Advertisement
taosecurity

Starfield 1.14.74 CTD running Old Atlantis mod at Terrormorph fight

Mar 31st, 2025
11
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. Starfield v1.14.74
  2. trainwreck v1.4.0
  3.  
  4. Unhandled exception "EXCEPTION_ACCESS_VIOLATION" at 0x7FF6642FE9E0 Starfield.exe+11FE9E0
  5.  
  6. SYSTEM SPECS:
  7. OS: Microsoft Windows 11 Pro 24H2 26100.3476
  8. CPU: AuthenticAMD AMD Ryzen 5 7600X 6-Core Processor
  9. GPU #1: NVIDIA GeForce RTX 4070 Ti SUPER
  10. GPU #2: Microsoft Basic Render Driver
  11. RAM: 23.23 GiB/63.63 GiB
  12. PAGE FILE: 37.72 GiB/67.63 GiB
  13.  
  14. PROBABLE CALL STACK:
  15. [0 ] 0x7FF6642FE9E0 Starfield.exe+11FE9E0
  16. movups xmm0,[r8+rax]
  17. [1 ] 0x7FF663CAEA5D Starfield.exe+0BAEA5D
  18. test rbx,rbx
  19. [2 ] 0x7FF66611A2FF Starfield.exe+301A2FF
  20. nop
  21. [3 ] 0x7FF665602664 Starfield.exe+2502664
  22. lea rdx,[rsp+30h]
  23. [4 ] 0x7FF666556A9D Starfield.exe+3456A9D
  24. mov rdx,rbx
  25. [5 ] 0x7FF6665576F9 Starfield.exe+34576F9
  26. jmp short 0000000000000078h
  27. [6 ] 0x7FF666555810 Starfield.exe+3455810
  28. mov ecx,[31C3464h]
  29. [7 ] 0x7FF666557CAE Starfield.exe+3457CAE
  30. xor eax,eax
  31. [8 ] 0x7FF66604D411 Starfield.exe+2F4D411
  32. mov rcx,[3AFF2CFh]
  33. [9 ] 0x7FF8E87BE8D7 KERNEL32.DLL+002E8D7 BaseThreadInitThunk
  34. mov ecx,eax
  35. [10] 0x7FF8EA55BF6C ntdll.dll+00BBF6C RtlUserThreadStart
  36. jmp short 000000000000002Ah
  37.  
  38. REGISTERS:
  39. RAX 0x21DE25CC000 (size_t)
  40. RBX 0x7FF663100000 (void* -> Starfield.exe+0000000)
  41. pop r10
  42. RCX 0x10 (size_t)
  43. RDX 0x1F5E244C0A0 (void*)
  44. RSI 0x1F5EDFB6000 (void*)
  45. RDI 0x1F5D0290340 (void*)
  46. RBP 0x7A9CDFE0E0 (void*)
  47. RSP 0x7A9CDFDFE0 (void*)
  48. R8 0x10 (size_t)
  49. R9 0x0 (size_t)
  50. R10 0x6 (size_t)
  51. R11 0x4 (size_t)
  52. R12 0x1 (size_t)
  53. R13 0x14 (size_t)
  54. R14 0x1F5D02900C0 (hknpBSCustomCollisionFilter*)
  55. R15 0x1F5E244C000 (void*)
  56.  
  57. STACK:
  58. [RSP+0 ] 0x7A9CDFF530 (hknpFixedClosestUniqueBodyHitCollector*)
  59. [RSP+8 ] 0x7A9CDFE130 (void*)
  60. [RSP+10 ] 0x0 (size_t)
  61. [RSP+18 ] 0x7A9CDFE030 (char*) "\x04"
  62. [RSP+20 ] 0x0 (size_t)
  63. [RSP+28 ] 0x7A9CDFF530 (hknpFixedClosestUniqueBodyHitCollector*)
  64. [RSP+30 ] 0x0 (size_t)
  65. [RSP+38 ] 0x0 (size_t)
  66. [RSP+40 ] 0x4000400050005000 (size_t)
  67. [RSP+48 ] 0x5000300030003000 (size_t)
  68. [RSP+50 ] 0xBEE60001BFFA0004 (size_t)
  69. [RSP+58 ] 0x1F601E27410 (bhkNPCollisionObject*)
  70. [RSP+60 ] 0x6 (size_t)
  71. [RSP+68 ] 0x4 (size_t)
  72. [RSP+70 ] 0x7A9CDFE1F0 (void*)
  73. [RSP+78 ] 0x1ED082EA560 (ScrapHeap*)
  74. [RSP+80 ] 0xFFFFFFFFFFFFFFFF (size_t)
  75. [RSP+88 ] 0x3F800000FFFFFFFF (size_t)
  76. [RSP+90 ] 0xFFFFFFFFFFFFFFFF (size_t)
  77. [RSP+98 ] 0x3F7FFFFFFFFFFFFF (size_t)
  78. [RSP+A0 ] 0x7A9CDFE130 (void*)
  79. [RSP+A8 ] 0xC18FC6F9 (size_t)
  80. [RSP+B0 ] 0x3F8000003F800000 (size_t)
  81. [RSP+B8 ] 0x3F8000003F800000 (size_t)
  82. [RSP+C0 ] 0x1ED206A9800 (void*)
  83. [RSP+C8 ] 0x0 (size_t)
  84. [RSP+D0 ] 0x7FF66BC42898 (hknpBSShapeCodec*)
  85. [RSP+D8 ] 0x1F5D02900C0 (hknpBSCustomCollisionFilter*)
  86. [RSP+E0 ] 0xFFFFFFFFC173FFFF (size_t)
  87. [RSP+E8 ] 0x7FF6697F0A40 (void* -> Starfield.exe+66F0A40)
  88. add [rax],al
  89. [RSP+F0 ] 0x1EDFDFB0001 (void*)
  90. [RSP+F8 ] 0x0 (size_t)
  91. [RSP+100 ] 0xFFFFFFFFFFFFFFFF (size_t)
  92. [RSP+108 ] 0xFFFFFFFF (size_t)
  93. [RSP+110 ] 0xFFFFFFFFFFFFFFFF (size_t)
  94. [RSP+118 ] 0x3F800000FFFFFFFF (size_t)
  95. [RSP+120 ] 0xFFFFFFFFFFFFFFFF (size_t)
  96. [RSP+128 ] 0x3F7FFFFFFFFFFFFF (size_t)
  97. [RSP+130 ] 0x7A00000004 (size_t)
  98. [RSP+138 ] 0x7A9CDFE130 (void*)
  99. [RSP+140 ] 0x7A9CDFF530 (hknpFixedClosestUniqueBodyHitCollector*)
  100. [RSP+148 ] 0x2300 (size_t)
  101. [RSP+150 ] 0x0 (size_t)
  102. [RSP+158 ] 0x0 (size_t)
  103. [RSP+160 ] 0x7A9CDFEAE0 (hknpTriangleShape*)
  104. [RSP+168 ] 0x100000000 (size_t)
  105. [RSP+170 ] 0x1ED206B87F0 (void*)
  106. [RSP+178 ] 0x1EDFCC5DC80 (hknpCompressedMeshShape*)
  107. [RSP+180 ] 0x0 (size_t)
  108. [RSP+188 ] 0xFFFFFFFF (size_t)
  109. [RSP+190 ] 0x1ED206B87F0 (void*)
  110. [RSP+198 ] 0x0 (size_t)
  111. [RSP+1A0 ] 0x2300 (size_t)
  112. [RSP+1A8 ] 0x0 (size_t)
  113. [RSP+1B0 ] 0x3F8000003F800000 (size_t)
  114. [RSP+1B8 ] 0x3F8000003F800000 (size_t)
  115. [RSP+1C0 ] 0x0 (size_t)
  116. [RSP+1C8 ] 0x0 (size_t)
  117. [RSP+1D0 ] 0xFFFFFFFFFFFFFFFF (size_t)
  118. [RSP+1D8 ] 0xFFFFFFFFFFFFFFFF (size_t)
  119. [RSP+1E0 ] 0x7A9CDFE1D0 (void*)
  120. [RSP+1E8 ] 0x8000002000000004 (size_t)
  121. [RSP+1F0 ] 0x1F603438008 (void*)
  122. [RSP+1F8 ] 0x1F5EE7EC008 (void*)
  123. [RSP+200 ] 0x1F5EFB60008 (void*)
  124. [RSP+208 ] 0x1F5FF194008 (void*)
  125. [RSP+210 ] 0x7FF669843950 (bhkThreadMemorySource*)
  126. [RSP+218 ] 0x7FF600000028 (size_t)
  127. [RSP+220 ] 0x7A00000001 (size_t)
  128. [RSP+228 ] 0x1180 (size_t)
  129. [RSP+230 ] 0x7A9CDFE36C (void*)
  130. [RSP+238 ] 0x7FF669627970 (`anonymous namespace'::MemTempAllocator*)
  131. [RSP+240 ] 0x1ED082E77E0 (void*)
  132. [RSP+248 ] 0x0 (size_t)
  133. [RSP+250 ] 0x3FFFFFFF (size_t)
  134. [RSP+258 ] 0x7FF6675820F0 (char*) "\x01"
  135. [RSP+260 ] 0x7A9CDFE2B9 (void*)
  136. [RSP+268 ] 0x7FF663A75DA6 (void* -> Starfield.exe+0975DA6)
  137. movsxd rcx,[rbp+67h]
  138. [RSP+270 ] 0xB (size_t)
  139. [RSP+278 ] 0x0 (size_t)
  140. [RSP+280 ] 0x7A9CDFE530 (void*)
  141. [RSP+288 ] 0x1F5EBA4B000 (void*)
  142. [RSP+290 ] 0x7FF669627970 (`anonymous namespace'::MemTempAllocator*)
  143. [RSP+298 ] 0x1ED46C00020 (char*) " "
  144. [RSP+2A0 ] 0x7A9CDFE410 (void*)
  145. [RSP+2A8 ] 0x7FF663A72CAD (void* -> Starfield.exe+0972CAD)
  146. lea r11,[rsp+70h]
  147. [RSP+2B0 ] 0x10 (size_t)
  148. [RSP+2B8 ] 0x1ED46C00020 (char*) " "
  149. [RSP+2C0 ] 0x1F5EBA4B110 (void*)
  150. [RSP+2C8 ] 0x7FF663AF7CE5 (void* -> Starfield.exe+09F7CE5)
  151. xorps xmm0,xmm0
  152. [RSP+2D0 ] 0x1F5E35F0540 (void*)
  153. [RSP+2D8 ] 0x7FF663AF7CE5 (void* -> Starfield.exe+09F7CE5)
  154. xorps xmm0,xmm0
  155. [RSP+2E0 ] 0x7A9CDFE380 (void*)
  156. [RSP+2E8 ] 0x4 (size_t)
  157. [RSP+2F0 ] 0x1F5E244C100 (void*)
  158. [RSP+2F8 ] 0x1F5E244C180 (void*)
  159. [RSP+300 ] 0x1F5E244C200 (void*)
  160. [RSP+308 ] 0x1F5E244DB80 (void*)
  161. [RSP+310 ] 0x1F5E244C000 (void*)
  162. [RSP+318 ] 0x1F5E244C000 (void*)
  163. [RSP+320 ] 0x1F5E244C000 (void*)
  164. [RSP+328 ] 0x1F5E244C000 (void*)
  165. [RSP+330 ] 0x1F5E244C000 (void*)
  166. [RSP+338 ] 0x1F5E244C000 (void*)
  167. [RSP+340 ] 0x1F5E244C000 (void*)
  168. [RSP+348 ] 0x1F5E244C000 (void*)
  169. [RSP+350 ] 0x1F5E244C000 (void*)
  170. [RSP+358 ] 0x1F5E244C000 (void*)
  171. [RSP+360 ] 0x1F5E244C000 (void*)
  172. [RSP+368 ] 0x1F5E244C000 (void*)
  173. [RSP+370 ] 0x1F5E244C000 (void*)
  174. [RSP+378 ] 0x1F5E244C000 (void*)
  175. [RSP+380 ] 0x1F5E244C000 (void*)
  176. [RSP+388 ] 0x1F5E244C000 (void*)
  177. [RSP+390 ] 0x1F5E244C000 (void*)
  178. [RSP+398 ] 0x1F5E244C000 (void*)
  179. [RSP+3A0 ] 0x1F5E244C000 (void*)
  180. [RSP+3A8 ] 0x1F5E244C000 (void*)
  181. [RSP+3B0 ] 0x1F5E244C000 (void*)
  182. [RSP+3B8 ] 0x1F5E244C000 (void*)
  183. [RSP+3C0 ] 0x1F5E244C000 (void*)
  184. [RSP+3C8 ] 0x1F5E244C000 (void*)
  185. [RSP+3D0 ] 0x1F5E244C000 (void*)
  186. [RSP+3D8 ] 0x1F5E244C000 (void*)
  187. [RSP+3E0 ] 0x1F5E244C000 (void*)
  188. [RSP+3E8 ] 0x1F5E244C000 (void*)
  189. [RSP+3F0 ] 0x1F5E244C000 (void*)
  190. [RSP+3F8 ] 0x1F5E244C000 (void*)
  191. [RSP+400 ] 0x1F5E244C000 (void*)
  192. [RSP+408 ] 0x1F5E244C000 (void*)
  193. [RSP+410 ] 0x1F5E244C000 (void*)
  194. [RSP+418 ] 0x1F5E244C000 (void*)
  195. [RSP+420 ] 0x1F5E244C000 (void*)
  196. [RSP+428 ] 0x1F5E244C000 (void*)
  197. [RSP+430 ] 0x1F5E244C000 (void*)
  198. [RSP+438 ] 0x1F5E244C000 (void*)
  199. [RSP+440 ] 0x1F5E244C000 (void*)
  200. [RSP+448 ] 0x1F5E244C000 (void*)
  201. [RSP+450 ] 0x1F5E244C000 (void*)
  202. [RSP+458 ] 0x1F5E244C000 (void*)
  203. [RSP+460 ] 0x1F5E244C000 (void*)
  204. [RSP+468 ] 0x1F5E244C000 (void*)
  205. [RSP+470 ] 0x1F5E244C000 (void*)
  206. [RSP+478 ] 0x1F5E244C000 (void*)
  207. [RSP+480 ] 0x1F5E244C000 (void*)
  208. [RSP+488 ] 0x1F5E244C000 (void*)
  209. [RSP+490 ] 0x1F5E244C000 (void*)
  210. [RSP+498 ] 0x1F5E244C000 (void*)
  211. [RSP+4A0 ] 0x1F5E244C000 (void*)
  212. [RSP+4A8 ] 0x1F5E244C000 (void*)
  213. [RSP+4B0 ] 0x1F5E244C000 (void*)
  214. [RSP+4B8 ] 0x1F5E244C000 (void*)
  215. [RSP+4C0 ] 0x1F5E244C000 (void*)
  216. [RSP+4C8 ] 0x1F5E244C000 (void*)
  217. [RSP+4D0 ] 0x1F5E244C000 (void*)
  218. [RSP+4D8 ] 0x1F5E244C000 (void*)
  219. [RSP+4E0 ] 0x1F5E244C000 (void*)
  220. [RSP+4E8 ] 0x1F5E244C000 (void*)
  221. [RSP+4F0 ] 0x1F5E244C000 (void*)
  222. [RSP+4F8 ] 0x1F5E244C000 (void*)
  223. [RSP+500 ] 0x1F5E244C000 (void*)
  224. [RSP+508 ] 0x1F5E244C000 (void*)
  225. [RSP+510 ] 0x1F5E244C000 (void*)
  226. [RSP+518 ] 0x1F5E244C000 (void*)
  227. [RSP+520 ] 0x1F5E244C000 (void*)
  228. [RSP+528 ] 0x1F5E244C000 (void*)
  229. [RSP+530 ] 0x1F5E244C000 (void*)
  230. [RSP+538 ] 0x1F5E244C000 (void*)
  231. [RSP+540 ] 0x1F5E244C000 (void*)
  232. [RSP+548 ] 0x1F5E244C000 (void*)
  233. [RSP+550 ] 0x1F5E244C000 (void*)
  234. [RSP+558 ] 0x1F5E244C000 (void*)
  235. [RSP+560 ] 0x1F5E244C000 (void*)
  236. [RSP+568 ] 0x1F5E244C000 (void*)
  237. [RSP+570 ] 0x1F5E244C000 (void*)
  238. [RSP+578 ] 0x1F5E244C000 (void*)
  239. [RSP+580 ] 0x1F5E244C000 (void*)
  240. [RSP+588 ] 0x1F5E244C000 (void*)
  241. [RSP+590 ] 0x1F5E244C000 (void*)
  242. [RSP+598 ] 0x1F5E244C000 (void*)
  243. [RSP+5A0 ] 0x1F5E244C000 (void*)
  244. [RSP+5A8 ] 0x1F5E244C000 (void*)
  245. [RSP+5B0 ] 0x1F5E244C000 (void*)
  246. [RSP+5B8 ] 0x1F5E244C000 (void*)
  247. [RSP+5C0 ] 0x1F5E244C000 (void*)
  248. [RSP+5C8 ] 0x1F5E244C000 (void*)
  249. [RSP+5D0 ] 0x1F5E244C000 (void*)
  250. [RSP+5D8 ] 0x1F5E244C000 (void*)
  251. [RSP+5E0 ] 0x1F5E244C000 (void*)
  252. [RSP+5E8 ] 0x1F5E244C000 (void*)
  253. [RSP+5F0 ] 0x1F5E244C000 (void*)
  254. [RSP+5F8 ] 0x1F5E244C000 (void*)
  255. [RSP+600 ] 0x1F5E244C000 (void*)
  256. [RSP+608 ] 0x1F5E244C000 (void*)
  257. [RSP+610 ] 0x1F5E244C000 (void*)
  258. [RSP+618 ] 0x1F5E244C000 (void*)
  259. [RSP+620 ] 0x1F5E244C000 (void*)
  260. [RSP+628 ] 0x1F5E244C000 (void*)
  261. [RSP+630 ] 0x1F5E244C000 (void*)
  262. [RSP+638 ] 0x1F5E244C000 (void*)
  263. [RSP+640 ] 0x1F5E244C000 (void*)
  264. [RSP+648 ] 0x1F5E244C000 (void*)
  265. [RSP+650 ] 0x1F5E244C000 (void*)
  266. [RSP+658 ] 0x1F5E244C000 (void*)
  267. [RSP+660 ] 0x1F5E244C000 (void*)
  268. [RSP+668 ] 0x1F5E244C000 (void*)
  269. [RSP+670 ] 0x1F5E244C000 (void*)
  270. [RSP+678 ] 0x1F5E244C000 (void*)
  271. [RSP+680 ] 0x1F5E244C000 (void*)
  272. [RSP+688 ] 0x1F5E244C000 (void*)
  273. [RSP+690 ] 0x1F5E244C000 (void*)
  274. [RSP+698 ] 0x1F5E244C000 (void*)
  275. [RSP+6A0 ] 0x1F5E244C000 (void*)
  276. [RSP+6A8 ] 0x1F5E244C000 (void*)
  277. [RSP+6B0 ] 0x1F5E244C000 (void*)
  278. [RSP+6B8 ] 0x1F5E244C000 (void*)
  279. [RSP+6C0 ] 0x1F5E244C000 (void*)
  280. [RSP+6C8 ] 0x1F5E244C000 (void*)
  281. [RSP+6D0 ] 0x1F5E244C000 (void*)
  282. [RSP+6D8 ] 0x1F5E244C000 (void*)
  283. [RSP+6E0 ] 0x1F5E244C000 (void*)
  284. [RSP+6E8 ] 0x1F5E244C000 (void*)
  285. [RSP+6F0 ] 0x1F5E244C000 (void*)
  286. [RSP+6F8 ] 0x1F5E244C000 (void*)
  287. [RSP+700 ] 0x1F5E244C000 (void*)
  288. [RSP+708 ] 0x1F5E244C000 (void*)
  289. [RSP+710 ] 0x1F5E244C000 (void*)
  290. [RSP+718 ] 0x1F5E244C000 (void*)
  291. [RSP+720 ] 0x1F5E244C000 (void*)
  292. [RSP+728 ] 0x1F5E244C000 (void*)
  293. [RSP+730 ] 0x1F5E244C000 (void*)
  294. [RSP+738 ] 0x1F5E244C000 (void*)
  295. [RSP+740 ] 0x1F5E244C000 (void*)
  296. [RSP+748 ] 0x1F5E244C000 (void*)
  297. [RSP+750 ] 0x1F5E244C000 (void*)
  298. [RSP+758 ] 0x1F5E244C000 (void*)
  299. [RSP+760 ] 0x1F5E244C000 (void*)
  300. [RSP+768 ] 0x1F5E244C000 (void*)
  301. [RSP+770 ] 0x1F5E244C000 (void*)
  302. [RSP+778 ] 0x1F5E244C000 (void*)
  303. [RSP+780 ] 0x1F5E244C000 (void*)
  304. [RSP+788 ] 0x1F5E244C000 (void*)
  305. [RSP+790 ] 0x1F5E244C000 (void*)
  306. [RSP+798 ] 0x1F5E244C000 (void*)
  307. [RSP+7A0 ] 0x1F5E244C000 (void*)
  308. [RSP+7A8 ] 0x1F5E244C000 (void*)
  309. [RSP+7B0 ] 0x1F5E244C000 (void*)
  310. [RSP+7B8 ] 0x1F5E244C000 (void*)
  311. [RSP+7C0 ] 0x1F5E244C000 (void*)
  312. [RSP+7C8 ] 0x1F5E244C000 (void*)
  313. [RSP+7D0 ] 0x1F5E244C000 (void*)
  314. [RSP+7D8 ] 0x1F5E244C000 (void*)
  315. [RSP+7E0 ] 0x1F5E244C000 (void*)
  316. [RSP+7E8 ] 0x1F5E244C000 (void*)
  317. [RSP+7F0 ] 0x1F5E244C000 (void*)
  318. [RSP+7F8 ] 0x1F5E244C000 (void*)
  319. [RSP+800 ] 0x1F5E244C000 (void*)
  320. [RSP+808 ] 0x1F5E244C000 (void*)
  321. [RSP+810 ] 0x1F5E244C000 (void*)
  322. [RSP+818 ] 0x1F5E244C000 (void*)
  323. [RSP+820 ] 0x1F5E244C000 (void*)
  324. [RSP+828 ] 0x1F5E244C000 (void*)
  325. [RSP+830 ] 0x1F5E244C000 (void*)
  326. [RSP+838 ] 0x1F5E244C000 (void*)
  327. [RSP+840 ] 0x1F5E244C000 (void*)
  328. [RSP+848 ] 0x1F5E244C000 (void*)
  329. [RSP+850 ] 0x1F5E244C000 (void*)
  330. [RSP+858 ] 0x1F5E244C000 (void*)
  331. [RSP+860 ] 0x1F5E244C000 (void*)
  332. [RSP+868 ] 0x1F5E244C000 (void*)
  333. [RSP+870 ] 0x1F5E244C000 (void*)
  334. [RSP+878 ] 0x1F5E244C000 (void*)
  335. [RSP+880 ] 0x1F5E244C000 (void*)
  336. [RSP+888 ] 0x1F5E244C000 (void*)
  337. [RSP+890 ] 0x1F5E244C000 (void*)
  338. [RSP+898 ] 0x1F5E244C000 (void*)
  339. [RSP+8A0 ] 0x1F5E244C000 (void*)
  340. [RSP+8A8 ] 0x1F5E244C000 (void*)
  341. [RSP+8B0 ] 0x1F5E244C000 (void*)
  342. [RSP+8B8 ] 0x1F5E244C000 (void*)
  343. [RSP+8C0 ] 0x1F5E244C000 (void*)
  344. [RSP+8C8 ] 0x1F5E244C000 (void*)
  345. [RSP+8D0 ] 0x1F5E244C000 (void*)
  346. [RSP+8D8 ] 0x1F5E244C000 (void*)
  347. [RSP+8E0 ] 0x1F5E244C000 (void*)
  348. [RSP+8E8 ] 0x1F5E244C000 (void*)
  349. [RSP+8F0 ] 0x1F5E244C000 (void*)
  350. [RSP+8F8 ] 0x1F5E244C000 (void*)
  351. [RSP+900 ] 0x1F5E244C000 (void*)
  352. [RSP+908 ] 0x1F5E244C000 (void*)
  353. [RSP+910 ] 0x1F5E244C000 (void*)
  354. [RSP+918 ] 0x1F5E244C000 (void*)
  355. [RSP+920 ] 0x1F5E244C000 (void*)
  356. [RSP+928 ] 0x1F5E244C000 (void*)
  357. [RSP+930 ] 0x1F5E244C000 (void*)
  358. [RSP+938 ] 0x1F5E244C000 (void*)
  359. [RSP+940 ] 0x1F5E244C000 (void*)
  360. [RSP+948 ] 0x1F5E244C000 (void*)
  361. [RSP+950 ] 0x1F5E244C000 (void*)
  362. [RSP+958 ] 0x1F5E244C000 (void*)
  363. [RSP+960 ] 0x1F5E244C000 (void*)
  364. [RSP+968 ] 0x1F5E244C000 (void*)
  365. [RSP+970 ] 0x1F5E244C000 (void*)
  366. [RSP+978 ] 0x1F5E244C000 (void*)
  367. [RSP+980 ] 0x1F5E244C000 (void*)
  368. [RSP+988 ] 0x1F5E244C000 (void*)
  369. [RSP+990 ] 0x1F5E244C000 (void*)
  370. [RSP+998 ] 0x1F5E244C000 (void*)
  371. [RSP+9A0 ] 0x1F5E244C000 (void*)
  372. [RSP+9A8 ] 0x1F5E244C000 (void*)
  373. [RSP+9B0 ] 0x1F5E244C000 (void*)
  374. [RSP+9B8 ] 0x1F5E244C000 (void*)
  375. [RSP+9C0 ] 0x1F5E244C000 (void*)
  376. [RSP+9C8 ] 0x1F5E244C000 (void*)
  377. [RSP+9D0 ] 0x1F5E244C000 (void*)
  378. [RSP+9D8 ] 0x1F5E244C000 (void*)
  379. [RSP+9E0 ] 0x1F5E244C000 (void*)
  380. [RSP+9E8 ] 0x1F5E244C000 (void*)
  381. [RSP+9F0 ] 0x1F5E244C000 (void*)
  382. [RSP+9F8 ] 0x1F5E244C000 (void*)
  383. [RSP+A00 ] 0x1F5E244C000 (void*)
  384. [RSP+A08 ] 0x1F5E244C000 (void*)
  385. [RSP+A10 ] 0x1F5E244C000 (void*)
  386. [RSP+A18 ] 0x1F5E244C000 (void*)
  387. [RSP+A20 ] 0x1F5E244C000 (void*)
  388. [RSP+A28 ] 0x1F5E244C000 (void*)
  389. [RSP+A30 ] 0x1F5E244C000 (void*)
  390. [RSP+A38 ] 0x1F5E244C000 (void*)
  391. [RSP+A40 ] 0x1F5E244C000 (void*)
  392. [RSP+A48 ] 0x1F5E244C000 (void*)
  393. [RSP+A50 ] 0x1F5E244C000 (void*)
  394. [RSP+A58 ] 0x1F5E244C000 (void*)
  395. [RSP+A60 ] 0x1F5E244C000 (void*)
  396. [RSP+A68 ] 0x1F5E244C000 (void*)
  397. [RSP+A70 ] 0x1F5E244C000 (void*)
  398. [RSP+A78 ] 0x1F5E244C000 (void*)
  399. [RSP+A80 ] 0x1F5E244C000 (void*)
  400. [RSP+A88 ] 0x1F5E244C000 (void*)
  401. [RSP+A90 ] 0x1F5E244C000 (void*)
  402. [RSP+A98 ] 0x1F5E244C000 (void*)
  403. [RSP+AA0 ] 0x1F5E244C000 (void*)
  404. [RSP+AA8 ] 0x1F5E244C000 (void*)
  405. [RSP+AB0 ] 0x1F5E244C000 (void*)
  406. [RSP+AB8 ] 0x1F5E244C000 (void*)
  407. [RSP+AC0 ] 0x1F5E244C000 (void*)
  408. [RSP+AC8 ] 0x1F5E244C000 (void*)
  409. [RSP+AD0 ] 0x1F5E244C000 (void*)
  410. [RSP+AD8 ] 0x1F5E244C000 (void*)
  411. [RSP+AE0 ] 0x1F5E244C000 (void*)
  412. [RSP+AE8 ] 0x1F5E244C000 (void*)
  413. [RSP+AF0 ] 0x1F5E244C0A0 (void*)
  414. [RSP+AF8 ] 0x7FF66645EAF1 (void* -> Starfield.exe+335EAF1)
  415. jmp 00000000000000DDh
  416. [RSP+B00 ] 0x7FF6675DBA48 (void* -> Starfield.exe+44DBA48)
  417. cmp byte ptr [rdi],0C2h
  418. [RSP+B08 ] 0x130 (size_t)
  419. [RSP+B10 ] 0x1 (size_t)
  420. [RSP+B18 ] 0x2000402C3 (size_t)
  421. [RSP+B20 ] 0x0 (size_t)
  422. [RSP+B28 ] 0x0 (size_t)
  423. [RSP+B30 ] 0x0 (size_t)
  424. [RSP+B38 ] 0x3400007F7F (size_t)
  425. [RSP+B40 ] 0x5C00000004 (size_t)
  426. [RSP+B48 ] 0x9400000004 (size_t)
  427. [RSP+B50 ] 0x9C00000004 (size_t)
  428. [RSP+B58 ] 0x9C00000008 (size_t)
  429. [RSP+B60 ] 0x9400000000 (size_t)
  430. [RSP+B68 ] 0x0 (size_t)
  431. [RSP+B70 ] 0x0 (size_t)
  432. [RSP+B78 ] 0x0 (size_t)
  433. [RSP+B80 ] 0x0 (size_t)
  434. [RSP+B88 ] 0x0 (size_t)
  435. [RSP+B90 ] 0x0 (size_t)
  436. [RSP+B98 ] 0x0 (size_t)
  437. [RSP+BA0 ] 0x0 (size_t)
  438. [RSP+BA8 ] 0x0 (size_t)
  439. [RSP+BB0 ] 0x0 (size_t)
  440. [RSP+BB8 ] 0x0 (size_t)
  441. [RSP+BC0 ] 0x0 (size_t)
  442. [RSP+BC8 ] 0x0 (size_t)
  443. [RSP+BD0 ] 0x0 (size_t)
  444. [RSP+BD8 ] 0x0 (size_t)
  445. [RSP+BE0 ] 0x7F0400047F040000 (size_t)
  446. [RSP+BE8 ] 0x7F0400007F040000 (size_t)
  447. [RSP+BF0 ] 0x300010203020100 (size_t)
  448. [RSP+BF8 ] 0x0 (size_t)
  449. [RSP+C00 ] 0x0 (size_t)
  450. [RSP+C08 ] 0x0 (size_t)
  451. [RSP+C10 ] 0x0 (size_t)
  452. [RSP+C18 ] 0x0 (size_t)
  453. [RSP+C20 ] 0x0 (size_t)
  454. [RSP+C28 ] 0x0 (size_t)
  455. [RSP+C30 ] 0x0 (size_t)
  456. [RSP+C38 ] 0x0 (size_t)
  457. [RSP+C40 ] 0x0 (size_t)
  458. [RSP+C48 ] 0x0 (size_t)
  459. [RSP+C50 ] 0x0 (size_t)
  460. [RSP+C58 ] 0x0 (size_t)
  461. [RSP+C60 ] 0x0 (size_t)
  462. [RSP+C68 ] 0x0 (size_t)
  463. [RSP+C70 ] 0x0 (size_t)
  464. [RSP+C78 ] 0x0 (size_t)
  465. [RSP+C80 ] 0x0 (size_t)
  466. [RSP+C88 ] 0x0 (size_t)
  467. [RSP+C90 ] 0x0 (size_t)
  468. [RSP+C98 ] 0x0 (size_t)
  469. [RSP+CA0 ] 0x0 (size_t)
  470. [RSP+CA8 ] 0x0 (size_t)
  471. [RSP+CB0 ] 0x0 (size_t)
  472. [RSP+CB8 ] 0x0 (size_t)
  473. [RSP+CC0 ] 0x0 (size_t)
  474. [RSP+CC8 ] 0x0 (size_t)
  475. [RSP+CD0 ] 0x0 (size_t)
  476. [RSP+CD8 ] 0x20 (size_t)
  477. [RSP+CE0 ] 0x1F603544020 (hknpBSWorld*)
  478. [RSP+CE8 ] 0x10 (size_t)
  479. [RSP+CF0 ] 0x1 (size_t)
  480. [RSP+CF8 ] 0x1ED082E77E0 (void*)
  481. [RSP+D00 ] 0x7A9CDFF530 (hknpFixedClosestUniqueBodyHitCollector*)
  482. [RSP+D08 ] 0x1F5716AD148 (void*)
  483. [RSP+D10 ] 0x1F5D0290340 (void*)
  484. [RSP+D18 ] 0x7FF663CAEA5D (void* -> Starfield.exe+0BAEA5D)
  485. test rbx,rbx
  486. [RSP+D20 ] 0x10 (size_t)
  487. [RSP+D28 ] 0x10 (size_t)
  488. [RSP+D30 ] 0x7A9CDFE1D0 (void*)
  489. [RSP+D38 ] 0x0 (size_t)
  490. [RSP+D40 ] 0x1C0 (size_t)
  491. [RSP+D48 ] 0x7FF66611A2FF (void* -> Starfield.exe+301A2FF)
  492. nop
  493. [RSP+D50 ] 0x2 (size_t)
  494. [RSP+D58 ] 0x1CED3152EAC (size_t)
  495. [RSP+D60 ] 0x4 (size_t)
  496. [RSP+D68 ] 0x10 (size_t)
  497. [RSP+D70 ] 0x7A9CDFEF80 (void*)
  498. [RSP+D78 ] 0x0 (size_t)
  499. [RSP+D80 ] 0x7A00000006 (size_t)
  500. [RSP+D88 ] 0x0 (size_t)
  501. [RSP+D90 ] 0x1F5D0290680 (void*)
  502. [RSP+D98 ] 0x8000000100000001 (size_t)
  503. [RSP+DA0 ] 0x1F5D0290680 (void*)
  504. [RSP+DA8 ] 0x1 (size_t)
  505. [RSP+DB0 ] 0x0 (size_t)
  506. [RSP+DB8 ] 0x8000000000000000 (size_t)
  507. [RSP+DC0 ] 0x0 (size_t)
  508. [RSP+DC8 ] 0x7FF600000000 (size_t)
  509. [RSP+DD0 ] 0x1F5D0290180 (void*)
  510. [RSP+DD8 ] 0x8000000600000006 (size_t)
  511. [RSP+DE0 ] 0x1F5D0290180 (void*)
  512. [RSP+DE8 ] 0x1F600000006 (void*)
  513. [RSP+DF0 ] 0x1F5D0290700 (void*)
  514. [RSP+DF8 ] 0x8000000100000001 (size_t)
  515. [RSP+E00 ] 0x1F5D0290700 (void*)
  516. [RSP+E08 ] 0x7A00000001 (size_t)
  517. [RSP+E10 ] 0x0 (size_t)
  518. [RSP+E18 ] 0x8000000000000000 (size_t)
  519. [RSP+E20 ] 0x0 (size_t)
  520. [RSP+E28 ] 0x0 (size_t)
  521. [RSP+E30 ] 0x1F5D0290480 (void*)
  522. [RSP+E38 ] 0x8000000600000006 (size_t)
  523. [RSP+E40 ] 0x1F5D0290480 (void*)
  524. [RSP+E48 ] 0x6 (size_t)
  525. [RSP+E50 ] 0x1F5D0290980 (char*) "\x10"
  526. [RSP+E58 ] 0x8000000100000001 (size_t)
  527. [RSP+E60 ] 0x1F5D0290980 (char*) "\x10"
  528. [RSP+E68 ] 0x1 (size_t)
  529. [RSP+E70 ] 0x0 (size_t)
  530. [RSP+E78 ] 0x8000000000000000 (size_t)
  531. [RSP+E80 ] 0x0 (size_t)
  532. [RSP+E88 ] 0x0 (size_t)
  533. [RSP+E90 ] 0x1F5D0290580 (char*) "\n"
  534. [RSP+E98 ] 0x8000000600000006 (size_t)
  535. [RSP+EA0 ] 0x1F5D0290580 (char*) "\n"
  536. [RSP+EA8 ] 0x6 (size_t)
  537. [RSP+EB0 ] 0x7A9CDFF580 (hknpFixedClosestHitCollector*)
  538. [RSP+EB8 ] 0x7A9CDFF530 (hknpFixedClosestUniqueBodyHitCollector*)
  539. [RSP+EC0 ] 0x0 (size_t)
  540. [RSP+EC8 ] 0x3C0BB00000000000 (size_t)
  541. [RSP+ED0 ] 0x1F5D0290900 (void*)
  542. [RSP+ED8 ] 0x8000000100000001 (size_t)
  543. [RSP+EE0 ] 0x1F5D0290900 (void*)
  544. [RSP+EE8 ] 0x3F80000000000001 (size_t)
  545. [RSP+EF0 ] 0x1F5D0290780 (char*) "\x01"
  546. [RSP+EF8 ] 0x8000000600000001 (size_t)
  547. [RSP+F00 ] 0x1F5D0290780 (char*) "\x01"
  548. [RSP+F08 ] 0x1F600000006 (void*)
  549. [RSP+F10 ] 0x0 (size_t)
  550. [RSP+F18 ] 0x8000000000000000 (size_t)
  551. [RSP+F20 ] 0x0 (size_t)
  552. [RSP+F28 ] 0x1ED00000000 (void*)
  553. [RSP+F30 ] 0x1F5D0290600 (char*) "\x04"
  554. [RSP+F38 ] 0x8000000600000000 (size_t)
  555. [RSP+F40 ] 0x1F5D0290600 (char*) "\x04"
  556. [RSP+F48 ] 0x1ED00000006 (void*)
  557. [RSP+F50 ] 0x1F5D0290500 (char*) "\x01"
  558. [RSP+F58 ] 0x8000000600000006 (size_t)
  559. [RSP+F60 ] 0x1F5D0290500 (char*) "\x01"
  560. [RSP+F68 ] 0xBE03E9A200000006 (size_t)
  561. [RSP+F70 ] 0x1F5D0290000 (hknpBSCustomCollisionFilter*)
  562. [RSP+F78 ] 0x8000000700000007 (size_t)
  563. [RSP+F80 ] 0x1F5D0290000 (hknpBSCustomCollisionFilter*)
  564. [RSP+F88 ] 0x7 (size_t)
  565. [RSP+F90 ] 0x80000006 (size_t)
  566. [RSP+F98 ] 0x6 (size_t)
  567. [RSP+FA0 ] 0x1F5D0290880 (char*) "\x05"
  568. [RSP+FA8 ] 0x8000000100000000 (size_t)
  569. [RSP+FB0 ] 0x1F5D0290880 (char*) "\x05"
  570. [RSP+FB8 ] 0x1 (size_t)
  571. [RSP+FC0 ] 0x1F5D0290700 (void*)
  572. [RSP+FC8 ] 0x1F5D0290800 (void*)
  573. [RSP+FD0 ] 0x8000000100000000 (size_t)
  574. [RSP+FD8 ] 0x1F5D0290800 (void*)
  575. [RSP+FE0 ] 0x100000001 (size_t)
  576. [RSP+FE8 ] 0x100000001 (size_t)
  577. [RSP+FF0 ] 0x7FF66BC42898 (hknpBSShapeCodec*)
  578. [RSP+FF8 ] 0x1F5D0290120 (hknpBSCustomCollisionFilter*)
  579. [RSP+1000] 0xFFFFFFFF9CDFFFFF (size_t)
  580. [RSP+1008] 0x7FF66980B610 (void* -> Starfield.exe+670B610)
  581. add [rax],al
  582. [RSP+1010] 0x80001 (size_t)
  583. [RSP+1018] 0x1F5E8057980 (hknpSphereShape*)
  584. [RSP+1020] 0x0 (size_t)
  585. [RSP+1028] 0x0 (size_t)
  586. [RSP+1030] 0x7FF66BC42898 (hknpBSShapeCodec*)
  587. [RSP+1038] 0x1F5D02900F0 (hknpBSCustomCollisionFilter*)
  588. [RSP+1040] 0xFFFFFFFFC173FFFF (size_t)
  589. [RSP+1048] 0x7FF6697F0EA0 (void* -> Starfield.exe+66F0EA0)
  590. add [rax],al
  591. [RSP+1050] 0x1EDFD080001 (void*)
  592. [RSP+1058] 0x7A9CDFF5E0 (void*)
  593. [RSP+1060] 0xFFFFFFFFFFFFFFFF (size_t)
  594. [RSP+1068] 0xFFFFFFFF (size_t)
  595. [RSP+1070] 0xFFFFFFFFFFFFFFFF (size_t)
  596. [RSP+1078] 0x3F800000FFFFFFFF (size_t)
  597. [RSP+1080] 0xFFFFFFFFFFFFFFFF (size_t)
  598. [RSP+1088] 0x3F7FFFFFFFFFFFFF (size_t)
  599. [RSP+1090] 0x1F500000004 (void*)
  600. [RSP+1098] 0x7A9CDFF0D8 (void*)
  601. [RSP+10A0] 0x10001AB (size_t)
  602. [RSP+10A8] 0x1EDFDFEE930 (hknpClosestUniqueBodyIdHitCollector*)
  603. [RSP+10B0] 0x1F600000001 (char*) "\n"
  604. [RSP+10B8] 0x7FF66604B1A2 (void* -> Starfield.exe+2F4B1A2)
  605. mov edx,eax
  606. [RSP+10C0] 0x0 (size_t)
  607. [RSP+10C8] 0x0 (size_t)
  608. [RSP+10D0] 0x7FF6697E56B8 (void* -> Starfield.exe+66E56B8)
  609. mov al,[0B000401000000067h]
  610. [RSP+10D8] 0x8000000000000000 (size_t)
  611. [RSP+10E0] 0x1F603438008 (void*)
  612. [RSP+10E8] 0x1F5EE7EC008 (void*)
  613. [RSP+10F0] 0x1F5EFB60008 (void*)
  614. [RSP+10F8] 0x1F5FF194008 (void*)
  615. [RSP+1100] 0x7A9CDFF170 (void*)
  616. [RSP+1108] 0x1EDFB3CA7C0 (bhkCharRigidBodyController*)
  617. [RSP+1110] 0x1ED206BBD90 (void*)
  618. [RSP+1118] 0x7FF6660F528D (void* -> Starfield.exe+2FF528D)
  619. mov rax,rbx
  620. [RSP+1120] 0x1F603544000 (hknpBSWorld*)
  621. [RSP+1128] 0x7FF6660F52C2 (void* -> Starfield.exe+2FF52C2)
  622. mov ecx,[rax]
  623. [RSP+1130] 0x7A9CDFF570 (void*)
  624. [RSP+1138] 0x1EDFB3CA7C0 (bhkCharRigidBodyController*)
  625. [RSP+1140] 0x0 (size_t)
  626. [RSP+1148] 0x2 (size_t)
  627. [RSP+1150] 0x7A9CDFF270 (void*)
  628. [RSP+1158] 0x7FF663C65F22 (void* -> Starfield.exe+0B65F22)
  629. add rax,60h
  630. [RSP+1160] 0x1F603544020 (hknpBSWorld*)
  631. [RSP+1168] 0x1F603544000 (hknpBSWorld*)
  632. [RSP+1170] 0x0 (size_t)
  633. [RSP+1178] 0x3D4CCCCDC192B12D (size_t)
  634. [RSP+1180] 0x7FF663C65F00 (void* -> Starfield.exe+0B65F00)
  635. push rbx
  636. [RSP+1188] 0x7FF66614C579 (void* -> Starfield.exe+304C579)
  637. test al,al
  638. [RSP+1190] 0x1ED010001AB (void*)
  639. [RSP+1198] 0x1EDFB3CA7C0 (bhkCharRigidBodyController*)
  640. [RSP+11A0] 0x0 (size_t)
  641. [RSP+11A8] 0x0 (size_t)
  642. [RSP+11B0] 0x0 (size_t)
  643. [RSP+11B8] 0x0 (size_t)
  644. [RSP+11C0] 0x1F5F20153B0 (char*) "\x01"
  645. [RSP+11C8] 0x1F5F20153D0 (void*)
  646. [RSP+11D0] 0x7FF669C10948 (BSScript::SimpleAllocMemoryPagePolicy*)
  647. [RSP+11D8] 0x7FF66647735C (void* -> Starfield.exe+337735C)
  648. add rbx,10h
  649. [RSP+11E0] 0x7FF6675DBA48 (void* -> Starfield.exe+44DBA48)
  650. cmp byte ptr [rdi],0C2h
  651. [RSP+11E8] 0x130 (size_t)
  652. [RSP+11F0] 0x1 (size_t)
  653. [RSP+11F8] 0x2000402C3 (size_t)
  654. [RSP+1200] 0x0 (size_t)
  655. [RSP+1208] 0x0 (size_t)
  656. [RSP+1210] 0x0 (size_t)
  657. [RSP+1218] 0x3400007F7F (size_t)
  658. [RSP+1220] 0x5C00000004 (size_t)
  659. [RSP+1228] 0x9400000004 (size_t)
  660. [RSP+1230] 0x9C00000004 (size_t)
  661. [RSP+1238] 0x9C00000008 (size_t)
  662. [RSP+1240] 0x9400000000 (size_t)
  663. [RSP+1248] 0x0 (size_t)
  664. [RSP+1250] 0x0 (size_t)
  665. [RSP+1258] 0x0 (size_t)
  666. [RSP+1260] 0x0 (size_t)
  667. [RSP+1268] 0x0 (size_t)
  668. [RSP+1270] 0x0 (size_t)
  669. [RSP+1278] 0x0 (size_t)
  670. [RSP+1280] 0x0 (size_t)
  671. [RSP+1288] 0x0 (size_t)
  672. [RSP+1290] 0x0 (size_t)
  673. [RSP+1298] 0x0 (size_t)
  674. [RSP+12A0] 0x0 (size_t)
  675. [RSP+12A8] 0x0 (size_t)
  676. [RSP+12B0] 0x0 (size_t)
  677. [RSP+12B8] 0x0 (size_t)
  678. [RSP+12C0] 0x7F0400047F040000 (size_t)
  679. [RSP+12C8] 0x7F0400007F040000 (size_t)
  680. [RSP+12D0] 0x300010203020100 (size_t)
  681. [RSP+12D8] 0x0 (size_t)
  682. [RSP+12E0] 0x0 (size_t)
  683. [RSP+12E8] 0x0 (size_t)
  684. [RSP+12F0] 0x0 (size_t)
  685. [RSP+12F8] 0x0 (size_t)
  686. [RSP+1300] 0x0 (size_t)
  687. [RSP+1308] 0x0 (size_t)
  688. [RSP+1310] 0x7FF6675DBA48 (void* -> Starfield.exe+44DBA48)
  689. cmp byte ptr [rdi],0C2h
  690. [RSP+1318] 0x130 (size_t)
  691. [RSP+1320] 0x1 (size_t)
  692. [RSP+1328] 0x2000402C3 (size_t)
  693. [RSP+1330] 0x0 (size_t)
  694. [RSP+1338] 0x0 (size_t)
  695. [RSP+1340] 0x0 (size_t)
  696. [RSP+1348] 0x3400007F7F (size_t)
  697. [RSP+1350] 0x5C00000004 (size_t)
  698. [RSP+1358] 0x9400000004 (size_t)
  699. [RSP+1360] 0x9C00000004 (size_t)
  700. [RSP+1368] 0x9C00000008 (size_t)
  701. [RSP+1370] 0x9400000000 (size_t)
  702. [RSP+1378] 0x0 (size_t)
  703. [RSP+1380] 0x0 (size_t)
  704. [RSP+1388] 0x0 (size_t)
  705. [RSP+1390] 0x0 (size_t)
  706. [RSP+1398] 0x0 (size_t)
  707. [RSP+13A0] 0x0 (size_t)
  708. [RSP+13A8] 0x0 (size_t)
  709. [RSP+13B0] 0x0 (size_t)
  710. [RSP+13B8] 0x0 (size_t)
  711. [RSP+13C0] 0x0 (size_t)
  712. [RSP+13C8] 0x0 (size_t)
  713. [RSP+13D0] 0x0 (size_t)
  714. [RSP+13D8] 0x0 (size_t)
  715. [RSP+13E0] 0x0 (size_t)
  716. [RSP+13E8] 0x0 (size_t)
  717. [RSP+13F0] 0x7F0400047F040000 (size_t)
  718. [RSP+13F8] 0x7F0400007F040000 (size_t)
  719. [RSP+1400] 0x300010203020100 (size_t)
  720. [RSP+1408] 0x0 (size_t)
  721. [RSP+1410] 0x0 (size_t)
  722. [RSP+1418] 0x0 (size_t)
  723. [RSP+1420] 0x0 (size_t)
  724. [RSP+1428] 0x7A9CDFF380 (void*)
  725. [RSP+1430] 0x0 (size_t)
  726. [RSP+1438] 0x7FF6660BBB73 (void* -> Starfield.exe+2FBBB73)
  727. vmovsd xmm15,[282E8DDh]
  728. [RSP+1440] 0x1ED223CD780 (hknpCollisionQueryDispatcher*)
  729. [RSP+1448] 0x7A9CDFF2F0 (hknpTriangleShape*)
  730. [RSP+1450] 0x0 (size_t)
  731. [RSP+1458] 0x0 (size_t)
  732. [RSP+1460] 0x0 (size_t)
  733. [RSP+1468] 0x0 (size_t)
  734. [RSP+1470] 0x7A9CDFF810 (void*)
  735. [RSP+1478] 0x7FF66490A102 (void* -> Starfield.exe+180A102)
  736. vmovups xmm8,[3B9FFFEh]
  737. [RSP+1480] 0xBF9C67ED02ECB7BC (size_t)
  738. [RSP+1488] 0x7FF6643DA0DD (void* -> Starfield.exe+12DA0DD)
  739. jmp short 6
  740. [RSP+1490] 0x3FEFFCD8F235A8A7 (size_t)
  741. [RSP+1498] 0x3F9C67ED02ECB7BC (size_t)
  742. [RSP+14A0] 0x0 (size_t)
  743. [RSP+14A8] 0x0 (size_t)
  744. [RSP+14B0] 0x0 (size_t)
  745. [RSP+14B8] 0x0 (size_t)
  746. [RSP+14C0] 0x0 (size_t)
  747. [RSP+14C8] 0x0 (size_t)
  748. [RSP+14D0] 0x0 (size_t)
  749. [RSP+14D8] 0x0 (size_t)
  750. [RSP+14E0] 0x0 (size_t)
  751. [RSP+14E8] 0x0 (size_t)
  752. [RSP+14F0] 0x0 (size_t)
  753. [RSP+14F8] 0x0 (size_t)
  754. [RSP+1500] 0x0 (size_t)
  755. [RSP+1508] 0x0 (size_t)
  756. [RSP+1510] 0x3F800000 (size_t)
  757. [RSP+1518] 0x0 (size_t)
  758. [RSP+1520] 0x3F80000000000000 (size_t)
  759. [RSP+1528] 0x0 (size_t)
  760. [RSP+1530] 0x0 (size_t)
  761. [RSP+1538] 0x3F800000 (size_t)
  762. [RSP+1540] 0x42A89F5FC1A1B0AC (size_t)
  763. [RSP+1548] 0xC17D6F51 (size_t)
  764. [RSP+1550] 0x7FF6686A6448 (void* -> Starfield.exe+55A6448)
  765. [RSP+1558] 0x660BA100 (size_t)
  766. [RSP+1560] 0x5F7FFFF05F7FFFF0 (size_t)
  767. [RSP+1568] 0x5F7FFFF05F7FFFF0 (size_t)
  768. [RSP+1570] 0xBF44FD7ABF22EA00 (size_t)
  769. [RSP+1578] 0xBD5C5B46 (size_t)
  770. [RSP+1580] 0x7FF6697F0A40 (void* -> Starfield.exe+66F0A40)
  771. add [rax],al
  772. [RSP+1588] 0x8000000A00000000 (size_t)
  773. [RSP+1590] 0x7FFFFFFF (size_t)
  774. [RSP+1598] 0x3F80000000000000 (size_t)
  775. [RSP+15A0] 0x7FF6686A6480 (void* -> Starfield.exe+55A6480)
  776. [RSP+15A8] 0x660CCD00 (size_t)
  777. [RSP+15B0] 0x5F7FFFF05F7FFFF0 (size_t)
  778. [RSP+15B8] 0x5F7FFFF05F7FFFF0 (size_t)
  779. [RSP+15C0] 0x1ED7121CA00 (void*)
  780. [RSP+15C8] 0x0 (size_t)
  781. [RSP+15D0] 0x7FF6697F0A40 (void* -> Starfield.exe+66F0A40)
  782. add [rax],al
  783. [RSP+15D8] 0x8000000A00000000 (size_t)
  784. [RSP+15E0] 0xBF44FD7A7FFFFFFF (size_t)
  785. [RSP+15E8] 0x7FF666554114 (void* -> Starfield.exe+3454114)
  786. test al,al
  787. [RSP+15F0] 0xBD8ED59700000000 (size_t)
  788. [RSP+15F8] 0x3F7F606B (size_t)
  789. [RSP+1600] 0x3F22849EBF457893 (size_t)
  790. [RSP+1608] 0x3D35CBA3 (size_t)
  791. [RSP+1610] 0x7A9CDFF6E0 (void*)
  792. [RSP+1618] 0x7FF666553F41 (void* -> Starfield.exe+3453F41)
  793. mov rbx,[rbx+rax*8+148h]
  794. [RSP+1620] 0x1F5EE7E7C00 (char*) "\x01"
  795. [RSP+1628] 0x7FF666554114 (void* -> Starfield.exe+3454114)
  796. test al,al
  797. [RSP+1630] 0x0 (size_t)
  798. [RSP+1638] 0x3F80000000000000 (size_t)
  799. [RSP+1640] 0x1F5EE7E7E00 (void*)
  800. [RSP+1648] 0x5 (size_t)
  801. [RSP+1650] 0x7A9CDFF6C0 (void*)
  802. [RSP+1658] 0x7FF666558110 (void* -> Starfield.exe+3458110)
  803. vmovups xmm0,[rax]
  804. [RSP+1660] 0x0 (size_t)
  805. [RSP+1668] 0x7A9CDFF768 (void*)
  806. [RSP+1670] 0x0 (size_t)
  807. [RSP+1678] 0x7FF666557BC5 (void* -> Starfield.exe+3457BC5)
  808. inc dword ptr [rbx+8]
  809. [RSP+1680] 0x7A9CDFF6B0 (void*)
  810. [RSP+1688] 0x7A9CDFF6F0 (void*)
  811. [RSP+1690] 0x1ED7121CA00 (void*)
  812. [RSP+1698] 0x7FF669243A80 (char*) "\t"
  813. [RSP+16A0] 0x1F5D9364BB0 (BSJobs2::Detail::ControlNodeJob*)
  814. [RSP+16A8] 0x7FF666556E8E (void* -> Starfield.exe+3456E8E)
  815. mov [r14],rdi
  816. [RSP+16B0] 0x1F5D9364B69 (void*)
  817. [RSP+16B8] 0x1ED7121CA00 (void*)
  818. [RSP+16C0] 0x0 (size_t)
  819. [RSP+16C8] 0x0 (size_t)
  820. [RSP+16D0] 0x1ED7121CA00 (void*)
  821. [RSP+16D8] 0x100000003 (size_t)
  822. [RSP+16E0] 0x0 (size_t)
  823. [RSP+16E8] 0x0 (size_t)
  824. [RSP+16F0] 0x0 (size_t)
  825. [RSP+16F8] 0x0 (size_t)
  826. [RSP+1700] 0x0 (size_t)
  827. [RSP+1708] 0x0 (size_t)
  828. [RSP+1710] 0x0 (size_t)
  829. [RSP+1718] 0x0 (size_t)
  830. [RSP+1720] 0x0 (size_t)
  831. [RSP+1728] 0x0 (size_t)
  832. [RSP+1730] 0x7A9CDFF810 (void*)
  833. [RSP+1738] 0x1ED7121CA00 (void*)
  834. [RSP+1740] 0x1F5D9364B68 (BSJobs2::Detail::TNodeJob<void (&)(void),void>*)
  835. [RSP+1748] 0x7FF665602664 (void* -> Starfield.exe+2502664)
  836. lea rdx,[rsp+30h]
  837. [RSP+1750] 0x7FF600000001 (size_t)
  838. [RSP+1758] 0x7FF669800740 (void* -> Starfield.exe+6700740)
  839. lodsb [rsi]
  840. [RSP+1760] 0x7A00000002 (size_t)
  841. [RSP+1768] 0x1ED00000001 (void*)
  842. [RSP+1770] 0x1ED082EA978 (stl::unique_function_impl::detail::TypeErasedFuncImpl<<lambda_8291e7d1e643b42ca1ce574da97d71a6>,void *>*)
  843. [RSP+1778] 0x7FF666556A9D (void* -> Starfield.exe+3456A9D)
  844. mov rdx,rbx
  845. [RSP+1780] 0x1ED082EA978 (stl::unique_function_impl::detail::TypeErasedFuncImpl<<lambda_8291e7d1e643b42ca1ce574da97d71a6>,void *>*)
  846. [RSP+1788] 0x7FF669243A80 (char*) "\t"
  847. [RSP+1790] 0x0 (size_t)
  848. [RSP+1798] 0x0 (size_t)
  849. [RSP+17A0] 0x7FF66BE5F140 (void* -> Starfield.exe+8D5F140)
  850. push 9D3h
  851. [RSP+17A8] 0x7FF6665576F9 (void* -> Starfield.exe+34576F9)
  852. jmp short 0000000000000078h
  853. [RSP+17B0] 0x0 (size_t)
  854. [RSP+17B8] 0x1F5D9364B69 (void*)
  855. [RSP+17C0] 0x1CED3152EAC (size_t)
  856. [RSP+17C8] 0x1ED7121CA00 (void*)
  857. [RSP+17D0] 0x7FF668699E00 (void* -> Starfield.exe+5599E00)
  858. [RSP+17D8] 0x1ED7121CE78 (BSJobs2::Detail::GroupThread*)
  859. [RSP+17E0] 0x1F5D9364B69 (void*)
  860. [RSP+17E8] 0x2 (size_t)
  861. [RSP+17F0] 0x0 (size_t)
  862. [RSP+17F8] 0x1ED7121CE78 (BSJobs2::Detail::GroupThread*)
  863. [RSP+1800] 0x7FF668699E08 (void* -> Starfield.exe+5599E08)
  864. adc [rbp+31h],ch
  865. [RSP+1808] 0x0 (size_t)
  866. [RSP+1810] 0x7FF669B7BA40 (BSFixedSizeBlockAllocator::TAlloc<4294967296,16777216,128>*)
  867. [RSP+1818] 0x7FF666555810 (void* -> Starfield.exe+3455810)
  868. mov ecx,[31C3464h]
  869. [RSP+1820] 0x1CED3152EAC (size_t)
  870. [RSP+1828] 0x0 (size_t)
  871. [RSP+1830] 0x1F5D9364B69 (void*)
  872. [RSP+1838] 0x1 (size_t)
  873. [RSP+1840] 0x0 (size_t)
  874. [RSP+1848] 0x7FF666557CAE (void* -> Starfield.exe+3457CAE)
  875. xor eax,eax
  876. [RSP+1850] 0x7FF669B7BA40 (BSFixedSizeBlockAllocator::TAlloc<4294967296,16777216,128>*)
  877. [RSP+1858] 0x7FF668699E08 (void* -> Starfield.exe+5599E08)
  878. adc [rbp+31h],ch
  879. [RSP+1860] 0x1ED7121CE78 (BSJobs2::Detail::GroupThread*)
  880. [RSP+1868] 0x7FF668699E08 (void* -> Starfield.exe+5599E08)
  881. adc [rbp+31h],ch
  882. [RSP+1870] 0x0 (size_t)
  883. [RSP+1878] 0x7FF66604D411 (void* -> Starfield.exe+2F4D411)
  884. mov rcx,[3AFF2CFh]
  885. [RSP+1880] 0x0 (size_t)
  886. [RSP+1888] 0x0 (size_t)
  887. [RSP+1890] 0x0 (size_t)
  888. [RSP+1898] 0x7FF66BC384C8 (BSThreadEvent::`anonymous namespace'::Source*)
  889. [RSP+18A0] 0x1ED7121CE78 (BSJobs2::Detail::GroupThread*)
  890. [RSP+18A8] 0x0 (size_t)
  891. [RSP+18B0] 0x0 (size_t)
  892. [RSP+18B8] 0x0 (size_t)
  893. [RSP+18C0] 0x7FF668699E08 (void* -> Starfield.exe+5599E08)
  894. adc [rbp+31h],ch
  895. [RSP+18C8] 0x7A9CDFF880 (void*)
  896. [RSP+18D0] 0x7FF66BC384C8 (BSThreadEvent::`anonymous namespace'::Source*)
  897. [RSP+18D8] 0x0 (size_t)
  898. [RSP+18E0] 0x0 (size_t)
  899. [RSP+18E8] 0x0 (size_t)
  900. [RSP+18F0] 0x0 (size_t)
  901. [RSP+18F8] 0x7FF8E87BE8D7 (void* -> KERNEL32.DLL+002E8D7 BaseThreadInitThunk)
  902. mov ecx,eax
  903. [RSP+1900] 0x0 (size_t)
  904. [RSP+1908] 0x0 (size_t)
  905. [RSP+1910] 0x0 (size_t)
  906. [RSP+1918] 0x0 (size_t)
  907. [RSP+1920] 0x0 (size_t)
  908. [RSP+1928] 0x7FF8EA55BF6C (void* -> ntdll.dll+00BBF6C RtlUserThreadStart)
  909. jmp short 000000000000002Ah
  910. [RSP+1930] 0x0 (size_t)
  911. [RSP+1938] 0x0 (size_t)
  912. [RSP+1940] 0x4F0FFFFFB30 (size_t)
  913. [RSP+1948] 0x4D0FFFFFB30 (size_t)
  914. [RSP+1950] 0x21 (size_t)
  915. [RSP+1958] 0x7FF8E7AEAD90 (void* -> KERNELBASE.dll+011AD90 UnhandledExceptionFilter)
  916. mov [rsp+10h],rbx
  917. [RSP+1960] 0x7A9CDFCAC0 (void*)
  918. [RSP+1968] 0x7A9CDFCAC0 (void*)
  919. [RSP+1970] 0x0 (size_t)
  920. [RSP+1978] 0x0 (size_t)
  921. [RSP+1980] 0x0 (size_t)
  922. [RSP+1988] 0x0 (size_t)
  923. [RSP+1990] 0x0 (size_t)
  924. [RSP+1998] 0x0 (size_t)
  925. [RSP+19A0] 0x0 (size_t)
  926. [RSP+19A8] 0x0 (size_t)
  927. [RSP+19B0] 0x0 (size_t)
  928. [RSP+19B8] 0x0 (size_t)
  929. [RSP+19C0] 0x0 (size_t)
  930. [RSP+19C8] 0x0 (size_t)
  931. [RSP+19D0] 0x0 (size_t)
  932. [RSP+19D8] 0x0 (size_t)
  933. [RSP+19E0] 0x0 (size_t)
  934. [RSP+19E8] 0x0 (size_t)
  935. [RSP+19F0] 0x0 (size_t)
  936. [RSP+19F8] 0x0 (size_t)
  937. [RSP+1A00] 0x0 (size_t)
  938. [RSP+1A08] 0x0 (size_t)
  939. [RSP+1A10] 0x0 (size_t)
  940. [RSP+1A18] 0x0 (size_t)
  941. [RSP+1A20] 0x0 (size_t)
  942. [RSP+1A28] 0x0 (size_t)
  943. [RSP+1A30] 0x0 (size_t)
  944. [RSP+1A38] 0x0 (size_t)
  945. [RSP+1A40] 0x0 (size_t)
  946. [RSP+1A48] 0x0 (size_t)
  947. [RSP+1A50] 0x0 (size_t)
  948. [RSP+1A58] 0x0 (size_t)
  949. [RSP+1A60] 0x0 (size_t)
  950. [RSP+1A68] 0x0 (size_t)
  951. [RSP+1A70] 0x0 (size_t)
  952. [RSP+1A78] 0x0 (size_t)
  953. [RSP+1A80] 0x0 (size_t)
  954. [RSP+1A88] 0x0 (size_t)
  955. [RSP+1A90] 0x0 (size_t)
  956. [RSP+1A98] 0x0 (size_t)
  957. [RSP+1AA0] 0x0 (size_t)
  958. [RSP+1AA8] 0x0 (size_t)
  959. [RSP+1AB0] 0x0 (size_t)
  960. [RSP+1AB8] 0x0 (size_t)
  961. [RSP+1AC0] 0x0 (size_t)
  962. [RSP+1AC8] 0x0 (size_t)
  963. [RSP+1AD0] 0x0 (size_t)
  964. [RSP+1AD8] 0x0 (size_t)
  965. [RSP+1AE0] 0x0 (size_t)
  966. [RSP+1AE8] 0x0 (size_t)
  967. [RSP+1AF0] 0x0 (size_t)
  968. [RSP+1AF8] 0x0 (size_t)
  969. [RSP+1B00] 0x0 (size_t)
  970. [RSP+1B08] 0x0 (size_t)
  971. [RSP+1B10] 0x0 (size_t)
  972. [RSP+1B18] 0x0 (size_t)
  973. [RSP+1B20] 0x0 (size_t)
  974. [RSP+1B28] 0x0 (size_t)
  975. [RSP+1B30] 0x0 (size_t)
  976. [RSP+1B38] 0x0 (size_t)
  977. [RSP+1B40] 0x0 (size_t)
  978. [RSP+1B48] 0x0 (size_t)
  979. [RSP+1B50] 0x0 (size_t)
  980. [RSP+1B58] 0x0 (size_t)
  981. [RSP+1B60] 0x0 (size_t)
  982. [RSP+1B68] 0x0 (size_t)
  983. [RSP+1B70] 0x0 (size_t)
  984. [RSP+1B78] 0x0 (size_t)
  985. [RSP+1B80] 0x0 (size_t)
  986. [RSP+1B88] 0x0 (size_t)
  987. [RSP+1B90] 0x0 (size_t)
  988. [RSP+1B98] 0x0 (size_t)
  989. [RSP+1BA0] 0x0 (size_t)
  990. [RSP+1BA8] 0x0 (size_t)
  991. [RSP+1BB0] 0x0 (size_t)
  992. [RSP+1BB8] 0x0 (size_t)
  993. [RSP+1BC0] 0x0 (size_t)
  994. [RSP+1BC8] 0x0 (size_t)
  995. [RSP+1BD0] 0x0 (size_t)
  996. [RSP+1BD8] 0x0 (size_t)
  997. [RSP+1BE0] 0x0 (size_t)
  998. [RSP+1BE8] 0x0 (size_t)
  999. [RSP+1BF0] 0x0 (size_t)
  1000. [RSP+1BF8] 0x0 (size_t)
  1001. [RSP+1C00] 0x0 (size_t)
  1002. [RSP+1C08] 0x0 (size_t)
  1003. [RSP+1C10] 0x0 (size_t)
  1004. [RSP+1C18] 0x0 (size_t)
  1005. [RSP+1C20] 0x0 (size_t)
  1006. [RSP+1C28] 0x0 (size_t)
  1007. [RSP+1C30] 0x0 (size_t)
  1008. [RSP+1C38] 0x0 (size_t)
  1009. [RSP+1C40] 0x0 (size_t)
  1010. [RSP+1C48] 0x0 (size_t)
  1011. [RSP+1C50] 0x0 (size_t)
  1012. [RSP+1C58] 0x0 (size_t)
  1013. [RSP+1C60] 0x0 (size_t)
  1014. [RSP+1C68] 0x0 (size_t)
  1015. [RSP+1C70] 0x0 (size_t)
  1016. [RSP+1C78] 0x0 (size_t)
  1017. [RSP+1C80] 0x0 (size_t)
  1018. [RSP+1C88] 0x0 (size_t)
  1019. [RSP+1C90] 0x0 (size_t)
  1020. [RSP+1C98] 0x0 (size_t)
  1021. [RSP+1CA0] 0x0 (size_t)
  1022. [RSP+1CA8] 0x0 (size_t)
  1023. [RSP+1CB0] 0x0 (size_t)
  1024. [RSP+1CB8] 0x0 (size_t)
  1025. [RSP+1CC0] 0x0 (size_t)
  1026. [RSP+1CC8] 0x0 (size_t)
  1027. [RSP+1CD0] 0x0 (size_t)
  1028. [RSP+1CD8] 0x0 (size_t)
  1029. [RSP+1CE0] 0x0 (size_t)
  1030. [RSP+1CE8] 0x0 (size_t)
  1031. [RSP+1CF0] 0x0 (size_t)
  1032. [RSP+1CF8] 0x0 (size_t)
  1033. [RSP+1D00] 0x0 (size_t)
  1034. [RSP+1D08] 0x0 (size_t)
  1035. [RSP+1D10] 0x0 (size_t)
  1036. [RSP+1D18] 0x0 (size_t)
  1037. [RSP+1D20] 0x0 (size_t)
  1038. [RSP+1D28] 0x0 (size_t)
  1039. [RSP+1D30] 0x0 (size_t)
  1040. [RSP+1D38] 0x0 (size_t)
  1041. [RSP+1D40] 0x0 (size_t)
  1042. [RSP+1D48] 0x0 (size_t)
  1043. [RSP+1D50] 0x0 (size_t)
  1044. [RSP+1D58] 0x0 (size_t)
  1045. [RSP+1D60] 0x0 (size_t)
  1046. [RSP+1D68] 0x0 (size_t)
  1047. [RSP+1D70] 0x0 (size_t)
  1048. [RSP+1D78] 0x0 (size_t)
  1049. [RSP+1D80] 0x0 (size_t)
  1050. [RSP+1D88] 0x0 (size_t)
  1051. [RSP+1D90] 0x0 (size_t)
  1052. [RSP+1D98] 0x0 (size_t)
  1053. [RSP+1DA0] 0x0 (size_t)
  1054. [RSP+1DA8] 0x0 (size_t)
  1055. [RSP+1DB0] 0x0 (size_t)
  1056. [RSP+1DB8] 0x0 (size_t)
  1057. [RSP+1DC0] 0x0 (size_t)
  1058. [RSP+1DC8] 0x0 (size_t)
  1059. [RSP+1DD0] 0x0 (size_t)
  1060. [RSP+1DD8] 0x0 (size_t)
  1061. [RSP+1DE0] 0x0 (size_t)
  1062. [RSP+1DE8] 0x0 (size_t)
  1063. [RSP+1DF0] 0x0 (size_t)
  1064. [RSP+1DF8] 0x0 (size_t)
  1065. [RSP+1E00] 0x0 (size_t)
  1066. [RSP+1E08] 0x0 (size_t)
  1067. [RSP+1E10] 0x0 (size_t)
  1068. [RSP+1E18] 0x0 (size_t)
  1069. [RSP+1E20] 0x0 (size_t)
  1070. [RSP+1E28] 0x0 (size_t)
  1071. [RSP+1E30] 0x0 (size_t)
  1072. [RSP+1E38] 0x0 (size_t)
  1073. [RSP+1E40] 0x0 (size_t)
  1074. [RSP+1E48] 0x0 (size_t)
  1075. [RSP+1E50] 0x0 (size_t)
  1076. [RSP+1E58] 0x0 (size_t)
  1077. [RSP+1E60] 0x0 (size_t)
  1078. [RSP+1E68] 0x0 (size_t)
  1079. [RSP+1E70] 0x0 (size_t)
  1080. [RSP+1E78] 0x0 (size_t)
  1081. [RSP+1E80] 0x0 (size_t)
  1082. [RSP+1E88] 0x0 (size_t)
  1083. [RSP+1E90] 0x0 (size_t)
  1084. [RSP+1E98] 0x0 (size_t)
  1085. [RSP+1EA0] 0x0 (size_t)
  1086. [RSP+1EA8] 0x0 (size_t)
  1087. [RSP+1EB0] 0x0 (size_t)
  1088. [RSP+1EB8] 0x0 (size_t)
  1089. [RSP+1EC0] 0x0 (size_t)
  1090. [RSP+1EC8] 0x0 (size_t)
  1091. [RSP+1ED0] 0x0 (size_t)
  1092. [RSP+1ED8] 0x0 (size_t)
  1093. [RSP+1EE0] 0x0 (size_t)
  1094. [RSP+1EE8] 0x0 (size_t)
  1095. [RSP+1EF0] 0x0 (size_t)
  1096. [RSP+1EF8] 0x0 (size_t)
  1097. [RSP+1F00] 0x0 (size_t)
  1098. [RSP+1F08] 0x0 (size_t)
  1099. [RSP+1F10] 0x0 (size_t)
  1100. [RSP+1F18] 0x0 (size_t)
  1101. [RSP+1F20] 0x0 (size_t)
  1102. [RSP+1F28] 0x0 (size_t)
  1103. [RSP+1F30] 0x0 (size_t)
  1104. [RSP+1F38] 0x0 (size_t)
  1105. [RSP+1F40] 0x0 (size_t)
  1106. [RSP+1F48] 0x0 (size_t)
  1107. [RSP+1F50] 0x0 (size_t)
  1108. [RSP+1F58] 0x0 (size_t)
  1109. [RSP+1F60] 0x0 (size_t)
  1110. [RSP+1F68] 0x0 (size_t)
  1111. [RSP+1F70] 0x0 (size_t)
  1112. [RSP+1F78] 0x0 (size_t)
  1113. [RSP+1F80] 0x0 (size_t)
  1114. [RSP+1F88] 0x0 (size_t)
  1115. [RSP+1F90] 0x0 (size_t)
  1116. [RSP+1F98] 0x0 (size_t)
  1117. [RSP+1FA0] 0x0 (size_t)
  1118. [RSP+1FA8] 0x0 (size_t)
  1119. [RSP+1FB0] 0x0 (size_t)
  1120. [RSP+1FB8] 0x0 (size_t)
  1121. [RSP+1FC0] 0x0 (size_t)
  1122. [RSP+1FC8] 0x0 (size_t)
  1123. [RSP+1FD0] 0x0 (size_t)
  1124. [RSP+1FD8] 0x0 (size_t)
  1125. [RSP+1FE0] 0x0 (size_t)
  1126. [RSP+1FE8] 0x0 (size_t)
  1127. [RSP+1FF0] 0x0 (size_t)
  1128. [RSP+1FF8] 0x0 (size_t)
  1129. [RSP+2000] 0x0 (size_t)
  1130. [RSP+2008] 0x0 (size_t)
  1131. [RSP+2010] 0x0 (size_t)
  1132. [RSP+2018] 0x0 (size_t)
  1133.  
  1134. MODULES:
  1135. 160_E658700.bin
  1136. Address: 0x7FF80AA80000
  1137. SHA: 9628969F053F9DA54D84422BF8E0915EDC7129379AA49B4D12969628E7599BE256D1FE3EDD18AAE32C7A837C82DEE30E8C28EDD8C8246B240F76CF2103A12980
  1138. Version: v310.2.1
  1139. _nvngx.dll
  1140. Address: 0x7FF850FA0000
  1141. SHA: CCA7DF9EF16C5C9FCE9B7670DB5E9463190AF7A505D70242597D3E5AD7D99D09C125DD9F34D8E484726FC3132328C0DE631D568BFE14804B94C442A54169C2CD
  1142. Version: v32.0.15.7247
  1143. ADVAPI32.dll
  1144. Address: 0x7FF8E83A0000
  1145. SHA: 7DB21D83FC4989C5E4790D81E4A0677AB62C5F601B5D58C9F4EEDEFB602B6DEAFA0413A8E8BEF075DBCF61B43F158292E030ED0578E3076455FF798846E79537
  1146. Version: v10.0.26100.1
  1147. amsi.dll
  1148. Address: 0x7FF8CF7E0000
  1149. SHA: 32370FC4654802A9FE15DC25A04C71803BA0789DA308604C2BD0D7D3B94724FE3A4F05A0A8618AD02A854200264EC3AAAA3340F720423F3D763B424B6A4649CD
  1150. Version: v10.0.26100.1150
  1151. AUDIOSES.DLL
  1152. Address: 0x7FF8CEE10000
  1153. SHA: 7BC11BA270F7CA7837A9455F73954E17BFE2881641C936DECB56171E413B858E82A4A18EAAF1BC143CC866441CAD94EBBD3A5423B4356B3590BB33BBBC602897
  1154. Version: v10.0.26100.1
  1155. bcrypt.dll
  1156. Address: 0x7FF8E6FD0000
  1157. SHA: 30B839FB878EC5892153D386C7BC5BFBCD35C143E32FFD1C7E7BE9E780283D8666F7A8B6F0A30951847F1AC06AC710E663A59E737D85AE275E7D99CC345CB7CD
  1158. Version: v10.0.26100.1
  1159. bcryptPrimitives.dll
  1160. Address: 0x7FF8E77F0000
  1161. SHA: 645CD6952A4FDC77D054BCF8572751C67A8165380C971A74CBF22E68F1B84CE4AD38ADE99D91666858FF8E79764EB8DF7258FE2F7633F963FA53B178573548FF
  1162. Version: v10.0.26100.3037
  1163. bink2w64.dll
  1164. Address: 0x7FF8BBD00000
  1165. SHA: 61AB61B895332AE98F5491D07975E5D6A1E42747DE1AE292298CB008AB63AB410F8A7684DB7DDA694EBCC351783D68EDB167B4EEEAB74DBEC6C1BB238E62BEED
  1166. Version: v2023.2.0
  1167. CFGMGR32.dll
  1168. Address: 0x7FF8E7330000
  1169. SHA: 3C7BBC264A1B31391B1B7C67D47687FF5DCC42B0BDA794429123C641558A256BA52551645802D32B7ACF5D1D43C2C939FBFCE8AEDEBAC4B67953186B050226C2
  1170. Version: v10.0.26100.3323
  1171. clbcatq.dll
  1172. Address: 0x7FF8E8460000
  1173. SHA: 1EBE6B579BB73E21ABFC7FEF215D2C55B14121D489A9D5D84288B0FB2FB7DED6D0BEAE78E248AB738395737E61DEE11976EF5AFAC506E5004E7483126FE5AD63
  1174. Version: v2001.12.10941.16384
  1175. combase.dll
  1176. Address: 0x7FF8E8DA0000
  1177. SHA: 683F9E9F37C4851C16FC7D6D8FFBFE8DEC7341653A8580E7764C573F299A282701373591CE7C0B9CCE6E6D063AFBC7ADAB0EDFB3161CB430B60AF93A34AC3D24
  1178. Version: v10.0.26100.1
  1179. CONCRT140.dll
  1180. Address: 0x7FF8BBD70000
  1181. SHA: 7D94EAA509DF6E7FCA9AF720CC537A42E3FBF53CB1E615B36ECACA80EA0482821B8AC2905CB64BE844413D4FC1BA65E1E67FD1413E3D849B076E2AFAC31B2960
  1182. Version: v14.42.34438
  1183. ConsoleCommandRunner.dll
  1184. Address: 0x7FF8BB430000
  1185. SHA: 41C02A0A32FCD260B68C52BB5DF7CEC56432F72A09B67B0C422D339772EC6972E11EE8CC7B2775EF05C087361D2880A0BCEEABB48AB2BD008D8D219B674C2237
  1186. Version: v1.5.0
  1187. CoreMessaging.dll
  1188. Address: 0x7FF8E4500000
  1189. SHA: 6415A29FE1ED4A520E64A5264F4536A8A48A78819BEAD4AB9BF9B5A4791022C456DE80C4B4DEFDD667CF4E89CFCE5F5DFDD52326C696432195CDF257FCD7EBB2
  1190. Version: v10.0.26100.3323
  1191. CoreUIComponents.dll
  1192. Address: 0x7FF8E11D0000
  1193. SHA: F0D1A70FFB305C4A2EE679AFC13CF0A4E9F3B60649BD35556CB92DB7666778F9735FF01188D9FF3E10C165CA30E0DCA15A766895833F96A7A325F58DB9B7A520
  1194. Version: v10.0.26100.3323
  1195. CRYPT32.dll
  1196. Address: 0x7FF8E8140000
  1197. SHA: 9CCA5F2E4E1F2813C87DBAC38B1EEC396AFAADF5E720AE076160FF5E8943E43ABDA274768193800258CA41337F5913A83DCEC3695A93F46DD6DE0E1CA1D149A9
  1198. Version: v10.0.26100.1
  1199. CRYPTBASE.DLL
  1200. Address: 0x7FF8E6BB0000
  1201. SHA: 5C8F522617075762D11AB3A459DD58BEE0D594892168010D1DF4998B6145761F618D5B0CCCC1DF130B2D5C1E951F3B1AAE9A872FBCA1796EBDBF7FA9BF4E94B1
  1202. Version: v10.0.26100.2894
  1203. cryptnet.dll
  1204. Address: 0x7FF8DFBB0000
  1205. SHA: 2BC9DC6188E6DBEC3A68F00145A049727E06371C9E20897F22F2556213933DB175BE206D36007B097CD660C83D754D97939182A475AD267FE11B39CDB487B2DD
  1206. Version: v10.0.26100.3037
  1207. cryptsp.dll
  1208. Address: 0x7FF8E6D30000
  1209. SHA: D5F162272852371A795AD1EE6402F82572C3C6C048999063C97DA50DDA68CF2E2273E8C72FD63089151C09C5808974F6F830B7A0CE3834A7ACD1DAE90F9A822B
  1210. Version: v10.0.26100.2454
  1211. d3d11.dll
  1212. Address: 0x7FF8E3C10000
  1213. SHA: 9EBAB0029C039BB40A987DC0706D00B9C5435BC470F8B9533B37D47607B4BF2D770FD0F1EAC795B7C8D36C28F8792D8A1F779DB1451FEE3947B52908FCA48448
  1214. Version: v10.0.26100.3323
  1215. d3d11on12.dll
  1216. Address: 0x7FF858300000
  1217. SHA: 76BC8B3B54342188FE0AFD3CA02E05668D11F9DA603A6DFE8B6A27C03BD23AD4AED35FF169EEBB63BDFADC40F341E00B9D70795CED82B89E6FE3E51EC2716CA3
  1218. Version: v10.0.26100.3323
  1219. d3d12.dll
  1220. Address: 0x7FF856DF0000
  1221. SHA: F0D485730012A375DB30A0ED6F7A8F5582C9DFBE301DF40941A8D6AFD19B6A1330644CB563790FB88E4F7D9B8F199E6912621C74B13A68192B7D838750401C38
  1222. Version: v10.0.26100.3323
  1223. D3D12Core.dll
  1224. Address: 0x7FF810840000
  1225. SHA: 588947973BFA8FF735F4719DFADF234A970A4202FFB60A78787A14037F0F4E48881F73051102921F817BE22C08D00BD5C11F8EFED977B9FAFE2182605133CE87
  1226. Version: v10.0.26100.3323
  1227. D3DSCache.dll
  1228. Address: 0x7FF8BB2B0000
  1229. SHA: DBF360B019E6AC8C67C292409F50C33A4170C370648AF94B4D184A56D1E97637F1A8505AB2ABB3BC4293ADCDB31D77F80DA269809F1A505687D6356FCB837762
  1230. Version: v10.0.26100.1
  1231. dbgcore.DLL
  1232. Address: 0x7FF87B5B0000
  1233. SHA: 16AF22C86361FE0AE4C31FBC8EFB0B0E9CF0C26B522D7FE8F77B7ED975E1100DE679B9E9C73B0215B8AAE2742348BBB91440D9884119109B06DA0300D7CAB1B9
  1234. Version: v10.0.26100.3037
  1235. dbghelp.dll
  1236. Address: 0x7FF8DE2F0000
  1237. SHA: BA32DD5A10FFED1AC8784BC4F841CADC477BE3507D39C9DE195577A5AC56DA9F12E96672129B66FB02603FF953646D86E85856ACC08AEDF3264FAD5AA68B87EC
  1238. Version: v10.0.26100.3037
  1239. dcomp.dll
  1240. Address: 0x7FF8E3E80000
  1241. SHA: 4C881B70E415A7FA1B82FBC76AE55F395B8EFE9B8363093A85FDA6CC74171B5F1C8C3D53D57381496BC40D70263961FCB20B5BE086F7DA5770523DE8C4D6F249
  1242. Version: v10.0.26100.3323
  1243. deviceaccess.dll
  1244. Address: 0x7FF8D8E70000
  1245. SHA: D38990F239E02895A15D85D6A7D3EBCDD3FB3220218B17B6C4B6D283046E7EB05F99B5F948D0D58F0770D1B70124F497425EC7BB65DF267A6255C13FD3233831
  1246. Version: v10.0.26100.3323
  1247. devobj.dll
  1248. Address: 0x7FF8E7300000
  1249. SHA: 701FA93590C1453301873595A66E4B3BC9751F55D55220BF0E905641496977EA1ECC7654E5264B4D250646EB4B795387470F044B65C5B3123FF62BEF4A84761C
  1250. Version: v10.0.26100.1150
  1251. DEVRTL.dll
  1252. Address: 0x7FF8D0C20000
  1253. SHA: CDCA17AB5570A96A9476A7B3346B4F3E3A9C0E9DD990E56E3F811389F14D66D9DC74BF7ECF825AC107F1548A4683C5C038BCCA20F3A4562AF9370835037B0C97
  1254. Version: v10.0.26100.1882
  1255. dhcpcsvc.DLL
  1256. Address: 0x7FF8DF880000
  1257. SHA: 874755316FC1BFF19934C22A37071AE042C43EE395BEB2F54362709CA5EC2868E2C8C22ED560AC324E541DFC4ED665C9CD0192137588E96799FC08F7EA140223
  1258. Version: v10.0.26100.1
  1259. dinput8.dll
  1260. Address: 0x7FF8C12A0000
  1261. SHA: E864B7590C5D94ADBB0315E7E8E58FBFF0C5E79626015EF525299AAF5BEB0B40D5C25B2A10AC6E1FBCD32650CE40592477CC4AACE41C75FCF6FB6B063353257A
  1262. Version: v10.0.26100.1
  1263. directxdatabasehelper.dll
  1264. Address: 0x7FF8E4B20000
  1265. SHA: E1BF8639C938576C8F8EEA0907B7D704F6A607CC7AC253C3B7DAB50B179B263E4960C1B46C9A18640B6EC338974A49EBE3B89D24E7E54DAF03C21C4B9813DD2D
  1266. Version: v10.0.26100.3323
  1267. DNSAPI.dll
  1268. Address: 0x7FF8E5EE0000
  1269. SHA: 174F3437DEC60F8208EE8A3879C9662B3E1B213904137A55790453BDB299BD640D6222ED8030FC242B10E7EBB10351D49BF39C4D510304330A9B4407F0AC9F38
  1270. Version: v10.0.26100.1591
  1271. DPAPI.DLL
  1272. Address: 0x7FF8E73C0000
  1273. SHA: 3E832A4BC1567C41DA538CE2EF401C13F139A37056E5F49E413899E0D47590F0DA3B1674EEA2D4193183E067ABC45B7D2D5676C91471261D98391432E0D0BD99
  1274. Version: v10.0.26100.1
  1275. drvstore.dll
  1276. Address: 0x7FF8DF9A0000
  1277. SHA: B13A5963310C08E787A98C0864DD65CA850D701376246C7E0783955151411502033EC7622931E559E9CEE59E2529CB02E5B40F1238F5304A598E48583BB46B33
  1278. Version: v10.0.26100.3323
  1279. DSOUND.DLL
  1280. Address: 0x7FF874120000
  1281. SHA: 25258F4D90200B84F158BB1537D4817519A12234F0D69F7FE7ED884E226EFEC5079B39ABE2B5A40BD900FE3EAEE976EF443D17AD05B0F63A39CF8A00826100E6
  1282. Version: v10.0.26100.1
  1283. dwmapi.dll
  1284. Address: 0x7FF8E4EE0000
  1285. SHA: C361C9EAA7B0587D6CBE7882D9A899FF938F7FF93677D6E355E4B08C7D596CC2EF4A8E93A5B660B8BBC5FE842903F8FF312E9B9D6C9DB67D1BC349560E8FF472
  1286. Version: v10.0.26100.1
  1287. dxcore.dll
  1288. Address: 0x7FF8E4AD0000
  1289. SHA: D594FD942BFEE747673A3519115B6ECBCC7EDA1D005F534EC863DD92D72912B69C68AA4D581CDD33A70FB2727C60C6BB456DCB6B5CD32ADE59DC23BE1876685D
  1290. Version: v10.0.26100.3323
  1291. dxgi.dll
  1292. Address: 0x7FF8E4C80000
  1293. SHA: 5E9FA69B4E54E8C69B2E97BDE91EC627B5366008D6DC9EBDBE6E204F78CA350811EE1D687FEFF1FD727E690D91F917EB23590DAFA847573804A3F121702A2AE9
  1294. Version: v10.0.26100.3323
  1295. DynamicInventoryModels.dll
  1296. Address: 0x7FF8BB880000
  1297. SHA: AB99604AB170FC0EAC8363CA3F78B452203DFF704705CD0151A7BE80482D35D1AAC975D5D376BEE85B5F6A79D1216EADB12D1F6FD063C82BA8E60D59F907CFFA
  1298. Version: v3.0.0
  1299. fastprox.dll
  1300. Address: 0x7FF8D0E90000
  1301. SHA: E811C2CE1E759926DD5185E3651065DC6D4B4E9948603FF056A9E17B2FD37A7484A779F4B7467812CE07E0D8081DFADEC5167974EFD32340D4F4C9C63CCCA2EB
  1302. Version: v10.0.26100.3323
  1303. ffbroker.dll
  1304. Address: 0x7FF8D8EC0000
  1305. SHA: 9C65ADFF67C1A445B83C95FF50EEC23A560E0906FA7604AAC0CA58F710C7206EFA68DEB798C25595E2F15A4301E271C06CD7803E455FBDFD4068CEAD22210237
  1306. Version: v10.0.26100.1882
  1307. fttu.dll
  1308. Address: 0x7FF8CC3D0000
  1309. SHA: 6DFDDD1CC864C95DEA2E7068AF0DF96F7343C3E658B23F13DE72952F9033ABDAC8D175532A217D0B85D82CC730DEEF0328B4A7B63DEC319D1C67B1F29CF0AF0F
  1310. fwpuclnt.dll
  1311. Address: 0x7FF8DAAC0000
  1312. SHA: 9E14593837465BAA56B7876F3CB96DD343557564AC1C62B911858F56E8ED67F27830303B54FEF0D18BFC2E36A16F4BB95B7CDAFE35831893C55ABBED4729CDA6
  1313. Version: v10.0.26100.3037
  1314. gameoverlayrenderer64.dll
  1315. Address: 0x7FF862960000
  1316. SHA: 49BD81375BCC3941D99608F9F0B71B213834E5FE911A5B5CE3AC5784D9E25E4C66A90F5E38037B4421FBEC217F63FB1A9872FDBE89C012D7F06A79DD1421CCD2
  1317. Version: v9.59.77.46
  1318. GDI32.dll
  1319. Address: 0x7FF8E9FD0000
  1320. SHA: 75F91614AD159A37FD599186FC8CCA3EE9C3EFEAC6E96C1F3309ABE7F902904F95342B4BACDC8544EEB6123250302C2BBD26334F2DAAE34182750C5B548B5514
  1321. Version: v10.0.26100.2033
  1322. gdi32full.dll
  1323. Address: 0x7FF8E7890000
  1324. SHA: E7B70C6C47D43C4EC8FF2218386B8061CAA353A18E7E2E88FCEE4C1CFF354226F9A9094DAD2E151F33041C213D440C2311DF49E2D91AB32794AFF094BDFCBA75
  1325. Version: v10.0.26100.3323
  1326. GetReferenceInfo.dll
  1327. Address: 0x7FF8B8DB0000
  1328. SHA: 3208FE3D9AC764EF476B9B8891DFE22E8CF71C7474D8BF0A2DD1CBE73CB92A6DBB28D51B970F300DC614B25F1725E9A1B92FFA8CFD0352181D9FB60E1CD44289
  1329. Version: v6.0.0
  1330. gpapi.dll
  1331. Address: 0x7FF8E69F0000
  1332. SHA: 8BBE03218B3782ED3F43CB0D8F901BD82015135EBBBAF65956D47D87D3FB44DBD4C73BD60AC5E46F89C13CE3BA8A122B50EBFE7CDE3BF62C9D9A5D846091EF77
  1333. Version: v10.0.26100.1
  1334. HID.DLL
  1335. Address: 0x7FF8E5BB0000
  1336. SHA: 544539016E5310BAD14FAEF413C0519200B7A93BCFEDD6005888D7E537047261882CC3D359F7F9FCC0500D3DDA8B89BE5F842830DE9B871544E2ABD69ACC2E25
  1337. Version: v10.0.26100.1
  1338. iertutil.dll
  1339. Address: 0x7FF8C84A0000
  1340. SHA: 1C2A38254517BCE32DE61C65FEC75DA265535BAC63EB24F5F7C959B87574903DDE945F0BE60EDC8C0BA9E0306F9C7367A4B765098DA2881E84C5649AA9B56BD4
  1341. Version: v11.0.26100.1
  1342. imagehlp.dll
  1343. Address: 0x7FF8E9130000
  1344. SHA: 60306F222CD4FE32CE5BC2E5CFF52F44E547DDF67583941440AC6A7C2853626BB1728FAC813AB184AC26ADB7E16FE1EF6D52FF5F228BEE64D94248DA9E8A4ABC
  1345. Version: v10.0.26100.1150
  1346. IMM32.dll
  1347. Address: 0x7FF8E8670000
  1348. SHA: 746D7E040A487E468CD4A853C47BC5EBA2C46B3598FBE4A8CE851D310C2D351B8CFE8B8777400C94D1C96406C69A6377C3D2B890E6DFB2762ECEAA8196CDA480
  1349. Version: v10.0.26100.1150
  1350. inputhost.dll
  1351. Address: 0x7FF8CCA70000
  1352. SHA: B836B571D565ABC598F105195D06DD977E7ADFF1BB69258901E55A5404B4C1C58ED617A59E09B29EE29C5D8FA9F40CA25B73CA467CDBAECB1D79618D85E3FF1B
  1353. Version: v10.0.26100.3323
  1354. IPHLPAPI.DLL
  1355. Address: 0x7FF8E5EA0000
  1356. SHA: 626E51C7861E22CF9A763DAE38120E689F9A80296BAA0AF8388C0A88E08A69754B481EC80A855ABCD1BD49930529F116EE75FFA4B291ABF8F88159E6230B5CA0
  1357. Version: v10.0.26100.1
  1358. kernel.appcore.dll
  1359. Address: 0x7FF8E6480000
  1360. SHA: B45CB1BAA443E53B0BDE895EA5E26D417B1834B0489C538CB67902E2F58F3170EB6D4037A2C0DDCCFCFBFE2BE18744FB6799D654EB3FD3B5DDD559A5F7226333
  1361. Version: v10.0.26100.1591
  1362. KERNEL32.DLL
  1363. Address: 0x7FF8E8790000
  1364. SHA: 9E920457631AD0A39FC08E8A4B8E38BA95C7FDA14B9B3F5DFB6292ECE1C210C3CF01C24E58AA6AF1A570D5019C72BA6E5B6041F426E96F9CE20F6FC961C78E3E
  1365. Version: v10.0.26100.3037
  1366. KERNELBASE.dll
  1367. Address: 0x7FF8E79D0000
  1368. SHA: CB249A805E718B82E2C91226AFBAAD4131C4D87D84703C3F4E319E4EBE9E9789484DE130FEECF6AA26741C64CAC05309352402416ADCE881BCF7C68F7112E710
  1369. Version: v10.0.26100.3037
  1370. libxess.dll
  1371. Address: 0x7FF810AC0000
  1372. SHA: FF63203BC0DF4975771A13622CB88617D0B90EDA81BC22A1BB21BDEF5E60DE89A959766ADAE453D447449993847BCA211E9FDF32F068F5D4DCD3C1786310833E
  1373. Version: v1.2.0.13
  1374. Microsoft.Internal.WarpPal.dll
  1375. Address: 0x7FF8E2C70000
  1376. SHA: C7E63E3D47B78E62EF969F5DAED36EA4F6450D1A83163B1D53022EAD9DE089BC55607978DAD4606B49A3F2590AD64DEAB98E2D191096C596F4617766AF2AEE12
  1377. MMDevApi.dll
  1378. Address: 0x7FF8DF900000
  1379. SHA: 7D079EAF6341940040270EEA2A7314EB07ADB0ACB5F6428B66F32FD7AF3A7E63F5B085485BA283A0957AA62273FC7B56DADE5FAC9FF01115077362DC57943502
  1380. Version: v10.0.26100.1
  1381. ModularPeopleSystem.dll
  1382. Address: 0x7FF8B80A0000
  1383. SHA: 2BD96DCF8B3DE62A5717632F22B81EB9E793ECE5073DAA2EA1D0A9B40237D73108ABD55FB6C65BBCE286D714EFAC8691EC4E503303D35F0C8A7B8F02225A2DE7
  1384. Version: v5.3.0
  1385. MpOav.dll
  1386. Address: 0x7FF8CF750000
  1387. SHA: 301C91174DF52AACF1133F19B8EB74170007D831C3B5A519539D1DB297F5F4336864AEBF6C8582473306F5661F6CDD09D7617B4D5910017B6DB56D7EEBE1473A
  1388. Version: v4.18.25010.11
  1389. msasn1.dll
  1390. Address: 0x7FF8E6D90000
  1391. SHA: D5EDC8FA56CE73E773B519792C45CD0C6F74C73C8B6714013E6EDF42DD4825E31B8275EE08360205E9FF741F08D51016CC1559C9AC92AE631C726B3FD91340BC
  1392. Version: v10.0.26100.2894
  1393. MSCTF.dll
  1394. Address: 0x7FF8E8A60000
  1395. SHA: 6CA3309D7EDF4D6FCC5E0C41957EA6C48F8BED22FD2E58CC1EF90143BAFD8CB5FBC9D78665160FD03BDA481B0ABD33E28E54D05B2ADA42B64A7CA93B80B61424
  1396. Version: v10.0.26100.1
  1397. msdmo.dll
  1398. Address: 0x7FF8B0D00000
  1399. SHA: 3D980D5108DDEF62F8386ED36733453074DE567E7D031B77E8DD642BE0A75639DD5F2D0F05E573F927E5DD34177DF09496B500B29BFC27213207C578FCC295EE
  1400. Version: v10.0.26100.1150
  1401. MSVCP140.dll
  1402. Address: 0x7FF8C6AF0000
  1403. SHA: B08140CE86EA78B481B78644F086359326616A56FB3A3953DA16A7FC2BD15A493652F22D4D2FCBA3675C668B9832FDB7D5F17A8AA6CCDB74E7B746A79DF60B88
  1404. Version: v14.42.34438
  1405. msvcp_win.dll
  1406. Address: 0x7FF8E8090000
  1407. SHA: C42D63EDFC4FEEDD3FC4C2F330B3AD2054D9FE33128CB9D54D29A0365FC88C452F59AFA9B2822EFFEEA9D2D81CC0D4E0A0A39873B2C5480216AF68C601720034
  1408. Version: v10.0.26100.1882
  1409. msvcrt.dll
  1410. Address: 0x7FF8E82F0000
  1411. SHA: 834CA6FFB7D2C378BFCE04B95CA667162D6933F45E8BBE41C0CC14496E8AF65AE9E3AC3BF70C21CCF0EBA1DA7A418FCB65851E614A90A05055E9D81DC72B67BC
  1412. Version: v7.0.26100.1882
  1413. MSWSOCK.dll
  1414. Address: 0x7FF8E6980000
  1415. SHA: D44917BBEFB4692E407A9A362EE519442FE6D3EF9415A7F8F0879A19AA97BDFE25C2AEEA5B247C602281EC93108EE8598A3EC39C3F24993C7D9B708BF6127C69
  1416. Version: v10.0.26100.1
  1417. napinsp.dll
  1418. Address: 0x7FF8CC3A0000
  1419. SHA: B9C968E3BDF2E2321FBADE7599C17631A1859CAD377AC7D5E7E319C2E482B90DB047A157A1A55BD2A45B267DDE89F9C6A1C2046F18D75E1372030F639F5AED46
  1420. Version: v10.0.26100.1
  1421. ncrypt.dll
  1422. Address: 0x7FF8E6F90000
  1423. SHA: E5C8F393C6AAE64BF8F2863C345C145B7D178DDCA2494A7C1EE4A09B7FE08EDB01998E60C512FAC773D0FE088C25901B5E490745DE43FD18D37BFFD84D67C0C3
  1424. Version: v10.0.26100.1591
  1425. ncryptsslp.dll
  1426. Address: 0x7FF8BFAB0000
  1427. SHA: 190EE5C8617722B29B8DA13CFD1E30AF3E8888A67F8FE82DF1AE8FF51C18C80BC3DD369964C5D99ADEF81A56303F0B08DBC027A4DA36E7FAA4F075A882203B8A
  1428. Version: v10.0.26100.1882
  1429. netprofm.dll
  1430. Address: 0x7FF8E18F0000
  1431. SHA: 06AC79389D4D7020FF22889B5857CB72BF161310070E86F540AD9BC1CCF3556F8FAE16C141F556CDA4B91671E5CB87A2541C196D786FAC70407F67A2294CE589
  1432. Version: v10.0.26100.1
  1433. netutils.dll
  1434. Address: 0x7FF8E5E60000
  1435. SHA: A2DEB0B78ACCFAED7B9147D24E4301398DC84C331EBE3043BA198F0B04C39C06CA0570595DB2A24F03E0869656292DC97BA8778FB035CF06EF0F68AC7D54ECB2
  1436. Version: v10.0.26100.1882
  1437. nlansp_c.dll
  1438. Address: 0x7FF8CBD90000
  1439. SHA: A18D067E9A419CD221632CF7FBE1CD851A09CC0EAA0AB7C4358AAB295E2FBF48BE73A4D27048DFFA9A33BA289448644FB4DC25EFD54F7A74C707F98D890E4574
  1440. Version: v10.0.26100.3037
  1441. npmproxy.dll
  1442. Address: 0x7FF8DA8E0000
  1443. SHA: 849881982B33DEA43996228D7C96B9BB434285F1057B3D7F55B979185E25E37AF1B1B9E5CF16E56DD5A93B3DDEDB69557FE4881F148BA8960A77278E34E7BDA6
  1444. Version: v10.0.26100.1150
  1445. NSI.dll
  1446. Address: 0x7FF8E8560000
  1447. SHA: 0947FE4280A6055DEFB918B148CBCE27047FDD6E04EFEB6D84739799471753867BD32C5457F1C9A0151569917F9E5D0EE1816784081D4D3C3AE8D17CB71CA0F7
  1448. Version: v10.0.26100.2894
  1449. NTASN1.dll
  1450. Address: 0x7FF8E6F40000
  1451. SHA: A7073268A16E89DC503434DC1FE745A4F21FBF549C78ED69D7E1FCF0FB2F1333462426E570CCED18558F47A33048F2B4214D38D37F6518DC05586305C989815B
  1452. Version: v10.0.26100.1
  1453. ntdll.dll
  1454. Address: 0x7FF8EA4A0000
  1455. SHA: 9A84EEC1839315365121A4CEC3F1BB7326F4FE6C3FCDA63345AD3EADF6C982BD7C3868EDFE817204C8E3B142970DBA9CECFD09E8FDFA4BCAD6C334A2FA54C391
  1456. Version: v10.0.26100.2454
  1457. ntmarta.dll
  1458. Address: 0x7FF8E65A0000
  1459. SHA: B46A4C36238AF06DBF3BB5BCAC75A0AFE2F7880E96CCB66016FA5FC5CCA176A0547A4717CC1459678EAA242CF64BAF90A22BB7DFCF26F82D7367E14D92E05332
  1460. Version: v10.0.26100.1
  1461. nvapi64.dll
  1462. Address: 0x7FF8D8EE0000
  1463. SHA: 5C6EE29D035B37986826AC589F92E0DB74E26A7C924C3AADDA349899CD073D8FB024D44FE1C953A843B8B2B9E8FF48910B72D72B7C3527BA4CABF569D06D1A3C
  1464. Version: v32.0.15.7247
  1465. nvcuda64.dll
  1466. Address: 0x7FF846240000
  1467. SHA: 76800FF6134716187DE662DA88D317BB046EA5BB689BF5160A5082439EBCB9156C99AF5FA78D7965C47B493549D3DA720ED11E3F883E5CAB96FCD746835D7277
  1468. Version: v32.0.15.7247
  1469. nvdxgdmal64.dll
  1470. Address: 0x7FF8BC5A0000
  1471. SHA: 407CB61104FA759E7C484340AE8D44C328046BA07BDDD985AF88CF3632C0B69D5093395854A1072AC89B4AAF2C5B724EF6BFA994E8B8B59DD997F39624E602A1
  1472. nvgpucomp64.dll
  1473. Address: 0x7FF8DAB50000
  1474. SHA: 916AFAC2391F1E36A50D6A82D3A3280B12506E56B4DD43151DDF8AE1E776A61496B4FA2B73BCD1C372EC9BF450487E7C27EF372EBE2662439E3A9DD1014A58A5
  1475. Version: v32.0.15.7247
  1476. nvldumdx.dll
  1477. Address: 0x7FF8DFF40000
  1478. SHA: 50CB39EE05714E2BAA36BEF05B7B51BE2CEB15C575EE68AF1262EDB4AB30BC08C684CBD9BBBFEF96CF5C934E970B6E44EC3F5AA90BBC976A96682D557007835D
  1479. Version: v32.0.15.7247
  1480. NvMemMapStoragex.dll
  1481. Address: 0x7FF8D9790000
  1482. SHA: F07EE21E8B7F1786684834FED3A240641770E4CB9E15B8F1DF6F115A6978025DA0EF830C365CEFE9D502C9D9BD99022709DBB998BD394D4255D0B30FDE23C8E4
  1483. NvMessageBus.dll
  1484. Address: 0x7FF8D29A0000
  1485. SHA: 445C4ABCE77CEE1B49D0F6A1A710CD99B47DAA9ADE41B50A1A00A74EFE67106D891669DAA043FF6F76F36C2C29F0FB5E11A1B108DB5F41CDED25A44EEE01211B
  1486. nvngx_dlssg.dll
  1487. Address: 0x7FF8100E0000
  1488. SHA: D98B64F17BFA7CD5F91A3A2BD38C8E3AE65AE2427571BD1710388C040C52639F82E70FA0741DC8D190FE6C653914942AEA36D7D4EFF1655C01808824684044BB
  1489. Version: v310.2.0
  1490. nvppex.dll
  1491. Address: 0x7FF88D500000
  1492. SHA: 67F80085DE2BC02DC2D94DFC9E9EB993C21E7A70CBB0A957583F88114E69E0AE181C217C358001E65A6E15B59CBEE8287CD144FF36EE43A24DF5FECFC8DCB51E
  1493. Version: v32.0.15.7247
  1494. nvspcap64.dll
  1495. Address: 0x7FF8AFBF0000
  1496. SHA: B5691CFB0F2BB29E0C73EDD0A213166200678063D25F85F9579E13988312257751EC263897A9BD440B75CAA285080D43A588C07EE049C3ED7A7C80176FA57295
  1497. Version: v11.0.3.218
  1498. NvTelemetryAPI64.dll
  1499. Address: 0x7FF8CFE30000
  1500. SHA: A58DB08D5DBB935BAFB044578BBB815783DAE2723FC2FEF8780674FED63D60117BAEE530A7897DA798D7E945C3E795B98CC9EEC481CC452D6751FE5AB8ED3CB1
  1501. Version: v19.4.23
  1502. NvTelemetryBridge64.dll
  1503. Address: 0x7FF8E4860000
  1504. SHA: 42ADD94DD111D7769E4230F647ACF6C260A83DB7152832A4D90189B48B6B40F4D009220F77E9AF083A47E5973C93E9FE95D00186B683ADEA9988042CDA3BFEA0
  1505. Version: v19.4.23
  1506. nvwgf2umx.dll
  1507. Address: 0x7FF8D2D10000
  1508. SHA: 604B66A675187906725268C1D2141C1F95562558B5F6151559A4C8E5B02D8386124E7B292C172A500D22A497D13DC597A08991E7420555A4253D49B1C5D0EAFE
  1509. Version: v32.0.15.7247
  1510. ole32.dll
  1511. Address: 0x7FF8E8860000
  1512. SHA: C0C06FB16220F5B142C1DCF5304F230BEA4D0217BA74D0E71A816B960C9298AD9C40DDE43D7B3D85A0BD1B1A711749D107E3914C656766DD40F3D6F4342ABD71
  1513. Version: v10.0.26100.1
  1514. OLEAUT32.dll
  1515. Address: 0x7FF8E86B0000
  1516. SHA: 07C82E07F264FFC5E8E80B158EF85FC7E05EB00810FE318A6B7FCA0C9E9FEAFC40B49340C4707EFF9C6EF0895AB57856914633C528FEAC4AB643E66CC607C14B
  1517. Version: v10.0.26100.3323
  1518. ondemandconnroutehelper.dll
  1519. Address: 0x7FF8C56A0000
  1520. SHA: 10DF9F84D810807CB79C8C9F717C365ABCEBDE6B3AEA49198E0CF65C2271E0DEF235A49F9FFA94816CC6E18FB903D5198DBF0C67E57CD3EBC1A012021202014D
  1521. Version: v10.0.26100.1882
  1522. PhotoMetadataHandler.dll
  1523. Address: 0x7FF8BA2A0000
  1524. SHA: 90F63B3A3C818118FB809DDFCEDA933C90DB56B69AF21B3E8DF5F818A8076F7EEFF7A11AE11839A2BF59E87E2DA1C49CD41B3E762B77603844FB7C43F3AA5503
  1525. Version: v10.0.26100.3323
  1526. POWRPROF.dll
  1527. Address: 0x7FF8E6EE0000
  1528. SHA: 50D68A1C3F44D0B90D13DBE74DAA19EE3045193C65772FD635A41AF84E36C2FACB8AD3AC98DC91F7FBF468E5E42878343C64DDA84BCC1297AD63D8A536E79B7B
  1529. Version: v10.0.26100.1
  1530. profapi.dll
  1531. Address: 0x7FF8E75B0000
  1532. SHA: EAD120EF2578F4C8ECE2E66353AF7FF0E490C19251483BDB44D2B9DCD6EB511DBB5D2049EE245BF65D1314EFFB2A40091FE850A04FA943B8D33587F7C98E98AB
  1533. Version: v10.0.26100.3323
  1534. PROPSYS.dll
  1535. Address: 0x7FF8E27F0000
  1536. SHA: 4F36151B09F5FC0076135D83E4221F3BC9BE8AFE85A3D40FF573665017B9B3DA38D3D504A62E263A48FFABF454C3AC079B458F527DFFA955E5E545EC0645FFEB
  1537. Version: v7.0.26100.3323
  1538. PSAPI.DLL
  1539. Address: 0x7FF8E82C0000
  1540. SHA: 986DBB58CB62378FA9AB8A62A1362DEBF59CF674ED811F6BE727B106EB672860119EC120BF9B6361DFDB919737BA1B356BCBA5CCF7E1E4A82945B0371386F5BC
  1541. Version: v10.0.26100.1
  1542. rasadhlp.dll
  1543. Address: 0x7FF8DFF10000
  1544. SHA: 4EF633251D0F896827EDDD5091F24A7E816CFAC4670F1A5FC41D662539D6A0D5FDE788408C0E90E0F9ABAA3357C11F0C77CBEF45CEDCDA52F8A7D903D8AAB2F6
  1545. Version: v10.0.26100.1150
  1546. ReportLoadOrderInfo.dll
  1547. Address: 0x7FF8BB690000
  1548. SHA: AEFDBE6DE2549C665EBFEC2ABCACA3C732898D37E01A91B600A1292F634E22E2861D8475CA47650717F893115458464FF8E95F9A52879526EC04E1F0F75698F9
  1549. Version: v3.6.0
  1550. ResampleDmo.DLL
  1551. Address: 0x7FF874060000
  1552. SHA: 04D181AB42E9C1F1E9F6FA97713FBD6BE8A81B2BB99DAB57A18CE51EF81601ED341184C80E824342AAC7A003E29CF12D0B27EA019D9111062A1739016D7659B4
  1553. Version: v10.0.26100.1150
  1554. resourcepolicyclient.dll
  1555. Address: 0x7FF8E4F70000
  1556. SHA: EDB57D9B82245EBEB2991C34181AAF44CB94897E529BFC9CBEBCCF3E42CFFBDFC6723EA527F31F0BA89CEE55231994A13EBA4CED312B97A9DC104BAC2E1DE5BA
  1557. Version: v10.0.26100.1150
  1558. RPCRT4.dll
  1559. Address: 0x7FF8E9160000
  1560. SHA: C745733D4B74699D64F70944D6E4990083F14D556291BEB570DA09286DDA46449428E6560442AAC35BF17975896EDB73ABB52245BDF3FBBC7F0A2DD0B4CFB6E4
  1561. Version: v10.0.26100.1
  1562. rsaenh.dll
  1563. Address: 0x7FF8E63E0000
  1564. SHA: 030CB2CF8C04637A32899981BA13BDB1AEA2152821A2AB86693B65B1B766A9FFD93543B6F723751A4DEF390A08415DE65FC27413406EF423976C6190668C4D83
  1565. Version: v10.0.26100.1
  1566. schannel.DLL
  1567. Address: 0x7FF8E62C0000
  1568. SHA: 3518CB1F85DD78C26EF05476274C7DCAF37869FB6DD823B76FB3CD5B479B0AD4F9E3F7F6D85152EA6BE8E0BAFDB43FC4DEFCB033D3A0731DEC15D666922B6A13
  1569. Version: v10.0.26100.1
  1570. sechost.dll
  1571. Address: 0x7FF8E99A0000
  1572. SHA: F3378F1548A6910501A729459E5491030661E8C02CE7E663A6159ADA0F24A1A797FF9FA135D5C2A17BF4D25F345CAF5FD36DD2BB3941D8799F6C25DE7182ADF2
  1573. Version: v10.0.26100.1
  1574. Secur32.dll
  1575. Address: 0x7FF8E48D0000
  1576. SHA: C1128CD1C66D1ED0DEE26ADDF77F6893B1017DE8DE1AAF00CDA1C6597BA7D24E486F364621E13D1333029D69868ACDAD0689F0369ED5220FC4944BD919DF561E
  1577. Version: v10.0.26100.1
  1578. SETUPAPI.dll
  1579. Address: 0x7FF8E9A50000
  1580. SHA: 3942562AD9ED659824BD7FB74E9295E90D077F4C11029D4634C37FA1558F0C85D449C08ED82B38AF4F097D0C55BC73D0DBEE0E4C7254D8EB783AE5FEA3D5013B
  1581. Version: v10.0.26100.1
  1582. sfse_1_14_74.dll
  1583. Address: 0x7FF8BC2D0000
  1584. SHA: 03BB3C30F8EB54834EA3CB180DBA72CF144D7E5EF821052F8A5FE6AF3D28A9897654CE8D87E0308B40895ACD6FA6E949BAC223C05DE3D775FE5C06E66150917E
  1585. Version: v0.0.2.16
  1586. sfse_plugin_console_api.dll
  1587. Address: 0x7FF8BBA20000
  1588. SHA: CDB264453F82D3829C9F18A88D11A7DDF0E0EA3F66A2E56C6957A1BA6DAA8B00A756A0A9711C308B29C45B92EC71B59E4556947A94420FFDC9C7167D06AF1A3C
  1589. Version: v2.14.0
  1590. SHCORE.dll
  1591. Address: 0x7FF8EA080000
  1592. SHA: 05E9874FA23444CC4CF0BA5B5803CB330C7A2CBF33C1ECE0201A0D1CF2E97AE5EBB24920A34975B632DD632E4441A5930E79B66DAB9744041EF99D10CB91B051
  1593. Version: v10.0.26100.1
  1594. SHELL32.dll
  1595. Address: 0x7FF8E9280000
  1596. SHA: AC14A77D2CE3092DF22319EA638490E24C615B4F9C9998B07FAF70EDA619B320D6324AAB968CA73CABCD4B0D33732A487E8451E56D2D072F605E303C54FC95BD
  1597. Version: v10.0.26100.3323
  1598. SHLWAPI.dll
  1599. Address: 0x7FF8E9F60000
  1600. SHA: 7E16BA40262A6241439D10261ECC11A28C46D8AE2921EB22A054D112FD89D79D50A3C3C7284C017ACF028032BADAFFABCF2724545A5BED8AFECDA364B842B4AB
  1601. Version: v10.0.26100.1
  1602. sl.common.dll
  1603. Address: 0x7FF8B7FF0000
  1604. SHA: 843457A2F9F0BA83B6C2FEA37FB05F1C52F715C2046232C904DF79B1ED30F3725B967163EBFE5B3F01DAABBD9CAC27799C80DBF8269211F5319FD62F3EEF7B3E
  1605. Version: v2.2.0
  1606. sl.dlss.dll
  1607. Address: 0x7FF8B8CB0000
  1608. SHA: 54B6D2F71B8D16114AE1A576A37E64683BA91CD8BB8AA379706D5AE21DF4571B6B4126F1085E6E5A2448D7E8B169539642AD5D7A31012C4FDEB9AC38B62ED7B8
  1609. Version: v2.2.0
  1610. sl.dlss_g.dll
  1611. Address: 0x7FF87C120000
  1612. SHA: 97370DF420A6BA860BE92F895ED8B5DE9299E7FF7F7E955BB514A49CE591AA5ACDC1599BF46A93E1F87B6335EA7DCB7111671D9FCD20C9029EE82A1953FF44CF
  1613. Version: v2.2.0
  1614. sl.interposer.dll
  1615. Address: 0x7FF8BC6B0000
  1616. SHA: 4197A38D36FE41A21B11814B00F17F5BF2AE7F418DC5CCB94A6C097615B87B9C5B530DFA0296CA0580BB5618D0AB43AC02C2E1FC08E07D55B5E8BBFF8DA7160A
  1617. Version: v2.2.0
  1618. sl.reflex.dll
  1619. Address: 0x7FF8BC680000
  1620. SHA: C5DF9877DEDFCC443ECAD9A8EA0F10C5DC8C97C4F6F10A1BEA1831AF6EB27D89C695F67B55E451603A6550EBA084E0CD7B676FE8C56E302324025D9A97ED7FC5
  1621. Version: v2.2.0
  1622. SPINF.dll
  1623. Address: 0x7FF8D99C0000
  1624. SHA: 7BF30E0C7B116C582C09D7FE29197C5D99DDF21FF39DE3272E9870E1136F1160146DA28AAC12E57FA3EAA74B7697280ECE0F40F2488BDE7E340CDC269336143E
  1625. Version: v10.0.26100.1150
  1626. srvcli.dll
  1627. Address: 0x7FF8C8470000
  1628. SHA: 4EA0CB9A2132EBD62C9BF2FAAE69114C2D41E3D0F0376E370B22EE7367CA0978F321F55EFFC31732D7D5F410D5DF5E737ED8C2387E20A4F71D0373074FCDE3ED
  1629. Version: v10.0.26100.1150
  1630. SSPICLI.DLL
  1631. Address: 0x7FF8E6720000
  1632. SHA: 0F2386221FE94CD72FE8FA1B42E9938A4ADE18AE1CEB5B69A10ACFEBBAE163C40186506D5CB82A4646AD766AC764748968CA007617CCB73987895FFD0F1DA64B
  1633. Version: v10.0.26100.3037
  1634. Starfield.exe
  1635. Address: 0x7FF663100000
  1636. SHA: 5D1F236406E6AB1E079046ECDC92C3848DF121CE3DBA463E02469D42502D93AF72C608588E232BA9720B868BC72CCCB658C9877ABA4CEDFE5E914EBB387A2178
  1637. Version: v1.14.74
  1638. StarfieldConsoleExtender.dll
  1639. Address: 0x7FF8B8CF0000
  1640. SHA: 1540CD96E4B5056AC539194940E785978D887C1CE1A289FF60EAB916ABA69222784ED970A366369E4EC62B0C26ED657EA0FE9C7FA3F26CFA6FE7ADFEA50AFC5D
  1641. Version: v4.0.0
  1642. StarfieldEngineFixes.dll
  1643. Address: 0x7FF844880000
  1644. SHA: 145E82F593E494A34058638CAF83640A5919141B66AACFC75AB23050EC89AA23F60DF25DEEE2EA14BD28E414B594CB7CD42E452C853E7FE7918FFAD4FDA3A0BC
  1645. Version: v7.9.0
  1646. steam_api64.dll
  1647. Address: 0x7FF8BBDC0000
  1648. SHA: C08DE8C6E331D13DFE868AB340E41552FC49123A9F782A5A63B95795D5D979E68B5A6AB171153978679C0791DC3E3809C883471A05864041CE60B240CCDD4C21
  1649. Version: v7.40.51.27
  1650. steamclient64.dll
  1651. Address: 0x7FF844AE0000
  1652. SHA: CB37559B149A8B170B73E7233BA2D8AE065E13CE338C51F438546656E20CEBD16EEBF12A5FFBD2A036C1750728C79769249A8B9570C60EDBE9EB080C17CA6AB2
  1653. Version: v9.59.77.46
  1654. textinputframework.dll
  1655. Address: 0x7FF8CDD80000
  1656. SHA: 7FCBE4420697B61B7475AB688FE9C6563C5259B873C91CDFE9E659DDE8789B4745E292B17267B55B9B6DF5675744AD8C3628E27D13D23A9269EA675BDF98B2AF
  1657. Version: v10.0.26100.3323
  1658. tier0_s64.dll
  1659. Address: 0x7FF86F880000
  1660. SHA: 341E7E7E74A574CBEADE1E6C4C82EA436571E3A25EEC6B9B9D32FADF8B52C57BA71311F2AF82B6D787004357E3886109768216AFE57C26E18B12CB92405E0D5F
  1661. Version: v9.59.77.46
  1662. trainwreck.dll
  1663. Address: 0x7FF8B8E60000
  1664. SHA: 261801A85D41236E35C820A78E4BC3E775EBF0C19336EF1D518A61DA20429BB30B707181606675C1BC650D678CA0A27DC585DFA35BDDD717EB830459BFF60333
  1665. Version: v1.4.0
  1666. TransferSpaceships.dll
  1667. Address: 0x7FF872720000
  1668. SHA: 2C307B086C23F765CF007DCA1A0B60EE839925769B07C8903B488737B0CB0652A2DFA8A8DBFC21757D63E35718BB66344278A8E5AC4E2C22B0706B2B4D842B70
  1669. Version: v1.0.0
  1670. twinapi.appcore.dll
  1671. Address: 0x7FF8D9460000
  1672. SHA: 9F9DE2A190C1953F50C58A7766C648467614FC272C9BDD5786C09AC70610A9F911D01E2FC2EA8A022BC5AA3329A9653B8BA2C2302501B46D5FBDF4E6B3906632
  1673. Version: v10.0.26100.1
  1674. ucrtbase.dll
  1675. Address: 0x7FF8E76A0000
  1676. SHA: 743FA0BD48F5B7222F7BF5EC1780B3C922E90E0DA3F812EBEB2F93E292AF871C531F8B5E9839957C8CC94BEA4660791618EEAC38432667E6C2F7994BF6D05969
  1677. Version: v10.0.26100.3037
  1678. UMPDC.dll
  1679. Address: 0x7FF8E6EC0000
  1680. SHA: BE4A4B98F5402D82FFB56D4128B165412A553AE0C86DF7E3B41D63FCA1E1DC023369910253DF40D6742D01FA0D4971B19BEF26F1763AC6A96187BB512CA5AA0A
  1681. Version: v10.0.26100.1301
  1682. urlmon.dll
  1683. Address: 0x7FF8C89C0000
  1684. SHA: 84ABE6F97066B314F39924EFC763B41D25EF32BCA82D4B93ABB431044F438112A9A91CBB394D56EBBFF2FAF9F5ED513EF4DEC2C9227B39B068CE11C95482EF18
  1685. Version: v11.0.26100.1
  1686. user32.dll
  1687. Address: 0x7FF8EA280000
  1688. SHA: 4E0D74AF24A4C258D2442EA240D685EE1068BB47B29CCDA451C2E309C5BC32FB1E90B549D8F298FA292AE57961752AB3F4278A2179E39D2E7B02975470ED4063
  1689. Version: v10.0.26100.1
  1690. USERENV.dll
  1691. Address: 0x7FF8E6A20000
  1692. SHA: B3F120327F5BB4A69C598AEE489A846ECDC75382434E0243BDB7669437685A46B1537CC80E4E7EBBC6930D1EACDA18A0C236C1F44FF4B43DB1148D3191C707D8
  1693. Version: v10.0.26100.1
  1694. usermgrproxy.dll
  1695. Address: 0x7FF8D9950000
  1696. SHA: BBD8B27336F8906B3BF45E1639C908FBFB40949D66CCA326A532E0E7B891B3D8380EF2B592ACBA84CA036427D38B3EABC64D1C528FF8BB092C3B64BD775DAF25
  1697. Version: v10.0.26100.3323
  1698. uxtheme.dll
  1699. Address: 0x7FF8E49D0000
  1700. SHA: 492D2D9B88494EB5DD98729CA690A28FDD1C671BC2779EE6A92BA07C5E53F4B46F48B436100D90113CA72743B04E6CD17B059E308C753B524F0C806BF2603C63
  1701. Version: v10.0.26100.1
  1702. VCRUNTIME140.dll
  1703. Address: 0x7FF8C6B80000
  1704. SHA: 616C78B4A24761D4640AE2377B873F7779322EF7BC26F8DE7DA0D880B227C577ED6F5ED794FC733468477B2FCDB7916DEF250E5DC63E79257616F99768419087
  1705. Version: v14.42.34438
  1706. VCRUNTIME140_1.dll
  1707. Address: 0x7FF8BC730000
  1708. SHA: 1AF00E52417A1013EAA190BCAE60487AA70B078CE3F0C3E3742529865A6494763F16ACA16A5FAEA3D1AC28F5A7940D0E40FC381CE25EECC7E7AAC6E31B3577C4
  1709. vcruntime140_1.DLL
  1710. Address: 0x7FF8C82C0000
  1711. SHA: 35DB454DBCC7ED89842C0440B92CE0B0B0DB41DBD5432A36A0B7E1EDDF51704B1F0D6CFF5E3A3B0C3FF5DB3D8632FED000471180AD72E39D8DBE68A757CCDFB0
  1712. Version: v14.42.34438
  1713. VERSION.dll
  1714. Address: 0x7FF8DFE90000
  1715. SHA: D1BF36744AACEC8A95665F56F5CE4CF00685F836C4905B5A51DEE55C803FAFE6FC8069A08FE3959761B5A2E6367A2283077828958CB4888B909F7D402F6FD917
  1716. Version: v10.0.26100.1150
  1717. vstdlib_s64.dll
  1718. Address: 0x7FF87CE30000
  1719. SHA: 8FD1C34BB5CD061D42A56D01E24C5DAA54EC9840B82EE4AABD1C238F80D481680346733DD57C197C45A1114793DEB1FA920FF5DE42DE2AF9825C9424F5EFA509
  1720. Version: v9.59.77.46
  1721. wbemcomn.dll
  1722. Address: 0x7FF8D15D0000
  1723. SHA: 7D763EC2C9925B0A9D4F82904DEBFE8B5A1F5939912984E8FC94F6873E6CD6D90C377E93AB4CF1F28886DBC293BB990A576B3CF358AD32BE21AD5FB56B3B51D6
  1724. Version: v10.0.26100.1150
  1725. wbemprox.dll
  1726. Address: 0x7FF8D1DA0000
  1727. SHA: 2F843A9E8CBFB245B127DA91999E23638351F744151DD8D20EB89A407236815F3D6E0331FCE0C9419298090FA15C6BD0C6861E3920BD43A9D5D812568ACCD3C0
  1728. Version: v10.0.26100.1000
  1729. wbemsvc.dll
  1730. Address: 0x7FF8D1C90000
  1731. SHA: 82B4E560AB069BAF13D6A577A4DCB7D904419C814B5A96142EEB7C11C82AA0E35D280D1B51A291F6E77668503341C08C87F199137CF7BC5B18B216C27E358D97
  1732. Version: v10.0.26100.1000
  1733. webio.dll
  1734. Address: 0x7FF8C07E0000
  1735. SHA: 12E7AF0269F26F8EF2EED5045DAF17C3ED9B7E3263412112CAED479509E0E0B904D859DEBDDF3445B5644689C5904545E78A22797B5996246BC01FF71D1E6590
  1736. Version: v10.0.26100.1
  1737. win32u.dll
  1738. Address: 0x7FF8E7FD0000
  1739. SHA: 51EAE6536A9D98C47D29B449587C94B9464DE5A53AE5AE7C45904753A74E4F838E9AA1F3DBE4E84B629CA50BF0D17A364FDEBE2A5D16219BDE93DC160B8903DD
  1740. Version: v10.0.26100.3470
  1741. Windows.Gaming.Input.dll
  1742. Address: 0x7FF8D9870000
  1743. SHA: 5084831445ED0A06066BC334DC27C8B0E727DC92E93CCA6B6C0B0E48E8044D79F265FDCDE53D3A4F686F8FAE0A2B0E04D6087BF7EF6D1A59479B2AC28FEB3B56
  1744. Version: v10.0.26100.1
  1745. windows.storage.dll
  1746. Address: 0x7FF8E5360000
  1747. SHA: F8CA61AD7D20960F0680D164CF0B80A2C5B05343188E8703F095847635903AFB7AC0BD98FD02DB35162CA4D0D3FE14837AB05D8F976A4B6B16A1F8C4D983198E
  1748. Version: v10.0.26100.1457
  1749. Windows.System.UserDeviceAssociation.dll
  1750. Address: 0x7FF8D8DC0000
  1751. SHA: 7685362D88035C431D7A0CA67C5685128E7F990C9D172F6E8802AB4659CA451AEDEA2598C0E0A2CD288AD71DC1BC839D1625A3627CBC7585E69081059D198247
  1752. Version: v10.0.26100.1150
  1753. Windows.UI.dll
  1754. Address: 0x7FF8C8150000
  1755. SHA: FDEBBB7C00574FA6E7EC5261F0BCA9A97442EC8DA14DC56030DED191729208E26FB4303F41A7940AC0751E188EE41E90E7051A6C70DA0211969627BA13F67DFB
  1756. Version: v10.0.26100.1
  1757. windowscodecs.dll
  1758. Address: 0x7FF8E3120000
  1759. SHA: C074AF15B8AD41C2F5A3516A22CF12567FE7D976C77DCF9417457458B6F82AD0663188463DB2324CDBD50D3B22EA7440201743FC6BCE8867DFF4936DBE833D77
  1760. Version: v10.0.26100.3323
  1761. WINHTTP.dll
  1762. Address: 0x7FF8DFBF0000
  1763. SHA: 1B82E47E208E6DCCE1EAC221D4918F61649A110C85A32780145FD1E4278E3A891A4527F648EA849EA87AC8196E4B9B92D761561DFBCD92B0C0ACEA0CB6B45C30
  1764. Version: v10.0.26100.1
  1765. WININET.dll
  1766. Address: 0x7FF8CAEF0000
  1767. SHA: DE3BCF4BC243773B2E1AD4ADBC21D802A4D3239575B3C59666CFE2C14971F3A1EC861216D6DD1F855C3BEAC4B1D6D6637DC875A57F1871976A7F4A0B62F82628
  1768. Version: v11.0.26100.1
  1769. WINMM.dll
  1770. Address: 0x7FF8D96A0000
  1771. SHA: D95C370E574864BBDD17BF8A2F2FC3443713F0ED99D9271C6BBF15D675189DB3FFB6987B67CA1A2F829254C4AB61DF0CB5101DBF334997A612AB1F6ACDC0DEBA
  1772. Version: v10.0.26100.1
  1773. winmmbase.dll
  1774. Address: 0x7FF8CA9F0000
  1775. SHA: 209DB243E7CF01274DFC119DF06790B1D768C99AB6932B0B6BE8E0CC4689603B088D26AF463493DC42A461520C0D7ECB1D5EBE72AEBDD498205070773C8FD6DE
  1776. Version: v10.0.26100.1
  1777. WINNSI.DLL
  1778. Address: 0x7FF8E27D0000
  1779. SHA: 3A95F265764E21748FE7CE2E3E75CD1455F7C017696216A33176340CA882112F094C3931A877955E923EFED540F0B77FADE4E611541887387D3DFEC35A0C65CE
  1780. Version: v10.0.26100.3323
  1781. winrnr.dll
  1782. Address: 0x7FF8CBDC0000
  1783. SHA: 353433907240D30540C7EDD068560D089142E77C986F2CBDEB91B299A22AD793322EF6DABFBD195AB25C3534E06C4588BB3C9838D4759051E6E39C9950E103C5
  1784. Version: v10.0.26100.1882
  1785. wintrust.dll
  1786. Address: 0x7FF8E8000000
  1787. SHA: 3E0EFD698554CC3B9DCA4DD4F325449B9416AD9E3FFC257077B061BA396A223CBDBFAC7E1570E3C9CF80C8E52C0D5260D9C1D2748E131AE94D2486AB9E2851D8
  1788. Version: v10.0.26100.3323
  1789. wintypes.dll
  1790. Address: 0x7FF8E7DA0000
  1791. SHA: 0AB4A6E481C827D764D49C5B8926EDB8971F6D14D288CD5A4FE4E0102F71934269F69ABC6DC8AB082199F1964B69ABCC568FCBFA751F42CFC144CA742A27B124
  1792. Version: v10.0.26100.1
  1793. WLDAP32.dll
  1794. Address: 0x7FF8E9EE0000
  1795. SHA: 4961A5218A58DC4FF838799817BDDAFE481E07500C58E22998D9D497BCF895DB686AF83549E7D68E11584C5B6F0D87432EC99E07D72D4848820739CBE25C54E8
  1796. Version: v10.0.26100.1
  1797. wldp.dll
  1798. Address: 0x7FF8E6C50000
  1799. SHA: 853ECC7370BC9A3DE47B9D51F13357B7729697E0981B4564696C1699B3DB8EC714B8041FC9EDF4A5B340DD4966A2DEA175D71DCCDFC298C401F62BDE41F1F4E5
  1800. Version: v10.0.26100.1
  1801. WS2_32.dll
  1802. Address: 0x7FF8EA000000
  1803. SHA: A02BD113F6DDDCF958977EA65A05C5572F209D809EACCB04D13EC204A5A587EC4B8EEFABFCB399D7C1EF92224148C265B26B64EE0966AC60C08A2BA05D8A1582
  1804. Version: v10.0.26100.1
  1805. wshbth.dll
  1806. Address: 0x7FF8DF4A0000
  1807. SHA: D6B038E2151EFB304E80F28702FF869CC7AD4D5CFE4DEFEEFB37BCB0A5AAD55F3A3BE8852B195EA0FA327E3892CCECFC655A992B01B6A87517551DF2E81AC65B
  1808. Version: v10.0.26100.1882
  1809. WSOCK32.dll
  1810. Address: 0x7FF8C14B0000
  1811. SHA: 590B675AC9DA54B88668D6296F6CB8F29471E3589221EF972925BA7006D9117F65C42F7BD277B942EEAB93CDBC165CD4C0A025C5E9333B17E3D5FFEFC73547BF
  1812. Version: v10.0.26100.1
  1813. XInput1_4.dll
  1814. Address: 0x7FF8C5E30000
  1815. SHA: BDAAF3FB1729548773DBBFEB3F6DBA8B182EA6DBFE080016379F1F89408010027FA7869C733C973B2DC5040AF4F796EEAC515195A18794A92EB7CC2D22E6C458
  1816. Version: v10.0.26100.1
  1817.  
  1818. SCRIPT EXTENDER PLUGINS:
  1819. ConsoleCommandRunner.dll v1.5.0
  1820. DynamicInventoryModels.dll v3.0.0
  1821. fttu.dll
  1822. GetReferenceInfo.dll v6.0.0
  1823. ModularPeopleSystem.dll v5.3.0
  1824. ReportLoadOrderInfo.dll v3.6.0
  1825. sfse_1_14_74.dll v0.0.2.16
  1826. sfse_plugin_console_api.dll v2.14.0
  1827. StarfieldConsoleExtender.dll v4.0.0
  1828. StarfieldEngineFixes.dll v7.9.0
  1829. trainwreck.dll v1.4.0
  1830. TransferSpaceships.dll v1.0.0
  1831.  
Tags: starfield
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement