Advertisement
Guest User

2025-02-06-13-48-57.log

a guest
Feb 6th, 2025
16
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 83.77 KB | None | 0 0
  1. Starfield v1.14.74
  2. trainwreck v1.4.0
  3.  
  4. Unhandled exception "EXCEPTION_ACCESS_VIOLATION" at 0x7FF61F97AD72 Starfield.exe+126AD72
  5.  
  6. SYSTEM SPECS:
  7. OS: Microsoft Windows 11 Home 24H2 26100.3037
  8. CPU: AuthenticAMD AMD Ryzen 7 5800X3D 8-Core Processor
  9. GPU #1: AMD Radeon RX 7700 XT
  10. GPU #2: Microsoft Basic Render Driver
  11. RAM: 22.18 GiB/63.88 GiB
  12. PAGE FILE: 36.43 GiB/102.95 GiB
  13.  
  14. PROBABLE CALL STACK:
  15. [0 ] 0x7FF61F97AD72 Starfield.exe+126AD72
  16. lock xadd [rcx+0Ch],eax
  17. [1 ] 0x7FF621A334BD Starfield.exe+33234BD
  18. mov rax,rbx
  19. [2 ] 0x7FF621A55804 Starfield.exe+3345804
  20. mov rax,[rbp+0E0h]
  21. [3 ] 0x7FF621A58058 Starfield.exe+3348058
  22. mov rbx,[rsp+58h]
  23. [4 ] 0x7FF621A39E72 Starfield.exe+3329E72
  24. cmp esi,[rdi+1C30h]
  25. [5 ] 0x7FF621A3BF6C Starfield.exe+332BF6C
  26. mov rcx,rdi
  27. [6 ] 0x7FF621659D43 Starfield.exe+2F49D43
  28. test eax,eax
  29. [7 ] 0x7FF62165A02A Starfield.exe+2F4A02A
  30. mov rcx,r13
  31. [8 ] 0x7FF621A3BE07 Starfield.exe+332BE07
  32. add rsp,48h
  33. [9 ] 0x7FF621A3C3E7 Starfield.exe+332C3E7
  34. test r15,r15
  35. [10] 0x7FF621A37A06 Starfield.exe+3327A06
  36. nop
  37. [11] 0x7FF61FC188CE Starfield.exe+15088CE
  38. add rdi,8
  39. [12] 0x7FF620CE9518 Starfield.exe+25D9518
  40. add rbx,8
  41. [13] 0x7FF620CE33AE Starfield.exe+25D33AE
  42. call 0000000000B0DFFAh
  43. [14] 0x7FF620CEDB4C Starfield.exe+25DDB4C
  44. mov qword ptr [4472564h],20000h
  45. [15] 0x7FF621B66A9D Starfield.exe+3456A9D
  46. mov rdx,rbx
  47. [16] 0x7FF621B676F9 Starfield.exe+34576F9
  48. jmp short 0000000000000078h
  49. [17] 0x7FF621B65810 Starfield.exe+3455810
  50. mov ecx,[31C3464h]
  51. [18] 0x7FF621B67CAE Starfield.exe+3457CAE
  52. xor eax,eax
  53. [19] 0x7FF62165D411 Starfield.exe+2F4D411
  54. mov rcx,[3AFF2CFh]
  55. [20] 0x7FFF79CAE8D7 KERNEL32.DLL+002E8D7 BaseThreadInitThunk
  56. mov ecx,eax
  57. [21] 0x7FFF7AF5BF2C ntdll.dll+00BBF2C RtlUserThreadStart
  58. jmp short 000000000000002Ah
  59.  
  60. REGISTERS:
  61. RAX 0xFFFFF000 (size_t)
  62. RBX 0x7FF62726D440 (void* -> Starfield.exe+8B5D440)
  63. shr byte ptr [rdi+1Eh],49h
  64. RCX 0x32616243877998 (size_t)
  65. RDX 0x7FF62726D440 (void* -> Starfield.exe+8B5D440)
  66. shr byte ptr [rdi+1Eh],49h
  67. RSI 0x1 (size_t)
  68. RDI 0x243491E6FC0 (BSResource::`anonymous namespace'::LooseFileAsyncStream*)
  69. RBP 0x6FD72FE590 (void*)
  70. RSP 0x6FD72FE430 (void*)
  71. R8 0x243491E6FC0 (BSResource::`anonymous namespace'::LooseFileAsyncStream*)
  72. R9 0x6FD72FE4E8 (void*)
  73. R10 0x243491E6FD8 (void*)
  74. R11 0x6FD72FE310 (void*)
  75. R12 0x243491E6FC0 (BSResource::`anonymous namespace'::LooseFileAsyncStream*)
  76. R13 0x243491D1318 (char*) "unofficial starfield patch - Main.ba2"
  77. R14 0x24339A55C20 (BSResource::LooseFileLocation*)
  78. R15 0x14B4B (size_t)
  79.  
  80. STACK:
  81. [RSP+0 ] 0x6FD72FE4E0 (void*)
  82. [RSP+8 ] 0x24339A55C78 (char*) "DATA\\"
  83. [RSP+10 ] 0x24339A55C20 (BSResource::LooseFileLocation*)
  84. [RSP+18 ] 0x243491E6FC0 (BSResource::`anonymous namespace'::LooseFileAsyncStream*)
  85. [RSP+20 ] 0x1 (size_t)
  86. [RSP+28 ] 0x7FF621A334BD (void* -> Starfield.exe+33234BD)
  87. mov rax,rbx
  88. [RSP+30 ] 0x6FD72FE4E0 (void*)
  89. [RSP+38 ] 0x24339A55C20 (BSResource::LooseFileLocation*)
  90. [RSP+40 ] 0xA (size_t)
  91. [RSP+48 ] 0x6FD72FE590 (void*)
  92. [RSP+50 ] 0xA (size_t)
  93. [RSP+58 ] 0x7FF621A55804 (void* -> Starfield.exe+3345804)
  94. mov rax,[rbp+0E0h]
  95. [RSP+60 ] 0x32616243877998 (size_t)
  96. [RSP+68 ] 0xA (size_t)
  97. [RSP+70 ] 0x6FD72FE590 (void*)
  98. [RSP+78 ] 0x0 (size_t)
  99. [RSP+80 ] 0x24300014B4B (void*)
  100. [RSP+88 ] 0x6FD72FE500 (char*) "C:\\Users\\onixl\\Documents\\My Games\\Starfield\\DATA\\unofficial starfield patch - Main.ba2"
  101. [RSP+90 ] 0x24339A55C20 (BSResource::LooseFileLocation*)
  102. [RSP+98 ] 0x6FD72FE5E0 (char*) "\x0f"
  103. [RSP+A0 ] 0x0 (size_t)
  104. [RSP+A8 ] 0x7FF60000000A (size_t)
  105. [RSP+B0 ] 0x0 (size_t)
  106. [RSP+B8 ] 0x0 (size_t)
  107. [RSP+C0 ] 0x243491E6FC0 (BSResource::`anonymous namespace'::LooseFileAsyncStream*)
  108. [RSP+C8 ] 0x6FD72FE559 (char*) "F\x01"
  109. [RSP+D0 ] 0x73726573555C3A43 (size_t)
  110. [RSP+D8 ] 0x445C6C78696E6F5C (size_t)
  111. [RSP+E0 ] 0x73746E656D75636F (size_t)
  112. [RSP+E8 ] 0x656D614720794D5C (size_t)
  113. [RSP+F0 ] 0x6966726174535C73 (size_t)
  114. [RSP+F8 ] 0x415441445C646C65 (size_t)
  115. [RSP+100 ] 0x636966666F6E755C (size_t)
  116. [RSP+108 ] 0x72617473206C6169 (size_t)
  117. [RSP+110 ] 0x617020646C656966 (size_t)
  118. [RSP+118 ] 0x614D202D20686374 (size_t)
  119. [RSP+120 ] 0x3261622E6E69 (size_t)
  120. [RSP+128 ] 0x14638 (size_t)
  121. [RSP+130 ] 0x4360000024D (size_t)
  122. [RSP+138 ] 0x0 (size_t)
  123. [RSP+140 ] 0x0 (size_t)
  124. [RSP+148 ] 0x0 (size_t)
  125. [RSP+150 ] 0x0 (size_t)
  126. [RSP+158 ] 0x0 (size_t)
  127. [RSP+160 ] 0x100 (size_t)
  128. [RSP+168 ] 0x7FF600000009 (size_t)
  129. [RSP+170 ] 0x6FD72FEAA8 (void*)
  130. [RSP+178 ] 0xE (size_t)
  131. [RSP+180 ] 0x6FD72FE678 (void*)
  132. [RSP+188 ] 0x7FF61EEAC13C (void* -> Starfield.exe+079C13C)
  133. mov rsi,rax
  134. [RSP+190 ] 0x100 (size_t)
  135. [RSP+198 ] 0x6FD72FE660 (void*)
  136. [RSP+1A0 ] 0x0 (size_t)
  137. [RSP+1A8 ] 0x7FF62726E068 (char*) "\xc4\x8b"
  138. [RSP+1B0 ] 0xF (size_t)
  139. [RSP+1B8 ] 0x0 (size_t)
  140. [RSP+1C0 ] 0x6FD72FE9D0 (void*)
  141. [RSP+1C8 ] 0x7FF61EC9DBD9 (void* -> Starfield.exe+058DBD9)
  142. nop
  143. [RSP+1D0 ] 0x24341A8F0CC (void*)
  144. [RSP+1D8 ] 0x24341A8F5F8 (void*)
  145. [RSP+1E0 ] 0x6FD72FE850 (stl::local_function_detail::LocalFunctionImpl<<lambda_388780a92d8867bb8a17de262938cd2e>,BSEventNotifyControl,BSTEventDetail::SinkBase *>*)
  146. [RSP+1E8 ] 0x7FF62726D440 (void* -> Starfield.exe+8B5D440)
  147. shr byte ptr [rdi+1Eh],49h
  148. [RSP+1F0 ] 0x24339A4DCB0 (void*)
  149. [RSP+1F8 ] 0x7FF62726E088 (void* -> Starfield.exe+8B5E088)
  150. mov [rax+rax],cl
  151. [RSP+200 ] 0x2434940A478 (BSResource::`anonymous namespace'::LooseFileStream*)
  152. [RSP+208 ] 0x243491D1318 (char*) "unofficial starfield patch - Main.ba2"
  153. [RSP+210 ] 0x0 (size_t)
  154. [RSP+218 ] 0x7FF621A58058 (void* -> Starfield.exe+3348058)
  155. mov rbx,[rsp+58h]
  156. [RSP+220 ] 0x78657000000007 (size_t)
  157. [RSP+228 ] 0x24339A55C78 (char*) "DATA\\"
  158. [RSP+230 ] 0x24339A55C78 (char*) "DATA\\"
  159. [RSP+238 ] 0x7FF62726D440 (void* -> Starfield.exe+8B5D440)
  160. shr byte ptr [rdi+1Eh],49h
  161. [RSP+240 ] 0x6FD72FE6A0 (void*)
  162. [RSP+248 ] 0x0 (size_t)
  163. [RSP+250 ] 0x100 (size_t)
  164. [RSP+258 ] 0x7FF62726C410 (BSResource::Archive2::Index*)
  165. [RSP+260 ] 0x100 (size_t)
  166. [RSP+268 ] 0x7FF621A39E72 (void* -> Starfield.exe+3329E72)
  167. cmp esi,[rdi+1C30h]
  168. [RSP+270 ] 0x0 (size_t)
  169. [RSP+278 ] 0x6FD72FE9D0 (void*)
  170. [RSP+280 ] 0x6FD72FE9F0 (void*)
  171. [RSP+288 ] 0x7FF62726E088 (void* -> Starfield.exe+8B5E088)
  172. mov [rax+rax],cl
  173. [RSP+290 ] 0x100 (size_t)
  174. [RSP+298 ] 0x6FD72FE9D0 (void*)
  175. [RSP+2A0 ] 0x7FF62726C410 (BSResource::Archive2::Index*)
  176. [RSP+2A8 ] 0x7FF621A3BF6C (void* -> Starfield.exe+332BF6C)
  177. mov rcx,rdi
  178. [RSP+2B0 ] 0xBAADF00D (size_t)
  179. [RSP+2B8 ] 0xA (size_t)
  180. [RSP+2C0 ] 0x2433A3078F8 (void*)
  181. [RSP+2C8 ] 0xA (size_t)
  182. [RSP+2D0 ] 0x7FF62726E070 (BSTEventSource<BSResource::Archive2::RegisteredEvent>*)
  183. [RSP+2D8 ] 0x7FF62726E070 (BSTEventSource<BSResource::Archive2::RegisteredEvent>*)
  184. [RSP+2E0 ] 0x7FF62726C410 (BSResource::Archive2::Index*)
  185. [RSP+2E8 ] 0x7FF621659D43 (void* -> Starfield.exe+2F49D43)
  186. test eax,eax
  187. [RSP+2F0 ] 0x2433A3078C0 (void*)
  188. [RSP+2F8 ] 0x6F0000000A (size_t)
  189. [RSP+300 ] 0x2433A3078F8 (void*)
  190. [RSP+308 ] 0x7FF62726E068 (char*) "\xc4\x8b"
  191. [RSP+310 ] 0x7FF62726C410 (BSResource::Archive2::Index*)
  192. [RSP+318 ] 0x7FF62726E070 (BSTEventSource<BSResource::Archive2::RegisteredEvent>*)
  193. [RSP+320 ] 0x0 (size_t)
  194. [RSP+328 ] 0x7FF62726E070 (BSTEventSource<BSResource::Archive2::RegisteredEvent>*)
  195. [RSP+330 ] 0x24339A4DCB0 (void*)
  196. [RSP+338 ] 0x7FF62165A02A (void* -> Starfield.exe+2F4A02A)
  197. mov rcx,r13
  198. [RSP+340 ] 0x6FD72FE850 (stl::local_function_detail::LocalFunctionImpl<<lambda_388780a92d8867bb8a17de262938cd2e>,BSEventNotifyControl,BSTEventDetail::SinkBase *>*)
  199. [RSP+348 ] 0x6FD72FE7F0 (void*)
  200. [RSP+350 ] 0x243491D1318 (char*) "unofficial starfield patch - Main.ba2"
  201. [RSP+358 ] 0xFFFFF000 (size_t)
  202. [RSP+360 ] 0x6FD72FEA70 (char*) "p"
  203. [RSP+368 ] 0x7FF621A3B4B6 (void* -> Starfield.exe+332B4B6)
  204. mov r8,[rbx+18h]
  205. [RSP+370 ] 0x2 (size_t)
  206. [RSP+378 ] 0x7FF61ECC2DEE (void* -> Starfield.exe+05B2DEE)
  207. xor eax,eax
  208. [RSP+380 ] 0x6FD72FE8B0 (void*)
  209. [RSP+388 ] 0x7FF61EEAD6B5 (void* -> Starfield.exe+079D6B5)
  210. mov rbx,rax
  211. [RSP+390 ] 0x0 (size_t)
  212. [RSP+398 ] 0x7FF62726E070 (BSTEventSource<BSResource::Archive2::RegisteredEvent>*)
  213. [RSP+3A0 ] 0x6FD72FEA70 (char*) "p"
  214. [RSP+3A8 ] 0x7FF621A3B610 (void* -> Starfield.exe+332B610)
  215. add [rdi+20h],rbx
  216. [RSP+3B0 ] 0x41 (size_t)
  217. [RSP+3B8 ] 0x7FF621A31214 (void* -> Starfield.exe+3321214)
  218. mov esi,[rsp+68h]
  219. [RSP+3C0 ] 0x0 (size_t)
  220. [RSP+3C8 ] 0x7FF62726C408 (void* -> Starfield.exe+8B5C408)
  221. add [rax],al
  222. [RSP+3D0 ] 0x1000 (size_t)
  223. [RSP+3D8 ] 0x0 (size_t)
  224. [RSP+3E0 ] 0xFFFFF000 (size_t)
  225. [RSP+3E8 ] 0x243491D1318 (char*) "unofficial starfield patch - Main.ba2"
  226. [RSP+3F0 ] 0x6FD72FE980 (char*) "KK\x01"
  227. [RSP+3F8 ] 0x7FF621A3BE07 (void* -> Starfield.exe+332BE07)
  228. add rsp,48h
  229. [RSP+400 ] 0xF (size_t)
  230. [RSP+408 ] 0x0 (size_t)
  231. [RSP+410 ] 0x243491D1318 (char*) "unofficial starfield patch - Main.ba2"
  232. [RSP+418 ] 0x7FF621A38DFE (void* -> Starfield.exe+3328DFE)
  233. mov eax,[rsp+50h]
  234. [RSP+420 ] 0x7FF623CE6C50 (void* -> Starfield.exe+55D6C50)
  235. adc [rbp-6Eh],ch
  236. [RSP+428 ] 0x6FD72FE9D0 (void*)
  237. [RSP+430 ] 0x7FF62726E070 (BSTEventSource<BSResource::Archive2::RegisteredEvent>*)
  238. [RSP+438 ] 0x4C524E47 (size_t)
  239. [RSP+440 ] 0xFFFFF000 (size_t)
  240. [RSP+448 ] 0x7FF621A3C3E7 (void* -> Starfield.exe+332C3E7)
  241. test r15,r15
  242. [RSP+450 ] 0xF (size_t)
  243. [RSP+458 ] 0x243491D1318 (char*) "unofficial starfield patch - Main.ba2"
  244. [RSP+460 ] 0x243491D1318 (char*) "unofficial starfield patch - Main.ba2"
  245. [RSP+468 ] 0x247A2C1D850 (void*)
  246. [RSP+470 ] 0xF (size_t)
  247. [RSP+478 ] 0x0 (size_t)
  248. [RSP+480 ] 0x2434940A478 (BSResource::`anonymous namespace'::LooseFileStream*)
  249. [RSP+488 ] 0x58445442 (size_t)
  250. [RSP+490 ] 0x0 (size_t)
  251. [RSP+498 ] 0x243491D1300 (void*)
  252. [RSP+4A0 ] 0xA (size_t)
  253. [RSP+4A8 ] 0x326162824927EF (size_t)
  254. [RSP+4B0 ] 0x0 (size_t)
  255. [RSP+4B8 ] 0x258445442 (size_t)
  256. [RSP+4C0 ] 0xF4C524E47 (size_t)
  257. [RSP+4C8 ] 0x14885 (size_t)
  258. [RSP+4D0 ] 0x6FD72FE980 (char*) "KK\x01"
  259. [RSP+4D8 ] 0x7FF621B6A53D (void* -> Starfield.exe+345A53D)
  260. or qword ptr [rbx+8],0FFFFFFFFFFFFFFFFh
  261. [RSP+4E0 ] 0x24339A55C20 (BSResource::LooseFileLocation*)
  262. [RSP+4E8 ] 0x4 (size_t)
  263. [RSP+4F0 ] 0x1 (size_t)
  264. [RSP+4F8 ] 0x0 (size_t)
  265. [RSP+500 ] 0x0 (size_t)
  266. [RSP+508 ] 0x0 (size_t)
  267. [RSP+510 ] 0x23B00000000 (void*)
  268. [RSP+518 ] 0x7FF61EC9DA4B (void* -> Starfield.exe+058DA4B)
  269. mov rbx,rax
  270. [RSP+520 ] 0x0 (size_t)
  271. [RSP+528 ] 0x0 (size_t)
  272. [RSP+530 ] 0x7FF624CEA500 (char*) "\x01"
  273. [RSP+538 ] 0x23B1E720050 (char*) "BTDX\x02"
  274. [RSP+540 ] 0x0 (size_t)
  275. [RSP+548 ] 0x20 (size_t)
  276. [RSP+550 ] 0x14B4B (size_t)
  277. [RSP+558 ] 0x23C (size_t)
  278. [RSP+560 ] 0x14B4B (size_t)
  279. [RSP+568 ] 0x23C (size_t)
  280. [RSP+570 ] 0x7FF62746E570 (char*) "pL"
  281. [RSP+578 ] 0x23B0E7F30B4 (char*) "\n"
  282. [RSP+580 ] 0x6FD72FEA49 (void*)
  283. [RSP+588 ] 0x7FF621B5D963 (void* -> Starfield.exe+344D963)
  284. mov r12d,8
  285. [RSP+590 ] 0x3BB14 (size_t)
  286. [RSP+598 ] 0xA (size_t)
  287. [RSP+5A0 ] 0x2434940A478 (BSResource::`anonymous namespace'::LooseFileStream*)
  288. [RSP+5A8 ] 0x6FD72FE968 (char*) "P"
  289. [RSP+5B0 ] 0x6FD72FEA70 (char*) "p"
  290. [RSP+5B8 ] 0x23B0000000F (void*)
  291. [RSP+5C0 ] 0x326162824927EF (size_t)
  292. [RSP+5C8 ] 0x7FF600000000 (size_t)
  293. [RSP+5D0 ] 0x243491D1318 (char*) "unofficial starfield patch - Main.ba2"
  294. [RSP+5D8 ] 0xF4C524E47 (size_t)
  295. [RSP+5E0 ] 0x0 (size_t)
  296. [RSP+5E8 ] 0x6FD72FEAC0 (char*) "kingscript.pex"
  297. [RSP+5F0 ] 0x62003261622E0001 (size_t)
  298. [RSP+5F8 ] 0x6FD72FEA40 (void*)
  299. [RSP+600 ] 0x6FD72FEA10 (void*)
  300. [RSP+608 ] 0x7FF62746E570 (char*) "pL"
  301. [RSP+610 ] 0x23B1E720100 (void*)
  302. [RSP+618 ] 0x23B1E720020 (void*)
  303. [RSP+620 ] 0x23B1E720030 (void*)
  304. [RSP+628 ] 0x7FF61F926895 (void* -> Starfield.exe+1216895)
  305. mov rax,rbx
  306. [RSP+630 ] 0x2 (size_t)
  307. [RSP+638 ] 0x23B0E7F5C70 (ScrapHeap*)
  308. [RSP+640 ] 0x23B1E820070 (char*) "A"
  309. [RSP+648 ] 0x0 (size_t)
  310. [RSP+650 ] 0x14885 (size_t)
  311. [RSP+658 ] 0x14B4B (size_t)
  312. [RSP+660 ] 0x2C6 (size_t)
  313. [RSP+668 ] 0x2C6 (size_t)
  314. [RSP+670 ] 0x14B4B (size_t)
  315. [RSP+678 ] 0x2F73747069726300 (size_t)
  316. [RSP+680 ] 0x7265762F70667375 (size_t)
  317. [RSP+688 ] 0x636172746E6F6973 (size_t)
  318. [RSP+690 ] 0x69726373676E696B (size_t)
  319. [RSP+698 ] 0x70007865702E7470 (size_t)
  320. [RSP+6A0 ] 0x6361006373702E74 (size_t)
  321. [RSP+6A8 ] 0x34006373702E3966 (size_t)
  322. [RSP+6B0 ] 0x6373702E326637 (size_t)
  323. [RSP+6B8 ] 0x66 (size_t)
  324. [RSP+6C0 ] 0x24339A53F80 (void*)
  325. [RSP+6C8 ] 0x1 (size_t)
  326. [RSP+6D0 ] 0x0 (size_t)
  327. [RSP+6D8 ] 0x6FD72FED34 (char*) "unofficial starfield patch - Main.ba2"
  328. [RSP+6E0 ] 0x0 (size_t)
  329. [RSP+6E8 ] 0x23B0E7F2EE0 (void*)
  330. [RSP+6F0 ] 0x7FF600000000 (size_t)
  331. [RSP+6F8 ] 0x23B1E720020 (void*)
  332. [RSP+700 ] 0x23B0E7F5C70 (ScrapHeap*)
  333. [RSP+708 ] 0x23B1E720020 (void*)
  334. [RSP+710 ] 0x23B1E720028 (void*)
  335. [RSP+718 ] 0x1 (size_t)
  336. [RSP+720 ] 0x6C65696672617473 (size_t)
  337. [RSP+728 ] 0x2068637461702064 (size_t)
  338. [RSP+730 ] 0x1 (size_t)
  339. [RSP+738 ] 0x3261622E31003261 (size_t)
  340. [RSP+740 ] 0x7365727574786500 (size_t)
  341. [RSP+748 ] 0x7FF620C51CCE (void* -> Starfield.exe+2541CCE)
  342. shr rax,3Fh
  343. [RSP+750 ] 0x2E31307365003261 (size_t)
  344. [RSP+758 ] 0x6572757400326162 (size_t)
  345. [RSP+760 ] 0x3261622E313073 (size_t)
  346. [RSP+768 ] 0x3261622E73657275 (size_t)
  347. [RSP+770 ] 0x2433981A000 (void*)
  348. [RSP+778 ] 0xF21A38390 (size_t)
  349. [RSP+780 ] 0xF (size_t)
  350. [RSP+788 ] 0x1 (size_t)
  351. [RSP+790 ] 0x0 (size_t)
  352. [RSP+798 ] 0x0 (size_t)
  353. [RSP+7A0 ] 0x0 (size_t)
  354. [RSP+7A8 ] 0x247D17E95B0 (void*)
  355. [RSP+7B0 ] 0x2433981A000 (void*)
  356. [RSP+7B8 ] 0x1 (size_t)
  357. [RSP+7C0 ] 0x6FD72FECB0 (void*)
  358. [RSP+7C8 ] 0x7FF621A3BD18 (void* -> Starfield.exe+332BD18)
  359. cmp qword ptr [rbx+8],55h
  360. [RSP+7D0 ] 0x2434297FF40 (void*)
  361. [RSP+7D8 ] 0x6FD72FED34 (char*) "unofficial starfield patch - Main.ba2"
  362. [RSP+7E0 ] 0x0 (size_t)
  363. [RSP+7E8 ] 0x7FF621A3B4F2 (void* -> Starfield.exe+332B4F2)
  364. mov rbx,rax
  365. [RSP+7F0 ] 0x7FF62726E06C (void* -> Starfield.exe+8B5E06C)
  366. add [rax],dl
  367. [RSP+7F8 ] 0x7FF62165B1A2 (void* -> Starfield.exe+2F4B1A2)
  368. mov edx,eax
  369. [RSP+800 ] 0x2433981A000 (void*)
  370. [RSP+808 ] 0x1 (size_t)
  371. [RSP+810 ] 0x2433981A024 (void*)
  372. [RSP+818 ] 0x2433981A438 (char*) "\x17\x01\x10"
  373. [RSP+820 ] 0x6FD72FEFC0 (char*) "unofficial starfield patch"
  374. [RSP+828 ] 0x7FF621A3513D (void* -> Starfield.exe+332513D)
  375. mov rbx,[rsp+30h]
  376. [RSP+830 ] 0x6FD72FECC8 (void*)
  377. [RSP+838 ] 0x6FD72FED34 (char*) "unofficial starfield patch - Main.ba2"
  378. [RSP+840 ] 0x6FD72FECB0 (void*)
  379. [RSP+848 ] 0x0 (size_t)
  380. [RSP+850 ] 0x6FD72FED34 (char*) "unofficial starfield patch - Main.ba2"
  381. [RSP+858 ] 0x7FF621A35583 (void* -> Starfield.exe+3325583)
  382. test ebx,ebx
  383. [RSP+860 ] 0x6FD72FEE00 (char*) " "
  384. [RSP+868 ] 0x7FF623A98F38 (char*) " - Main"
  385. [RSP+870 ] 0x6FD72FED34 (char*) "unofficial starfield patch - Main.ba2"
  386. [RSP+878 ] 0x0 (size_t)
  387. [RSP+880 ] 0x1DB786D21FB2F23 (size_t)
  388. [RSP+888 ] 0x1DB3D84102A4192 (size_t)
  389. [RSP+890 ] 0x0 (size_t)
  390. [RSP+898 ] 0x6FD72FEFC0 (char*) "unofficial starfield patch"
  391. [RSP+8A0 ] 0x7FF62521DDA0 (void* -> Starfield.exe+6B0DDA0)
  392. add [rax],al
  393. [RSP+8A8 ] 0x7FF624D0A2BC (void* -> Starfield.exe+65FA2BC)
  394. add [rax],al
  395. [RSP+8B0 ] 0x1 (size_t)
  396. [RSP+8B8 ] 0x6FD72FED34 (char*) "unofficial starfield patch - Main.ba2"
  397. [RSP+8C0 ] 0x6FD72FEE90 (char*) " "
  398. [RSP+8C8 ] 0x7FF61FC06A50 (void* -> Starfield.exe+14F6A50)
  399. jmp short 0FFFFFFFFFFFFFFD8h
  400. [RSP+8D0 ] 0x6FD72FEE90 (char*) " "
  401. [RSP+8D8 ] 0x0 (size_t)
  402. [RSP+8E0 ] 0x6FD72FED34 (char*) "unofficial starfield patch - Main.ba2"
  403. [RSP+8E8 ] 0x23B1E720020 (void*)
  404. [RSP+8F0 ] 0xFFFFFFF8 (size_t)
  405. [RSP+8F8 ] 0xC89 (size_t)
  406. [RSP+900 ] 0x666F6E7500000001 (size_t)
  407. [RSP+908 ] 0x73206C6169636966 (size_t)
  408. [RSP+910 ] 0x646C656966726174 (size_t)
  409. [RSP+918 ] 0x2D20686374617020 (size_t)
  410. [RSP+920 ] 0x61622E6E69614D20 (size_t)
  411. [RSP+928 ] 0x24339A40032 (void*)
  412. [RSP+930 ] 0x6FD72FEE20 (void*)
  413. [RSP+938 ] 0x7FF61EEA8E96 (void* -> Starfield.exe+0798E96)
  414. jmp short 0000000000000016h
  415. [RSP+940 ] 0x7FF62726E088 (void* -> Starfield.exe+8B5E088)
  416. mov [rax+rax],cl
  417. [RSP+948 ] 0x6FD72FEE20 (void*)
  418. [RSP+950 ] 0x7FF622A86960 (void* -> Starfield.exe+4376960)
  419. push rax
  420. [RSP+958 ] 0xC83 (size_t)
  421. [RSP+960 ] 0x7FF62726E088 (void* -> Starfield.exe+8B5E088)
  422. mov [rax+rax],cl
  423. [RSP+968 ] 0x7FF61ECDB62A (void* -> Starfield.exe+05CB62A)
  424. jmp 00000000000000E7h
  425. [RSP+970 ] 0x7FF62726E088 (void* -> Starfield.exe+8B5E088)
  426. mov [rax+rax],cl
  427. [RSP+978 ] 0x24339A4DCB0 (void*)
  428. [RSP+980 ] 0x6FD72FEE20 (void*)
  429. [RSP+988 ] 0x7FFFFFFFFFFFFFFC (size_t)
  430. [RSP+990 ] 0x4000000000000000 (size_t)
  431. [RSP+998 ] 0x7FF6216616CF (void* -> Starfield.exe+2F516CF)
  432. jmp short 000000000000000Dh
  433. [RSP+9A0 ] 0x23B0E7F5C70 (ScrapHeap*)
  434. [RSP+9A8 ] 0x6FD72FEF01 (char*) "\x02"
  435. [RSP+9B0 ] 0x0 (size_t)
  436. [RSP+9B8 ] 0x23B1E720028 (void*)
  437. [RSP+9C0 ] 0x7FF62521DDA0 (void* -> Starfield.exe+6B0DDA0)
  438. add [rax],al
  439. [RSP+9C8 ] 0x7FF624D0A2BC (void* -> Starfield.exe+65FA2BC)
  440. add [rax],al
  441. [RSP+9D0 ] 0x23B1E720020 (void*)
  442. [RSP+9D8 ] 0x6FD72FF118 (void*)
  443. [RSP+9E0 ] 0x6FD72FEF70 (void*)
  444. [RSP+9E8 ] 0x7FF621A37A06 (void* -> Starfield.exe+3327A06)
  445. nop
  446. [RSP+9F0 ] 0x800 (size_t)
  447. [RSP+9F8 ] 0x243487F0D00 (char*) "huM;C\x02"
  448. [RSP+A00 ] 0x243487F0D00 (char*) "huM;C\x02"
  449. [RSP+A08 ] 0x7FF600000000 (size_t)
  450. [RSP+A10 ] 0x7FF623CE67B0 (void* -> Starfield.exe+55D67B0)
  451. and [rax-5Dh],al
  452. [RSP+A18 ] 0x800 (size_t)
  453. [RSP+A20 ] 0x0 (size_t)
  454. [RSP+A28 ] 0x7FF62726C378 (BSResource::`anonymous namespace'::GlobalPaths*)
  455. [RSP+A30 ] 0x23B1E720020 (void*)
  456. [RSP+A38 ] 0x7FF61FC188CE (void* -> Starfield.exe+15088CE)
  457. add rdi,8
  458. [RSP+A40 ] 0x243487F0DD8 (void*)
  459. [RSP+A48 ] 0x6FD72FEF70 (void*)
  460. [RSP+A50 ] 0x6FD72FF118 (void*)
  461. [RSP+A58 ] 0x243487F0DE0 (void*)
  462. [RSP+A60 ] 0x23B1E720020 (void*)
  463. [RSP+A68 ] 0x23B1E720028 (void*)
  464. [RSP+A70 ] 0x23B1E720028 (void*)
  465. [RSP+A78 ] 0x50 (size_t)
  466. [RSP+A80 ] 0x6D73652E (size_t)
  467. [RSP+A88 ] 0x0 (size_t)
  468. [RSP+A90 ] 0x0 (size_t)
  469. [RSP+A98 ] 0x247A2C1D850 (void*)
  470. [RSP+AA0 ] 0xB (size_t)
  471. [RSP+AA8 ] 0x7FFF78AD9E80 (void* -> ucrtbase.dll+0139E80)
  472. add cl,ah
  473. [RSP+AB0 ] 0x6FD72FF0C0 (void*)
  474. [RSP+AB8 ] 0x26A8 (size_t)
  475. [RSP+AC0 ] 0x0 (size_t)
  476. [RSP+AC8 ] 0x0 (size_t)
  477. [RSP+AD0 ] 0x202 (size_t)
  478. [RSP+AD8 ] 0x7FFF7835D339 (char*) "\x0f\x1fD"
  479. [RSP+AE0 ] 0x26A8 (size_t)
  480. [RSP+AE8 ] 0x7FFF78AD9E00 (void* -> ucrtbase.dll+0139E00)
  481. add [rax],al
  482. [RSP+AF0 ] 0x0 (size_t)
  483. [RSP+AF8 ] 0x0 (size_t)
  484. [RSP+B00 ] 0xB (size_t)
  485. [RSP+B08 ] 0x7FFF789D84DC (void* -> ucrtbase.dll+00384DC)
  486. test eax,eax
  487. [RSP+B10 ] 0x1000 (size_t)
  488. [RSP+B18 ] 0x7FFF789D8FCA (void* -> ucrtbase.dll+0038FCA)
  489. movsxd r8,eax
  490. [RSP+B20 ] 0x6FD72FEF80 (void*)
  491. [RSP+B28 ] 0x247A325EC50 (char*) "BSResource::`anonymous namespace\'::GlobalPaths"
  492. [RSP+B30 ] 0x0 (size_t)
  493. [RSP+B38 ] 0x7FFF789D854D (void* -> ucrtbase.dll+003854D)
  494. mov r8,rbx
  495. [RSP+B40 ] 0x7FF62518BC00 (void* -> Starfield.exe+6A7BC00)
  496. add [rax],al
  497. [RSP+B48 ] 0x0 (size_t)
  498. [RSP+B50 ] 0x6FD72FF030 (void*)
  499. [RSP+B58 ] 0x7FFF78AD9E80 (void* -> ucrtbase.dll+0139E80)
  500. add cl,ah
  501. [RSP+B60 ] 0x6FD72FF0C0 (void*)
  502. [RSP+B68 ] 0x7FFF78A022AE (void* -> ucrtbase.dll+00622AE)
  503. mov eax,ebx
  504. [RSP+B70 ] 0x6FD72FF000 (char*) "h"
  505. [RSP+B78 ] 0x7FFF78AD9E80 (void* -> ucrtbase.dll+0139E80)
  506. add cl,ah
  507. [RSP+B80 ] 0x4369D2260 (size_t)
  508. [RSP+B88 ] 0x0 (size_t)
  509. [RSP+B90 ] 0x69636966666F6E75 (size_t)
  510. [RSP+B98 ] 0x6672617473206C61 (size_t)
  511. [RSP+BA0 ] 0x74617020646C6569 (size_t)
  512. [RSP+BA8 ] 0x6E6120706F006863 (size_t)
  513. [RSP+BB0 ] 0x7265676E61682064 (size_t)
  514. [RSP+BB8 ] 0x64006B0073746900 (size_t)
  515. [RSP+BC0 ] 0x6A6F006563617073 (size_t)
  516. [RSP+BC8 ] 0x6374617020746365 (size_t)
  517. [RSP+BD0 ] 0x6569726620740068 (size_t)
  518. [RSP+BD8 ] 0x796C646E (size_t)
  519. [RSP+BE0 ] 0x23B369D2260 (void*)
  520. [RSP+BE8 ] 0x7FF621660720 (void* -> Starfield.exe+2F50720)
  521. test al,al
  522. [RSP+BF0 ] 0x23B0000000B (void*)
  523. [RSP+BF8 ] 0x7FF61F9EA0DD (void* -> Starfield.exe+12DA0DD)
  524. jmp short 6
  525. [RSP+C00 ] 0x7FF62518BC00 (void* -> Starfield.exe+6A7BC00)
  526. add [rax],al
  527. [RSP+C08 ] 0x800 (size_t)
  528. [RSP+C10 ] 0x7FF625190580 (void* -> Starfield.exe+6A80580)
  529. add [rax],al
  530. [RSP+C18 ] 0x7FF621660456 (void* -> Starfield.exe+2F50456)
  531. and qword ptr [r12],0
  532. [RSP+C20 ] 0x243489FE920 (void*)
  533. [RSP+C28 ] 0x18DC8 (size_t)
  534. [RSP+C30 ] 0x7FF62518BA40 (BSFixedSizeBlockAllocator::TAlloc<4294967296,16777216,128>*)
  535. [RSP+C38 ] 0x7FF61EEA8E96 (void* -> Starfield.exe+0798E96)
  536. jmp short 0000000000000016h
  537. [RSP+C40 ] 0x7FF62518BC00 (void* -> Starfield.exe+6A7BC00)
  538. add [rax],al
  539. [RSP+C48 ] 0x801 (size_t)
  540. [RSP+C50 ] 0x50 (size_t)
  541. [RSP+C58 ] 0x6FD72FF178 (void*)
  542. [RSP+C60 ] 0x7FF62726E480 (void* -> Starfield.exe+8B5E480)
  543. shl byte ptr [rdx-10h],1
  544. [RSP+C68 ] 0x7FF61ECB3A12 (void* -> Starfield.exe+05A3A12)
  545. jmp short 0000000000000039h
  546. [RSP+C70 ] 0x3A78 (size_t)
  547. [RSP+C78 ] 0x0 (size_t)
  548. [RSP+C80 ] 0x18DC8 (size_t)
  549. [RSP+C88 ] 0x0 (size_t)
  550. [RSP+C90 ] 0x1A00000000 (size_t)
  551. [RSP+C98 ] 0x7FF61EEAC1D3 (void* -> Starfield.exe+079C1D3)
  552. test rbx,rbx
  553. [RSP+CA0 ] 0x7FF62518BC00 (void* -> Starfield.exe+6A7BC00)
  554. add [rax],al
  555. [RSP+CA8 ] 0x800 (size_t)
  556. [RSP+CB0 ] 0x50 (size_t)
  557. [RSP+CB8 ] 0x243487F0DE0 (void*)
  558. [RSP+CC0 ] 0x7FF6251DDE18 (void* -> Starfield.exe+6ACDE18)
  559. and ch,bl
  560. [RSP+CC8 ] 0x243487F0DD8 (void*)
  561. [RSP+CD0 ] 0xAF3D3CE84F (size_t)
  562. [RSP+CD8 ] 0x7FF620CE9518 (void* -> Starfield.exe+25D9518)
  563. add rbx,8
  564. [RSP+CE0 ] 0x6FFFFFFFFF (size_t)
  565. [RSP+CE8 ] 0x100000000 (size_t)
  566. [RSP+CF0 ] 0x7FF623A977D0 (void* -> Starfield.exe+53877D0)
  567. and [rdx+rdx*4+1Fh],ch
  568. [RSP+CF8 ] 0x7FF624D0A2BC (void* -> Starfield.exe+65FA2BC)
  569. add [rax],al
  570. [RSP+D00 ] 0x6F00000000 (size_t)
  571. [RSP+D08 ] 0x6A59088200000008 (size_t)
  572. [RSP+D10 ] 0x200000001BC (size_t)
  573. [RSP+D18 ] 0x243487F0000 (void*)
  574. [RSP+D20 ] 0x47BE0D240EBDD8B (size_t)
  575. [RSP+D28 ] 0x7121FE1B6304A0C4 (size_t)
  576. [RSP+D30 ] 0x23B369D2260 (void*)
  577. [RSP+D38 ] 0x23B376E0000 (size_t)
  578. [RSP+D40 ] 0x0 (size_t)
  579. [RSP+D48 ] 0x0 (size_t)
  580. [RSP+D50 ] 0x0 (size_t)
  581. [RSP+D58 ] 0x7FF622A869E8 (void* -> Starfield.exe+43769E8)
  582. fmul st,dword ptr [7FF61F8Ah]
  583. [RSP+D60 ] 0x6FD72FF140 (void*)
  584. [RSP+D68 ] 0x7FF622A869E8 (void* -> Starfield.exe+43769E8)
  585. fmul st,dword ptr [7FF61F8Ah]
  586. [RSP+D70 ] 0x6FD72FF140 (void*)
  587. [RSP+D78 ] 0x0 (size_t)
  588. [RSP+D80 ] 0x0 (size_t)
  589. [RSP+D88 ] 0x7FFEF127C27F (void* -> steamclient64.dll+0BEC27F)
  590. mov [rbx],rax
  591. [RSP+D90 ] 0x7FF622AB4700 (void* -> Starfield.exe+43A4700)
  592. sar byte ptr [rdi],1
  593. [RSP+D98 ] 0x0 (size_t)
  594. [RSP+DA0 ] 0x0 (size_t)
  595. [RSP+DA8 ] 0x7FF62726C378 (BSResource::`anonymous namespace'::GlobalPaths*)
  596. [RSP+DB0 ] 0xC161B00 (size_t)
  597. [RSP+DB8 ] 0x7FFF7833D6ED (char*) "\x0f\x1fD"
  598. [RSP+DC0 ] 0x5 (size_t)
  599. [RSP+DC8 ] 0x7FFF7833D6ED (char*) "\x0f\x1fD"
  600. [RSP+DD0 ] 0x0 (size_t)
  601. [RSP+DD8 ] 0x0 (size_t)
  602. [RSP+DE0 ] 0x0 (size_t)
  603. [RSP+DE8 ] 0x0 (size_t)
  604. [RSP+DF0 ] 0x0 (size_t)
  605. [RSP+DF8 ] 0x0 (size_t)
  606. [RSP+E00 ] 0x23B37620070 (size_t)
  607. [RSP+E08 ] 0x7FFEF127B8EA (void* -> steamclient64.dll+0BEB8EA)
  608. mov rbx,[rsp+30h]
  609. [RSP+E10 ] 0x23B37620070 (size_t)
  610. [RSP+E18 ] 0x5 (size_t)
  611. [RSP+E20 ] 0x0 (size_t)
  612. [RSP+E28 ] 0x1 (size_t)
  613. [RSP+E30 ] 0x23B37620070 (size_t)
  614. [RSP+E38 ] 0x7FFEF0F03285 (void* -> steamclient64.dll+0873285)
  615. add ebx,[rsp+450h]
  616. [RSP+E40 ] 0x0 (size_t)
  617. [RSP+E48 ] 0x23B376E0000 (size_t)
  618. [RSP+E50 ] 0x0 (size_t)
  619. [RSP+E58 ] 0x6FD72FF6C0 (void*)
  620. [RSP+E60 ] 0x0 (size_t)
  621. [RSP+E68 ] 0x6FD72FF2D0 (char*) "rfield\\Plugins.txt"
  622. [RSP+E70 ] 0xB (size_t)
  623. [RSP+E78 ] 0x5 (size_t)
  624. [RSP+E80 ] 0x73726573555C3A43 (size_t)
  625. [RSP+E88 ] 0x415C6C78696E6F5C (size_t)
  626. [RSP+E90 ] 0x4C5C617461447070 (size_t)
  627. [RSP+E98 ] 0x6174535C6C61636F (size_t)
  628. [RSP+EA0 ] 0x505C646C65696672 (size_t)
  629. [RSP+EA8 ] 0x742E736E6967756C (size_t)
  630. [RSP+EB0 ] 0x7478 (size_t)
  631. [RSP+EB8 ] 0x7FFF789B9EC1 (void* -> ucrtbase.dll+0019EC1)
  632. mov rax,[rdi]
  633. [RSP+EC0 ] 0x1A32040B (size_t)
  634. [RSP+EC8 ] 0x6FD72FF2E0 (char*) "xt"
  635. [RSP+ED0 ] 0x0 (size_t)
  636. [RSP+ED8 ] 0x7FFF23BE353D (void* -> gameoverlayrenderer64.dll+00E353D)
  637. mov rbx,[rsp+30h]
  638. [RSP+EE0 ] 0x7FFF789A0000 (void* -> ucrtbase.dll+0000000)
  639. pop r10
  640. [RSP+EE8 ] 0x7FFF789B92DC (void* -> ucrtbase.dll+00192DC)
  641. add rsp,70h
  642. [RSP+EF0 ] 0x6FD72FF4D0 (char*) "\x01\x04]7;\x02"
  643. [RSP+EF8 ] 0x0 (size_t)
  644. [RSP+F00 ] 0x6FD72FF4F0 (void*)
  645. [RSP+F08 ] 0xFFFFFFF9 (size_t)
  646. [RSP+F10 ] 0x7FF622A84208 (void* -> Starfield.exe+4374208)
  647. and [rsi],al
  648. [RSP+F18 ] 0x7FFF7AF8F7B0 (void* -> ntdll.dll+00EF7B0)
  649. sub rsp,28h
  650. [RSP+F20 ] 0x7FF622000000 (void* -> Starfield.exe+38F0000)
  651. lea rcx,[2D13C50h]
  652. [RSP+F28 ] 0x7FFF63477C76 (void* -> aswAMSI.dll+0057C76)
  653. test al,al
  654. [RSP+F30 ] 0xB10075DF859A (size_t)
  655. [RSP+F38 ] 0x7FFF7AEB20EF (void* -> ntdll.dll+00120EF)
  656. add rsp,2A0h
  657. [RSP+F40 ] 0x8000 (size_t)
  658. [RSP+F48 ] 0x7FFF789A0000 (void* -> ucrtbase.dll+0000000)
  659. pop r10
  660. [RSP+F50 ] 0x7FFF7AF8F7B0 (void* -> ntdll.dll+00EF7B0)
  661. sub rsp,28h
  662. [RSP+F58 ] 0x24 (size_t)
  663. [RSP+F60 ] 0x7FF623A7FD44 (char*) "%d"
  664. [RSP+F68 ] 0x7FFF789BA7E2 (void* -> ucrtbase.dll+001A7E2)
  665. test al,al
  666. [RSP+F70 ] 0x7FFE0301 (void*)
  667. [RSP+F78 ] 0x7FFF7833CE1F (char*) "\x0f\x1fD"
  668. [RSP+F80 ] 0x32D72FF480 (size_t)
  669. [RSP+F88 ] 0x6FD72FF4D0 (char*) "\x01\x04]7;\x02"
  670. [RSP+F90 ] 0x636966666F6E752A (size_t)
  671. [RSP+F98 ] 0x72617473206C6169 (size_t)
  672. [RSP+FA0 ] 0x617020646C656966 (size_t)
  673. [RSP+FA8 ] 0x6D73652E686374 (size_t)
  674. [RSP+FB0 ] 0x65676E6168206400 (size_t)
  675. [RSP+FB8 ] 0x7300006D73652E72 (size_t)
  676. [RSP+FC0 ] 0x652E65000000006D (size_t)
  677. [RSP+FC8 ] 0x7461702000006D73 (size_t)
  678. [RSP+FD0 ] 0x6D73652E6863 (size_t)
  679. [RSP+FD8 ] 0x73652E796C646E65 (size_t)
  680. [RSP+FE0 ] 0x6D (size_t)
  681. [RSP+FE8 ] 0xFFFFFFFFCA5B1700 (size_t)
  682. [RSP+FF0 ] 0x48 (size_t)
  683. [RSP+FF8 ] 0x1 (size_t)
  684. [RSP+1000] 0x0 (size_t)
  685. [RSP+1008] 0x0 (size_t)
  686. [RSP+1010] 0x0 (size_t)
  687. [RSP+1018] 0x0 (size_t)
  688. [RSP+1020] 0x0 (size_t)
  689. [RSP+1028] 0x0 (size_t)
  690. [RSP+1030] 0x0 (size_t)
  691. [RSP+1038] 0x6FD72FF630 (char*) "\x10"
  692. [RSP+1040] 0x6FD72FF680 (char*) "\x02"
  693. [RSP+1048] 0x15F90 (size_t)
  694. [RSP+1050] 0x2BF20 (size_t)
  695. [RSP+1058] 0x7FFF0C115D9D (void* -> tier0_s64.dll+0015D9D)
  696. mov rbx,[rsp+30h]
  697. [RSP+1060] 0x23B375B0B20 (size_t)
  698. [RSP+1068] 0x23B376E0000 (size_t)
  699. [RSP+1070] 0x23B375D0480 (size_t)
  700. [RSP+1078] 0x6FD72FF670 (void*)
  701. [RSP+1080] 0x23B37620000 (size_t)
  702. [RSP+1088] 0x7FFEF0F004B3 (void* -> steamclient64.dll+08704B3)
  703. test al,al
  704. [RSP+1090] 0x6FD72FF990 (void*)
  705. [RSP+1098] 0x6FD72FF680 (char*) "\x02"
  706. [RSP+10A0] 0x23B375D0401 (size_t)
  707. [RSP+10A8] 0x2BF20 (size_t)
  708. [RSP+10B0] 0x23B37620070 (size_t)
  709. [RSP+10B8] 0x7FFEF0F008FD (void* -> steamclient64.dll+08708FD)
  710. movzx eax,dil
  711. [RSP+10C0] 0x23B375D0592 (size_t)
  712. [RSP+10C8] 0x23B00000000 (void*)
  713. [RSP+10D0] 0x23B349D9540 (void*)
  714. [RSP+10D8] 0x23B375D0592 (size_t)
  715. [RSP+10E0] 0x23B349D02B4 (char*) "\x05"
  716. [RSP+10E8] 0x7F0000000007 (size_t)
  717. [RSP+10F0] 0x23B375D0592 (size_t)
  718. [RSP+10F8] 0x50 (size_t)
  719. [RSP+1100] 0x2BF20 (size_t)
  720. [RSP+1108] 0x23B349D0E70 (void*)
  721. [RSP+1110] 0x0 (size_t)
  722. [RSP+1118] 0x0 (size_t)
  723. [RSP+1120] 0x7FF62726A2A0 (Particles::ParticleEmitterEngine*)
  724. [RSP+1128] 0x0 (size_t)
  725. [RSP+1130] 0xB8 (size_t)
  726. [RSP+1138] 0x2433A0FA280 (void*)
  727. [RSP+1140] 0xAF3A8914B5 (size_t)
  728. [RSP+1148] 0x7FF61F83AD26 (void* -> Starfield.exe+112AD26)
  729. add rsp,20h
  730. [RSP+1150] 0x7FF62726AC40 (char*) "!\x04"
  731. [RSP+1158] 0x2433A0FA280 (void*)
  732. [RSP+1160] 0xB8 (size_t)
  733. [RSP+1168] 0x7FF62726AC40 (char*) "!\x04"
  734. [RSP+1170] 0x23B0E7F2EE0 (void*)
  735. [RSP+1178] 0x7FF6218F3ED2 (void* -> Starfield.exe+31E3ED2)
  736. jmp 0FFFFFFFFFFFFF040h
  737. [RSP+1180] 0x0 (size_t)
  738. [RSP+1188] 0x0 (size_t)
  739. [RSP+1190] 0x72 (size_t)
  740. [RSP+1198] 0x23B0E7F2EE0 (void*)
  741. [RSP+11A0] 0x5 (size_t)
  742. [RSP+11A8] 0x20 (size_t)
  743. [RSP+11B0] 0x40 (size_t)
  744. [RSP+11B8] 0x7FFF7AEBBFC4 (void* -> ntdll.dll+001BFC4)
  745. mov rbp,rax
  746. [RSP+11C0] 0x23B349D0000 (void*)
  747. [RSP+11C8] 0x9 (size_t)
  748. [RSP+11D0] 0x40 (size_t)
  749. [RSP+11D8] 0x23B00000000 (void*)
  750. [RSP+11E0] 0x7FFF0C6627D0 (void* -> usvfs_x64.dll+00B27D0)
  751. test rcx,rcx
  752. [RSP+11E8] 0x0 (size_t)
  753. [RSP+11F0] 0x0 (size_t)
  754. [RSP+11F8] 0x0 (size_t)
  755. [RSP+1200] 0x10 (size_t)
  756. [RSP+1208] 0x0 (size_t)
  757. [RSP+1210] 0x0 (size_t)
  758. [RSP+1218] 0x40 (size_t)
  759. [RSP+1220] 0x0 (size_t)
  760. [RSP+1228] 0x7FFF0C5BC850 (void* -> usvfs_x64.dll+000C850)
  761. mov rax,rcx
  762. [RSP+1230] 0x0 (size_t)
  763. [RSP+1238] 0x23B34B00000 (void*)
  764. [RSP+1240] 0x247A2C1D850 (void*)
  765. [RSP+1248] 0x7FFF7AEBBE86 (void* -> ntdll.dll+001BE86 RtlAllocateHeap)
  766. mov r14,rax
  767. [RSP+1250] 0x23B00000002 (void*)
  768. [RSP+1258] 0x0 (size_t)
  769. [RSP+1260] 0x30 (size_t)
  770. [RSP+1268] 0x0 (size_t)
  771. [RSP+1270] 0x0 (size_t)
  772. [RSP+1278] 0x0 (size_t)
  773. [RSP+1280] 0x0 (size_t)
  774. [RSP+1288] 0x4 (size_t)
  775. [RSP+1290] 0x0 (size_t)
  776. [RSP+1298] 0x0 (size_t)
  777. [RSP+12A0] 0x0 (size_t)
  778. [RSP+12A8] 0x23B34B00000 (void*)
  779. [RSP+12B0] 0x6FD72FFB89 (void*)
  780. [RSP+12B8] 0x7FFF7AEBBE86 (void* -> ntdll.dll+001BE86 RtlAllocateHeap)
  781. mov r14,rax
  782. [RSP+12C0] 0x2 (size_t)
  783. [RSP+12C8] 0x0 (size_t)
  784. [RSP+12D0] 0x0 (size_t)
  785. [RSP+12D8] 0x7FFF7AEBBE86 (void* -> ntdll.dll+001BE86 RtlAllocateHeap)
  786. mov r14,rax
  787. [RSP+12E0] 0x2 (size_t)
  788. [RSP+12E8] 0x0 (size_t)
  789. [RSP+12F0] 0x1CD4 (size_t)
  790. [RSP+12F8] 0x0 (size_t)
  791. [RSP+1300] 0x0 (size_t)
  792. [RSP+1308] 0x7FFF0C5BC850 (void* -> usvfs_x64.dll+000C850)
  793. mov rax,rcx
  794. [RSP+1310] 0x0 (size_t)
  795. [RSP+1318] 0x0 (size_t)
  796. [RSP+1320] 0x0 (size_t)
  797. [RSP+1328] 0x0 (size_t)
  798. [RSP+1330] 0x6FD72FF839 (void*)
  799. [RSP+1338] 0x7FFF7AEBC636 (void* -> ntdll.dll+001C636)
  800. mov eax,[1B518Eh]
  801. [RSP+1340] 0x0 (size_t)
  802. [RSP+1348] 0x0 (size_t)
  803. [RSP+1350] 0x23B368632D0 (void*)
  804. [RSP+1358] 0x23B4A2536C0 (void*)
  805. [RSP+1360] 0x1FFFFFFFFFFFFFFF (size_t)
  806. [RSP+1368] 0x7FFF0C69732A (void* -> usvfs_x64.dll+00E732A)
  807. test rax,rax
  808. [RSP+1370] 0x2 (size_t)
  809. [RSP+1378] 0x23B00050000 (void*)
  810. [RSP+1380] 0x23B349D4800 (void*)
  811. [RSP+1388] 0x7FF61EEA484C (void* -> Starfield.exe+079484C)
  812. jmp short 000000000000000Fh
  813. [RSP+1390] 0x23B13965120 (void*)
  814. [RSP+1398] 0x7FFF0C6973B9 (void* -> usvfs_x64.dll+00E73B9)
  815. test rax,rax
  816. [RSP+13A0] 0x55005C003A0043 (size_t)
  817. [RSP+13A8] 0x73007200650073 (size_t)
  818. [RSP+13B0] 0x69006E006F005C (size_t)
  819. [RSP+13B8] 0x41005C006C0078 (size_t)
  820. [RSP+13C0] 0x61004400700070 (size_t)
  821. [RSP+13C8] 0x4C005C00610074 (size_t)
  822. [RSP+13D0] 0x6C00610063006F (size_t)
  823. [RSP+13D8] 0x6100740053005C (size_t)
  824. [RSP+13E0] 0x65006900660072 (size_t)
  825. [RSP+13E8] 0x50005C0064006C (size_t)
  826. [RSP+13F0] 0x6900670075006C (size_t)
  827. [RSP+13F8] 0x74002E0073006E (size_t)
  828. [RSP+1400] 0x740078 (size_t)
  829. [RSP+1408] 0x0 (size_t)
  830. [RSP+1410] 0x23B36777D48 (void*)
  831. [RSP+1418] 0x7FFF0C66329E (void* -> usvfs_x64.dll+00B329E)
  832. mov rax,rbx
  833. [RSP+1420] 0x7FFF783B7678 (char*) "\x0f\x1fD"
  834. [RSP+1428] 0x6FD72FF8D9 (void*)
  835. [RSP+1430] 0x6FD72FFB38 (void*)
  836. [RSP+1438] 0x7FF61EEA484C (void* -> Starfield.exe+079484C)
  837. jmp short 000000000000000Fh
  838. [RSP+1440] 0x0 (size_t)
  839. [RSP+1448] 0x7FFF7833D63D (char*) "\x0f\x1fD"
  840. [RSP+1450] 0x7FFF0C6E3E58 (char*) "usvfs::hook_NtClose"
  841. [RSP+1458] 0x7FFF0C5BC900 (void* -> usvfs_x64.dll+000C900)
  842. mov rax,rdi
  843. [RSP+1460] 0x0 (size_t)
  844. [RSP+1468] 0x7FF621660045 (void* -> Starfield.exe+2F50045)
  845. mov rsi,rax
  846. [RSP+1470] 0xC0000024 (size_t)
  847. [RSP+1478] 0x5C (size_t)
  848. [RSP+1480] 0x2D8 (size_t)
  849. [RSP+1488] 0x6 (size_t)
  850. [RSP+1490] 0x0 (size_t)
  851. [RSP+1498] 0x7FF62165D715 (void* -> Starfield.exe+2F4D715)
  852. test al,al
  853. [RSP+14A0] 0x0 (size_t)
  854. [RSP+14A8] 0x23B36862F90 (SharedHeapAllocator*)
  855. [RSP+14B0] 0x23B36862F90 (SharedHeapAllocator*)
  856. [RSP+14B8] 0x7FF61EC9DA4B (void* -> Starfield.exe+058DA4B)
  857. mov rbx,rax
  858. [RSP+14C0] 0x10 (size_t)
  859. [RSP+14C8] 0x0 (size_t)
  860. [RSP+14D0] 0x2433B503E30 (void*)
  861. [RSP+14D8] 0x7FF61FEDB763 (void* -> Starfield.exe+17CB763)
  862. movzx ecx,word ptr [rbx+8]
  863. [RSP+14E0] 0x23B3B6CD490 (void*)
  864. [RSP+14E8] 0x23B3B6CCF40 (StorageTable::AsyncTableColumn<StorageTable::CloudParticle::Storage,StorageTable::CloudParticle::CloudParticleSortDataBuffer>*)
  865. [RSP+14F0] 0x2433A4BC018 (void*)
  866. [RSP+14F8] 0x7FF61FEE3327 (void* -> Starfield.exe+17D3327)
  867. mov r14d,ebx
  868. [RSP+1500] 0x23B3B6CDAE0 (char*) " @;;C\x02"
  869. [RSP+1508] 0x7FF61FEE2207 (void* -> Starfield.exe+17D2207)
  870. mov ecx,eax
  871. [RSP+1510] 0x2433A4BC000 (char*) "\x04"
  872. [RSP+1518] 0x6F00000004 (size_t)
  873. [RSP+1520] 0x23B3B6CCF40 (StorageTable::AsyncTableColumn<StorageTable::CloudParticle::Storage,StorageTable::CloudParticle::CloudParticleSortDataBuffer>*)
  874. [RSP+1528] 0x7FF61FED9446 (void* -> Starfield.exe+17C9446)
  875. and dword ptr [rbx+30h],0
  876. [RSP+1530] 0x2433B503E30 (void*)
  877. [RSP+1538] 0x6FD72FFAA8 (void*)
  878. [RSP+1540] 0x23B3B6CCF40 (StorageTable::AsyncTableColumn<StorageTable::CloudParticle::Storage,StorageTable::CloudParticle::CloudParticleSortDataBuffer>*)
  879. [RSP+1548] 0x7FF621C549EC (void* -> Starfield.exe+35449EC)
  880. mov [rax],ebp
  881. [RSP+1550] 0x2433A4BC000 (char*) "\x04"
  882. [RSP+1558] 0x4 (size_t)
  883. [RSP+1560] 0x2433A4BC000 (char*) "\x04"
  884. [RSP+1568] 0x6F00000004 (size_t)
  885. [RSP+1570] 0x6FD72FF9D0 (char*) "\x01"
  886. [RSP+1578] 0x0 (size_t)
  887. [RSP+1580] 0x0 (size_t)
  888. [RSP+1588] 0x7FF6218ECF49 (void* -> Starfield.exe+31DCF49)
  889. mov rbx,[rsp+2D0h]
  890. [RSP+1590] 0x0 (size_t)
  891. [RSP+1598] 0x6F00000000 (size_t)
  892. [RSP+15A0] 0x7FF600000001 (size_t)
  893. [RSP+15A8] 0x0 (size_t)
  894. [RSP+15B0] 0xBC (size_t)
  895. [RSP+15B8] 0x23B0E7F2EE0 (void*)
  896. [RSP+15C0] 0x0 (size_t)
  897. [RSP+15C8] 0x2433B57DE30 (void*)
  898. [RSP+15D0] 0x1D4 (size_t)
  899. [RSP+15D8] 0x23B3958C880 (void*)
  900. [RSP+15E0] 0x2 (size_t)
  901. [RSP+15E8] 0x7FF620CE33AE (void* -> Starfield.exe+25D33AE)
  902. call 0000000000B0DFFAh
  903. [RSP+15F0] 0x0 (size_t)
  904. [RSP+15F8] 0x0 (size_t)
  905. [RSP+1600] 0x7FF623A977D0 (void* -> Starfield.exe+53877D0)
  906. and [rdx+rdx*4+1Fh],ch
  907. [RSP+1608] 0x11400C (size_t)
  908. [RSP+1610] 0x0 (size_t)
  909. [RSP+1618] 0x0 (size_t)
  910. [RSP+1620] 0x0 (size_t)
  911. [RSP+1628] 0x0 (size_t)
  912. [RSP+1630] 0x0 (size_t)
  913. [RSP+1638] 0x10 (size_t)
  914. [RSP+1640] 0x0 (size_t)
  915. [RSP+1648] 0x1A (size_t)
  916. [RSP+1650] 0x0 (size_t)
  917. [RSP+1658] 0x6FD72FFB48 (void*)
  918. [RSP+1660] 0x0 (size_t)
  919. [RSP+1668] 0x0 (size_t)
  920. [RSP+1670] 0x7FF600000000 (size_t)
  921. [RSP+1678] 0x0 (size_t)
  922. [RSP+1680] 0x0 (size_t)
  923. [RSP+1688] 0x0 (size_t)
  924. [RSP+1690] 0x0 (size_t)
  925. [RSP+1698] 0x0 (size_t)
  926. [RSP+16A0] 0x0 (size_t)
  927. [RSP+16A8] 0x23B4A302F30 (void*)
  928. [RSP+16B0] 0x0 (size_t)
  929. [RSP+16B8] 0x10 (size_t)
  930. [RSP+16C0] 0x0 (size_t)
  931. [RSP+16C8] 0x10 (size_t)
  932. [RSP+16D0] 0x0 (size_t)
  933. [RSP+16D8] 0x0 (size_t)
  934. [RSP+16E0] 0x0 (size_t)
  935. [RSP+16E8] 0x0 (size_t)
  936. [RSP+16F0] 0x0 (size_t)
  937. [RSP+16F8] 0x0 (size_t)
  938. [RSP+1700] 0x0 (size_t)
  939. [RSP+1708] 0x0 (size_t)
  940. [RSP+1710] 0x2 (size_t)
  941. [RSP+1718] 0x7FF61ECB1797 (void* -> Starfield.exe+05A1797)
  942. mov rcx,[rbp+18h]
  943. [RSP+1720] 0x0 (size_t)
  944. [RSP+1728] 0x0 (size_t)
  945. [RSP+1730] 0x0 (size_t)
  946. [RSP+1738] 0x0 (size_t)
  947. [RSP+1740] 0x0 (size_t)
  948. [RSP+1748] 0x2433B57DE30 (void*)
  949. [RSP+1750] 0x6FD72FFDB0 (void*)
  950. [RSP+1758] 0x23B3958C880 (void*)
  951. [RSP+1760] 0x23B0E7F6088 (stl::unique_function_impl::detail::TypeErasedFuncImpl<<lambda_8291e7d1e643b42ca1ce574da97d71a6>,void *>*)
  952. [RSP+1768] 0x7FF620CEDB4C (void* -> Starfield.exe+25DDB4C)
  953. mov qword ptr [4472564h],20000h
  954. [RSP+1770] 0x23B0E7F6088 (stl::unique_function_impl::detail::TypeErasedFuncImpl<<lambda_8291e7d1e643b42ca1ce574da97d71a6>,void *>*)
  955. [RSP+1778] 0x23B3958D098 (BSJobs2::Detail::GroupThread*)
  956. [RSP+1780] 0xAF3D3CE84F (size_t)
  957. [RSP+1788] 0x6F00000002 (size_t)
  958. [RSP+1790] 0x6FD72FFA20 (void*)
  959. [RSP+1798] 0x6FD72FFA24 (void*)
  960. [RSP+17A0] 0x6FD72FFA28 (void*)
  961. [RSP+17A8] 0x6FD72FFAD8 (char*) "0/0J;\x02"
  962. [RSP+17B0] 0x6FD72FFAE8 (char*) "\x10"
  963. [RSP+17B8] 0x6FD72FFAF8 (char*) "\x10"
  964. [RSP+17C0] 0x6FD72FFA68 (char*) "\x10"
  965. [RSP+17C8] 0x7FF621911DCD (void* -> Starfield.exe+3201DCD)
  966. mov eax,[rsp+30h]
  967. [RSP+17D0] 0x7FF62726A2A0 (Particles::ParticleEmitterEngine*)
  968. [RSP+17D8] 0x6FD72FFA18 (void*)
  969. [RSP+17E0] 0x6FD72FFA1C (void*)
  970. [RSP+17E8] 0x6FD72FFA20 (void*)
  971. [RSP+17F0] 0x0 (size_t)
  972. [RSP+17F8] 0x0 (size_t)
  973. [RSP+1800] 0x0 (size_t)
  974. [RSP+1808] 0x7FF61ECEEC39 (void* -> Starfield.exe+05DEC39)
  975. add rsp,28h
  976. [RSP+1810] 0x0 (size_t)
  977. [RSP+1818] 0x0 (size_t)
  978. [RSP+1820] 0x0 (size_t)
  979. [RSP+1828] 0x0 (size_t)
  980. [RSP+1830] 0x23B3958C880 (void*)
  981. [RSP+1838] 0x7FF62168731A (void* -> Starfield.exe+2F7731A)
  982. vmovaps xmm6,[rsp+60h]
  983. [RSP+1840] 0x6FD72FFDB0 (void*)
  984. [RSP+1848] 0x0 (size_t)
  985. [RSP+1850] 0x6FD72FFCE8 (void*)
  986. [RSP+1858] 0x7FFF7833CE1F (char*) "\x0f\x1fD"
  987. [RSP+1860] 0x7FF63BCA11C0 (size_t)
  988. [RSP+1868] 0x0 (size_t)
  989. [RSP+1870] 0x0 (size_t)
  990. [RSP+1878] 0x7FF624DF3DF8 (void* -> Starfield.exe+66E3DF8)
  991. add [rax],al
  992. [RSP+1880] 0x0 (size_t)
  993. [RSP+1888] 0x0 (size_t)
  994. [RSP+1890] 0x0 (size_t)
  995. [RSP+1898] 0x0 (size_t)
  996. [RSP+18A0] 0x0 (size_t)
  997. [RSP+18A8] 0x6FD72FFDB0 (void*)
  998. [RSP+18B0] 0x23B3958C880 (void*)
  999. [RSP+18B8] 0xAF3D3CE84F (size_t)
  1000. [RSP+18C0] 0x23B0E7F6088 (stl::unique_function_impl::detail::TypeErasedFuncImpl<<lambda_8291e7d1e643b42ca1ce574da97d71a6>,void *>*)
  1001. [RSP+18C8] 0x7FF621B66A9D (void* -> Starfield.exe+3456A9D)
  1002. mov rdx,rbx
  1003. [RSP+18D0] 0x243399A3FE8 (BSService::Detail::TCmd<<lambda_e316da0f9c69170033b41e90e263df00>,void>*)
  1004. [RSP+18D8] 0x23B00000000 (void*)
  1005. [RSP+18E0] 0x0 (size_t)
  1006. [RSP+18E8] 0x0 (size_t)
  1007. [RSP+18F0] 0x7FF62746F140 (char*) "V\x06"
  1008. [RSP+18F8] 0x7FF621B676F9 (void* -> Starfield.exe+34576F9)
  1009. jmp short 0000000000000078h
  1010. [RSP+1900] 0x7FF62518BA00 (void* -> Starfield.exe+6A7BA00)
  1011. add [rax],al
  1012. [RSP+1908] 0x0 (size_t)
  1013. [RSP+1910] 0xAF3D3CE84F (size_t)
  1014. [RSP+1918] 0x23B3958C880 (void*)
  1015. [RSP+1920] 0x7FF623CA9E00 (void* -> Starfield.exe+5599E00)
  1016. [RSP+1928] 0x23B3958D098 (BSJobs2::Detail::GroupThread*)
  1017. [RSP+1930] 0x243399A3FE8 (BSService::Detail::TCmd<<lambda_e316da0f9c69170033b41e90e263df00>,void>*)
  1018. [RSP+1938] 0x2 (size_t)
  1019. [RSP+1940] 0x0 (size_t)
  1020. [RSP+1948] 0x23B3958D098 (BSJobs2::Detail::GroupThread*)
  1021. [RSP+1950] 0x7FF623CA9E08 (void* -> Starfield.exe+5599E08)
  1022. adc [rbp-6Eh],ch
  1023. [RSP+1958] 0x0 (size_t)
  1024. [RSP+1960] 0x7FF62518BA40 (BSFixedSizeBlockAllocator::TAlloc<4294967296,16777216,128>*)
  1025. [RSP+1968] 0x7FF621B65810 (void* -> Starfield.exe+3455810)
  1026. mov ecx,[31C3464h]
  1027. [RSP+1970] 0xAF3D3CE84F (size_t)
  1028. [RSP+1978] 0x0 (size_t)
  1029. [RSP+1980] 0x243399A3FE8 (BSService::Detail::TCmd<<lambda_e316da0f9c69170033b41e90e263df00>,void>*)
  1030. [RSP+1988] 0x1 (size_t)
  1031. [RSP+1990] 0x0 (size_t)
  1032. [RSP+1998] 0x7FF621B67CAE (void* -> Starfield.exe+3457CAE)
  1033. xor eax,eax
  1034. [RSP+19A0] 0x7FF62518BA40 (BSFixedSizeBlockAllocator::TAlloc<4294967296,16777216,128>*)
  1035. [RSP+19A8] 0x7FF623CA9E08 (void* -> Starfield.exe+5599E08)
  1036. adc [rbp-6Eh],ch
  1037. [RSP+19B0] 0x23B3958D098 (BSJobs2::Detail::GroupThread*)
  1038. [RSP+19B8] 0x7FF623CA9E08 (void* -> Starfield.exe+5599E08)
  1039. adc [rbp-6Eh],ch
  1040. [RSP+19C0] 0x0 (size_t)
  1041. [RSP+19C8] 0x7FF62165D411 (void* -> Starfield.exe+2F4D411)
  1042. mov rcx,[3AFF2CFh]
  1043. [RSP+19D0] 0x0 (size_t)
  1044. [RSP+19D8] 0x0 (size_t)
  1045. [RSP+19E0] 0x0 (size_t)
  1046. [RSP+19E8] 0x7FF6272484C8 (BSThreadEvent::`anonymous namespace'::Source*)
  1047. [RSP+19F0] 0x23B3958D098 (BSJobs2::Detail::GroupThread*)
  1048. [RSP+19F8] 0x0 (size_t)
  1049. [RSP+1A00] 0x0 (size_t)
  1050. [RSP+1A08] 0x0 (size_t)
  1051. [RSP+1A10] 0x7FF623CA9E08 (void* -> Starfield.exe+5599E08)
  1052. adc [rbp-6Eh],ch
  1053. [RSP+1A18] 0x6FD72FFE20 (void*)
  1054. [RSP+1A20] 0x7FF6272484C8 (BSThreadEvent::`anonymous namespace'::Source*)
  1055. [RSP+1A28] 0x0 (size_t)
  1056. [RSP+1A30] 0x0 (size_t)
  1057. [RSP+1A38] 0x0 (size_t)
  1058. [RSP+1A40] 0x0 (size_t)
  1059. [RSP+1A48] 0x7FFF79CAE8D7 (void* -> KERNEL32.DLL+002E8D7 BaseThreadInitThunk)
  1060. mov ecx,eax
  1061. [RSP+1A50] 0x0 (size_t)
  1062. [RSP+1A58] 0x0 (size_t)
  1063. [RSP+1A60] 0x0 (size_t)
  1064. [RSP+1A68] 0x0 (size_t)
  1065. [RSP+1A70] 0x0 (size_t)
  1066. [RSP+1A78] 0x7FFF7AF5BF2C (void* -> ntdll.dll+00BBF2C RtlUserThreadStart)
  1067. jmp short 000000000000002Ah
  1068. [RSP+1A80] 0x0 (size_t)
  1069. [RSP+1A88] 0x0 (size_t)
  1070. [RSP+1A90] 0x4F0FFFFFB30 (size_t)
  1071. [RSP+1A98] 0x4D0FFFFFB30 (size_t)
  1072. [RSP+1AA0] 0x21 (size_t)
  1073. [RSP+1AA8] 0x7FFF7840BAD0 (void* -> KERNELBASE.dll+011BAD0 UnhandledExceptionFilter)
  1074. mov [rsp+10h],rbx
  1075. [RSP+1AB0] 0x6FD72FD540 (void*)
  1076. [RSP+1AB8] 0x6FD72FD540 (void*)
  1077. [RSP+1AC0] 0x0 (size_t)
  1078. [RSP+1AC8] 0x0 (size_t)
  1079. [RSP+1AD0] 0x0 (size_t)
  1080. [RSP+1AD8] 0x0 (size_t)
  1081. [RSP+1AE0] 0x0 (size_t)
  1082. [RSP+1AE8] 0x0 (size_t)
  1083. [RSP+1AF0] 0x0 (size_t)
  1084. [RSP+1AF8] 0x0 (size_t)
  1085. [RSP+1B00] 0x0 (size_t)
  1086. [RSP+1B08] 0x0 (size_t)
  1087. [RSP+1B10] 0x0 (size_t)
  1088. [RSP+1B18] 0x0 (size_t)
  1089. [RSP+1B20] 0x0 (size_t)
  1090. [RSP+1B28] 0x0 (size_t)
  1091. [RSP+1B30] 0x0 (size_t)
  1092. [RSP+1B38] 0x0 (size_t)
  1093. [RSP+1B40] 0x0 (size_t)
  1094. [RSP+1B48] 0x0 (size_t)
  1095. [RSP+1B50] 0x0 (size_t)
  1096. [RSP+1B58] 0x0 (size_t)
  1097. [RSP+1B60] 0x0 (size_t)
  1098. [RSP+1B68] 0x0 (size_t)
  1099. [RSP+1B70] 0x0 (size_t)
  1100. [RSP+1B78] 0x0 (size_t)
  1101. [RSP+1B80] 0x0 (size_t)
  1102. [RSP+1B88] 0x0 (size_t)
  1103. [RSP+1B90] 0x0 (size_t)
  1104. [RSP+1B98] 0x0 (size_t)
  1105. [RSP+1BA0] 0x0 (size_t)
  1106. [RSP+1BA8] 0x0 (size_t)
  1107. [RSP+1BB0] 0x0 (size_t)
  1108. [RSP+1BB8] 0x0 (size_t)
  1109. [RSP+1BC0] 0x0 (size_t)
  1110. [RSP+1BC8] 0x0 (size_t)
  1111.  
  1112. MODULES:
  1113. ADVAPI32.dll
  1114. Address: 0x7FFF7A550000
  1115. SHA: 094CCDED55729BC8F1284D308FE9B7EB5F6B187E4862CDC4C6B8885C03BE9E7F11F6E2D3821D756102A96510B6B6D1D3384BB9B363B613A7D014C85209598E45
  1116. Version: v10.0.26100.1
  1117. amdihk64.dll
  1118. Address: 0x7FFF6BCD0000
  1119. SHA: BFB9D4D2D009A3F6CC59ADAEFC1916D6F2E8F0D0C2DA155E0CBA6C8AD8ADD9715D90DEA1CE1856A3AC7E6411F344151E18EF48162E64339DC495B5863624C355
  1120. Version: v2.0.0.1788
  1121. amdxc64.dll
  1122. Address: 0x7FFEC2EB0000
  1123. SHA: E5D867264A04258AC07B71C369B5D7600BD6ED218FB83DA0C733A0DEDD8D21320DB7318347F956A90B0B5CA0898F923BFEA2C04B4E567078DAC49BFFB1329190
  1124. Version: v8.18.10.493
  1125. amsi.dll
  1126. Address: 0x7FFF67360000
  1127. SHA: 32370FC4654802A9FE15DC25A04C71803BA0789DA308604C2BD0D7D3B94724FE3A4F05A0A8618AD02A854200264EC3AAAA3340F720423F3D763B424B6A4649CD
  1128. Version: v10.0.26100.1150
  1129. apphelp.dll
  1130. Address: 0x7FFF75540000
  1131. SHA: 47892AFB0F7368B0E54CC57385D62C4D07245E02511C59E95ADEA8517965A68F16A42839BFE282D9F51151E315FB5039F05100FC552FDE974137D7D44DBD9E97
  1132. Version: v10.0.26100.1
  1133. aswAMSI.dll
  1134. Address: 0x7FFF63420000
  1135. SHA: DEB48ED3C2A7928D402524D06AE17B174444468EA25C495C1ECBE1D6409C59FA3E709793373A9B6587DFEFFEB41B99C2D53532CD8B30A8CCEF4E3245C003E04B
  1136. Version: v24.12.9725
  1137. aswhook.dll
  1138. Address: 0x7FFF5A3A0000
  1139. SHA: 65CA94822518352F979E9754DFA83D7D5C623CCAD2E38AFA2C3650F37EDB6B1AD30EF35DC02F7B95CAB3185278EAA2237F0FEBE7141A7AA107BD9EAA369DDF7C
  1140. Version: v24.12.9725
  1141. atiadlxx.dll
  1142. Address: 0x7FFF65E50000
  1143. SHA: 9EF6CF73F7FF95B3FD1B44DAF38108C2326AF06519378F96420D6AF59455AF0EDA39E85D6C06DF485F8360AB2BD9DA01B5FEAF3B458A1A356885FF7F161274CD
  1144. Version: v7.24.20.1575
  1145. AUDIOSES.DLL
  1146. Address: 0x7FFF64620000
  1147. SHA: A577D38F7AB75FC948448F003661691CE969D01FF7042AFB899E50919BC77C203E5F32C7B099F1C9E8D88574E2C990133C4B9BB4C98CCBAB9C54233636CB3E42
  1148. Version: v10.0.26100.1
  1149. AutoHideHUD.dll
  1150. Address: 0x7FFF51A40000
  1151. SHA: C060341855F2A565B122DADCDC99227F27203CDA5DFE4023FAEEC0CA29DB0E25B045F8385B1E9D1197F723529BF7A0CAC06AC43CE484A98F9E62690617E75220
  1152. Version: v3.5.0
  1153. BakaAchievementEnabler.dll
  1154. Address: 0x7FFF4F750000
  1155. SHA: BD9B907DB16E30FC74B219B129AA75DEDD294F7239222FCFD09FBE498A2EFD60A09CA3BDE021F7AE4FBAF6AC8AC9F9EA6C6DF243D6E948645BE8D26BD959836A
  1156. Version: v5.0.0
  1157. BayAndDocker-Count-Mod.dll
  1158. Address: 0x7FFF63C20000
  1159. SHA: B85470BEECDC6570ABA30D358ACC0DD0AA297F01D210CEDA561042C8ED0CBE61C6BC91F768A875BAC3CB413BECBFFACC014AE66EB346D1AFA807EFB012EA00BA
  1160. bcrypt.dll
  1161. Address: 0x7FFF77B70000
  1162. SHA: 30B839FB878EC5892153D386C7BC5BFBCD35C143E32FFD1C7E7BE9E780283D8666F7A8B6F0A30951847F1AC06AC710E663A59E737D85AE275E7D99CC345CB7CD
  1163. Version: v10.0.26100.1
  1164. bcryptPrimitives.dll
  1165. Address: 0x7FFF78900000
  1166. SHA: 645CD6952A4FDC77D054BCF8572751C67A8165380C971A74CBF22E68F1B84CE4AD38ADE99D91666858FF8E79764EB8DF7258FE2F7633F963FA53B178573548FF
  1167. Version: v10.0.26100.3037
  1168. bink2w64.dll
  1169. Address: 0x7FFF51CB0000
  1170. SHA: 61AB61B895332AE98F5491D07975E5D6A1E42747DE1AE292298CB008AB63AB410F8A7684DB7DDA694EBCC351783D68EDB167B4EEEAB74DBEC6C1BB238E62BEED
  1171. Version: v2023.2.0
  1172. Build-Below-Bay-Mod.dll
  1173. Address: 0x7FFF621E0000
  1174. SHA: F5401DD79D5F7990102D59129C5D9ADBD53998F16F521FFA3C8A205F239D0CFEE8B56DC1BF98DFE241341556DCA1ACC48D30FD63CB1BD1B6E03B057E24E1A9B9
  1175. CassiopeiaPapyrusExtender.dll
  1176. Address: 0x7FFF1CB60000
  1177. SHA: 18FB00C8913E6B9D23FE4370C99F19B5F0FABFAC1A6C624B884E2C20834D2FAAA9BA24674776DE6193B027A5ACCF7833D3F05174990424720C9A0E50015EC7D1
  1178. Version: v2.7.0
  1179. CFGMGR32.dll
  1180. Address: 0x7FFF77ED0000
  1181. SHA: C3353912DFEE3F341BF59069CFAA0868DADFF3F8E7384F58D590F5E096066AD6EC252B8A4EDB9C40F1017B0FE9DE200071A7998EAF0CC295867CD5AFEC3B2924
  1182. Version: v10.0.26100.3037
  1183. clbcatq.dll
  1184. Address: 0x7FFF79D50000
  1185. SHA: 1EBE6B579BB73E21ABFC7FEF215D2C55B14121D489A9D5D84288B0FB2FB7DED6D0BEAE78E248AB738395737E61DEE11976EF5AFAC506E5004E7483126FE5AD63
  1186. Version: v2001.12.10941.16384
  1187. combase.dll
  1188. Address: 0x7FFF7A610000
  1189. SHA: A822C5D839A29BA2521E2ED866156B2E3AE94F0B32FDFE9EF1AC2CB91071C304D37322DDCBCE05E8359200C171AAD36915AEB17FF749A516E99A1493EF5467B8
  1190. Version: v10.0.26100.1
  1191. CONCRT140.dll
  1192. Address: 0x7FFF1D620000
  1193. SHA: 6F3EC746EC10334692E930B515A37F3D5BD342CA60A49C4298924BE933262D7D782DE8A11D4F865A30A5AA22C5515059E3E39A92A61AE5FAE53622CEAA7D5C4B
  1194. Version: v14.42.34433
  1195. ConsoleCommandRunner.dll
  1196. Address: 0x7FFF4D3F0000
  1197. SHA: 41C02A0A32FCD260B68C52BB5DF7CEC56432F72A09B67B0C422D339772EC6972E11EE8CC7B2775EF05C087361D2880A0BCEEABB48AB2BD008D8D219B674C2237
  1198. Version: v1.5.0
  1199. CoreMessaging.dll
  1200. Address: 0x7FFF75140000
  1201. SHA: 22E82779D5E31ED61E49EB2D4748F6B19E6EDF0F5DE4DDE2F5855C1916E18AE66A4B31A136A10ED0B1B1C3559862A6216A24C6F1A88FFA823F34556A3C6E38DC
  1202. Version: v10.0.26100.1882
  1203. CoreUIComponents.dll
  1204. Address: 0x7FFF71DE0000
  1205. SHA: E3171663547DB85CECA9FC684C9506519E06942A24274F2DF773C9662178AF6CAFA0B5411655A08D8673E8ED112EBEF2221352D63782524E0D4D8F0C85455212
  1206. Version: v10.0.26100.3037
  1207. CRYPT32.dll
  1208. Address: 0x7FFF786F0000
  1209. SHA: 016B5108C066333C474AEA171A262C98A1F6FAD9F9F67082E35E31A2DD2A725EACA56B3EC48C7D1C564470C9F143E1661AFC99E90790C5AD486466A33B2DFC6C
  1210. Version: v10.0.26100.1
  1211. CRYPTBASE.DLL
  1212. Address: 0x7FFF778B0000
  1213. SHA: 5C8F522617075762D11AB3A459DD58BEE0D594892168010D1DF4998B6145761F618D5B0CCCC1DF130B2D5C1E951F3B1AAE9A872FBCA1796EBDBF7FA9BF4E94B1
  1214. Version: v10.0.26100.2894
  1215. cryptnet.dll
  1216. Address: 0x7FFF6A8E0000
  1217. SHA: 2BC9DC6188E6DBEC3A68F00145A049727E06371C9E20897F22F2556213933DB175BE206D36007B097CD660C83D754D97939182A475AD267FE11B39CDB487B2DD
  1218. Version: v10.0.26100.3037
  1219. cryptsp.dll
  1220. Address: 0x7FFF77890000
  1221. SHA: D5F162272852371A795AD1EE6402F82572C3C6C048999063C97DA50DDA68CF2E2273E8C72FD63089151C09C5808974F6F830B7A0CE3834A7ACD1DAE90F9A822B
  1222. Version: v10.0.26100.2454
  1223. d3d12.dll
  1224. Address: 0x7FFF26E60000
  1225. SHA: ABD19B1D097A4E66652A33825057805312A135E195616082CB1EF023CED6574CF8DE381EB92B7070439C9AB2D1E08038FEC583BB14E5EF8B086CCEC546346A6E
  1226. Version: v10.0.26100.3037
  1227. D3D12Core.dll
  1228. Address: 0x7FFEE1180000
  1229. SHA: 7F1AC557948A1D0CD6938E3DFE7D1D475F8E927A9E61BF1AB6FD42932D7FFD8268469134E55AD488C636AF538AFCD8A48413A91187FA2FCE0DE289C602982AB7
  1230. Version: v10.0.26100.3037
  1231. d3dcompiler_47.dll
  1232. Address: 0x7FFF738B0000
  1233. SHA: B02FA1EAEEFB7479F51E9A3288E5E79E9F8D5C9A25A7877398A5930A5FECDE928AB13AAEB3C1A530FB92C8E93968D227088126157ADE39B4210C1B90041764B8
  1234. Version: v10.0.26100.3037
  1235. D3DSCache.dll
  1236. Address: 0x7FFF0AAA0000
  1237. SHA: DBF360B019E6AC8C67C292409F50C33A4170C370648AF94B4D184A56D1E97637F1A8505AB2ABB3BC4293ADCDB31D77F80DA269809F1A505687D6356FCB837762
  1238. Version: v10.0.26100.1
  1239. dbgcore.DLL
  1240. Address: 0x7FFF66390000
  1241. SHA: 16AF22C86361FE0AE4C31FBC8EFB0B0E9CF0C26B522D7FE8F77B7ED975E1100DE679B9E9C73B0215B8AAE2742348BBB91440D9884119109B06DA0300D7CAB1B9
  1242. Version: v10.0.26100.3037
  1243. dbghelp.dll
  1244. Address: 0x7FFF69BC0000
  1245. SHA: BA32DD5A10FFED1AC8784BC4F841CADC477BE3507D39C9DE195577A5AC56DA9F12E96672129B66FB02603FF953646D86E85856ACC08AEDF3264FAD5AA68B87EC
  1246. Version: v10.0.26100.3037
  1247. dcomp.dll
  1248. Address: 0x7FFF74AC0000
  1249. SHA: 8328EF6F8D5005BBB4347279387CE84741D7B1C0F815DB4550619E9D90C34DA28725DD744DC9A9BE341BCC511F3BE1A5D655472BCE727112FD505B7E957BBD96
  1250. Version: v10.0.26100.3037
  1251. devobj.dll
  1252. Address: 0x7FFF77EA0000
  1253. SHA: 701FA93590C1453301873595A66E4B3BC9751F55D55220BF0E905641496977EA1ECC7654E5264B4D250646EB4B795387470F044B65C5B3123FF62BEF4A84761C
  1254. Version: v10.0.26100.1150
  1255. dhcpcsvc.DLL
  1256. Address: 0x7FFF6C860000
  1257. SHA: 62C072C59F6EF06BCC65A9D464E7275CF9ABD3B169BEB10636743E6D4D6C3F60C061F003E5D28443298EBA2835247BADACD651C949A4E149EEDB480BB57894E7
  1258. Version: v10.0.26100.1
  1259. dinput8.dll
  1260. Address: 0x7FFF4F970000
  1261. SHA: E864B7590C5D94ADBB0315E7E8E58FBFF0C5E79626015EF525299AAF5BEB0B40D5C25B2A10AC6E1FBCD32650CE40592477CC4AACE41C75FCF6FB6B063353257A
  1262. Version: v10.0.26100.1
  1263. directxdatabasehelper.dll
  1264. Address: 0x7FFF75750000
  1265. SHA: AC4C3CE015369EAA88A50D8FAC5149B6CD499D1147BA47D212AE356696A133E88E48F65518562D252378D0ED8079ED9937E2A08744453EE38F800EAC3C1795C5
  1266. Version: v10.0.26100.3037
  1267. DNSAPI.dll
  1268. Address: 0x7FFF76BA0000
  1269. SHA: 7FA50AAFF84455FAE1B42BF016CECB0778BB8B7695A5537A8E1585A0F1661DBFB9AE312FF95D7D288486DA50BFA5B2DF6C3F81A6DB7D986DE33DF6605DB9A415
  1270. Version: v10.0.26100.1591
  1271. DPAPI.DLL
  1272. Address: 0x7FFF77F60000
  1273. SHA: 3E832A4BC1567C41DA538CE2EF401C13F139A37056E5F49E413899E0D47590F0DA3B1674EEA2D4193183E067ABC45B7D2D5676C91471261D98391432E0D0BD99
  1274. Version: v10.0.26100.1
  1275. drvstore.dll
  1276. Address: 0x7FFF6A760000
  1277. SHA: FA364EC56604F8357EACC37CB68C5BABF5258C2C7251A6BE43E598FEAA2063D8BC69BE646EEC51EBA0CE607B4DD21D2DA0B035DC242191ABE12BA43958048682
  1278. Version: v10.0.26100.3037
  1279. DSOUND.DLL
  1280. Address: 0x7FFF15E20000
  1281. SHA: 25258F4D90200B84F158BB1537D4817519A12234F0D69F7FE7ED884E226EFEC5079B39ABE2B5A40BD900FE3EAEE976EF443D17AD05B0F63A39CF8A00826100E6
  1282. Version: v10.0.26100.1
  1283. dwmapi.dll
  1284. Address: 0x7FFF75900000
  1285. SHA: 7B35F862FC2EE78005E58C1D25A9F03DEFB2B5A5E1A3CF94EB0F3B9BE9EF0B2CDEB6151D7F47FF11D7E45273465416F406608546964B23CEA4120BBE8FC6D269
  1286. Version: v10.0.26100.1
  1287. dxcore.dll
  1288. Address: 0x7FFF75700000
  1289. SHA: 46A63C29E1ECAD9AFFFB0E25EBD800DF882C370EFDD019338463660380C0CDBE060D612284E2F67B1EE648605C395CAA9B05F2E031FFF1CF47C7EAC71DC8FA21
  1290. Version: v10.0.26100.3037
  1291. dxgi.dll
  1292. Address: 0x7FFF4ED40000
  1293. SHA: A387FE298A899AADFA12D08BA011BCE08309D687F080DE41A5AFD797C0CA0258B36858461FD91CF71D5A45AF420E34771423EC9C6E14237ADF4CBAF3B8AC6ED6
  1294. Version: v6.3.3.1924
  1295. dxgi.dll
  1296. Address: 0x7FFF757B0000
  1297. SHA: A0D9841FCBAB14751F61BD7EF3F5D0C7E75071CA945C6367CD02BBB70F122B6937BBB8CB631E686961C0F04D0641864DE84F1A843403F4AF2317C3EC702B2063
  1298. Version: v10.0.26100.3037
  1299. fastprox.dll
  1300. Address: 0x7FFF677A0000
  1301. SHA: 5B0EC74E07EB2A87F2ABDDB9706196F6C41B9A3C166050BCCFC0D542F215CB86C8652E4687F37AF46FFD012534D476A3E9DB942A12EB85B029ABAAB41E61649B
  1302. Version: v10.0.26100.3037
  1303. fwpuclnt.dll
  1304. Address: 0x7FFF6BDD0000
  1305. SHA: F50EBD43DA6ACACBDF8092F14483F3A0C8F6087BBD6C5C8A3A96C414A43348F4403029C2A465B1BF706FF855358ADC23D6D5420AA44A003E92010CCAC63DB2A0
  1306. Version: v10.0.26100.3037
  1307. gameoverlayrenderer64.dll
  1308. Address: 0x7FFF23B00000
  1309. SHA: CC9731FA8A3AD5101EB9ACDB289E3906C02DF66D6527FC6B8E476CC67F79976649988B930DD74614EA391299C2EE2F2BBC7EE9B547708095569A64FF326B214B
  1310. Version: v9.48.97.91
  1311. GDI32.dll
  1312. Address: 0x7FFF7A9A0000
  1313. SHA: 75F91614AD159A37FD599186FC8CCA3EE9C3EFEAC6E96C1F3309ABE7F902904F95342B4BACDC8544EEB6123250302C2BBD26334F2DAAE34182750C5B548B5514
  1314. Version: v10.0.26100.2033
  1315. gdi32full.dll
  1316. Address: 0x7FFF78AF0000
  1317. SHA: C1071FF6A2E0253037019342EBAA16ED8971CB465CACB7E25B1FCC52BC85F8BF7876B2A76CA59097471EC6DF4B57F661E53A31F31B0C4C15E4ADA81EB12CD79E
  1318. Version: v10.0.26100.3037
  1319. gpapi.dll
  1320. Address: 0x7FFF775F0000
  1321. SHA: 148615E9C84CB321A9A3BB2FE03FF3F1CA839335476CDB3E1B7D006CED08E1246E5BD0216290F62550F247AE82696AB43DB570FBDB4500B586BCD768177A7BB6
  1322. Version: v10.0.26100.1
  1323. HID.DLL
  1324. Address: 0x7FFF767C0000
  1325. SHA: 544539016E5310BAD14FAEF413C0519200B7A93BCFEDD6005888D7E537047261882CC3D359F7F9FCC0500D3DDA8B89BE5F842830DE9B871544E2ABD69ACC2E25
  1326. Version: v10.0.26100.1
  1327. iertutil.dll
  1328. Address: 0x7FFF62470000
  1329. SHA: 1604985B443AFE1ADF0D5F828497A913B049FE54FA5583777FEAE01C3CB43F60995E890771E173B6D19F0D909973363E213B9F8960E448B21A6D33B6143DFA17
  1330. Version: v11.0.26100.1
  1331. imagehlp.dll
  1332. Address: 0x7FFF78F60000
  1333. SHA: 60306F222CD4FE32CE5BC2E5CFF52F44E547DDF67583941440AC6A7C2853626BB1728FAC813AB184AC26ADB7E16FE1EF6D52FF5F228BEE64D94248DA9E8A4ABC
  1334. Version: v10.0.26100.1150
  1335. IMM32.dll
  1336. Address: 0x7FFF7A510000
  1337. SHA: 746D7E040A487E468CD4A853C47BC5EBA2C46B3598FBE4A8CE851D310C2D351B8CFE8B8777400C94D1C96406C69A6377C3D2B890E6DFB2762ECEAA8196CDA480
  1338. Version: v10.0.26100.1150
  1339. inputhost.dll
  1340. Address: 0x7FFF5EFC0000
  1341. SHA: F7968D86C9C9A7F8A266497E234B94F013803E83EC5A767A69EB5ACD143E97AF26AB830A9271D8456E617322461BDCEB12BC4BC440A259E4D5A7FC4A8468564B
  1342. Version: v10.0.26100.3037
  1343. IPHLPAPI.DLL
  1344. Address: 0x7FFF76B00000
  1345. SHA: E837A6A330FB7738B200E35D48CE513BF97E4C464AFED64B48A382DD022AD6C45ADAB9954A2E88098E7CAFF9D4E90101E9C55EA1878EE1B55A52B8112A348451
  1346. Version: v10.0.26100.1
  1347. kernel.appcore.dll
  1348. Address: 0x7FFF77070000
  1349. SHA: B45CB1BAA443E53B0BDE895EA5E26D417B1834B0489C538CB67902E2F58F3170EB6D4037A2C0DDCCFCFBFE2BE18744FB6799D654EB3FD3B5DDD559A5F7226333
  1350. Version: v10.0.26100.1591
  1351. KERNEL32.DLL
  1352. Address: 0x7FFF79C80000
  1353. SHA: C9B1C4DB9C8F66058D21BF512639E809A2213D965B65E378766872ECB5F74E65D32E802E8E9E74A119009E22EA17EFFD4F3CEE070920DF6A604478E2C58008C7
  1354. Version: v10.0.26100.3037
  1355. KERNELBASE.dll
  1356. Address: 0x7FFF782F0000
  1357. SHA: 4782416370CA4A11BB54EC9836A5E86285F7F0B6A2C21B0C56AA8B79EC15F7650372E68BB318579B4E8D1A040E60D808F5CC352CD6D4B8A99FA4A84221B50655
  1358. Version: v10.0.26100.3037
  1359. libxess.dll
  1360. Address: 0x7FFE50460000
  1361. SHA: FF63203BC0DF4975771A13622CB88617D0B90EDA81BC22A1BB21BDEF5E60DE89A959766ADAE453D447449993847BCA211E9FDF32F068F5D4DCD3C1786310833E
  1362. Version: v1.2.0.13
  1363. Microsoft.Internal.WarpPal.dll
  1364. Address: 0x7FFF73D40000
  1365. SHA: C7E63E3D47B78E62EF969F5DAED36EA4F6450D1A83163B1D53022EAD9DE089BC55607978DAD4606B49A3F2590AD64DEAB98E2D191096C596F4617766AF2AEE12
  1366. MMDevApi.dll
  1367. Address: 0x7FFF6C3B0000
  1368. SHA: 7AD0FB1FD66D8E873B5D04A09B2F6D0826BED4EBEE4FCEA4F36EE95A890BC596A43FF48E44B117238D26E59FD0F646BF0A4493A125A1465D98F4258399A3214C
  1369. Version: v10.0.26100.1
  1370. msasn1.dll
  1371. Address: 0x7FFF779B0000
  1372. SHA: D5EDC8FA56CE73E773B519792C45CD0C6F74C73C8B6714013E6EDF42DD4825E31B8275EE08360205E9FF741F08D51016CC1559C9AC92AE631C726B3FD91340BC
  1373. Version: v10.0.26100.2894
  1374. MSCTF.dll
  1375. Address: 0x7FFF79A20000
  1376. SHA: 3D4DB1F55A2AD960476B6B3E8AEF04D4E376E75732C816204075E50F67BB7DF14017058AFACFA286CA7665941FF1CBC8BC2416B2078D77281A194B4E0F313BF5
  1377. Version: v10.0.26100.1
  1378. msdmo.dll
  1379. Address: 0x7FFF18920000
  1380. SHA: 3D980D5108DDEF62F8386ED36733453074DE567E7D031B77E8DD642BE0A75639DD5F2D0F05E573F927E5DD34177DF09496B500B29BFC27213207C578FCC295EE
  1381. Version: v10.0.26100.1150
  1382. MSVCP140.dll
  1383. Address: 0x7FFF4E290000
  1384. SHA: A81FEB56AE3E4939ABB21597F4F60429B704E04E6C20FAC402A0518FE7B29606BF8824347A7570D98F3C44684C15BF6B520E350321BFC2A42EC5597989215782
  1385. Version: v14.42.34433
  1386. msvcp_win.dll
  1387. Address: 0x7FFF78240000
  1388. SHA: C42D63EDFC4FEEDD3FC4C2F330B3AD2054D9FE33128CB9D54D29A0365FC88C452F59AFA9B2822EFFEEA9D2D81CC0D4E0A0A39873B2C5480216AF68C601720034
  1389. Version: v10.0.26100.1882
  1390. msvcrt.dll
  1391. Address: 0x7FFF79050000
  1392. SHA: 834CA6FFB7D2C378BFCE04B95CA667162D6933F45E8BBE41C0CC14496E8AF65AE9E3AC3BF70C21CCF0EBA1DA7A418FCB65851E614A90A05055E9D81DC72B67BC
  1393. Version: v7.0.26100.1882
  1394. MSWSOCK.dll
  1395. Address: 0x7FFF77580000
  1396. SHA: 48031068990A509DE761F7B7833514DA44CA2A1704F7A73D5A60C90B562136D123195C2ED766907FDA0E72F59D9395FA5C774F3B6832589BBD32357991E22FFC
  1397. Version: v10.0.26100.1
  1398. ncrypt.dll
  1399. Address: 0x7FFF77B30000
  1400. SHA: E5C8F393C6AAE64BF8F2863C345C145B7D178DDCA2494A7C1EE4A09B7FE08EDB01998E60C512FAC773D0FE088C25901B5E490745DE43FD18D37BFFD84D67C0C3
  1401. Version: v10.0.26100.1591
  1402. ncryptsslp.dll
  1403. Address: 0x7FFF4D120000
  1404. SHA: 190EE5C8617722B29B8DA13CFD1E30AF3E8888A67F8FE82DF1AE8FF51C18C80BC3DD369964C5D99ADEF81A56303F0B08DBC027A4DA36E7FAA4F075A882203B8A
  1405. Version: v10.0.26100.1882
  1406. netprofm.dll
  1407. Address: 0x7FFF730C0000
  1408. SHA: 06AC79389D4D7020FF22889B5857CB72BF161310070E86F540AD9BC1CCF3556F8FAE16C141F556CDA4B91671E5CB87A2541C196D786FAC70407F67A2294CE589
  1409. Version: v10.0.26100.1
  1410. netutils.dll
  1411. Address: 0x7FFF76A50000
  1412. SHA: A2DEB0B78ACCFAED7B9147D24E4301398DC84C331EBE3043BA198F0B04C39C06CA0570595DB2A24F03E0869656292DC97BA8778FB035CF06EF0F68AC7D54ECB2
  1413. Version: v10.0.26100.1882
  1414. npmproxy.dll
  1415. Address: 0x7FFF6B740000
  1416. SHA: 849881982B33DEA43996228D7C96B9BB434285F1057B3D7F55B979185E25E37AF1B1B9E5CF16E56DD5A93B3DDEDB69557FE4881F148BA8960A77278E34E7BDA6
  1417. Version: v10.0.26100.1150
  1418. NSI.dll
  1419. Address: 0x7FFF79040000
  1420. SHA: 0947FE4280A6055DEFB918B148CBCE27047FDD6E04EFEB6D84739799471753867BD32C5457F1C9A0151569917F9E5D0EE1816784081D4D3C3AE8D17CB71CA0F7
  1421. Version: v10.0.26100.2894
  1422. NTASN1.dll
  1423. Address: 0x7FFF77AE0000
  1424. SHA: A7073268A16E89DC503434DC1FE745A4F21FBF549C78ED69D7E1FCF0FB2F1333462426E570CCED18558F47A33048F2B4214D38D37F6518DC05586305C989815B
  1425. Version: v10.0.26100.1
  1426. ntdll.dll
  1427. Address: 0x7FFF7AEA0000
  1428. SHA: 300AAC58E082F8A2E27239CA373EE7BC7D801F81807F14BBC4D82F91539A1E636B3A545FB699DD5E657CE237FEEA876C9E51456A7F78F16D48B746A0E570CC1E
  1429. Version: v10.0.26100.2454
  1430. ole32.dll
  1431. Address: 0x7FFF79E60000
  1432. SHA: 0ABA1C7DB98B9D24A902EFB4BD94DA00CCD06B3C784344110363239322A9EADF01B9887FD84F8805AFFFBD92D899311D809D93CFF57AAABA0B8E8074EA0F17A9
  1433. Version: v10.0.26100.1
  1434. OLEAUT32.dll
  1435. Address: 0x7FFF7AD80000
  1436. SHA: 16AF9D4CB3B2F9D6948EEB4FD2A3E4A66F7CF096FDFB6F5EFCDA5B17BBFB5A63BD1C366C2AB27EA6E6E95E3D4A309361AFBC2AA5F621E6CC1B2E634F447CF048
  1437. Version: v10.0.26100.3037
  1438. ondemandconnroutehelper.dll
  1439. Address: 0x7FFF457A0000
  1440. SHA: 10DF9F84D810807CB79C8C9F717C365ABCEBDE6B3AEA49198E0CF65C2271E0DEF235A49F9FFA94816CC6E18FB903D5198DBF0C67E57CD3EBC1A012021202014D
  1441. Version: v10.0.26100.1882
  1442. pdh.dll
  1443. Address: 0x7FFF657D0000
  1444. SHA: 483A1264246F3DD9B5B1133B166E43700D50E85804B73AE3743B70ED4D963BB0B9E3A7E0A882720EFA0D91EB584C40A1477354A41E2DCCF160A285E2D0F6C0F9
  1445. Version: v10.0.26100.1
  1446. po3_GravityAffectsCarryWeight.dll
  1447. Address: 0x7FFF28530000
  1448. SHA: 5CF62B9678D9AF1446DFECEC471CD20ED3F94D7AA6F7198EF42643F7D129E98EE825FED5E7CC1D24785B601BB3F745A1042A38CEBA4C480701FBB617E3C85BE1
  1449. Version: v1.1.3
  1450. po3_SmartAiming.dll
  1451. Address: 0x7FFF238D0000
  1452. SHA: D64F8D29834F09F48F36C97414E6C3C2C43AF48CC3D05038671BC1EAD9FFF9D6CDC6F91DB31EBDC2E4FB63F1F3BEAB72AF7A480F71D98606ABE3EC632F1F0645
  1453. Version: v3.0.0
  1454. powrprof.dll
  1455. Address: 0x7FFF77A10000
  1456. SHA: 50D68A1C3F44D0B90D13DBE74DAA19EE3045193C65772FD635A41AF84E36C2FACB8AD3AC98DC91F7FBF468E5E42878343C64DDA84BCC1297AD63D8A536E79B7B
  1457. Version: v10.0.26100.1
  1458. profapi.dll
  1459. Address: 0x7FFF78150000
  1460. SHA: 98AF9CC791B3668BA4239F737B202B47F9406CF538BE83E539401906AF35EFEB7BC7F49DC824678D61379CA6071FBC0D50B923BE696FFC35A971037EB6299107
  1461. Version: v10.0.26100.3037
  1462. PROPSYS.dll
  1463. Address: 0x7FFF73440000
  1464. SHA: 1F5A96DCFF9B73320055C1E7B9DC0BD0BF9FBD5807A5D3AAB72882610B716C8E5EE603B11B477C6083E7EF8DADCFCBEC87369C9A98A87A21DAA969EBB81621B4
  1465. Version: v7.0.26100.3037
  1466. PSAPI.DLL
  1467. Address: 0x7FFF7A9D0000
  1468. SHA: 986DBB58CB62378FA9AB8A62A1362DEBF59CF674ED811F6BE727B106EB672860119EC120BF9B6361DFDB919737BA1B356BCBA5CCF7E1E4A82945B0371386F5BC
  1469. Version: v10.0.26100.1
  1470. rasadhlp.dll
  1471. Address: 0x7FFF6CD30000
  1472. SHA: 4EF633251D0F896827EDDD5091F24A7E816CFAC4670F1A5FC41D662539D6A0D5FDE788408C0E90E0F9ABAA3357C11F0C77CBEF45CEDCDA52F8A7D903D8AAB2F6
  1473. Version: v10.0.26100.1150
  1474. RealTimeFormPatcher.dll
  1475. Address: 0x7FFF1EF30000
  1476. SHA: 4D3D13898E2A3172B001BA5F1EB483C84E18FF65BFDA608BAEC676CB13AD33CBA914267CC01FBB2AC219BB269A6BBF90BCB1D658EAB97FBAD46ACA8A43805C5F
  1477. Version: v1.0.0
  1478. ResampleDmo.DLL
  1479. Address: 0x7FFF15490000
  1480. SHA: 04D181AB42E9C1F1E9F6FA97713FBD6BE8A81B2BB99DAB57A18CE51EF81601ED341184C80E824342AAC7A003E29CF12D0B27EA019D9111062A1739016D7659B4
  1481. Version: v10.0.26100.1150
  1482. resourcepolicyclient.dll
  1483. Address: 0x7FFF75C80000
  1484. SHA: EDB57D9B82245EBEB2991C34181AAF44CB94897E529BFC9CBEBCCF3E42CFFBDFC6723EA527F31F0BA89CEE55231994A13EBA4CED312B97A9DC104BAC2E1DE5BA
  1485. Version: v10.0.26100.1150
  1486. RPCRT4.dll
  1487. Address: 0x7FFF791F0000
  1488. SHA: C745733D4B74699D64F70944D6E4990083F14D556291BEB570DA09286DDA46449428E6560442AAC35BF17975896EDB73ABB52245BDF3FBBC7F0A2DD0B4CFB6E4
  1489. Version: v10.0.26100.1
  1490. rsaenh.dll
  1491. Address: 0x7FFF76FD0000
  1492. SHA: 6DF21F86E0F1D9FCD68E044CF82ABE568BC8B695FE63F55BAFFF2A604D178CA87B5067A7FDEC1C9AB002E3773BF468533D174A578A5189E872D483E374A265C6
  1493. Version: v10.0.26100.1
  1494. schannel.DLL
  1495. Address: 0x7FFF76EB0000
  1496. SHA: CB8570251FE038B5496B4334BEA008DD28B658501B1F8C8AFD8A5130D774CD18E24213D4408323E372A53AE02FE328973115FB338C47F5AF5A1B93E382B52EF7
  1497. Version: v10.0.26100.1
  1498. sechost.dll
  1499. Address: 0x7FFF78F90000
  1500. SHA: F3378F1548A6910501A729459E5491030661E8C02CE7E663A6159ADA0F24A1A797FF9FA135D5C2A17BF4D25F345CAF5FD36DD2BB3941D8799F6C25DE7182ADF2
  1501. Version: v10.0.26100.1
  1502. Secur32.dll
  1503. Address: 0x7FFF75510000
  1504. SHA: C1128CD1C66D1ED0DEE26ADDF77F6893B1017DE8DE1AAF00CDA1C6597BA7D24E486F364621E13D1333029D69868ACDAD0689F0369ED5220FC4944BD919DF561E
  1505. Version: v10.0.26100.1
  1506. SETUPAPI.dll
  1507. Address: 0x7FFF7A000000
  1508. SHA: 2D936CD41A79FD69CA640B6F745DB94E661D8838402016EEBD910404B6642AF937BCEDBF7BBDD891BE389BF4C2BBDC184EFC72FFABBDC6E47E7BF7F6A70CB6F8
  1509. Version: v10.0.26100.1
  1510. sfee.dll
  1511. Address: 0x7FFF230F0000
  1512. SHA: 91CF1E24CF384285CA8CC824087C811C932730FE6C39443D023CBD5D46E35265789B7604E8C8B7FC51BC170CC13BE8FC9B7CED12632E2C1C1FEF5D5F0D17FD66
  1513. Version: v1.1.0.18
  1514. sfse_1_14_74.dll
  1515. Address: 0x7FFF51C70000
  1516. SHA: 03BB3C30F8EB54834EA3CB180DBA72CF144D7E5EF821052F8A5FE6AF3D28A9897654CE8D87E0308B40895ACD6FA6E949BAC223C05DE3D775FE5C06E66150917E
  1517. Version: v0.0.2.16
  1518. SHCORE.dll
  1519. Address: 0x7FFF7AAC0000
  1520. SHA: 1683DC5CA78EEE91BB075CC537FFEFA092B414D78052177BCC0AEC104B055742D0BB3A51B605F2845E8233115DCE8F24ECF5641A7C02C1BE3772759CDBF8B957
  1521. Version: v10.0.26100.1
  1522. SHELL32.dll
  1523. Address: 0x7FFF79310000
  1524. SHA: FEED40A7E76CA9C69DD8884BACF80C1E450998C24926147587CFAB3A029697F5202E5110B6B177C5EB2D640F792C3A3EDA0B4F81BCC41CA8B6DE0033149AA708
  1525. Version: v10.0.26100.3037
  1526. ShipFuelDataSender.dll
  1527. Address: 0x7FFF49680000
  1528. SHA: D0B107334A0FB3F35C4E8CB3D34AC5723FD5323E278FC4599E0886B32D18E5F0ADD2A7B50220A19DFBD8AB6F086029B11CD0488DD6773532741DD8F668707B48
  1529. Version: v1.5.0
  1530. SHLWAPI.dll
  1531. Address: 0x7FFF79E00000
  1532. SHA: 7E16BA40262A6241439D10261ECC11A28C46D8AE2921EB22A054D112FD89D79D50A3C3C7284C017ACF028032BADAFFABCF2724545A5BED8AFECDA364B842B4AB
  1533. Version: v10.0.26100.1
  1534. sl.common.dll
  1535. Address: 0x7FFF22510000
  1536. SHA: 843457A2F9F0BA83B6C2FEA37FB05F1C52F715C2046232C904DF79B1ED30F3725B967163EBFE5B3F01DAABBD9CAC27799C80DBF8269211F5319FD62F3EEF7B3E
  1537. Version: v2.2.0
  1538. sl.interposer.dll
  1539. Address: 0x7FFF51F10000
  1540. SHA: 4197A38D36FE41A21B11814B00F17F5BF2AE7F418DC5CCB94A6C097615B87B9C5B530DFA0296CA0580BB5618D0AB43AC02C2E1FC08E07D55B5E8BBFF8DA7160A
  1541. Version: v2.2.0
  1542. sl.reflex.dll
  1543. Address: 0x7FFF518D0000
  1544. SHA: C5DF9877DEDFCC443ECAD9A8EA0F10C5DC8C97C4F6F10A1BEA1831AF6EB27D89C695F67B55E451603A6550EBA084E0CD7B676FE8C56E302324025D9A97ED7FC5
  1545. Version: v2.2.0
  1546. srvcli.dll
  1547. Address: 0x7FFF69320000
  1548. SHA: 4EA0CB9A2132EBD62C9BF2FAAE69114C2D41E3D0F0376E370B22EE7367CA0978F321F55EFFC31732D7D5F410D5DF5E737ED8C2387E20A4F71D0373074FCDE3ED
  1549. Version: v10.0.26100.1150
  1550. SSPICLI.DLL
  1551. Address: 0x7FFF77310000
  1552. SHA: 0F2386221FE94CD72FE8FA1B42E9938A4ADE18AE1CEB5B69A10ACFEBBAE163C40186506D5CB82A4646AD766AC764748968CA007617CCB73987895FFD0F1DA64B
  1553. Version: v10.0.26100.3037
  1554. Starfield.exe
  1555. Address: 0x7FF61E710000
  1556. SHA: 5D1F236406E6AB1E079046ECDC92C3848DF121CE3DBA463E02469D42502D93AF72C608588E232BA9720B868BC72CCCB658C9877ABA4CEDFE5E914EBB387A2178
  1557. Version: v1.14.74
  1558. StarfieldEngineFixes.dll
  1559. Address: 0x7FFF195E0000
  1560. SHA: A2EE55F2D28FD3D32CBE580660BE5C3D76016ACE3E62A50071C05CFBE3433C091BEABD327890F12B74555D032D04DBBF09B85F97C12CCF2004C7338AE8FFF8E5
  1561. Version: v7.0.0
  1562. steam_api64.dll
  1563. Address: 0x7FFF5BA80000
  1564. SHA: C08DE8C6E331D13DFE868AB340E41552FC49123A9F782A5A63B95795D5D979E68B5A6AB171153978679C0791DC3E3809C883471A05864041CE60B240CCDD4C21
  1565. Version: v7.40.51.27
  1566. steamclient64.dll
  1567. Address: 0x7FFEF0690000
  1568. SHA: 20AA6773E510B9D39770BBCEA83B7FEDAFBE90828952F2E3420C79B61702B75CA21E7F19620B29278CE5FBFF509A87A4432793CE2D0180998086AEC9AB689976
  1569. Version: v9.48.97.91
  1570. textinputframework.dll
  1571. Address: 0x7FFF5A8D0000
  1572. SHA: 059907805F203FF57AB21F7F726BD6F2948A13A7ADAC0739A753F4647CD652F6B1264352321282798F650B237D20B6F9CCDD98F6B8588C4375ED7FB6F9E4AEEB
  1573. Version: v10.0.26100.3037
  1574. tier0_s64.dll
  1575. Address: 0x7FFF0C100000
  1576. SHA: 934A24556D0A4DD7643C03F96CB057FF25BCEECBC9795C4A30884AECC5AFD441FA99BFE0D978C8879F3FB10260373F055731F51A18775C55DE68FA716BCCB81B
  1577. Version: v9.48.97.91
  1578. trainwreck.dll
  1579. Address: 0x7FFF4EC30000
  1580. SHA: 261801A85D41236E35C820A78E4BC3E775EBF0C19336EF1D518A61DA20429BB30B707181606675C1BC650D678CA0A27DC585DFA35BDDD717EB830459BFF60333
  1581. Version: v1.4.0
  1582. twinapi.appcore.dll
  1583. Address: 0x7FFF6B8D0000
  1584. SHA: CC06546E71EAA7BA285461A1E9DC5A9A6D2FD25E61A506E07788636FFF8001E984D045E9DFF0E579939832AE0958843D8D2E7986F285E6A2603DC0050DFC8037
  1585. Version: v10.0.26100.1
  1586. ucrtbase.dll
  1587. Address: 0x7FFF789A0000
  1588. SHA: 743FA0BD48F5B7222F7BF5EC1780B3C922E90E0DA3F812EBEB2F93E292AF871C531F8B5E9839957C8CC94BEA4660791618EEAC38432667E6C2F7994BF6D05969
  1589. Version: v10.0.26100.3037
  1590. UMPDC.dll
  1591. Address: 0x7FFF779F0000
  1592. SHA: BE4A4B98F5402D82FFB56D4128B165412A553AE0C86DF7E3B41D63FCA1E1DC023369910253DF40D6742D01FA0D4971B19BEF26F1763AC6A96187BB512CA5AA0A
  1593. Version: v10.0.26100.1301
  1594. urlmon.dll
  1595. Address: 0x7FFF5C5B0000
  1596. SHA: 4E84358BF2F9996318C5CF9ADE506567D20AC67E387D79C2A6B8312814337DF70174252DBD263E2B48C4EF053AECB470B80AE7AFF16FBDAE07A6E9CF923F95B7
  1597. Version: v11.0.26100.1
  1598. user32.dll
  1599. Address: 0x7FFF78D90000
  1600. SHA: B3C3E7D31DC9B9524833D947DEA502D2B4095D94E0D0DE4A98540562A55A26A2EC32B793FB2CD093375EC22D6A50646245690218DE7E0892A210EAB618545423
  1601. Version: v10.0.26100.1
  1602. USERENV.dll
  1603. Address: 0x7FFF77620000
  1604. SHA: B3F120327F5BB4A69C598AEE489A846ECDC75382434E0243BDB7669437685A46B1537CC80E4E7EBBC6930D1EACDA18A0C236C1F44FF4B43DB1148D3191C707D8
  1605. Version: v10.0.26100.1
  1606. usvfs_x64.dll
  1607. Address: 0x7FFF0C5B0000
  1608. SHA: 34E9203FC1DD71C561682D53B4C041BB08B11F74A985075D773872D8F93CC7D26BF4C110A286CE66956B656B75950C83673A2D18735479C2F99C512CF2567BF9
  1609. uxtheme.dll
  1610. Address: 0x7FFF75610000
  1611. SHA: B9D7E695C52D9E579AE6D163DEE815F90EF643A52570664D06006B76486E135A208BAE5DC2485DE59D959B0DC980F61EC66D0A5E82B55DB08811D0AF1CE29856
  1612. Version: v10.0.26100.1
  1613. VCRUNTIME140.dll
  1614. Address: 0x7FFF51C30000
  1615. SHA: 96E9F32E89AEE6FAEA6E5A3EDC411F467F13B35EE42DD6F071723DAEBA57F611DBD4FF2735BE26BB94223B5EC4EE1DFFEDF8DC744B936C32A27D17B471E37DCF
  1616. Version: v14.42.34433
  1617. VCRUNTIME140_1.dll
  1618. Address: 0x7FFF549C0000
  1619. SHA: 0460CC66D06DF9A2941607473F3ECCFD909F2ADAB53A3328FADCEDD1B194B388ECA738C2C6C2E193DE33606925FBED1FE39EFA160015128E93F5E3A03C62170D
  1620. Version: v14.42.34433
  1621. VERSION.dll
  1622. Address: 0x7FFF6CCF0000
  1623. SHA: D1BF36744AACEC8A95665F56F5CE4CF00685F836C4905B5A51DEE55C803FAFE6FC8069A08FE3959761B5A2E6367A2283077828958CB4888B909F7D402F6FD917
  1624. Version: v10.0.26100.1150
  1625. vstdlib_s64.dll
  1626. Address: 0x7FFF1D6E0000
  1627. SHA: 361A0D2D554518DF2D3E883D2467E756887F66BD8C06B05C1448AF8E5AFB17C78D12BABCBAE2097D9FEFAB0D839720CDACBB5A790F66C184386BC7FB97A95390
  1628. Version: v9.48.97.91
  1629. wbemcomn.dll
  1630. Address: 0x7FFF69670000
  1631. SHA: 7D763EC2C9925B0A9D4F82904DEBFE8B5A1F5939912984E8FC94F6873E6CD6D90C377E93AB4CF1F28886DBC293BB990A576B3CF358AD32BE21AD5FB56B3B51D6
  1632. Version: v10.0.26100.1150
  1633. wbemprox.dll
  1634. Address: 0x7FFF696F0000
  1635. SHA: 2F843A9E8CBFB245B127DA91999E23638351F744151DD8D20EB89A407236815F3D6E0331FCE0C9419298090FA15C6BD0C6861E3920BD43A9D5D812568ACCD3C0
  1636. Version: v10.0.26100.1000
  1637. wbemsvc.dll
  1638. Address: 0x7FFF67730000
  1639. SHA: 82B4E560AB069BAF13D6A577A4DCB7D904419C814B5A96142EEB7C11C82AA0E35D280D1B51A291F6E77668503341C08C87F199137CF7BC5B18B216C27E358D97
  1640. Version: v10.0.26100.1000
  1641. webio.dll
  1642. Address: 0x7FFF69760000
  1643. SHA: A01D7724C4C09A90435B146EFB2722F00FCA040597E12DAB880C8FB27519992383403A47809CCF5AF6C355A8C3AC4EE0519E23AC84EA934C11C53CE4C59E1D7C
  1644. Version: v10.0.26100.1
  1645. win32u.dll
  1646. Address: 0x7FFF786C0000
  1647. SHA: D5AE505CB2F3B0C9CAF024DFDB98C5C22FC92742480CA1E0503B4FCD396734CE72B76D6FC04FB382B1FD353831375B6F2266F55A231F0C6FF6A46F8B2A055B2D
  1648. Version: v10.0.26100.3037
  1649. Windows.Gaming.Input.dll
  1650. Address: 0x7FFF6BB10000
  1651. SHA: 5084831445ED0A06066BC334DC27C8B0E727DC92E93CCA6B6C0B0E48E8044D79F265FDCDE53D3A4F686F8FAE0A2B0E04D6087BF7EF6D1A59479B2AC28FEB3B56
  1652. Version: v10.0.26100.1
  1653. windows.storage.dll
  1654. Address: 0x7FFF75F80000
  1655. SHA: 64489A218C2E526EC369A43EC720492EFFEBD3324AB0C2FBDD161D3B8FDE241EFA3D1AB40F9DEC5228DA90527E867989DF43E0E43B2363BA74E82B968139E79E
  1656. Version: v10.0.26100.1457
  1657. Windows.UI.dll
  1658. Address: 0x7FFF638D0000
  1659. SHA: E49BB5ED809115D459DD784B66830B6014036B20FA67F03D22BC8DDAF5238A83847983D67809A18D0BC6514E08F74367B0441DF3CFBB58A66E892F3749832609
  1660. Version: v10.0.26100.1
  1661. WINHTTP.dll
  1662. Address: 0x7FFF6CB80000
  1663. SHA: 74A706C3D1CDB937EE2ED255DD39D6B5B0D7103350FAE7DB166438940EA43B5906304A6C70A61077380E2A2391FA9F401942670CE5FBF62DC6C40A2E420D63B6
  1664. Version: v10.0.26100.1
  1665. WININET.dll
  1666. Address: 0x7FFF61EF0000
  1667. SHA: 28A9CD5814B0F231490D07E5A1D115E45ADE1B8FDC14D75E508376C04D40BA63D2F524680D38687BADC87867AB30F5A0A6E4EFB093E0EB5EC57D6FEB86167C0C
  1668. Version: v11.0.26100.1
  1669. WINMM.dll
  1670. Address: 0x7FFF6C820000
  1671. SHA: 9731125EB9E70641D7BD2B524F3967A9570DD4EBD83B5FEC49B45CB6AB708871D068B4B214421E40A7E6D43123391D06470C48599AD7FDD47F244C8E3D7BD138
  1672. Version: v10.0.26100.1
  1673. winmmbase.dll
  1674. Address: 0x7FFF4E1B0000
  1675. SHA: 209DB243E7CF01274DFC119DF06790B1D768C99AB6932B0B6BE8E0CC4689603B088D26AF463493DC42A461520C0D7ECB1D5EBE72AEBDD498205070773C8FD6DE
  1676. Version: v10.0.26100.1
  1677. WINNSI.DLL
  1678. Address: 0x7FFF73540000
  1679. SHA: 377B8DF74B8BB5028E958FA9B2836AC5F590C636C55EC058C33921CB0164A5272A1AF87B597AEE526DD3209246A625EAE280F4256AD79CC9F2639581F6530880
  1680. Version: v10.0.26100.2894
  1681. WINTRUST.dll
  1682. Address: 0x7FFF78870000
  1683. SHA: 65E2DBE5641D480C194CE7B83FFCCDBEA5BE4C114ABC2984363F3BD99736E7EE2216D5F0B4887202EEA8ED1E52896D30D693CDDCB78EC94FE9CE027B60248735
  1684. Version: v10.0.26100.3037
  1685. wintypes.dll
  1686. Address: 0x7FFF72360000
  1687. SHA: 0AB4A6E481C827D764D49C5B8926EDB8971F6D14D288CD5A4FE4E0102F71934269F69ABC6DC8AB082199F1964B69ABCC568FCBFA751F42CFC144CA742A27B124
  1688. Version: v10.0.26100.1
  1689. WLDAP32.dll
  1690. Address: 0x7FFF78D10000
  1691. SHA: 590D677FE3DDA036148255DF33E81CB13B7C44CADC5603E70DC573E66DF4A934591B7AE3FE091230524732F61C9A29E730173D451FE3A30BFE7077F2E6F64FE5
  1692. Version: v10.0.26100.1
  1693. wldp.dll
  1694. Address: 0x7FFF77950000
  1695. SHA: 853ECC7370BC9A3DE47B9D51F13357B7729697E0981B4564696C1699B3DB8EC714B8041FC9EDF4A5B340DD4966A2DEA175D71DCCDFC298C401F62BDE41F1F4E5
  1696. Version: v10.0.26100.1
  1697. WS2_32.dll
  1698. Address: 0x7FFF7A490000
  1699. SHA: A02BD113F6DDDCF958977EA65A05C5572F209D809EACCB04D13EC204A5A587EC4B8EEFABFCB399D7C1EF92224148C265B26B64EE0966AC60C08A2BA05D8A1582
  1700. Version: v10.0.26100.1
  1701. WSOCK32.dll
  1702. Address: 0x7FFF57C80000
  1703. SHA: 590B675AC9DA54B88668D6296F6CB8F29471E3589221EF972925BA7006D9117F65C42F7BD277B942EEAB93CDBC165CD4C0A025C5E9333B17E3D5FFEFC73547BF
  1704. Version: v10.0.26100.1
  1705. WTSAPI32.dll
  1706. Address: 0x7FFF75520000
  1707. SHA: F3482E028C9B8D7491352A39A74F109EB7D397786F03C733FAC1CB592E1ECAF0F5DDE04E8099000487C21A314A1A90F2EACB8D86F944CBCC7A051C1F1A80457C
  1708. Version: v10.0.26100.3037
  1709. XInput1_4.dll
  1710. Address: 0x7FFF73240000
  1711. SHA: BDAAF3FB1729548773DBBFEB3F6DBA8B182EA6DBFE080016379F1F89408010027FA7869C733C973B2DC5040AF4F796EEAC515195A18794A92EB7CC2D22E6C458
  1712. Version: v10.0.26100.1
  1713.  
  1714. SCRIPT EXTENDER PLUGINS:
  1715. AutoHideHUD.dll v3.5.0
  1716. BakaAchievementEnabler.dll v5.0.0
  1717. BayAndDocker-Count-Mod.dll
  1718. Build-Below-Bay-Mod.dll
  1719. CassiopeiaPapyrusExtender.dll v2.7.0
  1720. ConsoleCommandRunner.dll v1.5.0
  1721. po3_GravityAffectsCarryWeight.dll v1.1.3
  1722. po3_SmartAiming.dll v3.0.0
  1723. RealTimeFormPatcher.dll v1.0.0
  1724. sfee.dll v1.1.0.18
  1725. sfse_1_14_74.dll v0.0.2.16
  1726. ShipFuelDataSender.dll v1.5.0
  1727. StarfieldEngineFixes.dll v7.0.0
  1728. trainwreck.dll v1.4.0
  1729.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement