Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Starfield v1.16.236
- trainwreck v1.4.0
- Unhandled exception "EXCEPTION_ACCESS_VIOLATION" at 0x7FF63861D62E Starfield.exe+0B4D62E
- SYSTEM SPECS:
- OS: Майкрософт Windows 11 Pro 25H2 26200.8039
- CPU: GenuineIntel 12th Gen Intel(R) Core(TM) i5-12400F
- GPU #1: NVIDIA GeForce RTX 3060
- GPU #2: Microsoft Basic Render Driver
- RAM: 14.45 GiB/15.86 GiB
- PAGE FILE: 30.26 GiB/61.41 GiB
- PROBABLE CALL STACK:
- [0 ] 0x7FF63861D62E Starfield.exe+0B4D62E
- mov rax,[rcx+0B0h]
- [1 ] 0x7FF6387F977B Starfield.exe+0D2977B
- nop
- [2 ] 0x7FF6387F3A51 Starfield.exe+0D23A51
- mov edi,eax
- [3 ] 0x7FF6387D28D3 Starfield.exe+0D028D3
- lea rcx,[rbp+90h]
- [4 ] 0x7FF6387CADB3 Starfield.exe+0CFADB3
- cmp byte ptr [rsp+40h],0
- [5 ] 0x7FF6389BD6ED Starfield.exe+0EED6ED
- test al,al
- [6 ] 0x7FF63929A635 Starfield.exe+17CA635
- lea rdx,[4156E8Bh]
- [7 ] 0x7FF6392A16DC Starfield.exe+17D16DC
- mov rcx,[rbx+10h]
- [8 ] 0x7FF63A3A80EB Starfield.exe+28D80EB
- test r13b,bl
- [9 ] 0x7FF63A3ABD70 Starfield.exe+28DBD70
- mov ecx,[35C71C4h]
- [10] 0x7FF63A3A735A Starfield.exe+28D735A
- xor eax,eax
- [11] 0x7FF639DA17A1 Starfield.exe+22D17A1
- mov rcx,[3F30347h]
- [12] 0x7FF86E4DE8D7 KERNEL32.DLL+002E8D7 BaseThreadInitThunk
- mov ecx,eax
- [13] 0x7FF86FA0C48C ntdll.dll+008C48C RtlUserThreadStart
- jmp short 000000000000002Ah
- REGISTERS:
- RAX 0x800 (size_t)
- RBX 0x5BAA00 (size_t)
- RCX 0x0 (size_t)
- RDX 0x66B5FFEDB0 (void*)
- RSI 0x0 (size_t)
- RDI 0x66B5FFEDB0 (void*)
- RBP 0x0 (size_t)
- RSP 0x66B5FFECA0 (void*)
- R8 0x66B5FFEE20 (stl::local_function_detail::LocalFunctionImpl<<lambda_3a268ab62c709233b14fc0a10215dde6>,void,void *,unsigned int>*)
- R9 0x0 (size_t)
- R10 0x538 (size_t)
- R11 0x66B5FFEEE0 (void*)
- R12 0x4 (size_t)
- R13 0x0 (size_t)
- R14 0x0 (size_t)
- R15 0x0 (size_t)
- STACK:
- [RSP+0 ] 0x0 (size_t)
- [RSP+8 ] 0x0 (size_t)
- [RSP+10 ] 0x7FF63D9ACFC0 (char*) "\x05"
- [RSP+18 ] 0x1 (size_t)
- [RSP+20 ] 0x0 (size_t)
- [RSP+28 ] 0x7FF639DA3CB4 (void* -> Starfield.exe+22D3CB4)
- mov rbp,rax
- [RSP+30 ] 0x0 (size_t)
- [RSP+38 ] 0x1 (size_t)
- [RSP+40 ] 0x7FF63D9ACF20 (void* -> Starfield.exe+5EDCF20)
- mov al,33h
- [RSP+48 ] 0x0 (size_t)
- [RSP+50 ] 0x1EB (size_t)
- [RSP+58 ] 0x20 (size_t)
- [RSP+60 ] 0x25ED27D0000 (char*) "@"
- [RSP+68 ] 0x25ED1E57240 (SharedHeapAllocator*)
- [RSP+70 ] 0x7FF63D938100 (char*) "\x02"
- [RSP+78 ] 0x7FF639DA3130 (void* -> Starfield.exe+22D3130)
- test al,al
- [RSP+80 ] 0x20 (size_t)
- [RSP+88 ] 0x0 (size_t)
- [RSP+90 ] 0x0 (size_t)
- [RSP+98 ] 0x0 (size_t)
- [RSP+A0 ] 0x0 (size_t)
- [RSP+A8 ] 0x7FF6387F977B (void* -> Starfield.exe+0D2977B)
- nop
- [RSP+B0 ] 0x5BAA31 (size_t)
- [RSP+B8 ] 0x66B5FFEE50 (char*) "\x04"
- [RSP+C0 ] 0x25EE6D16980 (PlayerCharacter*)
- [RSP+C8 ] 0x0 (size_t)
- [RSP+D0 ] 0x0 (size_t)
- [RSP+D8 ] 0x8 (size_t)
- [RSP+E0 ] 0x0 (size_t)
- [RSP+E8 ] 0x26780B4CDC0 (void*)
- [RSP+F0 ] 0x66B5FFED70 (void*)
- [RSP+F8 ] 0x0 (size_t)
- [RSP+100 ] 0x0 (size_t)
- [RSP+108 ] 0x8 (size_t)
- [RSP+110 ] 0x2677B8A6E40 (void*)
- [RSP+118 ] 0x59000000000001 (size_t)
- [RSP+120 ] 0x26780B4CCE0 (void*)
- [RSP+128 ] 0x7FF639D9EE66 (void* -> Starfield.exe+22CEE66)
- mov al,1
- [RSP+130 ] 0x0 (size_t)
- [RSP+138 ] 0x66B5FFEDC0 (void*)
- [RSP+140 ] 0x2674E2ACC28 (void*)
- [RSP+148 ] 0x7FF6385EEA8F (void* -> Starfield.exe+0B1EA8F)
- mov r14d,eax
- [RSP+150 ] 0xFFFFFFFF (size_t)
- [RSP+158 ] 0x0 (size_t)
- [RSP+160 ] 0x7FF63D9ACFC0 (char*) "\x05"
- [RSP+168 ] 0x5 (size_t)
- [RSP+170 ] 0x2674E2ACC18 (void*)
- [RSP+178 ] 0x7FF637EC8F79 (void* -> Starfield.exe+03F8F79)
- add rsp,48h
- [RSP+180 ] 0x7FF63C5C7D50 (void* -> Starfield.exe+4AF7D50)
- xor [rax-28h],bh
- [RSP+188 ] 0x66B5FFED90 (void*)
- [RSP+190 ] 0x7FF63C5DE0E0 (void* -> Starfield.exe+4B0E0E0)
- or byte ptr [rdi+7FF637ECh],0
- [RSP+198 ] 0x0 (size_t)
- [RSP+1A0 ] 0x0 (size_t)
- [RSP+1A8 ] 0x7FF600000004 (size_t)
- [RSP+1B0 ] 0x25E00000004 (size_t)
- [RSP+1B8 ] 0x25EC36C0030 (void*)
- [RSP+1C0 ] 0x0 (size_t)
- [RSP+1C8 ] 0x0 (size_t)
- [RSP+1D0 ] 0x0 (size_t)
- [RSP+1D8 ] 0x0 (size_t)
- [RSP+1E0 ] 0x40000000 (size_t)
- [RSP+1E8 ] 0x0 (size_t)
- [RSP+1F0 ] 0xFFFFFFFF (size_t)
- [RSP+1F8 ] 0x0 (size_t)
- [RSP+200 ] 0x7FF63D9ACFC0 (char*) "\x05"
- [RSP+208 ] 0x5 (size_t)
- [RSP+210 ] 0x5 (size_t)
- [RSP+218 ] 0x4 (size_t)
- [RSP+220 ] 0x66B5FFEF90 (void*)
- [RSP+228 ] 0x7FF6387F3A51 (void* -> Starfield.exe+0D23A51)
- mov edi,eax
- [RSP+230 ] 0x7FF63D9ACFC0 (char*) "\x05"
- [RSP+238 ] 0x66B5FFEF90 (void*)
- [RSP+240 ] 0x7FF63D9ACFC0 (char*) "\x05"
- [RSP+248 ] 0x2674E2ACC18 (void*)
- [RSP+250 ] 0x7FF63D9ACF18 (`anonymous namespace'::CheckRefAgainstConditionsFunc*)
- [RSP+258 ] 0x7FF6387D28D3 (void* -> Starfield.exe+0D028D3)
- lea rcx,[rbp+90h]
- [RSP+260 ] 0x5 (size_t)
- [RSP+268 ] 0x2677AC7EC40 (TESObjectREFR*)
- [RSP+270 ] 0x66B5FFF000 (void*)
- [RSP+278 ] 0x0 (size_t)
- [RSP+280 ] 0x2670AF9B020 (void*)
- [RSP+288 ] 0x22 (size_t)
- [RSP+290 ] 0x7FF63DCEC960 (void* -> Starfield.exe+621C960)
- adc dl,ah
- [RSP+298 ] 0x7FF639EE2A6C (void* -> Starfield.exe+2412A6C)
- cmp rax,1
- [RSP+2A0 ] 0x0 (size_t)
- [RSP+2A8 ] 0x66B5FFEFE8 (void*)
- [RSP+2B0 ] 0x66B5FFEFB0 (void*)
- [RSP+2B8 ] 0x7FF637FE845E (void* -> Starfield.exe+051845E)
- mov eax,1
- [RSP+2C0 ] 0x1 (size_t)
- [RSP+2C8 ] 0x0 (size_t)
- [RSP+2D0 ] 0x0 (size_t)
- [RSP+2D8 ] 0xFE0 (size_t)
- [RSP+2E0 ] 0x25EE6D16980 (PlayerCharacter*)
- [RSP+2E8 ] 0x7FF63809A86C (void* -> Starfield.exe+05CA86C)
- vmovups xmm0,[rax]
- [RSP+2F0 ] 0x66B5FFEF80 (void*)
- [RSP+2F8 ] 0x66B5FFF0D0 (void*)
- [RSP+300 ] 0x66B5FFF058 (void*)
- [RSP+308 ] 0x7FF63A3A106E (void* -> Starfield.exe+28D106E)
- nop
- [RSP+310 ] 0x0 (size_t)
- [RSP+318 ] 0xFC (size_t)
- [RSP+320 ] 0x0 (size_t)
- [RSP+328 ] 0xFE0 (size_t)
- [RSP+330 ] 0x7FF63D3DC278 (AutoRegisterFormFactoryComponent<BGSKeywordForm,DefaultFormComponentMoverPolicy>*)
- [RSP+338 ] 0x7FF637F32054 (void* -> Starfield.exe+0462054)
- cmp qword ptr [rsp+38h],0FE0h
- [RSP+340 ] 0x66B5FFF130 (void*)
- [RSP+348 ] 0x3D010C28E70000 (size_t)
- [RSP+350 ] 0x2677D914CC0 (void*)
- [RSP+358 ] 0x7FF63801C325 (void* -> Starfield.exe+054C325)
- mov rdx,[598EFBBh]
- [RSP+360 ] 0x0 (size_t)
- [RSP+368 ] 0x26726788288 (BGSRefAlias*)
- [RSP+370 ] 0x7FF63D9AD158 (void* -> Starfield.exe+5EDD158)
- fsub st,dword ptr [rax+rax]
- [RSP+378 ] 0x7FF63D9ACEA0 (void* -> Starfield.exe+5EDCEA0)
- add [rax],al
- [RSP+380 ] 0x266E34E5380 (BGSKeyword*)
- [RSP+388 ] 0x2677C2D5B20 (TESObjectREFR*)
- [RSP+390 ] 0x2671ACC5160 (BGSProcedureTreeProcedure*)
- [RSP+398 ] 0x2677C2D0190 (char*) "\x01"
- [RSP+3A0 ] 0x266E34E5380 (BGSKeyword*)
- [RSP+3A8 ] 0xFFFFFFFF (size_t)
- [RSP+3B0 ] 0x0 (size_t)
- [RSP+3B8 ] 0x7FF637FFBC07 (void* -> Starfield.exe+052BC07)
- test al,al
- [RSP+3C0 ] 0x0 (size_t)
- [RSP+3C8 ] 0xFFFFFFFF (size_t)
- [RSP+3D0 ] 0x66B5FFF3E0 (void*)
- [RSP+3D8 ] 0x7FF637E17706 (void* -> Starfield.exe+0347706)
- mov rdx,[rbp+18h]
- [RSP+3E0 ] 0x66B5FFF0C8 (void*)
- [RSP+3E8 ] 0x2677C2D01B0 (void*)
- [RSP+3F0 ] 0x7FF63C5C7D50 (void* -> Starfield.exe+4AF7D50)
- xor [rax-28h],bh
- [RSP+3F8 ] 0x66B5FFF080 (void*)
- [RSP+400 ] 0x0 (size_t)
- [RSP+408 ] 0x7FF6386124DF (void* -> Starfield.exe+0B424DF)
- test rax,rax
- [RSP+410 ] 0x2677C2D0190 (char*) "\x01"
- [RSP+418 ] 0x7FF638003D8B (void* -> Starfield.exe+0533D8B)
- nop
- [RSP+420 ] 0x0 (size_t)
- [RSP+428 ] 0x2677C2D01B0 (void*)
- [RSP+430 ] 0x7FF63FDC6440 (BSComponentDB2::DB*)
- [RSP+438 ] 0x2677C2D5B20 (TESObjectREFR*)
- [RSP+440 ] 0x266D2AC1DA8 (BSComponentDB2::Memory::ConcurrentPageAllocImpl*)
- [RSP+448 ] 0x266D4589FF0 (void*)
- [RSP+450 ] 0xFFFFFFFF (size_t)
- [RSP+458 ] 0x2 (size_t)
- [RSP+460 ] 0x2677C2D5B88 (TESObjectREFR*)
- [RSP+468 ] 0x2677E275B20 (void*)
- [RSP+470 ] 0x66B5FFF280 (char*) "\x10a-|g\x02"
- [RSP+478 ] 0x7FF6386122E3 (void* -> Starfield.exe+0B422E3)
- mov rbx,[rsp+30h]
- [RSP+480 ] 0x0 (size_t)
- [RSP+488 ] 0x266E34E5380 (BGSKeyword*)
- [RSP+490 ] 0x0 (size_t)
- [RSP+498 ] 0x2677C2D01B0 (void*)
- [RSP+4A0 ] 0x26306ACD930 (Actor*)
- [RSP+4A8 ] 0x7FF637F504DE (void* -> Starfield.exe+04804DE)
- movzx ebx,al
- [RSP+4B0 ] 0x66B5FFF518 (void*)
- [RSP+4B8 ] 0x2677E275B20 (void*)
- [RSP+4C0 ] 0x3F9AD580 (size_t)
- [RSP+4C8 ] 0x0 (size_t)
- [RSP+4D0 ] 0x26306ACD930 (Actor*)
- [RSP+4D8 ] 0x7FF6388D6567 (void* -> Starfield.exe+0E06567)
- nop
- [RSP+4E0 ] 0x66B5FFF518 (void*)
- [RSP+4E8 ] 0x2677E275B20 (void*)
- [RSP+4F0 ] 0x267001FA8E5 (char*) "\x06"
- [RSP+4F8 ] 0x26306ACD9A0 (Actor*)
- [RSP+500 ] 0x25ED2814B70 (ActorValueInfo*)
- [RSP+508 ] 0x7FF639481107 (void* -> Starfield.exe+19B1107)
- mov ecx,[rsi+10h]
- [RSP+510 ] 0x26306ACD9A0 (Actor*)
- [RSP+518 ] 0x26306ACDBB0 (void*)
- [RSP+520 ] 0x0 (size_t)
- [RSP+528 ] 0x26306ACD930 (Actor*)
- [RSP+530 ] 0x0 (size_t)
- [RSP+538 ] 0x0 (size_t)
- [RSP+540 ] 0x25ED2814B70 (ActorValueInfo*)
- [RSP+548 ] 0x0 (size_t)
- [RSP+550 ] 0x6E (size_t)
- [RSP+558 ] 0x25E86F48400 (void*)
- [RSP+560 ] 0x66B5FFF1E8 (void*)
- [RSP+568 ] 0x0 (size_t)
- [RSP+570 ] 0x3F9AD580 (size_t)
- [RSP+578 ] 0x0 (size_t)
- [RSP+580 ] 0x7FF63C5C7D50 (void* -> Starfield.exe+4AF7D50)
- xor [rax-28h],bh
- [RSP+588 ] 0x66B5FFF200 (void*)
- [RSP+590 ] 0x26306ACD930 (Actor*)
- [RSP+598 ] 0x0 (size_t)
- [RSP+5A0 ] 0x2671AD2FF10 (BGSProcedureTreeSequence*)
- [RSP+5A8 ] 0x7FF63A3A106E (void* -> Starfield.exe+28D106E)
- nop
- [RSP+5B0 ] 0x26306ACD930 (Actor*)
- [RSP+5B8 ] 0x7FF639486AFE (void* -> Starfield.exe+19B6AFE)
- mov rdi,[rsp+50h]
- [RSP+5C0 ] 0x7FF639449FA0 (void* -> Starfield.exe+1979FA0)
- mov [rsp+8],rbx
- [RSP+5C8 ] 0x7FF639455F02 (void* -> Starfield.exe+1985F02)
- test al,al
- [RSP+5D0 ] 0x7FF63DDA9240 (void* -> Starfield.exe+62D9240)
- pop rax
- [RSP+5D8 ] 0x1 (size_t)
- [RSP+5E0 ] 0x2677C2D6110 (void*)
- [RSP+5E8 ] 0x2 (size_t)
- [RSP+5F0 ] 0x26306ACD930 (Actor*)
- [RSP+5F8 ] 0x7FF6388DB206 (void* -> Starfield.exe+0E0B206)
- add rsp,58h
- [RSP+600 ] 0x3F9AD580 (size_t)
- [RSP+608 ] 0x0 (size_t)
- [RSP+610 ] 0x2677C2D6110 (void*)
- [RSP+618 ] 0x7FF63D9ACF18 (`anonymous namespace'::CheckRefAgainstConditionsFunc*)
- [RSP+620 ] 0x2671AD2FF10 (BGSProcedureTreeSequence*)
- [RSP+628 ] 0x2671ACC5160 (BGSProcedureTreeProcedure*)
- [RSP+630 ] 0x66B5FFF340 (void*)
- [RSP+638 ] 0x2677E271560 (BGSProcedureTreeSequenceExecState*)
- [RSP+640 ] 0x66B5FFF3A9 (void*)
- [RSP+648 ] 0x7FF638906085 (void* -> Starfield.exe+0E36085)
- mov rax,[rdi]
- [RSP+650 ] 0x66B5FFF518 (void*)
- [RSP+658 ] 0x7FF63C6ABBF8 (void* -> Starfield.exe+4BDBBF8)
- adc [rsi+rbx*8+7FF637h],ch
- [RSP+660 ] 0x66B5FFF2B8 (void*)
- [RSP+668 ] 0x66001FA8E5 (size_t)
- [RSP+670 ] 0x0 (size_t)
- [RSP+678 ] 0x7FF6388DCF7F (void* -> Starfield.exe+0E0CF7F)
- mov rax,[rbx]
- [RSP+680 ] 0x66B5FFF438 (void*)
- [RSP+688 ] 0x0 (size_t)
- [RSP+690 ] 0x66B5FFF328 (void*)
- [RSP+698 ] 0x25EE6D16980 (PlayerCharacter*)
- [RSP+6A0 ] 0x66B5FFF450 (void*)
- [RSP+6A8 ] 0x2677E275B08 (BGSProcedureSitSleepExecState*)
- [RSP+6B0 ] 0x66B5010000 (void*)
- [RSP+6B8 ] 0x26306ACD930 (Actor*)
- [RSP+6C0 ] 0x26306ACD930 (Actor*)
- [RSP+6C8 ] 0x0 (size_t)
- [RSP+6D0 ] 0x0 (size_t)
- [RSP+6D8 ] 0x0 (size_t)
- [RSP+6E0 ] 0x26306ACD930 (Actor*)
- [RSP+6E8 ] 0x2677E275B88 (void*)
- [RSP+6F0 ] 0x0 (size_t)
- [RSP+6F8 ] 0x0 (size_t)
- [RSP+700 ] 0x0 (size_t)
- [RSP+708 ] 0x0 (size_t)
- [RSP+710 ] 0x0 (size_t)
- [RSP+718 ] 0x0 (size_t)
- [RSP+720 ] 0x0 (size_t)
- [RSP+728 ] 0x26300000000 (void*)
- [RSP+730 ] 0x2677C2D6110 (void*)
- [RSP+738 ] 0x25E86F48400 (void*)
- [RSP+740 ] 0x262E97F9490 (TESQuest*)
- [RSP+748 ] 0x66B5FFF520 (void*)
- [RSP+750 ] 0x66B5FFF530 (void*)
- [RSP+758 ] 0x2671AD2FF10 (BGSProcedureTreeSequence*)
- [RSP+760 ] 0x66B5FFF490 (void*)
- [RSP+768 ] 0x7FF639484201 (void* -> Starfield.exe+19B4201)
- inc edi
- [RSP+770 ] 0x25E00000002 (size_t)
- [RSP+778 ] 0x2677C2D6110 (void*)
- [RSP+780 ] 0x25E86F48400 (void*)
- [RSP+788 ] 0x2677C2D6110 (void*)
- [RSP+790 ] 0x0 (size_t)
- [RSP+798 ] 0x7FF63926CE67 (void* -> Starfield.exe+179CE67)
- mov rbx,[rsp+68h]
- [RSP+7A0 ] 0x9 (size_t)
- [RSP+7A8 ] 0x0 (size_t)
- [RSP+7B0 ] 0x66B5FFF4E0 (char*) "\x01"
- [RSP+7B8 ] 0x7FF63A1DAE66 (void* -> Starfield.exe+270AE66)
- mov r8,[rbp+20h]
- [RSP+7C0 ] 0x0 (size_t)
- [RSP+7C8 ] 0x2677C8B58D8 (void*)
- [RSP+7D0 ] 0x66B5FFF4B8 (void*)
- [RSP+7D8 ] 0x2677C2D00A0 (char*) "\x01"
- [RSP+7E0 ] 0x1D4 (size_t)
- [RSP+7E8 ] 0x7FF638D7BB39 (void* -> Starfield.exe+12ABB39)
- mov edi,0FFFFFFFFh
- [RSP+7F0 ] 0x0 (size_t)
- [RSP+7F8 ] 0x2677C2D60F8 (void*)
- [RSP+800 ] 0x0 (size_t)
- [RSP+808 ] 0x0 (size_t)
- [RSP+810 ] 0x40000000 (size_t)
- [RSP+818 ] 0x0 (size_t)
- [RSP+820 ] 0x1D4 (size_t)
- [RSP+828 ] 0x0 (size_t)
- [RSP+830 ] 0x2674120EE10 (BGSRefCollectionAlias*)
- [RSP+838 ] 0x1 (size_t)
- [RSP+840 ] 0x1 (size_t)
- [RSP+848 ] 0x262E97F9490 (TESQuest*)
- [RSP+850 ] 0x66B5FFF730 (void*)
- [RSP+858 ] 0x3 (size_t)
- [RSP+860 ] 0x66B5FFF610 (char*) "\x0f"
- [RSP+868 ] 0x7FF6387CADB3 (void* -> Starfield.exe+0CFADB3)
- cmp byte ptr [rsp+40h],0
- [RSP+870 ] 0x262E97F9490 (TESQuest*)
- [RSP+878 ] 0x66B5FFF618 (void*)
- [RSP+880 ] 0x2674120EE10 (BGSRefCollectionAlias*)
- [RSP+888 ] 0x2674E2ACC18 (void*)
- [RSP+890 ] 0x0 (size_t)
- [RSP+898 ] 0x66B5FFF730 (void*)
- [RSP+8A0 ] 0x66B5FFF550 (void*)
- [RSP+8A8 ] 0x25EC36C0020 (void*)
- [RSP+8B0 ] 0x1C36C0000 (size_t)
- [RSP+8B8 ] 0x1C36C0001 (size_t)
- [RSP+8C0 ] 0x25EC36D0000 (void*)
- [RSP+8C8 ] 0xFFFF (size_t)
- [RSP+8D0 ] 0x1 (size_t)
- [RSP+8D8 ] 0x66B5FFF548 (char*) " "
- [RSP+8E0 ] 0x6600000008 (size_t)
- [RSP+8E8 ] 0x0 (size_t)
- [RSP+8F0 ] 0x0 (size_t)
- [RSP+8F8 ] 0x66B5FFF540 (void*)
- [RSP+900 ] 0x1FFFFFFFFFFFFFFF (size_t)
- [RSP+908 ] 0x8000 (size_t)
- [RSP+910 ] 0x0 (size_t)
- [RSP+918 ] 0x0 (size_t)
- [RSP+920 ] 0x1 (size_t)
- [RSP+928 ] 0x1 (size_t)
- [RSP+930 ] 0x262E97F9570 (void*)
- [RSP+938 ] 0x66B5FFF6D0 (void*)
- [RSP+940 ] 0x0 (size_t)
- [RSP+948 ] 0x25E86F4B190 (ScrapHeap*)
- [RSP+950 ] 0x8 (size_t)
- [RSP+958 ] 0x7FF639D9DC7C (void* -> Starfield.exe+22CDC7C)
- mov rdi,rax
- [RSP+960 ] 0x25E86F4B190 (ScrapHeap*)
- [RSP+968 ] 0xF (size_t)
- [RSP+970 ] 0xF (size_t)
- [RSP+978 ] 0x25E00000000 (size_t)
- [RSP+980 ] 0x0 (size_t)
- [RSP+988 ] 0x0 (size_t)
- [RSP+990 ] 0x25ED27DCC00 (char*) "\x14\x05\x05"
- [RSP+998 ] 0x0 (size_t)
- [RSP+9A0 ] 0x7FF63DDA4E80 (char*) "\x01"
- [RSP+9A8 ] 0x7FF63C5CB060 (void* -> Starfield.exe+4AFB060)
- outsb dx,[rsi]
- [RSP+9B0 ] 0x0 (size_t)
- [RSP+9B8 ] 0x0 (size_t)
- [RSP+9C0 ] 0x7FF63DDA4E80 (char*) "\x01"
- [RSP+9C8 ] 0x262E97F9490 (TESQuest*)
- [RSP+9D0 ] 0x7FF63DDA4E60 (BGSStoryTeller*)
- [RSP+9D8 ] 0x7FF63C5CE3A0 (void* -> Starfield.exe+4AFE3A0)
- mov al,[9000007FF637DAC1h]
- [RSP+9E0 ] 0x25E86F48400 (void*)
- [RSP+9E8 ] 0x7FF6389BD6ED (void* -> Starfield.exe+0EED6ED)
- test al,al
- [RSP+9F0 ] 0x262E97F9490 (TESQuest*)
- [RSP+9F8 ] 0x0 (size_t)
- [RSP+A00 ] 0x66B5FFF730 (void*)
- [RSP+A08 ] 0x66B5FFF8B0 (void*)
- [RSP+A10 ] 0x0 (size_t)
- [RSP+A18 ] 0x26306ACD930 (Actor*)
- [RSP+A20 ] 0x0 (size_t)
- [RSP+A28 ] 0x26342B836EF (void*)
- [RSP+A30 ] 0x100000000 (size_t)
- [RSP+A38 ] 0x25E86F4B190 (ScrapHeap*)
- [RSP+A40 ] 0x25EC36C0020 (void*)
- [RSP+A48 ] 0x2 (size_t)
- [RSP+A50 ] 0x42AA648129 (size_t)
- [RSP+A58 ] 0x26306ACD930 (Actor*)
- [RSP+A60 ] 0x0 (size_t)
- [RSP+A68 ] 0x266E3E10100 (void*)
- [RSP+A70 ] 0x7FF63C5C8740 (void* -> Starfield.exe+4AF8740)
- xor [rax-28h],bh
- [RSP+A78 ] 0x0 (size_t)
- [RSP+A80 ] 0x26789E5AC00 (BSAnimationGraphManager*)
- [RSP+A88 ] 0x7FF6389DE037 (void* -> Starfield.exe+0F0E037)
- mov [r14+8],al
- [RSP+A90 ] 0x42AA648129 (size_t)
- [RSP+A98 ] 0x4E20 (size_t)
- [RSP+AA0 ] 0x20000000004 (size_t)
- [RSP+AA8 ] 0x25E86F48400 (void*)
- [RSP+AB0 ] 0x0 (size_t)
- [RSP+AB8 ] 0x0 (size_t)
- [RSP+AC0 ] 0xCBF29CE484222325 (size_t)
- [RSP+AC8 ] 0x25E86F48400 (void*)
- [RSP+AD0 ] 0x7FF63C5CB060 (void* -> Starfield.exe+4AFB060)
- outsb dx,[rsi]
- [RSP+AD8 ] 0x66B5FFF6D0 (void*)
- [RSP+AE0 ] 0x0 (size_t)
- [RSP+AE8 ] 0x0 (size_t)
- [RSP+AF0 ] 0x0 (size_t)
- [RSP+AF8 ] 0x7FF63DD98E00 (ProcessLists*)
- [RSP+B00 ] 0x7FF63DDA9240 (void* -> Starfield.exe+62D9240)
- pop rax
- [RSP+B08 ] 0x1 (size_t)
- [RSP+B10 ] 0x0 (size_t)
- [RSP+B18 ] 0x7FF63DD98E00 (ProcessLists*)
- [RSP+B20 ] 0x85D (size_t)
- [RSP+B28 ] 0x7FF639555B01 (void* -> Starfield.exe+1A85B01)
- jmp 0FFFFFFFFFFFFFC9Bh
- [RSP+B30 ] 0x26306AE35F0 (Actor*)
- [RSP+B38 ] 0x26770580000 (char*) "\x07\x17"
- [RSP+B40 ] 0x26770580000 (char*) "\x07\x17"
- [RSP+B48 ] 0x1 (size_t)
- [RSP+B50 ] 0x26306AE35F0 (Actor*)
- [RSP+B58 ] 0x7FF63A3A8777 (void* -> Starfield.exe+28D8777)
- test rax,rax
- [RSP+B60 ] 0x0 (size_t)
- [RSP+B68 ] 0x7FF63A3A8777 (void* -> Starfield.exe+28D8777)
- test rax,rax
- [RSP+B70 ] 0x0 (size_t)
- [RSP+B78 ] 0x0 (size_t)
- [RSP+B80 ] 0x7FF63D3F0D80 (void* -> Starfield.exe+5920D80)
- int1
- [RSP+B88 ] 0x1E (size_t)
- [RSP+B90 ] 0x1E (size_t)
- [RSP+B98 ] 0x7FF63A3A9D15 (void* -> Starfield.exe+28D9D15)
- mov rbp,rax
- [RSP+BA0 ] 0x26795EE0B50 (BSJobs2::Detail::TNodeJob<void (&)(void),void>*)
- [RSP+BA8 ] 0x1E (size_t)
- [RSP+BB0 ] 0x26795EE1800 (void*)
- [RSP+BB8 ] 0x13 (size_t)
- [RSP+BC0 ] 0x3DCCCCCD (size_t)
- [RSP+BC8 ] 0x0 (size_t)
- [RSP+BD0 ] 0x25ED27DCC00 (char*) "\x14\x05\x05"
- [RSP+BD8 ] 0x7FF63FFD7CC0 (char*) "\x13q\x02"
- [RSP+BE0 ] 0x1 (size_t)
- [RSP+BE8 ] 0x42AA647FF9 (size_t)
- [RSP+BF0 ] 0x25E86F4B5A8 (stl::unique_function_impl::detail::TypeErasedFuncImpl<<lambda_8291e7d1e643b42ca1ce574da97d71a6>,void *>*)
- [RSP+BF8 ] 0x0 (size_t)
- [RSP+C00 ] 0x7FF63DDA4E60 (BGSStoryTeller*)
- [RSP+C08 ] 0x7FF63929A635 (void* -> Starfield.exe+17CA635)
- lea rdx,[4156E8Bh]
- [RSP+C10 ] 0x0 (size_t)
- [RSP+C18 ] 0x42AA647F00 (size_t)
- [RSP+C20 ] 0x25E86F4B500 (void*)
- [RSP+C28 ] 0x0 (size_t)
- [RSP+C30 ] 0x26795EE0B28 (BSJobs2::Detail::TNodeJob<void (&)(void),void>*)
- [RSP+C38 ] 0x7FF6392A16DC (void* -> Starfield.exe+17D16DC)
- mov rcx,[rbx+10h]
- [RSP+C40 ] 0x26795EE0B51 (void*)
- [RSP+C48 ] 0x25E86F48400 (void*)
- [RSP+C50 ] 0x25ED27DCC00 (char*) "\x14\x05\x05"
- [RSP+C58 ] 0x25E86F4B5A8 (stl::unique_function_impl::detail::TypeErasedFuncImpl<<lambda_8291e7d1e643b42ca1ce574da97d71a6>,void *>*)
- [RSP+C60 ] 0x26795EE0B29 (void*)
- [RSP+C68 ] 0x7FF63A3A80EB (void* -> Starfield.exe+28D80EB)
- test r13b,bl
- [RSP+C70 ] 0x26795EE0B51 (void*)
- [RSP+C78 ] 0x1 (size_t)
- [RSP+C80 ] 0x7FF63FFD7CC0 (char*) "\x13q\x02"
- [RSP+C88 ] 0x26795EE0B51 (void*)
- [RSP+C90 ] 0x0 (size_t)
- [RSP+C98 ] 0x0 (size_t)
- [RSP+CA0 ] 0x0 (size_t)
- [RSP+CA8 ] 0x0 (size_t)
- [RSP+CB0 ] 0x0 (size_t)
- [RSP+CB8 ] 0x0 (size_t)
- [RSP+CC0 ] 0x0 (size_t)
- [RSP+CC8 ] 0x0 (size_t)
- [RSP+CD0 ] 0x25ED27DCFD8 (BSJobs2::Detail::GroupThread*)
- [RSP+CD8 ] 0x7FF63C82D540 (void* -> Starfield.exe+4D5D540)
- jo short 000000000000007Ah
- [RSP+CE0 ] 0x0 (size_t)
- [RSP+CE8 ] 0x7FF63A3ABD70 (void* -> Starfield.exe+28DBD70)
- mov ecx,[35C71C4h]
- [RSP+CF0 ] 0x42AA647FF9 (size_t)
- [RSP+CF8 ] 0x7FF63DCFAA40 (BSFixedSizeBlockAllocator::TAlloc<4294967296,16777216,128>*)
- [RSP+D00 ] 0x42AA648116 (size_t)
- [RSP+D08 ] 0x26795EE0B29 (void*)
- [RSP+D10 ] 0x0 (size_t)
- [RSP+D18 ] 0x7FF63A3A735A (void* -> Starfield.exe+28D735A)
- xor eax,eax
- [RSP+D20 ] 0x7FF63DCFAA40 (BSFixedSizeBlockAllocator::TAlloc<4294967296,16777216,128>*)
- [RSP+D28 ] 0x7FF63C82D540 (void* -> Starfield.exe+4D5D540)
- jo short 000000000000007Ah
- [RSP+D30 ] 0x25ED27DCFD8 (BSJobs2::Detail::GroupThread*)
- [RSP+D38 ] 0x7FF63C82D540 (void* -> Starfield.exe+4D5D540)
- jo short 000000000000007Ah
- [RSP+D40 ] 0x0 (size_t)
- [RSP+D48 ] 0x7FF639DA17A1 (void* -> Starfield.exe+22D17A1)
- mov rcx,[3F30347h]
- [RSP+D50 ] 0x7FF63FDB78D0 (BSThreadEvent::`anonymous namespace'::Source*)
- [RSP+D58 ] 0x0 (size_t)
- [RSP+D60 ] 0x0 (size_t)
- [RSP+D68 ] 0x0 (size_t)
- [RSP+D70 ] 0x25ED27DCFD8 (BSJobs2::Detail::GroupThread*)
- [RSP+D78 ] 0x0 (size_t)
- [RSP+D80 ] 0x0 (size_t)
- [RSP+D88 ] 0x0 (size_t)
- [RSP+D90 ] 0x7FF63C82D540 (void* -> Starfield.exe+4D5D540)
- jo short 000000000000007Ah
- [RSP+D98 ] 0x66B5FFFA10 (void*)
- [RSP+DA0 ] 0x7FF63FDB78D0 (BSThreadEvent::`anonymous namespace'::Source*)
- [RSP+DA8 ] 0x0 (size_t)
- [RSP+DB0 ] 0x0 (size_t)
- [RSP+DB8 ] 0x0 (size_t)
- [RSP+DC0 ] 0x0 (size_t)
- [RSP+DC8 ] 0x7FF86E4DE8D7 (void* -> KERNEL32.DLL+002E8D7 BaseThreadInitThunk)
- mov ecx,eax
- [RSP+DD0 ] 0x0 (size_t)
- [RSP+DD8 ] 0x0 (size_t)
- [RSP+DE0 ] 0x0 (size_t)
- [RSP+DE8 ] 0x0 (size_t)
- [RSP+DF0 ] 0x0 (size_t)
- [RSP+DF8 ] 0x7FF86FA0C48C (void* -> ntdll.dll+008C48C RtlUserThreadStart)
- jmp short 000000000000002Ah
- [RSP+E00 ] 0x0 (size_t)
- [RSP+E08 ] 0x0 (size_t)
- [RSP+E10 ] 0x4F0FFFFFB30 (size_t)
- [RSP+E18 ] 0x4D0FFFFFB30 (size_t)
- [RSP+E20 ] 0x21 (size_t)
- [RSP+E28 ] 0x7FF86C615510 (void* -> KERNELBASE.dll+0115510 UnhandledExceptionFilter)
- mov [rsp+10h],rbx
- [RSP+E30 ] 0x66B5FFDDC0 (void*)
- [RSP+E38 ] 0x66B5FFDDC0 (void*)
- [RSP+E40 ] 0x0 (size_t)
- [RSP+E48 ] 0x0 (size_t)
- [RSP+E50 ] 0x0 (size_t)
- [RSP+E58 ] 0x0 (size_t)
- [RSP+E60 ] 0x0 (size_t)
- [RSP+E68 ] 0x0 (size_t)
- [RSP+E70 ] 0x0 (size_t)
- [RSP+E78 ] 0x0 (size_t)
- [RSP+E80 ] 0x0 (size_t)
- [RSP+E88 ] 0x0 (size_t)
- [RSP+E90 ] 0x0 (size_t)
- [RSP+E98 ] 0x0 (size_t)
- [RSP+EA0 ] 0x0 (size_t)
- [RSP+EA8 ] 0x0 (size_t)
- [RSP+EB0 ] 0x0 (size_t)
- [RSP+EB8 ] 0x0 (size_t)
- [RSP+EC0 ] 0x0 (size_t)
- [RSP+EC8 ] 0x0 (size_t)
- [RSP+ED0 ] 0x0 (size_t)
- [RSP+ED8 ] 0x0 (size_t)
- [RSP+EE0 ] 0x0 (size_t)
- [RSP+EE8 ] 0x0 (size_t)
- [RSP+EF0 ] 0x0 (size_t)
- [RSP+EF8 ] 0x0 (size_t)
- [RSP+F00 ] 0x0 (size_t)
- [RSP+F08 ] 0x0 (size_t)
- [RSP+F10 ] 0x0 (size_t)
- [RSP+F18 ] 0x0 (size_t)
- [RSP+F20 ] 0x0 (size_t)
- [RSP+F28 ] 0x0 (size_t)
- [RSP+F30 ] 0x0 (size_t)
- [RSP+F38 ] 0x0 (size_t)
- [RSP+F40 ] 0x0 (size_t)
- [RSP+F48 ] 0x0 (size_t)
- [RSP+F50 ] 0x0 (size_t)
- [RSP+F58 ] 0x0 (size_t)
- [RSP+F60 ] 0x0 (size_t)
- [RSP+F68 ] 0x0 (size_t)
- [RSP+F70 ] 0x0 (size_t)
- [RSP+F78 ] 0x0 (size_t)
- [RSP+F80 ] 0x0 (size_t)
- [RSP+F88 ] 0x0 (size_t)
- [RSP+F90 ] 0x0 (size_t)
- [RSP+F98 ] 0x0 (size_t)
- [RSP+FA0 ] 0x0 (size_t)
- [RSP+FA8 ] 0x0 (size_t)
- [RSP+FB0 ] 0x0 (size_t)
- [RSP+FB8 ] 0x0 (size_t)
- [RSP+FC0 ] 0x0 (size_t)
- [RSP+FC8 ] 0x0 (size_t)
- [RSP+FD0 ] 0x0 (size_t)
- [RSP+FD8 ] 0x0 (size_t)
- [RSP+FE0 ] 0x0 (size_t)
- [RSP+FE8 ] 0x0 (size_t)
- [RSP+FF0 ] 0x0 (size_t)
- [RSP+FF8 ] 0x0 (size_t)
- [RSP+1000] 0x0 (size_t)
- [RSP+1008] 0x0 (size_t)
- [RSP+1010] 0x0 (size_t)
- [RSP+1018] 0x0 (size_t)
- [RSP+1020] 0x0 (size_t)
- [RSP+1028] 0x0 (size_t)
- [RSP+1030] 0x0 (size_t)
- [RSP+1038] 0x0 (size_t)
- [RSP+1040] 0x0 (size_t)
- [RSP+1048] 0x0 (size_t)
- [RSP+1050] 0x0 (size_t)
- [RSP+1058] 0x0 (size_t)
- [RSP+1060] 0x0 (size_t)
- [RSP+1068] 0x0 (size_t)
- [RSP+1070] 0x0 (size_t)
- [RSP+1078] 0x0 (size_t)
- [RSP+1080] 0x0 (size_t)
- [RSP+1088] 0x0 (size_t)
- [RSP+1090] 0x0 (size_t)
- [RSP+1098] 0x0 (size_t)
- [RSP+10A0] 0x0 (size_t)
- [RSP+10A8] 0x0 (size_t)
- [RSP+10B0] 0x0 (size_t)
- [RSP+10B8] 0x0 (size_t)
- [RSP+10C0] 0x0 (size_t)
- [RSP+10C8] 0x0 (size_t)
- [RSP+10D0] 0x0 (size_t)
- [RSP+10D8] 0x0 (size_t)
- [RSP+10E0] 0x0 (size_t)
- [RSP+10E8] 0x0 (size_t)
- [RSP+10F0] 0x0 (size_t)
- [RSP+10F8] 0x0 (size_t)
- [RSP+1100] 0x0 (size_t)
- [RSP+1108] 0x0 (size_t)
- [RSP+1110] 0x0 (size_t)
- [RSP+1118] 0x0 (size_t)
- [RSP+1120] 0x0 (size_t)
- [RSP+1128] 0x0 (size_t)
- [RSP+1130] 0x0 (size_t)
- [RSP+1138] 0x0 (size_t)
- [RSP+1140] 0x0 (size_t)
- [RSP+1148] 0x0 (size_t)
- [RSP+1150] 0x0 (size_t)
- [RSP+1158] 0x0 (size_t)
- [RSP+1160] 0x0 (size_t)
- [RSP+1168] 0x0 (size_t)
- [RSP+1170] 0x0 (size_t)
- [RSP+1178] 0x0 (size_t)
- [RSP+1180] 0x0 (size_t)
- [RSP+1188] 0x0 (size_t)
- [RSP+1190] 0x0 (size_t)
- [RSP+1198] 0x0 (size_t)
- [RSP+11A0] 0x0 (size_t)
- [RSP+11A8] 0x0 (size_t)
- [RSP+11B0] 0x0 (size_t)
- [RSP+11B8] 0x0 (size_t)
- [RSP+11C0] 0x0 (size_t)
- [RSP+11C8] 0x0 (size_t)
- [RSP+11D0] 0x0 (size_t)
- [RSP+11D8] 0x0 (size_t)
- [RSP+11E0] 0x0 (size_t)
- [RSP+11E8] 0x0 (size_t)
- [RSP+11F0] 0x0 (size_t)
- [RSP+11F8] 0x0 (size_t)
- [RSP+1200] 0x0 (size_t)
- [RSP+1208] 0x0 (size_t)
- [RSP+1210] 0x0 (size_t)
- [RSP+1218] 0x0 (size_t)
- [RSP+1220] 0x0 (size_t)
- [RSP+1228] 0x0 (size_t)
- [RSP+1230] 0x0 (size_t)
- [RSP+1238] 0x0 (size_t)
- [RSP+1240] 0x0 (size_t)
- [RSP+1248] 0x0 (size_t)
- [RSP+1250] 0x0 (size_t)
- [RSP+1258] 0x0 (size_t)
- [RSP+1260] 0x0 (size_t)
- [RSP+1268] 0x0 (size_t)
- [RSP+1270] 0x0 (size_t)
- [RSP+1278] 0x0 (size_t)
- [RSP+1280] 0x0 (size_t)
- [RSP+1288] 0x0 (size_t)
- [RSP+1290] 0x0 (size_t)
- [RSP+1298] 0x0 (size_t)
- [RSP+12A0] 0x0 (size_t)
- [RSP+12A8] 0x0 (size_t)
- [RSP+12B0] 0x0 (size_t)
- [RSP+12B8] 0x0 (size_t)
- [RSP+12C0] 0x0 (size_t)
- [RSP+12C8] 0x0 (size_t)
- [RSP+12D0] 0x0 (size_t)
- [RSP+12D8] 0x0 (size_t)
- [RSP+12E0] 0x0 (size_t)
- [RSP+12E8] 0x0 (size_t)
- [RSP+12F0] 0x0 (size_t)
- [RSP+12F8] 0x0 (size_t)
- [RSP+1300] 0x0 (size_t)
- [RSP+1308] 0x0 (size_t)
- [RSP+1310] 0x0 (size_t)
- [RSP+1318] 0x0 (size_t)
- [RSP+1320] 0x0 (size_t)
- [RSP+1328] 0x0 (size_t)
- [RSP+1330] 0x0 (size_t)
- [RSP+1338] 0x0 (size_t)
- [RSP+1340] 0x0 (size_t)
- [RSP+1348] 0x0 (size_t)
- [RSP+1350] 0x0 (size_t)
- [RSP+1358] 0x0 (size_t)
- MODULES:
- _nvngx.dll
- Address: 0x7FFFF2220000
- SHA: 1FEFAACC9D10AA69F035162A0A58DD780DFF676E8096254B109A1B8F71A9BB37738B8F13648B50B693752BB942B6160D497C9EB6CB112E72459C8F6CB57B32F7
- Version: v32.0.15.9186
- ADVAPI32.dll
- Address: 0x7FF86D830000
- SHA: F0ADC10AE7B0D28A37EC3580D4A1A2171230473BCD6AA2EE0D9D8527CA9421DB924E6805C814788A2EDD4DB99E34F6862A17E3647AE838F8A517142C53B229BE
- Version: v10.0.26100.7705
- Allow-Unattached-Modules-Mod.dll
- Address: 0x7FF858D20000
- SHA: 194B3682F1966CC765079D0881F8F48605996DE653D514ECEF7F229769B646BA61ECB84BB6FA524BB32F288E1A6DFA090D8B419C2C3A3FDBEB03261B06D22494
- amsi.dll
- Address: 0x7FF858190000
- SHA: 18F46CC656494C437840FB9ECFA4D690D3D71043BF64539B4E837AC621C882DAB3722D6E03E5022CF57ED6A90B85A7AC239982027E8197D6EDEA88411CE983DD
- Version: v10.0.26100.7309
- AUDIOSES.DLL
- Address: 0x7FF85EF20000
- SHA: A0C6D0AAE785FF5B243C4FD77DEF5B37239C35855ECBC0AB163C985F0427A7E2106D3552EF3881688E2840D4CAA96EE2413EBF927F1D06C3AA39931BF1BB9D5E
- Version: v10.0.26100.7705
- BayAndDocker-Count-Mod.dll
- Address: 0x7FF858D00000
- SHA: 873B4188C86C734401641F3B8A0FDE8B81CA4736615C585D4E2D37AEA0EC4B4B1F777A5F82EA5FC77818113C786381D8114599C654CE061129985BBAF8853266
- bcrypt.dll
- Address: 0x7FF86C150000
- SHA: EA5FE67D6151E67CC12E13A199D7F1687A8523967E80093784B3FA4BC00C48C8D959AAF8DE2DA07787622B2480783810E4F9938AB3518F75F43C914952DF00E1
- Version: v10.0.26100.7705
- bcryptprimitives.dll
- Address: 0x7FF86D670000
- SHA: 8B6F0CD05B49AA288AD930F898D89D0D366E4721F0208F5720D0B75B189374B97F51BE9868FE355CCB0DE7179F6341E98A4D391B76633212D79907A1CC241CFE
- Version: v10.0.26100.7623
- bink2w64.dll
- Address: 0x7FF857B20000
- SHA: 61AB61B895332AE98F5491D07975E5D6A1E42747DE1AE292298CB008AB63AB410F8A7684DB7DDA694EBCC351783D68EDB167B4EEEAB74DBEC6C1BB238E62BEED
- Version: v2023.2.0
- CFGMGR32.dll
- Address: 0x7FF86BEF0000
- SHA: F61930DB56ECFE6E33B92416FFD7363B66B5DBB55033FE771CBD07542AA114EC532EEC8F57F5300710C116278752911D847975A043DE5E29CC7103982B93CF07
- Version: v10.0.26100.7309
- clbcatq.dll
- Address: 0x7FF86DA40000
- SHA: 163BE5BB660BD0B69C5262369FA2D42A5D42C184046578ABC0567DBDD7BBFAFD550446B75AE326731465F76329093A430F5382920D64A57C73AC7C806230A6AC
- Version: v2001.12.10941.16384
- Cockpit-Count-Mod.dll
- Address: 0x7FF858CE0000
- SHA: FF5820200D906D83818EB3138ADF78AD2020E056A160594C3AF6F21083C2E23F99142A499CDA13A2DF8444A9A13FC3AA80035042A4AE86B265041554A1A1B6C6
- combase.dll
- Address: 0x7FF86DBF0000
- SHA: 3ED844E34F7DD6DBBA55C6FDA0C380664A9F29E4959408C378BCD37D0A84ABB5F3749CF695A2DE03AE4F02192D786352BACB53FAFD0291A36458CD34F669DD1D
- Version: v10.0.26100.7705
- CONCRT140.dll
- Address: 0x7FF858A60000
- SHA: 11FE4C0519CB1DF73695CE38B5FDEA2A563DE565116A47FF0032D5A68B8C51FE732AD66738A7167E56D79193C60AF9204A7EE0BEAE8FF8BB75ABD0B484C2D764
- Version: v14.44.35211
- CoreMessaging.dll
- Address: 0x7FF8696E0000
- SHA: F938F71C10EB50C0E9C313937C343C54B4A071D12C72E28AE5B7AF82BA091D12255DEE3359EE06EA3601658FDEDD53E2D20656AEAC93869051B9F1A0A6676633
- Version: v10.0.26100.7920
- CoreUIComponents.dll
- Address: 0x7FF866A30000
- SHA: E4402E357445FA36CE87EF5A28AED38CB9ED19F91B3C35006E9C54DE7E216206A7AD802317E3BB1C9FDF8AD05B12E2A9BF9A14BEFE06B6192C0DEA28AF67C9B9
- Version: v10.0.26100.7627
- CRYPT32.dll
- Address: 0x7FF86D430000
- SHA: D5F09C224DC2C881B1FD4C512AD8D8324A7A23300C01B99D3506D245F2F9CAD417B0068CE19670DD5BBA3011D17A82CDD513040DBAB8AD7774E71E37971A0780
- Version: v10.0.26100.7705
- cryptbase.dll
- Address: 0x7FF86BB00000
- SHA: 199C48287F857A6C04F1F86991148EB15F615011DC7751DD169E00BF4DE2F6751AA7419D079C457EBA9448D5763CD0F80F9911C72B9A4E65465EE0A08D9B36E9
- Version: v10.0.26100.7623
- cryptnet.dll
- Address: 0x7FF866260000
- SHA: C67FA7C356FA9AEFA9E8D81144754C2DA682A7B8C29F0F42AF92B0C68D67550DD5A0C98C4979FC8BB41BBF9778B972AD541D5EE88E9CEE36A31677D795A826DF
- Version: v10.0.26100.7309
- cryptsp.dll
- Address: 0x7FF86B840000
- SHA: 50D6D3173592F7B76CC128FF73CB6292712F0712A94B4A64E6E522A8A56355EAA78BA78A9C4877958E8FCCD7D7032E890353C854C4A78BE4E04BDD846C557F86
- Version: v10.0.26100.7705
- d3d11.dll
- Address: 0x7FF8687C0000
- SHA: BC0D505168A91B11088893047C51F891DF4FE98FF64490435DD433D66CD7EC6971F1412511124A3CC24BB7AE775F57930C1F001D7FF2F8892DB00703473EAC8B
- Version: v10.0.26100.7920
- d3d12.dll
- Address: 0x7FF8490C0000
- SHA: CD3C64303CD6F1F3FE8EEBA20908136C33F4934CD56DF3BF4B068FE2D17DE128A81D9DB75CB1339CE9B8BA1756793CB82EF272DB6A9FC1A51E1E6C7CE5DDE30D
- Version: v10.0.26100.7920
- D3D12Core.dll
- Address: 0x7FFFF2690000
- SHA: 13DB7EEA8875704650ECB19CA50CF702336E1D3AFEF999BCA883DC2925B0575ABA9950013E3AFAF4E69D47668C47A2C00AAE9C897C18FBBD14E4B58E8831588F
- Version: v10.0.26100.7920
- D3DCOMPILER_47.dll
- Address: 0x7FF867DB0000
- SHA: BBF70EC6B44C4829B8E356F8513FC866CE23B373DD5453C2D1885964A96A68B0D3AE78E9D6BF99C6F3F2447A4E9C757D8F31D7E5EA75B29207943271531D01FF
- Version: v10.0.26100.8036
- D3DSCache.dll
- Address: 0x7FF82DA20000
- SHA: 1C71009F9AE98F1C5FFD7521E6A73B944A0BEE4848690D9E7DBAE26E801FE9870B840DF2ED679DC9EB3E6F737CB94E117D7FD030A10F026DBB2617E465D41908
- Version: v10.0.26100.7705
- dbgcore.DLL
- Address: 0x7FF84B570000
- SHA: AE90F0720F96D8E4FEE8EFB6D9616A70BB33C20129F63569206B9153A0845C474A6BEE75147C43F54F33ADAE29DCCDCB0A0640C3DE5B1ABB1E5A54AA1F8A2ECA
- Version: v10.0.26100.7920
- dbghelp.dll
- Address: 0x7FF854640000
- SHA: 6D5B839B014D5939C8B2BF31CF9038F70D22A4BB4883C714D1F8EC96D891CDEF60D682BD162BD11DFBC68E6E464F0CC6F55BE764F14DBD19524753C271034C3E
- Version: v10.0.26100.5074
- dcomp.dll
- Address: 0x7FF869070000
- SHA: C0D1452AEF801C972A702E8D1B4E7A0BD1A6057E8DC9CD048E577DC544609BF1B9B91E8C2C6928B40E2FD6FCD0B01CC8956DB86A7357128399EAA5570538B977
- Version: v10.0.26100.7920
- devobj.dll
- Address: 0x7FF86BEC0000
- SHA: 701FA93590C1453301873595A66E4B3BC9751F55D55220BF0E905641496977EA1ECC7654E5264B4D250646EB4B795387470F044B65C5B3123FF62BEF4A84761C
- Version: v10.0.26100.1150
- dhcpcsvc.DLL
- Address: 0x7FF8662F0000
- SHA: 3D58B55B6EA6B278FC045FAD36C510EF80BF84D1E0C6656A1370D64E007570B9B23087EE1982A6F1C45531650F5BD9C4C690663D7D03629ABE8EEAADDABEBE2E
- Version: v10.0.26100.7705
- dinput8.dll
- Address: 0x7FFFF4F60000
- SHA: E864B7590C5D94ADBB0315E7E8E58FBFF0C5E79626015EF525299AAF5BEB0B40D5C25B2A10AC6E1FBCD32650CE40592477CC4AACE41C75FCF6FB6B063353257A
- Version: v10.0.26100.7705
- directxdatabasehelper.dll
- Address: 0x7FF867410000
- SHA: 416CA2DF388EFD512B57B315168CB19407C2E2DA44C1FD1F9EC420516F09F9FC52DB129D6A2BD4819EB0D11CB786BFAA8C8CDC3EA4DA7A3879B1B0D5E7A9E37D
- Version: v10.0.26100.7920
- dlssg_to_fsr3_amd_is_better.dll
- Address: 0x7FFFF23A0000
- SHA: BD86453422FFEF87A644F00EB93C20434DEB05AC6E7830EDB9737F4242FFF34A720A4DF0837C181E952FC8CC34E5396C4799ED1ED11ED389455B97B0E4141C2F
- DNSAPI.dll
- Address: 0x7FF86AA40000
- SHA: B31C2733FD865EC5541EF8D9BA3E0197242C69B7F1EFFB3B917FCA9DD95401F4853A7C7E6F288604F78A0C0A8B8AE633D65DBBE2776048DFF39548DEF09F1322
- Version: v10.0.26100.7705
- DPAPI.DLL
- Address: 0x7FF86BF70000
- SHA: 3E832A4BC1567C41DA538CE2EF401C13F139A37056E5F49E413899E0D47590F0DA3B1674EEA2D4193183E067ABC45B7D2D5676C91471261D98391432E0D0BD99
- Version: v10.0.26100.1
- drvstore.dll
- Address: 0x7FF866010000
- SHA: 5719A1A74964F35EF3C6890FB9AB91FCCE8A4BECF9B49116054813CA01EA026B52E1A458B130C7882ED750697CE89E024AF191586A0E7EFB07CC1F35A5522492
- Version: v10.0.26100.7920
- DSOUND.DLL
- Address: 0x7FFFCC100000
- SHA: 27B4E0B93AFB964EEE4AD7CC477B268867D5C368A2DCEE3EBAB0A53E1F983D12142F849C181B93A691310FC36D0E7294A007755894BDD4A29CC226BA9800E7F4
- Version: v10.0.26100.7705
- dwmapi.dll
- Address: 0x7FF869FE0000
- SHA: AFA07C9513067459983E96BE47CF809811F50AF1C5B563CC579FD6DF1B88C19FF4F4AE2AB249162247EC6D2D4925F333057B350EF474D1B1CC984682E63837CC
- Version: v10.0.26100.7705
- dxcore.dll
- Address: 0x7FF869E20000
- SHA: 6544D0C8C90783BD872338092C24CC2C595A7062975B7FF2D1E1354DD332F95FB110AA55832B528612EE14E5E2AA1192B7ADF59A33DD7B1FEB6F492130957F4B
- Version: v10.0.26100.7920
- dxgi.dll
- Address: 0x7FF869E70000
- SHA: 6F78A6D042B24013923D0C1A0CEA3BAC4DBAAF580FE3A98D6ED28EDC76EC342A035DC869393AC4A02D424FCBB1B2278CC6699E8E6366F1FFF79E36141C9F189F
- Version: v10.0.26100.7920
- dxgi.dll
- Address: 0x7FFFEFCD0000
- SHA: 7248440B03C059E54AB2BD935DCDBECF8F904301215404174B3BAF2548B3F4998907BA4D96D7F5F1CE7D90592223866C7D363E28B742F76416B9235E35CE20A7
- Version: v0.9.0.12
- Engine-Power-Mod.dll
- Address: 0x7FF858C90000
- SHA: 33EDE1E6C762392571D5B1083A1D64516459B7883BAAD8D2D30EFC73160E54CB7D9385548BD9BACECA6DFDF51E0FEE3C32D6322B8703CCEA28B026996A4B86D4
- fastprox.dll
- Address: 0x7FF851CF0000
- SHA: E0F98426A21E612467242D9A1355F223376B85FB3908AC52A4A7AA7F672C4FA1F95328E235F4980BFB9EBD6E2E127018FF6F2F0B7B548BF6DD064DC74D5227B7
- Version: v10.0.26100.7920
- fwpuclnt.dll
- Address: 0x7FF865E60000
- SHA: 1FCFCF17F3E86AB7BBB49E1DF32E05F13E283E2D47D25425D5751AC0E51135B1AD01C0A333220BEAD7EBB49B8B994FDC18D5907A07431AB0BE5AAE8E48604F3B
- Version: v10.0.26100.7705
- GDI32.dll
- Address: 0x7FF86D8F0000
- SHA: 5CEDF47EEA7298B2B4A2C81E3A3878CB5E9BB4A106DAFCBD02F958F483BA3BBBB554ACBE9FE06A39BA274EB7D4421D14DCE40D877DEFC81D5866BB792C7744F4
- Version: v10.0.26100.8036
- gdi32full.dll
- Address: 0x7FF86C3D0000
- SHA: 78AB1D7DA5703E01011208BE783D27855AD1BBFEA61427320BE0649C2CCEC1ADDDADB60F82821761FDE75795E43624D0E3C6F707D805BC45D0D488CAFC97E9D9
- Version: v10.0.26100.8036
- gpapi.dll
- Address: 0x7FF86B5D0000
- SHA: FF4AE19DA155CFFF14F5439492490D35DDA3730EA3C1B1051DC8C97387945BCA14992232673CC9DC04730B0D074F3159ADCD58E75D396E4A78646C233E52C3A8
- Version: v10.0.26100.7705
- HID.DLL
- Address: 0x7FF86A690000
- SHA: 544539016E5310BAD14FAEF413C0519200B7A93BCFEDD6005888D7E537047261882CC3D359F7F9FCC0500D3DDA8B89BE5F842830DE9B871544E2ABD69ACC2E25
- Version: v10.0.26100.7705
- iertutil.dll
- Address: 0x7FF8523B0000
- SHA: 1DCBD70553D616F265BCF22751D56995317756F794C7192A08D0A6EB744123647C3F16A77D75B84BE382ADD08931E3851A9B71086EB1FD42A9D22863E83302EC
- Version: v11.0.26100.7705
- imagehlp.dll
- Address: 0x7FF86E580000
- SHA: BE6A7403F192F64AB1C3BB3AB41282CE439496E0164F8C5419AF268E78B72B5B29FCC21898F926CFC059232A59BB97CABCC86C96944F0461135703B9E12B34B0
- Version: v10.0.26100.4202
- IMM32.dll
- Address: 0x7FF86F900000
- SHA: 797760D1C1B0B9350C1284DEF40760DD7AB085E30EE6F7BC189A45A35D3C740560822F5980D6F7C34FADB04D432F231F26291B75D7CFF51E47E9A3E7726CB660
- Version: v10.0.26100.7309
- inputhost.dll
- Address: 0x7FF84C210000
- SHA: 24033C59D2991E9671549BDD46C9D8CF3BA4D2928183DC31D96050C84323D0C6F4AC41ACE27391CFA9049F07D309AF20FDE904CD1B32437893E6CFDDDFAA5AAF
- Version: v10.0.26100.7920
- IPHLPAPI.DLL
- Address: 0x7FF86A920000
- SHA: 2D5FC9BC2EB150873578C0A3A29C09CA09DB242BADF29DCBBB6BA097F96B7E237CCBFBACE50C8A741F2D842C5EA300239BAA4299C8343001D62A655C1489505F
- Version: v10.0.26100.7705
- kernel.appcore.dll
- Address: 0x7FF86AFF0000
- SHA: 82C0DF45C8B257C5A5BB6120FC49C91FA0AEC30296569B22C7C7DD0E7B7CFB62C4F30E61FBA12E839BB2922C070D211AD66E29DF5177435F6025A1A02E32E0A1
- Version: v10.0.26100.7920
- KERNEL32.DLL
- Address: 0x7FF86E4B0000
- SHA: 60FA60BA562999BDB0E00C8992553FFD10ACD3653ACA56CFA1F478A2D93FC620FFD523D33173C8A0E0C37E3745C2AB2AC11AAB0746390525C22B21F89D5F8C7D
- Version: v10.0.26100.7920
- KERNELBASE.dll
- Address: 0x7FF86C500000
- SHA: 15EC1F487522B00A11294B643C25D9FB11D43F4C5DA50B89259DF56AC2FBAEDFA7CD2A96F7020E660D7C6C5F0C1E4741E722C679FC749559DABD4498DC61E120
- Version: v10.0.26100.7920
- LandingGear-Count-Mod.dll
- Address: 0x7FF858AD0000
- SHA: BB85B896F50D71BB2B1DEDE4AF032BB73A2E266EDDBC664DC005E7EC89EA5CEF923101C1A2CB296ABC717ACBE1B520501C483CDF8A6CFF5C3219834A91C8B5ED
- libxess.dll
- Address: 0x7FFFBFD60000
- SHA: FF63203BC0DF4975771A13622CB88617D0B90EDA81BC22A1BB21BDEF5E60DE89A959766ADAE453D447449993847BCA211E9FDF32F068F5D4DCD3C1786310833E
- Version: v1.2.0.13
- lootwornarmor.dll
- Address: 0x7FF84AC30000
- SHA: E0491B4A949291C2FC847C55FC51850C7E31582EB23E60B9DD1E7A7809B4111037CEB0549C913A2A601404D4C4C6622FEDDF6D2E77BB12E8EC5EBC4F32D26D9F
- Version:
- Microsoft.Internal.WarpPal.dll
- Address: 0x7FF868470000
- SHA: 41D04733DBAE49B3FFBDDAD0613D30D4A05A2440DE7B790ADCAEE7830DE397505664AC5E49E9B9C0558CF34F640A0A3A5C59775EFB1AD1601334AA61185CC1D7
- MMDevApi.dll
- Address: 0x7FF860700000
- SHA: 06D2753F77ED025EC3D698C18FCCDD73AFAC8DE99D33A53DD78DCD67AAAB329B07227F5E9809CB3AE19A6A3A9969C3E5C501455FC4E69B684F9F51FADA7F89DD
- Version: v10.0.26100.7705
- MpOav.dll
- Address: 0x7FF857F10000
- SHA: 31D0E46EFF1BA1025D04243F9D173CD93C2DDD1A763A18065AE63606A3DBE98143EEAE72D0EDB981742E0E01D06DB58A261975814D2B8C30855625B346ECB9B9
- Version: v4.18.26030.3011
- msasn1.dll
- Address: 0x7FF86B960000
- SHA: D71578248F5097098B7AF32BC691EF5DCA57FB7E532A66412B2E25F992499745219AF5664C4E99C7CF5DFC50E9C9049AC178E6F6F609D0B869B2499A584EFC44
- Version: v10.0.26100.7623
- MSCTF.dll
- Address: 0x7FF86F600000
- SHA: 34E28ABDF21E57CABA5F4A145BFE41A7EFF32B74B26B18CCAD20FC61C4AC427946C5177F2C263D1D91B7BA1CC8BB0857EE3FAF3833469A15CA99C9F9C6EE2DCE
- Version: v10.0.26100.7705
- msdmo.dll
- Address: 0x7FF844330000
- SHA: 3D980D5108DDEF62F8386ED36733453074DE567E7D031B77E8DD642BE0A75639DD5F2D0F05E573F927E5DD34177DF09496B500B29BFC27213207C578FCC295EE
- Version: v10.0.26100.1150
- MSVCP140.dll
- Address: 0x7FF84F460000
- SHA: B7AEE12E1BF86027E3C42AE28F6F6FB34DCA81C1F5AF6983EA4AAC559F2FEDF945956A381F529C553D71BC83CD71DCBAD12266FAD86C944F17F63DB92B8CA95B
- Version: v14.44.35211
- msvcp_win.dll
- Address: 0x7FF86D2F0000
- SHA: F85588611922065F4346755B53493F065451CD21F150AC80BD400432BEA18CC735F28CDDF1CB65B45E737C83223F5E5E9549E0DE13DA110F3C50C86DCCA4535E
- Version: v10.0.26100.7623
- msvcrt.dll
- Address: 0x7FF86EB30000
- SHA: 8910A8DC53B5C804FE6F43AABD566C83273FD90D41604265094F85DCF5E585C6D6241FC2BF31FF86DF108142670817E95DF95B3FFDAF32A72F8FC574250F1202
- Version: v7.0.26100.7623
- mswsock.dll
- Address: 0x7FF86B560000
- SHA: 14A489A2B11312829C4AD9BF1145A369EDB02C35B42ED63B7335AF26DBDC551ACE2F12EF541B569C57B49B6C2A936DDDD72EAFE8EAB018A17A121C866E250FFA
- Version: v10.0.26100.7705
- napinsp.dll
- Address: 0x7FFFFE1F0000
- SHA: B9C968E3BDF2E2321FBADE7599C17631A1859CAD377AC7D5E7E319C2E482B90DB047A157A1A55BD2A45B267DDE89F9C6A1C2046F18D75E1372030F639F5AED46
- Version: v10.0.26100.7705
- ncrypt.dll
- Address: 0x7FF86BAC0000
- SHA: 5F3CFE5F84020BD1681649398EE0FAE01E45F976803CDC9F1CA1BC6C5F5EAE503049CE1AE850EF26D2973829AC762FAF8211D21BE85BDF97C05BBDCDAB83000B
- Version: v10.0.26100.7705
- ncryptsslp.dll
- Address: 0x7FF84E130000
- SHA: CAB16ECA0B2219AA3E5E4D153EE5898C611C29955BF0DD45C7944B595BBD3CC87ABAD28BF7E86AF4F5D6D4E30B97344814E585ED663E427875B15C9C944C4FE0
- Version: v10.0.26100.5074
- netprofm.dll
- Address: 0x7FF8674F0000
- SHA: 13F8E95566883E336ED18464582270417CCD4FA93B4CF63050629511B1FE8FB84E3984F1FAC7ECC1D490CF0F82B4D887B159CF783A97FF3DFB795B5A5D1095D1
- Version: v10.0.26100.7705
- netutils.dll
- Address: 0x7FF86A910000
- SHA: A2DEB0B78ACCFAED7B9147D24E4301398DC84C331EBE3043BA198F0B04C39C06CA0570595DB2A24F03E0869656292DC97BA8778FB035CF06EF0F68AC7D54ECB2
- Version: v10.0.26100.1882
- nlansp_c.dll
- Address: 0x7FFFFE230000
- SHA: 6B53792B60D2A018B7BA3E8E7FE7676EA8EDE805126C2FC23E4283516AAC53843311D69182BAA25C0530F90018A546B33478FF31DDEF877B1A0E0D8486BA925F
- Version: v10.0.26100.7309
- npmproxy.dll
- Address: 0x7FF865DA0000
- SHA: 6A45D04454E8F51407BE9D13A2D843130B67A90793AAED1DDD4319EB187DA9677E12AEBC1EDE9CE54189FA1C824C843C6F1DD66ADA065A535A67F6231368CDDD
- Version: v10.0.26100.7309
- NSI.dll
- Address: 0x7FF86ED80000
- SHA: 633C0744E5FF32AA8C47AA1E961D16191509CA23C2FB72188FDFB316087EE72790668F8D9D3C82321B8ED115859220DA79E6BFB5EDD48ACF8DDDABF0CB9F418F
- Version: v10.0.26100.7920
- NTASN1.dll
- Address: 0x7FF86BA70000
- SHA: A7073268A16E89DC503434DC1FE745A4F21FBF549C78ED69D7E1FCF0FB2F1333462426E570CCED18558F47A33048F2B4214D38D37F6518DC05586305C989815B
- Version: v10.0.26100.1
- ntdll.dll
- Address: 0x7FF86F980000
- SHA: BA948F4BCABC2B669C61AE69D0E69CD95B1817526B189773A1DC1DA7C4F7C2ED25C6AFA1260E548B0905B9576871135C36CCFEDCB961C51F5F65738E4FF511FA
- Version: v10.0.26100.7920
- ntmarta.dll
- Address: 0x7FF86B110000
- SHA: AF5626D82C4123CE36E5E4681ACEAA4B6C67F1E372B53FBF9A778CA1790D97894C501E6C706A4F3701D53A06B12B22E1A7B6872E399A5CD6B4E8D6E51FE6F013
- Version: v10.0.26100.7705
- nvapi64.dll
- Address: 0x7FF851750000
- SHA: 6424E0793FAFA72344AC3704CFD8EF20EA533750EE4EADC6F469BBD2D25E2826D26E31BA440743541433F12336BC2498A6D81DE295809F0948453B6EBC5D328B
- Version: v32.0.15.9186
- nvcuda64.dll
- Address: 0x7FFFE81B0000
- SHA: 71B35D76513E004047ECE5687B715776DB12648186231D2978956F9FEB4611E0C0158C606D30F456A8E67A25CFDBD8B9C64A37A985099BDCAC17462B593C16E9
- Version: v32.0.15.9186
- nvdxgdmal64.dll
- Address: 0x7FF84A780000
- SHA: 319B0FA538DE599A15A9CABA8877F748892B71A602D7F86FB21077F0546EB52FF1C3D3227A98C56ED50D743870E527771950F36CDDD35083FC91CBFFF2143256
- nvgpucomp64.dll
- Address: 0x7FF860EC0000
- SHA: 02AF18A3BBE15A0DE09FF8575826BF94839355E09A5B597C6C95535A255BA4F612EDA340E4F2EF3AD65A1CAB843FFFB76727FE4594154DB3E528BB3869DEF09F
- Version: v32.0.15.9186
- nvldumdx.dll
- Address: 0x7FF866340000
- SHA: 151791DCF65EB1D71E29E6658D24FCC0A5187450BAB1497B7A41F270C7E8EB74E87F9447B09671D26A92551DD303ACEF1AF0C09E0697161C3C70466C4CBF6B7D
- Version: v32.0.15.9186
- NvMemMapStoragex.dll
- Address: 0x7FF8600F0000
- SHA: EE04551E5A1632CFB9D98801ADD470C7239983B5AA2B473AD89EAC27C8E19DC824C5A042EDFAEDB6783ABA66E94F2E2D55F744913A1971ED3E555B4C6380321F
- NvMessageBus.dll
- Address: 0x7FF84E180000
- SHA: 4DACE298C48414C7C359A9FB45A6C13EC1B7AB859E23E542B665BD661F5C59BBFEEE486CB0B25E3F4AB7EBCA84F781ECBF165CB3F6C8211457470FD4E6168084
- nvngx_dlss.dll
- Address: 0x7FFF98240000
- SHA: 56037EF9ACEA29A074CFBD63D2F4B15325864DAC8F871EDED336D8EE50A4EDE7652212090009420A1A8E2EE4541DB238E17586DD0246FEE3F6A935B140B68BD7
- Version: v3.5.0
- nvppex.dll
- Address: 0x7FF82A0D0000
- SHA: 883FD060F145393B3AC59EE1A4D2BE34ABFF755CCEF99B65A3476F186F542391BF399289601B75AA5E5B6771C21BA1EFF81A29EBD19CF75E55E204628C11D8AD
- Version: v32.0.15.9186
- nvspcap64.dll
- Address: 0x7FFFFCC80000
- SHA: 1297B4362D9F0211AE1D9C55D7EC19BA5B16B2752D49992CBD16DE975DB15A4BA6C9FA0001B708E7510F3F98CA90A6B07E49EE2CA8CD752CE2DBF35C864263E7
- Version: v11.0.5.420
- NvTelemetryAPI64.dll
- Address: 0x7FF84BA90000
- SHA: 1716E491F265E8C0053594F13F130661B91343231B92404BC51F1AC37FB1F39D752680A0D763DEECDD961EF64BC0ADC440CBAE06D7B969870B78BB58FECE2137
- Version: v19.4.29
- NvTelemetryBridge64.dll
- Address: 0x7FF846DC0000
- SHA: BCFF21B0755F014BC236C31A0C3B74751E5BD4C94EF6B59E85E660FF86351F848F3CB9D054657977EB3FC43C9AD32EA48B9BF9572F765D26984C3FD335C20B87
- Version: v19.4.29
- nvwgf2umx.dll
- Address: 0x7FF859C10000
- SHA: 7B1BF3F5ADC1368A28F6AF84F9A120B01FE6618EAF6DE4B29EB2FF624B7CCCF518F1E14FF3F74B01722935C29735AB18E4514DF087FF1540B601F66E5411E369
- Version: v32.0.15.9186
- ole32.dll
- Address: 0x7FF86EBE0000
- SHA: 4441998B8A7BFDE7374AD867FD2E079BD1A3CEC4924A630F17DC07D594A77A78202F478EEFF72B7C8E938A571D996F187459CEA7768F0DB3E52DC5DAB947A4C7
- Version: v10.0.26100.7705
- OLEAUT32.dll
- Address: 0x7FF86DF80000
- SHA: 5AC2AE87F87301CBA20E5C1B1E3BF7231178B2FBC45B560350D7A9D6FACB99CB2B405D318F5A1588137127C9BB0ED168E5D5DAFD717CA1CD259A44C57001085D
- Version: v10.0.26100.7920
- ondemandconnroutehelper.dll
- Address: 0x7FF84DA60000
- SHA: 0EBBCAF9ED4B4E237B9121B9D1772E9A61C4BC1C0F395DED6E88CBC89819EE88E71CF0D4EF73110F715007C0031AC36C8678AA7EC4F1472F1255F57CAE20DB19
- Version: v10.0.26100.7920
- powrprof.dll
- Address: 0x7FF86BE50000
- SHA: B341C466B2C79D54E4FC19214DC99E33CB7AB01C0D07D01CFC3CAC2991D2AB2B1228C4FBD2DFB16BCFF775E4654C7A67B120F107AC4A2E77BFB4C932916F6E25
- Version: v10.0.26100.7705
- profapi.dll
- Address: 0x7FF86C180000
- SHA: 13C97CBCEF0951ADAB341D96270076407C05E2C4FADD1E3B4EB2B6034BD7F5EEC3AB7A153CE7FAC0BB1463933156FFBCD01EC406D8159CE81B5FFA8CCAB416AA
- Version: v10.0.26100.7309
- PSAPI.DLL
- Address: 0x7FF86D820000
- SHA: 986DBB58CB62378FA9AB8A62A1362DEBF59CF674ED811F6BE727B106EB672860119EC120BF9B6361DFDB919737BA1B356BCBA5CCF7E1E4A82945B0371386F5BC
- Version: v10.0.26100.1
- rasadhlp.dll
- Address: 0x7FF860B90000
- SHA: 2AFB7A58E05F99124B2556593D570FBD6384165C3442D17D74BF794D2AFB9EFFA08FC414E5CB529E26413591A4008AFA999A3D8CD50C0B43093C87DA200AFBCE
- Version: v10.0.26100.7920
- Reactor-Class-Mod.dll
- Address: 0x7FF858AB0000
- SHA: 80AF0754B39CF593B8342FCB5C62D0BBC44272CC2808E37BC54B9DCE70A6BF9AEDFEE3AB78C261D7F2369894CE505A541CF40D4313F11AA5D9E8D57E29F23F17
- Reactor-Count-Mod.dll
- Address: 0x025E85B00000
- SHA: FDE17A9E1D5EEBFE4EE9B62D0512082882642249221EB66035E4C02E18324735821F44C92859E243A01EB428B65A975DDAD77CBCCD4A5451C17FE4569BE62031
- ResampleDmo.DLL
- Address: 0x7FFFCC040000
- SHA: 563D32ED13C547AA3ED68435BD876CA9CFE694BC38D66FA72819DE36CDB8C2C4B34574D368929EAF559A4969E122B5883D7F6A649266FCCBDAAE488AE7742DAE
- Version: v10.0.26100.7019
- resourcepolicyclient.dll
- Address: 0x7FF86A270000
- SHA: A02B4F62F19CE1959BBD9A81E6520E2D18FFC4BC4E92D988394831D2D22E0855B517A85B8993C1609B0A866CCE35C339CB37705E6BC6065269F1349978717B10
- Version: v10.0.26100.7309
- RPCRT4.dll
- Address: 0x7FF86F7E0000
- SHA: 1913F31B893258D94C8CF83B92232DB67E80017A528D9FF9EDF1BA13135F45E33A2D33EBC2EFBAC381690AB4C781794F1F4EFF3C81878A75DB7D58575B591670
- Version: v10.0.26100.7705
- rsaenh.dll
- Address: 0x7FF86AF50000
- SHA: 36BA2593DEA8393B6569B898462F030115BCAE88C8026EA33AD2A8BE719C4782812CBC37B6F4BD91BC81407362FF4732C1A3A236C6F8920204DE212C5565A56B
- Version: v10.0.26100.1
- RTSSHooks64.dll
- Address: 0x000180000000
- SHA: E1BD24A42BF9646A2CE62FAAFE95B5E263185B0D4D66B06434F6B16EB3F8C8934127CCDFD94A8D2BA010817FA4283398EB5278E80189225783723E8335B0BEAF
- schannel.DLL
- Address: 0x7FF86AE30000
- SHA: 2C043CDD1DE62D94AE3D9C240F78EAE4A8452355D854F47E172B85AF2DF32B3DC8E3F23301309C89C34C4234F2CF98FC3EBE4913BE7DB5F86E79D2F02DBB71A8
- Version: v10.0.26100.7705
- sechost.dll
- Address: 0x7FF86D990000
- SHA: F8657360C0BF8F5FEBCCCC91A0EE1DF59CBFABFB609D7257BF9F7A01579B19DF104AA94429398B1BF9443BC314DF99093EE263960B251ABAD5CF71680CC39960
- Version: v10.0.26100.1
- secur32.dll
- Address: 0x7FF869AC0000
- SHA: D645EC0967D5DCA5B6179E752BA26FD2B5DD482CF1E3001ECB7A96C6D70699BF784D75D907CFE11BEA930346029E2659EEFB225C56993B02F6158C2C8C684856
- Version: v10.0.26100.7705
- SETUPAPI.dll
- Address: 0x7FF86E600000
- SHA: 6A36F607456A3B46CE2F4B4FFEED7B950F8C13C0FC1FB9AB08313D2F5AFA3E86B742DE34390877A8D34E06A9ADC06F858059B94207FA1514CC03197AB3BB9A19
- Version: v10.0.26100.7705
- sfse_1_16_236.dll
- Address: 0x7FF857AF0000
- SHA: 798F68ACC987B22E520FBE1199D6DB47669266B62A2A12FF90FA3AD7F34188CAC108F58A517236220263F6D0842DEDCA19E1D135326F3F81DFFE62A82F2B731C
- Version: v0.0.2.19
- sfse_plugin_console.dll
- Address: 0x7FF859040000
- SHA: 7A1A7053496D3AE20014B6D7104D63BBD314F91182B60445DC38362436163B8D1E2439A0EC3D7DA8B9291C07ADDC18E93F396589BCEA7AB10765EB41ACBE78F7
- Version: v1.19.0
- SHCORE.dll
- Address: 0x7FF86F500000
- SHA: 1C3C9B7D5B9AC43A450EF63BECC6ADDE6C868115ADEC99F31277C806CD07B4B8DF16FC2431A7ABCDA3113D575F265649AC9CDD069E0B4356B53C37B06720067D
- Version: v10.0.26100.7705
- SHELL32.dll
- Address: 0x7FF86ED90000
- SHA: BB8CE034F5C475B50EDE15101313154DDB703D1A19879EB19D5EBE95A9E6E08CECF682297E628DDAF031E2420ABB3F524A43561932F417691903A6C502BC09A2
- Version: v10.0.26100.7920
- Shield-Count-Mod.dll
- Address: 0x7FF857AB0000
- SHA: 1479074918A0130009D850BA1BBF5F302A8B8B64D5CE281909F72AB85DF6BD8C847234AC165D32EF567E824B1469DB5E2BF1A2DA5B89A0259CB298DCFF3A7DB2
- SHLWAPI.dll
- Address: 0x7FF86DB00000
- SHA: 3A6F59A105D0913029BD02318B8DBC3FEAE801A5C6A17295D31FC4B4B2DE074741F0EF7F41F2B7DB05E0EC08ABFC8A1EF7EB15383591AC6040519AB13393E5AD
- Version: v10.0.26100.7705
- sl.common.dll
- Address: 0x7FF84A880000
- SHA: 843457A2F9F0BA83B6C2FEA37FB05F1C52F715C2046232C904DF79B1ED30F3725B967163EBFE5B3F01DAABBD9CAC27799C80DBF8269211F5319FD62F3EEF7B3E
- Version: v2.2.0
- sl.dlss.dll
- Address: 0x7FF852CA0000
- SHA: 54B6D2F71B8D16114AE1A576A37E64683BA91CD8BB8AA379706D5AE21DF4571B6B4126F1085E6E5A2448D7E8B169539642AD5D7A31012C4FDEB9AC38B62ED7B8
- Version: v2.2.0
- sl.dlss_g.dll
- Address: 0x7FF84A820000
- SHA: 97370DF420A6BA860BE92F895ED8B5DE9299E7FF7F7E955BB514A49CE591AA5ACDC1599BF46A93E1F87B6335EA7DCB7111671D9FCD20C9029EE82A1953FF44CF
- Version: v2.2.0
- sl.interposer.dll
- Address: 0x7FF857B90000
- SHA: 4197A38D36FE41A21B11814B00F17F5BF2AE7F418DC5CCB94A6C097615B87B9C5B530DFA0296CA0580BB5618D0AB43AC02C2E1FC08E07D55B5E8BBFF8DA7160A
- Version: v2.2.0
- sl.reflex.dll
- Address: 0x7FF857720000
- SHA: C5DF9877DEDFCC443ECAD9A8EA0F10C5DC8C97C4F6F10A1BEA1831AF6EB27D89C695F67B55E451603A6550EBA084E0CD7B676FE8C56E302324025D9A97ED7FC5
- Version: v2.2.0
- srvcli.dll
- Address: 0x7FF852260000
- SHA: 4EA0CB9A2132EBD62C9BF2FAAE69114C2D41E3D0F0376E370B22EE7367CA0978F321F55EFFC31732D7D5F410D5DF5E737ED8C2387E20A4F71D0373074FCDE3ED
- Version: v10.0.26100.1150
- SspiCli.dll
- Address: 0x7FF86B290000
- SHA: 7AFF4053600A76244F766F05C6C1EEDE7EF61498912B5A384C60303B753CF9F86BFE87FB636C6E894917890E84FBAC1722F53E356C082B78997CFF040D0CA312
- Version: v10.0.26100.7920
- Starfield.exe
- Address: 0x7FF637AD0000
- SHA: 93D003EE3206BA0A7D6DA0A2DD7B6C2D58201182267B9893C61E9763CE11A5E8BCF4B4494C1C7EE67CA31CFBD5118094766F4435FC77BF002B378DFA2F1086A7
- Version: v1.16.236
- StarfieldEngineFixes.dll
- Address: 0x7FF84AAC0000
- SHA: 14176424B418AEED57B7945F5C67081BD426E28167E3922B4E8F8AC86CC5E8B81A3979F7E417E08E9A7F839F0890B5569D22DB0F6463C1834914485BBF21197D
- Version: v17.2.0
- StarwareSearchEngine.dll
- Address: 0x7FF84AA50000
- SHA: 510F33546A46CE1E664D8EEA746E8A7DD257B52695B143F4253399FAFCAF18919F90308AF157CE521A88BAB92007E3DF86D9DA44F6D1C054664A92B6860C6582
- Version: v4.0.0
- steam_api64.dll
- Address: 0x7FF83BA70000
- SHA: 5ABC941905E54436B7CDED77A52BED1597C938EC25F660F34E0CC712B7E92369FD8FD4D4166965DDFA250223AE1165ECE34250B88ED37A1CD0AE7725D286B940
- Version: v1.0.1.69
- textinputframework.dll
- Address: 0x7FF848B10000
- SHA: 2FEED35CB41B078EA7A7482433DD3DE1C1D31D9C62B2B67564959D7654E3BE788E536ABE658E0BC60A204B0BD5126E82729C536BC98049DAF4D532A53BFDB593
- Version: v10.0.26100.7920
- trainwreck.dll
- Address: 0x7FF8578D0000
- SHA: 261801A85D41236E35C820A78E4BC3E775EBF0C19336EF1D518A61DA20429BB30B707181606675C1BC650D678CA0A27DC585DFA35BDDD717EB830459BFF60333
- Version: v1.4.0
- TransferSpaceships.dll
- Address: 0x7FF84A930000
- SHA: 0D5588A9B8CFD1F3C32A7CEDDCEE40819F3CB2B1B845B8D5E94A8AE5D15F072BD2A8AD54C5622C29211C763442C5DB3A764FA8F771B5FBCBB99EE60CE163B07D
- Version: v4.0.0
- twinapi.appcore.dll
- Address: 0x7FF85FCA0000
- SHA: 9F26AB22702AA7A5784CA60A6B3DA3DD4D25823225FA5ACCDF49C387E475792125A906CDA6BA00DA87E7BEB00167909D1314693CE09E2BB348F84199829DC3AF
- Version: v10.0.26100.7705
- ucrtbase.dll
- Address: 0x7FF86C930000
- SHA: 7CD65985CEA38C3E1B8B2308DA5EA6D52C657AD259EDAC47EBCB23D9F54DF868AB3571AC25DE12B8E9B52ABC0711CCE68F94B811445226364F998384B72950F3
- Version: v10.0.26100.7623
- UMPDC.dll
- Address: 0x7FF86BE30000
- SHA: 53398D9F5FBBDCC04E278D00F96C842FDF9387A3BE14113E347636239C3B41E1CF76AF555C76C26E11E541FF81A41C81B5F9B29084152199182EFE67687AA051
- Version: v10.0.26100.7019
- urlmon.dll
- Address: 0x7FF8527B0000
- SHA: 089992F01D96330EF54BE0746C6D970BB90CCCA68C6DA4C6DB33452EF4CD57961604CD794AA4EDA50644AED38871421DBB3F4A2E031E20CB6BD1A47E1FDF2C7D
- Version: v11.0.26100.7705
- user32.dll
- Address: 0x7FF86E2E0000
- SHA: C1422C22D1A13550DCF648DD74127E6F3C574D859CE0F4EBB4751C1AA46A0A9B369EF359E0D5D82647A05F2A96AC816180EF951BF706A093F73FAFB3A8168759
- Version: v10.0.26100.7705
- USERENV.dll
- Address: 0x7FF86B610000
- SHA: 00F75E05420164FD26701C1CAD59B7BFB67B0DEB85231914EFC17BA71FBF0A733D2940C0BB82589DEBCC04D67070AF2343587A8F9762E3DA9539EBAF9431352F
- Version: v10.0.26100.7920
- usvfs_x64.dll
- Address: 0x7FF84EE80000
- SHA: 97CBCD7D074B10FF9A2273CDB8C577FFC7974B2FD6C302E2B78040444E5809BDAC86F42A72D89D930691DF483DD3B18F989896FF42FF6E6DB493699B8CCE0673
- uxtheme.dll
- Address: 0x7FF869D20000
- SHA: 9A42DE326981343226A32AB93C351156D61DAE69F8DA2BC6040E369CC222078EC5C5EB70A598E929DC77E4EA8F24D443E596997A4103F938DEABF0C4629263F6
- Version: v10.0.26100.7705
- VCRUNTIME140.dll
- Address: 0x7FF84F7A0000
- SHA: BDA93FF2C306C82F1942EBD538F5C77BA593E3E20792159B2A2F5EBD086C524F6C6BD3DE5AD722C71FF7D832D0149608289929E9B23F7858EBB960DBB3422F5F
- Version: v14.44.35211
- VCRUNTIME140_1.dll
- Address: 0x7FF8505A0000
- SHA: 6BCDD6B16D815D72DC7EFD6A2352319ECE102F3B7D85C648286E4B3B594B7670D61B7E05C580FC416421E1A1622B38737B1E90080171384E7E2CD5E37AC71225
- Version: v14.44.35211
- VERSION.dll
- Address: 0x7FF867210000
- SHA: D1BF36744AACEC8A95665F56F5CE4CF00685F836C4905B5A51DEE55C803FAFE6FC8069A08FE3959761B5A2E6367A2283077828958CB4888B909F7D402F6FD917
- Version: v10.0.26100.1150
- wbemcomn.dll
- Address: 0x7FF853CA0000
- SHA: 613FBC3C5DE7DE50613C9C25D6B5B46888EF9DFE89A0C8F1EE686200BB5823D3818F09CA617646F377ADB3BE5EDE73BD88FABF8C2D9B8883244B565583D783D4
- Version: v10.0.26100.7920
- wbemprox.dll
- Address: 0x7FF854580000
- SHA: 37472119544DC46322F12E38A3D131330DC1B2E5E0F590C2D239E80A0D6831343EB848365274DD812560A0DC337619017CC0F853FB49D1F4BFFEAB1A606B671F
- Version: v10.0.26100.7920
- wbemsvc.dll
- Address: 0x7FF851550000
- SHA: E17EF28B19A41691FAD67AA1A1CA58BBA7800A5B23078889B305AD17588FFAA6D1CBA95EC94BFF4A50788A9B6DCE2590362C19F61897C5C56AF08BB5B3244207
- Version: v10.0.26100.7920
- Weapon-Power-Mod.dll
- Address: 0x7FF8578B0000
- SHA: 35A6F1D9B156805602337ED6D31F978E5F05CD8C8AB8BD7A13133935C337324EE48DA5C477869F70F3E4478C7B8BB63252F08DFEF29731223C4D775056BFB777
- webio.dll
- Address: 0x7FF853B30000
- SHA: E72527BBFFE7B381CE5C5AC91E35882FCB8A7332900D816BB423C3E87AEE6074BEE23B6FE3A08B62BCEC04C4E67628216C08350E37C75F998C611AEDDD79E393
- Version: v10.0.26100.7705
- win32u.dll
- Address: 0x7FF86C900000
- SHA: FF45C9767827EA6785521C51AEBE98DF0060A52BEB95C27E0D12C34311A3270A9B36C89BCBBCCD17E9DF8A5AE566991074A2284902E836D1510BC29B05AAA9C7
- Version: v10.0.26100.8036
- Windows.Gaming.Input.dll
- Address: 0x7FF860220000
- SHA: 9A59E43A9340373ADD04FD708A6B2672F2E83989D2E30176D343C0CC63430D48514ABE03B0336C00880445A82851B3802B94EE0A61FBD8A2B809942D7546FBE5
- Version: v10.0.26100.1
- Windows.Storage.dll
- Address: 0x7FF86CA80000
- SHA: FF4DDB415744A296C9E28D15CCC987381C2B3C5968302127C37DD419E6BD79EC4CE783926616164C05E3E28D6DD88850BC8BB20B67BCBBA903B334DBAEFDC75D
- Version: v10.0.26100.7705
- Windows.UI.dll
- Address: 0x7FF858370000
- SHA: 4B2522905CE92BAD623BAF562CB2CC4033B97302FEF501AF536C686F84548D1BE8879A21E4D5379A06D2D0FAAC2E35BAFF200068E0F56C3782F897A4FF13FC22
- Version: v10.0.26100.7840
- windowscodecs.dll
- Address: 0x7FF868240000
- SHA: F8B4716A63C1FC9C5A5AFF791D9FE27622305F80D0558916031865FCD6BBA7DE7F91F8BF18F84551C6CDB7B579BF99B50AFEF6C7314FC73AD7FBC90BB0FE9F80
- Version: v10.0.26100.7920
- WINHTTP.dll
- Address: 0x7FF866410000
- SHA: 9B563EE96159A48A6A2EB3AF38AF95330A97C7B05ED7FCF8464E5A6DB6DB9230843CA62A3B836677E44E48CA1E44B274D02F7EF1D4CF7CDE601F807C9879E970
- Version: v10.0.26100.7705
- WININET.dll
- Address: 0x7FF8549B0000
- SHA: A74E0D78E1D5530E47468133B8FD1AC2C07AABDDC02296A82084C7E9ABA2BC4AF6A1C65A7714F92BB12B550DDFFFF96484549BFF96B0F3CDBC0C2E4E34D12D54
- Version: v11.0.26100.7705
- WINMM.dll
- Address: 0x7FF8607A0000
- SHA: DBE424060DE8DD04E78B568B3CD993D782D49B7349AC4746114E27BAC210FBB26DBE17E45E9130CCA333A864E9C88CC7A6818819E09525F8A3ECD7511F169DD6
- Version: v10.0.26100.7705
- winmmbase.dll
- Address: 0x7FF848CB0000
- SHA: 60AE5FC1FC5AB53AF5B9D526BE3B7DE80582236F72022207A10ACA5CE2C78D40BAC6B53E70EA07E10604BBDCD01E491756586D488568CA0BCDB2DACA08843F27
- Version: v10.0.26100.1
- WINNSI.DLL
- Address: 0x7FF869CB0000
- SHA: 41F3E87DC14475A941CAE61EE11DDA661E47F1A6871BF6C78C0B0ED9BA5A9E135108CA315AEE28E199C16AED1DFDE734C241BD234CBEE2BE119E2D2448949A2B
- Version: v10.0.26100.7920
- winrnr.dll
- Address: 0x7FFFFE210000
- SHA: 353433907240D30540C7EDD068560D089142E77C986F2CBDEB91B299A22AD793322EF6DABFBD195AB25C3534E06C4588BB3C9838D4759051E6E39C9950E103C5
- Version: v10.0.26100.1882
- Wintrust.dll
- Address: 0x7FF86D3A0000
- SHA: 7455081A66ACA7999D35A8639BD98F4C4013909AA7766913A9FFEE6F0F6A9CFB20AEFBD48B06969EDCD87EE94CCADD7AB4B52FFBA92E2B57A4377E9BA1ADC777
- Version: v10.0.26100.8036
- wintypes.dll
- Address: 0x7FF86C260000
- SHA: D2BCB006093135D991B1878BA2C7AA38639436C5AC6C4A7FB8596FCC6D41821C945021ED549C757CB08806603BAC9DE07C8BF9D11365AB0D575869D483FE5226
- Version: v10.0.26100.7705
- WLDAP32.dll
- Address: 0x7FF86F760000
- SHA: 181CED6E2B7059E574F1A071D7EB0F485009EE8B13D410EC731E988CF71C3EC923C2BA08FB219E553107F990F1E483FB3CBF900828BCE033E2D39DE60296BC0F
- Version: v10.0.26100.7705
- wldp.dll
- Address: 0x7FF86B8F0000
- SHA: D3B76052BE2CC2756EC64594D02D1C80E12B5F04E47B51B22CBEFEB757AFED8C7A14BA68DC391C89D97F626C68C06012D7E201A55C10FA333CEB75BAA5411A39
- Version: v10.0.26100.7705
- WS2_32.dll
- Address: 0x7FF86EA90000
- SHA: A0276DB8E42FFCF3209C201293C154312EED490741E666C992E53DD78F7EA7F9BB668A9E06AAB98C4635F159EBF862863F8AE9B1AD87C789708B1674C2922FDF
- Version: v10.0.26100.7705
- wshbth.dll
- Address: 0x7FF83B260000
- SHA: 51AD03308DB731D93FAC14C6811C9259D7051D0D689899D52C182FB4FD75660449C46BA734B6323CB073DB5B11EBAC5B97D1C266ED94B10163319CA3CC99F0C8
- Version: v10.0.26100.5074
- WSOCK32.dll
- Address: 0x7FF8699E0000
- SHA: 590B675AC9DA54B88668D6296F6CB8F29471E3589221EF972925BA7006D9117F65C42F7BD277B942EEAB93CDBC165CD4C0A025C5E9333B17E3D5FFEFC73547BF
- Version: v10.0.26100.7705
- XInput1_4.dll
- Address: 0x7FF83E6C0000
- SHA: FE9BFB7BE24D644EE9E9DB35C3A63EC28318C4A145387179EF2FC19EB6AEED69C07384E19B53D39A49416240B6552BDEE601AAF35B24566D575918DF2383024F
- Version: v10.0.26100.7705
- SCRIPT EXTENDER PLUGINS:
- Allow-Unattached-Modules-Mod.dll
- BayAndDocker-Count-Mod.dll
- Cockpit-Count-Mod.dll
- Engine-Power-Mod.dll
- LandingGear-Count-Mod.dll
- lootwornarmor.dll
- Reactor-Class-Mod.dll
- Reactor-Count-Mod.dll
- sfse_1_16_236.dll v0.0.2.19
- sfse_plugin_console.dll v1.19.0
- Shield-Count-Mod.dll
- StarfieldEngineFixes.dll v17.2.0
- StarwareSearchEngine.dll v4.0.0
- trainwreck.dll v1.4.0
- TransferSpaceships.dll v4.0.0
- Weapon-Power-Mod.dll
Advertisement
Add Comment
Please, Sign In to add comment