Advertisement
Guest User

2025-06-26-19-44-49.log

a guest
Jun 26th, 2025
10
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 94.68 KB | None | 0 0
  1. Starfield v1.15.216
  2. trainwreck v1.4.0
  3.  
  4. Unhandled exception "EXCEPTION_ACCESS_VIOLATION" at 0x7FF7DD73D4FF Starfield.exe+277D4FF
  5.  
  6. SYSTEM SPECS:
  7. OS: Майкрософт Windows 10 Домашняя 22H2 19045.5965
  8. CPU: GenuineIntel 13th Gen Intel(R) Core(TM) i7-13700KF
  9. GPU #1: NVIDIA GeForce RTX 4080
  10. GPU #2: Microsoft Basic Render Driver
  11. RAM: 16.58 GiB/31.82 GiB
  12. PAGE FILE: 31.35 GiB/58.82 GiB
  13.  
  14. PROBABLE CALL STACK:
  15. [0 ] 0x7FF7DD73D4FF Starfield.exe+277D4FF
  16. lock xadd [rcx+10h],eax
  17. [1 ] 0x7FF7DD73BA10 Starfield.exe+277BA10
  18. mov rbx,[rsp+58h]
  19. [2 ] 0x7FF7DD71FCE1 Starfield.exe+275FCE1
  20. cmp esi,[rbx+1C30h]
  21. [3 ] 0x7FF7DD720072 Starfield.exe+2760072
  22. mov rcx,[rsi+8]
  23. [4 ] 0x7FF7DD20CD6C Starfield.exe+224CD6C
  24. test eax,eax
  25. [5 ] 0x7FF7DD20CE56 Starfield.exe+224CE56
  26. mov rax,[r14+40h]
  27. [6 ] 0x7FF7DD7218EC Starfield.exe+27618EC
  28. mov r14,[rbp+510h]
  29. [7 ] 0x7FF7DB55E5BC Starfield.exe+059E5BC
  30. nop
  31. [8 ] 0x7FF7DB55E4E3 Starfield.exe+059E4E3
  32. cmp byte ptr [5878635h],0
  33. [9 ] 0x7FF7DB55E43E Starfield.exe+059E43E
  34. add rsp,240h
  35. [10] 0x7FF7DB54E793 Starfield.exe+058E793
  36. mov rax,[rbx+8]
  37. [11] 0x7FF7DC7D146E Starfield.exe+181146E
  38. cmp qword ptr [48AAAF2h],0
  39. [12] 0x7FF7DC7E23C3 Starfield.exe+18223C3
  40. call 0000000000C3679Dh
  41. [13] 0x7FF7DC7CD234 Starfield.exe+180D234
  42. mov qword ptr [454911Ch],20000h
  43. [14] 0x7FF7DD8183CB Starfield.exe+28583CB
  44. test r13b,bl
  45. [15] 0x7FF7DD81C080 Starfield.exe+285C080
  46. mov ecx,[351E43Ch]
  47. [16] 0x7FF7DD81763A Starfield.exe+285763A
  48. xor eax,eax
  49. [17] 0x7FF7DD212C51 Starfield.exe+2252C51
  50. mov rcx,[3E837F7h]
  51. [18] 0x7FF87CAF7374 KERNEL32.DLL+0017374 BaseThreadInitThunk
  52. mov ecx,eax
  53. [19] 0x7FF87D7BCC91 ntdll.dll+004CC91 RtlUserThreadStart
  54. jmp short 0000000000000022h
  55.  
  56. REGISTERS:
  57. RAX 0xFFFFF000 (size_t)
  58. RBX 0x1 (size_t)
  59. RCX 0x32616243877998 (size_t)
  60. RDX 0x25941040258 (BSResource::`anonymous namespace'::LooseFileAsyncStream*)
  61. RSI 0x259413C5C00 (char*) "h\rD<Y\x02"
  62. RDI 0x0 (size_t)
  63. RBP 0xFCFC7FE250 (void*)
  64. RSP 0xFCFC7FE150 (void*)
  65. R8 0x7FF7E319A1D0 (char*) "X\x02\x04AY\x02"
  66. R9 0xFCFC7FE1A0 (void*)
  67. R10 0x25941040278 (void*)
  68. R11 0x25931255C7E (void*)
  69. R12 0x91E300 (size_t)
  70. R13 0x7FF7E319B200 (char*) "\xd0\x9bf=Y\x02"
  71. R14 0x25941040258 (BSResource::`anonymous namespace'::LooseFileAsyncStream*)
  72. R15 0x0 (size_t)
  73.  
  74. STACK:
  75. [RSP+0 ] 0xFCFC7FE198 (char*) "`\\%1Y\x02"
  76. [RSP+8 ] 0x7FF7E319B200 (char*) "\xd0\x9bf=Y\x02"
  77. [RSP+10 ] 0x3 (size_t)
  78. [RSP+18 ] 0x25931255C78 (char*) "DATA\\"
  79. [RSP+20 ] 0xFCFC7FE300 (char*) "E"
  80. [RSP+28 ] 0x7FF700000104 (size_t)
  81. [RSP+30 ] 0x1 (size_t)
  82. [RSP+38 ] 0x25941040258 (BSResource::`anonymous namespace'::LooseFileAsyncStream*)
  83. [RSP+40 ] 0x7FF70000000A (size_t)
  84. [RSP+48 ] 0x25931255C60 (void*)
  85. [RSP+50 ] 0x259413C5C00 (char*) "h\rD<Y\x02"
  86. [RSP+58 ] 0x0 (size_t)
  87. [RSP+60 ] 0x25941040258 (BSResource::`anonymous namespace'::LooseFileAsyncStream*)
  88. [RSP+68 ] 0x25A4F5359EC (char*) "\x01"
  89. [RSP+70 ] 0x25A4F535B04 (char*) "\n"
  90. [RSP+78 ] 0x49A60C2400000020 (size_t)
  91. [RSP+80 ] 0x139A4B3901DBE4D6 (size_t)
  92. [RSP+88 ] 0x3C1779C701DBE6B9 (size_t)
  93. [RSP+90 ] 0x1DBE4D9 (size_t)
  94. [RSP+98 ] 0x91E3B6 (size_t)
  95. [RSP+A0 ] 0x66726174535C3A45 (size_t)
  96. [RSP+A8 ] 0x6769442E646C6569 (size_t)
  97. [RSP+B0 ] 0x6572502E6C617469 (size_t)
  98. [RSP+B8 ] 0x6964452E6D75696D (size_t)
  99. [RSP+C0 ] 0x736E492D6E6F6974 (size_t)
  100. [RSP+C8 ] 0x655A6D6152656E61 (size_t)
  101. [RSP+D0 ] 0x535C415441445C73 (size_t)
  102. [RSP+D8 ] 0x2034303053474246 (size_t)
  103. [RSP+E0 ] 0x736563696F56202D (size_t)
  104. [RSP+E8 ] 0x3261622E6E655F (size_t)
  105. [RSP+F0 ] 0x54 (size_t)
  106. [RSP+F8 ] 0xFCFC7FE420 (void*)
  107. [RSP+100 ] 0xFCFC7FE420 (void*)
  108. [RSP+108 ] 0x259397F7000 (void*)
  109. [RSP+110 ] 0x0 (size_t)
  110. [RSP+118 ] 0xFCFC7FE318 (char*) "."
  111. [RSP+120 ] 0x259397F7000 (void*)
  112. [RSP+128 ] 0x4 (size_t)
  113. [RSP+130 ] 0x9B (size_t)
  114. [RSP+138 ] 0x7FF7E319ADD8 (void* -> Starfield.exe+81DADD8)
  115. add al,dh
  116. [RSP+140 ] 0xFCFC7FE8F8 (void*)
  117. [RSP+148 ] 0xFCFC7FE4C0 (void*)
  118. [RSP+150 ] 0x259353E2000 (char*) "\x01"
  119. [RSP+158 ] 0xFCFC7FE420 (void*)
  120. [RSP+160 ] 0xFCFC7FE439 (void*)
  121. [RSP+168 ] 0x7FF7DD72610C (void* -> Starfield.exe+276610C)
  122. cmp byte ptr [rsi+50h],0
  123. [RSP+170 ] 0x7FF7E319ADD8 (void* -> Starfield.exe+81DADD8)
  124. add al,dh
  125. [RSP+178 ] 0xFCFC7FE4C0 (void*)
  126. [RSP+180 ] 0x54 (size_t)
  127. [RSP+188 ] 0x9 (size_t)
  128. [RSP+190 ] 0x259353E2000 (char*) "\x01"
  129. [RSP+198 ] 0x9B (size_t)
  130. [RSP+1A0 ] 0x2512F936CD0 (SharedHeapAllocator*)
  131. [RSP+1A8 ] 0x2512F936CD0 (SharedHeapAllocator*)
  132. [RSP+1B0 ] 0x53005C003A0045 (size_t)
  133. [RSP+1B8 ] 0x66007200610074 (size_t)
  134. [RSP+1C0 ] 0x64006C00650069 (size_t)
  135. [RSP+1C8 ] 0x6700690044002E (size_t)
  136. [RSP+1D0 ] 0x6C006100740069 (size_t)
  137. [RSP+1D8 ] 0x6500720050002E (size_t)
  138. [RSP+1E0 ] 0x6D00750069006D (size_t)
  139. [RSP+1E8 ] 0x6900640045002E (size_t)
  140. [RSP+1F0 ] 0x6E006F00690074 (size_t)
  141. [RSP+1F8 ] 0x73006E0049002D (size_t)
  142. [RSP+200 ] 0x520065006E0061 (size_t)
  143. [RSP+208 ] 0x65005A006D0061 (size_t)
  144. [RSP+210 ] 0x410044005C0073 (size_t)
  145. [RSP+218 ] 0x53005C00410054 (size_t)
  146. [RSP+220 ] 0x53004700420046 (size_t)
  147. [RSP+228 ] 0x20003400300030 (size_t)
  148. [RSP+230 ] 0x6F00560020002D (size_t)
  149. [RSP+238 ] 0x73006500630069 (size_t)
  150. [RSP+240 ] 0x2E006E0065005F (size_t)
  151. [RSP+248 ] 0x3200610062 (size_t)
  152. [RSP+250 ] 0xFCFC7FE550 (char*) " \\%1Y\x02"
  153. [RSP+258 ] 0x0 (size_t)
  154. [RSP+260 ] 0xFCFC7FE8F8 (void*)
  155. [RSP+268 ] 0x7FF7DD725F7A (void* -> Starfield.exe+2765F7A)
  156. nop
  157. [RSP+270 ] 0x7FF7E319ADD8 (void* -> Starfield.exe+81DADD8)
  158. add al,dh
  159. [RSP+278 ] 0xFCFC7FE4C0 (void*)
  160. [RSP+280 ] 0x7FF7E339BCE0 (char*) "x0\x01"
  161. [RSP+288 ] 0x7FF7DD810016 (void* -> Starfield.exe+2850016)
  162. jmp short 000000000000000Ah
  163. [RSP+290 ] 0x0 (size_t)
  164. [RSP+298 ] 0x0 (size_t)
  165. [RSP+2A0 ] 0x7FF7E319B200 (char*) "\xd0\x9bf=Y\x02"
  166. [RSP+2A8 ] 0x7FF7E319B200 (char*) "\xd0\x9bf=Y\x02"
  167. [RSP+2B0 ] 0xFCFC7FE4F8 (void*)
  168. [RSP+2B8 ] 0x25942F5CB40 (void*)
  169. [RSP+2C0 ] 0x0 (size_t)
  170. [RSP+2C8 ] 0x25CDC600040 (char*) "1"
  171. [RSP+2D0 ] 0x6D65775FB49318 (size_t)
  172. [RSP+2D8 ] 0x2593289C1C8 (char*) "\x01"
  173. [RSP+2E0 ] 0x100100 (size_t)
  174. [RSP+2E8 ] 0x91537C (size_t)
  175. [RSP+2F0 ] 0x231000000000 (size_t)
  176. [RSP+2F8 ] 0x0 (size_t)
  177. [RSP+300 ] 0x0 (size_t)
  178. [RSP+308 ] 0x0 (size_t)
  179. [RSP+310 ] 0x0 (size_t)
  180. [RSP+318 ] 0x0 (size_t)
  181. [RSP+320 ] 0xFCFC7F0100 (void*)
  182. [RSP+328 ] 0x360000F6E8 (size_t)
  183. [RSP+330 ] 0x0 (size_t)
  184. [RSP+338 ] 0x100 (size_t)
  185. [RSP+340 ] 0xFCFC7FE598 (void*)
  186. [RSP+348 ] 0x7FF7DD71F985 (void* -> Starfield.exe+275F985)
  187. movzx ebp,al
  188. [RSP+350 ] 0x7FF7E31991A0 (BSResource::Archive2::Index*)
  189. [RSP+358 ] 0xFCFC7FE570 (void*)
  190. [RSP+360 ] 0xFCFC7FE550 (char*) " \\%1Y\x02"
  191. [RSP+368 ] 0x213 (size_t)
  192. [RSP+370 ] 0x7FF7E31991A0 (BSResource::Archive2::Index*)
  193. [RSP+378 ] 0x7FF7DD80F228 (void* -> Starfield.exe+284F228)
  194. mov rdx,rax
  195. [RSP+380 ] 0xFCFC7FE8F8 (void*)
  196. [RSP+388 ] 0x7FF7DD80F76F (void* -> Starfield.exe+284F76F)
  197. nop
  198. [RSP+390 ] 0xFCFC7FE528 (void*)
  199. [RSP+398 ] 0x7FF7E319B200 (char*) "\xd0\x9bf=Y\x02"
  200. [RSP+3A0 ] 0x0 (size_t)
  201. [RSP+3A8 ] 0x100 (size_t)
  202. [RSP+3B0 ] 0x214 (size_t)
  203. [RSP+3B8 ] 0x0 (size_t)
  204. [RSP+3C0 ] 0x0 (size_t)
  205. [RSP+3C8 ] 0x7FF7E319A1D0 (char*) "X\x02\x04AY\x02"
  206. [RSP+3D0 ] 0xBC (size_t)
  207. [RSP+3D8 ] 0x100 (size_t)
  208. [RSP+3E0 ] 0x2594252E460 (BSResource::`anonymous namespace'::LooseFileStream*)
  209. [RSP+3E8 ] 0x259413C5C18 (char*) "SFBGS004 - Voices_en.ba2"
  210. [RSP+3F0 ] 0x0 (size_t)
  211. [RSP+3F8 ] 0x7FF7DD73BA10 (void* -> Starfield.exe+277BA10)
  212. mov rbx,[rsp+58h]
  213. [RSP+400 ] 0x25931255C20 (BSResource::LooseFileLocation*)
  214. [RSP+408 ] 0x25931255C78 (char*) "DATA\\"
  215. [RSP+410 ] 0x231000000000 (size_t)
  216. [RSP+418 ] 0x7FF7E319A1D0 (char*) "X\x02\x04AY\x02"
  217. [RSP+420 ] 0xFCFC7FE5A0 (void*)
  218. [RSP+428 ] 0x0 (size_t)
  219. [RSP+430 ] 0xFCFC7FEA70 (void*)
  220. [RSP+438 ] 0xA (size_t)
  221. [RSP+440 ] 0x100 (size_t)
  222. [RSP+448 ] 0x7FF7DD71FCE1 (void* -> Starfield.exe+275FCE1)
  223. cmp esi,[rbx+1C30h]
  224. [RSP+450 ] 0x7FF7E31991A0 (BSResource::Archive2::Index*)
  225. [RSP+458 ] 0x7FF7E31991A0 (BSResource::Archive2::Index*)
  226. [RSP+460 ] 0xFCFC7FEA90 (void*)
  227. [RSP+468 ] 0xA (size_t)
  228. [RSP+470 ] 0x7FF7E31991A0 (BSResource::Archive2::Index*)
  229. [RSP+478 ] 0xA (size_t)
  230. [RSP+480 ] 0xFCFC7FEA70 (void*)
  231. [RSP+488 ] 0x7FF7DD720072 (void* -> Starfield.exe+2760072)
  232. mov rcx,[rsi+8]
  233. [RSP+490 ] 0x7FF7E31991A0 (BSResource::Archive2::Index*)
  234. [RSP+498 ] 0x7FF7E319ADF8 (char*) "\x14\x0f"
  235. [RSP+4A0 ] 0x25A4F535930 (void*)
  236. [RSP+4A8 ] 0xA (size_t)
  237. [RSP+4B0 ] 0x0 (size_t)
  238. [RSP+4B8 ] 0xFCFC7FEAC0 (stl::local_function_detail::LocalFunctionImpl<<lambda_388780a92d8867bb8a17de262938cd2e>,BSEventNotifyControl,BSTEventDetail::SinkBase *>*)
  239. [RSP+4C0 ] 0x7FF7E319AE00 (BSTEventSource<BSResource::Archive2::RegisteredEvent>*)
  240. [RSP+4C8 ] 0x2 (size_t)
  241. [RSP+4D0 ] 0x7FF7E319AE00 (BSTEventSource<BSResource::Archive2::RegisteredEvent>*)
  242. [RSP+4D8 ] 0x25931264380 (void*)
  243. [RSP+4E0 ] 0x2593124D908 (void*)
  244. [RSP+4E8 ] 0x7FF7DD20CD6C (void* -> Starfield.exe+224CD6C)
  245. test eax,eax
  246. [RSP+4F0 ] 0x25931264340 (void*)
  247. [RSP+4F8 ] 0xFC0000000A (size_t)
  248. [RSP+500 ] 0xFCFC7FE770 (void*)
  249. [RSP+508 ] 0x7FF7E319ADF8 (char*) "\x14\x0f"
  250. [RSP+510 ] 0x2593124D908 (void*)
  251. [RSP+518 ] 0x7FF7DD20CE56 (void* -> Starfield.exe+224CE56)
  252. mov rax,[r14+40h]
  253. [RSP+520 ] 0xFCFC7FEAC0 (stl::local_function_detail::LocalFunctionImpl<<lambda_388780a92d8867bb8a17de262938cd2e>,BSEventNotifyControl,BSTEventDetail::SinkBase *>*)
  254. [RSP+528 ] 0x8 (size_t)
  255. [RSP+530 ] 0xFCFC7FE770 (void*)
  256. [RSP+538 ] 0x7FF7E319AE18 (void* -> Starfield.exe+81DAE18)
  257. call 0FFFFFFFFE0000011h
  258. [RSP+540 ] 0x0 (size_t)
  259. [RSP+548 ] 0x2594252E490 (void*)
  260. [RSP+550 ] 0x25CDC600040 (char*) "1"
  261. [RSP+558 ] 0x2594252E4A0 (void*)
  262. [RSP+560 ] 0x0 (size_t)
  263. [RSP+568 ] 0x7FF7DD823681 (void* -> Starfield.exe+2863681)
  264. mov eax,[rsp+0D8h]
  265. [RSP+570 ] 0x2593124D908 (void*)
  266. [RSP+578 ] 0x2594252E490 (void*)
  267. [RSP+580 ] 0x2594252E4A0 (void*)
  268. [RSP+588 ] 0x25CDC600040 (char*) "1"
  269. [RSP+590 ] 0x91768C (size_t)
  270. [RSP+598 ] 0x91768C (size_t)
  271. [RSP+5A0 ] 0x0 (size_t)
  272. [RSP+5A8 ] 0xFCFC7FE798 (char*) "\x02"
  273. [RSP+5B0 ] 0xFCFC7FE720 (char*) "\x11"
  274. [RSP+5B8 ] 0x0 (size_t)
  275. [RSP+5C0 ] 0x7FF7E319AE00 (BSTEventSource<BSResource::Archive2::RegisteredEvent>*)
  276. [RSP+5C8 ] 0x0 (size_t)
  277. [RSP+5D0 ] 0x11 (size_t)
  278. [RSP+5D8 ] 0x7FF700000000 (size_t)
  279. [RSP+5E0 ] 0x6D2A (size_t)
  280. [RSP+5E8 ] 0x18 (size_t)
  281. [RSP+5F0 ] 0x91768C (size_t)
  282. [RSP+5F8 ] 0x0 (size_t)
  283. [RSP+600 ] 0xFCFC7FEE10 (char*) "SFBGS004 - Voices_en.ba2"
  284. [RSP+608 ] 0x7FF7DD719F0A (void* -> Starfield.exe+2759F0A)
  285. mov r14,rax
  286. [RSP+610 ] 0x0 (size_t)
  287. [RSP+618 ] 0x0 (size_t)
  288. [RSP+620 ] 0x0 (size_t)
  289. [RSP+628 ] 0x0 (size_t)
  290. [RSP+630 ] 0x0 (size_t)
  291. [RSP+638 ] 0xFCFC7FE929 (char*) "d.wem"
  292. [RSP+640 ] 0x214 (size_t)
  293. [RSP+648 ] 0x2 (size_t)
  294. [RSP+650 ] 0x0 (size_t)
  295. [RSP+658 ] 0x0 (size_t)
  296. [RSP+660 ] 0xFCFC7FE8C0 (char*) "@"
  297. [RSP+668 ] 0x7FF7DD7218EC (void* -> Starfield.exe+27618EC)
  298. mov r14,[rbp+510h]
  299. [RSP+670 ] 0x7FF7E319AE00 (BSTEventSource<BSResource::Archive2::RegisteredEvent>*)
  300. [RSP+678 ] 0xFCFC7FEE10 (char*) "SFBGS004 - Voices_en.ba2"
  301. [RSP+680 ] 0xFCFC7FE929 (char*) "d.wem"
  302. [RSP+688 ] 0xFCFC7FEA04 (void*)
  303. [RSP+690 ] 0xFCFC7FE898 (char*) "*m"
  304. [RSP+698 ] 0x0 (size_t)
  305. [RSP+6A0 ] 0x2594252E460 (BSResource::`anonymous namespace'::LooseFileStream*)
  306. [RSP+6A8 ] 0x25CDC500020 (char*) "BTDX\x02"
  307. [RSP+6B0 ] 0x0 (size_t)
  308. [RSP+6B8 ] 0x20 (size_t)
  309. [RSP+6C0 ] 0x100000 (size_t)
  310. [RSP+6C8 ] 0x4AF0 (size_t)
  311. [RSP+6D0 ] 0x100000 (size_t)
  312. [RSP+6D8 ] 0x4AF0 (size_t)
  313. [RSP+6E0 ] 0x7FF700000000 (size_t)
  314. [RSP+6E8 ] 0xFCFC7FE920 (char*) "o/00fe0a9d.wem"
  315. [RSP+6F0 ] 0x25A4F5359EC (char*) "\x01"
  316. [RSP+6F8 ] 0x3261628C2C4171 (size_t)
  317. [RSP+700 ] 0x0 (size_t)
  318. [RSP+708 ] 0x58445442 (size_t)
  319. [RSP+710 ] 0x259413C5C00 (char*) "h\rD<Y\x02"
  320. [RSP+718 ] 0x7FF80000005F (size_t)
  321. [RSP+720 ] 0x2512D76D230 (char*) "\x01"
  322. [RSP+728 ] 0x100000 (size_t)
  323. [RSP+730 ] 0x26 (size_t)
  324. [RSP+738 ] 0xFCFC7FE868 (char*) "_"
  325. [RSP+740 ] 0x0 (size_t)
  326. [RSP+748 ] 0x6D2A (size_t)
  327. [RSP+750 ] 0xFCFC7FEDF0 (BSResource::`anonymous namespace'::LocationTree*)
  328. [RSP+758 ] 0x700000018 (size_t)
  329. [RSP+760 ] 0x7FF7E3199190 (BSResource::Archive2::Manager*)
  330. [RSP+768 ] 0xFFFFFFFF (size_t)
  331. [RSP+770 ] 0x25CDC600040 (char*) "1"
  332. [RSP+778 ] 0x0 (size_t)
  333. [RSP+780 ] 0x91768C (size_t)
  334. [RSP+788 ] 0x91E3B6 (size_t)
  335. [RSP+790 ] 0x6D2A (size_t)
  336. [RSP+798 ] 0x6D2A (size_t)
  337. [RSP+7A0 ] 0x91E3B6 (size_t)
  338. [RSP+7A8 ] 0x6F762F646E756F00 (size_t)
  339. [RSP+7B0 ] 0x676266732F656369 (size_t)
  340. [RSP+7B8 ] 0x6D73652E34303073 (size_t)
  341. [RSP+7C0 ] 0x6F6D746F626F722F (size_t)
  342. [RSP+7C8 ] 0x63736176616C6564 (size_t)
  343. [RSP+7D0 ] 0x6130656630302F6F (size_t)
  344. [RSP+7D8 ] 0x30006D65772E6439 (size_t)
  345. [RSP+7E0 ] 0x772E373439656666 (size_t)
  346. [RSP+7E8 ] 0x65772E006D006D65 (size_t)
  347. [RSP+7F0 ] 0x657320393900006D (size_t)
  348. [RSP+7F8 ] 0x6464006D65772E74 (size_t)
  349. [RSP+800 ] 0x315F656E696C6465 (size_t)
  350. [RSP+808 ] 0x6D65772E3033 (size_t)
  351. [RSP+810 ] 0xFFFFFFFB00000000 (size_t)
  352. [RSP+818 ] 0x0 (size_t)
  353. [RSP+820 ] 0xFCFC7FEAA0 (void*)
  354. [RSP+828 ] 0x7FF87B531E35 (void* -> ucrtbase.dll+0011E35)
  355. add rsp,68h
  356. [RSP+830 ] 0x24 (size_t)
  357. [RSP+838 ] 0x7FF87B520000 (void* -> ucrtbase.dll+0000000)
  358. pop r10
  359. [RSP+840 ] 0x0 (size_t)
  360. [RSP+848 ] 0x40 (size_t)
  361. [RSP+850 ] 0xFCFC7FEA50 (void*)
  362. [RSP+858 ] 0x7FF87B531B49 (void* -> ucrtbase.dll+0011B49)
  363. test al,al
  364. [RSP+860 ] 0xFFFFFFE800000000 (size_t)
  365. [RSP+868 ] 0x0 (size_t)
  366. [RSP+870 ] 0x890E0591FC74 (size_t)
  367. [RSP+878 ] 0x0 (size_t)
  368. [RSP+880 ] 0x24 (size_t)
  369. [RSP+888 ] 0x7FF87B520000 (void* -> ucrtbase.dll+0000000)
  370. pop r10
  371. [RSP+890 ] 0x7FF7E10B0E00 (void* -> Starfield.exe+60F0E00)
  372. xor [rsi-33h],ch
  373. [RSP+898 ] 0x104 (size_t)
  374. [RSP+8A0 ] 0xFCFC7FEAA0 (void*)
  375. [RSP+8A8 ] 0x2147B531B49 (size_t)
  376. [RSP+8B0 ] 0x214 (size_t)
  377. [RSP+8B8 ] 0x0 (size_t)
  378. [RSP+8C0 ] 0x258445442 (size_t)
  379. [RSP+8C8 ] 0x2144C524E47 (size_t)
  380. [RSP+8D0 ] 0x91768C (size_t)
  381. [RSP+8D8 ] 0x104 (size_t)
  382. [RSP+8E0 ] 0xFCFC7FF260 (char*) "BlueprintShips-B"
  383. [RSP+8E8 ] 0x25931255C20 (BSResource::LooseFileLocation*)
  384. [RSP+8F0 ] 0x25A4F535B18 (void*)
  385. [RSP+8F8 ] 0x4 (size_t)
  386. [RSP+900 ] 0xFCFC7FEB40 (void*)
  387. [RSP+908 ] 0xFCFC7FEA38 (char*) " \\%1Y\x02"
  388. [RSP+910 ] 0xFCFC7FF28B (void*)
  389. [RSP+918 ] 0x104 (size_t)
  390. [RSP+920 ] 0x2594252E460 (BSResource::`anonymous namespace'::LooseFileStream*)
  391. [RSP+928 ] 0xFCFC7FE7F8 (char*) " "
  392. [RSP+930 ] 0xFCFC7FE8C0 (char*) "@"
  393. [RSP+938 ] 0x7FF800000214 (size_t)
  394. [RSP+940 ] 0x3261628C2C4171 (size_t)
  395. [RSP+948 ] 0xFC00000000 (size_t)
  396. [RSP+950 ] 0xFCFC7FEE10 (char*) "SFBGS004 - Voices_en.ba2"
  397. [RSP+958 ] 0x2144C524E47 (size_t)
  398. [RSP+960 ] 0x0 (size_t)
  399. [RSP+968 ] 0x2512FBC730E (void*)
  400. [RSP+970 ] 0x7FF7DFCAF308 (void* -> Starfield.exe+4CEF308)
  401. sar bl,26h
  402. [RSP+978 ] 0xFCFC7FEA70 (void*)
  403. [RSP+980 ] 0x7FF7E319AE00 (BSTEventSource<BSResource::Archive2::RegisteredEvent>*)
  404. [RSP+988 ] 0xFFFFFFFF (size_t)
  405. [RSP+990 ] 0x25EFF500000 (void*)
  406. [RSP+998 ] 0xFCFC7FF040 (char*) "BlueprintShips-SSFBG\x08"
  407. [RSP+9A0 ] 0x20000000018 (size_t)
  408. [RSP+9A8 ] 0x2512D740000 (void*)
  409. [RSP+9B0 ] 0x0 (size_t)
  410. [RSP+9B8 ] 0x1 (size_t)
  411. [RSP+9C0 ] 0x0 (size_t)
  412. [RSP+9C8 ] 0x2512D87C0C0 (void*)
  413. [RSP+9D0 ] 0xFCFC7FEC80 (void*)
  414. [RSP+9D8 ] 0x7FF87B1FE0CF (char*) "\x0f\x1fD"
  415. [RSP+9E0 ] 0x25EFF509120 (void*)
  416. [RSP+9E8 ] 0x25A3774C530 (char*) "PfT7Z\x02"
  417. [RSP+9F0 ] 0xFCFC7FECB8 (void*)
  418. [RSP+9F8 ] 0xFCFC7FEC80 (void*)
  419. [RSP+A00 ] 0x2512D8401E0 (void*)
  420. [RSP+A08 ] 0x7FF87D790E92 (void* -> ntdll.dll+0020E92)
  421. movzx eax,word ptr [rbx+1Eh]
  422. [RSP+A10 ] 0xFCFC7FEC80 (void*)
  423. [RSP+A18 ] 0x7FF87ACB7791 (void* -> SspiCli.dll+0007791)
  424. mov rbx,[rsp+108h]
  425. [RSP+A20 ] 0x0 (size_t)
  426. [RSP+A28 ] 0x7FF87D79358A (void* -> ntdll.dll+002358A)
  427. test al,al
  428. [RSP+A30 ] 0x1 (size_t)
  429. [RSP+A38 ] 0x2512D840000 (void*)
  430. [RSP+A40 ] 0x25F00AC8D20 (void*)
  431. [RSP+A48 ] 0x0 (size_t)
  432. [RSP+A50 ] 0x0 (size_t)
  433. [RSP+A58 ] 0x7FF87D795BA1 (void* -> ntdll.dll+0025BA1)
  434. test eax,eax
  435. [RSP+A60 ] 0x0 (size_t)
  436. [RSP+A68 ] 0x25E47B82850 (void*)
  437. [RSP+A70 ] 0x0 (size_t)
  438. [RSP+A78 ] 0x2512D740000 (void*)
  439. [RSP+A80 ] 0x25EFF509120 (void*)
  440. [RSP+A88 ] 0xFCFC7FEC80 (void*)
  441. [RSP+A90 ] 0x25E47B82850 (void*)
  442. [RSP+A98 ] 0xFC00000001 (size_t)
  443. [RSP+AA0 ] 0x7C8 (size_t)
  444. [RSP+AA8 ] 0x25F00AC7CC0 (void*)
  445. [RSP+AB0 ] 0xFFFFFF (size_t)
  446. [RSP+AB8 ] 0x100000009 (size_t)
  447. [RSP+AC0 ] 0x2512D840000 (void*)
  448. [RSP+AC8 ] 0xF14 (size_t)
  449. [RSP+AD0 ] 0xAFA533DF3E35 (size_t)
  450. [RSP+AD8 ] 0x0 (size_t)
  451. [RSP+AE0 ] 0xFCFC7FECE0 (void*)
  452. [RSP+AE8 ] 0x7FF87D7D2850 (void* -> ntdll.dll+0062850 RtlUnicodeStringToAnsiString)
  453. mov edi,eax
  454. [RSP+AF0 ] 0x7FFE0358 (void*)
  455. [RSP+AF8 ] 0x7FF87D7B00F3 (void* -> ntdll.dll+00400F3 RtlGetSystemTimePrecise)
  456. mov rax,[r12]
  457. [RSP+B00 ] 0x1AB8220A (size_t)
  458. [RSP+B08 ] 0x7FF7DD215164 (void* -> Starfield.exe+2255164)
  459. mov rbp,rax
  460. [RSP+B10 ] 0x25F00AC8D20 (void*)
  461. [RSP+B18 ] 0x7FF87D7947B1 (void* -> ntdll.dll+00247B1 RtlFreeHeap)
  462. mov r9d,eax
  463. [RSP+B20 ] 0x1D4 (size_t)
  464. [RSP+B28 ] 0x25A4F535930 (void*)
  465. [RSP+B30 ] 0x1EB (size_t)
  466. [RSP+B38 ] 0x3B (size_t)
  467. [RSP+B40 ] 0x2512F936CD0 (SharedHeapAllocator*)
  468. [RSP+B48 ] 0x2512F936CD0 (SharedHeapAllocator*)
  469. [RSP+B50 ] 0x7FF7E0D00340 (char*) "\x01"
  470. [RSP+B58 ] 0x7FF7DD20B66E (void* -> Starfield.exe+224B66E)
  471. mov rbx,rax
  472. [RSP+B60 ] 0x5F (size_t)
  473. [RSP+B68 ] 0x7FF7DD215164 (void* -> Starfield.exe+2255164)
  474. mov rbp,rax
  475. [RSP+B70 ] 0x0 (size_t)
  476. [RSP+B78 ] 0x0 (size_t)
  477. [RSP+B80 ] 0xFCFC7FEDE8 (void*)
  478. [RSP+B88 ] 0x0 (size_t)
  479. [RSP+B90 ] 0x0 (size_t)
  480. [RSP+B98 ] 0xFCFC7FE840 (void*)
  481. [RSP+BA0 ] 0x25A00000002 (void*)
  482. [RSP+BA8 ] 0x22 (size_t)
  483. [RSP+BB0 ] 0x890E0591FDD4 (size_t)
  484. [RSP+BB8 ] 0x23 (size_t)
  485. [RSP+BC0 ] 0x7FF7E10AF8C0 (TESDataHandler*)
  486. [RSP+BC8 ] 0x0 (size_t)
  487. [RSP+BD0 ] 0x25A4F535930 (void*)
  488. [RSP+BD8 ] 0x7FF7DFA44E70 (char*) "%s%s%s%s"
  489. [RSP+BE0 ] 0x104 (size_t)
  490. [RSP+BE8 ] 0xFCFC7FEDD0 (void*)
  491. [RSP+BF0 ] 0xFCFC7FEE10 (char*) "SFBGS004 - Voices_en.ba2"
  492. [RSP+BF8 ] 0x7FF7DB28B669 (void* -> Starfield.exe+02CB669)
  493. mov rbx,[rsp+40h]
  494. [RSP+C00 ] 0x8 (size_t)
  495. [RSP+C08 ] 0xFCFC7FEEB0 (void*)
  496. [RSP+C10 ] 0x8 (size_t)
  497. [RSP+C18 ] 0xFCFC7FEEB0 (void*)
  498. [RSP+C20 ] 0x0 (size_t)
  499. [RSP+C28 ] 0xFCFC7FEDD0 (void*)
  500. [RSP+C30 ] 0x7FF7E10AF8C0 (TESDataHandler*)
  501. [RSP+C38 ] 0x0 (size_t)
  502. [RSP+C40 ] 0x7FF7E10B0E00 (void* -> Starfield.exe+60F0E00)
  503. xor [rsi-33h],ch
  504. [RSP+C48 ] 0x25A4F535930 (void*)
  505. [RSP+C50 ] 0x25538C73FC0 (TESPackedFile*)
  506. [RSP+C58 ] 0x0 (size_t)
  507. [RSP+C60 ] 0xFCFC7FF4D0 (void*)
  508. [RSP+C68 ] 0x7FF7DB55E5BC (void* -> Starfield.exe+059E5BC)
  509. nop
  510. [RSP+C70 ] 0xFCFC7FEE10 (char*) "SFBGS004 - Voices_en.ba2"
  511. [RSP+C78 ] 0x0 (size_t)
  512. [RSP+C80 ] 0x0 (size_t)
  513. [RSP+C88 ] 0x7FF7DFA44500 (char*) "Dump the list of loaded files and info about them to the console."
  514. [RSP+C90 ] 0x7FF7DFA41CE8 (char*) "en"
  515. [RSP+C98 ] 0x7FF7DFA4455C (char*) ".ba2"
  516. [RSP+CA0 ] 0x7FF7DFCAEF00 (void* -> Starfield.exe+4CEEF00)
  517. mov bl,71h
  518. [RSP+CA8 ] 0x800 (size_t)
  519. [RSP+CB0 ] 0x0 (size_t)
  520. [RSP+CB8 ] 0x7FF7E31990E0 (BSResource::`anonymous namespace'::GlobalPaths*)
  521. [RSP+CC0 ] 0x3430305347424653 (size_t)
  522. [RSP+CC8 ] 0x6563696F56202D20 (size_t)
  523. [RSP+CD0 ] 0x3261622E6E655F73 (size_t)
  524. [RSP+CD8 ] 0x3261622E6E00 (size_t)
  525. [RSP+CE0 ] 0x7FF7E0D00340 (char*) "\x01"
  526. [RSP+CE8 ] 0x7FF7DD20B66E (void* -> Starfield.exe+224B66E)
  527. mov rbx,rax
  528. [RSP+CF0 ] 0x5F (size_t)
  529. [RSP+CF8 ] 0xFFFF (size_t)
  530. [RSP+D00 ] 0x0 (size_t)
  531. [RSP+D08 ] 0xFCFC7FF038 (void*)
  532. [RSP+D10 ] 0x104 (size_t)
  533. [RSP+D18 ] 0x7FF7DD20D6B7 (void* -> Starfield.exe+224D6B7)
  534. mov rbx,rax
  535. [RSP+D20 ] 0x7FF7E10AF8C0 (TESDataHandler*)
  536. [RSP+D28 ] 0x0 (size_t)
  537. [RSP+D30 ] 0xCE9 (size_t)
  538. [RSP+D38 ] 0x7FF7DD212100 (void* -> Starfield.exe+2252100)
  539. mov eax,[rbp+4]
  540. [RSP+D40 ] 0x0 (size_t)
  541. [RSP+D48 ] 0x7FF7E319AE18 (void* -> Starfield.exe+81DAE18)
  542. call 0FFFFFFFFE0000011h
  543. [RSP+D50 ] 0xFFFFFFF8 (size_t)
  544. [RSP+D58 ] 0x7FF7E319AE00 (BSTEventSource<BSResource::Archive2::RegisteredEvent>*)
  545. [RSP+D60 ] 0x25538C73FF8 (char*) "SFBGS004.esm"
  546. [RSP+D68 ] 0x7FF7DD20CA60 (void* -> Starfield.exe+224CA60)
  547. nop
  548. [RSP+D70 ] 0x25538C73FF8 (char*) "SFBGS004.esm"
  549. [RSP+D78 ] 0x8 (size_t)
  550. [RSP+D80 ] 0x7FF7E319AE08 (char*) "\x08"
  551. [RSP+D88 ] 0x7FF7DD212100 (void* -> Starfield.exe+2252100)
  552. mov eax,[rbp+4]
  553. [RSP+D90 ] 0x7FF7DFA12B90 (void* -> Starfield.exe+4A52B90)
  554. mov al,[0F000007FF7DB27E4h]
  555. [RSP+D98 ] 0x7FF7E319AE08 (char*) "\x08"
  556. [RSP+DA0 ] 0x8 (size_t)
  557. [RSP+DA8 ] 0xFCFC7FF260 (char*) "BlueprintShips-B"
  558. [RSP+DB0 ] 0xCE10AF8C0 (size_t)
  559. [RSP+DB8 ] 0x0 (size_t)
  560. [RSP+DC0 ] 0x18E10AF8C0 (size_t)
  561. [RSP+DC8 ] 0x0 (size_t)
  562. [RSP+DD0 ] 0x25538C73FF8 (char*) "SFBGS004.esm"
  563. [RSP+DD8 ] 0x7FF7DB55E4E3 (void* -> Starfield.exe+059E4E3)
  564. cmp byte ptr [5878635h],0
  565. [RSP+DE0 ] 0x25538C73FF8 (char*) "SFBGS004.esm"
  566. [RSP+DE8 ] 0xFCFC7FF4D0 (void*)
  567. [RSP+DF0 ] 0x0 (size_t)
  568. [RSP+DF8 ] 0x0 (size_t)
  569. [RSP+E00 ] 0x3430305347424653 (size_t)
  570. [RSP+E08 ] 0x656361705300 (size_t)
  571. [RSP+E10 ] 0x14837 (size_t)
  572. [RSP+E18 ] 0x140F0 (size_t)
  573. [RSP+E20 ] 0x259413BAD80 (void*)
  574. [RSP+E28 ] 0x0 (size_t)
  575. [RSP+E30 ] 0xFCFC7FF110 (char*) "\x07"
  576. [RSP+E38 ] 0x7FF7DD20B8E6 (void* -> Starfield.exe+224B8E6)
  577. mov rsi,[rsp+30h]
  578. [RSP+E40 ] 0x0 (size_t)
  579. [RSP+E48 ] 0x0 (size_t)
  580. [RSP+E50 ] 0x0 (size_t)
  581. [RSP+E58 ] 0x140F0 (size_t)
  582. [RSP+E60 ] 0x7FF7E339B494 (void* -> Starfield.exe+83DB494)
  583. nop
  584. [RSP+E68 ] 0x7FF7DD80F393 (void* -> Starfield.exe+284F393)
  585. test rsi,rsi
  586. [RSP+E70 ] 0x0 (size_t)
  587. [RSP+E78 ] 0x0 (size_t)
  588. [RSP+E80 ] 0x259413BAD80 (void*)
  589. [RSP+E88 ] 0x7FF7DD20B8E6 (void* -> Starfield.exe+224B8E6)
  590. mov rsi,[rsp+30h]
  591. [RSP+E90 ] 0x91DB (size_t)
  592. [RSP+E98 ] 0x0 (size_t)
  593. [RSP+EA0 ] 0x1 (size_t)
  594. [RSP+EA8 ] 0x7FF7DB2CD9E4 (void* -> Starfield.exe+030D9E4)
  595. jmp short 000000000000001Bh
  596. [RSP+EB0 ] 0x7FF7E10B0E01 (void* -> Starfield.exe+60F0E01)
  597. outsb dx,[rsi]
  598. [RSP+EB8 ] 0x7FF7DB56C6F3 (void* -> Starfield.exe+05AC6F3)
  599. nop
  600. [RSP+EC0 ] 0x0 (size_t)
  601. [RSP+EC8 ] 0x7FF7E319B200 (char*) "\xd0\x9bf=Y\x02"
  602. [RSP+ED0 ] 0xFCFC7FF2B0 (char*) "SFBGS004"
  603. [RSP+ED8 ] 0x7FF7DD812DB4 (void* -> Starfield.exe+2852DB4)
  604. jmp short 000000000000001Eh
  605. [RSP+EE0 ] 0x25538C73FF8 (char*) "SFBGS004.esm"
  606. [RSP+EE8 ] 0x0 (size_t)
  607. [RSP+EF0 ] 0x6E69727065756C42 (size_t)
  608. [RSP+EF8 ] 0x532D737069685374 (size_t)
  609. [RSP+F00 ] 0x3430000847424653 (size_t)
  610. [RSP+F08 ] 0x652E65006D73652E (size_t)
  611. [RSP+F10 ] 0x65006D73652E (size_t)
  612. [RSP+F18 ] 0x7364615020676E (size_t)
  613. [RSP+F20 ] 0x312D31 (size_t)
  614. [RSP+F28 ] 0x7FF7DD211C15 (void* -> Starfield.exe+2251C15)
  615. mov rax,[rsp+78h]
  616. [RSP+F30 ] 0x0 (size_t)
  617. [RSP+F38 ] 0x2593BA56800 (void*)
  618. [RSP+F40 ] 0x2594255DCE0 (void*)
  619. [RSP+F48 ] 0x25941322C80 (char*) "pb9AY\x02"
  620. [RSP+F50 ] 0x259424D09F0 (void*)
  621. [RSP+F58 ] 0x7FF7DD215164 (void* -> Starfield.exe+2255164)
  622. mov rbp,rax
  623. [RSP+F60 ] 0x2 (size_t)
  624. [RSP+F68 ] 0x7FF7DD20D6B7 (void* -> Starfield.exe+224D6B7)
  625. mov rbx,rax
  626. [RSP+F70 ] 0x7FF7E10AF8C0 (TESDataHandler*)
  627. [RSP+F78 ] 0x0 (size_t)
  628. [RSP+F80 ] 0xCE9 (size_t)
  629. [RSP+F88 ] 0x7FF7DD212100 (void* -> Starfield.exe+2252100)
  630. mov eax,[rbp+4]
  631. [RSP+F90 ] 0x0 (size_t)
  632. [RSP+F98 ] 0x7FF7E319AE18 (void* -> Starfield.exe+81DAE18)
  633. call 0FFFFFFFFE0000011h
  634. [RSP+FA0 ] 0xFFFFFFF8 (size_t)
  635. [RSP+FA8 ] 0x25538C73FC0 (TESPackedFile*)
  636. [RSP+FB0 ] 0x7 (size_t)
  637. [RSP+FB8 ] 0x7FF7DD20CC2C (void* -> Starfield.exe+224CC2C)
  638. mov edx,[rsi+20h]
  639. [RSP+FC0 ] 0x7 (size_t)
  640. [RSP+FC8 ] 0x8 (size_t)
  641. [RSP+FD0 ] 0x7FF7E319AE00 (BSTEventSource<BSResource::Archive2::RegisteredEvent>*)
  642. [RSP+FD8 ] 0xFCFC7FF1F8 (void*)
  643. [RSP+FE0 ] 0x7FF7DFA12B90 (void* -> Starfield.exe+4A52B90)
  644. mov al,[0F000007FF7DB27E4h]
  645. [RSP+FE8 ] 0x7FF7E319AE08 (char*) "\x08"
  646. [RSP+FF0 ] 0x18413C5CC0 (size_t)
  647. [RSP+FF8 ] 0x7FF7DDC049F1 (void* -> Starfield.exe+2C449F1)
  648. test eax,eax
  649. [RSP+1000] 0x7FF7E10AF8C0 (TESDataHandler*)
  650. [RSP+1008] 0x0 (size_t)
  651. [RSP+1010] 0x4E10AF8C0 (size_t)
  652. [RSP+1018] 0x0 (size_t)
  653. [RSP+1020] 0x25538C73FC0 (TESPackedFile*)
  654. [RSP+1028] 0x7FF7DB55E43E (void* -> Starfield.exe+059E43E)
  655. add rsp,240h
  656. [RSP+1030] 0xFCFC7FEF50 (char*) "SFBGS004"
  657. [RSP+1038] 0x7FF7DFA43458 (void* -> Starfield.exe+4A83458)
  658. [RSP+1040] 0x0 (size_t)
  659. [RSP+1048] 0x0 (size_t)
  660. [RSP+1050] 0x6D73652E (size_t)
  661. [RSP+1058] 0x7FF7DB61668A (void* -> Starfield.exe+065668A)
  662. nop
  663. [RSP+1060] 0x25A4F535930 (void*)
  664. [RSP+1068] 0x7FF7E1169EC8 (BGSGrassManager*)
  665. [RSP+1070] 0x7FF7E10CBE40 (void* -> Starfield.exe+610BE40)
  666. and bh,dh
  667. [RSP+1078] 0x7FF7DD215507 (void* -> Starfield.exe+2255507)
  668. mov rbx,[rsp+60h]
  669. [RSP+1080] 0x178 (size_t)
  670. [RSP+1088] 0x178 (size_t)
  671. [RSP+1090] 0x7FF7E10CBE40 (void* -> Starfield.exe+610BE40)
  672. and bh,dh
  673. [RSP+1098] 0x7FF7DD215164 (void* -> Starfield.exe+2255164)
  674. mov rbp,rax
  675. [RSP+10A0] 0xFFFFFFFF (size_t)
  676. [RSP+10A8] 0x0 (size_t)
  677. [RSP+10B0] 0x0 (size_t)
  678. [RSP+10B8] 0x25941305D60 (char*) "pZ0AY\x02"
  679. [RSP+10C0] 0x1EB (size_t)
  680. [RSP+10C8] 0x20 (size_t)
  681. [RSP+10D0] 0x2512FB30080 (SharedHeapAllocator*)
  682. [RSP+10D8] 0x2512F936CD0 (SharedHeapAllocator*)
  683. [RSP+10E0] 0x7FF7E0D00340 (char*) "\x01"
  684. [RSP+10E8] 0x7FF7DD20B66E (void* -> Starfield.exe+224B66E)
  685. mov rbx,rax
  686. [RSP+10F0] 0x20 (size_t)
  687. [RSP+10F8] 0x0 (size_t)
  688. [RSP+1100] 0x8 (size_t)
  689. [RSP+1108] 0x7FF7DB53D39F (void* -> Starfield.exe+057D39F)
  690. mov eax,ebp
  691. [RSP+1110] 0x6E69727065756C42 (size_t)
  692. [RSP+1118] 0x422D737069685374 (size_t)
  693. [RSP+1120] 0x5F00000000 (size_t)
  694. [RSP+1128] 0x74532D7370696853 (size_t)
  695. [RSP+1130] 0x7FF7E10AF8C0 (TESDataHandler*)
  696. [RSP+1138] 0x7FF7E10B0E00 (void* -> Starfield.exe+60F0E00)
  697. xor [rsi-33h],ch
  698. [RSP+1140] 0x25A4F535930 (void*)
  699. [RSP+1148] 0x8 (size_t)
  700. [RSP+1150] 0x400000000 (size_t)
  701. [RSP+1158] 0xFCFC7FF4D0 (void*)
  702. [RSP+1160] 0x3430305347424653 (size_t)
  703. [RSP+1168] 0x7FF7DB272900 (void* -> Starfield.exe+02B2900)
  704. test rcx,rcx
  705. [RSP+1170] 0x0 (size_t)
  706. [RSP+1178] 0x0 (size_t)
  707. [RSP+1180] 0x7FF7E10B9C48 (void* -> Starfield.exe+60F9C48)
  708. add [rax],al
  709. [RSP+1188] 0x7FF7E1167C01 (void* -> Starfield.exe+61A7C01)
  710. add [rax],al
  711. [RSP+1190] 0x7FF7E10B0E30 (char*) "\x01"
  712. [RSP+1198] 0x7FF7DB27E4C8 (void* -> Starfield.exe+02BE4C8)
  713. mov [rdi+8],rax
  714. [RSP+11A0] 0x4 (size_t)
  715. [RSP+11A8] 0x0 (size_t)
  716. [RSP+11B0] 0xFFFFFFFF (size_t)
  717. [RSP+11B8] 0x25941307C98 (TES*)
  718. [RSP+11C0] 0x25538C72410 (TESPackedFile*)
  719. [RSP+11C8] 0x7FF7DD20FC1B (void* -> Starfield.exe+224FC1B)
  720. test al,al
  721. [RSP+11D0] 0x7FF7E10B0E30 (char*) "\x01"
  722. [RSP+11D8] 0x7FF7DB52F231 (char*) "\xc6\x87t\x01"
  723. [RSP+11E0] 0x0 (size_t)
  724. [RSP+11E8] 0x5F (size_t)
  725. [RSP+11F0] 0x0 (size_t)
  726. [RSP+11F8] 0x7FF7DD20FEF6 (void* -> Starfield.exe+224FEF6)
  727. mov ebp,eax
  728. [RSP+1200] 0x7FF7E10B0E20 (char*) "\x03"
  729. [RSP+1208] 0x7FF7DB542A79 (void* -> Starfield.exe+0582A79)
  730. nop
  731. [RSP+1210] 0x7FF7E10AF8C0 (TESDataHandler*)
  732. [RSP+1218] 0x0 (size_t)
  733. [RSP+1220] 0x0 (size_t)
  734. [RSP+1228] 0x0 (size_t)
  735. [RSP+1230] 0x7FF7DFA12B90 (void* -> Starfield.exe+4A52B90)
  736. mov al,[0F000007FF7DB27E4h]
  737. [RSP+1238] 0x7FF7E10B0E20 (char*) "\x03"
  738. [RSP+1240] 0x25538C73FC0 (TESPackedFile*)
  739. [RSP+1248] 0x7FF7DB554DBE (void* -> Starfield.exe+0594DBE)
  740. mov [rdi+21Ah],bx
  741. [RSP+1250] 0x259425483F0 (void*)
  742. [RSP+1258] 0x2 (size_t)
  743. [RSP+1260] 0x8425481C0 (size_t)
  744. [RSP+1268] 0x2 (size_t)
  745. [RSP+1270] 0x259425483F0 (void*)
  746. [RSP+1278] 0x7FF7DB54E793 (void* -> Starfield.exe+058E793)
  747. mov rax,[rbx+8]
  748. [RSP+1280] 0x259425483F0 (void*)
  749. [RSP+1288] 0x1 (size_t)
  750. [RSP+1290] 0x7FF7DFA43458 (void* -> Starfield.exe+4A83458)
  751. [RSP+1298] 0xFCFC7FF3D8 (char*) "\x01"
  752. [RSP+12A0] 0xFCFC7FF3E0 (TESDataHandler::ArchiveRegistrationListener*)
  753. [RSP+12A8] 0x1 (size_t)
  754. [RSP+12B0] 0x25A4F535930 (void*)
  755. [RSP+12B8] 0x0 (size_t)
  756. [RSP+12C0] 0xFCFC7FF400 (char*) "0YSOZ\x02"
  757. [RSP+12C8] 0x1 (size_t)
  758. [RSP+12D0] 0x0 (size_t)
  759. [RSP+12D8] 0x0 (size_t)
  760. [RSP+12E0] 0xFCFC7FF420 (void*)
  761. [RSP+12E8] 0x1 (size_t)
  762. [RSP+12F0] 0x0 (size_t)
  763. [RSP+12F8] 0x0 (size_t)
  764. [RSP+1300] 0xFCFC7FF440 (void*)
  765. [RSP+1308] 0x1 (size_t)
  766. [RSP+1310] 0x0 (size_t)
  767. [RSP+1318] 0x0 (size_t)
  768. [RSP+1320] 0xFCFC7FF460 (void*)
  769. [RSP+1328] 0x1 (size_t)
  770. [RSP+1330] 0x0 (size_t)
  771. [RSP+1338] 0x0 (size_t)
  772. [RSP+1340] 0xFCFC7FF480 (void*)
  773. [RSP+1348] 0x1 (size_t)
  774. [RSP+1350] 0x0 (size_t)
  775. [RSP+1358] 0x0 (size_t)
  776. [RSP+1360] 0xFCFC7FF4A0 (void*)
  777. [RSP+1368] 0x1 (size_t)
  778. [RSP+1370] 0x0 (size_t)
  779. [RSP+1378] 0x0 (size_t)
  780. [RSP+1380] 0xFCFC7FF4C0 (void*)
  781. [RSP+1388] 0x1 (size_t)
  782. [RSP+1390] 0xFCFC7FF2E0 (void*)
  783. [RSP+1398] 0xFCFC7FF4E0 (void*)
  784. [RSP+13A0] 0x9 (size_t)
  785. [RSP+13A8] 0x25941396200 (char*) "\x0b\x02"
  786. [RSP+13B0] 0x0 (size_t)
  787. [RSP+13B8] 0x0 (size_t)
  788. [RSP+13C0] 0xF (size_t)
  789. [RSP+13C8] 0x49656E69756E6500 (size_t)
  790. [RSP+13D0] 0x52286C006C65746E (size_t)
  791. [RSP+13D8] 0x0 (size_t)
  792. [RSP+13E0] 0xF (size_t)
  793. [RSP+13E8] 0x1800000001 (size_t)
  794. [RSP+13F0] 0xD5A00000010 (size_t)
  795. [RSP+13F8] 0x25941322C00 (void*)
  796. [RSP+1400] 0x7FF7E10BE7A8 (GameBIEvents::ClientSettingsBIEvents*)
  797. [RSP+1408] 0x0 (size_t)
  798. [RSP+1410] 0xF (size_t)
  799. [RSP+1418] 0x10DE00002704 (size_t)
  800. [RSP+1420] 0xA140C51458 (size_t)
  801. [RSP+1428] 0x3EB2 (size_t)
  802. [RSP+1430] 0x3FA2 (size_t)
  803. [RSP+1438] 0x1D4 (size_t)
  804. [RSP+1440] 0x25A4F535930 (void*)
  805. [RSP+1448] 0x0 (size_t)
  806. [RSP+1450] 0x7FF7DF96F5C0 (void* -> Starfield.exe+49AF5C0)
  807. adc [rdi],bh
  808. [RSP+1458] 0x0 (size_t)
  809. [RSP+1460] 0xBC (size_t)
  810. [RSP+1468] 0x2 (size_t)
  811. [RSP+1470] 0xFCFC7FF6D0 (void*)
  812. [RSP+1478] 0x7FF7DC7D146E (void* -> Starfield.exe+181146E)
  813. cmp qword ptr [48AAAF2h],0
  814. [RSP+1480] 0x7FF7E10AF8C0 (TESDataHandler*)
  815. [RSP+1488] 0x40 (size_t)
  816. [RSP+1490] 0x2 (size_t)
  817. [RSP+1498] 0xFC00000002 (size_t)
  818. [RSP+14A0] 0x7FF7DBA607D0 (void* -> Starfield.exe+0AA07D0)
  819. mov [rsp+18h],rbx
  820. [RSP+14A8] 0x25931B6ABD0 (NiNode*)
  821. [RSP+14B0] 0x25142B18300 (void*)
  822. [RSP+14B8] 0x7FF7DD214FD4 (void* -> Starfield.exe+2254FD4)
  823. mov rax,rsi
  824. [RSP+14C0] 0x7FF7DB538CA0 (void* -> Starfield.exe+0578CA0)
  825. sub rsp,38h
  826. [RSP+14C8] 0x7FF700000000 (size_t)
  827. [RSP+14D0] 0x25941020202 (char*) "eapons/kraken/mods/watercamo/kraken_suppressormod_color.dds"
  828. [RSP+14D8] 0x7FF7E3173440 (void* -> Starfield.exe+81B3440)
  829. xor dword ptr [rcx+25142h],6A800h
  830. [RSP+14E0] 0x14 (size_t)
  831. [RSP+14E8] 0x7FF7E10BEDC0 (BSFixedSizeBlockAllocator::TAlloc<4294967296,16777216,128>*)
  832. [RSP+14F0] 0x7FF7E10CBE40 (void* -> Starfield.exe+610BE40)
  833. and bh,dh
  834. [RSP+14F8] 0x0 (size_t)
  835. [RSP+1500] 0x7FF7DFBC7898 (void* -> Starfield.exe+4C07898)
  836. add [rax],bl
  837. [RSP+1508] 0x7FF7DB5388C0 (void* -> Starfield.exe+05788C0)
  838. mov rax,rsp
  839. [RSP+1510] 0x7FF700000000 (size_t)
  840. [RSP+1518] 0x5941020202 (size_t)
  841. [RSP+1520] 0x25941307C98 (TES*)
  842. [RSP+1528] 0x178 (size_t)
  843. [RSP+1530] 0x2512F936CD0 (SharedHeapAllocator*)
  844. [RSP+1538] 0x0 (size_t)
  845. [RSP+1540] 0x7FF700000000 (size_t)
  846. [RSP+1548] 0x0 (size_t)
  847. [RSP+1550] 0x0 (size_t)
  848. [RSP+1558] 0x0 (size_t)
  849. [RSP+1560] 0x0 (size_t)
  850. [RSP+1568] 0x0 (size_t)
  851. [RSP+1570] 0x0 (size_t)
  852. [RSP+1578] 0x0 (size_t)
  853. [RSP+1580] 0x2CB00000000 (size_t)
  854. [RSP+1588] 0x7FF87B5326EE (void* -> ucrtbase.dll+00126EE)
  855. mov eax,edi
  856. [RSP+1590] 0x7FF7DFBC7908 (void* -> Starfield.exe+4C07908)
  857. lock sbb [rdi-24h],bh
  858. [RSP+1598] 0x7FF7DB538CD0 (void* -> Starfield.exe+0578CD0)
  859. sub rsp,38h
  860. [RSP+15A0] 0x7FF700000000 (size_t)
  861. [RSP+15A8] 0x0 (size_t)
  862. [RSP+15B0] 0x25941307C98 (TES*)
  863. [RSP+15B8] 0x2F (size_t)
  864. [RSP+15C0] 0x178 (size_t)
  865. [RSP+15C8] 0x0 (size_t)
  866. [RSP+15D0] 0x7FF7DFBC78D0 (void* -> Starfield.exe+4C078D0)
  867. sbb byte ptr [rax],7Fh
  868. [RSP+15D8] 0x7FF7DC810540 (void* -> Starfield.exe+1850540)
  869. mov [rsp+8],rbx
  870. [RSP+15E0] 0x20202 (size_t)
  871. [RSP+15E8] 0x7FF7E3173440 (void* -> Starfield.exe+81B3440)
  872. xor dword ptr [rcx+25142h],6A800h
  873. [RSP+15F0] 0x0 (size_t)
  874. [RSP+15F8] 0x7FF7E10AC420 (void* -> Starfield.exe+60EC420)
  875. add [rax],al
  876. [RSP+1600] 0xFFFFFFF8 (size_t)
  877. [RSP+1608] 0x0 (size_t)
  878. [RSP+1610] 0x7FF7DFBC7908 (void* -> Starfield.exe+4C07908)
  879. lock sbb [rdi-24h],bh
  880. [RSP+1618] 0x7FF7DB538C80 (void* -> Starfield.exe+0578C80)
  881. sub rsp,38h
  882. [RSP+1620] 0x0 (size_t)
  883. [RSP+1628] 0x0 (size_t)
  884. [RSP+1630] 0x25941307C98 (TES*)
  885. [RSP+1638] 0xFFFFFFFF (size_t)
  886. [RSP+1640] 0x7FF7DFA12B90 (void* -> Starfield.exe+4A52B90)
  887. mov al,[0F000007FF7DB27E4h]
  888. [RSP+1648] 0x0 (size_t)
  889. [RSP+1650] 0x7FF7DFBC7908 (void* -> Starfield.exe+4C07908)
  890. lock sbb [rdi-24h],bh
  891. [RSP+1658] 0x7FF7DB538CD0 (void* -> Starfield.exe+0578CD0)
  892. sub rsp,38h
  893. [RSP+1660] 0x7FF700000000 (size_t)
  894. [RSP+1668] 0x7FF7E1000000 (void* -> Starfield.exe+6040000)
  895. add [rax],al
  896. [RSP+1670] 0x25941307C98 (TES*)
  897. [RSP+1678] 0x7FF7E10B9C28 (void* -> Starfield.exe+60F9C28)
  898. add [rax],al
  899. [RSP+1680] 0x1D4 (size_t)
  900. [RSP+1688] 0x0 (size_t)
  901. [RSP+1690] 0x0 (size_t)
  902. [RSP+1698] 0x1 (size_t)
  903. [RSP+16A0] 0x3DCCCCCD (size_t)
  904. [RSP+16A8] 0x0 (size_t)
  905. [RSP+16B0] 0x1D (size_t)
  906. [RSP+16B8] 0x25A4F535930 (void*)
  907. [RSP+16C0] 0xBC (size_t)
  908. [RSP+16C8] 0x4 (size_t)
  909. [RSP+16D0] 0x1D4 (size_t)
  910. [RSP+16D8] 0x0 (size_t)
  911. [RSP+16E0] 0xFCFC7FF940 (void*)
  912. [RSP+16E8] 0x7FF7DC7E23C3 (void* -> Starfield.exe+18223C3)
  913. call 0000000000C3679Dh
  914. [RSP+16F0] 0x7FF700000002 (size_t)
  915. [RSP+16F8] 0xFCFC7FF7A0 (std::_Func_impl_no_alloc<std::_Binder<std::_Unforced,float ( TES::*)(NiPoint3 const &,float,float),TES * &,std::_Ph<1> const &,std::_Ph<2> const &,std::_Ph<3> const &>,float,NiPoint3 const &,float,float>*)
  916. [RSP+1700] 0xFCFC7FF690 (void*)
  917. [RSP+1708] 0x25941173FF8 (MaterialLayerInterface*)
  918. [RSP+1710] 0x7FF700000002 (size_t)
  919. [RSP+1718] 0x0 (size_t)
  920. [RSP+1720] 0x7FF700000002 (size_t)
  921. [RSP+1728] 0x0 (size_t)
  922. [RSP+1730] 0x10 (size_t)
  923. [RSP+1738] 0x2 (size_t)
  924. [RSP+1740] 0x7FF7DFBC7AF8 (void* -> Starfield.exe+4C07AF8)
  925. xor [7FF7DB33h],ch
  926. [RSP+1748] 0x0 (size_t)
  927. [RSP+1750] 0x0 (size_t)
  928. [RSP+1758] 0x7FF7E3197180 (void* -> Starfield.exe+81D7180)
  929. add [rax],al
  930. [RSP+1760] 0x0 (size_t)
  931. [RSP+1768] 0x0 (size_t)
  932. [RSP+1770] 0x7FF7DC25A7E0 (void* -> Starfield.exe+129A7E0)
  933. sub rsp,28h
  934. [RSP+1778] 0x0 (size_t)
  935. [RSP+1780] 0x7FF7DC25A400 (void* -> Starfield.exe+129A400)
  936. mov [rsp+8],rbx
  937. [RSP+1788] 0x0 (size_t)
  938. [RSP+1790] 0x7FF7DC25A540 (void* -> Starfield.exe+129A540)
  939. mov [rsp+18h],rbx
  940. [RSP+1798] 0x0 (size_t)
  941. [RSP+17A0] 0x7FF7DC25A820 (void* -> Starfield.exe+129A820)
  942. sub rsp,28h
  943. [RSP+17A8] 0x0 (size_t)
  944. [RSP+17B0] 0x7FF7DC25A860 (void* -> Starfield.exe+129A860)
  945. mov [rsp+8],rbx
  946. [RSP+17B8] 0x0 (size_t)
  947. [RSP+17C0] 0x7FF7DC25A970 (void* -> Starfield.exe+129A970)
  948. push rbx
  949. [RSP+17C8] 0x0 (size_t)
  950. [RSP+17D0] 0x7FF7DC25A9C0 (void* -> Starfield.exe+129A9C0)
  951. push rbx
  952. [RSP+17D8] 0x0 (size_t)
  953. [RSP+17E0] 0x7FF7DFC6BF50 (void* -> Starfield.exe+4CABF50)
  954. adc [rax],dl
  955. [RSP+17E8] 0x7FF7E0D00340 (char*) "\x01"
  956. [RSP+17F0] 0x0 (size_t)
  957. [RSP+17F8] 0x0 (size_t)
  958. [RSP+1800] 0x0 (size_t)
  959. [RSP+1808] 0x7FF7DFC6BF80 (void* -> Starfield.exe+4CABF80)
  960. adc [rax],dl
  961. [RSP+1810] 0x7FF7E0D00340 (char*) "\x01"
  962. [RSP+1818] 0x0 (size_t)
  963. [RSP+1820] 0x7FF7E3197030 (Particles::ParticleEmitterEngine*)
  964. [RSP+1828] 0x0 (size_t)
  965. [RSP+1830] 0x800000800 (size_t)
  966. [RSP+1838] 0xFC00000004 (size_t)
  967. [RSP+1840] 0x7FF7DFC6BF50 (void* -> Starfield.exe+4CABF50)
  968. adc [rax],dl
  969. [RSP+1848] 0x7FF7E0D00340 (char*) "\x01"
  970. [RSP+1850] 0x0 (size_t)
  971. [RSP+1858] 0xFCFC7FF880 (char*) "\x10"
  972. [RSP+1860] 0x0 (size_t)
  973. [RSP+1868] 0x7FF7DFC6BF80 (void* -> Starfield.exe+4CABF80)
  974. adc [rax],dl
  975. [RSP+1870] 0x7FF7E0D00340 (char*) "\x01"
  976. [RSP+1878] 0x0 (size_t)
  977. [RSP+1880] 0x3BC49BA5 (size_t)
  978. [RSP+1888] 0x0 (size_t)
  979. [RSP+1890] 0x0 (size_t)
  980. [RSP+1898] 0x2512FB3A900 (char*) "\x01"
  981. [RSP+18A0] 0x25932B0DEE0 (void*)
  982. [RSP+18A8] 0x1 (size_t)
  983. [RSP+18B0] 0x181B8EA27E1 (size_t)
  984. [RSP+18B8] 0x25A4F538AD8 (stl::unique_function_impl::detail::TypeErasedFuncImpl<<lambda_8291e7d1e643b42ca1ce574da97d71a6>,void *>*)
  985. [RSP+18C0] 0x2C00 (size_t)
  986. [RSP+18C8] 0x2593119BFE8 (BSService::Detail::TCmd<<lambda_2840492d9b207ea19c74f46f48e91fbb>,void>*)
  987. [RSP+18D0] 0x25A4F535930 (void*)
  988. [RSP+18D8] 0x7FF7DC7CD234 (void* -> Starfield.exe+180D234)
  989. mov qword ptr [454911Ch],20000h
  990. [RSP+18E0] 0x25900000002 (void*)
  991. [RSP+18E8] 0x25900000002 (void*)
  992. [RSP+18F0] 0x2 (size_t)
  993. [RSP+18F8] 0x7FF700000002 (size_t)
  994. [RSP+1900] 0x0 (size_t)
  995. [RSP+1908] 0x0 (size_t)
  996. [RSP+1910] 0x0 (size_t)
  997. [RSP+1918] 0x0 (size_t)
  998. [RSP+1920] 0x2512FB3A900 (char*) "\x01"
  999. [RSP+1928] 0x7FF7E339BEC0 (char*) "4\x05"
  1000. [RSP+1930] 0x1 (size_t)
  1001. [RSP+1938] 0x181B8EA27E1 (size_t)
  1002. [RSP+1940] 0x25A4F538AD8 (stl::unique_function_impl::detail::TypeErasedFuncImpl<<lambda_8291e7d1e643b42ca1ce574da97d71a6>,void *>*)
  1003. [RSP+1948] 0x7FF7DD8183CB (void* -> Starfield.exe+28583CB)
  1004. test r13b,bl
  1005. [RSP+1950] 0x2593119BFE8 (BSService::Detail::TCmd<<lambda_2840492d9b207ea19c74f46f48e91fbb>,void>*)
  1006. [RSP+1958] 0x2593119BFE8 (BSService::Detail::TCmd<<lambda_2840492d9b207ea19c74f46f48e91fbb>,void>*)
  1007. [RSP+1960] 0x25A4F535930 (void*)
  1008. [RSP+1968] 0x2C00 (size_t)
  1009. [RSP+1970] 0x0 (size_t)
  1010. [RSP+1978] 0x0 (size_t)
  1011. [RSP+1980] 0x0 (size_t)
  1012. [RSP+1988] 0x0 (size_t)
  1013. [RSP+1990] 0x0 (size_t)
  1014. [RSP+1998] 0x0 (size_t)
  1015. [RSP+19A0] 0x0 (size_t)
  1016. [RSP+19A8] 0x0 (size_t)
  1017. [RSP+19B0] 0x2512FB3B078 (BSJobs2::Detail::GroupThread*)
  1018. [RSP+19B8] 0x7FF7DFC6C830 (void* -> Starfield.exe+4CAC830)
  1019. sar bl,26h
  1020. [RSP+19C0] 0x0 (size_t)
  1021. [RSP+19C8] 0x7FF7DD81C080 (void* -> Starfield.exe+285C080)
  1022. mov ecx,[351E43Ch]
  1023. [RSP+19D0] 0x181B8EA27E1 (size_t)
  1024. [RSP+19D8] 0x7FF7E10BEDC0 (BSFixedSizeBlockAllocator::TAlloc<4294967296,16777216,128>*)
  1025. [RSP+19E0] 0x181B8EA2BCA (size_t)
  1026. [RSP+19E8] 0x2593119BFE8 (BSService::Detail::TCmd<<lambda_2840492d9b207ea19c74f46f48e91fbb>,void>*)
  1027. [RSP+19F0] 0x0 (size_t)
  1028. [RSP+19F8] 0x7FF7DD81763A (void* -> Starfield.exe+285763A)
  1029. xor eax,eax
  1030. [RSP+1A00] 0x0 (size_t)
  1031. [RSP+1A08] 0x0 (size_t)
  1032. [RSP+1A10] 0x2512FB3B078 (BSJobs2::Detail::GroupThread*)
  1033. [RSP+1A18] 0x7FF7DFC6C830 (void* -> Starfield.exe+4CAC830)
  1034. sar bl,26h
  1035. [RSP+1A20] 0x2512FB3B078 (BSJobs2::Detail::GroupThread*)
  1036. [RSP+1A28] 0x7FF7DD212C51 (void* -> Starfield.exe+2252C51)
  1037. mov rcx,[3E837F7h]
  1038. [RSP+1A30] 0x7FF7E10BEDC0 (BSFixedSizeBlockAllocator::TAlloc<4294967296,16777216,128>*)
  1039. [RSP+1A38] 0x7FF7DFC6C830 (void* -> Starfield.exe+4CAC830)
  1040. sar bl,26h
  1041. [RSP+1A40] 0x0 (size_t)
  1042. [RSP+1A48] 0x0 (size_t)
  1043. [RSP+1A50] 0x2512FB3B078 (BSJobs2::Detail::GroupThread*)
  1044. [RSP+1A58] 0x0 (size_t)
  1045. [RSP+1A60] 0x0 (size_t)
  1046. [RSP+1A68] 0x0 (size_t)
  1047. [RSP+1A70] 0x7FF7DFC6C830 (void* -> Starfield.exe+4CAC830)
  1048. sar bl,26h
  1049. [RSP+1A78] 0xFCFC7FFBA0 (void*)
  1050. [RSP+1A80] 0x7FF7E317BB50 (BSThreadEvent::`anonymous namespace'::Source*)
  1051. [RSP+1A88] 0x0 (size_t)
  1052. [RSP+1A90] 0x0 (size_t)
  1053. [RSP+1A98] 0x0 (size_t)
  1054. [RSP+1AA0] 0x0 (size_t)
  1055. [RSP+1AA8] 0x7FF87CAF7374 (void* -> KERNEL32.DLL+0017374 BaseThreadInitThunk)
  1056. mov ecx,eax
  1057. [RSP+1AB0] 0x0 (size_t)
  1058. [RSP+1AB8] 0x0 (size_t)
  1059. [RSP+1AC0] 0x0 (size_t)
  1060. [RSP+1AC8] 0x0 (size_t)
  1061. [RSP+1AD0] 0x0 (size_t)
  1062. [RSP+1AD8] 0x7FF87D7BCC91 (void* -> ntdll.dll+004CC91 RtlUserThreadStart)
  1063. jmp short 0000000000000022h
  1064. [RSP+1AE0] 0x0 (size_t)
  1065. [RSP+1AE8] 0x0 (size_t)
  1066. [RSP+1AF0] 0x0 (size_t)
  1067. [RSP+1AF8] 0x0 (size_t)
  1068. [RSP+1B00] 0x0 (size_t)
  1069. [RSP+1B08] 0x0 (size_t)
  1070. [RSP+1B10] 0x8BEE0E9900000000 (size_t)
  1071. [RSP+1B18] 0x0 (size_t)
  1072. [RSP+1B20] 0x0 (size_t)
  1073. [RSP+1B28] 0x7FF87B2FC280 (void* -> KERNELBASE.dll+012C280 UnhandledExceptionFilter)
  1074. mov [rsp+10h],rbx
  1075. [RSP+1B30] 0xFCFC7FD2C0 (void*)
  1076. [RSP+1B38] 0x60E60C80003FFC78 (size_t)
  1077. [RSP+1B40] 0x7FF8F0C1CC19 (size_t)
  1078. [RSP+1B48] 0xFCFC7FD2C0 (void*)
  1079. [RSP+1B50] 0x0 (size_t)
  1080. [RSP+1B58] 0x0 (size_t)
  1081. [RSP+1B60] 0x0 (size_t)
  1082. [RSP+1B68] 0x0 (size_t)
  1083. [RSP+1B70] 0x0 (size_t)
  1084. [RSP+1B78] 0x0 (size_t)
  1085. [RSP+1B80] 0x0 (size_t)
  1086. [RSP+1B88] 0x0 (size_t)
  1087. [RSP+1B90] 0x0 (size_t)
  1088. [RSP+1B98] 0x0 (size_t)
  1089. [RSP+1BA0] 0x0 (size_t)
  1090. [RSP+1BA8] 0x0 (size_t)
  1091. [RSP+1BB0] 0x0 (size_t)
  1092. [RSP+1BB8] 0x0 (size_t)
  1093. [RSP+1BC0] 0x0 (size_t)
  1094. [RSP+1BC8] 0x0 (size_t)
  1095. [RSP+1BD0] 0x0 (size_t)
  1096. [RSP+1BD8] 0x0 (size_t)
  1097. [RSP+1BE0] 0x0 (size_t)
  1098. [RSP+1BE8] 0x0 (size_t)
  1099. [RSP+1BF0] 0x0 (size_t)
  1100. [RSP+1BF8] 0x0 (size_t)
  1101. [RSP+1C00] 0x0 (size_t)
  1102. [RSP+1C08] 0x0 (size_t)
  1103. [RSP+1C10] 0x0 (size_t)
  1104. [RSP+1C18] 0x0 (size_t)
  1105. [RSP+1C20] 0x0 (size_t)
  1106. [RSP+1C28] 0x0 (size_t)
  1107. [RSP+1C30] 0x0 (size_t)
  1108. [RSP+1C38] 0x0 (size_t)
  1109. [RSP+1C40] 0x0 (size_t)
  1110. [RSP+1C48] 0x0 (size_t)
  1111. [RSP+1C50] 0x0 (size_t)
  1112. [RSP+1C58] 0x0 (size_t)
  1113. [RSP+1C60] 0x0 (size_t)
  1114. [RSP+1C68] 0x0 (size_t)
  1115. [RSP+1C70] 0x0 (size_t)
  1116. [RSP+1C78] 0x0 (size_t)
  1117. [RSP+1C80] 0x0 (size_t)
  1118. [RSP+1C88] 0x0 (size_t)
  1119. [RSP+1C90] 0x0 (size_t)
  1120. [RSP+1C98] 0x0 (size_t)
  1121. [RSP+1CA0] 0x0 (size_t)
  1122. [RSP+1CA8] 0x0 (size_t)
  1123. [RSP+1CB0] 0x0 (size_t)
  1124. [RSP+1CB8] 0x0 (size_t)
  1125. [RSP+1CC0] 0x0 (size_t)
  1126. [RSP+1CC8] 0x0 (size_t)
  1127. [RSP+1CD0] 0x0 (size_t)
  1128. [RSP+1CD8] 0x0 (size_t)
  1129. [RSP+1CE0] 0x0 (size_t)
  1130. [RSP+1CE8] 0x0 (size_t)
  1131. [RSP+1CF0] 0x0 (size_t)
  1132. [RSP+1CF8] 0x0 (size_t)
  1133. [RSP+1D00] 0x0 (size_t)
  1134. [RSP+1D08] 0x0 (size_t)
  1135. [RSP+1D10] 0x0 (size_t)
  1136. [RSP+1D18] 0x0 (size_t)
  1137. [RSP+1D20] 0x0 (size_t)
  1138. [RSP+1D28] 0x0 (size_t)
  1139. [RSP+1D30] 0x0 (size_t)
  1140. [RSP+1D38] 0x0 (size_t)
  1141. [RSP+1D40] 0x0 (size_t)
  1142. [RSP+1D48] 0x0 (size_t)
  1143. [RSP+1D50] 0x0 (size_t)
  1144. [RSP+1D58] 0x0 (size_t)
  1145. [RSP+1D60] 0x0 (size_t)
  1146. [RSP+1D68] 0x0 (size_t)
  1147. [RSP+1D70] 0x0 (size_t)
  1148. [RSP+1D78] 0x0 (size_t)
  1149. [RSP+1D80] 0x0 (size_t)
  1150. [RSP+1D88] 0x0 (size_t)
  1151. [RSP+1D90] 0x0 (size_t)
  1152. [RSP+1D98] 0x0 (size_t)
  1153. [RSP+1DA0] 0x0 (size_t)
  1154. [RSP+1DA8] 0x0 (size_t)
  1155. [RSP+1DB0] 0x0 (size_t)
  1156. [RSP+1DB8] 0x0 (size_t)
  1157. [RSP+1DC0] 0x0 (size_t)
  1158. [RSP+1DC8] 0x0 (size_t)
  1159. [RSP+1DD0] 0x0 (size_t)
  1160. [RSP+1DD8] 0x0 (size_t)
  1161. [RSP+1DE0] 0x0 (size_t)
  1162. [RSP+1DE8] 0x0 (size_t)
  1163. [RSP+1DF0] 0x0 (size_t)
  1164. [RSP+1DF8] 0x0 (size_t)
  1165. [RSP+1E00] 0x0 (size_t)
  1166. [RSP+1E08] 0x0 (size_t)
  1167. [RSP+1E10] 0x0 (size_t)
  1168. [RSP+1E18] 0x0 (size_t)
  1169. [RSP+1E20] 0x0 (size_t)
  1170. [RSP+1E28] 0x0 (size_t)
  1171. [RSP+1E30] 0x0 (size_t)
  1172. [RSP+1E38] 0x0 (size_t)
  1173. [RSP+1E40] 0x0 (size_t)
  1174. [RSP+1E48] 0x0 (size_t)
  1175. [RSP+1E50] 0x0 (size_t)
  1176. [RSP+1E58] 0x0 (size_t)
  1177. [RSP+1E60] 0x0 (size_t)
  1178. [RSP+1E68] 0x0 (size_t)
  1179. [RSP+1E70] 0x0 (size_t)
  1180. [RSP+1E78] 0x0 (size_t)
  1181. [RSP+1E80] 0x0 (size_t)
  1182. [RSP+1E88] 0x0 (size_t)
  1183. [RSP+1E90] 0x0 (size_t)
  1184. [RSP+1E98] 0x0 (size_t)
  1185. [RSP+1EA0] 0x0 (size_t)
  1186. [RSP+1EA8] 0x0 (size_t)
  1187.  
  1188. MODULES:
  1189. _nvngx.dll
  1190. Address: 0x7FFFF22C0000
  1191. SHA: 050ED41364E8BE543CAE03EF52CD93C0A1E2D8998B66A354012AC2E4BE3A7FDB9D7AEDE4DF1BB16088F08CE03952FB3A9EA8865B46425AC6D226461A241AAF40
  1192. Version: v32.0.15.7680
  1193. ADVAPI32.dll
  1194. Address: 0x7FF87D030000
  1195. SHA: CAA2E68DBC9F81D8131748CAB9267FFF95E966AB500275140837585FE54EA90203A46B336394D2D38E35FA27FE8407AC0F32A691DA356DE90F752681D2DDF202
  1196. Version: v10.0.19041.4522
  1197. amsi.dll
  1198. Address: 0x7FF86F7B0000
  1199. SHA: 40C757624C834F4766BC1D16C225AD9B1E6CA7E99BF4E321A2E365A0B0A61C60120E8ACF65F2F912A400498E01EE0D058E95B05D84A79B8BBB438F9D84949D05
  1200. Version: v10.0.19041.4355
  1201. apphelp.dll
  1202. Address: 0x7FF878040000
  1203. SHA: 32F91596A19B386429D210B850CAA199E69E24B69A229AE4CF8973C2BF416F675366EF4845D664F663CBD785B53951C9937A5DB33B5BC349D586D975798EA79D
  1204. Version: v10.0.19041.4522
  1205. AUDIOSES.DLL
  1206. Address: 0x7FF875220000
  1207. SHA: DE81C972320BB6B32B014983C82BDC9F9D804165543BA904F350F13CBAA5118217D21B7D56BF7BD91827C96BEE898B3C8FA05DBD171A48B6D2370F36EB78BCE4
  1208. Version: v10.0.19041.4522
  1209. BakaAchievementEnabler.dll
  1210. Address: 0x7FF82CBB0000
  1211. SHA: A682F4DF80A6913DA03E97631750808ADBDE7DE06BE8EC454D22D52EEFDA4B3BEC341E599EFAE7FEF5C3604E443C5F2A1F697C4E2B5E49826DF6EEF4A474164A
  1212. Version: v6.0.0
  1213. BakaConsoleEditorIDs.dll
  1214. Address: 0x7FF819440000
  1215. SHA: 7884C6803B235C4A6A5BE208EC3E4325E34A30AD79A65EF6B4B63F3667C7B61B6B6384AB3A22FFC452FD9438C6A4E37916A9307B70349440059AFD3909D3B492
  1216. Version: v3.0.0
  1217. BakaDisableMyGames.dll
  1218. Address: 0x7FF811720000
  1219. SHA: F382D50531254E68A259C049753E0F54475C32996BEF6A15644E7229CE4C51C3B595BB568A0CC780818871528A4BF91F9CC4E61B71CB85140D4AF1E40D71F5B9
  1220. Version: v6.0.0
  1221. BakaQuitGameFix.dll
  1222. Address: 0x7FF811630000
  1223. SHA: F3208CA43DE426EEA3B8FCF7F0B29287699B8A6A7698C5EFD3265C6FDD0BF7667B7F860EC2AF5C2B8A7CDE1B0B9E2157AF4F9AB752CB9AD82BD2A4E5320115DC
  1224. Version: v6.0.0
  1225. BayAndDocker-Count-Mod.dll
  1226. Address: 0x7FF86E270000
  1227. SHA: C2713639FBDFE972E1FFCE9012142D3A696FDD99D27C10F2227224D1CCDA78A822CEAD9A4CA3177F47ABF269E8E67A9CECEC85753AC7A1294894355D5DA91FA4
  1228. bcrypt.dll
  1229. Address: 0x7FF87B6D0000
  1230. SHA: BEF2ED2B4C80F75BBC1653D2AD8258FB1C569B7AB38BBA97C72211DFEF01AF11988674E6DF21BE2FCD237922E24EC0F22D8B9D7A8B92ED759056C32B2357F55F
  1231. Version: v10.0.19041.4522
  1232. bcryptprimitives.dll
  1233. Address: 0x7FF87B700000
  1234. SHA: E5490CE12A77C17AACD45BF4DC1B07A52554F2F8C230552FAD7895593A990AD03D54508C5DDCDBAB58F5403C57DBF98D4E4591E251212BA0363FE1150AD0DD93
  1235. Version: v10.0.19041.5007
  1236. bink2w64.dll
  1237. Address: 0x7FF866880000
  1238. SHA: 61AB61B895332AE98F5491D07975E5D6A1E42747DE1AE292298CB008AB63AB410F8A7684DB7DDA694EBCC351783D68EDB167B4EEEAB74DBEC6C1BB238E62BEED
  1239. Version: v2023.2.0
  1240. Build-Below-Bay-Mod.dll
  1241. Address: 0x7FF8563C0000
  1242. SHA: D58BC1D77C2CA867F475779FCD5C37EA6E89635E0BD922536FBEBEEE2B537A57713DD826A11F7F20038380CB36DF0D5F94EC454E54D85367DE4934D2B29742FB
  1243. CassiopeiaPapyrusExtender.dll
  1244. Address: 0x7FFFF60E0000
  1245. SHA: BED44CB1BD795AEEC652BB7F0E054599599AC0511C811E05638A8AE7696A582E8DB6389954A3142C85936884DB70F6BF4ED91FFFEF0D6B089BC0E148E7D13672
  1246. Version: v4.1.0
  1247. CFGMGR32.dll
  1248. Address: 0x7FF87B4D0000
  1249. SHA: 4906AB14D229825F00639ABD2ACCE25B1154B9226D0E97148CC85B4EFBEF9386171C80AEA1CC4F8A2458C0B4A90F07B4C62013CB900D821F4D3764CE3EF010F1
  1250. Version: v10.0.19041.3996
  1251. clbcatq.dll
  1252. Address: 0x7FF87D680000
  1253. SHA: AFA02856163C38761BE25B575403F125FA2D25A3FBA0B86B42E07B39DAFF09C35F462BA90BD40002A7EFB7EC2CCC2FC3B5127D3237DEADC0E0B6C000FB2B0ADA
  1254. Version: v2001.12.10941.16384
  1255. Cockpit-Count-Mod.dll
  1256. Address: 0x02512F180000
  1257. SHA: 033EDACD9E915A0A29F0E5FE55066C3738DE9E6254497B50196357202933980ECB313983C7A9D4C3B90894FF99C4B1C218188F76435ADCE0AE8C59533AF8F41E
  1258. combase.dll
  1259. Address: 0x7FF87CCD0000
  1260. SHA: 91B5B77F4F163C65D13F04422F85BD47DFFDEECD058AEEA2FEF620AF3D5E0032DFA74BEA6077593E0F5B57C991043FB78B1F0B6C04616E5C8215B41B285939F5
  1261. Version: v10.0.19041.4522
  1262. CONCRT140.dll
  1263. Address: 0x7FF8196C0000
  1264. SHA: 7D94EAA509DF6E7FCA9AF720CC537A42E3FBF53CB1E615B36ECACA80EA0482821B8AC2905CB64BE844413D4FC1BA65E1E67FD1413E3D849B076E2AFAC31B2960
  1265. Version: v14.42.34438
  1266. ConsoleCommandRunner.dll
  1267. Address: 0x7FF82CAE0000
  1268. SHA: 5B0BC10AD896B2C9239E82CC55D23D9FF9FF7903004DB6E3DA8CBFCC5D6ADD4C5E36C4CFB5865986D349D1E95ED13068703084F7781B363C52425971FF243B2D
  1269. Version: v1.6.1
  1270. CoreMessaging.dll
  1271. Address: 0x7FF877B00000
  1272. SHA: 6FFE2630AD9CC411024BA6BCEAB13D201D3E265943F77CF02934C55D334AA6B1076F4C0676D8443E0FFCE0670673A0758DEFAF2E1D84FD4F783A05C1E902657C
  1273. Version: v10.0.19041.5915
  1274. CoreUIComponents.dll
  1275. Address: 0x7FF877420000
  1276. SHA: 4BA4C9EC65EA58150E531A91CD3B45D609B19982AE0C1099214575D946416BBB0243DE6196206D3B110B537CD008FC3AB9ABCBE456C4BF80A9DBA6841308D610
  1277. Version: v10.0.19041.3636
  1278. CRYPT32.dll
  1279. Address: 0x7FF87B070000
  1280. SHA: 425334228BE58AD4E08F1B4EA000E821BFE555FE01FC810F39587243137B50D75DFC689C858C2BC5A91C132FBCE4A17D2B77F4255EE0E9549BEA16771FC0DBC3
  1281. Version: v10.0.19041.4522
  1282. CRYPTBASE.DLL
  1283. Address: 0x7FF87A6D0000
  1284. SHA: 4BCBB5E7E8C31A47DD110C0100288670C8C3664BC9B46373A2687289997D81E02807860E6B11177A3D781B40B9CE0EC2CA8AEA0E3D3928244AAE51047EC3745A
  1285. Version: v10.0.19041.3636
  1286. cryptnet.dll
  1287. Address: 0x7FF875120000
  1288. SHA: FB00453D0C8DF4BD73AD8EEABCFAD8DEDE0F29874EA7AEF75F8DDE355D0C0DDE0AD1ED477F09EBD8A88C72F47E9489E866DB4A895A75CE62348BF3CB2489AD4A
  1289. Version: v10.0.19041.3636
  1290. cryptsp.dll
  1291. Address: 0x7FF87A6B0000
  1292. SHA: ABE6637EF3DD587246BACB1AC8C024D308122B5C1E009763F3CB9DB6BCDAC92A4216A5ECF5362BD383A845828FA924603ACE03B38D7C45D793FD9B4219373969
  1293. Version: v10.0.19041.5856
  1294. d3d11.dll
  1295. Address: 0x7FF876D50000
  1296. SHA: EFEA5ABE1E1D7FC0FA2533AC607B2BACBF88B80F5A7A58B9B04340304159E6773A378451F94D223EEF72264BBB9A7899D9C8A550B0750A4753834998D564FD26
  1297. Version: v10.0.19041.5794
  1298. d3d12.dll
  1299. Address: 0x7FF837EA0000
  1300. SHA: 12F73016DA5839333F2D73C82440D8D2CCB3357F2CA5742E5EC9BB0578C0D63B5DBF59024A779EAD9BA708A1602C083FC6054C06AA9F3142B5197DB3AD2AF6EF
  1301. Version: v10.0.19041.5794
  1302. D3D12Core.dll
  1303. Address: 0x7FFFEDA50000
  1304. SHA: B44437ED5E2BCC9ADF44E7458312C0EF0C7B6548231542F31664B9E51DB932DFD40C8F7D17470ED0DA938D73FEE5ADDBD6184B91A66BD0B8EEA0B206137A0388
  1305. Version: v1.608.2
  1306. D3DCOMPILER_47.dll
  1307. Address: 0x7FF876330000
  1308. SHA: 40EB4C7DE0A78C254FA79636F5D95CC62C78C03564ECFEC9A92A7222564C2CD5D14E7E3BFF0A84323533C72F706B7C7EE393D70AA4BC05EAEBF354AEFBB7D3B3
  1309. Version: v10.0.19041.3636
  1310. d3dcompiler_47_64.dll
  1311. Address: 0x7FFFED640000
  1312. SHA: 3C57065EF8AE99617E187A8CA3FDE14C3A3763FB44C4BC585F80CFB961494F59CD3E7B9CDA1DDD57F0B008AF9B120F36EF578914C93829A91A65A06EB2E2FCA7
  1313. Version: v6.3.9600.16384
  1314. D3DSCache.dll
  1315. Address: 0x7FF86E310000
  1316. SHA: 5243F3CF7035EB245C28354E58C8EF829A319E859C301CA8F1736C05104C632C2AA5F43FF4465B6D655D9ABAF0CB6155315177581F3A89E347D121E29045DE16
  1317. Version: v10.0.19041.4522
  1318. dbgcore.DLL
  1319. Address: 0x7FF874100000
  1320. SHA: 066FE5DD0A4FEAD715F7376F4CEE3DAA41EA6FB4545FF456F4A53FC17E75F3768F03411D82365145442605DDF31822FBB4E66411FF8CB3360F8B60AB24A334F3
  1321. Version: v10.0.19041.5794
  1322. dbghelp.dll
  1323. Address: 0x7FF870D10000
  1324. SHA: 60C999E3742A5E3E9671EFF736299B23F95F36EF7A6939647FDD67543FF274A76F37E7A3F663A3D73C6F32A4AE1A0B3198A145CE47E579BFF2B435476DF1E960
  1325. Version: v10.0.19041.5848
  1326. dcomp.dll
  1327. Address: 0x7FF877230000
  1328. SHA: 4813092332671EA8173DD6FD139069224421E43B01F101896F37C679CDA5D4393D96F2659E71A4B19C8585129E0A136D43B300FA92D3C2FDEDB0902D5BB40DF7
  1329. Version: v10.0.19041.5794
  1330. devobj.dll
  1331. Address: 0x7FF87AB90000
  1332. SHA: 877C73194A2533B25B09E899280B172363B05EE48B9FBD0EDCBBE0920963214F849CC0F706E6CC2A74F541B79498E09DC7D5F0A7E3FA2BE176E3C3F3E46E2040
  1333. Version: v10.0.19041.5794
  1334. DEVRTL.dll
  1335. Address: 0x7FF8744C0000
  1336. SHA: 77A490B99710F9186F47CD0FF750642647685E887F919F5BBC3115A89946FF54777C3D28CFAA5B2A214D34E2D7686934C2181A92F149F19873BE0721AA8D90EA
  1337. Version: v10.0.19041.3996
  1338. dhcpcsvc.DLL
  1339. Address: 0x7FF875C90000
  1340. SHA: 15ED6CAB586D1AFAB2C45F28AC377C5ABAFE6E982BED81899E4BE0805AF40C2477E6B90ADAFBE34F854AD208BCB441CD49BE71C7C8D65DFAE68E36984273F521
  1341. Version: v10.0.19041.4522
  1342. dhcpcsvc6.DLL
  1343. Address: 0x7FF875B30000
  1344. SHA: F8901FDE45B93D20EFAB9F340D85BB831F99A085BDF769E06808CD80C7BCCDF1E3BE660AA1089673215433211DA2B983A6B6F08BF4878E53B9D3953D1FCC2666
  1345. Version: v10.0.19041.4522
  1346. DINPUT8.dll
  1347. Address: 0x7FF858080000
  1348. SHA: 8724CECA11C21C29E2BC3C7712E8228FF3C30E4C320C176830E8B9FE8B50A93B0FA72CB473EEA40913F1D85C432CA1C2BEAC9A0E761322B1A65B40BBE9FD490E
  1349. Version: v10.0.19041.4522
  1350. diskCacheEnabler.asi
  1351. Address: 0x7FF854E20000
  1352. SHA: 4F73044DBC132AD6DC399D221241BECEB52C5B84D1CE30FA69EE5FEC7F84DB18C66FEDE872F94BF7DB996CD47330794DD1C1BB57B8024CD7C2A0DBC1F7D1B665
  1353. DNSAPI.dll
  1354. Address: 0x7FF87A1E0000
  1355. SHA: 4DF18424C89DC3C97107E7724D70127FA88787275AA3A80C73A67A89A6A7F700CEF130B05CA529C932C5CB5B0587CE01E124398EDF72341D8A2A436C4E5AE759
  1356. Version: v10.0.19041.4522
  1357. DPAPI.DLL
  1358. Address: 0x7FF87ABF0000
  1359. SHA: D4B3849944B608E1C19EFA4D52DB38005EAF1C17441ED3A848D1F2C83F60EFEDCD83D283079C367103B58BA5C7029140015B0AD2414B53252D4210A13210D4EC
  1360. Version: v10.0.19041.3636
  1361. drvstore.dll
  1362. Address: 0x7FF874FD0000
  1363. SHA: E4393F69ACE188D16D3009679B9F79F5C3C46AD964F0D321726AFE2BC6AF9747E6F0AB768808CEAEBC82AF9702D7A0AE26959D538D0A0E5A0BCBC2685928CE92
  1364. Version: v10.0.19041.5794
  1365. DSOUND.DLL
  1366. Address: 0x7FF857AB0000
  1367. SHA: C2242C561B28CCF93831F8192953A5071E0BF57521D5EEE71D78790A4D393568160BA3D31ECA2EC891405816A091E6003F910DEA1543FE0C6BA94F3A7528B754
  1368. Version: v10.0.19041.4522
  1369. dwmapi.dll
  1370. Address: 0x7FF878AC0000
  1371. SHA: E6F2E906AB29E0B981D87208571A515566B0CA335E2683C67AF219191A6EACDE86FC2B83A5635976E647F625B3683D82E6359AD3845C32911500CB3F91BFDDE6
  1372. Version: v10.0.19041.4522
  1373. dxcore.dll
  1374. Address: 0x7FF873830000
  1375. SHA: 84A8572EA9771BE6C244981B6B90E8FC9E8CF17DFF119A795AC271B60A95D7DE9F01978D83A89F3120BAB04D2763A2D308BBC2616C28D7D9553532C568E695D1
  1376. Version: v10.0.19041.5794
  1377. dxgi.dll
  1378. Address: 0x7FF879690000
  1379. SHA: B46A9B80E31CFB192C9A73114F3E724728B2226105B8E5ED0D246880311C0C40B3209B393429B3CEC79D5CACBFD81DD77F9F2EF5FFFF93C88EC3565007A706B9
  1380. Version: v10.0.19041.5794
  1381. Engine-Power-Mod.dll
  1382. Address: 0x7FF84B700000
  1383. SHA: B8737DD87231432143E0F3B968DE657EE4A101D24E82DA7ADFAB612B00A748CB066C50ACA38D61A731724A41C6073A87D0D8DB04D00A392CF9EB6B8257259E26
  1384. EssenceWhilePiloting.dll
  1385. Address: 0x7FF8409C0000
  1386. SHA: 70B1427FFC6EE37B4C932BE93DEFFF193C65114F8C9F3018823073A1576F453BE796B6F7B199CB6B674442DDE79236D565FBBB2BB0961CA8F691736B37CBB08C
  1387. Version: v1.0.0
  1388. fastprox.dll
  1389. Address: 0x7FF8633B0000
  1390. SHA: 11AA42C3375BFF4BAD897917B522ADCF21ADDFE871DE170F5E61336124C5B32CE3EA2BF1C38C8E266DCBBBFC4BC05DC350FD9DE0E40E6227E3E64AE3D8E6EAF9
  1391. Version: v10.0.19041.5794
  1392. fwpuclnt.dll
  1393. Address: 0x7FF86B730000
  1394. SHA: 9FC803E810698DD12F5EAE8D18674FB80E3D4C8DB0B0DEBD15632E49AE0CD920CDC973F5AAECCE22630B5C2E7327A581A067B4377A202BA45D94DF5517729844
  1395. Version: v10.0.19041.4522
  1396. GDI32.dll
  1397. Address: 0x7FF87D400000
  1398. SHA: DFDC040F2CC79CDA08D81F0D74F37CE78C3E9E43610B661F0014CA5B3C36A4671082A9F4A13F8453C870FDF026B8E9B56D95A0B4DFB64A81C6D71E97348B6362
  1399. Version: v10.0.19041.5737
  1400. gdi32full.dll
  1401. Address: 0x7FF87AE00000
  1402. SHA: C7B530B47A5A60C696CF60BA454DDCC94954ECA47D8DE634F8369A0B66E42ABD1C3D02A31D50104171582C06C3C371C5F721BC0CEA5FDF7082107141049193C3
  1403. Version: v10.0.19041.5915
  1404. gpapi.dll
  1405. Address: 0x7FF879660000
  1406. SHA: 5AE94F4803E301355A28D566A8001D4BD6E60A1A7AECFAEE98C8E288B2D229DEC53C1F828D8E3D658B55EA299A5886327B3A11F7D64B08216E67F4C5CE3539FA
  1407. Version: v10.0.19041.4522
  1408. GravDrive-Weight-Mod.dll
  1409. Address: 0x7FF8462A0000
  1410. SHA: 455333B1AFE102AAF0982E015D971BAD668956D17AA19A01524F47663E56908BEF02926C2D498EFFF9EA388463AFCF1EAA69D552EDF448C81DA842F8949C218A
  1411. HID.DLL
  1412. Address: 0x7FF879650000
  1413. SHA: 6269C673CC8F6763EF3D2ABA489C9BFCE1F5760F21408715AFE9F2CE23FEAE3124B568E0AA0ADDAABC43E624F9FC1E4DD9F7796135F6DC094B48BFDD810198D6
  1414. Version: v10.0.19041.4522
  1415. iertutil.dll
  1416. Address: 0x7FF862660000
  1417. SHA: 31ED6DF76154A6AF1DBC3BC460D3170E7DDDB2E151081D596344661332A1B17859E0B6EBD775BD56722349AA78FFC8A7D6C4486CB5C5664E591CE7048E339BB1
  1418. Version: v11.0.19041.4522
  1419. imagehlp.dll
  1420. Address: 0x7FF87CA20000
  1421. SHA: F74688513B70E559316E4F583B36365126E5904C24EFF65B70C9AE2D86B43A5258E29732D7F00D758E2271DB283D549459180B26E90D3E552C264C9E9B681B5E
  1422. Version: v10.0.19041.3636
  1423. IMM32.dll
  1424. Address: 0x7FF87D3D0000
  1425. SHA: 5BE61D1A4B59561CBC26551D635C80C4A4AE54E6E8F4F468E24AB87E8BE64A8AE91246D7CD31524AA6797F1720B75BC2BD8BA9FA78427307527BAB994836AA2D
  1426. Version: v10.0.19041.5737
  1427. inputhost.dll
  1428. Address: 0x7FF858D30000
  1429. SHA: 82E9F9A4089B6371F989897584DD35C4B2077DF2C1E185D9D8FCEA11AAE6DFF1E56A71934ED7DE1495064293C88A16E690A9B330BFC5898D850CD3885E218A01
  1430. Version: v10.0.19041.5794
  1431. IPHLPAPI.DLL
  1432. Address: 0x7FF87A1A0000
  1433. SHA: 5C89A265540E72183CAA65B245A846C2F958C07AC58A011FC3DDC640FBDF81C51BBEFFFF9FE3752B809EF5CC58692FC69ABDC2E0DDB2390EC8121D8133677664
  1434. Version: v10.0.19041.4522
  1435. kernel.appcore.dll
  1436. Address: 0x7FF878CA0000
  1437. SHA: 1913D97EDD8421A7985B131656AA1B3FE9CB629E0CD3D9BE31A3CE40788F59111C50EC3E80BF2A775D72690FC0142935D205DFB06538F0C7CB3D0193057F6662
  1438. Version: v10.0.19041.3758
  1439. KERNEL32.DLL
  1440. Address: 0x7FF87CAE0000
  1441. SHA: 191FF271C2F24079607F96EA944F12EC39F61FE1B171301CDF4F019EDB1BCB8051C1943498922A939A425BEF9B485CFD29CE61B059F5926FDE64920F4DC6333B
  1442. Version: v10.0.19041.5915
  1443. KERNELBASE.dll
  1444. Address: 0x7FF87B1D0000
  1445. SHA: D3DDDC6F2D5F54FC62B0F87C1F86B909EDE6EC4513163712205BF0D1D11ED7B6D5704F17A05F3C24FE6D34BFAD5F3ECFC4BEA5D9B9263A5B35E5B5ECB7C2A67D
  1446. Version: v10.0.19041.5915
  1447. LandingGear-Count-Mod.dll
  1448. Address: 0x7FF845960000
  1449. SHA: 0A6DA5FAC6CC1166A11CEF4E510E0D5149DBDBE677B6DC1B472864EDB26E225EFE4BD6588D15AB5CB091B15A2E939C93BC4D14F9A163EBA9EC5F73DFD4A4DBE8
  1450. libxess.dll
  1451. Address: 0x7FFFCCE20000
  1452. SHA: FF63203BC0DF4975771A13622CB88617D0B90EDA81BC22A1BB21BDEF5E60DE89A959766ADAE453D447449993847BCA211E9FDF32F068F5D4DCD3C1786310833E
  1453. Version: v1.2.0.13
  1454. MessageBus.dll
  1455. Address: 0x7FF838B70000
  1456. SHA: 0783076531BF04E0AA7E5DEBFC0D1403A7D8A05DBD7EF524CB3DF7BBAF6BD13CA611742BB229BA24103DC1147BA69A7E26FDC46F2BD64A159A328C8E6B20CDD8
  1457. MMDevApi.dll
  1458. Address: 0x7FF875160000
  1459. SHA: 2B94F7235FC36E62380F67A20926BD562129B1D203CBDA222D4F4E6CDDF974DB7E287A8769801706636B55D5481C9027F4F0836D887013EACD47EE53EBD15EA4
  1460. Version: v10.0.19041.4522
  1461. ModularPeopleSystem.dll
  1462. Address: 0x7FF839650000
  1463. SHA: 6D923C483018E5818891C84D0D45480E50E8D31CDE5FF174E83EB533108DCBF656D4215D961AF6218F2ACD4FC23F18AB27BA2AB36789223A07AC82275F4C1D9C
  1464. Version: v6.2.0
  1465. MpOav.dll
  1466. Address: 0x7FF86FA50000
  1467. SHA: 720ACE733AC88E3E645670D7D24F22B724B00B02FCD20C03BB63F0336DABBE5173A6D61F0DDE12095083996971B108F2D3C0EEE893D790132AF30DC86EB44BC2
  1468. Version: v4.18.25050.5
  1469. msasn1.dll
  1470. Address: 0x7FF87A9C0000
  1471. SHA: D81A60DA80E4499DD704C983A8AFB7DFDAAF821CF6B9C224AC92609344C8E310C206D18FE93D817362C5F625626F632A2C0B6999C8BD31A92BE3FC6221DEA7D4
  1472. Version: v10.0.19041.3636
  1473. MSCTF.dll
  1474. Address: 0x7FF87CBB0000
  1475. SHA: E0890302EEAA5D3671183B620A074660D1CA7093D053E45CA6904ED7C9575A8366A43129A1B1F9F3A1E1181196447D9C42953D15B164D374165292EF52471423
  1476. Version: v10.0.19041.4522
  1477. mskeyprotect.dll
  1478. Address: 0x7FF852440000
  1479. SHA: 1947763BCCA8B67BC315A51CD86E97893F9D1056E3FB3E15D1E912DF6E8D45D6C817C85EC38662E3D4BEC5DE5AA5AEF903C5928FEF55829CF44C57090F4E5F9D
  1480. Version: v10.0.19041.4522
  1481. MSVCP140.dll
  1482. Address: 0x7FF864CC0000
  1483. SHA: B08140CE86EA78B481B78644F086359326616A56FB3A3953DA16A7FC2BD15A493652F22D4D2FCBA3675C668B9832FDB7D5F17A8AA6CCDB74E7B746A79DF60B88
  1484. Version: v14.42.34438
  1485. msvcp_win.dll
  1486. Address: 0x7FF87AFD0000
  1487. SHA: 924022BB40C542A3FF0D09DA35B8156113A83336D57924888D921F070F6192D83FCEC6B89BDE89957731E55E41118CA2AFFEB5885541BD345DA7857996C22FD5
  1488. Version: v10.0.19041.3636
  1489. msvcrt.dll
  1490. Address: 0x7FF87D490000
  1491. SHA: DA3B0D985CB6E8D64176B8024EB783C276970AEE486D25CBC2468A781D51A455315840D6C9DA063C84C484DB7D7AD2994AF337C4A66160D6EB7B64E77041CEAD
  1492. Version: v7.0.19041.3636
  1493. mswsock.dll
  1494. Address: 0x7FF87A4C0000
  1495. SHA: A5276A4758402BD5FB81849D1B9E755C9EC4B8D1FDADCC15EFA417FB447C35F4C4B23F165F2078A51407622FF969D70E5E072757B3019596D76857224F765E51
  1496. Version: v10.0.19041.4522
  1497. napinsp.dll
  1498. Address: 0x7FF83B9C0000
  1499. SHA: 8383EDCB53E967759FE31A0BB053A2D2E8EDC7C4B6D8E73C839D3393741138EA1BB53D34CCE93265539B31CBDED01475A0FB9CA3A7D721A81DAFC4D50F89B85D
  1500. Version: v10.0.19041.4522
  1501. ncrypt.dll
  1502. Address: 0x7FF87A8A0000
  1503. SHA: D0AF95031B5845645389F9C290E7D8728D2CFDC4661E0F99B22A101D4B966AA7F7F1B2C9A2D4669D680228F43A7EC26204CA635AD7DEF293373BC7A711CE8B43
  1504. Version: v10.0.19041.4522
  1505. ncryptsslp.dll
  1506. Address: 0x7FF8524D0000
  1507. SHA: 785475254865E1D40DB78E36BF1083CCD253CF1BD45DDE258189907FE944F85E01533A271E5583C4BF9B3671F78CCCEE8B6957E0B8DDA4C6946910F7F0CD7257
  1508. Version: v10.0.19041.3636
  1509. netprofm.dll
  1510. Address: 0x7FF878430000
  1511. SHA: A9D044732896311DAFE7F868723DB4DB4A7CBAACD4CAF9C95E1F24172BA462296CE178ED2434F4EE588545C24B1D8950EE6B8C3FA2E17BFEBD6C830E841DBE1D
  1512. Version: v10.0.19041.4355
  1513. netutils.dll
  1514. Address: 0x7FF87A300000
  1515. SHA: 6B38B7BFD22A455C9B7E21ADEFCFE25E619E26BAD91FC1EA095B94CFB2BC9131AE3428498D13FBC885252998D7ADA4ED63CB084A1FD6F81A8B887E6143D2C2F1
  1516. Version: v10.0.19041.3636
  1517. NLAapi.dll
  1518. Address: 0x7FF877F00000
  1519. SHA: 7C6E96085594E98ED756B35F1B5CAA73AAE3FF8CA1B99AD86742598B43EC58118D44245E0081A830497D8CF208DDAE1E625401B61629F118E99B512C22481924
  1520. Version: v10.0.19041.4123
  1521. npmproxy.dll
  1522. Address: 0x7FF8748C0000
  1523. SHA: 1B0AF7B9BBDAABF7305AD89796AE2FC747D852BA9EE7867393F09348E65C5D339C219C1BDC24C272B1A72283B6069FD19E8A61C82A8C78DB74CCD43E8331758F
  1524. Version: v10.0.19041.4239
  1525. NSI.dll
  1526. Address: 0x7FF87D210000
  1527. SHA: AC76FFCAF5401343BD62D6FE32B675F0A38463D5362FF9D7C2AA9B061D8D2B29E3A6865272DB2BCD8C3405E6D927F0B58400FD238670F464059CA9274FE64CC6
  1528. Version: v10.0.19041.3636
  1529. NTASN1.dll
  1530. Address: 0x7FF87A860000
  1531. SHA: F3D13E43C01DB40AE0278AB78AA395EC4013E4BDE8C0EF1A28570E17FCAECB3FEC424135D3889762423D971FAA161074A4A378109961DC9D300F938B0F39772D
  1532. Version: v10.0.19041.1
  1533. ntdll.dll
  1534. Address: 0x7FF87D770000
  1535. SHA: B8593B02EF8F8B1CDF142B56EAB102FF0C87CAFD523BBED32E20331E8D960BC2036D7F3A00261ACE9857E7FBF2D43113EE9D69FA297219A0274FAEFE175C9880
  1536. Version: v10.0.19041.4842
  1537. ntmarta.dll
  1538. Address: 0x7FF87A030000
  1539. SHA: 373EF3ACEB49B71CA4989E727ED938E54C6BB2060D133DA2EDAF7DD7ED3F9B2EA76BD0A8714D1C46372CD48B52C190055B68C8D1E65913CC834B87033BE59A06
  1540. Version: v10.0.19041.4522
  1541. nvapi64.dll
  1542. Address: 0x7FF870780000
  1543. SHA: BA3DDF79933636251B36B155D8CB2A110D2BAF3AC72278550BD4AB17E98941FC70ACF17BBB3DD13BE441F70CB3A52B2AE32A8A89A58E934BAD9501C1729FEF19
  1544. Version: v32.0.15.7680
  1545. NvCamera64.dll
  1546. Address: 0x7FFFE9720000
  1547. SHA: 25EB0A0E43624FFF9EB9FDC13F42FFAED8D09FC65131004A46D3062CD981FF5D67F6AF5E065A7381E2DADFF0684F27B5A221CCDC2E4E48A23B8A55C36298B919
  1548. Version: v7.1.0
  1549. nvcuda.dll
  1550. Address: 0x7FFFEE290000
  1551. SHA: C590152BE76E77A6E9287889A4FB4E6CF6D19797E64AF420BB5D1BAAC2867D16D9397D74FA08FEA5C0D60195ACC03BAD09C123E74D3344E45201346BFAAD2E9D
  1552. Version: v32.0.15.7680
  1553. nvcuda64.dll
  1554. Address: 0x7FFFD23B0000
  1555. SHA: 2CE19714789E035B27282773B0AFACCBF1635C35AF8A5C9C5173A4E359F40B51654D8AE90CF2673BFDBBC7E29A3CB101DDD476DBCEED818C25AB955B1EA0BE68
  1556. Version: v32.0.15.7680
  1557. nvdxgdmal64.dll
  1558. Address: 0x7FFFF5660000
  1559. SHA: 7CEC96C69441A9F90AA55E3B7322F0A018566F9B983D98B0E1551C6674E91063C761723D88E2B7A1B9309D01C38284F00325330259B96B7530E4547321FEF0DA
  1560. nvgpucomp64.dll
  1561. Address: 0x7FF867560000
  1562. SHA: 270013ABDFE7C8A1B99396DF5E474F6E1E212B0D5A8876F8FEBF5A077DC2A5EE3F281BB2A28289AA0EA8CA2CA863BD35CB8BFC628FAAD84EEB7B6E733CA0019E
  1563. Version: v32.0.15.7680
  1564. nvldumdx.dll
  1565. Address: 0x7FF8706B0000
  1566. SHA: C41F917FC5C05B38BFF21E8A8256F2C1BE9E4F3A4AAA70C0B40D6D93BC76C3CBC69D6A756FF859FCC4E6E1F8F2812A82C30F97E5F596374364B64041C9CE5717
  1567. Version: v32.0.15.7680
  1568. NvMemMapStoragex.dll
  1569. Address: 0x7FF8702E0000
  1570. SHA: B170B4A7AADE88B51848E7E6B17AEEDF882726BDA8B0DF96BAA890E30BB21C3C520C5BE288FACDFA00E3AAB7DE888841A325683BA926F6ABEDCB99D0E3A0D12C
  1571. NvMessageBus.dll
  1572. Address: 0x7FF86C880000
  1573. SHA: F81441E8333BE2C308A59C22BC9E9FE8E9AC6AF56CD97BA0909228D6E287E04E8A22B280940349DA4EBF82A6ADA982290AD87029663D3EBDD0FBEC77823AB6D6
  1574. nvngx_dlss.dll
  1575. Address: 0x7FFFC9CA0000
  1576. SHA: 56037EF9ACEA29A074CFBD63D2F4B15325864DAC8F871EDED336D8EE50A4EDE7652212090009420A1A8E2EE4541DB238E17586DD0246FEE3F6A935B140B68BD7
  1577. Version: v3.5.0
  1578. nvngx_dlssg.dll
  1579. Address: 0x7FFFEA840000
  1580. SHA: E7E49E838D14190D80B748ECD6168F58C64421B50EFFA9F930C08F28BF24ADD8D88226E0268B63DB61B80385052BA991AB24626F517F96C99B6B8B8670319751
  1581. Version: v3.5.0
  1582. nvppex.dll
  1583. Address: 0x7FF84BB90000
  1584. SHA: F59983B64AA7BEF5F8BEFE27F090B8FF208F80853865F926675881C4CF44698533D54624DF221FB88C934137A9B9BAEA2CBC94381D528EE5556D81BAD6D70502
  1585. Version: v32.0.15.7680
  1586. nvspcap64.dll
  1587. Address: 0x7FF847FD0000
  1588. SHA: 60A434611ADD88ACC34EBE03D1207DFB5F3BB1AC83264D228F6508665C49595A4636E4E63801F1849660AA25DBFD81F446F041ED764C6967FD30AA53D9F6AEF1
  1589. Version: v11.0.4.159
  1590. NvTelemetryAPI64.dll
  1591. Address: 0x7FF865800000
  1592. SHA: FC8366404E91468D7CDFC649A60C3A9C3BE77D81BC75DEE5C56A641222D27530A9B5433492F56F622318392C1697842FE497279780E5C84ABA3FA78F85C8D93D
  1593. Version: v19.4.23
  1594. NvTelemetryBridge64.dll
  1595. Address: 0x7FF867490000
  1596. SHA: 6133BD5163E1F31358B290933A3B034D4CCA9F7AAAB6F5AD055597F2E716B101B7FA46685115C51344E64860D0A5E368A9089961A5ACC1DBCBAB20EEFAF9456C
  1597. Version: v19.4.23
  1598. nvwgf2umx.dll
  1599. Address: 0x7FF85D150000
  1600. SHA: 7D2CA467394A91866A044C4FA355F1E5FAA0A79BECF26EBE211EE26BD2B7449A5C9FA4551CE8E8C9FFBD62DC05BA10CC94D38F1EA8459C852E1F8A0E5845FA70
  1601. Version: v32.0.15.7680
  1602. ole32.dll
  1603. Address: 0x7FF87C1E0000
  1604. SHA: D8ED6BBB5FDA8319D95BB65FDD061ED731F5092476D959ECFA77840ABAF82C658CAE6E185DEF811E7A53D746375F5CE8FDA968F31902B2A5DAF0AD4E3C82AF9A
  1605. Version: v10.0.19041.4522
  1606. Oleacc.dll
  1607. Address: 0x7FF86E680000
  1608. SHA: 9EB04E9F9B2A0B122BCB52F0EC575C2F898E0794042103C04CCFAD8D58C556860AFADB6A75E18961A0BCB2CB2A73C34344641FFDD733112E2929E2925BC05807
  1609. Version: v7.2.19041.3636
  1610. OLEAUT32.dll
  1611. Address: 0x7FF87C950000
  1612. SHA: B3AA801EAC2556C3ED701BD51094E83A28A3D5EE4C24D66FE5A77E6937238C1A136F5ACEF683BACE24905D6892EA3C1117D239F010EF19491C1C3AADCFE74B49
  1613. Version: v10.0.19041.3636
  1614. ondemandconnroutehelper.dll
  1615. Address: 0x7FF86F4A0000
  1616. SHA: F32E657C837DA5E83538E44CCA18588703B327A68A3655183A14734CEB86A239E0FFB2223176B2FC26B8968C1D931B040D4C8FD47C3104C9C5801407B4A006BD
  1617. Version: v10.0.19041.4355
  1618. pnrpnsp.dll
  1619. Address: 0x7FF83B9A0000
  1620. SHA: 4DF6D2FE84D4F1728C55E279A8828F26C0844E150941E440F8A9E43CF237963B7AF95AFE0CD173A9774A7CEBBC35D96E3D0091CAED6F9C3C92E885A7A207D9D1
  1621. Version: v10.0.19041.4522
  1622. po3_SimpleOffenseSuppression.dll
  1623. Address: 0x7FFFFFCB0000
  1624. SHA: 6F55D67C46CDCAA686440FA7088DFB9B27EFE6216D51CA05595E6D37D74AA8D98E20B7B7FA39B5F52351802B150A59C3AC0C85D58CF35A37D7443181A987AA56
  1625. Version: v2.0.0
  1626. po3_TweaksSF.dll
  1627. Address: 0x7FFFFDCF0000
  1628. SHA: 10CA4455D2D3ED47741633AE9C9A6ABB47D85668D65DDCFCA0231CB516A646CBA98D823B2D756FCB002AE771AA3E339E51B8E9089824C18279A58C5427205FDC
  1629. Version: v2.0.2
  1630. POWRPROF.dll
  1631. Address: 0x7FF87A7E0000
  1632. SHA: A256201A737D8C43875F8A033D10AAF67F51C89F58CD539200C5FFCC14454A3AAA528F4C58C134A6FF115E993B74B1B86079862405E5212EAD4CAFF1FBFFA814
  1633. Version: v10.0.19041.4522
  1634. profapi.dll
  1635. Address: 0x7FF87AD30000
  1636. SHA: 2DACCC1C0133460606F0C438B0A31E78BD4A08FD9121B7FFEACBA35FF848CA847082D624C9F4D62CDF262A101F031874D3CD8620D5C090D484E2A198A1A31777
  1637. Version: v10.0.19041.5794
  1638. PROPSYS.dll
  1639. Address: 0x7FF875D00000
  1640. SHA: 9288311EDACE4F4B2338921AABBF5DE6977764AC6CF834F17B8A44B19C536DAB26FB9364014634028725B6550F41BFD1821763DDC6723537C2452076F03B4FA9
  1641. Version: v7.0.19041.4522
  1642. PSAPI.DLL
  1643. Address: 0x7FF87C310000
  1644. SHA: 76F56242C21B4EAEAA50283A25C66F97F55EDE0BB355FC9E520FA2E2F6AC30CC4C841DB16BDCECB7FA33883486A5F5D0A01E8280599F5E56123E1FA65EDEEC54
  1645. Version: v10.0.19041.3636
  1646. rasadhlp.dll
  1647. Address: 0x7FF873DF0000
  1648. SHA: 246EB46BD457A8B91D9A84B607A4C197ADE81CC9D79920785C801F1405B2D05D3769E74BAE56046697806668E6E82991187F024C122CBF341715B98BCD1E3941
  1649. Version: v10.0.19041.3636
  1650. Reactor-Class-Mod.dll
  1651. Address: 0x7FF841A50000
  1652. SHA: 0CE77462FC770265AE0E10C7655247574C21A34AF766D1E008A4284125FC8BC75B7D0679165FE2C85D884F34F8CF32730A80E1830D7C61D66606A4EDDB1072D6
  1653. Reactor-Count-Mod.dll
  1654. Address: 0x7FF840E70000
  1655. SHA: F7B8ABEB1D65D2D1572968B05EAB6E5A6CDA08E14E3B24CC0C6BE1A194FF16C55631FE48CD82740497C81A4C2223DC372588690A6E6A5B0B5302B75FFD8BCA35
  1656. resourcepolicyclient.dll
  1657. Address: 0x7FF878890000
  1658. SHA: D8E006A0ADFB9D09973D8A879F878B9ADB5123B6C11CEC787597B6B90A76F8E713D3E6966CB7FD55AF5A3F4D7CDC98ACE1B6281B0E14DDC9D91E31F399B769DF
  1659. Version: v10.0.19041.4355
  1660. RPCRT4.dll
  1661. Address: 0x7FF87C820000
  1662. SHA: 0C3D2BF8C03E578F0990702C594EDB49F1609E8E8AAEDF5781D81EE79319FFFFF18B7AD163F40555188AE1FA753DB97EE615B55DD88E2F7944EB08B15E9EAFEA
  1663. Version: v10.0.19041.4522
  1664. rsaenh.dll
  1665. Address: 0x7FF879DE0000
  1666. SHA: 36CB085679D78C5336496116A94BDA98BB0990EB8AC893423AF7FD615C2C89990DF5DB522D9B4EDB64DBAEAD7567E370CD998E01F7A52078147EDD99DDE5D72C
  1667. Version: v10.0.19041.1
  1668. schannel.DLL
  1669. Address: 0x7FF879CF0000
  1670. SHA: 1761B119DB9CC85F478B8A77C7825803429BB74ECB2736DBD3B996EB55B20E6C1726604F68F4BBFBAB0B46B035EA77B7D4CF1D580F1D64E19EEA786DFA9B9979
  1671. Version: v10.0.19041.4522
  1672. sechost.dll
  1673. Address: 0x7FF87CA40000
  1674. SHA: BCC62CEE5D5E2140ABC948E7F9CE3909A317C1F04DE5FFD54A24FB0A1C2F88318B25614DE4BC6BDA94A4B849563EB9F0653DB577F1828736A2FCC481BC6C9E13
  1675. Version: v10.0.19041.1
  1676. SETUPAPI.dll
  1677. Address: 0x7FF87C320000
  1678. SHA: 7838BAD903ED5090A530D0B9EFA7DBBDDA4834CC350359AC012547CF396038809344412E5677804C588E6A503881A8953C1BD26261730DF428822CE33E7AC52E
  1679. Version: v10.0.19041.4522
  1680. sfee.dll
  1681. Address: 0x7FFFF2850000
  1682. SHA: 4F7AEF06DC886E96D9D0D341C9EB187DF6E6C11FC9295A34873D753F6FE81ABCC44E2B28B8A32DCD8B9E9BB85786EE301290460245EE873B9397780841B00F19
  1683. Version: v1.1.0.18
  1684. sfse_1_15_216.dll
  1685. Address: 0x7FF854EC0000
  1686. SHA: A83DC7137B1593AF52C1E6EA04C33E23CF1C7DA0ADEB356AE13AAEC4939CF27A16D90F356A9041B685CFB3EBE0DC3FEBEA2F21E93BF25A7CF81C6B8FEF72E1E1
  1687. Version: v0.0.2.17
  1688. SFSEAsiLoader.dll
  1689. Address: 0x7FF8536E0000
  1690. SHA: 07B84F3F269BC76BD2CC457907F3EA721184B3214DC4CFCEE5795E1BFCF9F9DF73E72DBC58843FAA86B32E9E93EB80785011AACE9AF8966BE6DC7E1A3709030E
  1691. Version: v1.15.26
  1692. SHCORE.dll
  1693. Address: 0x7FF87D0F0000
  1694. SHA: 0E8E9CACB9E4B9E5530D6B2806E571BE79EA23D7D585BD9C9631EED2E58353106E82AAEAABCAF5577CECEDFE6B7BC0352144CEA9397C5D09203C493365B932C8
  1695. Version: v10.0.19041.4522
  1696. SHELL32.dll
  1697. Address: 0x7FF87B870000
  1698. SHA: AC4D8FD20C3E50515A66AF54818B9F572494211E2ADD6C12EB40D579613DE3616FC18C3A6ED247D656264787E94ACA2F19BCBCC504E085FA6EC216C0773DF04C
  1699. Version: v10.0.19041.4522
  1700. Shield-Count-Mod.dll
  1701. Address: 0x7FF840E50000
  1702. SHA: 582941F0602911492A0E066C61FBA41BAFF45BABA6A8ACA9D353D311DC719F74124A70A000AEF7C689347E0651396F5A8F323B210C0C584C7C5171F0577B67F5
  1703. ShipWorkshopAssignments.dll
  1704. Address: 0x7FF83AFD0000
  1705. SHA: 07FAFCD7A886B5EC146AF0A3277D3A9FB3B848020CEAAF192FF5B3BD5F432F13910F0EA2313F19271D38542B296FF05AF80F4E0ADE7D4C5BECC3C53C4529EB1E
  1706. Version: v3.0.0
  1707. SHLWAPI.dll
  1708. Address: 0x7FF87D430000
  1709. SHA: 7691A3EF59A6DF67D041F26CB839CD67C721BDB049B0AB0BEAF1DD984B1E964EA9D189C3D982AEE9F0D20EF317298AAD19BA91901CAB04F18B7CF28CFBB82E5A
  1710. Version: v10.0.19041.4522
  1711. sl.common.dll
  1712. Address: 0x7FFFF5750000
  1713. SHA: 843457A2F9F0BA83B6C2FEA37FB05F1C52F715C2046232C904DF79B1ED30F3725B967163EBFE5B3F01DAABBD9CAC27799C80DBF8269211F5319FD62F3EEF7B3E
  1714. Version: v2.2.0
  1715. sl.dlss.dll
  1716. Address: 0x7FF83D850000
  1717. SHA: 54B6D2F71B8D16114AE1A576A37E64683BA91CD8BB8AA379706D5AE21DF4571B6B4126F1085E6E5A2448D7E8B169539642AD5D7A31012C4FDEB9AC38B62ED7B8
  1718. Version: v2.2.0
  1719. sl.dlss_g.dll
  1720. Address: 0x7FF82C7F0000
  1721. SHA: 97370DF420A6BA860BE92F895ED8B5DE9299E7FF7F7E955BB514A49CE591AA5ACDC1599BF46A93E1F87B6335EA7DCB7111671D9FCD20C9029EE82A1953FF44CF
  1722. Version: v2.2.0
  1723. sl.interposer.dll
  1724. Address: 0x7FF86E290000
  1725. SHA: 4197A38D36FE41A21B11814B00F17F5BF2AE7F418DC5CCB94A6C097615B87B9C5B530DFA0296CA0580BB5618D0AB43AC02C2E1FC08E07D55B5E8BBFF8DA7160A
  1726. Version: v2.2.0
  1727. sl.reflex.dll
  1728. Address: 0x7FF839620000
  1729. SHA: C5DF9877DEDFCC443ECAD9A8EA0F10C5DC8C97C4F6F10A1BEA1831AF6EB27D89C695F67B55E451603A6550EBA084E0CD7B676FE8C56E302324025D9A97ED7FC5
  1730. Version: v2.2.0
  1731. SPINF.dll
  1732. Address: 0x7FF873870000
  1733. SHA: 5BC943D927859944C144945E93DEDB2BDCCAE31860D66D82AE6B4EB8558E79D84649962D91D43A396B7037B150C396F60753AB047D6AFC593900CA904762B3AC
  1734. Version: v10.0.19041.3636
  1735. srvcli.dll
  1736. Address: 0x7FF863380000
  1737. SHA: C45B86ABAE77F395AB4926F4581759FC04AE748131644789B8FC4137A0248EEC106ED91A0D18B734F7D48A92A96EA14668A354541D5EC4AA64A7985BB2427724
  1738. Version: v10.0.19041.3636
  1739. SspiCli.dll
  1740. Address: 0x7FF87ACB0000
  1741. SHA: 0354D201399B9A8049429274A0BD66E225E608C6F1B30B80424F78A52FBFB00EE05C12FD19544726520520A828C67FF9AFE0D69AB7179B73EAA66928A73B69C0
  1742. Version: v10.0.19041.5965
  1743. Starfield.exe
  1744. Address: 0x7FF7DAFC0000
  1745. SHA: CA6AD655194DA575B734D5731615FB9B06F51EB4CEC4526C205A1E0F12A380008D783DD785F65C18E0A92C32ADD3105A8A0A73A42DC8B73E3B04BF0986831700
  1746. Version: v1.15.216
  1747. StarfieldEngineFixes.dll
  1748. Address: 0x7FFFF2770000
  1749. SHA: 2D3D360A5831E4A1F49C26A7E999E66AEE573A430E7767BEF7EAEC71970C41429120C905B32D94B9CE718DC0B3C7D15462FCA8BAAE62CE1B89E6578EF14FD86B
  1750. Version: v10.4.0
  1751. StarwareSearchEngine.dll
  1752. Address: 0x7FF837EF0000
  1753. SHA: 360108AE95AEA6997A42BF8C59AB820AC9F668BB370B1C5E79ACAEDFFDDFFF8B6E9743ED0462CC896A4DA154C2246A85E4F3E6401C651418734263C3E59A56E2
  1754. Version: v3.3.0
  1755. steam_api64.dll
  1756. Address: 0x7FFFF6250000
  1757. SHA: CA4B1909E120DEE8313D7636275E4308A2ECF17D23F61DD578D7CCDE684C4AD951041AD13A929FB1D156DE11E3F486FB66E7497C40498180AE70584F0B4A7AEB
  1758. Version: v1.0.1.56
  1759. textinputframework.dll
  1760. Address: 0x7FF86DA90000
  1761. SHA: 84847C730BEB4A311C270A3575EEBFFA211A123282A424DF03E73D1CA70A3BCD469CD1F49ED32768590DA72F109226D85059A053C699B279371A735D9128E713
  1762. Version: v10.0.19041.5794
  1763. trainwreck.dll
  1764. Address: 0x7FF83A080000
  1765. SHA: 261801A85D41236E35C820A78E4BC3E775EBF0C19336EF1D518A61DA20429BB30B707181606675C1BC650D678CA0A27DC585DFA35BDDD717EB830459BFF60333
  1766. Version: v1.4.0
  1767. TransferSpaceships.dll
  1768. Address: 0x7FFFF2650000
  1769. SHA: ADD23D195668A28E6671A7F73102BF805B1FB18A2B1C073E4F00971BB2EBBDCBDD1B6D2BE02C165C0E414AF056D4F6FCB9BB70A29F0607EAAA6261AFA2BF1620
  1770. Version: v3.0.0
  1771. twinapi.appcore.dll
  1772. Address: 0x7FF8742B0000
  1773. SHA: 6E9A5F0913BD43F88D38BECB3FC9CB0A242915773DA92D77D95B8449BBBE1AA4F3D46C3A0AF29BD4633805BFA84DBD8DFC5CEEBACD61886F9F9039AA1AB71C73
  1774. Version: v10.0.19041.4522
  1775. ucrtbase.dll
  1776. Address: 0x7FF87B520000
  1777. SHA: BE9420A85C82EEEE685E18913A7FF152FCEAD72A90DDCC2BCC8AB53A4A1743AE98F49354023C0A32B3A1D919BDA64B5D455F6C3A49D4842BBBA4AA37C1D05D67
  1778. Version: v10.0.19041.3636
  1779. UMPDC.dll
  1780. Address: 0x7FF87A7C0000
  1781. SHA: 1E1498F8C8923CCD4C6E9B80947A18BA11AA8633D9BE3A32CE91839346397E2074636424AD23F439D6B2FA55A567C8933CEB81B1B4047A2A7C22AC9CFF24BB2E
  1782. urlmon.dll
  1783. Address: 0x7FF863CE0000
  1784. SHA: A8F9A8E06C5AA0EAD947BF2C6A10AE441345EB1E20015FB8D71170C5600C293B203AF2800837F5CA2D544E42EC51A54D1D369F0DCB67DFD5F6D986D0C221B430
  1785. Version: v11.0.19041.4522
  1786. user32.dll
  1787. Address: 0x7FF87BFE0000
  1788. SHA: C307465AD20E9F4A3A0C6759C5EFCBB3BA5D2366B030BACA7D8D0D61F1A2175719F24FA9B056B161EBB4D577320463E8EC41AD39A1905213967656754EECD3B4
  1789. Version: v10.0.19041.4522
  1790. USERENV.dll
  1791. Address: 0x7FF87ACF0000
  1792. SHA: C00DF917F081A8AC72639EF7738383345F593BF299F7673B0524E4A373B30F1B7A0E245D551D4888997E31D5122E50AD60D4D6D1EC50B79DD8995C39F1CA9D01
  1793. Version: v10.0.19041.4522
  1794. uxtheme.dll
  1795. Address: 0x7FF8787B0000
  1796. SHA: A3581D1EA6F6A327EA2EA3F23884E065200E9ACF58AAF2BB9C3D4FD0AA2019F86DDD9F9A6A1E21C5DDCC6F3516FBC7993334D123EEB9E108830C4A1BFB61AA6A
  1797. Version: v10.0.19041.4522
  1798. VCRUNTIME140.dll
  1799. Address: 0x7FF864D50000
  1800. SHA: 616C78B4A24761D4640AE2377B873F7779322EF7BC26F8DE7DA0D880B227C577ED6F5ED794FC733468477B2FCDB7916DEF250E5DC63E79257616F99768419087
  1801. Version: v14.42.34438
  1802. VCRUNTIME140_1.dll
  1803. Address: 0x7FF864B70000
  1804. SHA: 35DB454DBCC7ED89842C0440B92CE0B0B0DB41DBD5432A36A0B7E1EDDF51704B1F0D6CFF5E3A3B0C3FF5DB3D8632FED000471180AD72E39D8DBE68A757CCDFB0
  1805. Version: v14.42.34438
  1806. VERSION.dll
  1807. Address: 0x7FF8751F0000
  1808. SHA: A7F9BCFE7DFA74067FAB32E313FA74E18C4EF10F6BC40A369F0A13C4FE96D2BB7BC7C25ED7E5F1F80CAE7ECCE2D18215388420D7EE4BE23D7280F06A49E9C370
  1809. Version: v10.0.19041.3636
  1810. vulkan-1.dll
  1811. Address: 0x7FFFEEE30000
  1812. SHA: 4F430686409F4C957B705BD66D019D1E6F02289B205C1FFD074E213E193A9D0A7BD53C08B2DFF79BD41CB73E1392E5AE8DE0774A1C56BD1C9C18E9B865399582
  1813. Version: v1.4.303
  1814. wbemcomn.dll
  1815. Address: 0x7FF865C40000
  1816. SHA: F5D67C89EDF1D9B0150ABA8D113223313D33D7D381DBA6DC91CB5D50EAC3F730CCE1C30652864A4343B91375DE26D5D79143834CAFDC703BDCFB1239E8E9C610
  1817. Version: v10.0.19041.5794
  1818. wbemprox.dll
  1819. Address: 0x7FF865CD0000
  1820. SHA: 8D3B2860634C24434B7DA581B00CF185660CA394E5E700EDAA781BACEA7E58445139252DB317B60263EE08A3322742735CC8E5BA13D4012E7EBE018CACBA0B29
  1821. Version: v10.0.19041.4474
  1822. wbemsvc.dll
  1823. Address: 0x7FF8652F0000
  1824. SHA: 14EE0D2DFA0B1FE7F4E72EDA5098DBD4769EFD4078F621110C7B9346EEC70C0EEA3668FA5F70D0A19B021CEFAC7941BF6B258E6E3D5CC3A14FA85080A82C21C0
  1825. Version: v10.0.19041.4474
  1826. Weapon-Power-Mod.dll
  1827. Address: 0x7FF83E2F0000
  1828. SHA: 5C40C4A13FD23F577190C073E24D9B719E1123AF9BA1C00639717F0DCCC3E6293514A41FBE9DC9055D2739AABE5397165066FA9B230B37EB2C29860F86768057
  1829. webio.dll
  1830. Address: 0x7FF864B80000
  1831. SHA: 9BA3808FEF42A166503B974D8E530F10C024C6BC8EF83C21249C839C26DA74F41CD84A9D0DD431D373C2FDAC9991E64745BFB98933317DB2963685CCEB26BB72
  1832. Version: v10.0.19041.4522
  1833. win32u.dll
  1834. Address: 0x7FF87AFA0000
  1835. SHA: 815C2CA5A4D4190EACC58A4E7C27DC734E23DC6A3FDCDB23EBF42C8FDD4065A7269EB009958102973432AC2AFB10F399197936658FDD3E1CCAE61CDF43E27A46
  1836. Version: v10.0.19041.5965
  1837. WindowManagementAPI.dll
  1838. Address: 0x7FF874630000
  1839. SHA: FFF9C5708137030CB866CCBDA702E399942CF05F116E226203C8C442B6A0D73D567269FB439406DB2694830F944E39A8069AFD609B16C0F81A7E16F0B41741EC
  1840. Windows.Gaming.Input.dll
  1841. Address: 0x7FF873970000
  1842. SHA: 3B4DF49862EBDEB43DB202D77FEFBBA259A41C3759DE827390D210E46BC3C50B07F916C556F5F1D6806C59B53BFF633A97EC7B7CACB65D75DF1D8B84701CD657
  1843. Version: v10.0.19041.1
  1844. windows.storage.dll
  1845. Address: 0x7FF878EA0000
  1846. SHA: 36892BB15D860FE6EE64A2587CF3682A839210A572B851A476B2BA9FBC8424B8195AB3AC2745A7578763C1F61FC3B6062D511BDC6468C40322E6A762506646DA
  1847. Version: v10.0.19041.4522
  1848. Windows.UI.dll
  1849. Address: 0x7FF8668F0000
  1850. SHA: 9CC35AFA1748B08B2A9FAD7ABC2A41E9AD1902417848504D387E054835EF2D1253B48FC0D9FA28BCFF4769B1CB608B241C764E508DEA286AB3FF8856F45641A0
  1851. Version: v10.0.19041.1
  1852. WindowsCodecs.dll
  1853. Address: 0x7FF878550000
  1854. SHA: 18D064792C65B60B7E426AC5B504301A13455291EFD9E7BCED3BB54683B7DC0B9F870929BC00741022114AE033D23097446BC3B5A008A91AA9244A6D4B09A767
  1855. Version: v10.0.19041.5794
  1856. WINHTTP.dll
  1857. Address: 0x7FF8755E0000
  1858. SHA: 91A5FC1A1CEC76792C10CC4916E6AD6E451FE1E27ED2BD1C1805A7CFBABCB61467EED7EE6D925D5AF6F270594568E8ECCA7FA4962C840B54FA440BE371C16D5F
  1859. Version: v10.0.19041.4522
  1860. WININET.dll
  1861. Address: 0x7FF863650000
  1862. SHA: EF8DDB1A752F0F361AE8983765CA01C8788E90ADC46E0D6E949F9F8A5D6EC42698274CF6D2BDEB54EF9BDA0A0138A00B61DEAB920C45F4899CF4A427491C65A2
  1863. Version: v11.0.19041.4522
  1864. WINMM.dll
  1865. Address: 0x7FF873E00000
  1866. SHA: F8C82B424C5384C6CC81498FAB090347F75A08BD51A7B64EC674DA96F56855F3CAB0069B9AE56232A4460021BBE54D93A6D8E2C04D88C1C68BE75030A5CDE8F6
  1867. Version: v10.0.19041.4522
  1868. winmmbase.dll
  1869. Address: 0x7FF8645F0000
  1870. SHA: 92273692CA3EF2B60FF5AA8C7A29F3ACAA530F6EB20089410167D9EDC51E323D7872B9F925CF74AF5E6A0BC68E747D2369986FBF6002C452827AAA26E1025ABD
  1871. Version: v10.0.19041.4522
  1872. WINNSI.DLL
  1873. Address: 0x7FF877EE0000
  1874. SHA: 186B0AFCE1CAB899BA6B3E44FD5CE11CB5ED42292F6572546B1B54A8AF2B42AE8B169402ECB6C0A87279BCBA2689F538B81AB2F520794FD0D90F83A824C6449B
  1875. Version: v10.0.19041.3636
  1876. winrnr.dll
  1877. Address: 0x7FF83B980000
  1878. SHA: DFB7CA8D37DBE671B0E9D266C433596B5BB1A6F6689C8C7EAC740139B3646CD5742AD70A1D5E9695BAEAD6FAAE7ADF0361C3F2C4E4C034A179B5B00107AD370F
  1879. Version: v10.0.19041.3636
  1880. wintrust.dll
  1881. Address: 0x7FF87AF20000
  1882. SHA: 3CAAE6381938FACD33F93BAB3A5A8CC631243AE34ABF16846B5C14ED7A00BEB60EA7E1D58F27989977144B35450B8B557B01DC1F0769C61C0BE945AB7EBC47B0
  1883. Version: v10.0.19041.5965
  1884. wintypes.dll
  1885. Address: 0x7FF8761D0000
  1886. SHA: 290B3A554AEBC7F7C1C354843731949743B06F4066FA429B18C764C94C014E7EA2FE0EF62D5064E54E8D18C3200BF21DD72A01E786F16DDED7D304ACEB658B64
  1887. Version: v10.0.19041.4522
  1888. WLDAP32.dll
  1889. Address: 0x7FF87D5C0000
  1890. SHA: EA097A09EA3FE5A30637B475E7E3EE94BF5608C407907EBA4A97D8C40848C17E783E91852CD02DA1C135480EDE33D0FF033D3BFBD89FDC95CE42C3DC70D41A04
  1891. Version: v10.0.19041.4522
  1892. Wldp.dll
  1893. Address: 0x7FF87A830000
  1894. SHA: 50935DD5E3EC03E28F4A90E348C95156E9BFDFCE13036AEFC9D3798FA467B3F91E183BCFC93E1BDC9EBEBF53D1B758265FB6210A2AAD0166244E96BE14C5DF26
  1895. Version: v10.0.19041.4522
  1896. WS2_32.dll
  1897. Address: 0x7FF87D1A0000
  1898. SHA: 307EB04667A17EC2ECDDFE2F184D3A3655F31E65A451DB010ACCDE8A676705A260F873CA44F4362A2CE7E5ADDA8164504938A131614CE408645B30A9B869E122
  1899. Version: v10.0.19041.4522
  1900. wshbth.dll
  1901. Address: 0x7FF850610000
  1902. SHA: 7C52A2E6C87D163EC020371298014699AA3688F126D0B497CBDADEBF14743B9CB01BBF4094F75208B467B4AEEB6FF16F1EF91B361C61AA1E22CDC25D354F08CF
  1903. Version: v10.0.19041.5848
  1904. WSOCK32.dll
  1905. Address: 0x7FF86F440000
  1906. SHA: 11507004DC8925BF3039372F9F66E2AEA719E5BA7809A5E44224444AD455D0C4748496DE526E4CD0E69607AC8DD628A4129DC2C8A1A14D9441AAD1377D38FD58
  1907. Version: v10.0.19041.4522
  1908. XInput1_4.dll
  1909. Address: 0x7FF83D8F0000
  1910. SHA: EC915169DAEFA85383CA2A0CF842231BD5D4AB3453F354280065FF4E1766DEEA56D07AB56A0B7BFA3D02CE939600FCDA70AF64F73F8E3FBF778B9D4BA187A644
  1911. Version: v10.0.19041.4522
  1912. XINPUT9_1_0.dll
  1913. Address: 0x7FF865560000
  1914. SHA: 108AFAFF6580DCFDCA30D8EC25D5E9C59AF2F4B3E6840348C9BBA6ED62FF523AE0CFAED01BE2BE51878B33334BE918BC5F4632C86573A768C4670EA6938673BE
  1915. Version: v10.0.19041.4522
  1916.  
  1917. SCRIPT EXTENDER PLUGINS:
  1918. BakaAchievementEnabler.dll v6.0.0
  1919. BakaConsoleEditorIDs.dll v3.0.0
  1920. BakaDisableMyGames.dll v6.0.0
  1921. BakaQuitGameFix.dll v6.0.0
  1922. BayAndDocker-Count-Mod.dll
  1923. Build-Below-Bay-Mod.dll
  1924. CassiopeiaPapyrusExtender.dll v4.1.0
  1925. Cockpit-Count-Mod.dll
  1926. ConsoleCommandRunner.dll v1.6.1
  1927. Engine-Power-Mod.dll
  1928. EssenceWhilePiloting.dll v1.0.0
  1929. GravDrive-Weight-Mod.dll
  1930. LandingGear-Count-Mod.dll
  1931. ModularPeopleSystem.dll v6.2.0
  1932. po3_SimpleOffenseSuppression.dll v2.0.0
  1933. po3_TweaksSF.dll v2.0.2
  1934. Reactor-Class-Mod.dll
  1935. Reactor-Count-Mod.dll
  1936. sfee.dll v1.1.0.18
  1937. sfse_1_15_216.dll v0.0.2.17
  1938. SFSEAsiLoader.dll v1.15.26
  1939. Shield-Count-Mod.dll
  1940. ShipWorkshopAssignments.dll v3.0.0
  1941. StarfieldEngineFixes.dll v10.4.0
  1942. StarwareSearchEngine.dll v3.3.0
  1943. trainwreck.dll v1.4.0
  1944. TransferSpaceships.dll v3.0.0
  1945. Weapon-Power-Mod.dll
  1946.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement