Advertisement
Guest User

Starfield Crash

a guest
Mar 27th, 2024
67
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 81.25 KB | None | 0 0
  1. Starfield v1.10.32
  2. trainwreck v1.4.0
  3.  
  4. Unhandled exception "EXCEPTION_ACCESS_VIOLATION" at 0x7FF708181859 Starfield.exe+2481859
  5.  
  6. SYSTEM SPECS:
  7. OS: Microsoft Windows 11 Home Single Language 23H2 22631.3296
  8. CPU: GenuineIntel 11th Gen Intel(R) Core(TM) i5-11400H @ 2.70GHz
  9. GPU #1: NVIDIA GeForce RTX 3050 Laptop GPU
  10. GPU #2: Intel(R) UHD Graphics
  11. GPU #3: Microsoft Basic Render Driver
  12. RAM: 13.63 GiB/15.73 GiB
  13. PAGE FILE: 25.35 GiB/37.60 GiB
  14.  
  15. PROBABLE CALL STACK:
  16. [0 ] 0x7FF708181859 Starfield.exe+2481859
  17. test [r8],dl
  18. [1 ] 0x7FF708262BB2 Starfield.exe+2562BB2
  19. mov r13d,1
  20. [2 ] 0x7FF7080685BB Starfield.exe+23685BB
  21. jmp short 6
  22. [3 ] 0x7FF70808A519 Starfield.exe+238A519
  23. mov r14b,al
  24. [4 ] 0x7FF708084C48 Starfield.exe+2384C48
  25. mov rcx,[rbx]
  26. [5 ] 0x7FF70808D16E Starfield.exe+238D16E
  27. nop
  28. [6 ] 0x7FF708E6913D Starfield.exe+316913D
  29. mov rdx,rbx
  30. [7 ] 0x7FF708E69D99 Starfield.exe+3169D99
  31. jmp short 0000000000000078h
  32. [8 ] 0x7FF708E67EB0 Starfield.exe+3167EB0
  33. mov ecx,[2FC71B4h]
  34. [9 ] 0x7FF708E6A34E Starfield.exe+316A34E
  35. xor eax,eax
  36. [10] 0x7FF708980D71 Starfield.exe+2C80D71
  37. mov rcx,[38CB06Fh]
  38. [11] 0x7FFCAE5F257D KERNEL32.DLL+001257D BaseThreadInitThunk
  39. mov ecx,eax
  40. [12] 0x7FFCAF24AA58 ntdll.dll+005AA58 RtlUserThreadStart
  41. jmp short 0000000000000021h
  42.  
  43. REGISTERS:
  44. RAX 0xAA0DE2E780 (void*)
  45. RBX 0x264FD674A60 (void*)
  46. RCX 0x0 (size_t)
  47. RDX 0x1 (size_t)
  48. RSI 0x340448B (size_t)
  49. RDI 0x264FD674740 (PlayerCharacter*)
  50. RBP 0xAA0DE2E800 (void*)
  51. RSP 0xAA0DE2E700 (void*)
  52. R8 0x0 (size_t)
  53. R9 0x0 (size_t)
  54. R10 0x7FFCA3700000 (void* -> VCRUNTIME140.dll+0000000)
  55. pop r10
  56. R11 0x0 (size_t)
  57. R12 0x4 (size_t)
  58. R13 0x0 (size_t)
  59. R14 0xAA0DE2EE90 (BGSLoadFormBuffer*)
  60. R15 0xAA0DE2EE90 (BGSLoadFormBuffer*)
  61.  
  62. STACK:
  63. [RSP+0 ] 0xAA0DE2E780 (void*)
  64. [RSP+8 ] 0x264FD674C04 (void*)
  65. [RSP+10 ] 0x26400000000 (size_t)
  66. [RSP+18 ] 0xAA0DE2E800 (void*)
  67. [RSP+20 ] 0x26D5B65B020 (void*)
  68. [RSP+28 ] 0x36 (size_t)
  69. [RSP+30 ] 0x6FFF00C5BF0000 (size_t)
  70. [RSP+38 ] 0x7FF70340448B (size_t)
  71. [RSP+40 ] 0xAA0DE2EE90 (BGSLoadFormBuffer*)
  72. [RSP+48 ] 0x0 (size_t)
  73. [RSP+50 ] 0x7FF70ADD56C8 (void* -> Starfield.exe+50D56C8)
  74. sbb al,37h
  75. [RSP+58 ] 0x264FD674740 (PlayerCharacter*)
  76. [RSP+60 ] 0x0 (size_t)
  77. [RSP+68 ] 0xAA0DE2EE90 (BGSLoadFormBuffer*)
  78. [RSP+70 ] 0x0 (size_t)
  79. [RSP+78 ] 0x7FF70809F417 (void* -> Starfield.exe+239F417)
  80. add [rbx+24h],edi
  81. [RSP+80 ] 0xAA0DE2EE90 (BGSLoadFormBuffer*)
  82. [RSP+88 ] 0x0 (size_t)
  83. [RSP+90 ] 0x0 (size_t)
  84. [RSP+98 ] 0x0 (size_t)
  85. [RSP+A0 ] 0x0 (size_t)
  86. [RSP+A8 ] 0x7FF708080814 (void* -> Starfield.exe+2380814)
  87. movzx edi,byte ptr [rsp+20h]
  88. [RSP+B0 ] 0x0 (size_t)
  89. [RSP+B8 ] 0x0 (size_t)
  90. [RSP+C0 ] 0x0 (size_t)
  91. [RSP+C8 ] 0x0 (size_t)
  92. [RSP+D0 ] 0x0 (size_t)
  93. [RSP+D8 ] 0x0 (size_t)
  94. [RSP+E0 ] 0x0 (size_t)
  95. [RSP+E8 ] 0x0 (size_t)
  96. [RSP+F0 ] 0x0 (size_t)
  97. [RSP+F8 ] 0x0 (size_t)
  98. [RSP+100 ] 0x0 (size_t)
  99. [RSP+108 ] 0x0 (size_t)
  100. [RSP+110 ] 0x26400000014 (size_t)
  101. [RSP+118 ] 0x264FD6747F0 (void*)
  102. [RSP+120 ] 0xAA0DE2E890 (char*) "\x14"
  103. [RSP+128 ] 0x7FF7075EAD2D (void* -> Starfield.exe+18EAD2D)
  104. mov eax,[rsp+30h]
  105. [RSP+130 ] 0x7FF70ACCD3D0 (void* -> Starfield.exe+4FCD3D0)
  106. sar byte ptr [rax-12h],6
  107. [RSP+138 ] 0x26D58742900 (void*)
  108. [RSP+140 ] 0x8 (size_t)
  109. [RSP+148 ] 0x8 (size_t)
  110. [RSP+150 ] 0x8 (size_t)
  111. [RSP+158 ] 0x7FF7080645ED (void* -> Starfield.exe+23645ED)
  112. add rsp,28h
  113. [RSP+160 ] 0xDF7BC0C8 (size_t)
  114. [RSP+168 ] 0x90010D23 (size_t)
  115. [RSP+170 ] 0x26D59211440 (void*)
  116. [RSP+178 ] 0x8 (size_t)
  117. [RSP+180 ] 0x8 (size_t)
  118. [RSP+188 ] 0x8 (size_t)
  119. [RSP+190 ] 0xAA00000014 (size_t)
  120. [RSP+198 ] 0x26D5137DC70 (char*) "Autosave1_E606BB89_5261696E6861727420486172746F6E6F_080256_20240326110209_91_0_4"
  121. [RSP+1A0 ] 0x264FD674740 (PlayerCharacter*)
  122. [RSP+1A8 ] 0x2650F4273E0 (char*) "J"
  123. [RSP+1B0 ] 0xCE6D (size_t)
  124. [RSP+1B8 ] 0x264FD674740 (PlayerCharacter*)
  125. [RSP+1C0 ] 0x26D5D506478 (void*)
  126. [RSP+1C8 ] 0x14 (size_t)
  127. [RSP+1D0 ] 0xAA0DE2E9E0 (void*)
  128. [RSP+1D8 ] 0x7FF708262BB2 (void* -> Starfield.exe+2562BB2)
  129. mov r13d,1
  130. [RSP+1E0 ] 0x4500 (size_t)
  131. [RSP+1E8 ] 0x26915A6FB00 (void*)
  132. [RSP+1F0 ] 0x400 (size_t)
  133. [RSP+1F8 ] 0x122025A2 (size_t)
  134. [RSP+200 ] 0x4B0 (size_t)
  135. [RSP+208 ] 0xAA0DE2E9B0 (char*) "\x0f"
  136. [RSP+210 ] 0x26915917980 (void*)
  137. [RSP+218 ] 0x26915917980 (void*)
  138. [RSP+220 ] 0x2 (size_t)
  139. [RSP+228 ] 0x26489FAE4E0 (void*)
  140. [RSP+230 ] 0x20015917900 (size_t)
  141. [RSP+238 ] 0x7FF700000004 (size_t)
  142. [RSP+240 ] 0x1 (size_t)
  143. [RSP+248 ] 0x0 (size_t)
  144. [RSP+250 ] 0x0 (size_t)
  145. [RSP+258 ] 0xFF0195C7 (size_t)
  146. [RSP+260 ] 0x0 (size_t)
  147. [RSP+268 ] 0x3280000000000000 (size_t)
  148. [RSP+270 ] 0xC00F04EC42046900 (size_t)
  149. [RSP+278 ] 0x0 (size_t)
  150. [RSP+280 ] 0x2000000000 (size_t)
  151. [RSP+288 ] 0x264FB030080 (SharedHeapAllocator*)
  152. [RSP+290 ] 0x26D56D8CBE0 (TESObjectCELL*)
  153. [RSP+298 ] 0x7FF708983A83 (void* -> Starfield.exe+2C83A83)
  154. mov rbx,[rsp+38h]
  155. [RSP+2A0 ] 0x0 (size_t)
  156. [RSP+2A8 ] 0x1D (size_t)
  157. [RSP+2B0 ] 0xF (size_t)
  158. [RSP+2B8 ] 0x7FF70804F501 (void* -> Starfield.exe+234F501)
  159. add [rax],al
  160. [RSP+2C0 ] 0x264FB030080 (SharedHeapAllocator*)
  161. [RSP+2C8 ] 0x7FF70625BC80 (void* -> Starfield.exe+055BC80)
  162. mov rbx,rax
  163. [RSP+2D0 ] 0x264FB030490 (void*)
  164. [RSP+2D8 ] 0x0 (size_t)
  165. [RSP+2E0 ] 0x7FF70BDFC440 (char*) "\x01"
  166. [RSP+2E8 ] 0x4AE (size_t)
  167. [RSP+2F0 ] 0x2650F4276E0 (void*)
  168. [RSP+2F8 ] 0x26915A7BA80 (void*)
  169. [RSP+300 ] 0x5600000000 (size_t)
  170. [RSP+308 ] 0x7FF70805B6F1 (void* -> Starfield.exe+235B6F1)
  171. mov eax,[rbp+30h]
  172. [RSP+310 ] 0x257 (size_t)
  173. [RSP+318 ] 0x26D5D506478 (void*)
  174. [RSP+320 ] 0x0 (size_t)
  175. [RSP+328 ] 0x0 (size_t)
  176. [RSP+330 ] 0x0 (size_t)
  177. [RSP+338 ] 0x0 (size_t)
  178. [RSP+340 ] 0x0 (size_t)
  179. [RSP+348 ] 0x7FF700000006 (size_t)
  180. [RSP+350 ] 0xAA0DE2E930 (void*)
  181. [RSP+358 ] 0x7FF707CAC53E (void* -> Starfield.exe+1FAC53E)
  182. lea rax,[rsi+rbp*2]
  183. [RSP+360 ] 0x7FF70C2819C0 (void* -> Starfield.exe+65819C0)
  184. and cl,ah
  185. [RSP+368 ] 0x7FF708982926 (void* -> Starfield.exe+2C82926)
  186. and qword ptr [r12],0
  187. [RSP+370 ] 0x26D63BFF140 (void*)
  188. [RSP+378 ] 0xAA0DE2EE90 (BGSLoadFormBuffer*)
  189. [RSP+380 ] 0x0 (size_t)
  190. [RSP+388 ] 0x0 (size_t)
  191. [RSP+390 ] 0xAA0DE2EF18 (void*)
  192. [RSP+398 ] 0x7FF707CAD9F4 (void* -> Starfield.exe+1FAD9F4)
  193. mov rcx,[rbx+18h]
  194. [RSP+3A0 ] 0x26D5D506490 (void*)
  195. [RSP+3A8 ] 0x2650F4273E0 (char*) "J"
  196. [RSP+3B0 ] 0xAA0DE2EF30 (void*)
  197. [RSP+3B8 ] 0x7FF706271DA2 (void* -> Starfield.exe+0571DA2)
  198. jmp short 0000000000000039h
  199. [RSP+3C0 ] 0xAA0DE2EF18 (void*)
  200. [RSP+3C8 ] 0x7FF708061DC7 (void* -> Starfield.exe+2361DC7)
  201. mov eax,[rsi+40h]
  202. [RSP+3D0 ] 0x0 (size_t)
  203. [RSP+3D8 ] 0x0 (size_t)
  204. [RSP+3E0 ] 0x26D5D506478 (void*)
  205. [RSP+3E8 ] 0x7FF706270E92 (void* -> Starfield.exe+0570E92)
  206. and qword ptr [rsi],0
  207. [RSP+3F0 ] 0x0 (size_t)
  208. [RSP+3F8 ] 0x0 (size_t)
  209. [RSP+400 ] 0x0 (size_t)
  210. [RSP+408 ] 0x0 (size_t)
  211. [RSP+410 ] 0x0 (size_t)
  212. [RSP+418 ] 0x26D5137DC70 (char*) "Autosave1_E606BB89_5261696E6861727420486172746F6E6F_080256_20240326110209_91_0_4"
  213. [RSP+420 ] 0x264FD674740 (PlayerCharacter*)
  214. [RSP+428 ] 0x2650F4273E0 (char*) "J"
  215. [RSP+430 ] 0xCE6D (size_t)
  216. [RSP+438 ] 0x2650F4276B8 (void*)
  217. [RSP+440 ] 0x26D5D506478 (void*)
  218. [RSP+448 ] 0x14 (size_t)
  219. [RSP+450 ] 0xAA0DE2EC60 (char*) "PyBQm\x02"
  220. [RSP+458 ] 0x7FF7080685BB (void* -> Starfield.exe+23685BB)
  221. jmp short 6
  222. [RSP+460 ] 0xAA0DE2EE90 (BGSLoadFormBuffer*)
  223. [RSP+468 ] 0xAA0DE2EE90 (BGSLoadFormBuffer*)
  224. [RSP+470 ] 0xAA0DE2EC60 (char*) "PyBQm\x02"
  225. [RSP+478 ] 0x26D5D506400 (void*)
  226. [RSP+480 ] 0x1 (size_t)
  227. [RSP+488 ] 0xFDB417EC00000001 (size_t)
  228. [RSP+490 ] 0x2CFCBB00000000 (size_t)
  229. [RSP+498 ] 0x0 (size_t)
  230. [RSP+4A0 ] 0x0 (size_t)
  231. [RSP+4A8 ] 0x0 (size_t)
  232. [RSP+4B0 ] 0x35FF000000 (size_t)
  233. [RSP+4B8 ] 0x0 (size_t)
  234. [RSP+4C0 ] 0x7FF700000056 (size_t)
  235. [RSP+4C8 ] 0x0 (size_t)
  236. [RSP+4D0 ] 0x26D51427950 (MovementControllerRegisterInterface*)
  237. [RSP+4D8 ] 0x0 (size_t)
  238. [RSP+4E0 ] 0xDDD89EF3BF1E7449 (size_t)
  239. [RSP+4E8 ] 0x26D4F3A4870 (char*) "\x02"
  240. [RSP+4F0 ] 0x0 (size_t)
  241. [RSP+4F8 ] 0x0 (size_t)
  242. [RSP+500 ] 0x0 (size_t)
  243. [RSP+508 ] 0x26D63B3CBE0 (char*) "\x02"
  244. [RSP+510 ] 0x7FF70E58B04A (void* -> Starfield.exe+888B04A)
  245. add [rax],al
  246. [RSP+518 ] 0x1 (size_t)
  247. [RSP+520 ] 0x0 (size_t)
  248. [RSP+528 ] 0x0 (size_t)
  249. [RSP+530 ] 0x0 (size_t)
  250. [RSP+538 ] 0x0 (size_t)
  251. [RSP+540 ] 0x26D00000000 (void*)
  252. [RSP+548 ] 0x26D51427878 (char*) "d"
  253. [RSP+550 ] 0x26D51427950 (MovementControllerRegisterInterface*)
  254. [RSP+558 ] 0x26D51427950 (MovementControllerRegisterInterface*)
  255. [RSP+560 ] 0x26D51427950 (MovementControllerRegisterInterface*)
  256. [RSP+568 ] 0x0 (size_t)
  257. [RSP+570 ] 0x0 (size_t)
  258. [RSP+578 ] 0x264D1640030 (char*) "@\x03"
  259. [RSP+580 ] 0x264D1640020 (void*)
  260. [RSP+588 ] 0x26D4F1ACA80 (void*)
  261. [RSP+590 ] 0x0 (size_t)
  262. [RSP+598 ] 0x264D1640020 (void*)
  263. [RSP+5A0 ] 0x264D1640020 (void*)
  264. [RSP+5A8 ] 0x7FF708E87006 (void* -> Starfield.exe+3187006)
  265. xor sil,sil
  266. [RSP+5B0 ] 0x10000 (size_t)
  267. [RSP+5B8 ] 0xAA0DE2ED18 (void*)
  268. [RSP+5C0 ] 0x56 (size_t)
  269. [RSP+5C8 ] 0x68D5D88DFFFFFFFF (size_t)
  270. [RSP+5D0 ] 0xAA0DE2ED80 (void*)
  271. [RSP+5D8 ] 0x74AE8900639119E8 (size_t)
  272. [RSP+5E0 ] 0x47587E597A240D8D (size_t)
  273. [RSP+5E8 ] 0x76CF6276C26E42EC (size_t)
  274. [RSP+5F0 ] 0x38F3376B762537EB (size_t)
  275. [RSP+5F8 ] 0x25BB139B1B145F62 (size_t)
  276. [RSP+600 ] 0xD2A6E52BD89BBA1B (size_t)
  277. [RSP+608 ] 0x4B6C4BDBDF9E7A24 (size_t)
  278. [RSP+610 ] 0x66F6E2ED00000056 (size_t)
  279. [RSP+618 ] 0x26D52960000 (void*)
  280. [RSP+620 ] 0x2A41BCA0287B746 (size_t)
  281. [RSP+628 ] 0x25D776000008E3 (size_t)
  282. [RSP+630 ] 0x23E1BB8002982C9 (size_t)
  283. [RSP+638 ] 0x1500000011 (size_t)
  284. [RSP+640 ] 0x473CC00000008 (size_t)
  285. [RSP+648 ] 0x2A41BD200000000 (size_t)
  286. [RSP+650 ] 0x0 (size_t)
  287. [RSP+658 ] 0x0 (size_t)
  288. [RSP+660 ] 0x0 (size_t)
  289. [RSP+668 ] 0x0 (size_t)
  290. [RSP+670 ] 0x0 (size_t)
  291. [RSP+678 ] 0x0 (size_t)
  292. [RSP+680 ] 0x0 (size_t)
  293. [RSP+688 ] 0x7FF706297E45 (void* -> Starfield.exe+0597E45)
  294. mov rcx,[rbp+7]
  295. [RSP+690 ] 0x264D1640030 (char*) "@\x03"
  296. [RSP+698 ] 0x0 (size_t)
  297. [RSP+6A0 ] 0x7FF780008001 (size_t)
  298. [RSP+6A8 ] 0x26D63B3CBE0 (char*) "\x02"
  299. [RSP+6B0 ] 0x7FF70E58B04A (void* -> Starfield.exe+888B04A)
  300. add [rax],al
  301. [RSP+6B8 ] 0x0 (size_t)
  302. [RSP+6C0 ] 0x26489FB1270 (ScrapHeap*)
  303. [RSP+6C8 ] 0x264D1640020 (void*)
  304. [RSP+6D0 ] 0x264D1640120 (void*)
  305. [RSP+6D8 ] 0x264D1640020 (void*)
  306. [RSP+6E0 ] 0x0 (size_t)
  307. [RSP+6E8 ] 0x264D1640030 (char*) "@\x03"
  308. [RSP+6F0 ] 0x264D1640020 (void*)
  309. [RSP+6F8 ] 0x7FF700000002 (size_t)
  310. [RSP+700 ] 0x26489FB1270 (ScrapHeap*)
  311. [RSP+708 ] 0xAA0DE2F001 (void*)
  312. [RSP+710 ] 0x264D16403B0 (char*) " :7Qm\x02"
  313. [RSP+718 ] 0x264D1640668 (char*) "h.esm\x19"
  314. [RSP+720 ] 0x264D16406A0 (void*)
  315. [RSP+728 ] 0xAA0DE2F101 (char*) "26110209_91_0_4.sfs"
  316. [RSP+730 ] 0x5 (size_t)
  317. [RSP+738 ] 0x7FF706480E39 (void* -> Starfield.exe+0780E39)
  318. jmp short 000000000000003Fh
  319. [RSP+740 ] 0x0 (size_t)
  320. [RSP+748 ] 0x0 (size_t)
  321. [RSP+750 ] 0x0 (size_t)
  322. [RSP+758 ] 0x0 (size_t)
  323. [RSP+760 ] 0x0 (size_t)
  324. [RSP+768 ] 0x0 (size_t)
  325. [RSP+770 ] 0x0 (size_t)
  326. [RSP+778 ] 0x26D5297B000 (void*)
  327. [RSP+780 ] 0xAA00000001 (size_t)
  328. [RSP+788 ] 0x0 (size_t)
  329. [RSP+790 ] 0x7FF70AC61598 (void* -> Starfield.exe+4F61598)
  330. insb [rdi],dx
  331. [RSP+798 ] 0x264D16406C0 (char*) "\x08"
  332. [RSP+7A0 ] 0x26489FB1270 (ScrapHeap*)
  333. [RSP+7A8 ] 0x2640000B3A4 (size_t)
  334. [RSP+7B0 ] 0x3BA10000B3A4 (size_t)
  335. [RSP+7B8 ] 0x7FF70625BC6F (void* -> Starfield.exe+055BC6F)
  336. add [rax],al
  337. [RSP+7C0 ] 0xAA00000000 (size_t)
  338. [RSP+7C8 ] 0x7FF780000001 (size_t)
  339. [RSP+7D0 ] 0x39D600000000 (size_t)
  340. [RSP+7D8 ] 0x26915A6FB70 (char*) "\x14"
  341. [RSP+7E0 ] 0x26915A7AA94 (void*)
  342. [RSP+7E8 ] 0x26915A7BA80 (void*)
  343. [RSP+7F0 ] 0x26915917980 (void*)
  344. [RSP+7F8 ] 0x26915917980 (void*)
  345. [RSP+800 ] 0x26915917E2E (void*)
  346. [RSP+808 ] 0x2691591B3B6 (void*)
  347. [RSP+810 ] 0x1 (size_t)
  348. [RSP+818 ] 0x0 (size_t)
  349. [RSP+820 ] 0x0 (size_t)
  350. [RSP+828 ] 0x0 (size_t)
  351. [RSP+830 ] 0x0 (size_t)
  352. [RSP+838 ] 0x0 (size_t)
  353. [RSP+840 ] 0x0 (size_t)
  354. [RSP+848 ] 0x0 (size_t)
  355. [RSP+850 ] 0x7FF7FFFFFFFF (size_t)
  356. [RSP+858 ] 0xB3A400000014 (size_t)
  357. [RSP+860 ] 0x0 (size_t)
  358. [RSP+868 ] 0x264FD674740 (PlayerCharacter*)
  359. [RSP+870 ] 0x290010D23 (size_t)
  360. [RSP+878 ] 0x6F4B0002 (size_t)
  361. [RSP+880 ] 0x0 (size_t)
  362. [RSP+888 ] 0xACC52B6280000000 (size_t)
  363. [RSP+890 ] 0xAA0DE2F060 (void*)
  364. [RSP+898 ] 0x0 (size_t)
  365. [RSP+8A0 ] 0x0 (size_t)
  366. [RSP+8A8 ] 0x0 (size_t)
  367. [RSP+8B0 ] 0x3735303931353934 (size_t)
  368. [RSP+8B8 ] 0x0 (size_t)
  369. [RSP+8C0 ] 0x0 (size_t)
  370. [RSP+8C8 ] 0x0 (size_t)
  371. [RSP+8D0 ] 0xFFFFFFFF (size_t)
  372. [RSP+8D8 ] 0x7FF708E85F96 (void* -> Starfield.exe+3185F96)
  373. mov rax,[rsp+70h]
  374. [RSP+8E0 ] 0x6361526E616D7548 (size_t)
  375. [RSP+8E8 ] 0x454D0065 (size_t)
  376. [RSP+8F0 ] 0x0 (size_t)
  377. [RSP+8F8 ] 0x0 (size_t)
  378. [RSP+900 ] 0x0 (size_t)
  379. [RSP+908 ] 0x0 (size_t)
  380. [RSP+910 ] 0x0 (size_t)
  381. [RSP+918 ] 0x0 (size_t)
  382. [RSP+920 ] 0x0 (size_t)
  383. [RSP+928 ] 0x0 (size_t)
  384. [RSP+930 ] 0x0 (size_t)
  385. [RSP+938 ] 0x0 (size_t)
  386. [RSP+940 ] 0x0 (size_t)
  387. [RSP+948 ] 0x7FF708982BF0 (void* -> Starfield.exe+2C82BF0)
  388. test al,al
  389. [RSP+950 ] 0x0 (size_t)
  390. [RSP+958 ] 0x0 (size_t)
  391. [RSP+960 ] 0x0 (size_t)
  392. [RSP+968 ] 0x0 (size_t)
  393. [RSP+970 ] 0x7FF70C2819C0 (void* -> Starfield.exe+65819C0)
  394. and cl,ah
  395. [RSP+978 ] 0x7FF708982BF0 (void* -> Starfield.exe+2C82BF0)
  396. test al,al
  397. [RSP+980 ] 0x26CFD1FF480 (void*)
  398. [RSP+988 ] 0xAA0DE2F230 (char*) "C:\\Users\\Rainhart Hartono\\Documents\\My Games\\Starfield\\Saves\\Autosave1_E606BB89_5261696E6861727420486172746F6E6F_080256_20240326110209_91_0_4.sfs"
  399. [RSP+990 ] 0x7FF70C27AFC0 (BSFixedSizeBlockAllocator::TAlloc<4294967296,16777216,128>*)
  400. [RSP+998 ] 0x7FF70628114E (void* -> Starfield.exe+058114E)
  401. xor eax,eax
  402. [RSP+9A0 ] 0x7FF70C2819C0 (void* -> Starfield.exe+65819C0)
  403. and cl,ah
  404. [RSP+9A8 ] 0x7FF708982926 (void* -> Starfield.exe+2C82926)
  405. and qword ptr [r12],0
  406. [RSP+9B0 ] 0x26D4F3FF1E0 (void*)
  407. [RSP+9B8 ] 0xAA0DE2F230 (char*) "C:\\Users\\Rainhart Hartono\\Documents\\My Games\\Starfield\\Saves\\Autosave1_E606BB89_5261696E6861727420486172746F6E6F_080256_20240326110209_91_0_4.sfs"
  408. [RSP+9C0 ] 0x657661736F747541 (size_t)
  409. [RSP+9C8 ] 0x4242363036455F31 (size_t)
  410. [RSP+9D0 ] 0x36313632355F3938 (size_t)
  411. [RSP+9D8 ] 0x3731363836453639 (size_t)
  412. [RSP+9E0 ] 0x3638343032343732 (size_t)
  413. [RSP+9E8 ] 0x3646363437323731 (size_t)
  414. [RSP+9F0 ] 0x323038305F463645 (size_t)
  415. [RSP+9F8 ] 0x30343230325F3635 (size_t)
  416. [RSP+A00 ] 0x3032303131363233 (size_t)
  417. [RSP+A08 ] 0x345F305F31395F39 (size_t)
  418. [RSP+A10 ] 0x7366732E (size_t)
  419. [RSP+A18 ] 0x0 (size_t)
  420. [RSP+A20 ] 0x26D5137DC70 (char*) "Autosave1_E606BB89_5261696E6861727420486172746F6E6F_080256_20240326110209_91_0_4"
  421. [RSP+A28 ] 0x7FF7080913DB (void* -> Starfield.exe+23913DB)
  422. mov al,1
  423. [RSP+A30 ] 0x56 (size_t)
  424. [RSP+A38 ] 0xAA0DE2F230 (char*) "C:\\Users\\Rainhart Hartono\\Documents\\My Games\\Starfield\\Saves\\Autosave1_E606BB89_5261696E6861727420486172746F6E6F_080256_20240326110209_91_0_4.sfs"
  425. [RSP+A40 ] 0x26903028500 (BGSSaveLoadManager*)
  426. [RSP+A48 ] 0x26D22F9A020 (char*) "\x01"
  427. [RSP+A50 ] 0x7FF70BDFC440 (char*) "\x01"
  428. [RSP+A58 ] 0x118 (size_t)
  429. [RSP+A60 ] 0x26D5138BB28 (char*) "\xd0\xba8Qm\x02"
  430. [RSP+A68 ] 0x26CFD148060 (void*)
  431. [RSP+A70 ] 0x0 (size_t)
  432. [RSP+A78 ] 0x26D4F334870 (char*) "\x01"
  433. [RSP+A80 ] 0x26D51397810 (void*)
  434. [RSP+A88 ] 0x26D4F31F6B0 (void*)
  435. [RSP+A90 ] 0x520000001B (size_t)
  436. [RSP+A98 ] 0x5B00000000 (size_t)
  437. [RSP+AA0 ] 0x4606B00045066380 (size_t)
  438. [RSP+AA8 ] 0x0 (size_t)
  439. [RSP+AB0 ] 0x89 (size_t)
  440. [RSP+AB8 ] 0x0 (size_t)
  441. [RSP+AC0 ] 0x1DA7F6D0CD8D67E (size_t)
  442. [RSP+AC8 ] 0x16F00000000 (size_t)
  443. [RSP+AD0 ] 0x747261686E696152 (size_t)
  444. [RSP+AD8 ] 0x6F6E6F7472614820 (size_t)
  445. [RSP+AE0 ] 0x2F37322F33202D20 (size_t)
  446. [RSP+AE8 ] 0x3A31322034323032 (size_t)
  447. [RSP+AF0 ] 0x45202C32313A3233 (size_t)
  448. [RSP+AF8 ] 0x6973726556204558 (size_t)
  449. [RSP+B00 ] 0x30312E31203A6E6F (size_t)
  450. [RSP+B08 ] 0x53202C302E32332E (size_t)
  451. [RSP+B10 ] 0x7372655620657661 (size_t)
  452. [RSP+B18 ] 0x312E3732206E6F69 (size_t)
  453. [RSP+B20 ] 0x26903003131 (char*) "\x08"
  454. [RSP+B28 ] 0x7FF707001000 (void* -> Starfield.exe+1301000)
  455. mov [rsp+28h],rax
  456. [RSP+B30 ] 0x73726573555C3A43 (size_t)
  457. [RSP+B38 ] 0x7261686E6961525C (size_t)
  458. [RSP+B40 ] 0x6E6F747261482074 (size_t)
  459. [RSP+B48 ] 0x656D75636F445C6F (size_t)
  460. [RSP+B50 ] 0x4720794D5C73746E (size_t)
  461. [RSP+B58 ] 0x6174535C73656D61 (size_t)
  462. [RSP+B60 ] 0x535C646C65696672 (size_t)
  463. [RSP+B68 ] 0x7475415C73657661 (size_t)
  464. [RSP+B70 ] 0x455F31657661736F (size_t)
  465. [RSP+B78 ] 0x5F39384242363036 (size_t)
  466. [RSP+B80 ] 0x4536393631363235 (size_t)
  467. [RSP+B88 ] 0x3437323731363836 (size_t)
  468. [RSP+B90 ] 0x3237313638343032 (size_t)
  469. [RSP+B98 ] 0x4636453646363437 (size_t)
  470. [RSP+BA0 ] 0x5F3635323038305F (size_t)
  471. [RSP+BA8 ] 0x3632333034323032 (size_t)
  472. [RSP+BB0 ] 0x395F393032303131 (size_t)
  473. [RSP+BB8 ] 0x66732E345F305F31 (size_t)
  474. [RSP+BC0 ] 0x26D32310073 (char*) "\x0c0"
  475. [RSP+BC8 ] 0x7FF70E34DD00 (BSComponentDB2::DB*)
  476. [RSP+BD0 ] 0xAA0DE2F338 (char*) "\x02"
  477. [RSP+BD8 ] 0xAA0DE2F370 (void*)
  478. [RSP+BE0 ] 0x0 (size_t)
  479. [RSP+BE8 ] 0x26CFD137FF0 (void*)
  480. [RSP+BF0 ] 0x0 (size_t)
  481. [RSP+BF8 ] 0x0 (size_t)
  482. [RSP+C00 ] 0x23 (size_t)
  483. [RSP+C08 ] 0x26D515A7E60 (char*) "Autosave1_E606BB89_5261696E6861727420486172746F6E6F_080256_20240326110209_91_0_4"
  484. [RSP+C10 ] 0x0 (size_t)
  485. [RSP+C18 ] 0xFFFFFFFF (size_t)
  486. [RSP+C20 ] 0x0 (size_t)
  487. [RSP+C28 ] 0x26D5137DC70 (char*) "Autosave1_E606BB89_5261696E6861727420486172746F6E6F_080256_20240326110209_91_0_4"
  488. [RSP+C30 ] 0x26903028500 (BGSSaveLoadManager*)
  489. [RSP+C38 ] 0x2 (size_t)
  490. [RSP+C40 ] 0xAA0DE2F450 (char*) "\x01"
  491. [RSP+C48 ] 0x7FF70808A519 (void* -> Starfield.exe+238A519)
  492. mov r14b,al
  493. [RSP+C50 ] 0x26D6083BC88 (void*)
  494. [RSP+C58 ] 0x26D00000014 (char*) "$\x17\x0b"
  495. [RSP+C60 ] 0x26900000056 (void*)
  496. [RSP+C68 ] 0x26D5137DC70 (char*) "Autosave1_E606BB89_5261696E6861727420486172746F6E6F_080256_20240326110209_91_0_4"
  497. [RSP+C70 ] 0x3CFA11 (size_t)
  498. [RSP+C78 ] 0x7FF70E34DF68 (void* -> Starfield.exe+864DF68)
  499. and al,dl
  500. [RSP+C80 ] 0xAA00000000 (size_t)
  501. [RSP+C88 ] 0x7FF70715BC20 (void* -> Starfield.exe+145BC20)
  502. mov rbx,[rsp+30h]
  503. [RSP+C90 ] 0xAA00000002 (size_t)
  504. [RSP+C98 ] 0x0 (size_t)
  505. [RSP+CA0 ] 0x0 (size_t)
  506. [RSP+CA8 ] 0x7FF708AA3393 (void* -> Starfield.exe+2DA3393)
  507. add rsp,50h
  508. [RSP+CB0 ] 0x7FF70C266E48 (void* -> Starfield.exe+6566E48)
  509. ror ch,1
  510. [RSP+CB8 ] 0x7FF70715C16A (void* -> Starfield.exe+145C16A)
  511. nop
  512. [RSP+CC0 ] 0xAA0DE2F460 (void*)
  513. [RSP+CC8 ] 0x5D (size_t)
  514. [RSP+CD0 ] 0x23003CFA110001 (size_t)
  515. [RSP+CD8 ] 0x0 (size_t)
  516. [RSP+CE0 ] 0x1 (size_t)
  517. [RSP+CE8 ] 0x0 (size_t)
  518. [RSP+CF0 ] 0x0 (size_t)
  519. [RSP+CF8 ] 0xAA0DE2F5C8 (void*)
  520. [RSP+D00 ] 0x26D1866BF00 (BGSGenericBaseForm*)
  521. [RSP+D08 ] 0x7FF70880A377 (void* -> Starfield.exe+2B0A377)
  522. mov rdi,[rsp+50h]
  523. [RSP+D10 ] 0x0 (size_t)
  524. [RSP+D18 ] 0xAA0DE2F460 (void*)
  525. [RSP+D20 ] 0x14CE05 (size_t)
  526. [RSP+D28 ] 0x26D526BA3E8 (char*) " \x04"
  527. [RSP+D30 ] 0x0 (size_t)
  528. [RSP+D38 ] 0x0 (size_t)
  529. [RSP+D40 ] 0x26D170DB428 (void*)
  530. [RSP+D48 ] 0x1002A80E9 (size_t)
  531. [RSP+D50 ] 0x23003CFA110001 (size_t)
  532. [RSP+D58 ] 0x0 (size_t)
  533. [RSP+D60 ] 0x0 (size_t)
  534. [RSP+D68 ] 0x0 (size_t)
  535. [RSP+D70 ] 0x26D32315DB0 (BGSPropertySheet*)
  536. [RSP+D78 ] 0x26D32315020 (void*)
  537. [RSP+D80 ] 0x26D16046020 (void*)
  538. [RSP+D88 ] 0x4A (size_t)
  539. [RSP+D90 ] 0x26D32315020 (void*)
  540. [RSP+D98 ] 0xD (size_t)
  541. [RSP+DA0 ] 0xAA0DE2F530 (char*) "27420486172746F6E6F_080256_20240326110209_91_0_4"
  542. [RSP+DA8 ] 0x0 (size_t)
  543. [RSP+DB0 ] 0x26D173BFF00 (BGSGenericBaseForm*)
  544. [RSP+DB8 ] 0x26D170DB428 (void*)
  545. [RSP+DC0 ] 0x26D173BFF00 (BGSGenericBaseForm*)
  546. [RSP+DC8 ] 0x26D1858A020 (void*)
  547. [RSP+DD0 ] 0x5D (size_t)
  548. [RSP+DD8 ] 0x26D1858A320 (char*) "\x01"
  549. [RSP+DE0 ] 0x26D1858A700 (void*)
  550. [RSP+DE8 ] 0x1 (size_t)
  551. [RSP+DF0 ] 0x26D1866BF00 (BGSGenericBaseForm*)
  552. [RSP+DF8 ] 0xAA0E02F000 (void*)
  553. [RSP+E00 ] 0xAA0E02F020 (void*)
  554. [RSP+E08 ] 0xAA0E02F028 (void*)
  555. [RSP+E10 ] 0x657661736F747541 (size_t)
  556. [RSP+E18 ] 0x4242363036455F31 (size_t)
  557. [RSP+E20 ] 0x36313632355F3938 (size_t)
  558. [RSP+E28 ] 0x3731363836453639 (size_t)
  559. [RSP+E30 ] 0x3638343032343732 (size_t)
  560. [RSP+E38 ] 0x3646363437323731 (size_t)
  561. [RSP+E40 ] 0x323038305F463645 (size_t)
  562. [RSP+E48 ] 0x30343230325F3635 (size_t)
  563. [RSP+E50 ] 0x3032303131363233 (size_t)
  564. [RSP+E58 ] 0x345F305F31395F39 (size_t)
  565. [RSP+E60 ] 0x0 (size_t)
  566. [RSP+E68 ] 0x2 (size_t)
  567. [RSP+E70 ] 0x26CFB6BFDA8 (BSComponentDB2::Memory::ConcurrentPageAllocImpl*)
  568. [RSP+E78 ] 0x26CFD137FF0 (void*)
  569. [RSP+E80 ] 0x26D00000000 (void*)
  570. [RSP+E88 ] 0x42 (size_t)
  571. [RSP+E90 ] 0x2428 (size_t)
  572. [RSP+E98 ] 0x7FF70E34DCD6 (char*) "\x01"
  573. [RSP+EA0 ] 0x0 (size_t)
  574. [RSP+EA8 ] 0x7FF706461F06 (void* -> Starfield.exe+0761F06)
  575. mov edx,[rax]
  576. [RSP+EB0 ] 0x0 (size_t)
  577. [RSP+EB8 ] 0x7FF7062ACEE9 (void* -> Starfield.exe+05ACEE9)
  578. add rsp,28h
  579. [RSP+EC0 ] 0x0 (size_t)
  580. [RSP+EC8 ] 0x7FF70E34DD00 (BSComponentDB2::DB*)
  581. [RSP+ED0 ] 0x2428 (size_t)
  582. [RSP+ED8 ] 0x7FF70E34DCD6 (char*) "\x01"
  583. [RSP+EE0 ] 0x7FF70E34DAC0 (void* -> Starfield.exe+864DAC0)
  584. loopne 0000000000000065h
  585. [RSP+EE8 ] 0x7FF708E6C3F2 (void* -> Starfield.exe+316C3F2)
  586. mov al,sil
  587. [RSP+EF0 ] 0x7FF70E34DA80 (void* -> Starfield.exe+864DA80)
  588. add [rax],al
  589. [RSP+EF8 ] 0x0 (size_t)
  590. [RSP+F00 ] 0x2428 (size_t)
  591. [RSP+F08 ] 0x7FF70E34DCD6 (char*) "\x01"
  592. [RSP+F10 ] 0x7FF70E34DA40 (BSService::JobSite*)
  593. [RSP+F18 ] 0x7FF708982BF0 (void* -> Starfield.exe+2C82BF0)
  594. test al,al
  595. [RSP+F20 ] 0x0 (size_t)
  596. [RSP+F28 ] 0x0 (size_t)
  597. [RSP+F30 ] 0x0 (size_t)
  598. [RSP+F38 ] 0x0 (size_t)
  599. [RSP+F40 ] 0x26903028500 (BGSSaveLoadManager*)
  600. [RSP+F48 ] 0x7FF708084C48 (void* -> Starfield.exe+2384C48)
  601. mov rcx,[rbx]
  602. [RSP+F50 ] 0x26D52910001 (void*)
  603. [RSP+F58 ] 0x26D529183E8 (void*)
  604. [RSP+F60 ] 0xFFFFFFFF (size_t)
  605. [RSP+F68 ] 0x0 (size_t)
  606. [RSP+F70 ] 0xAA0DE2F760 (void*)
  607. [RSP+F78 ] 0x7FF70808D16E (void* -> Starfield.exe+238D16E)
  608. nop
  609. [RSP+F80 ] 0x26D529183D8 (BSService::Detail::TCmd<<lambda_131c4870fa33d302c588e56f37ef938b>,std::reference_wrapper<BGSSaveLoadManager>,int &,unsigned int &>*)
  610. [RSP+F88 ] 0xAE0B46FEC5 (size_t)
  611. [RSP+F90 ] 0x264FB039BC0 (void*)
  612. [RSP+F98 ] 0x0 (size_t)
  613. [RSP+FA0 ] 0x26489FB1688 (stl::unique_function_impl::detail::TypeErasedFuncImpl<<lambda_8291e7d1e643b42ca1ce574da97d71a6>,void *>*)
  614. [RSP+FA8 ] 0x7FF708E6913D (void* -> Starfield.exe+316913D)
  615. mov rdx,rbx
  616. [RSP+FB0 ] 0x0 (size_t)
  617. [RSP+FB8 ] 0x26489FB1688 (stl::unique_function_impl::detail::TypeErasedFuncImpl<<lambda_8291e7d1e643b42ca1ce574da97d71a6>,void *>*)
  618. [RSP+FC0 ] 0x0 (size_t)
  619. [RSP+FC8 ] 0x0 (size_t)
  620. [RSP+FD0 ] 0x7FF70E55E8C0 (void* -> Starfield.exe+885E8C0)
  621. xchg edx,eax
  622. [RSP+FD8 ] 0x7FF708E69D99 (void* -> Starfield.exe+3169D99)
  623. jmp short 0000000000000078h
  624. [RSP+FE0 ] 0x0 (size_t)
  625. [RSP+FE8 ] 0x26D529183D8 (BSService::Detail::TCmd<<lambda_131c4870fa33d302c588e56f37ef938b>,std::reference_wrapper<BGSSaveLoadManager>,int &,unsigned int &>*)
  626. [RSP+FF0 ] 0xAE0B46FEC5 (size_t)
  627. [RSP+FF8 ] 0x264FB039BC0 (void*)
  628. [RSP+1000] 0x7FF70AE6C200 (void* -> Starfield.exe+516C200)
  629. jo short 0FFFFFFFFFFFFFFE2h
  630. [RSP+1008] 0x264FB039FE8 (BSJobs2::Detail::GroupThread*)
  631. [RSP+1010] 0x26D529183D8 (BSService::Detail::TCmd<<lambda_131c4870fa33d302c588e56f37ef938b>,std::reference_wrapper<BGSSaveLoadManager>,int &,unsigned int &>*)
  632. [RSP+1018] 0x2 (size_t)
  633. [RSP+1020] 0x0 (size_t)
  634. [RSP+1028] 0x264FB039FE8 (BSJobs2::Detail::GroupThread*)
  635. [RSP+1030] 0x7FF70AE6C2F0 (void* -> Starfield.exe+516C2F0)
  636. loopne 0FFFFFFFFFFFFFFE0h
  637. [RSP+1038] 0x0 (size_t)
  638. [RSP+1040] 0x7FF70C27AFC0 (BSFixedSizeBlockAllocator::TAlloc<4294967296,16777216,128>*)
  639. [RSP+1048] 0x7FF708E67EB0 (void* -> Starfield.exe+3167EB0)
  640. mov ecx,[2FC71B4h]
  641. [RSP+1050] 0xAE0B46FEC5 (size_t)
  642. [RSP+1058] 0x0 (size_t)
  643. [RSP+1060] 0x26D529183D8 (BSService::Detail::TCmd<<lambda_131c4870fa33d302c588e56f37ef938b>,std::reference_wrapper<BGSSaveLoadManager>,int &,unsigned int &>*)
  644. [RSP+1068] 0x1 (size_t)
  645. [RSP+1070] 0x0 (size_t)
  646. [RSP+1078] 0x7FF708E6A34E (void* -> Starfield.exe+316A34E)
  647. xor eax,eax
  648. [RSP+1080] 0x0 (size_t)
  649. [RSP+1088] 0x0 (size_t)
  650. [RSP+1090] 0x264FB039FE8 (BSJobs2::Detail::GroupThread*)
  651. [RSP+1098] 0x7FF70AE6C2F0 (void* -> Starfield.exe+516C2F0)
  652. loopne 0FFFFFFFFFFFFFFE0h
  653. [RSP+10A0] 0x264FB039FE8 (BSJobs2::Detail::GroupThread*)
  654. [RSP+10A8] 0x7FF708980D71 (void* -> Starfield.exe+2C80D71)
  655. mov rcx,[38CB06Fh]
  656. [RSP+10B0] 0x7FF70C27AFC0 (BSFixedSizeBlockAllocator::TAlloc<4294967296,16777216,128>*)
  657. [RSP+10B8] 0x7FF70AE6C2F0 (void* -> Starfield.exe+516C2F0)
  658. loopne 0FFFFFFFFFFFFFFE0h
  659. [RSP+10C0] 0x0 (size_t)
  660. [RSP+10C8] 0x7FF70E338888 (BSThreadEvent::`anonymous namespace'::Source*)
  661. [RSP+10D0] 0x264FB039FE8 (BSJobs2::Detail::GroupThread*)
  662. [RSP+10D8] 0x0 (size_t)
  663. [RSP+10E0] 0x0 (size_t)
  664. [RSP+10E8] 0x0 (size_t)
  665. [RSP+10F0] 0x7FF70AE6C2F0 (void* -> Starfield.exe+516C2F0)
  666. loopne 0FFFFFFFFFFFFFFE0h
  667. [RSP+10F8] 0xAA0DE2F7D0 (void*)
  668. [RSP+1100] 0x7FF70E338888 (BSThreadEvent::`anonymous namespace'::Source*)
  669. [RSP+1108] 0x0 (size_t)
  670. [RSP+1110] 0x0 (size_t)
  671. [RSP+1118] 0x0 (size_t)
  672. [RSP+1120] 0x0 (size_t)
  673. [RSP+1128] 0x7FFCAE5F257D (void* -> KERNEL32.DLL+001257D BaseThreadInitThunk)
  674. mov ecx,eax
  675. [RSP+1130] 0x0 (size_t)
  676. [RSP+1138] 0x0 (size_t)
  677. [RSP+1140] 0x0 (size_t)
  678. [RSP+1148] 0x0 (size_t)
  679. [RSP+1150] 0x0 (size_t)
  680. [RSP+1158] 0x7FFCAF24AA58 (void* -> ntdll.dll+005AA58 RtlUserThreadStart)
  681. jmp short 0000000000000021h
  682. [RSP+1160] 0x0 (size_t)
  683. [RSP+1168] 0x0 (size_t)
  684. [RSP+1170] 0x0 (size_t)
  685. [RSP+1178] 0x0 (size_t)
  686. [RSP+1180] 0x0 (size_t)
  687. [RSP+1188] 0x0 (size_t)
  688. [RSP+1190] 0x88CBA56900000000 (size_t)
  689. [RSP+1198] 0x0 (size_t)
  690. [RSP+11A0] 0x4F0FFFFFB30 (size_t)
  691. [RSP+11A8] 0x7FFCACB1CD30 (void* -> KERNELBASE.dll+015CD30 UnhandledExceptionFilter)
  692. mov [rsp+10h],rbx
  693. [RSP+11B0] 0xAA0DE2D200 (void*)
  694. [RSP+11B8] 0xFE123D342C80003F (size_t)
  695. [RSP+11C0] 0x7FFC247A6859 (size_t)
  696. [RSP+11C8] 0xAA0DE2D200 (void*)
  697. [RSP+11D0] 0x0 (size_t)
  698. [RSP+11D8] 0x0 (size_t)
  699. [RSP+11E0] 0x0 (size_t)
  700. [RSP+11E8] 0x0 (size_t)
  701. [RSP+11F0] 0x0 (size_t)
  702. [RSP+11F8] 0x0 (size_t)
  703. [RSP+1200] 0x0 (size_t)
  704. [RSP+1208] 0x0 (size_t)
  705. [RSP+1210] 0x0 (size_t)
  706. [RSP+1218] 0x0 (size_t)
  707. [RSP+1220] 0x0 (size_t)
  708. [RSP+1228] 0x0 (size_t)
  709. [RSP+1230] 0x0 (size_t)
  710. [RSP+1238] 0x0 (size_t)
  711. [RSP+1240] 0x0 (size_t)
  712. [RSP+1248] 0x0 (size_t)
  713. [RSP+1250] 0x0 (size_t)
  714. [RSP+1258] 0x0 (size_t)
  715. [RSP+1260] 0x0 (size_t)
  716. [RSP+1268] 0x0 (size_t)
  717. [RSP+1270] 0x0 (size_t)
  718. [RSP+1278] 0x0 (size_t)
  719. [RSP+1280] 0x0 (size_t)
  720. [RSP+1288] 0x0 (size_t)
  721. [RSP+1290] 0x0 (size_t)
  722. [RSP+1298] 0x0 (size_t)
  723. [RSP+12A0] 0x0 (size_t)
  724. [RSP+12A8] 0x0 (size_t)
  725. [RSP+12B0] 0x0 (size_t)
  726. [RSP+12B8] 0x0 (size_t)
  727. [RSP+12C0] 0x0 (size_t)
  728. [RSP+12C8] 0x0 (size_t)
  729. [RSP+12D0] 0x0 (size_t)
  730. [RSP+12D8] 0x0 (size_t)
  731. [RSP+12E0] 0x0 (size_t)
  732. [RSP+12E8] 0x0 (size_t)
  733. [RSP+12F0] 0x0 (size_t)
  734. [RSP+12F8] 0x0 (size_t)
  735. [RSP+1300] 0x0 (size_t)
  736. [RSP+1308] 0x0 (size_t)
  737. [RSP+1310] 0x0 (size_t)
  738. [RSP+1318] 0x0 (size_t)
  739. [RSP+1320] 0x0 (size_t)
  740. [RSP+1328] 0x0 (size_t)
  741. [RSP+1330] 0x0 (size_t)
  742. [RSP+1338] 0x0 (size_t)
  743. [RSP+1340] 0x0 (size_t)
  744. [RSP+1348] 0x0 (size_t)
  745. [RSP+1350] 0x0 (size_t)
  746. [RSP+1358] 0x0 (size_t)
  747. [RSP+1360] 0x0 (size_t)
  748. [RSP+1368] 0x0 (size_t)
  749. [RSP+1370] 0x0 (size_t)
  750. [RSP+1378] 0x0 (size_t)
  751. [RSP+1380] 0x0 (size_t)
  752. [RSP+1388] 0x0 (size_t)
  753. [RSP+1390] 0x0 (size_t)
  754. [RSP+1398] 0x0 (size_t)
  755. [RSP+13A0] 0x0 (size_t)
  756. [RSP+13A8] 0x0 (size_t)
  757. [RSP+13B0] 0x0 (size_t)
  758. [RSP+13B8] 0x0 (size_t)
  759. [RSP+13C0] 0x0 (size_t)
  760. [RSP+13C8] 0x0 (size_t)
  761. [RSP+13D0] 0x0 (size_t)
  762. [RSP+13D8] 0x0 (size_t)
  763. [RSP+13E0] 0x0 (size_t)
  764. [RSP+13E8] 0x0 (size_t)
  765. [RSP+13F0] 0x0 (size_t)
  766. [RSP+13F8] 0x0 (size_t)
  767. [RSP+1400] 0x0 (size_t)
  768. [RSP+1408] 0x0 (size_t)
  769. [RSP+1410] 0x0 (size_t)
  770. [RSP+1418] 0x0 (size_t)
  771. [RSP+1420] 0x0 (size_t)
  772. [RSP+1428] 0x0 (size_t)
  773. [RSP+1430] 0x0 (size_t)
  774. [RSP+1438] 0x0 (size_t)
  775. [RSP+1440] 0x0 (size_t)
  776. [RSP+1448] 0x0 (size_t)
  777. [RSP+1450] 0x0 (size_t)
  778. [RSP+1458] 0x0 (size_t)
  779. [RSP+1460] 0x0 (size_t)
  780. [RSP+1468] 0x0 (size_t)
  781. [RSP+1470] 0x0 (size_t)
  782. [RSP+1478] 0x0 (size_t)
  783. [RSP+1480] 0x0 (size_t)
  784. [RSP+1488] 0x0 (size_t)
  785. [RSP+1490] 0x0 (size_t)
  786. [RSP+1498] 0x0 (size_t)
  787. [RSP+14A0] 0x0 (size_t)
  788. [RSP+14A8] 0x0 (size_t)
  789. [RSP+14B0] 0x0 (size_t)
  790. [RSP+14B8] 0x0 (size_t)
  791. [RSP+14C0] 0x0 (size_t)
  792. [RSP+14C8] 0x0 (size_t)
  793. [RSP+14D0] 0x0 (size_t)
  794. [RSP+14D8] 0x0 (size_t)
  795. [RSP+14E0] 0x0 (size_t)
  796. [RSP+14E8] 0x0 (size_t)
  797. [RSP+14F0] 0x0 (size_t)
  798. [RSP+14F8] 0x0 (size_t)
  799. [RSP+1500] 0x0 (size_t)
  800. [RSP+1508] 0x0 (size_t)
  801. [RSP+1510] 0x0 (size_t)
  802. [RSP+1518] 0x0 (size_t)
  803. [RSP+1520] 0x0 (size_t)
  804. [RSP+1528] 0x0 (size_t)
  805. [RSP+1530] 0x0 (size_t)
  806. [RSP+1538] 0x0 (size_t)
  807. [RSP+1540] 0x0 (size_t)
  808. [RSP+1548] 0x0 (size_t)
  809. [RSP+1550] 0x0 (size_t)
  810. [RSP+1558] 0x0 (size_t)
  811. [RSP+1560] 0x0 (size_t)
  812. [RSP+1568] 0x0 (size_t)
  813. [RSP+1570] 0x0 (size_t)
  814. [RSP+1578] 0x0 (size_t)
  815. [RSP+1580] 0x0 (size_t)
  816. [RSP+1588] 0x0 (size_t)
  817. [RSP+1590] 0x0 (size_t)
  818. [RSP+1598] 0x0 (size_t)
  819. [RSP+15A0] 0x0 (size_t)
  820. [RSP+15A8] 0x0 (size_t)
  821. [RSP+15B0] 0x0 (size_t)
  822. [RSP+15B8] 0x0 (size_t)
  823. [RSP+15C0] 0x0 (size_t)
  824. [RSP+15C8] 0x0 (size_t)
  825. [RSP+15D0] 0x0 (size_t)
  826. [RSP+15D8] 0x0 (size_t)
  827. [RSP+15E0] 0x0 (size_t)
  828. [RSP+15E8] 0x0 (size_t)
  829. [RSP+15F0] 0x0 (size_t)
  830. [RSP+15F8] 0x0 (size_t)
  831. [RSP+1600] 0x0 (size_t)
  832. [RSP+1608] 0x0 (size_t)
  833. [RSP+1610] 0x0 (size_t)
  834. [RSP+1618] 0x0 (size_t)
  835. [RSP+1620] 0x0 (size_t)
  836. [RSP+1628] 0x0 (size_t)
  837. [RSP+1630] 0x0 (size_t)
  838. [RSP+1638] 0x0 (size_t)
  839. [RSP+1640] 0x0 (size_t)
  840. [RSP+1648] 0x0 (size_t)
  841. [RSP+1650] 0x0 (size_t)
  842. [RSP+1658] 0x0 (size_t)
  843. [RSP+1660] 0x0 (size_t)
  844. [RSP+1668] 0x0 (size_t)
  845. [RSP+1670] 0x0 (size_t)
  846. [RSP+1678] 0x0 (size_t)
  847. [RSP+1680] 0x0 (size_t)
  848. [RSP+1688] 0x0 (size_t)
  849. [RSP+1690] 0x0 (size_t)
  850. [RSP+1698] 0x0 (size_t)
  851. [RSP+16A0] 0x0 (size_t)
  852. [RSP+16A8] 0x0 (size_t)
  853. [RSP+16B0] 0x0 (size_t)
  854. [RSP+16B8] 0x0 (size_t)
  855. [RSP+16C0] 0x0 (size_t)
  856. [RSP+16C8] 0x0 (size_t)
  857. [RSP+16D0] 0x0 (size_t)
  858. [RSP+16D8] 0x0 (size_t)
  859. [RSP+16E0] 0x0 (size_t)
  860. [RSP+16E8] 0x0 (size_t)
  861. [RSP+16F0] 0x0 (size_t)
  862. [RSP+16F8] 0x0 (size_t)
  863. [RSP+1700] 0x0 (size_t)
  864. [RSP+1708] 0x0 (size_t)
  865. [RSP+1710] 0x0 (size_t)
  866. [RSP+1718] 0x0 (size_t)
  867. [RSP+1720] 0x0 (size_t)
  868. [RSP+1728] 0x0 (size_t)
  869. [RSP+1730] 0x0 (size_t)
  870. [RSP+1738] 0x0 (size_t)
  871. [RSP+1740] 0x0 (size_t)
  872. [RSP+1748] 0x0 (size_t)
  873. [RSP+1750] 0x0 (size_t)
  874. [RSP+1758] 0x0 (size_t)
  875. [RSP+1760] 0x0 (size_t)
  876. [RSP+1768] 0x0 (size_t)
  877. [RSP+1770] 0x0 (size_t)
  878. [RSP+1778] 0x0 (size_t)
  879. [RSP+1780] 0x0 (size_t)
  880. [RSP+1788] 0x0 (size_t)
  881. [RSP+1790] 0x0 (size_t)
  882. [RSP+1798] 0x0 (size_t)
  883. [RSP+17A0] 0x0 (size_t)
  884. [RSP+17A8] 0x0 (size_t)
  885. [RSP+17B0] 0x0 (size_t)
  886. [RSP+17B8] 0x0 (size_t)
  887. [RSP+17C0] 0x0 (size_t)
  888. [RSP+17C8] 0x0 (size_t)
  889. [RSP+17D0] 0x0 (size_t)
  890. [RSP+17D8] 0x0 (size_t)
  891. [RSP+17E0] 0x0 (size_t)
  892. [RSP+17E8] 0x0 (size_t)
  893. [RSP+17F0] 0x0 (size_t)
  894. [RSP+17F8] 0x0 (size_t)
  895. [RSP+1800] 0x0 (size_t)
  896. [RSP+1808] 0x0 (size_t)
  897. [RSP+1810] 0x0 (size_t)
  898. [RSP+1818] 0x0 (size_t)
  899. [RSP+1820] 0x0 (size_t)
  900. [RSP+1828] 0x0 (size_t)
  901. [RSP+1830] 0x0 (size_t)
  902. [RSP+1838] 0x0 (size_t)
  903. [RSP+1840] 0x0 (size_t)
  904. [RSP+1848] 0x0 (size_t)
  905. [RSP+1850] 0x0 (size_t)
  906. [RSP+1858] 0x0 (size_t)
  907. [RSP+1860] 0x0 (size_t)
  908. [RSP+1868] 0x0 (size_t)
  909. [RSP+1870] 0x0 (size_t)
  910. [RSP+1878] 0x0 (size_t)
  911. [RSP+1880] 0x0 (size_t)
  912. [RSP+1888] 0x0 (size_t)
  913. [RSP+1890] 0x0 (size_t)
  914. [RSP+1898] 0x0 (size_t)
  915. [RSP+18A0] 0x0 (size_t)
  916. [RSP+18A8] 0x0 (size_t)
  917. [RSP+18B0] 0x0 (size_t)
  918. [RSP+18B8] 0x0 (size_t)
  919. [RSP+18C0] 0x0 (size_t)
  920. [RSP+18C8] 0x0 (size_t)
  921. [RSP+18D0] 0x0 (size_t)
  922. [RSP+18D8] 0x0 (size_t)
  923. [RSP+18E0] 0x0 (size_t)
  924. [RSP+18E8] 0x0 (size_t)
  925. [RSP+18F0] 0x0 (size_t)
  926. [RSP+18F8] 0x0 (size_t)
  927.  
  928. MODULES:
  929. _nvngx.dll
  930. Address: 0x7FFC04520000
  931. SHA: D181F7CBF9FE5C53D6B955917ED6DECF0BCBB363497E943A81C9193F557F40CA1E689BA2F8E777CDAB49A86BE4EE0C5DB4FEE8667C1A33788C19A5A4FB02BC07
  932. Version: v31.0.15.5186
  933. ADVAPI32.dll
  934. Address: 0x7FFCAE2B0000
  935. SHA: 2BCDB7F76438421E1EDB8E94230EFA242F739D3AEF25EBB3FBDA21C3800488315938485D645B6433A6EB8CFA9C921B99D51FC4ADEE67E70A7905F7BE65B4E1DB
  936. Version: v10.0.22621.1
  937. amsi.dll
  938. Address: 0x7FFC73C90000
  939. SHA: 54E0AA4E6156476B22F3A3ACF8D036C032264A8B2D250CCAAF2CBAC80AA5041E671BE6302BF7C6B837385D41C7042E880AB423D40A58960A63DD46FEEEF6D921
  940. Version: v10.0.22621.1
  941. antimalware_provider.dll
  942. Address: 0x7FFC72900000
  943. SHA: 6890535BC4C0CD837EAD49656F2DC341C76734CD5B3A6D7CBDF4D51221AD20322167CF1A029CE8B686351C71A22853504FDDA7FEBA00A7442C0C9BE379C2D89E
  944. Version: v30.587.0.880
  945. apphelp.dll
  946. Address: 0x7FFCA6050000
  947. SHA: 4EAC0C30780E027A3E87D56B40DDDB4FBA222B363F5F692504312C4D0DBA2C9199A7B54E31C77D83E4C4F8BB019FC75A5B14362BBCC08EAFE0BE5A3B8C6628E7
  948. Version: v10.0.22621.1
  949. AUDIOSES.DLL
  950. Address: 0x7FFC982C0000
  951. SHA: 964EE6D2F48D657CE0264380E7794F6D326A9B24065263CAB7FD01553176CF3411BC536481B96FAF164B39AB413F4221601206FC1738B8A3B1EE1ECA551BDB05
  952. Version: v10.0.22621.1
  953. BakaAchievementEnabler.dll
  954. Address: 0x7FFC11820000
  955. SHA: F2AA23EE22818925A316A3DDBDCE8EEF471ABC27F12CC247305659CEAFDB45C30A9F6A1F784033E3BCE92339F30AF9C59C5CF435CFF64CA020177DD489D6A306
  956. Version: v2.4.0
  957. bcrypt.dll
  958. Address: 0x7FFCAC6A0000
  959. SHA: FCA82D2A0034F24DA7D6771A9019747614A2F9BBBAC8212B39D22C9654F4E4052958E20E755B96F591692E807784F2BB9D612F0741E1B376A2C9ABF877BEF89B
  960. Version: v10.0.22621.1
  961. bcryptPrimitives.dll
  962. Address: 0x7FFCAC620000
  963. SHA: E1D63564A9EA245DC4B9831C328EEB2FB6FF48586E28763B879793120916F5AE4A326D6E7DAD7D624BA00A52735AD812E4A3F79DB237DC5109542C643BC2C1FF
  964. Version: v10.0.22621.2506
  965. bink2w64.dll
  966. Address: 0x7FFC1F970000
  967. SHA: 61AB61B895332AE98F5491D07975E5D6A1E42747DE1AE292298CB008AB63AB410F8A7684DB7DDA694EBCC351783D68EDB167B4EEEAB74DBEC6C1BB238E62BEED
  968. Version: v2023.2.0
  969. CFGMGR32.dll
  970. Address: 0x7FFCAC1F0000
  971. SHA: 49888965143C96F2F210B95D16BAD1C039C0470340D8F908EDA6F693929DBBA1E66269B951D402F395185C8EB989E21B28F14244322A5FFDB459B39E462D2EDA
  972. Version: v10.0.22621.2506
  973. clbcatq.dll
  974. Address: 0x7FFCAD400000
  975. SHA: E816614FB688CA14959DED14C4D4E2A23F5C6426D9BCCF7922462F172EC2E80FF2D2ABAF70E440ADDC52BA33011BF40BF2311616BC7B4BA9457462DF833D392E
  976. Version: v2001.12.10941.16384
  977. combase.dll
  978. Address: 0x7FFCACF10000
  979. SHA: 560740B92453353B763395C70E12BE57C8344B3047D9F9989D514F2B4A7C2EB427FA93A141FE39CA9033E3AA439568D8E2FBF9D86CA86A3FC6A6139DED617136
  980. Version: v10.0.22621.1
  981. CONCRT140.dll
  982. Address: 0x7FFC6FFD0000
  983. SHA: 50BFDCC4F889CD40FE1B79BD3B32515C18836BC533D5590C95ECF4AF5041DF61C87DF6AD87EF9323E19771DE00D7D483FECD07FB7674DF380BE8839F6FF3256A
  984. Version: v14.38.33135
  985. ConsoleCommandRunner.dll
  986. Address: 0x7FFC11740000
  987. SHA: 20F3862C8FCD0E054989E261D9B9A259F6C5608739D2B37F6036313CED26807F05C379C8F193EBC37D732C8883B0C8C3D21427C8E4A70071877E401D6B5F597E
  988. Version: v1.4.5
  989. CoreMessaging.dll
  990. Address: 0x7FFCA5D60000
  991. SHA: EB743BC2A080C480080887A8DD4D4A7BBB01ECF5CBDA729D37D6493056E55E7888B26D1B25E473F97A7ABF82EFFC58D919DB9D0AD33332C4FA4FE8D5E8917B97
  992. Version: v10.0.22621.3085
  993. CoreUIComponents.dll
  994. Address: 0x7FFCA0BC0000
  995. SHA: 068B9665609C5EABB9A0242BCA971A0A4E68EC7A0E376135AA9C405BA40899EF034D822D787EFC04036C93293F884716686795EAA6429D9CC218A11F61FD289D
  996. Version: v10.0.22621.2506
  997. CRYPT32.dll
  998. Address: 0x7FFCACD70000
  999. SHA: 5D49892BDDC2923536E9BA671F9130209AD77E464E022A2E77450B769B25897C6B509C80DAC4A892E5A2BADAA74506A98FEB51CAE5331FD0ABDB6AFDD0D4E3BE
  1000. Version: v10.0.22621.1
  1001. CRYPTBASE.DLL
  1002. Address: 0x7FFCAB5D0000
  1003. SHA: BB20B86B3C424DB0156791092017E34835C66CCBDD2EE6C939C86F5627FFEBA351E8D8E7BDDE20332D3068F30EE893F02288B8801B1906B8CBB111BCCA0D24C7
  1004. Version: v10.0.22621.1
  1005. cryptnet.dll
  1006. Address: 0x7FFCA6400000
  1007. SHA: 9D956FA294D7778EDBBC4967D16302383E2F4A92905C43BB61CFF8494C1BACBC052A2D8729FA3600C69A8DA37F90EBEAFF0B4115BC0F5F3E0754508BDE18E9DA
  1008. Version: v10.0.22621.1
  1009. cryptsp.dll
  1010. Address: 0x7FFCAC1A0000
  1011. SHA: 41F91A2FCB5AF990808A5076587E44A4C8CBE46C563C8073AC692BBEFEFEB41825EDCEFE8C85490A9422CFE80F518DB700D9E3FE25FC7BC5C24A9893A26A6C0A
  1012. Version: v10.0.22621.2506
  1013. d3d11.dll
  1014. Address: 0x7FFCA5490000
  1015. SHA: B1636E8D3EDA2C5B56C6ED32E079967E4EE5C713C64A8BF44756E296BF50318CA3C6E4527BFA63D55B81CCC2B46B72935AE2DA1FC4097C43AB356EDE9AA6BCCB
  1016. Version: v10.0.22621.3235
  1017. d3d11on12.dll
  1018. Address: 0x7FFC08870000
  1019. SHA: 357C17DACBBC600625CF1D201C46F525429C0248F12ED1A1FE98D03136F18DE513F3139D9C372663290903DEA02D3D3A56671BFE278B41353DFF1EEA639A7DB7
  1020. Version: v10.0.22621.2506
  1021. d3d12.dll
  1022. Address: 0x7FFC2CE70000
  1023. SHA: E838144EB558BB62F2F9241DB27E8CFC7F8F9A6CFC52A009569B571D682B9DC60A0A344A6AA44EB0324D6D49ACC3A781762075A15CD761E8CA0D16704F3BE7D3
  1024. Version: v10.0.22621.3235
  1025. D3D12Core.dll
  1026. Address: 0x7FFBF92D0000
  1027. SHA: B44437ED5E2BCC9ADF44E7458312C0EF0C7B6548231542F31664B9E51DB932DFD40C8F7D17470ED0DA938D73FEE5ADDBD6184B91A66BD0B8EEA0B206137A0388
  1028. Version: v1.608.2
  1029. d3dcompiler_47_64.dll
  1030. Address: 0x7FFBFE060000
  1031. SHA: 8E62CFF30F248DC37A2B2E1EEDDB7E59E7F33AAAA9036EF032D8B3F8A6134AEC4140C142D8F681FB89763E305B74A22ECB45EAA8F4E8E6661B64D773F6A16826
  1032. Version: v6.3.9600.16384
  1033. D3DSCache.dll
  1034. Address: 0x7FFC1D500000
  1035. SHA: B9588DEC763C25A849512075BC6DF52A60A8D706F84D91D4907694DA809EC64D5EE806B0FC0FCA2ED1F7E34758874C5FCC7AD4CE59F2F0011B7DD0135D1F4330
  1036. Version: v10.0.22621.1
  1037. dbgcore.DLL
  1038. Address: 0x7FFCABD10000
  1039. SHA: 60AAF521309B6B697B5DB66FB6101AEC6DA0B6F59706E2C7622D12339B65393958A35D4CC97B1AD88A4D75D7E30098FAE1F4909FE80340C39104325B7895EA0C
  1040. Version: v10.0.22621.1
  1041. dbghelp.dll
  1042. Address: 0x7FFCABE20000
  1043. SHA: FEE06B3B3E3BB3B51C33C99E26DF66DC44A3CF325D6AD64607519A24CC9E9FE81584EF30453AD5D6CBB02309E48E92B7C1BA6550F0D4C46BBC3CA15B42D7047A
  1044. Version: v10.0.22621.2506
  1045. dcomp.dll
  1046. Address: 0x7FFCA56F0000
  1047. SHA: 3FF6405855FCD5E2B0A355C88B92A986C9ACBA5EA7603861C034674C23F07D95753360808A14B5799AE3B2497DC1188221F9A99B22D02621F525FB1482DBBFF4
  1048. Version: v10.0.22621.3235
  1049. devobj.dll
  1050. Address: 0x7FFCAC1C0000
  1051. SHA: 5364886DFC402E74153B7EC2987BBC041B615C3AB2FD74EB161B6B49EEDD2F7538D2A56D0B06E99984B3E1B745E9DD04BB90099EB37E4BF31F0006C022630681
  1052. Version: v10.0.22621.2506
  1053. DEVRTL.dll
  1054. Address: 0x7FFCAB260000
  1055. SHA: F776E1810BA33A3F7097E21E8F1779A8C1CD899B9A6455F13C605B363A3358C4A01AF367132C6E792735A02066AA16F8BEAFCE4A3753A2196EF9ECE819676687
  1056. Version: v10.0.22621.1
  1057. dhcpcsvc.DLL
  1058. Address: 0x7FFCA3250000
  1059. SHA: 0D2FF4781343BD06D9DF0862195DD9C3EFBA01C16D86978CFCBD9586D8A36A688132EA6E8037E89E57CBEE6BCDD9D7D0BA315361D7F9FE156C1684C9FC455848
  1060. Version: v10.0.22621.1
  1061. dhcpcsvc6.DLL
  1062. Address: 0x7FFCA32D0000
  1063. SHA: 87487B8086E4451E0079BE0838A076FDC9D0FF25F54CE498E979E4912E370756E1F734F8BCECF52FB161D234CAB0227C4763F5D2650995707B0AA2B924EE6F3A
  1064. Version: v10.0.22621.1
  1065. DINPUT8.dll
  1066. Address: 0x7FFC1D0B0000
  1067. SHA: B1F50A3AC4833CE262CEAE40E29F6D02CBD4519A0542522FEB66F3972ED13D0FE146332D3F411D125D21E90601B01E9575A5B25CB2D7ECF570ACFDDBA34DE863
  1068. Version: v10.0.22621.1
  1069. directxdatabasehelper.dll
  1070. Address: 0x7FFCA3280000
  1071. SHA: 3273DF67643DA3E637393CCEF544D026913E0DD6D0C8A4AEFE7CC0D5D87610698403A9536AE444C4FDCD6E31CF822312F17FA5D14C1A869B33887D0F334E7164
  1072. Version: v10.0.22621.3235
  1073. DNSAPI.dll
  1074. Address: 0x7FFCAA7F0000
  1075. SHA: 8A199C36F5D83698974FFD1178DA2695B22FAFF74DB5F9FE0587FE1CEF3F9B04290123B918FF8449DB8C9C25949940E2DEFB6B615E72F28741730DC2E89764FD
  1076. Version: v10.0.22621.1
  1077. DPAPI.DLL
  1078. Address: 0x7FFCAC240000
  1079. SHA: 2531BC636C0722966C94B8B9DD154800E16AA7C67C6256AA23794A437E215BE56DA3E6AAB61E156839AB4534A7CDFE1E2991934365F24E50FCCDBDCE2176CA90
  1080. Version: v10.0.22621.1
  1081. drvstore.dll
  1082. Address: 0x7FFCAB2B0000
  1083. SHA: 5B67153A6D1A277EDE793923BF608EF3DFE1FDA088E7BED378309665784479B1D56D3C57442DD0115D2401D9658E0101885B9C469A2537DFEF4E63AD34EA3551
  1084. Version: v10.0.22621.2506
  1085. DSOUND.DLL
  1086. Address: 0x7FFC54FD0000
  1087. SHA: 4E794C7C7FB1A0A0B345821B4F3A2B183169E9ECA2C71C7BE4915C404DC078EC9A1ADD9EA5A0F1F99B11AD0227597B4D7C192D2F85AB274D01E69A325775720C
  1088. Version: v10.0.22621.1
  1089. dwmapi.dll
  1090. Address: 0x7FFCA63D0000
  1091. SHA: 42D5A1AA995F22B7EA325C59C69883096EA43C0F4787F0D87A1DFB922CCECCACCFB763AA9BA2A57963B2FD4703B8D0CFA59B9D360ACB4589317D3808AF4EDCAB
  1092. Version: v10.0.22621.1
  1093. dxcore.dll
  1094. Address: 0x7FFCA8F80000
  1095. SHA: B29C24E2EA29F08ED60FB37F8E47430EFE628C641103A852900421A7FA1CF616525A9A4ADC9F9E32AA1152F6859E7BCDDE1DC0F3E9F62A17363D37BB5492BDA2
  1096. Version: v10.0.22621.3085
  1097. dxgi.dll
  1098. Address: 0x7FFCA62C0000
  1099. SHA: 7DDFF8FA00BAC9A1C6B0565C733384F7BA25446D7CC402AA186674FF91353976CF6AC43CA05EB9741934EDFC2E85784747CA8666269A6777E04FAAF3F188956A
  1100. Version: v10.0.22621.3235
  1101. fastprox.dll
  1102. Address: 0x7FFC9ED40000
  1103. SHA: 03DA937756F596705D706F3A295E6EB8D366C6900C00F8CBEA4C3B4BCC51D8F804F8AF3859C9959817CE5406DD003EF01AC2E6E4C072AB3F4D1F38E12B44E433
  1104. Version: v10.0.22621.2506
  1105. fwpuclnt.dll
  1106. Address: 0x7FFCA21F0000
  1107. SHA: C4649DFB18D62B393F0A80CA4DAB868C5E5B27657C9E9404EFE71DF715925E9D384AE45C7AB889BF48C8653CC1230E2CD33A7478064C1888568937AF0D688BAA
  1108. Version: v10.0.22621.2506
  1109. gameoverlayrenderer64.dll
  1110. Address: 0x7FFC11150000
  1111. SHA: 13F19A39978FF9698844893ED1EC0BC5A4E2C0C8E9D9EDF05C6C02991FB459CC9BFDE32EB230C0D0BB2AB106B28D5F212900D0BA0D9E87CBAD992BA625373426
  1112. Version: v8.74.80.95
  1113. GDI32.dll
  1114. Address: 0x7FFCAE280000
  1115. SHA: 602EEA8DF18F129FE06BF37BF6562F5D820A9FF2AED5A0622BF77E859C4B765BA1B7674AF9A063C0B699A167DA05E071F925283D77436D49D9D4E5918D819710
  1116. Version: v10.0.22621.3085
  1117. gdi32full.dll
  1118. Address: 0x7FFCAC500000
  1119. SHA: 2A08A391A95E797A5C1532B32FD7C8B96787049084FFBA92E2B61CC236C1CC9DBF7AB32839395499F0E8AF63BF42A5C85748B1F09FAB365B9C4C825EE96BB0DB
  1120. Version: v10.0.22621.3085
  1121. gpapi.dll
  1122. Address: 0x7FFCAB230000
  1123. SHA: 044ED98219DDD88D0C83D227D00A25F0718F57758384EB14DFAE7F2D91D1A3352929DAF5D1D6BD14A2C068F29049BB19D08C148A705266BF589F98EDAB3B4597
  1124. Version: v10.0.22621.1
  1125. HID.DLL
  1126. Address: 0x7FFCAA350000
  1127. SHA: 9E10C2F2137EC58F25E645B4DE81AF9E271D541ABD8DEFCFA6189D02609E0B4BA97544E3FF2917116735840E4A9F35F5C6ED70B9B0042C2FF991BC2171B91D99
  1128. Version: v10.0.22621.1
  1129. iertutil.dll
  1130. Address: 0x7FFC75100000
  1131. SHA: 74D1A8F88D9538188FF0E3B8F617B9DCAF0971B3656ECF1E171CC3CC9346CDADF82EA0A52392B4BDF9B48971F3D1BB25A9D73B266A9F93B487A273179F33B798
  1132. Version: v11.0.22621.1
  1133. igc64.dll
  1134. Address: 0x7FFC93970000
  1135. SHA: 3C03F103485A17C8E5AE45DE522B75892976E15565EEC5751E94DDD7CC0A3BD6C6BB84357FA073B7DD104AD8E486C689441F7099FF58C3E29FD0F8F8B6AECFE0
  1136. Version: v31.0.101.5186
  1137. igd10iumd64.dll
  1138. Address: 0x7FFC9DD90000
  1139. SHA: 8E7E41D652733EB26D074272DE467C6C4847315CA3C9FECB64CF2453AA758AD260D53FFBA1180DA01B739E9E3F9200BB05052500FD1422300BC138EFABA76A7E
  1140. Version: v31.0.101.5186
  1141. igd10um64xe.DLL
  1142. Address: 0x7FFC9C540000
  1143. SHA: 400C8014018DD194F8643450B18A5918402DD20671CDA77DAF0549E37469C6F55FB4E9D3B60FB1A9C6CF0D6B2CFA45654E59D458ABF6CD5ADC53A6A196670871
  1144. Version: v31.0.101.5186
  1145. igdgmm64.dll
  1146. Address: 0x7FFC9B6F0000
  1147. SHA: 857290694EAD1B3F857B817AD3EAD17D2AB36C85B0D183ADF901BB97AFE2E0FACFD0A10F6E50DA15A8481975CC934DEC28EF322B2AC6A313622AE09E36F0EB27
  1148. Version: v31.0.101.5186
  1149. imagehlp.dll
  1150. Address: 0x7FFCAD4B0000
  1151. SHA: F85AFA9E507F82C34E27325C85238102C0DF17B255D95F4A7B3FE6257C4B2BF3647C74950C9C87D446EFEAAF2200230D980DAD98D9FB3501FC07F3C0469F4874
  1152. Version: v10.0.22621.1
  1153. IMM32.dll
  1154. Address: 0x7FFCAD4D0000
  1155. SHA: 9448B30070EC124741432596B40D65C5EF47FF2EDD57EC4F741D20F0FE658136804CEFCD722149D310431C8EFF64C2A0186A60107139F98F5D9B2CF62A947406
  1156. Version: v10.0.22621.2792
  1157. inputhost.dll
  1158. Address: 0x7FFC645C0000
  1159. SHA: F5694EEE698C6F3DD6B217D4E82A426380309962483BB66BD8DF419DAB7B598139F27294549C1C6303F2DFC34052434ECA833936961864B3923A2CE158BF25FD
  1160. Version: v10.0.22621.2506
  1161. IntelControlLib.dll
  1162. Address: 0x7FFC9C4A0000
  1163. SHA: 11FAEA1C5A2A0610EFA17D0E5A23440F31EF92AD14746DDA50BBF98F27FFEE5A4B9D2F2E8C93100D4CAC123DEBB2DBAADC20D369323B2A989670C175A3F88F22
  1164. Version: v1.0.178
  1165. IPHLPAPI.DLL
  1166. Address: 0x7FFCAA780000
  1167. SHA: F65711439F5C50CD79295CB987757CA203C8AD418A807D5C0BC912E6D62133E89EB3725DF10998D8FE0589A5C9FF8A6E5303029BE0BA6C5935A1ED8C6C1D0E15
  1168. Version: v10.0.22621.1
  1169. kernel.appcore.dll
  1170. Address: 0x7FFCAAD00000
  1171. SHA: 12E80AF0DE827266DCD272BC14E74CE811498B3D52CC1ADB7EC6CDAD3EF6BD93A9A411620AA4A880356E01D04E29922FA670EAB67B810CFF4B95E4CB1B54803B
  1172. Version: v10.0.22621.2715
  1173. KERNEL32.DLL
  1174. Address: 0x7FFCAE5E0000
  1175. SHA: ABB29242349455997068A24AA4BDCE2F37710BEC169D7216D4FB13C9C71EC31289EF1BC100FB9A25CB7D92F49BDD519EE4E0C5F384CE39C37C62C8A00D0B94D6
  1176. Version: v10.0.22621.2506
  1177. KERNELBASE.dll
  1178. Address: 0x7FFCAC9C0000
  1179. SHA: 23BEA1CFADA071160B74E7CFC26FA4B8D334C304ED83CDEB4E1104F951378A110D6A409C09EC8BEA74BE1AA6B37CE4DD6E744A7000055A1F125317904376BFF6
  1180. Version: v10.0.22621.2506
  1181. libxess.dll
  1182. Address: 0x7FFBD5650000
  1183. SHA: FF63203BC0DF4975771A13622CB88617D0B90EDA81BC22A1BB21BDEF5E60DE89A959766ADAE453D447449993847BCA211E9FDF32F068F5D4DCD3C1786310833E
  1184. Version: v1.2.0.13
  1185. MessageBus.dll
  1186. Address: 0x7FFC74850000
  1187. SHA: 0783076531BF04E0AA7E5DEBFC0D1403A7D8A05DBD7EF524CB3DF7BBAF6BD13CA611742BB229BA24103DC1147BA69A7E26FDC46F2BD64A159A328C8E6B20CDD8
  1188. MMDevApi.dll
  1189. Address: 0x7FFC9BFA0000
  1190. SHA: 348075EED35676AD9E0642716EBACCB74B367EABBDCA39CCA38F73EFE9D778698FE797D8DE716BA31403B2E766A5604083D1307A6FF4F050EBD4515E01288CF9
  1191. Version: v10.0.22621.1
  1192. msasn1.dll
  1193. Address: 0x7FFCABCF0000
  1194. SHA: 8BC051B2C0A9D7ACF7199786F7D7B8F9AD844FBFEAE975EC37446EB39626C9092C149F292FB8F0F8F1383F97E66D7A6E729295AFA2DA5601E32488FF500B6FB1
  1195. Version: v10.0.22621.2506
  1196. MSCTF.dll
  1197. Address: 0x7FFCAE020000
  1198. SHA: 5ABE320BDCDBB135C42CC7B448C9ABD6C28F54A0BE3E3BA16CC0E83ECB1F6C202B2AB919E68834C6A1E5AA123295B932F515932BC5266D330D69456A2F466011
  1199. Version: v10.0.22621.1
  1200. msdmo.dll
  1201. Address: 0x7FFC98240000
  1202. SHA: F84E214D0AB3CE95B79C8FF0BB0F76A23F616437F593D885DDEA40AF6F6239E7B5DFC67D96626F2FC67959FD4C9E33606D65EA876FEB44131ABFBCCF1FA2A8BC
  1203. Version: v10.0.22621.1
  1204. MSVCP140.dll
  1205. Address: 0x7FFCA2110000
  1206. SHA: D5C62FDAC7C5EE6B2F84B9BC446D5B10AD1A019E29C653CFDEA4D13D01072FDF8DA6005AD4817044A86BC664D1644B98A86F31C151A3418BE53EB47C1CFAE386
  1207. Version: v14.38.33135
  1208. MSVCP140_ATOMIC_WAIT.dll
  1209. Address: 0x7FFCA44E0000
  1210. SHA: 1F844BFFF36A7EC0CC3A04B5C88248D952C6C38B7048AE92DEA3FFD8670C8B1C412AD44F2501816F6B80BCA9D5BB8A06CD920D4682BB52F08EF66A8A1D826405
  1211. Version: v14.38.33135
  1212. msvcp_win.dll
  1213. Address: 0x7FFCAC920000
  1214. SHA: 5C943F8312019A46458B57AF76D6A4E551E29579BFDD6EF063572848B7EC0B0B958FBC0480319C6666D46FD199F3467EDAA22ABFF5EEDBF1C45E82818C612CB5
  1215. Version: v10.0.22621.2506
  1216. msvcrt.dll
  1217. Address: 0x7FFCAEEA0000
  1218. SHA: 0AAA0877CBD1FF9CCDF5CE8466DBC968D17A306384DBF87F9BD2281B585149B0821B67B8CFCDDFB8BA2C4E6B78C5B7C163B31A284DFB90CF4D027D1BBF4BAFBF
  1219. Version: v7.0.22621.2506
  1220. MSWSOCK.dll
  1221. Address: 0x7FFCAB180000
  1222. SHA: 4854DB2070AA5DECAFF796C2049B2BB725BD4DB63DC6A25FF24B89AB725DD2FC251C0C9D24B75363906101DDC2981AB791467A17465337544F1D7FC1D5A94E22
  1223. Version: v10.0.22621.1
  1224. msxml6.dll
  1225. Address: 0x7FFC92180000
  1226. SHA: A1C3487F9C784FFEE19CA7FB9FA71D16D202A32333175A7FFE78F16C6971A12F5B62B8575FB5783E00176CE4CAD16FF18FEB286C40ED87FF4C834AFD44AC7632
  1227. Version: v6.30.22621.2506
  1228. napinsp.dll
  1229. Address: 0x7FFC75AB0000
  1230. SHA: 2E4AED6935FB2A52A6793523A91305CCE4B9F40C2DB9A0F82765BF3D36DF1B2D9CBBF4BFCED5537F4C93052241D154FA0940441F680E7F374273F0D0B47CC5A6
  1231. Version: v10.0.22621.1
  1232. ncrypt.dll
  1233. Address: 0x7FFCAB730000
  1234. SHA: EF0D97D2DEC67C8589B12DDDA3E467B3E0C38BAD417EE921BE2D361E740D97BAEF4988E5B4CF42E48631E0A0B4B2D399E664755069C56AD019A46AC766BA5AAA
  1235. Version: v10.0.22621.1
  1236. ncryptsslp.dll
  1237. Address: 0x7FFC9BBB0000
  1238. SHA: 71CCF5B407BB5D5EE27A0D13912B39883BB1943629296621D0BA34AE8B9C82A41BD812F18560B2908B0AE4C1E209071D761D6B8C191C10976FB43CCAD811038F
  1239. Version: v10.0.22621.2506
  1240. netutils.dll
  1241. Address: 0x7FFCAA700000
  1242. SHA: 5AA288FCFBECD42FAFCB4A487B6BD5DBAECF9DA2E40D822F8158FDD5BDA1E6DC6B823981C0FD612809C883A244AE6E921F06C51F800F1AE9560E80FEBBD8ACE4
  1243. Version: v10.0.22621.2506
  1244. nlansp_c.dll
  1245. Address: 0x7FFC63F50000
  1246. SHA: 4E7093FB9FAE0BDD9F015D706009D801EEE1FC6B78B92CC24862C7AA2824CB86E5E12677A9FBB0EFEC775FB7F722060E7404BCB5BCC56D56BBB6CB079BCCD363
  1247. Version: v10.0.22621.2506
  1248. NSI.dll
  1249. Address: 0x7FFCAE370000
  1250. SHA: F22EA147F31552A36EC647796129C17BE8F61BC2CD40FCFF05B77CB8749C142EE121C5E28ED5432EF235D509E53A3E738EE9CDBCB25D5987EE296EE0CB192059
  1251. Version: v10.0.22621.1
  1252. NTASN1.dll
  1253. Address: 0x7FFCAB6F0000
  1254. SHA: 203657805FBB142F95915CE0032A3518A165D384E472C6BBD9B97921146E48386A1DF75F9025A77ACC79D06AEEDAEEAC39643B859FE763964315FD97F6FCE874
  1255. Version: v10.0.22621.1
  1256. ntdll.dll
  1257. Address: 0x7FFCAF1F0000
  1258. SHA: 0329DCD2B519247786D285C4B2D262901E0923BABCD1F6A396E4FBDBC8D75F2D1DC384ABC5085E624EB377625A94A2393C69538A155CF852D26184DDE6E783D0
  1259. Version: v10.0.22621.2506
  1260. ntmarta.dll
  1261. Address: 0x7FFCABDE0000
  1262. SHA: C086490EE7AD1B25884378823E54315D3ADAF9E7EAF0966F4C1407C4D54C2D98486E2034EC6323DC76204058E3D079D69EE518F0946A7893C1C38FF212238BFC
  1263. Version: v10.0.22621.1
  1264. nvapi64.dll
  1265. Address: 0x7FFC99860000
  1266. SHA: BF5AB0096B56EFA46616EC7358283D7EE3CB4713E8F716AC4D9DBAADE45A099209C7C04814861C05F86F248288C6F5CE34E81FCE077315308B6801F93C2F1F8C
  1267. Version: v31.0.15.5186
  1268. NvCamera64.dll
  1269. Address: 0x7FFBDB170000
  1270. SHA: 6B850531FAB427F607739BA80E65BC0A02E56A6CDE4DAE12CC46AE3102A5CB25E47AC3E35B5877F77532BBFE37B1C90E76835EFB0C91F352B42F20F56E9B7BA0
  1271. Version: v7.1.0
  1272. nvcuda.dll
  1273. Address: 0x7FFBFF2F0000
  1274. SHA: 745F78A824260242E3CEB41E9740551C138E76B0C2922C9CB0B5BBFEE02D53403583FF6F3EFE20F562430B7F6E4DF04AEB04B431D63B5C7778242C4F6A265595
  1275. Version: v31.0.15.5186
  1276. nvcuda64.dll
  1277. Address: 0x7FFBDA750000
  1278. SHA: 98C35A2D559A3CD377EC4B19F200BA490F961BC393CE135FA85D9B22ED98154E0453104D6C8AEFA3DF3E156637BF7A1DC6A6E236F28FF9979A3F4FB27732FD16
  1279. Version: v31.0.15.5186
  1280. nvgpucomp64.dll
  1281. Address: 0x7FFC4BA30000
  1282. SHA: F36C72A335E82A226FD9B401B478C96465C7B3D7C779F495AB14DEB99269E313467DB2884775880FA59FC39CB274C381DA86300EAE7C65970AEA1311AD9DF163
  1283. Version: v31.0.15.5186
  1284. nvldumdx.dll
  1285. Address: 0x7FFC08B90000
  1286. SHA: 21A757DF8D61669A65BCEAEF1C40CF85A75AE125F06A0A8F491AC0F76BA4953D82E8EF088DB4BED72318F6401E335BE1D2BCF1FF3D46150320C6F8CB72333C20
  1287. Version: v31.0.15.5186
  1288. NvMessageBus.dll
  1289. Address: 0x7FFC72F70000
  1290. SHA: B09CA14A5FA75BBBDD99490120AE94BFFE083E311B0D02541D2499DA63C841E6798620FE9B04BA1E3837C3DAB8E6816B5D6442FDDC72D3F208811FEE391E23D1
  1291. nvngx_dlss.dll
  1292. Address: 0x7FFBD24D0000
  1293. SHA: 56037EF9ACEA29A074CFBD63D2F4B15325864DAC8F871EDED336D8EE50A4EDE7652212090009420A1A8E2EE4541DB238E17586DD0246FEE3F6A935B140B68BD7
  1294. Version: v3.5.0
  1295. nvngx_dlssg.dll
  1296. Address: 0x7FFBD18A0000
  1297. SHA: E7E49E838D14190D80B748ECD6168F58C64421B50EFFA9F930C08F28BF24ADD8D88226E0268B63DB61B80385052BA991AB24626F517F96C99B6B8B8670319751
  1298. Version: v3.5.0
  1299. nvspcap64.dll
  1300. Address: 0x7FFC09A10000
  1301. SHA: D0E47961DD6417D2202CAB0473624A50015F2D445D9949EB7D9B5C46526F6BED4710B3F9A342ADBEBEC8C6BFCCEB8122663349D1D240BDD18C2C278E290D29C9
  1302. Version: v3.27.0.120
  1303. NvTelemetryAPI64.dll
  1304. Address: 0x7FFC79B60000
  1305. SHA: 4CB08B41D5E5ED15348180354CD6672E5C6229D18C83D09E21001B7A51D5B3A6E43A1F0A474A6BDD0D3C8F756D3159122E2C539B0ECC9AB5ABA59DA83C9E0D70
  1306. Version: v17.1.7
  1307. NvTelemetryBridge64.dll
  1308. Address: 0x7FFC592F0000
  1309. SHA: 35690C721848A1845012BE05E4C51E8C717738812239C027177B4514F329684D2B6AF13B09ACC5C7EA740EE256807B383929D3DFD982065C0A0B232FC75AE713
  1310. Version: v17.1.7
  1311. nvwgf2umx.dll
  1312. Address: 0x7FFBCD7B0000
  1313. SHA: AFAD4D61504B5422D4237F8E372C9AB9F764C2ECC1A9F88A6E069BAB3ABC678AD6A815400F6CF37E4A669107C1FD0AF2E84FAF0604165ADC685B16AAC952FE89
  1314. Version: v31.0.15.5186
  1315. ole32.dll
  1316. Address: 0x7FFCAEF50000
  1317. SHA: C86ADEA499E29226C18BDFDFACEF9E207A2654B22D4B19F810950F4F91001CF322095541A88C6520FC64C740F7EE47CF855D6AB3191DAA0043331947ECDE647E
  1318. Version: v10.0.22621.1
  1319. OLEAUT32.dll
  1320. Address: 0x7FFCAD2A0000
  1321. SHA: 8A761F51D179351C390C0470EAB723F9D5CC5A573D7C188F31BB0157D306CA6DAACBA776B84F0B6ED5838F5A731CCF1F172C6263251D43A65B1E741FCB23FA91
  1322. Version: v10.0.22621.2506
  1323. ondemandconnroutehelper.dll
  1324. Address: 0x7FFC5E390000
  1325. SHA: 0F77E5F18A90721AB7607EA582A445998B3FCB8AA3229C7D80DA469F6C7D8A6A7EF54A00C96399B6BFDF551091AA65F54E03CB25A6CF08BE6AA6F88137DCDB5E
  1326. Version: v10.0.22621.1
  1327. PhotoMetadataHandler.dll
  1328. Address: 0x7FFC5C900000
  1329. SHA: A4C717D78AC2609E55AC5F7D3352683B44219D33023372B2F5A7CD1F27B5B173B1631D4F682443FD18E5023EE08748C0592F68490522E35C04498E89CBBD2246
  1330. Version: v10.0.22621.3235
  1331. PlayerHeadAndEyeTrackingTweaks.dll
  1332. Address: 0x7FFCA44C0000
  1333. SHA: ADEE177EFF81BF3B835A4E2DE9387920DAAA86C90CDBF54D128494FCB2E8ABB47A11800E1C31683FADAF8F64D8639AF766B480E6891519D2A08DAE543B1CA4D4
  1334. Version: v1.3.0
  1335. pnrpnsp.dll
  1336. Address: 0x7FFC63FA0000
  1337. SHA: 472C3B112C7B70C694801C9FD4CF8493E3205C06682C58B21F06F8A79B4D4DBCA7697B81A1CDCC9088F533B18599D54C5D898FC04ABD8CFC5C69FCD36739AB74
  1338. Version: v10.0.22621.1
  1339. POWRPROF.dll
  1340. Address: 0x7FFCAC060000
  1341. SHA: 4EFF753C079D957C28DE045901549A573F61E8E2CBB159935291E9024436C76C83E3C02B1CC181A9BED15582E1B8B1198D1F16700656B40A1B26B81C2241F41F
  1342. Version: v10.0.22621.2506
  1343. profapi.dll
  1344. Address: 0x7FFCAC430000
  1345. SHA: 5BCBDDD4E031D4D4CADCC00842624028D5A71D70B44BDAF4CFF5D9A608D63BA0AB22FBF9FC63FE103B3A6C995D530B04C83C59BA9C039D053F86A18776997878
  1346. Version: v10.0.22621.2506
  1347. PROPSYS.dll
  1348. Address: 0x7FFCA3B80000
  1349. SHA: EC091C9019C73A3517588B9949E89A5508897841302E396D68B54FFAE555ACD31D50B0BE42E7288183F0AD37A54BF52EA235E7D382C9753A84F4CDAE3DF35C26
  1350. Version: v7.0.22621.2506
  1351. PSAPI.DLL
  1352. Address: 0x7FFCADF90000
  1353. SHA: E9F89DE9A1AB74BB4358FB636C389356554C84AF4128BC5834681BBFD897D69B12FE5B1521F3846D65726D4E1C62DD87EBEB7DDD3BB1FA940150F9B5AF19FB17
  1354. Version: v10.0.22621.1
  1355. QuickLoweredWeapons.dll
  1356. Address: 0x7FFCA4410000
  1357. SHA: ECD27F34F3430C534D189248C12AA3ED95B0246C8A2325AD99F710C413045D1280A0D0100644E3D1607846F62D27969AC36B2E883B356DE9C5416AE4A8DBAD87
  1358. Version: v1.7.0
  1359. rasadhlp.dll
  1360. Address: 0x7FFCA1EE0000
  1361. SHA: E1E34DF6475CA787D2340A340659854D2144D72BE0856C3262E98E170843E7C26874544ACFA5D186623C1C8DEC70232FC73033416F3E2A9A4076EF0820356681
  1362. Version: v10.0.22621.1
  1363. RealTimeFormPatcher.dll
  1364. Address: 0x7FFC11550000
  1365. SHA: A473ECCB45F210D7F19D6B02FB5F2420EC11338191D126CD97A8E31EE688EBCB543B7B1D567262FE9E04D012DA18777185CE584A190D65F9E37600FC8DA72E89
  1366. Version: v1.0.0
  1367. ResampleDmo.DLL
  1368. Address: 0x7FFC1D680000
  1369. SHA: C6F24BA3BCD0FBE293293BE4166F18CBE9EE1F97CCAF5DBAD7B758D0B7C15FDE1E26155E07A077324B3D06B483337CADC8D2A10A4ACE00ECA69881608D770046
  1370. Version: v10.0.22621.2506
  1371. resourcepolicyclient.dll
  1372. Address: 0x7FFCA9730000
  1373. SHA: BBB7EAEBD0BE2637060033B8C4E3B9131620DC80725C3640364F01542DD46F53D4EE90C0ADA5C4E86936397E01EB6960A0ED41A11707A8EC088D1D8078D4524A
  1374. Version: v10.0.22621.1
  1375. RPCRT4.dll
  1376. Address: 0x7FFCAE900000
  1377. SHA: E761EE826C90C9598AE2D38EDD80DBE6A2EDE7F014A4710F872CAA970A391CEB0A088D51777C993AF3ED95EE23278D75F97420D85735A6DA2FB56B19B8AB5908
  1378. Version: v10.0.22621.2506
  1379. rsaenh.dll
  1380. Address: 0x7FFCAAFB0000
  1381. SHA: 96D992D32CBDF63A47DE618A7AA5498DF95A3CB386A593322156749658577E099EFD48920DE4F301729F84ED601EAF134C863C7558914B9E1DFBF9B9CDBFBA85
  1382. Version: v10.0.22621.1
  1383. schannel.DLL
  1384. Address: 0x7FFCAAB90000
  1385. SHA: 88C6B67C78EC87D4BC1E6AAE612FBD5870DADE1A8FE3C0489CE16CBC9E461F1131D53D35A30EFF64EC3856229A03149C24B967945BF7D3A2A79CD879839A902D
  1386. Version: v10.0.22621.1
  1387. sechost.dll
  1388. Address: 0x7FFCAE380000
  1389. SHA: C4D5F33D8B00C38EB1C41B155C85369177C11B405305E445C9E5C6F72904B65F37A7A9911F519A8EEFE79D92948D28355EFE6B3EC7EF893A92E0CC5304007BB7
  1390. Version: v10.0.22621.1
  1391. Secur32.dll
  1392. Address: 0x7FFCAAB10000
  1393. SHA: E296A462AFD8980A9497EF9E1D3EC4F81285D450BF8A8BCC3AC056A39F85B0E12F59653688EBE60E302FA5B8819F4ABACE722C791954D3EA81D85182E85264CA
  1394. Version: v10.0.22621.1
  1395. SETUPAPI.dll
  1396. Address: 0x7FFCAEA20000
  1397. SHA: 4C618C9C7E16D701A03B901AF668E5927E8BAC2CD160D1D072EFCD2EB9DB62ABAA1422A57B19F9896A2E6CD8D64DC8A80BD1FC54302447601CBF94D977C62CCA
  1398. Version: v10.0.22621.1
  1399. SFPluginsTxtEnabler.dll
  1400. Address: 0x7FFC1D100000
  1401. SHA: 482EB12FB560E201D44B95D7B2F9FC9237817DE19459D453722AB5F1B863170C1898DF39F23DFD94511A7260C7EE08981D6F9EB82EA68FA97219FEFF06236CE9
  1402. sfse_1_10_32.dll
  1403. Address: 0x7FFC6ED20000
  1404. SHA: 25756B3589226E84E4C783A2094788C52721D782A6A0277C7FE7DF91755EB2B7B553B15687C9A3D214C513EF443BDA76B10A81DBDE0706F5157C6A17D9882FE6
  1405. Version: v0.0.2.6
  1406. SHCORE.dll
  1407. Address: 0x7FFCAE180000
  1408. SHA: 4C6F7A02E3D9867C325815BEFB6C68A21A5D9633B4C4B1ED99C5B3777D5C58F68589EE132CA6427AED9B7C58FD7F3E49CF95347F623BB8FB3E93D69FF97F71CD
  1409. Version: v10.0.22621.1
  1410. SheatheWeaponInHandscanner.dll
  1411. Address: 0x7FFC98690000
  1412. SHA: 7BFABE7873F2D1A431C39A58139BECB4D5BB014DC23F377354769F6B630D3FE5A70A872039B6645C2AACD6C34D2174E3D31B5D632E6168478D1CCE622EF63EFA
  1413. Version: v1.5.0
  1414. SHELL32.dll
  1415. Address: 0x7FFCAD730000
  1416. SHA: DC200D2B5AE4A48AE2614B43F18C9640ED9C4EC019573B9EF5F5CF7131310A418DBB6D2761AD7381B494AD755073A70B8873349630563AA7C623358F81F80992
  1417. Version: v10.0.22621.2792
  1418. SHLWAPI.dll
  1419. Address: 0x7FFCAE7A0000
  1420. SHA: 9A8BB330CAADA913EFA3ACD3E35217D02ED1F2844B0D201CEE85833A6BF4C42A6B3A8916032676FE77258152D27A894EE807148E861F2919D627C9AD6B2A5DFE
  1421. Version: v10.0.22621.1
  1422. sl.common.dll
  1423. Address: 0x7FFC0FA20000
  1424. SHA: 843457A2F9F0BA83B6C2FEA37FB05F1C52F715C2046232C904DF79B1ED30F3725B967163EBFE5B3F01DAABBD9CAC27799C80DBF8269211F5319FD62F3EEF7B3E
  1425. Version: v2.2.0
  1426. sl.dlss.dll
  1427. Address: 0x7FFC1AAC0000
  1428. SHA: 54B6D2F71B8D16114AE1A576A37E64683BA91CD8BB8AA379706D5AE21DF4571B6B4126F1085E6E5A2448D7E8B169539642AD5D7A31012C4FDEB9AC38B62ED7B8
  1429. Version: v2.2.0
  1430. sl.interposer.dll
  1431. Address: 0x7FFC4DE20000
  1432. SHA: 4197A38D36FE41A21B11814B00F17F5BF2AE7F418DC5CCB94A6C097615B87B9C5B530DFA0296CA0580BB5618D0AB43AC02C2E1FC08E07D55B5E8BBFF8DA7160A
  1433. Version: v2.2.0
  1434. sl.reflex.dll
  1435. Address: 0x7FFC98190000
  1436. SHA: C5DF9877DEDFCC443ECAD9A8EA0F10C5DC8C97C4F6F10A1BEA1831AF6EB27D89C695F67B55E451603A6550EBA084E0CD7B676FE8C56E302324025D9A97ED7FC5
  1437. Version: v2.2.0
  1438. SPINF.dll
  1439. Address: 0x7FFCAB210000
  1440. SHA: 675E09DAA5DA999ABD859B10A3FDA32D33F74B61BBDDF49BC88CB35B365D535459BF170A2E8ABBA503B00AAA1F2849D1F7D242D2F7F4A13E665E44C807678185
  1441. Version: v10.0.22621.1
  1442. srvcli.dll
  1443. Address: 0x7FFC73DE0000
  1444. SHA: B77DB680CE6D41EE6E573209A44B8ABC44CFF77D64BB4A32B17E7E52CAE0EDA1488FCC5E3BA3B7937252798FF92395D77974DB2BFCC7A775AB20E2E895EECED1
  1445. Version: v10.0.22621.2506
  1446. SSPICLI.DLL
  1447. Address: 0x7FFCAAF20000
  1448. SHA: 9ABC3C971A7C0382149FC03EDCFFB6B502E7DC6D12A4C1D31B7624580956F42A6CAF7BAE74B8ED5640F7CCB9CDD46669AA1419AB45EBCCCDB4C670FD45F79889
  1449. Version: v10.0.22621.3235
  1450. Starfield.exe
  1451. Address: 0x7FF705D00000
  1452. SHA: B2875F2848C88C5488C4612E1462A9F9184AED163EF57D890FBD11E324A1BE726E2BC4B96400C5723E34D56F9DF94BFCE862D8BEC68C882C24364667DFF65FF9
  1453. Version: v1.10.32
  1454. steam_api64.dll
  1455. Address: 0x7FFC7B670000
  1456. SHA: C08DE8C6E331D13DFE868AB340E41552FC49123A9F782A5A63B95795D5D979E68B5A6AB171153978679C0791DC3E3809C883471A05864041CE60B240CCDD4C21
  1457. Version: v7.40.51.27
  1458. steamclient64.dll
  1459. Address: 0x7FFBDB9E0000
  1460. SHA: 02D8221AB2C57A861CA0FAB2013385FBE802E6E49D3274CB8B21E6D2ED227E1D964FD2F780703B4D06889BB6AD9A49531C512596A2EAFD7E4A3388149B209E06
  1461. Version: v8.74.80.95
  1462. textinputframework.dll
  1463. Address: 0x7FFC68C90000
  1464. SHA: 9600D3427040584D87DBC98B4207209436B4318D64FFE0686BC2A5DD4F0CC7DE16CFE2E3001E912192E0598CC73C2A6EB4782BA5E07FACE18227C715DC4B514C
  1465. Version: v10.0.22621.3235
  1466. tier0_s64.dll
  1467. Address: 0x7FFC119C0000
  1468. SHA: 4D8ABD59BD77BDB6E5B5E5F902D2A10FA5136437C51727783E79AED6A796F9EE1807FAF14F1A72A1341B9F868F61DE8C676B00A4B07A2A26CFB8A4DB1B77EB3C
  1469. Version: v8.74.80.95
  1470. trainwreck.dll
  1471. Address: 0x7FFC118B0000
  1472. SHA: 261801A85D41236E35C820A78E4BC3E775EBF0C19336EF1D518A61DA20429BB30B707181606675C1BC650D678CA0A27DC585DFA35BDDD717EB830459BFF60333
  1473. Version: v1.4.0
  1474. twinapi.appcore.dll
  1475. Address: 0x7FFC9EAB0000
  1476. SHA: 6E30ABF4E9B131F99D954D99F12CEBD766D94F8AB8FBB4035582AA5FD6DB6FE6B37D5A298EE89F57829D0CD708F91DE0E40784D343DC2CA53801CB94EA882F48
  1477. Version: v10.0.22621.1
  1478. ucrtbase.dll
  1479. Address: 0x7FFCAC800000
  1480. SHA: AFDC5CEF11E96483617AF9D72127A6D1C32CCF774F8B76988EB89018155334FA56BF388CC8C1DB31C8E37B577900EFD058F066D26D7CA0ADD740D99D00C9F157
  1481. Version: v10.0.22621.2506
  1482. UMPDC.dll
  1483. Address: 0x7FFCABCD0000
  1484. SHA: 8981D794A568A6674E504AAAC4FD9C6CC9A04DA5AA7A870E4107D2E157786D6BA51C48C4E177B31C09068D03F28715DE27790EB0DACBA2F3297B7AF3A8A1BF97
  1485. Version: v10.0.22621.1
  1486. urlmon.dll
  1487. Address: 0x7FFC73E10000
  1488. SHA: C9FF5C62B2F709DE31E43F3780EA2EA27A1E4470C01ECAC0C1B3B66A9DDB525E2E9BDD6DF9FCC5081B760023DAA9D5A2DFA086F631D1EA01F3D129EC21E772C8
  1489. Version: v11.0.22621.2506
  1490. user32.dll
  1491. Address: 0x7FFCAE430000
  1492. SHA: 82D77F2832D186D76A39248BAEDF16C77000DF8286FB19427A8939A3317C30A046A06A007F7B95E17C101D74B8FDD080F50380039C61A5C8EA3DCD2C5E145848
  1493. Version: v10.0.22621.1
  1494. USERENV.dll
  1495. Address: 0x7FFCAB5A0000
  1496. SHA: 741DF40070D361450B2E08F7D006B804FAA7A6990D44A27C0D08D7599C7B06B973CA6D1C7D3CE62980BF6583826F8615D3733847F87F2DD1CC4FDEDF5F4CBCC5
  1497. Version: v10.0.22621.1
  1498. uxtheme.dll
  1499. Address: 0x7FFCA6150000
  1500. SHA: ACCD016ABD26060F03E3B227D1E97D4AF6787BEFACEA3CF38C060A51229382EC34214904A6BE1F3801A9A499DD307C275662A0AF93E47B5FA989D07E6BE1DE95
  1501. Version: v10.0.22621.1
  1502. VCRUNTIME140.dll
  1503. Address: 0x7FFCA3700000
  1504. SHA: 00CF9B22AF6EBBC20D1B9C22FC4261394B7D98CCAD4823ABC5CA6FDAC537B43A00DB5B3829C304A85738BE5107927C0761C8276D6CB7F80E90F0A2C991DBCD8C
  1505. Version: v14.38.33135
  1506. VCRUNTIME140_1.dll
  1507. Address: 0x7FFCABD80000
  1508. SHA: D15905A3D7203B00181609F47CE6E4B9591A629F2BF26FF33BF964F320371E06D535912FDA13987610B76A85C65C659ADAC62F6B3176DBCA91A01374178CD5C6
  1509. Version: v14.38.33135
  1510. VERSION.dll
  1511. Address: 0x7FFCA1010000
  1512. SHA: FDB97254817D6793A4C5854A4CFA53DDED1B25E578167C2AB9A8EEC67396F4CBC825ACBF61D915B57998C415F9A00F1AE2C40536C53EA45D4037B64F3E1343D7
  1513. Version: v10.0.22621.1
  1514. vstdlib_s64.dll
  1515. Address: 0x7FFC1D440000
  1516. SHA: 8F86A23EA47F5686C79B11717FE6F7456E327E99A06744EA8E7788DE86919B93EC3C7752417CA03A437A1B3918A6BD0EAF5F6AA4E94595C4A9B4E747935CDBCB
  1517. Version: v8.74.80.95
  1518. vulkan-1.dll
  1519. Address: 0x7FFC043B0000
  1520. SHA: C5921FE7F83CCC2EF7734237CA90E435D77C6EDB55165D20EB69587A6D6A6F3FBF7F1CC09FFE492651EDF2ADEF925D06C2EB50AD35975971D3AAE86863475D6E
  1521. Version: v1.3.275
  1522. wbemcomn.dll
  1523. Address: 0x7FFCA1020000
  1524. SHA: 2FF9B8EC7D0F3A167084E4AE0FCC936008BD7D6690B59F601D75E5C328ADDDC67496461A53F8B4BDA755CAEFEAA77E4038AF7CF93DA135590C6C37A9F52DD055
  1525. Version: v10.0.22621.2506
  1526. wbemprox.dll
  1527. Address: 0x7FFCA10A0000
  1528. SHA: 02EF4CE2C46A84CD218D4D417E8F0E55EC0A05F4B58498A98EA05456DB2CD5F74280C8CF45AD3426868B4A64E0B7F1EC5899FE1B4788C746E29AA43E3423795F
  1529. Version: v10.0.22621.3085
  1530. wbemsvc.dll
  1531. Address: 0x7FFC9E960000
  1532. SHA: FBA2F069474DC5D2B89D0FF71BDC9F86B22FB1A480C0DBE8CE61DF6CE18009D5FE0F7E763C647F63B1C011998D8DDAA01EA7AC6B929CCDEA4DB9054554B2F980
  1533. Version: v10.0.22621.3085
  1534. webio.dll
  1535. Address: 0x7FFC9BBE0000
  1536. SHA: C9206ADF4B01B889BF6AAD3499B8D1C61FC40C71223177A44A85D118858CC54017CDA2F522BFD36C20AD015FD194D8777317A19787D0DC562B8DF668DAF9700C
  1537. Version: v10.0.22621.1
  1538. win32u.dll
  1539. Address: 0x7FFCACEE0000
  1540. SHA: 9BAF501F46BC83B5C1450731B51362E34D4E8E796ED342B7B00CFCF767F9BD076DD05A927F2EA568F679E24FD824D242D8C702D361EB1067AF317BDC1AE91F73
  1541. Version: v10.0.22621.3085
  1542. Windows.Gaming.Input.dll
  1543. Address: 0x7FFC9EE40000
  1544. SHA: B032E8268D2717C51F27C9DDD09DB8623D14EFC57F3F0889D73647F86EFBF66F88516AC45003AE3A5B6CC16C3D99196A515469D2CB97CCA1F9CB7EE730C70D3D
  1545. Version: v10.0.22621.1
  1546. windows.storage.dll
  1547. Address: 0x7FFCA9A10000
  1548. SHA: 63D51D2990024DAB90DCD1D0B72FAD7F2A1452FAB3AF534C6D46D92FD98DEAE232A42AAC57ACF21D4172A57D2EB3A285EAFD40272CF0FD2D76DCFD5F698D52D7
  1549. Version: v10.0.22621.2506
  1550. Windows.UI.dll
  1551. Address: 0x7FFC97CF0000
  1552. SHA: 056E5112C6717B28A1050F72B299F70B09D6F6125B007A7FFDFF1B302572AEB21A292756B86D222134453D364CB46075D8876FBC34662527F474F4A14FE74BB2
  1553. Version: v10.0.22621.1
  1554. WindowsCodecs.dll
  1555. Address: 0x7FFCA4670000
  1556. SHA: 79C388049C34679E1BFCD22B5EEAF967F523B6AAB4B86F6B2CF585395C7489C8E7AE1D0322406E42C4660011C0A2EDD677B03D5DEAF62D5F8CEFCFF385FDE294
  1557. Version: v10.0.22621.2506
  1558. windowscodecsext.dll
  1559. Address: 0x7FFC0F980000
  1560. SHA: 48BBF72DE63B6C1BD096EC1CF79F97E1ED780B10A479BF09002772061B1CE722687EA4E8731FAFB9D61AC9399D146256DDCB24E76EC915AEDEB97313F46A6D5C
  1561. Version: v10.0.22621.1
  1562. WINHTTP.dll
  1563. Address: 0x7FFCA35B0000
  1564. SHA: 3081D98BB9A2390C193C03B40222FF0B51A48BBDC5163345063DE5C3AB17D72AD1E40A1747AC3939EE34B3D2B2037C0B6BA00AE116D814B5D232228D4AEBFBD2
  1565. Version: v10.0.22621.1
  1566. WININET.dll
  1567. Address: 0x7FFC8FDB0000
  1568. SHA: 14F2D4A4CE6100064C1713E3C9D6D64AE73FD8B0B82DAD4033808F6149CFA5EE3475B8670F5B8016C9FF7964595D58D94E120F112D14D0EC0B77CA120304F4DE
  1569. Version: v11.0.22621.1
  1570. WINMM.dll
  1571. Address: 0x7FFCA1FB0000
  1572. SHA: 761C3AA655C2760FAE25B17192CB7F8F9D2B802504B5369B0A5CC32691A68C72B1DBD5C33F2D61062665A40D33FA9D2259C99EB3B7687EDF091BD4CBD576861A
  1573. Version: v10.0.22621.1
  1574. winmmbase.dll
  1575. Address: 0x7FFC88FE0000
  1576. SHA: 9AA1B67EE51054D7CB09B3F574BC50CF072E3559D0779C894C55253E16E16AB4966D46BA5F2B3297F8693B308511D41F11A867BE5178C03269E74DF6ACFA3215
  1577. Version: v10.0.22621.1
  1578. WINNSI.DLL
  1579. Address: 0x7FFCA8F40000
  1580. SHA: B4032A92D43AFEDF8C97B29519366DC0046BD804359BE616C4B844903F67A0D11C0DA42970FCE7D35772AFAEE5AFA8251EBBA5C2BEB0B9ABCED405927CB53775
  1581. Version: v10.0.22621.1
  1582. winrnr.dll
  1583. Address: 0x7FFC63F80000
  1584. SHA: 9418D0135EC807E73EA6D33F2A149EF220A0104FBA1F6BF21C2D86498BFA4EA4D35E217C8F14868EBE4779BC6BD587543E8D9B846DA65766E5E0AF83B9FDC7EC
  1585. Version: v10.0.22621.1
  1586. wintrust.dll
  1587. Address: 0x7FFCAC790000
  1588. SHA: EAC8FA3A7AC343BBC4884909EE61EF1A1CF7030705CB37DD60AB016F3B4221EADFC5DA7BABD7AC6EEF9DEAB48B020B79A8233ED01A45D8DD508BADEF8822BE89
  1589. Version: v10.0.22621.3085
  1590. wintypes.dll
  1591. Address: 0x7FFCA98D0000
  1592. SHA: 4DB35BCD512940F7AEDFCF3D9F3EB656FC879825CCCADFBDA0080FA20A921A3148285A8279E2F38780B2FF64C7CD516EC14EDCEDBF845D69EC09007C1619EDB3
  1593. Version: v10.0.22621.1
  1594. WLDAP32.dll
  1595. Address: 0x7FFCAD6D0000
  1596. SHA: E0C5550C81774A923E45B68888A7FAE5D94EBCEBAA7693965C0D0668B3E4780415EF2ECD6A9C4577BB84D33AE5E413A9225B0A39FB47FF0172B570C2BA5D9049
  1597. Version: v10.0.22621.2506
  1598. wldp.dll
  1599. Address: 0x7FFCAB660000
  1600. SHA: 5898B4A6E7392ACF069749A05DE2725A29E8DFF38DD7AE611B7D4D562CE41374DE5C1EFAC7A6391F16DD37334A337EDFCCE2D25BDF8130C625DF737C7ACE22B3
  1601. Version: v10.0.22621.2506
  1602. WS2_32.dll
  1603. Address: 0x7FFCADFA0000
  1604. SHA: 1319EA1AE10DC1BD0E378E611107071B5A11E51FCB1A2B3EE26CE69D648B334541F795F33ABB6F070D760FE60ADF7962CC6D7C902A37EA5C7797A8DE88270E4B
  1605. Version: v10.0.22621.1
  1606. wshbth.dll
  1607. Address: 0x7FFC75AE0000
  1608. SHA: 288F4EBABB0D37EDA67867820D62BA660A07A058917638A5E6324DA5E7F29747022897E3F76F95DD464246964CB33DFAB3112914AE19A19D2DD0129473602D04
  1609. Version: v10.0.22621.2506
  1610. WSOCK32.dll
  1611. Address: 0x7FFCA2BE0000
  1612. SHA: D2DDA7DE4D1F4905614AF1244534D9A30407AAFE6DEC400053544050745494925352378ED44D4779268E5F0D502A04D08A02BD6D9BD44AB791F3E6A06BEB01A0
  1613. Version: v10.0.22621.1
  1614. XInput1_4.dll
  1615. Address: 0x7FFC3AA70000
  1616. SHA: 4EEDFEA0C84997494227BDA221FA3605898D5453461A9C274C72F96C2890D6AA74A252BC498472D994C32C86BB68F254E92AB23DF5153377CC721028F517823E
  1617. Version: v10.0.22621.1
  1618. XINPUT9_1_0.dll
  1619. Address: 0x7FFC992B0000
  1620. SHA: 6FABF948ABE6292FCA6FD3BB29ABC6B624E8FF9E2BBF2BA39E6B8ABB42C4D2A29A31C1089C29DCB59DB2EE6B1CFE0880EBFF2575DC540D149CEAFFC422512FDF
  1621. Version: v10.0.22621.1
  1622.  
  1623. SCRIPT EXTENDER PLUGINS:
  1624. BakaAchievementEnabler.dll v2.4.0
  1625. ConsoleCommandRunner.dll v1.4.5
  1626. PlayerHeadAndEyeTrackingTweaks.dll v1.3.0
  1627. QuickLoweredWeapons.dll v1.7.0
  1628. RealTimeFormPatcher.dll v1.0.0
  1629. SFPluginsTxtEnabler.dll
  1630. sfse_1_10_32.dll v0.0.2.6
  1631. SheatheWeaponInHandscanner.dll v1.5.0
  1632. trainwreck.dll v1.4.0
  1633.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement