A37EA5C7797A8DE88270E4B
Version: v10.0.22621.1
wshbth.dll
Address: 0x7FFF0E4D0000
SHA: 1C367472454B9A1A644E6113850D158CDF95294DA9B4E66915A82012FDABD8EE58A46EE2E96B7100D6EFD8CD4A9C5DFF8A8699FCC7C3417B5E4429C47BB68A09
Version: v10.0.22621.3958
WSOCK32.dll
Address: 0x7FFEF0000000
SHA: D2DDA7DE4D1F4905614AF1244534D9A30407AAFE6DEC400053544050745494925352378ED44D4779268E5F0D502A04D08A02BD6D9BD44AB791F3E6A06BEB01A0
Version: v10.0.22621.1
XInput1_4.dll
Address: 0x7FFE8D2A0000
SHA: 4EEDFEA0C84997494227BDA221FA3605898D5453461A9C274C72F96C2890D6AA74A252BC498472D994C32C86BB68F254E92AB23DF5153377CC721028F517823E
Version: v10.0.22621.1
SCRIPT EXTENDER PLUGINS:
BakaDisableMyGames.dll v4.0.0
Luma.dll v2.0.0
RealTimeFormPatcher.dll v1.0.0
sfee.dll v1.1.0.17
sfse_1_14_70.dll v0.0.2.13
SFShaderInjector.dll
StarfieldEngineFixes.dll v5.9.0
trainwreck.dll v1.4.0
I'm still on the previous version of Starfield if that matters.