Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- SkyrimSE v1.6.1170
- trainwreck v1.4.0
- Unhandled exception "EXCEPTION_ACCESS_VIOLATION" at 0x000000000000
- SYSTEM SPECS:
- OS: Microsoft Windows 10 Pro 21H1 19043
- CPU: AuthenticAMD AMD Custom APU 0405
- GPU #1: AMD Custom GPU 0405 (RADV VANGOGH)
- RAM: 7.66 GiB/11.51 GiB
- PAGE FILE: 8.62 GiB/12.51 GiB
- PROBABLE CALL STACK:
- [0 ] 0x000000B99820 dxgi.dll+01B9820
- mov r15,[rsp+1A0h]
- [1 ] 0x0001EFE038A7 WINHTTP.dll+00038A7
- test eax,eax
- [2 ] 0x0001EFE03B2B WINHTTP.dll+0003B2B
- mov edx,[rsp+80h]
- [3 ] 0x0001EFE0503A WINHTTP.dll+000503A
- mov esi,eax
- [4 ] 0x0001EFE1362F WINHTTP.dll+001362F
- mov esi,eax
- [5 ] 0x0001EFE13CB2 WINHTTP.dll+0013CB2
- mov rcx,[rbx+28h]
- [6 ] 0x0001EFE095F8 WINHTTP.dll+00095F8
- mov rdx,rbx
- [7 ] 0x000170064DEA ntdll.dll+0064DEA RtlProcessFlsData
- test byte ptr [0A0A6h],8
- [8 ] 0x00017006512D ntdll.dll+006512D RtlProcessFlsData
- mov eax,[r15+7Ch]
- [9 ] 0x00007B62A239 kernel32.dll+002A239
- mov ecx,eax
- [10] 0x000170061AA7 ntdll.dll+0061AA7 RtlUserThreadStart
- int3
- REGISTERS:
- RAX 0x0 (size_t)
- RBX 0xE3 (size_t)
- RCX 0x850 (size_t)
- RDX 0x1002EF940 (void*)
- RSI 0x0 (size_t)
- RDI 0x1002EF940 (void*)
- RBP 0x1 (size_t)
- RSP 0x1002EF758 (void*)
- R8 0x1 (size_t)
- R9 0x1002EF93C (char*) "\x01"
- R10 0x0 (size_t)
- R11 0x1002EF8E8 (void*)
- R12 0x2C49FE10 (char*) "@"
- R13 0x2C498C88 (char*) "\x03"
- R14 0x850 (size_t)
- R15 0x1002EF93C (char*) "\x01"
- STACK:
- [RSP+0 ] 0xB99820 (void* -> dxgi.dll+01B9820)
- mov r15,[rsp+1A0h]
- [RSP+8 ] 0x1002EF6F8 (void*)
- [RSP+10 ] 0x1002EF6F4 (void*)
- [RSP+18 ] 0x1002EF6FC (void*)
- [RSP+20 ] 0x0 (size_t)
- [RSP+28 ] 0x2C00000000 (size_t)
- [RSP+30 ] 0x0 (size_t)
- [RSP+38 ] 0x0 (size_t)
- [RSP+40 ] 0x0 (size_t)
- [RSP+48 ] 0x1002EFA00 (void*)
- [RSP+50 ] 0x2C498C88 (char*) "\x03"
- [RSP+58 ] 0x0 (size_t)
- [RSP+60 ] 0x1002EF9EC (void*)
- [RSP+68 ] 0x0 (size_t)
- [RSP+70 ] 0x3AFEF99E1 (void* -> secur32.dll+00099E1)
- add rsp,88h
- [RSP+78 ] 0x2 (size_t)
- [RSP+80 ] 0x17002D2C9 (void* -> ntdll.dll+002D2C9 RtlAllocateHeap)
- mov r12,rax
- [RSP+88 ] 0x2C00000000 (size_t)
- [RSP+90 ] 0x2BF20000 (void*)
- [RSP+98 ] 0x20202020008013C (size_t)
- [RSP+A0 ] 0x1002EFAF0 (char*) "\x04"
- [RSP+A8 ] 0x1002EFA00 (void*)
- [RSP+B0 ] 0x1002EF9EC (void*)
- [RSP+B8 ] 0x0 (size_t)
- [RSP+C0 ] 0x1EFE24A20 (char*) "netconn_negotiate"
- [RSP+C8 ] 0x3 (size_t)
- [RSP+D0 ] 0x1EFE220E0 (void* -> WINHTTP.dll+00220E0)
- add [rdi+69h],dh
- [RSP+D8 ] 0x3F9F0000 (void*)
- [RSP+E0 ] 0x1EFE24A20 (char*) "netconn_negotiate"
- [RSP+E8 ] 0x1EFE220E0 (void* -> WINHTTP.dll+00220E0)
- add [rdi+69h],dh
- [RSP+F0 ] 0x1002EF990 (void*)
- [RSP+F8 ] 0x1002EFA00 (void*)
- [RSP+100] 0x170061CD7 (void* -> ntdll.dll+0061CD7 __wine_dbg_header)
- movzx eax,al
- [RSP+108] 0x1002EFAF0 (char*) "\x04"
- [RSP+110] 0x0 (size_t)
- [RSP+118] 0x318F7A60 (void*)
- [RSP+120] 0x0 (size_t)
- [RSP+128] 0x2C498C88 (char*) "\x03"
- [RSP+130] 0x8013C (void*)
- [RSP+138] 0x0 (size_t)
- [RSP+140] 0x3AFF00140 (void* -> secur32.dll+0010140)
- test eax,eax
- [RSP+148] 0x1EFE24A20 (char*) "netconn_negotiate"
- [RSP+150] 0x2C307B80 (void*)
- [RSP+158] 0x1002EFAF0 (char*) "\x04"
- [RSP+160] 0x2C37E4C0 (char*) "a"
- [RSP+168] 0x3 (size_t)
- [RSP+170] 0x1EFE220E0 (void* -> WINHTTP.dll+00220E0)
- add [rdi+69h],dh
- [RSP+178] 0x90312 (void*)
- [RSP+180] 0x1002EFAF0 (char*) "\x04"
- [RSP+188] 0x2C37E4C0 (char*) "a"
- [RSP+190] 0x1EFE038A7 (void* -> WINHTTP.dll+00038A7)
- test eax,eax
- [RSP+198] 0x0 (size_t)
- [RSP+1A0] 0x0 (size_t)
- [RSP+1A8] 0x1002EFA00 (void*)
- [RSP+1B0] 0xE3 (size_t)
- [RSP+1B8] 0x100000000 (void*)
- [RSP+1C0] 0x0 (size_t)
- [RSP+1C8] 0x0 (size_t)
- [RSP+1D0] 0x0 (size_t)
- [RSP+1D8] 0x2C307B80 (void*)
- [RSP+1E0] 0x1002EFAF0 (char*) "\x04"
- [RSP+1E8] 0xE3 (size_t)
- [RSP+1F0] 0x2ABE85A0 (char*) "\x16\x03\x03"
- [RSP+1F8] 0x800 (size_t)
- [RSP+200] 0x2C307B80 (void*)
- [RSP+208] 0x2C49FE10 (char*) "@"
- [RSP+210] 0x1EFE03B2B (void* -> WINHTTP.dll+0003B2B)
- mov edx,[rsp+80h]
- [RSP+218] 0x0 (size_t)
- [RSP+220] 0x1002EFAD0 (char*) "\x19"
- [RSP+228] 0x17006E620 (void* -> ntdll.dll+006E620)
- loopne 0FFFFFFFFFFFFFFE7h
- [RSP+230] 0x2C (size_t)
- [RSP+238] 0xE3 (size_t)
- [RSP+240] 0x0 (size_t)
- [RSP+248] 0x0 (size_t)
- [RSP+250] 0x0 (size_t)
- [RSP+258] 0x1002EFAF0 (char*) "\x04"
- [RSP+260] 0x1002EFA00 (void*)
- [RSP+268] 0x1002EF9EC (void*)
- [RSP+270] 0x0 (size_t)
- [RSP+278] 0x1002EF9EC (void*)
- [RSP+280] 0x2C74953A0 (void* -> ucrtbase.dll+00253A0 _assert)
- push r14
- [RSP+288] 0x2C5CD100 (char*) "M"
- [RSP+290] 0x8811C7002C4CB (size_t)
- [RSP+298] 0x2000000E3 (size_t)
- [RSP+2A0] 0x2ABE85A0 (char*) "\x16\x03\x03"
- [RSP+2A8] 0x100000000 (void*)
- [RSP+2B0] 0x1002EF9F0 (void*)
- [RSP+2B8] 0x200000000 (size_t)
- [RSP+2C0] 0x1002EFA20 (void*)
- [RSP+2C8] 0x200000000 (size_t)
- [RSP+2D0] 0x0 (size_t)
- [RSP+2D8] 0x0 (size_t)
- [RSP+2E0] 0x0 (size_t)
- [RSP+2E8] 0x1EFE4B844 (char*) "secur32.dll"
- [RSP+2F0] 0x2C307B80 (void*)
- [RSP+2F8] 0x0 (size_t)
- [RSP+300] 0x2C37E4C0 (char*) "a"
- [RSP+308] 0x2C37C230 (char*) "\x02"
- [RSP+310] 0x0 (size_t)
- [RSP+318] 0x1002EFAF0 (char*) "\x04"
- [RSP+320] 0x2451B0F0 (char*) "5"
- [RSP+328] 0x800000 (void* -> d3dx9_42.dll+00A0000)
- sub edx,esi
- [RSP+330] 0x1EFE0503A (void* -> WINHTTP.dll+000503A)
- mov esi,eax
- [RSP+338] 0x318F7A60 (void*)
- [RSP+340] 0x3AFEF98B1 (void* -> secur32.dll+00098B1)
- add rsp,70h
- [RSP+348] 0x100000002 (void*)
- [RSP+350] 0x1002EFAC0 (void*)
- [RSP+358] 0x0 (size_t)
- [RSP+360] 0x1002EFAF0 (char*) "\x04"
- [RSP+368] 0x1EFE25D18 (char*) "M"
- [RSP+370] 0xFFFFFFFF (void*)
- [RSP+378] 0x1001A0019 (void*)
- [RSP+380] 0x1EFE25D18 (char*) "M"
- [RSP+388] 0x7B610798 (void* -> kernel32.dll+0010798 lstrcmpiW)
- lea rsp,[rsp]
- [RSP+390] 0x3AFEFC486 (void* -> secur32.dll+000C486)
- test eax,eax
- [RSP+398] 0x4 (size_t)
- [RSP+3A0] 0x318F7A60 (void*)
- [RSP+3A8] 0x0 (size_t)
- [RSP+3B0] 0x0 (size_t)
- [RSP+3B8] 0x2 (size_t)
- [RSP+3C0] 0x0 (size_t)
- [RSP+3C8] 0x0 (size_t)
- [RSP+3D0] 0x1EFE25D18 (char*) "M"
- [RSP+3D8] 0x0 (size_t)
- [RSP+3E0] 0x3AFEFFC42 (void* -> secur32.dll+000FC42)
- test eax,eax
- [RSP+3E8] 0x2C37C230 (char*) "\x02"
- [RSP+3F0] 0x2C498BC0 (char*) "\x03"
- [RSP+3F8] 0x2C32CDC0 (void*)
- [RSP+400] 0x2451B0F0 (char*) "5"
- [RSP+408] 0x1002EFC90 (char*) "\x04"
- [RSP+410] 0x0 (size_t)
- [RSP+418] 0x0 (size_t)
- [RSP+420] 0x2C498C88 (char*) "\x03"
- [RSP+428] 0x0 (size_t)
- [RSP+430] 0x7B60C8B0 (void* -> kernel32.dll+000C8B0 DelayLoadFailureHook)
- lea rsp,[rsp]
- [RSP+438] 0x1EFE4A8D0 (void* -> WINHTTP.dll+004A8D0)
- nop
- [RSP+440] 0x100000000 (void*)
- [RSP+448] 0x2C37C230 (char*) "\x02"
- [RSP+450] 0x1EFE1FB77 (void* -> WINHTTP.dll+001FB77)
- mov r9,[rsp+28h]
- [RSP+458] 0x2C32CDC0 (void*)
- [RSP+460] 0x2C498C88 (char*) "\x03"
- [RSP+468] 0x2C498C88 (char*) "\x03"
- [RSP+470] 0x0 (size_t)
- [RSP+478] 0x2C74A37C0 (void* -> ucrtbase.dll+00337C0 free)
- lea rsp,[rsp]
- [RSP+480] 0x2C37C230 (char*) "\x02"
- [RSP+488] 0x2C498BC0 (char*) "\x03"
- [RSP+490] 0x2C32CDC0 (void*)
- [RSP+498] 0x2451B0F0 (char*) "5"
- [RSP+4A0] 0x1EFE1362F (void* -> WINHTTP.dll+001362F)
- mov esi,eax
- [RSP+4A8] 0x27F (size_t)
- [RSP+4B0] 0x0 (size_t)
- [RSP+4B8] 0xFFFFFFFF (void*)
- [RSP+4C0] 0x1F80 (size_t)
- [RSP+4C8] 0x100000000 (void*)
- [RSP+4D0] 0x0 (size_t)
- [RSP+4D8] 0x0 (size_t)
- [RSP+4E0] 0x2C498C88 (char*) "\x03"
- [RSP+4E8] 0x0 (size_t)
- [RSP+4F0] 0x0 (size_t)
- [RSP+4F8] 0x0 (size_t)
- [RSP+500] 0x80000000000000 (size_t)
- [RSP+508] 0x170061750 (void* -> ntdll.dll+0061750 RtlLeaveCriticalSection)
- push r12
- [RSP+510] 0x2C37C230 (char*) "\x02"
- [RSP+518] 0x0 (size_t)
- [RSP+520] 0x0 (size_t)
- [RSP+528] 0x0 (size_t)
- [RSP+530] 0x2C307B80 (void*)
- [RSP+538] 0x4 (size_t)
- [RSP+540] 0x0 (size_t)
- [RSP+548] 0x0 (size_t)
- [RSP+550] 0x0 (size_t)
- [RSP+558] 0x0 (size_t)
- [RSP+560] 0x0 (size_t)
- [RSP+568] 0x0 (size_t)
- [RSP+570] 0x800 (size_t)
- [RSP+578] 0x0 (size_t)
- [RSP+580] 0x0 (size_t)
- [RSP+588] 0x2C49AD00 (void*)
- [RSP+590] 0x2C5CBFA0 (void*)
- [RSP+598] 0x2C49AD00 (void*)
- [RSP+5A0] 0x1002EFE60 (void*)
- [RSP+5A8] 0x2C74A37C0 (void* -> ucrtbase.dll+00337C0 free)
- lea rsp,[rsp]
- [RSP+5B0] 0x2C498BC0 (char*) "\x03"
- [RSP+5B8] 0x1002EFE60 (void*)
- [RSP+5C0] 0x1002EFF28 (void*)
- [RSP+5C8] 0x1F40550 (char*) "\x0b"
- [RSP+5D0] 0x1EFE13CB2 (void* -> WINHTTP.dll+0013CB2)
- mov rcx,[rbx+28h]
- [RSP+5D8] 0x2C49AD00 (void*)
- [RSP+5E0] 0x1002EFE60 (void*)
- [RSP+5E8] 0x2C49AD00 (void*)
- [RSP+5F0] 0x0 (size_t)
- [RSP+5F8] 0x0 (size_t)
- [RSP+600] 0x0 (size_t)
- [RSP+608] 0x2C4179E0 (void*)
- [RSP+610] 0x1 (size_t)
- [RSP+618] 0x0 (size_t)
- [RSP+620] 0x2C5CBFA0 (void*)
- [RSP+628] 0x2C5CBFA0 (void*)
- [RSP+630] 0x1EFE095F8 (void* -> WINHTTP.dll+00095F8)
- mov rdx,rbx
- [RSP+638] 0x0 (size_t)
- [RSP+640] 0x0 (size_t)
- [RSP+648] 0x0 (size_t)
- [RSP+650] 0x0 (size_t)
- [RSP+658] 0x0 (size_t)
- [RSP+660] 0x0 (size_t)
- [RSP+668] 0x2A5D6080 (char*) "\\"
- [RSP+670] 0x0 (size_t)
- [RSP+678] 0x0 (size_t)
- [RSP+680] 0x1F405A8 (void*)
- [RSP+688] 0x1F40560 (void*)
- [RSP+690] 0x170064DEA (void* -> ntdll.dll+0064DEA RtlProcessFlsData)
- test byte ptr [0A0A6h],8
- [RSP+698] 0x0 (size_t)
- [RSP+6A0] 0x0 (size_t)
- [RSP+6A8] 0x0 (size_t)
- [RSP+6B0] 0x0 (size_t)
- [RSP+6B8] 0x0 (size_t)
- [RSP+6C0] 0x0 (size_t)
- [RSP+6C8] 0x0 (size_t)
- [RSP+6D0] 0x0 (size_t)
- [RSP+6D8] 0x0 (size_t)
- [RSP+6E0] 0x0 (size_t)
- [RSP+6E8] 0x0 (size_t)
- [RSP+6F0] 0x0 (size_t)
- [RSP+6F8] 0x0 (size_t)
- [RSP+700] 0x0 (size_t)
- [RSP+708] 0x2A5D6080 (char*) "\\"
- [RSP+710] 0x10000039C (void*)
- [RSP+718] 0x0 (size_t)
- [RSP+720] 0x0 (size_t)
- [RSP+728] 0x0 (size_t)
- [RSP+730] 0x0 (size_t)
- [RSP+738] 0x100000000 (void*)
- [RSP+740] 0x0 (size_t)
- [RSP+748] 0x0 (size_t)
- [RSP+750] 0x0 (size_t)
- [RSP+758] 0x2A5D60F0 (void*)
- [RSP+760] 0x1F40588 (void*)
- [RSP+768] 0x1F40598 (void*)
- [RSP+770] 0x1F40560 (void*)
- [RSP+778] 0x2A5D6080 (char*) "\\"
- [RSP+780] 0x17006512D (void* -> ntdll.dll+006512D RtlProcessFlsData)
- mov eax,[r15+7Ch]
- [RSP+788] 0x0 (size_t)
- [RSP+790] 0x0 (size_t)
- [RSP+798] 0x0 (size_t)
- [RSP+7A0] 0x0 (size_t)
- [RSP+7A8] 0x0 (size_t)
- [RSP+7B0] 0x0 (size_t)
- [RSP+7B8] 0x0 (size_t)
- [RSP+7C0] 0x1F405B8 (char*) "\x01"
- [RSP+7C8] 0x0 (size_t)
- [RSP+7D0] 0x0 (size_t)
- [RSP+7D8] 0x0 (size_t)
- [RSP+7E0] 0x0 (size_t)
- [RSP+7E8] 0x0 (size_t)
- [RSP+7F0] 0x0 (size_t)
- [RSP+7F8] 0x0 (size_t)
- [RSP+800] 0x0 (size_t)
- [RSP+808] 0x0 (size_t)
- [RSP+810] 0x0 (size_t)
- [RSP+818] 0x0 (size_t)
- [RSP+820] 0x7B62A239 (void* -> kernel32.dll+002A239)
- mov ecx,eax
- [RSP+828] 0x0 (size_t)
- [RSP+830] 0x0 (size_t)
- [RSP+838] 0x0 (size_t)
- [RSP+840] 0x0 (size_t)
- [RSP+848] 0x0 (size_t)
- [RSP+850] 0x170061AA7 (void* -> ntdll.dll+0061AA7 RtlUserThreadStart)
- int3
- [RSP+858] 0x0 (size_t)
- [RSP+860] 0x0 (size_t)
- [RSP+868] 0x0 (size_t)
- [RSP+870] 0x0 (size_t)
- [RSP+878] 0x0 (size_t)
- [RSP+880] 0x0 (size_t)
- [RSP+888] 0x0 (size_t)
- [RSP+890] 0x0 (size_t)
- [RSP+898] 0x0 (size_t)
- [RSP+8A0] 0x0 (size_t)
- MODULES:
- ADVAPI32.dll
- Address: 0x0001D8C90000
- SHA: 80077D605AAA4CB3277F4815C37F0A7F5FFCA6981FCEBDD69A20D88DFCE630E2E878B95D41EB8376DC1CE027BED851CEA1BD8AE201884ED4D949632FFCDB7EDD
- Version: v10.0.10240.16384
- AnimationMotionRevolution.dll
- Address: 0x000025350000
- SHA: 4A3A00073E3A94CA73C9F4216572DF7AE7B24ACC39112138DA70D140B404AD0069589588E7C2FF784DAACDFA1500C5DF7A0037548A6FEA3D9A8315054D71F647
- AutoParallax.dll
- Address: 0x000025B50000
- SHA: 6CBF236692831140B2CE524211149BF535CD685FF4EC53DA36A31237E5181A2137605BFA17385DE99D3A25B415CCF73164E6D6E43DC3DA52C4956B3FF34CB44A
- Version: v1.0.7
- avrt.dll
- Address: 0x00031B140000
- SHA: 42DF1BD0AC6D210A1BAA6F0E0ED8F33D631A3E3F2A1BF955F809ACAB1736375BAD0A8BCD3A57E20717938B99E5CF9AF025D8710AA08518893F0A94941C89B2A4
- bcrypt.dll
- Address: 0x0002EE630000
- SHA: EA9250193B211384E23BD74336B60257A66476EB43E82FB2FF97F3EB3C88144BF6B2F8889A5B876C209E8F79FCAACC97E874C5AC33DFF2765CCABEB4C9B741FC
- Version: v6.0.6000.16386
- bink2w64.dll
- Address: 0x000180000000
- SHA: 3369CC043EE6CBCA63F820E558BAC93E6B137A18C052416F18CC741BD888AF27A3AD98B83AF8BFD3C9705F7E823A9D32C17188BB4C0D797B82ACAFF123902E2C
- Version: v2.7.1.300
- combase.dll
- Address: 0x00031C5D0000
- SHA: FE2B4EB2132E7598EDB2EF9C5BF03B86332848680F5FCA7E685A45E6A1ACCECD6919B598B058EDFE26FD7FE373C802EE11906654B1D735483BF5F2BA6D5E0231
- comctl32.dll
- Address: 0x0002FB3C0000
- SHA: 9384E76299629F65EB33AC83C90141BEF2A424C3E4E62ECAB510965676FEF0A286FE7E50701364911569C0C96B3219435C98840C56034EAE70DC81F955A33664
- Version: v6.0.4704.1100
- CommunityShaders.dll
- Address: 0x000026270000
- SHA: 8999034E443108B5135C257C45EF4B79725FD1898E24EE6810638FDCBD737AF018BCF493BCE88FE8C4655E2337A25504B6F0DB083950E8AC1CA59956C4BA2494
- Version: v0.8.7
- crypt32.dll
- Address: 0x0002964D0000
- SHA: 5C60009FB383D58AEDEE9647E43F799180D280F09A0B46A7359E5B020F844981DA7F0809EE304460B634FA7D490D15DC72C0406E48B82318C7ED395A3E5DF778
- Version: v5.131.2600.1243
- d3d11.dll
- Address: 0x000359050000
- SHA: 508AE5B00115917FC7E31E03C7251A726F91E8F405EB78DE7944120F3D2628F9FE62FB7C5A908B4DB6F77D3B7BB18E6A82C47A5205B186445779E078D15D58FC
- Version: v10.0.17763.1
- D3DCOMPILER_47.dll
- Address: 0x0000264A0000
- SHA: 3F7968BE921F4D1D1B1D9DF116DB40F006FB212D4E5F522D882F38570F1C04FB373531E42AE3C06E6F9CD2EEA628EC4AC0ED03AB880D430750C9EC5643509E91
- Version: v10.0.15063.674
- d3dx9_42.dll
- Address: 0x000000760000
- SHA: 92CF7AE0DFE1437227F8BE37F50D84A6B18876485CB953C6A972A2F0C9F10D940941F34E8C8188559523B69BF2F6AD463526F87DE52F8F142337031E753F6F0D
- Version: v9.27.952.3001
- dbghelp.dll
- Address: 0x00023ECB0000
- SHA: 8AE707568D33D5CC6DB196082EC38AC6BCE0D4634F4AC1CF13149632E13A0EC33FD17BB3D5382A503CF336CADCF8170D2BA9F240A52F283FEF92CBCD530A8BD4
- Version: v6.1.7601.17514
- DINPUT8.dll
- Address: 0x000267710000
- SHA: B154DD30B7E5B8AF383CCF81133A60BF8A65F398A60EC03B5CA067D050CC2A7D5FB48B47C64E27D5E91F4A413404467EB3B47695BCC984B4F79AEEAAC48116EC
- Version: v5.1.2600.881
- DSOUND.DLL
- Address: 0x000343520000
- SHA: B1C0B14B4DF7006143BCD9FBCB279E9EDEC2158003722303AEA59C1BF3D3EBA2679CB8CC4C61B6BC0F972B044C6EC5CA425C0510E50B71B72B1074B8A2C3E9C7
- Version: v5.3.1.904
- dwmapi.dll
- Address: 0x0002EF230000
- SHA: 6A633C808C94B0087CE66CC5025B36981F7933E2EA8FB8D08E0FCE85A4B8135DA5E699E858A5EF204C6E1E9E2BA8384EEABABA293A6B769C68D9FE1E47338220
- Version: v6.0.6000.16386
- dxgi.dll
- Address: 0x0000009E0000
- SHA: 9CB94C3A9CBEA0F30BE4622E04FE27224A74A9765036646E27A4217C23640230378806114E6A389A0718403E39928524776B72B37F7E1B44AE7C6EB0B2D78E81
- Version: v6.1.1.1848
- dxgi.dll
- Address: 0x0002EDF00000
- SHA: D8F9F0162F2E7E538C2E6423F89A205D7675BCFEBA9316F8624EEDF0E7E793985AA4B89980D1AD3C974B32AF4B9217EE73D57C6A098D358FEC0A5A49963782DC
- Version: v10.0.17763.1
- DynamicAnimationReplacer.dll
- Address: 0x000027F70000
- SHA: 576F880E9331E6ACB4821F36323D10A6EA2EA0A009B5C8EC43EE95EDC4114D6987A7E8EB096EE852EDD70A51EE37636C787D05D770D1478C23C9BD6A8E93E89C
- Version: v1.1.3
- EVLaS.dll
- Address: 0x000027FE0000
- SHA: F0748EDC83749066D83872B7B5E0803726A3B00B3EA73412448172BDA815DDEA74E0EAEF7C9D378177E91E587F525AE5D3EB8F79F02C06ABD0F43F2315E755FE
- Version: v1.3.1
- gameoverlayrenderer64.dll
- Address: 0x000030F40000
- SHA: 1F641859D042875BBB3FF8B15620D916988C02A3851BC510F6F063EC89EBC83A61051DBB6B2D29C06F5FCD465FF2F4C06C95D322DEB5685D686A7DC24FF1586C
- Version: v8.92.64.3
- gdi32.dll
- Address: 0x0002BB0A0000
- SHA: 49EBB0DDAE383E626498788F0A0937A603AFE4CF4CF215BD671F5FD3AC2CB6AF2E208E1B51471D7C3ADAEF246B945213B2D3E3C2DD76904392CE6B922C4F1460
- Version: v1.0.0
- hdtSMP64.dll
- Address: 0x000028010000
- SHA: DE470B8B9D17B22338B951690557EAF015E69F1EB6083AD0D24BAD4FB36289BAB4C563358F97D9D8098A1191B25F28480498154FC80CC2BCFEC3EAFC7AF524F5
- hid.dll
- Address: 0x0002E0D50000
- SHA: C1D1B7E6C222AFAE045F84EB37BADCF2BC9FFCFA97EDB5A519BC067FD77F89C209378ED770CE4817791B91EE057E6A4F81D713C43736A7C01B7F6DFC000DE120
- Version: v10.0.0
- imm32.dll
- Address: 0x000393730000
- SHA: D9E80070EA1394F33D12159FF51F3233D5833DAD80958CF7F05ED0C509AF788EC48C1CBA69FD910B31270F987F3675EBC3FADC6377295CD4F4B18E63056DFCD4
- Version: v5.1.2600.2180
- jsproxy.dll
- Address: 0x0002EB680000
- SHA: B8DA376164801AFBFFC39FB9D46A4FCCD977B644C78FAD2CBAFC0C8129C7B11CFC9FE668776941EB3C429F9E8D363D85294903DA3BA608826740AD934CF7CC25
- Kerberos.dll
- Address: 0x0001CE760000
- SHA: 87A5E7131AB5DF6D41753534963DB5E683CAEF0CD60595774422EEC5C189A548F7992FFA2D801C5B99E22525544B64BA6BD39BC18217220D87318474919329EA
- kernel32.dll
- Address: 0x00007B600000
- SHA: 83D8B874AD9C04129AB9BFF91A7EFC1D1D8243726796BE4B11310442AFF975BFF40B3A4BCE953EB959719373C688A2D6E8B9917B549FCC4B307157E271749FFB
- Version: v10.0.19043.1466
- kernelbase.dll
- Address: 0x00007B000000
- SHA: 9F747B3D315EDC69E2FF1988BD89B850A68EFCDA13C5D61E0A3294BCD012F289F017AF51343BA0CD156F6B0D84845A1990B85C311015B02A5E77661E79DD70CA
- lsteamclient.dll
- Address: 0x7FF705540000
- SHA: 1ABA79FCC4CA2C093157C171CFBB234DD0246636243ACCB8423B15F368CBAEE1B0439480E77EF198C7D2424A001ECE956AB50E23CBD44BF90D3ED5D864AC7A85
- MCMHelper.dll
- Address: 0x0000293D0000
- SHA: 64B46A09756154AE6D0D03975F59D2EEC27A9128ED07EA0E6B5D1D7ED2E29050E16D46294359F6EC130B206A8AFDACC1FAEB3CDCFBC38382ADD1283E5519F31C
- Version: v1.5.0
- MCO.dll
- Address: 0x000029B40000
- SHA: 2F12C00952BC501DAF2BEC2A5BFD983B0C12687EB37785ED7828AE2A23F137280D645F25F9F3DE281BF9DB0788FA740EF681B26CD2A60EC60ADE5CC84D6E9DCB
- Version: v1.0.0
- mmdevapi.dll
- Address: 0x00020F400000
- SHA: D75CD612F045CB9FB007D289396880E471344D6E1AFCFDD9BF59F8638604B35ED2A20C3B93255C6FDA2DD7E842F572A593410477225C8BE9F4FAC51109E29C74
- mpr.dll
- Address: 0x000250CD0000
- SHA: C3363649CA2F808A633CE99FCAE5F66DA6BEDB41CF02E7E1E81488E9D6FAB71BE6E4296FB0987E03E4A3D8A4D8BB297314F5EE79096038F7971A8A3257E6758B
- Version: v5.0.2195.6611
- msacm32.dll
- Address: 0x000351A60000
- SHA: 02B06ACE62157BEBA56E84281149C4F82A3639A60703A38B3C824538D1BF79F97F50B6DE2B245FBBDE04E66FD95C5446DED5ADBBCA00B635F6511C8F21CA655E
- MSVCP140.dll
- Address: 0x0000006A0000
- SHA: 2A66BDDB9B6768419C6BAACBF8BB19CDA5662F5B1A1A3CA760B1D9D7EA7D65D19C29F48B7621362107EEF819D692F1D2A55A6D7D0217ECEA91EB6E150F6AB646
- Version: v14.0.24215.1
- MSVCP140_ATOMIC_WAIT.dll
- Address: 0x00029EF90000
- SHA: 2B30E558279634F3091489A5D8F42C31EBFA7A3D5D365246527823A58EC4D5589D1F0D5B5F940D1E406D78ECE82315BE1161EB4B41E3549957971F4C4995A1DB
- msvcrt.dll
- Address: 0x000228280000
- SHA: 094EDF6717569AA4DBE0C816835E76BC85D9721F65B70D48A605DB4F620808AF393D1CE46668F80A54B4E45D2FB516E0742F8404A3BD882E425148A3D2B0641C
- Version: v7.0.2600
- ntdll.dll
- Address: 0x000170000000
- SHA: 106FBFFEC9146733672DB9D98DF9F1DA366077A73F240E39A59CA7D9377C97CA15C6E8F3796E023C5785EBA82507321CCA09E3A81A2FFC4A445B88E7429AD8F0
- Version: v6.1.7601.24059
- ole32.dll
- Address: 0x00020B860000
- SHA: D52D7F12D7614A94F5EDA65EA6EAF8048E921CF68728BDAE1F8DF6E035ABFE09D6D4F98A46430B605C809D8D7160B60AEBF68B2CEA5D7BE922B8EF98EAF27B60
- Version: v10.0.0
- oleaut32.dll
- Address: 0x0001D0E20000
- SHA: 265EC3639215B2E57AFC24EEE8832CAACA39F1A8E5E8F3CF33AC421EB8970C0EBE306E9013A0BCDC01EF402FCAFF845595285145E8B1A0C2E6DBF51D1E7FE4EC
- Version: v6.0.6001.18000
- OneClickPowerAttack.dll
- Address: 0x000029BD0000
- SHA: D9566FA19D141BA13B8877C1DCB909C554D16B34C82153FA6C398F46C6A485DC96E1F1AAC970CA2C146A0C09CA12D625F87377992917DEF696E5BEE66DC0185D
- Version: v1.0.0
- PayloadInterpreter.dll
- Address: 0x000029C40000
- SHA: D5DBC2A619FC1C4AFE6A7967D4225F8EAF409BCE7F3DED56AFDA3D667AA7AE716096E39D2347CB144F9FB0A2F092BB9B1698DBDA7643F850DF8B86C056711139
- Version: v1.0.0
- po3_PapyrusExtender.dll
- Address: 0x000029CB0000
- SHA: 227DE1C02FB50B77C39B649718D820AD13BE95C72A1BADF19F8934ABE79C1867F45B09BAE5D65ED2A686270E98B8D0F06DF89466AD7AE450C41AEF7D858B7F91
- Version: v5.6.1.1
- Precision.dll
- Address: 0x00002BC70000
- SHA: 7238FD553247730D2D33898CA53ACCC46C1DDA6E455EF320511E3C458FA44CF8FE8A77DC513732F8CAAAF3AA052345CEAF8A68C91127A434FC703DEF05152E37
- Version: v2.0.4
- psapi.dll
- Address: 0x000267930000
- SHA: 21713B8E1464F63A8439D19379D02856F66F297EF55C1DFBC27E3BCD302109412A0921EC552D4E07DF3C7FE712C88C6F4766FCA27064D31DD51DFB3459B9C9D3
- Version: v5.1.2600.3264
- rpcrt4.dll
- Address: 0x000368420000
- SHA: 214EB216C8493534FCEE0057B26A5D4B88EB529E84B6A001EA7EF6364CA13D3C08B4C81874CAE88370EF2863A10B8EE450F8FFF1C689F7579DC77C1CB2500340
- Version: v5.1.2600.2180
- rsaenh.dll
- Address: 0x0001CCDD0000
- SHA: 6F888C472A09FDAC4045D79AE49BD059DE7147CC7B4C2E90E47C4427B0A610ED932D438CD1F765FE79B7C632597FBC9398E843FE6E3D3915C62470814742A776
- Version: v5.1.2600.2180
- schannel.dll
- Address: 0x00025C0B0000
- SHA: A95233B19CFE8C29158422D03ABA689C782C472F8FBB3AE53DD4D917F6CD96707382D1EAC447A47DC690BBEEF7BEC1EA0B7A4CB2DE7015F387839574CC93CB88
- Version: v5.1.2600.2180
- sechost.dll
- Address: 0x0001EAF60000
- SHA: C00787051FE213FDBF682EAE8B98574C6D468568D225C663A9FA51B0055FFA41DBA07544A0B0E5CC5F6D1E50F879481EDE6056FAFEB66E7F0882ACA499145AD7
- secur32.dll
- Address: 0x0003AFEF0000
- SHA: A4268B7CBEACB3F4E362DB6B29E81F2AD466D65D40B4E9741F8FDCF1E4AD29D84BD6F3F9C7616F8CEC106E3E4E9C184DAE0DB7AB90FC1B3EB7DE59F5BA4B22E7
- setupapi.dll
- Address: 0x00036D860000
- SHA: 137AE585289C8565427FE2097D6CCD6098B11D5710DE855EE25AB92E5E6D5226FF9C80E95045B3F0EDE4E23AF3432F3037D36A7546C8BCBEBE2DA6DC1464BF28
- shcore.dll
- Address: 0x0002BDE30000
- SHA: 9C965DC9F0248527B87CAD699EB2162D3172E09F472753FF883D15EA1F54B25E3FFBCD92D6C0873E9F2EEAE11B976C5DC7E4BA9B297987536A8A8E73D58D957F
- SHELL32.dll
- Address: 0x00023BC00000
- SHA: 8C46E33E23550639C87F5C9C76C524211BA8F194F77E9A0105A1006A033D1399F13F4FD97D5C1F74E75BE3DBA7769C3EBDD4340D0C87AE31BA4258CFFB4943C5
- Version: v6.0.2900.6242
- shlwapi.dll
- Address: 0x0002A2380000
- SHA: C47F8EC1819E49885CF423972E2C84C7EBF49ADBDEE89900DD63358D38EB06376071095EFCC9AA74EA908CE7C3EF0A790AB875126856E14200D4925079610B70
- Version: v6.0.2800.1692
- skee64.dll
- Address: 0x00002E2A0000
- SHA: C9BBFBC96194BAB0C3E9D78636E06D1C29BB0EC68E7C84A853E4C4A33673635C2EB5660021CD0010F8526F4871C307F22B65CC1FDC0212039B8574AC96B449F1
- Version: v0.4.19.16
- skse64_1_6_1170.dll
- Address: 0x000001DE0000
- SHA: F88C10E637F67131775414DE7691884E1BD181C750DCB7B9CE69FED616285BC69BF2F5E81177EBF2CB42BF590F709A33D722BE42CAE1809B49729FFFFFB75567
- Version: v0.2.2.6
- SkyrimSE.exe
- Address: 0x000140000000
- SHA: F7A77A0646E83A078FF8A2004C39533D132B5B45B93A3C0F4B7F0FE01977E79D4028336439DA03258B1A01FE01EF23C9D30F6DF59BBF0AC0113A14EF15A4B58A
- Version: v1.6.1170
- SmoothCam.dll
- Address: 0x00002EC50000
- SHA: B3E41421B12842533E80874A904E08F280ED8C683F68DD1FE280B93BE036A1965E0031E4FBFF22A1197B6B5A285FADF8FEF1DAFCEDA6BED243885BD1B37A6646
- SMP-NPC crash fix.dll
- Address: 0x000029F20000
- SHA: 5229FCAF4398F7863E41B2A63B3E45B10EF4CC94C542898F029124DA109331F0D740C901034351558C2ED1FBA6FDEEC53136D1B015C337F245BD7B7A2EFACFD4
- SSEDisplayTweaks.dll
- Address: 0x00002BE50000
- SHA: 9D2BB0CA409F63C72E6D8D3D48347EBED959F9833236C01E8285E5BC7F06D18380CDD08FA4EFF6666A15252131E2465CE2EC87793E775E6950E4D859400C889E
- steam_api64.dll
- Address: 0x00013B400000
- SHA: C08DE8C6E331D13DFE868AB340E41552FC49123A9F782A5A63B95795D5D979E68B5A6AB171153978679C0791DC3E3809C883471A05864041CE60B240CCDD4C21
- Version: v7.40.51.27
- steamclient64.dll
- Address: 0x000138000000
- SHA: 04985ED30B1DD9D000ACA9BE472256FEABEEAC2E15920233CD7C228C055ECAC25429E633E23C20F620E5002D27D76677297A89A7F4EA33F669DE2185999BD06A
- Version: v8.92.64.3
- trainwreck.dll
- Address: 0x00002F450000
- SHA: 261801A85D41236E35C820A78E4BC3E775EBF0C19336EF1D518A61DA20429BB30B707181606675C1BC650D678CA0A27DC585DFA35BDDD717EB830459BFF60333
- Version: v1.4.0
- TrueDirectionalMovement.dll
- Address: 0x00002F560000
- SHA: 1B38886B3753001D49B95157E2569FDDF2C66C4C14BC12F79908DD26D3AAB88529DE025BAD2BDE683EC012B36D557608F79520FCED02E96573BB98A21FB424BD
- Version: v2.2.5
- TrueHUD.dll
- Address: 0x00002FCC0000
- SHA: FFB0DC0E2F00AF463572A36A861498F6D213C34D35815FEA9921F014AEB15515ED736784D36562ACA44895111AADF73DD9CA2549A0A2EDE8E825404C507FD871
- Version: v1.1.9
- ucrtbase.dll
- Address: 0x0002C7470000
- SHA: E19256BD389CC62001A49650049186A302EA5875E551A337E222A08726A662F5249C9DB4116CEA865A39EC1DD93BA3157BA04A63537FD093CC22F375313F0A16
- Version: v10.0.14393.2247
- user32.dll
- Address: 0x0002169D0000
- SHA: DEF105A5FBD56A5A936349DEBF1AFE11EA7F250D6DDA17D3F0FF0004140283D599341B492E1594B9EDBC17F1058E3F200E4FB7EA849339B7DA038A02B8E03D05
- Version: v5.1.2600.2180
- usvfs_x64.dll
- Address: 0x000002EE0000
- SHA: 0238C06C4C1A4FCB0CE89A230EECC86E6B11CE415EF36F815ABB88AF45BBFDD4362CDDB1BF9DB371435460B5CB64784083DDF42A696ADF710E023792A711DB05
- uxtheme.dll
- Address: 0x00026C230000
- SHA: E8E2BC9970F717C927B27F22515FF7D48B01EB5C82FD50C11D85240D2E51D48037E06BC5095C20054C9FDF8637B9FDC7C888F474ECB00CA5CA867986D378EAEA
- Version: v10.0.0
- valhallaCombat.dll
- Address: 0x000030410000
- SHA: D2C73B21C67B49A476D21527A8B4B590B89EAC199DA5033464ECEC9216613D99E9FA43CE85DAA191C7F815A286CA8623E66D233BB704BCA4FC6EB6AEFE671315
- Version: v1.0.0
- VCRUNTIME140.dll
- Address: 0x000000740000
- SHA: 01B3F320FEAE9BCF3F540AC369515EA73249BA39630C117127FF9D0DE6307F5D062246B799E48627C9735A80B9A4E0A2F7F293DF187BA607D91A6AE64796CD64
- Version: v14.0.24215.1
- VCRUNTIME140_1.dll
- Address: 0x0002AC810000
- SHA: 0EF9499A8105019CE1C48B0450AAD009C4B5A954B2ED747D31213F40AFCFDE2DF6ACF2B082ECCE9AE50954AB4E5FDE1E2C9EFD94BED5C21E1237DFFDB43F4311
- version.dll
- Address: 0x00025DC30000
- SHA: 57222818B57E9EC0755E871D53294BC7549CB1D103ECC0A53A3FB9C200AC0126BCFE09B5CC2CF9E7A6721F0A708683E0FE1DBC404B4BAE454F363CC79DCFF6C8
- Version: v5.1.2600.2180
- win32u.dll
- Address: 0x0002C73A0000
- SHA: A54F7CFE16146F5322EB45B86B9BACD2A6246CBB06AC9A8AFF44815F4D32695ED56FED66C3DE4A866D6AC42DA2D1333907D14F8E4CFB4D8352FB2E00B2B1467F
- winepulse.drv
- Address: 0x0002EB230000
- SHA: B06434894308EE64F30CB43DF7D2B5EB8969D3C8E7C6EEB4AF505C17E20BF6F20AD4C2EBABB372DD725042245A5DB287230227A5F375AB2FD87FE046261D730A
- winevulkan.dll
- Address: 0x0002D4AD0000
- SHA: 89001E9BCC26E00ACEC93FA2A1324F56F5D7803C0AEDFF45A5932F67D0A9BEE9736015D0BE9A74030029DD4A66D7B56EE7A37524FC653F7A10DC3A66F692D1AC
- Version: v8.0.0
- winex11.drv
- Address: 0x000251D80000
- SHA: 5C3B9E0C23C8F880FBDA27EA9DF9B75BDA9895EF417DEEAAD245DDE2B6F714209B8964F08160F1EC5C2A8D2BB8CA50A7B2226BD3DFE3E004BDD546365D50F7F5
- Version: v10.0.0
- WINHTTP.dll
- Address: 0x0001EFE00000
- SHA: 2B40F1A0D73216631FF7D313E45696F36BA53E8AC64818C11D631EE0F17FF61E7ABB95522C4AA1B2FF9CC871D4E658EA2D5A176B30811F27C91DB41C9BA0FCD9
- Version: v5.1.2600.2180
- WININET.dll
- Address: 0x000345640000
- SHA: 47BE3183D2F88466149929B9DC3DF0CD612381BC981C4FE340DB02F6D7D4C9A653ADDDA1D8A0BE768EC7837271B6E87D71EAD9F08B1A90FA3DB7C01560508582
- Version: v8.0.7601.17601
- WINMM.dll
- Address: 0x0002945E0000
- SHA: 05E2AE3CA7D9199EE72569284AD3B4271A3FC67768E482B6C79A5D5FA022EE2691E152542DE3915075615715466EB9ECCF17F980EB72610E4E6FB5FB3E2CCF7C
- WS2_32.dll
- Address: 0x000370F70000
- SHA: 809D151525D60D5C22CCFAF9153E1F0DFF5EFB5DB5B529550BB89E5EEFC829D2402B4B96357AFD41B8D65C6A2D92645E90FB708F4F60F07182F0002D95198CC6
- Version: v5.1.2600.5512
- X3DAudio1_7.dll
- Address: 0x000000690000
- SHA: CEF31793E1B1714826AA95D256EBBEC457E8CF9003767DB46909BF879AF86F954F475AC84E1EE8CCCF1DCFE4A52624E3D7E8BFAFF5F567E97CAB19207DB7F913
- XAudio2_7.dll
- Address: 0x0000002F0000
- SHA: 2CF5EA114546236F55B9CBB49643F719D892EBA8649343BC3E72FE08C998E88E26C010232CA27BCA255629AE7D0D1E068D6ED1DBD76096B1ED09362F65F5401D
- XINPUT1_3.dll
- Address: 0x0002E99A0000
- SHA: CE2EAD2480A3942081AF4DF4BAEE32DE18862B5F0288169B9E8135CC710EB128F9A2B8A36BDA87212C53FD4317359349C94D38B5DA082638230DCB5669EFEDE9
- Version: v9.15.779
- xinput1_4.dll
- Address: 0x000259D90000
- SHA: 228A167D29859DCC82B606532CAD61DED262705D68564F91BC4ABB1C8EE1DB8DBF3645E4B4702028A46E5A19040FA094BD05E472BACC5CECAF949388FBA2A4FC
- Version: v6.3.9600.16384
- SCRIPT EXTENDER PLUGINS:
- AnimationMotionRevolution.dll
- AutoParallax.dll v1.0.7
- CommunityShaders.dll v0.8.7
- DynamicAnimationReplacer.dll v1.1.3
- EVLaS.dll v1.3.1
- hdtSMP64.dll
- MCMHelper.dll v1.5.0
- MCO.dll v1.0.0
- OneClickPowerAttack.dll v1.0.0
- PayloadInterpreter.dll v1.0.0
- po3_PapyrusExtender.dll v5.6.1.1
- Precision.dll v2.0.4
- skee64.dll v0.4.19.16
- skse64_1_6_1170.dll v0.2.2.6
- SmoothCam.dll
- SMP-NPC crash fix.dll
- SSEDisplayTweaks.dll
- trainwreck.dll v1.4.0
- TrueDirectionalMovement.dll v2.2.5
- TrueHUD.dll v1.1.9
- valhallaCombat.dll v1.0.0
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement