Starfield v1.15.216 trainwreck v1.4.0 Unhandled exception "EXCEPTION_ACCESS_VIOLATION" at 0x7FF7A2BEA4F5 Starfield.exe+329A4F5 SYSTEM SPECS: OS: Microsoft Windows 10 Pro 22H2 19045.5371 CPU: GenuineIntel Intel(R) Core(TM) i7-7800X CPU @ 3.50GHz GPU #1: NVIDIA GeForce RTX 2080 SUPER GPU #2: Microsoft Basic Render Driver RAM: 19.27 GiB/31.69 GiB PAGE FILE: 28.81 GiB/36.44 GiB PROBABLE CALL STACK: [0 ] 0x7FF7A2BEA4F5 Starfield.exe+329A4F5 call qword ptr [rax+0B8h] [1 ] 0x7FF7A2BEA76E Starfield.exe+329A76E mov rbp,rax [2 ] 0x7FF7A2BED232 Starfield.exe+329D232 test rax,rax [3 ] 0x7FF7A2C3831A Starfield.exe+32E831A lea rcx,[rbp-28h] [4 ] 0x7FF7A2C346E2 Starfield.exe+32E46E2 test al,al [5 ] 0x7FFF1DA082AF AutoHideHUDAndWidgets.dll+00182AF test al,al [6 ] 0x7FFF1DA08702 AutoHideHUDAndWidgets.dll+0018702 test al,al [7 ] 0x7FFF1DA0D3F9 AutoHideHUDAndWidgets.dll+001D3F9 test al,al [8 ] 0x7FFF1DA0E011 AutoHideHUDAndWidgets.dll+001E011 vpcmpeqd ymm0,ymm0,ymm0 [9 ] 0x7FFF1DA0FD04 AutoHideHUDAndWidgets.dll+001FD04 call qword ptr [0E6ACh] [10] 0x7FF7A1B9CD6C Starfield.exe+224CD6C test eax,eax [11] 0x7FF7A1B9CE56 Starfield.exe+224CE56 mov rax,[r14+40h] [12] 0x7FF7A1166DFF Starfield.exe+1816DFF mov rbx,[rsp+78h] [13] 0x7FF7A10B5E5C Starfield.exe+1765E5C mov rcx,[rbx+10h] [14] 0x7FF7A21A83CB Starfield.exe+28583CB test r13b,bl [15] 0x7FF7A21AC080 Starfield.exe+285C080 mov ecx,[351E43Ch] [16] 0x7FF7A21A763A Starfield.exe+285763A xor eax,eax [17] 0x7FF7A1BA2C51 Starfield.exe+2252C51 mov rcx,[3E837F7h] [18] 0x7FFF4D667374 KERNEL32.DLL+0017374 BaseThreadInitThunk mov ecx,eax [19] 0x7FFF4DF5CC91 ntdll.dll+004CC91 RtlUserThreadStart jmp short 0000000000000022h REGISTERS: RAX 0x278C09AB1A0 (void*) RBX 0xAAB4E4EC28 (void*) RCX 0x278C02C2410 (void*) RDX 0x0 (size_t) RSI 0x278C3DE2EE0 (Scaleform::GFx::AS3::Instances::fl::Namespace*) RDI 0x278C02FF500 (void*) RBP 0x0 (size_t) RSP 0xAAB4E4E920 (void*) R8 0xAAB4E4EA00 (void*) R9 0x278C3DE2EE0 (Scaleform::GFx::AS3::Instances::fl::Namespace*) R10 0x0 (size_t) R11 0xAAB4E4E9E8 (void*) R12 0xAAB4E4EA00 (void*) R13 0x278C0005660 (Scaleform::GFx::AS3::ASVM*) R14 0xAAB4E4EAC0 (void*) R15 0x278C02FF500 (void*) STACK: [RSP+0 ] 0xAAB4E4EC28 (void*) [RSP+8 ] 0x0 (size_t) [RSP+10 ] 0xAAB4E4EA50 (char*) "\x01" [RSP+18 ] 0x7FF7A2C4C2EC (void* -> Starfield.exe+32FC2EC) movups xmm0,[rdi] [RSP+20 ] 0xAAB4E4EAC0 (void*) [RSP+28 ] 0x278C118B4C0 (Scaleform::GFx::AS3::Instances::fl::Object*) [RSP+30 ] 0xAAB4E4EAC0 (void*) [RSP+38 ] 0x0 (size_t) [RSP+40 ] 0xAAB4E4EC28 (void*) [RSP+48 ] 0x7FF7A2BEA76E (void* -> Starfield.exe+329A76E) mov rbp,rax [RSP+50 ] 0x0 (size_t) [RSP+58 ] 0x278C02FF500 (void*) [RSP+60 ] 0x0 (size_t) [RSP+68 ] 0xAAB4E4EBE8 (char*) "\x01" [RSP+70 ] 0x278C02C2410 (void*) [RSP+78 ] 0xAAB4E4EA50 (char*) "\x01" [RSP+80 ] 0x1 (size_t) [RSP+88 ] 0xFFFFFFFFFFFFFFFF (size_t) [RSP+90 ] 0x278C0005660 (Scaleform::GFx::AS3::ASVM*) [RSP+98 ] 0x0 (size_t) [RSP+A0 ] 0x278C118B4C0 (Scaleform::GFx::AS3::Instances::fl::Object*) [RSP+A8 ] 0xAAB4E4EB88 (char*) "\x0c" [RSP+B0 ] 0xAAB4E4EBF8 (char*) "\x0c" [RSP+B8 ] 0xAAB4E4EA51 (void*) [RSP+C0 ] 0x0 (size_t) [RSP+C8 ] 0x7FF7A2BED232 (void* -> Starfield.exe+329D232) test rax,rax [RSP+D0 ] 0x1 (size_t) [RSP+D8 ] 0x278C02FF500 (void*) [RSP+E0 ] 0x278C0D698E0 (void*) [RSP+E8 ] 0x278C02FF500 (void*) [RSP+F0 ] 0x278C02C2410 (void*) [RSP+F8 ] 0x27A68355695 (char*) "alpha" [RSP+100 ] 0x278C0D698E0 (void*) [RSP+108 ] 0x7FF7A2C516F1 (void* -> Starfield.exe+33016F1) add dword ptr [rbx+18h],0FFFFFFFFh [RSP+110 ] 0xAAB4E4EB00 (char*) "\x0c" [RSP+118 ] 0x7FF7A2BE96E2 (void* -> Starfield.exe+32996E2) mov [rsp+20h],rax [RSP+120 ] 0x278C3DE2EE0 (Scaleform::GFx::AS3::Instances::fl::Namespace*) [RSP+128 ] 0x239551 (size_t) [RSP+130 ] 0x1 (size_t) [RSP+138 ] 0xFFFFFFFFFFFFFFFF (size_t) [RSP+140 ] 0xAA0000000C (size_t) [RSP+148 ] 0x0 (size_t) [RSP+150 ] 0x278C118B4C0 (Scaleform::GFx::AS3::Instances::fl::Object*) [RSP+158 ] 0xAAB4E4EB88 (char*) "\x0c" [RSP+160 ] 0x0 (size_t) [RSP+168 ] 0xFFFFFFFFFFFFFFFF (size_t) [RSP+170 ] 0x1E0 (size_t) [RSP+178 ] 0x27A68355680 (char*) "root1.CenterGroup_mc.alpha" [RSP+180 ] 0xAAB4E4EBB0 (void*) [RSP+188 ] 0x7FF7A2C3831A (void* -> Starfield.exe+32E831A) lea rcx,[rbp-28h] [RSP+190 ] 0x0 (size_t) [RSP+198 ] 0x278C0005660 (Scaleform::GFx::AS3::ASVM*) [RSP+1A0 ] 0x0 (size_t) [RSP+1A8 ] 0x278C02C2410 (void*) [RSP+1B0 ] 0x7FF700000000 (size_t) [RSP+1B8 ] 0x20 (size_t) [RSP+1C0 ] 0xAAB4E4EB90 (void*) [RSP+1C8 ] 0x7FFF4B961B49 (void* -> ucrtbase.dll+0011B49) test al,al [RSP+1D0 ] 0x44A (size_t) [RSP+1D8 ] 0x1A (size_t) [RSP+1E0 ] 0x7FF70000000C (size_t) [RSP+1E8 ] 0x0 (size_t) [RSP+1F0 ] 0x278C0D6DE10 (Scaleform::GFx::AS3::Instances::fl_display::Stage*) [RSP+1F8 ] 0x7FF7A2BCB7DA (void* -> Starfield.exe+327B7DA) mov byte ptr [r14],1 [RSP+200 ] 0x27A68355969 (char*) "A@XZa" [RSP+208 ] 0x5 (size_t) [RSP+210 ] 0xFFFFFFFF (size_t) [RSP+218 ] 0x1 (size_t) [RSP+220 ] 0x278C0D698E0 (void*) [RSP+228 ] 0x7FF70000000C (size_t) [RSP+230 ] 0x0 (size_t) [RSP+238 ] 0x278C0D6DE10 (Scaleform::GFx::AS3::Instances::fl_display::Stage*) [RSP+240 ] 0x7FF7A2BCB7DA (void* -> Starfield.exe+327B7DA) mov byte ptr [r14],1 [RSP+248 ] 0x27A6835596E (void*) [RSP+250 ] 0x0 (size_t) [RSP+258 ] 0x27A68355969 (char*) "A@XZa" [RSP+260 ] 0x5 (size_t) [RSP+268 ] 0x7FF70000000C (size_t) [RSP+270 ] 0x0 (size_t) [RSP+278 ] 0x278C02C2410 (void*) [RSP+280 ] 0x275184C7C10 (void*) [RSP+288 ] 0x7FF7A455FA3F (void* -> Starfield.exe+4C0FA3F) add [rdx+50h],ah [RSP+290 ] 0xAAB4E4F120 (void*) [RSP+298 ] 0x700000000 (size_t) [RSP+2A0 ] 0x278C0CBB070 (Scaleform::GFx::AS3::Instances::fl::Namespace*) [RSP+2A8 ] 0x7FF70000000A (size_t) [RSP+2B0 ] 0x0 (size_t) [RSP+2B8 ] 0x278C0D698E0 (void*) [RSP+2C0 ] 0x275184C7C10 (void*) [RSP+2C8 ] 0x1 (size_t) [RSP+2D0 ] 0xFFFFFFFFFFFFFFFF (size_t) [RSP+2D8 ] 0xAA0000000C (size_t) [RSP+2E0 ] 0x0 (size_t) [RSP+2E8 ] 0x278C02C23C0 (Scaleform::GFx::AS3::Instances::fl::GlobalObjectScript*) [RSP+2F0 ] 0xAAB4E4EB88 (char*) "\x0c" [RSP+2F8 ] 0x0 (size_t) [RSP+300 ] 0x27733EF7CF0 (void*) [RSP+308 ] 0xAA00000000 (size_t) [RSP+310 ] 0x278C3DE2EE0 (Scaleform::GFx::AS3::Instances::fl::Namespace*) [RSP+318 ] 0x2770000000A (void*) [RSP+320 ] 0x0 (size_t) [RSP+328 ] 0x278C0D698E0 (void*) [RSP+330 ] 0x10 (size_t) [RSP+338 ] 0x274968CE130 (void*) [RSP+340 ] 0x27495328A80 (void*) [RSP+348 ] 0xAAB4E4F3F0 (void*) [RSP+350 ] 0x0 (size_t) [RSP+358 ] 0x7FF7A2FFC2B5 (void* -> Starfield.exe+36AC2B5) add rsp,0F90h [RSP+360 ] 0x3003C8800900F00 (size_t) [RSP+368 ] 0x6002DAB00000000 (size_t) [RSP+370 ] 0x4504DA94C3E4D212 (size_t) [RSP+378 ] 0x4111C94F (size_t) [RSP+380 ] 0x7FF7A3467A80 (void* -> Starfield.exe+3B17A80) [RSP+388 ] 0x130 (size_t) [RSP+390 ] 0x1 (size_t) [RSP+398 ] 0x2000402C3 (size_t) [RSP+3A0 ] 0x0 (size_t) [RSP+3A8 ] 0x0 (size_t) [RSP+3B0 ] 0x0 (size_t) [RSP+3B8 ] 0x3400007F7F (size_t) [RSP+3C0 ] 0x5C00000004 (size_t) [RSP+3C8 ] 0x9400000004 (size_t) [RSP+3D0 ] 0x9C00000004 (size_t) [RSP+3D8 ] 0x9C00000008 (size_t) [RSP+3E0 ] 0x9400000000 (size_t) [RSP+3E8 ] 0x0 (size_t) [RSP+3F0 ] 0x0 (size_t) [RSP+3F8 ] 0x0 (size_t) [RSP+400 ] 0x0 (size_t) [RSP+408 ] 0x0 (size_t) [RSP+410 ] 0x0 (size_t) [RSP+418 ] 0x0 (size_t) [RSP+420 ] 0x0 (size_t) [RSP+428 ] 0x0 (size_t) [RSP+430 ] 0x0 (size_t) [RSP+438 ] 0x0 (size_t) [RSP+440 ] 0x0 (size_t) [RSP+448 ] 0x0 (size_t) [RSP+450 ] 0x0 (size_t) [RSP+458 ] 0x0 (size_t) [RSP+460 ] 0x7F0400047F040000 (size_t) [RSP+468 ] 0x7F0400007F040000 (size_t) [RSP+470 ] 0x300010203020100 (size_t) [RSP+478 ] 0x0 (size_t) [RSP+480 ] 0x0 (size_t) [RSP+488 ] 0x0 (size_t) [RSP+490 ] 0x0 (size_t) [RSP+498 ] 0x0 (size_t) [RSP+4A0 ] 0x0 (size_t) [RSP+4A8 ] 0x0 (size_t) [RSP+4B0 ] 0x3F800000 (size_t) [RSP+4B8 ] 0x0 (size_t) [RSP+4C0 ] 0xBDF5C28F (size_t) [RSP+4C8 ] 0x0 (size_t) [RSP+4D0 ] 0x3DF5C28F (size_t) [RSP+4D8 ] 0x0 (size_t) [RSP+4E0 ] 0x0 (size_t) [RSP+4E8 ] 0x0 (size_t) [RSP+4F0 ] 0x0 (size_t) [RSP+4F8 ] 0x0 (size_t) [RSP+500 ] 0xC2F6ECF0 (size_t) [RSP+508 ] 0x0 (size_t) [RSP+510 ] 0x7FF7A7B15F00 (hknpBSShapeCodec*) [RSP+518 ] 0xAAB4E4EB28 (char*) "\x05" [RSP+520 ] 0xFFFFFFFFC41FFFFF (size_t) [RSP+528 ] 0x0 (size_t) [RSP+530 ] 0x3EFB0001 (size_t) [RSP+538 ] 0x2740CEB7480 (hknpSphereShape*) [RSP+540 ] 0x4504F51FC3E3F414 (size_t) [RSP+548 ] 0x4111DF33 (size_t) [RSP+550 ] 0xBFD45800BFDDFE00 (size_t) [RSP+558 ] 0x3F800000BBAF2000 (size_t) [RSP+560 ] 0xBF1A50D9BF139BDA (size_t) [RSP+568 ] 0x3F7FFFFFC33B1CB0 (size_t) [RSP+570 ] 0x3A83126F (size_t) [RSP+578 ] 0x10000000000 (size_t) [RSP+580 ] 0x0 (size_t) [RSP+588 ] 0x2747F7FFFEE (void*) [RSP+590 ] 0x0 (size_t) [RSP+598 ] 0x0 (size_t) [RSP+5A0 ] 0x0 (size_t) [RSP+5A8 ] 0x0 (size_t) [RSP+5B0 ] 0x26C0DFC5E00 (void*) [RSP+5B8 ] 0x26C0DFC5E00 (void*) [RSP+5C0 ] 0x2741C3CF000 (hknpBSWorld*) [RSP+5C8 ] 0x7FF7A1C35B2F (void* -> Starfield.exe+22E5B2F) nop [RSP+5D0 ] 0x2740CEB0F88 (void*) [RSP+5D8 ] 0xAAB4E4F510 (void*) [RSP+5E0 ] 0xAAB4E4EFE0 (void*) [RSP+5E8 ] 0x26C0B83C140 (void*) [RSP+5F0 ] 0xAAB4E4F038 (void*) [RSP+5F8 ] 0x26C0DFC5E10 (PlayerCharacter*) [RSP+600 ] 0x26C0DA14200 (StorageTable::AsyncTableColumn*) [RSP+608 ] 0x7FF7A0109BF2 (void* -> Starfield.exe+07B9BF2) mov rbx,[rsp+38h] [RSP+610 ] 0xAAB4E4EF60 (char*) "M\x03:\x05" [RSP+618 ] 0x26C0DFC5E00 (void*) [RSP+620 ] 0x0 (size_t) [RSP+628 ] 0x26C0DFC5E10 (PlayerCharacter*) [RSP+630 ] 0x2747204B650 (void*) [RSP+638 ] 0x7FFF4DF3B86B (void* -> ntdll.dll+002B86B) mov ecx,eax [RSP+640 ] 0x53A034D (size_t) [RSP+648 ] 0xF8 (size_t) [RSP+650 ] 0x279B0BC9820 (void*) [RSP+658 ] 0x100 (size_t) [RSP+660 ] 0x20 (size_t) [RSP+668 ] 0x2747204B650 (void*) [RSP+670 ] 0x0 (size_t) [RSP+678 ] 0x26C060F8340 (char*) " \r\x0f\x06l\x02" [RSP+680 ] 0x0 (size_t) [RSP+688 ] 0x26C060F0000 (void*) [RSP+690 ] 0x26C060F02AC (char*) "\x03" [RSP+698 ] 0xAAB4E4F060 (void*) [RSP+6A0 ] 0xAAB4E4F0BE (void*) [RSP+6A8 ] 0xAAB4E4F0B8 (void*) [RSP+6B0 ] 0xAAB4E4F098 (void*) [RSP+6B8 ] 0x7FFF1DA06BD9 (void* -> AutoHideHUDAndWidgets.dll+0016BD9) mov [r14+rdi],al [RSP+6C0 ] 0xAAB4E4F0BF (void*) [RSP+6C8 ] 0x30 (size_t) [RSP+6D0 ] 0x20 (size_t) [RSP+6D8 ] 0x8 (size_t) [RSP+6E0 ] 0x1 (size_t) [RSP+6E8 ] 0x7FFF1D9F6356 (void* -> AutoHideHUDAndWidgets.dll+0006356) mov [rbx+rdi],r14b [RSP+6F0 ] 0x7FF7A5A0A4B0 (char*) "\x02" [RSP+6F8 ] 0x2 (size_t) [RSP+700 ] 0x0 (size_t) [RSP+708 ] 0xAAB4E4F130 (void*) [RSP+710 ] 0x0 (size_t) [RSP+718 ] 0x7FFF1DA08156 (void* -> AutoHideHUDAndWidgets.dll+0018156) mov rax,rsi [RSP+720 ] 0xAAB4E4F098 (void*) [RSP+728 ] 0xAAB4E4F0B8 (void*) [RSP+730 ] 0x0 (size_t) [RSP+738 ] 0xAAB4E4F180 (void*) [RSP+740 ] 0xBF800000 (size_t) [RSP+748 ] 0x0 (size_t) [RSP+750 ] 0x0 (size_t) [RSP+758 ] 0xAAB4E4F200 (char*) "\x1f" [RSP+760 ] 0x7FF7A5A1BB98 (BSTGlobalEvent::EventSource*) [RSP+768 ] 0xAAB4E4F278 (void*) [RSP+770 ] 0x278C0005170 (Scaleform::GFx::AS3::MovieRoot*) [RSP+778 ] 0x26C0B97A240 (void*) [RSP+780 ] 0x27A68355680 (char*) "root1.CenterGroup_mc.alpha" [RSP+788 ] 0xAAB4E4F150 (void*) [RSP+790 ] 0xAAB4E4F180 (void*) [RSP+798 ] 0x7FF7A2C346E2 (void* -> Starfield.exe+32E46E2) test al,al [RSP+7A0 ] 0x278C0005170 (Scaleform::GFx::AS3::MovieRoot*) [RSP+7A8 ] 0xAAB4E4F0E0 (void*) [RSP+7B0 ] 0x27A68355680 (char*) "root1.CenterGroup_mc.alpha" [RSP+7B8 ] 0x278C0D73218 (void*) [RSP+7C0 ] 0x26C00000000 (char*) "Q\x04" [RSP+7C8 ] 0x0 (size_t) [RSP+7D0 ] 0xAAB4E4F278 (void*) [RSP+7D8 ] 0xAAB4E4F208 (char*) "HUDMenu" [RSP+7E0 ] 0xAAB4E4F208 (char*) "HUDMenu" [RSP+7E8 ] 0x7FFF1DA082AF (void* -> AutoHideHUDAndWidgets.dll+00182AF) test al,al [RSP+7F0 ] 0xAAB4E4F1E8 (void*) [RSP+7F8 ] 0x0 (size_t) [RSP+800 ] 0xAAB4E4F1E8 (void*) [RSP+808 ] 0x7FFF4B95FDE6 (void* -> ucrtbase.dll+000FDE6 _malloc_base) test rax,rax [RSP+810 ] 0x756E654D445500 (size_t) [RSP+818 ] 0x0 (size_t) [RSP+820 ] 0x0 (size_t) [RSP+828 ] 0xF (size_t) [RSP+830 ] 0x0 (size_t) [RSP+838 ] 0x0 (size_t) [RSP+840 ] 0x0 (size_t) [RSP+848 ] 0x0 (size_t) [RSP+850 ] 0x0 (size_t) [RSP+858 ] 0x0 (size_t) [RSP+860 ] 0x26C0B97A240 (void*) [RSP+868 ] 0xAAB4E4FC50 (stl::local_function_detail::LocalFunctionImpl<,BSEventNotifyControl,BSTEventDetail::SinkBase *>*) [RSP+870 ] 0x766FA10A23 (size_t) [RSP+878 ] 0xAAB4E4F448 (char*) " \\5hz\x02" [RSP+880 ] 0xAAB4E4F468 (char*) "HUDMenu" [RSP+888 ] 0xAAB4E4F1E8 (void*) [RSP+890 ] 0xAAB4E4F890 (void*) [RSP+898 ] 0x7FFF1DA08702 (void* -> AutoHideHUDAndWidgets.dll+0018702) test al,al [RSP+8A0 ] 0xAAB4E4F208 (char*) "HUDMenu" [RSP+8A8 ] 0xAAB4E4F1E8 (void*) [RSP+8B0 ] 0xAAB4E4F448 (char*) " \\5hz\x02" [RSP+8B8 ] 0xAAB4E4F130 (void*) [RSP+8C0 ] 0xAAB4E4F208 (char*) "HUDMenu" [RSP+8C8 ] 0x27A68355680 (char*) "root1.CenterGroup_mc.alpha" [RSP+8D0 ] 0x0 (size_t) [RSP+8D8 ] 0x1A (size_t) [RSP+8E0 ] 0x1F (size_t) [RSP+8E8 ] 0x756E654D445548 (size_t) [RSP+8F0 ] 0x0 (size_t) [RSP+8F8 ] 0x7 (size_t) [RSP+900 ] 0xF (size_t) [RSP+908 ] 0x7FFF1D9F6356 (void* -> AutoHideHUDAndWidgets.dll+0006356) mov [rbx+rdi],r14b [RSP+910 ] 0xAAB4E4F280 (void*) [RSP+918 ] 0x2786B64A48C (char*) "l\x02" [RSP+920 ] 0x0 (size_t) [RSP+928 ] 0xAAB4E4F360 (char*) "\x0f" [RSP+930 ] 0xAAB4E4F448 (char*) " \\5hz\x02" [RSP+938 ] 0x7FFF1DA0D3F9 (void* -> AutoHideHUDAndWidgets.dll+001D3F9) test al,al [RSP+940 ] 0xAAB4E4F468 (char*) "HUDMenu" [RSP+948 ] 0xAAB4E4F448 (char*) " \\5hz\x02" [RSP+950 ] 0xAAB4E4F1E8 (void*) [RSP+958 ] 0x0 (size_t) [RSP+960 ] 0x756E654D445500 (size_t) [RSP+968 ] 0x0 (size_t) [RSP+970 ] 0x0 (size_t) [RSP+978 ] 0xF (size_t) [RSP+980 ] 0x27420B4D180 (TESObjectWEAP*) [RSP+988 ] 0x2746EB393F0 (TESObjectWEAPInstanceData*) [RSP+990 ] 0x95C001EBAD2EAEE (size_t) [RSP+998 ] 0x3F7FFFD6 (size_t) [RSP+9A0 ] 0xAAB4E4F208 (char*) "HUDMenu" [RSP+9A8 ] 0x27A68355C00 (void*) [RSP+9B0 ] 0x0 (size_t) [RSP+9B8 ] 0x0 (size_t) [RSP+9C0 ] 0xF (size_t) [RSP+9C8 ] 0x756E654D445500 (size_t) [RSP+9D0 ] 0x0 (size_t) [RSP+9D8 ] 0x0 (size_t) [RSP+9E0 ] 0xF (size_t) [RSP+9E8 ] 0x3F8000004111DF33 (size_t) [RSP+9F0 ] 0x3F800000B3800000 (size_t) [RSP+9F8 ] 0x0 (size_t) [RSP+A00 ] 0xB3800000BF800000 (size_t) [RSP+A08 ] 0x0 (size_t) [RSP+A10 ] 0x0 (size_t) [RSP+A18 ] 0x3F800000 (size_t) [RSP+A20 ] 0x0 (size_t) [RSP+A28 ] 0x27A68355700 (char*) "XZames" [RSP+A30 ] 0x0 (size_t) [RSP+A38 ] 0x0 (size_t) [RSP+A40 ] 0xF (size_t) [RSP+A48 ] 0x756E654D445500 (size_t) [RSP+A50 ] 0x0 (size_t) [RSP+A58 ] 0x0 (size_t) [RSP+A60 ] 0xF (size_t) [RSP+A68 ] 0x0 (size_t) [RSP+A70 ] 0x0 (size_t) [RSP+A78 ] 0x0 (size_t) [RSP+A80 ] 0x80000000 (size_t) [RSP+A88 ] 0x0 (size_t) [RSP+A90 ] 0xAAB4E4FA80 (void*) [RSP+A98 ] 0x7FF7A24A0C08 (void* -> Starfield.exe+2B50C08) lea r11,[rsp+118h] [RSP+AA0 ] 0x34000000 (size_t) [RSP+AA8 ] 0x27A68355B00 (void*) [RSP+AB0 ] 0x0 (size_t) [RSP+AB8 ] 0x0 (size_t) [RSP+AC0 ] 0xF (size_t) [RSP+AC8 ] 0x756E654D445500 (size_t) [RSP+AD0 ] 0x0 (size_t) [RSP+AD8 ] 0x0 (size_t) [RSP+AE0 ] 0xF (size_t) [RSP+AE8 ] 0x2743E799900 (void*) [RSP+AF0 ] 0x0 (size_t) [RSP+AF8 ] 0x3F80000000000000 (size_t) [RSP+B00 ] 0x3F800000 (size_t) [RSP+B08 ] 0x80000000 (size_t) [RSP+B10 ] 0x3F80000000000000 (size_t) [RSP+B18 ] 0x0 (size_t) [RSP+B20 ] 0xAAB4E4F550 (void*) [RSP+B28 ] 0x27A68355C20 (char*) "root1.CenterGroup_mc.alpha" [RSP+B30 ] 0x0 (size_t) [RSP+B38 ] 0x1A (size_t) [RSP+B40 ] 0x1F (size_t) [RSP+B48 ] 0x756E654D445548 (size_t) [RSP+B50 ] 0x0 (size_t) [RSP+B58 ] 0x7 (size_t) [RSP+B60 ] 0xF (size_t) [RSP+B68 ] 0x3F800000 (size_t) [RSP+B70 ] 0x44FB5B12C4197F71 (size_t) [RSP+B78 ] 0xC0EEE940 (size_t) [RSP+B80 ] 0x0 (size_t) [RSP+B88 ] 0x7FF7A1B9D6B7 (void* -> Starfield.exe+224D6B7) mov rbx,rax [RSP+B90 ] 0x0 (size_t) [RSP+B98 ] 0x0 (size_t) [RSP+BA0 ] 0x0 (size_t) [RSP+BA8 ] 0x0 (size_t) [RSP+BB0 ] 0xFFFFFFFF (size_t) [RSP+BB8 ] 0xAAB4E4F750 (void*) [RSP+BC0 ] 0x7FF7A439F870 (void* -> Starfield.exe+4A4F870) cmp bl,0BFh [RSP+BC8 ] 0x26C0DFC6408 (PlayerCharacter*) [RSP+BD0 ] 0x26C204B6FC0 (void*) [RSP+BD8 ] 0x7FF7A1F4B757 (void* -> Starfield.exe+25FB757) vmovaps xmm6,[rsp+0F0h] [RSP+BE0 ] 0x2749FFFAA18 (NavMesh*) [RSP+BE8 ] 0xFFFFFFFFFFFFFFFF (size_t) [RSP+BF0 ] 0xAAB4E4F630 (char*) "0" [RSP+BF8 ] 0x0 (size_t) [RSP+C00 ] 0x4504F51EC3E3F416 (size_t) [RSP+C08 ] 0x7FF740F0377E (size_t) [RSP+C10 ] 0x4504F4CDC3E3E666 (size_t) [RSP+C18 ] 0x40F023C0 (size_t) [RSP+C20 ] 0x4504DCCDC3E4999A (size_t) [RSP+C28 ] 0x26C40F1BD60 (void*) [RSP+C30 ] 0x4505059AC3E42000 (size_t) [RSP+C38 ] 0x3F80000040F023C0 (size_t) [RSP+C40 ] 0x0 (size_t) [RSP+C48 ] 0x0 (size_t) [RSP+C50 ] 0x0 (size_t) [RSP+C58 ] 0x0 (size_t) [RSP+C60 ] 0x0 (size_t) [RSP+C68 ] 0x0 (size_t) [RSP+C70 ] 0x0 (size_t) [RSP+C78 ] 0x0 (size_t) [RSP+C80 ] 0x0 (size_t) [RSP+C88 ] 0x0 (size_t) [RSP+C90 ] 0x3F800000 (size_t) [RSP+C98 ] 0x0 (size_t) [RSP+CA0 ] 0x4504F51EC3E3F416 (size_t) [RSP+CA8 ] 0x7FFF4DF3B86B (void* -> ntdll.dll+002B86B) mov ecx,eax [RSP+CB0 ] 0x50D034E (size_t) [RSP+CB8 ] 0xF0 (size_t) [RSP+CC0 ] 0x279B0BC9820 (void*) [RSP+CC8 ] 0x0 (size_t) [RSP+CD0 ] 0x0 (size_t) [RSP+CD8 ] 0x0 (size_t) [RSP+CE0 ] 0x27400000000 (void*) [RSP+CE8 ] 0x26C060F8340 (char*) " \r\x0f\x06l\x02" [RSP+CF0 ] 0x2741D799F00 (void*) [RSP+CF8 ] 0x26C060F0000 (void*) [RSP+D00 ] 0x26C060F02AC (char*) "\x03" [RSP+D08 ] 0x7FF7A12C7238 (void* -> Starfield.exe+1977238) mov al,1 [RSP+D10 ] 0x30 (size_t) [RSP+D18 ] 0x26C060F0D20 (void*) [RSP+D20 ] 0xAAB4E4F830 (void*) [RSP+D28 ] 0x0 (size_t) [RSP+D30 ] 0x0 (size_t) [RSP+D38 ] 0x7FF7A1BA5164 (void* -> Starfield.exe+2255164) mov rbp,rax [RSP+D40 ] 0x20 (size_t) [RSP+D48 ] 0x8 (size_t) [RSP+D50 ] 0x26C06180000 (void*) [RSP+D58 ] 0xAAB4E4F739 (void*) [RSP+D60 ] 0x1EB (size_t) [RSP+D68 ] 0x20 (size_t) [RSP+D70 ] 0x26C080E6650 (SharedHeapAllocator*) [RSP+D78 ] 0x26C080E6650 (SharedHeapAllocator*) [RSP+D80 ] 0x7FF7A5690340 (char*) "\x01" [RSP+D88 ] 0x7FF7A1B9B66E (void* -> Starfield.exe+224B66E) mov rbx,rax [RSP+D90 ] 0x2749631ED20 (void*) [RSP+D98 ] 0x7FF7A1BA5164 (void* -> Starfield.exe+2255164) mov rbp,rax [RSP+DA0 ] 0x8 (size_t) [RSP+DA8 ] 0x2749631ED20 (void*) [RSP+DB0 ] 0x27A68355C31 (char*) "_mc.alpha" [RSP+DB8 ] 0x7FF7A7B2B200 (void* -> Starfield.exe+81DB200) shr al,0D9h [RSP+DC0 ] 0x1EB (size_t) [RSP+DC8 ] 0x20 (size_t) [RSP+DD0 ] 0x26C080E6650 (SharedHeapAllocator*) [RSP+DD8 ] 0x26C080E6650 (SharedHeapAllocator*) [RSP+DE0 ] 0x7FF7A5690340 (char*) "\x01" [RSP+DE8 ] 0x7FF7A1B9B66E (void* -> Starfield.exe+224B66E) mov rbx,rax [RSP+DF0 ] 0x2749631ED20 (void*) [RSP+DF8 ] 0x7FF7A1E28034 (void* -> Starfield.exe+24D8034) mov [rsp+20h],r13 [RSP+E00 ] 0x8 (size_t) [RSP+E08 ] 0x2749631ED20 (void*) [RSP+E10 ] 0xAAB4E4F90C (char*) "u" [RSP+E18 ] 0x7FF7A7B2B200 (void* -> Starfield.exe+81DB200) shr al,0D9h [RSP+E20 ] 0x7FF7A7B26988 (void* -> Starfield.exe+81D6988) add [rax],al [RSP+E28 ] 0x7FF7A7B26970 (void* -> Starfield.exe+81D6970) jge short 0FFFFFFFFFFFFFFB1h [RSP+E30 ] 0x7FF7A5A0A000 (char*) "6" [RSP+E38 ] 0x7FF7A5A0A080 (UI*) [RSP+E40 ] 0x26C0B83C3A4 (char*) "\x0b" [RSP+E48 ] 0x7FF7A1BA45E0 (void* -> Starfield.exe+22545E0) test al,al [RSP+E50 ] 0x2749631ED20 (void*) [RSP+E58 ] 0x26C0BAD7470 (void*) [RSP+E60 ] 0x1EA (size_t) [RSP+E68 ] 0x200 (size_t) [RSP+E70 ] 0x7FF7A5A557C0 (void* -> Starfield.exe+61057C0) and bl,bh [RSP+E78 ] 0x7FF7A1BA5507 (void* -> Starfield.exe+2255507) mov rbx,[rsp+60h] [RSP+E80 ] 0x20 (size_t) [RSP+E88 ] 0x20 (size_t) [RSP+E90 ] 0x7FF7A5A557C0 (void* -> Starfield.exe+61057C0) and bl,bh [RSP+E98 ] 0x7FF79FC0E4C8 (void* -> Starfield.exe+02BE4C8) mov [rdi+8],rax [RSP+EA0 ] 0x0 (size_t) [RSP+EA8 ] 0x0 (size_t) [RSP+EB0 ] 0x2749631ED20 (void*) [RSP+EB8 ] 0x0 (size_t) [RSP+EC0 ] 0xAAB4E4F918 (char*) "\x0f" [RSP+EC8 ] 0x7FF7A1E17E73 (void* -> Starfield.exe+24C7E73) jmp short 000000000000003Fh [RSP+ED0 ] 0xAAB4E4F900 (void*) [RSP+ED8 ] 0x7FF7A219F228 (void* -> Starfield.exe+284F228) mov rdx,rax [RSP+EE0 ] 0x20 (size_t) [RSP+EE8 ] 0x1 (size_t) [RSP+EF0 ] 0x400000001 (size_t) [RSP+EF8 ] 0x2749631ED20 (void*) [RSP+F00 ] 0x7FF7A1E17B70 (void* -> Starfield.exe+24C7B70) mov r11,rsp [RSP+F08 ] 0xAAB4E4FC50 (stl::local_function_detail::LocalFunctionImpl<,BSEventNotifyControl,BSTEventDetail::SinkBase *>*) [RSP+F10 ] 0x766FA10A23 (size_t) [RSP+F18 ] 0xAAB4E4F918 (char*) "\x0f" [RSP+F20 ] 0x7FF7A5A1BB98 (BSTGlobalEvent::EventSource*) [RSP+F28 ] 0x7FFF1DA06999 (void* -> AutoHideHUDAndWidgets.dll+0016999) nop [RSP+F30 ] 0x0 (size_t) [RSP+F38 ] 0x0 (size_t) [RSP+F40 ] 0x3DCCCCCD (size_t) [RSP+F48 ] 0x0 (size_t) [RSP+F50 ] 0x2786B64A48C (char*) "l\x02" [RSP+F58 ] 0x26C0DFC5E10 (PlayerCharacter*) [RSP+F60 ] 0xB2F4FC0794908CF3 (size_t) [RSP+F68 ] 0x7FFF1DA0E011 (void* -> AutoHideHUDAndWidgets.dll+001E011) vpcmpeqd ymm0,ymm0,ymm0 [RSP+F70 ] 0xAABF800000 (size_t) [RSP+F78 ] 0xAAB4E4F448 (char*) " \\5hz\x02" [RSP+F80 ] 0xAAB4E4F468 (char*) "HUDMenu" [RSP+F88 ] 0x0 (size_t) [RSP+F90 ] 0xAAB4E4F900 (void*) [RSP+F98 ] 0x26C0B83EED0 (ScrapHeap*) [RSP+FA0 ] 0x7FFF1DA50940 (char*) "\x02\x01" [RSP+FA8 ] 0x7FF7A1B9F100 (void* -> Starfield.exe+224F100) add ebp,eax [RSP+FB0 ] 0x26C0B83EED0 (ScrapHeap*) [RSP+FB8 ] 0x0 (size_t) [RSP+FC0 ] 0x13 (size_t) [RSP+FC8 ] 0x7FF7A1BA65BF (void* -> Starfield.exe+22565BF) mov rbx,[rsp+40h] [RSP+FD0 ] 0x27700000007 (void*) [RSP+FD8 ] 0x277990A03B0 (void*) [RSP+FE0 ] 0x646F4D6F746F6800 (size_t) [RSP+FE8 ] 0x756E654D65 (size_t) [RSP+FF0 ] 0x0 (size_t) [RSP+FF8 ] 0xF (size_t) [RSP+1000] 0x277990A05B0 (void*) [RSP+1008] 0x7FF7A117F6ED (void* -> Starfield.exe+182F6ED) mov rbx,[rsp+60h] [RSP+1010] 0x277990A0410 (void*) [RSP+1018] 0x13 (size_t) [RSP+1020] 0x277990A02F0 (void*) [RSP+1028] 0xE (size_t) [RSP+1030] 0x277990A0020 (char*) " Starfield.exe+181CE4C) jmp 0000000000000087h [RSP+1060] 0x2702FE05CF0 (Actor*) [RSP+1068] 0x26C0B83EED0 (ScrapHeap*) [RSP+1070] 0x277990A0130 (char*) "`\x02" [RSP+1078] 0x0 (size_t) [RSP+1080] 0x2702FE05CF0 (Actor*) [RSP+1088] 0x7FF7A19F1B96 (void* -> Starfield.exe+20A1B96) vxorps xmm1,xmm1,xmm1 [RSP+1090] 0x26C0B83EED0 (ScrapHeap*) [RSP+1098] 0x0 (size_t) [RSP+10A0] 0xAAB4E4F9B8 (void*) [RSP+10A8] 0x0 (size_t) [RSP+10B0] 0x0 (size_t) [RSP+10B8] 0x0 (size_t) [RSP+10C0] 0x0 (size_t) [RSP+10C8] 0x0 (size_t) [RSP+10D0] 0x8000000000000000 (size_t) [RSP+10D8] 0x277407CBF90 (void*) [RSP+10E0] 0x80000000 (size_t) [RSP+10E8] 0x7FF700000000 (size_t) [RSP+10F0] 0x0 (size_t) [RSP+10F8] 0x0 (size_t) [RSP+1100] 0x0 (size_t) [RSP+1108] 0x0 (size_t) [RSP+1110] 0x0 (size_t) [RSP+1118] 0x0 (size_t) [RSP+1120] 0x0 (size_t) [RSP+1128] 0x0 (size_t) [RSP+1130] 0x3DCCCCCD (size_t) [RSP+1138] 0x0 (size_t) [RSP+1140] 0x2786B64A48C (char*) "l\x02" [RSP+1148] 0x2786B64A48C (char*) "l\x02" [RSP+1150] 0x2E439AEFFA68 (size_t) [RSP+1158] 0x7FFF1DA0FD04 (void* -> AutoHideHUDAndWidgets.dll+001FD04) call qword ptr [0E6ACh] [RSP+1160] 0x766FA11EAA (size_t) [RSP+1168] 0xAAB4E4FC50 (stl::local_function_detail::LocalFunctionImpl<,BSEventNotifyControl,BSTEventDetail::SinkBase *>*) [RSP+1170] 0x766FA10A23 (size_t) [RSP+1178] 0x7FF7A5A1BB98 (BSTGlobalEvent::EventSource*) [RSP+1180] 0x2740CE4DBD8 (void*) [RSP+1188] 0x7FF7A1B9CD6C (void* -> Starfield.exe+224CD6C) test eax,eax [RSP+1190] 0x27471655970 (void*) [RSP+1198] 0x7FF7A5A1BB98 (BSTGlobalEvent::EventSource*) [RSP+11A0] 0x27471655960 (void*) [RSP+11A8] 0x2740DE51BA0 (NiCamera*) [RSP+11B0] 0x2740CE4DBD8 (void*) [RSP+11B8] 0x7FF7A1B9CE56 (void* -> Starfield.exe+224CE56) mov rax,[r14+40h] [RSP+11C0] 0xAAB4E4FC50 (stl::local_function_detail::LocalFunctionImpl<,BSEventNotifyControl,BSTEventDetail::SinkBase *>*) [RSP+11C8] 0x8 (size_t) [RSP+11D0] 0xAAB4E4FBE0 (void*) [RSP+11D8] 0x7FF7A5A1BBB0 (void* -> Starfield.exe+60CBBB0) shl byte ptr [rsi-4947FFE8h],18h [RSP+11E0] 0x7FF7A7AFDD10 (void* -> Starfield.exe+81ADD10) shl byte ptr [rcx+274A620h],0 [RSP+11E8] 0x277990A0310 (void*) [RSP+11F0] 0xAA00000000 (size_t) [RSP+11F8] 0xFFFFFFFF (size_t) [RSP+1200] 0x0 (size_t) [RSP+1208] 0x0 (size_t) [RSP+1210] 0x2740CE4DBD8 (void*) [RSP+1218] 0x0 (size_t) [RSP+1220] 0x0 (size_t) [RSP+1228] 0x0 (size_t) [RSP+1230] 0xAAB4E4FBB0 (void*) [RSP+1238] 0xAAB4E4FBE8 (void*) [RSP+1240] 0x277990A01D0 (void*) [RSP+1248] 0x7FF7A1BA65BF (void* -> Starfield.exe+22565BF) mov rbx,[rsp+40h] [RSP+1250] 0x27700000007 (void*) [RSP+1258] 0x0 (size_t) [RSP+1260] 0x7FF7A5A1BB98 (BSTGlobalEvent::EventSource*) [RSP+1268] 0x277990A03B0 (void*) [RSP+1270] 0x0 (size_t) [RSP+1278] 0xFFFFFFFF (size_t) [RSP+1280] 0x277990A0150 (void*) [RSP+1288] 0x7FF7A116DF68 (void* -> Starfield.exe+181DF68) nop [RSP+1290] 0x277990A0150 (void*) [RSP+1298] 0x277990A01D0 (void*) [RSP+12A0] 0x766FA10A23 (size_t) [RSP+12A8] 0x26C1EBF7840 (Main*) [RSP+12B0] 0x0 (size_t) [RSP+12B8] 0x0 (size_t) [RSP+12C0] 0x3DCCCCCD (size_t) [RSP+12C8] 0x0 (size_t) [RSP+12D0] 0x26C0B97A240 (void*) [RSP+12D8] 0x7FF7A7D2BEC0 (void* -> Starfield.exe+83DBEC0) sti [RSP+12E0] 0x1 (size_t) [RSP+12E8] 0x766FA10A23 (size_t) [RSP+12F0] 0x2740DE51BA0 (NiCamera*) [RSP+12F8] 0x305DE (size_t) [RSP+1300] 0x26C1EBF7840 (Main*) [RSP+1308] 0x7FF7A1166DFF (void* -> Starfield.exe+1816DFF) mov rbx,[rsp+78h] [RSP+1310] 0x7FF7A5A1BB98 (BSTGlobalEvent::EventSource*) [RSP+1318] 0x0 (size_t) [RSP+1320] 0x0 (size_t) [RSP+1328] 0x278BFF11A50 (HUDMenu*) [RSP+1330] 0x7FF7A4557A68 (void* -> Starfield.exe+4C07A68) sar bl,0BFh [RSP+1338] 0xAAB4E4FC90 (void*) [RSP+1340] 0x7FF7A5A1BB98 (BSTGlobalEvent::EventSource*) [RSP+1348] 0x766FA10A23 (size_t) [RSP+1350] 0x26C0B83F2E8 (stl::unique_function_impl::detail::TypeErasedFuncImpl<,void *>*) [RSP+1358] 0x0 (size_t) [RSP+1360] 0x26C0B83C140 (void*) [RSP+1368] 0x7FF7A10B5E5C (void* -> Starfield.exe+1765E5C) mov rcx,[rbx+10h] [RSP+1370] 0x274893633C0 (BSJobs2::Detail::TNodeJob*) [RSP+1378] 0x26C0B83C140 (void*) [RSP+1380] 0x0 (size_t) [RSP+1388] 0x274893633C0 (BSJobs2::Detail::TNodeJob*) [RSP+1390] 0x274893633C1 (void*) [RSP+1398] 0x7FF7A21A83CB (void* -> Starfield.exe+28583CB) test r13b,bl [RSP+13A0] 0x27489362229 (void*) [RSP+13A8] 0x1 (size_t) [RSP+13B0] 0x7FF7A7D2BEC0 (void* -> Starfield.exe+83DBEC0) sti [RSP+13B8] 0x27489362229 (void*) [RSP+13C0] 0x0 (size_t) [RSP+13C8] 0x0 (size_t) [RSP+13D0] 0x0 (size_t) [RSP+13D8] 0x0 (size_t) [RSP+13E0] 0x0 (size_t) [RSP+13E8] 0x0 (size_t) [RSP+13F0] 0x0 (size_t) [RSP+13F8] 0x0 (size_t) [RSP+1400] 0x26C0B97A5C8 (BSJobs2::Detail::GroupThread*) [RSP+1408] 0x7FF7A45FC830 (void* -> Starfield.exe+4CAC830) sar bl,0BFh [RSP+1410] 0x0 (size_t) [RSP+1418] 0x7FF7A21AC080 (void* -> Starfield.exe+285C080) mov ecx,[351E43Ch] [RSP+1420] 0x766FA10A23 (size_t) [RSP+1428] 0x7FF7A5A4EDC0 (BSFixedSizeBlockAllocator::TAlloc<4294967296,16777216,128>*) [RSP+1430] 0x766FA10BF9 (size_t) [RSP+1438] 0x274893633C1 (void*) [RSP+1440] 0x0 (size_t) [RSP+1448] 0x7FF7A21A763A (void* -> Starfield.exe+285763A) xor eax,eax [RSP+1450] 0x0 (size_t) [RSP+1458] 0x0 (size_t) [RSP+1460] 0x26C0B97A5C8 (BSJobs2::Detail::GroupThread*) [RSP+1468] 0x7FF7A45FC830 (void* -> Starfield.exe+4CAC830) sar bl,0BFh [RSP+1470] 0x26C0B97A5C8 (BSJobs2::Detail::GroupThread*) [RSP+1478] 0x7FF7A1BA2C51 (void* -> Starfield.exe+2252C51) mov rcx,[3E837F7h] [RSP+1480] 0x7FF7A5A4EDC0 (BSFixedSizeBlockAllocator::TAlloc<4294967296,16777216,128>*) [RSP+1488] 0x7FF7A45FC830 (void* -> Starfield.exe+4CAC830) sar bl,0BFh [RSP+1490] 0x0 (size_t) [RSP+1498] 0x0 (size_t) [RSP+14A0] 0x26C0B97A5C8 (BSJobs2::Detail::GroupThread*) [RSP+14A8] 0x0 (size_t) [RSP+14B0] 0x0 (size_t) [RSP+14B8] 0x0 (size_t) [RSP+14C0] 0x7FF7A45FC830 (void* -> Starfield.exe+4CAC830) sar bl,0BFh [RSP+14C8] 0xAAB4E4FDC0 (void*) [RSP+14D0] 0x7FF7A7B0BB50 (BSThreadEvent::`anonymous namespace'::Source*) [RSP+14D8] 0x0 (size_t) [RSP+14E0] 0x0 (size_t) [RSP+14E8] 0x0 (size_t) [RSP+14F0] 0x0 (size_t) [RSP+14F8] 0x7FFF4D667374 (void* -> KERNEL32.DLL+0017374 BaseThreadInitThunk) mov ecx,eax [RSP+1500] 0x0 (size_t) [RSP+1508] 0x0 (size_t) [RSP+1510] 0x0 (size_t) [RSP+1518] 0x0 (size_t) [RSP+1520] 0x0 (size_t) [RSP+1528] 0x7FFF4DF5CC91 (void* -> ntdll.dll+004CC91 RtlUserThreadStart) jmp short 0000000000000022h [RSP+1530] 0x0 (size_t) [RSP+1538] 0x0 (size_t) [RSP+1540] 0x0 (size_t) [RSP+1548] 0x0 (size_t) [RSP+1550] 0x0 (size_t) [RSP+1558] 0x0 (size_t) [RSP+1560] 0x7CC3F56700000000 (size_t) [RSP+1568] 0x0 (size_t) [RSP+1570] 0x0 (size_t) [RSP+1578] 0x7FFF4B6A44D0 (void* -> KERNELBASE.dll+01344D0 UnhandledExceptionFilter) mov [rsp+10h],rbx [RSP+1580] 0xAAB4E4D3C0 (void*) [RSP+1588] 0xFE6F53636E0000FF (size_t) [RSP+1590] 0x7FFF37A9B1B7 (void* -> nvgpucomp64.dll+025B1B7) shl dword ptr [rbp+0Ah],8Bh [RSP+1598] 0xAAB4E4D3C0 (void*) [RSP+15A0] 0x0 (size_t) [RSP+15A8] 0x0 (size_t) [RSP+15B0] 0x0 (size_t) [RSP+15B8] 0x0 (size_t) [RSP+15C0] 0x0 (size_t) [RSP+15C8] 0x0 (size_t) [RSP+15D0] 0x0 (size_t) [RSP+15D8] 0x0 (size_t) [RSP+15E0] 0x0 (size_t) [RSP+15E8] 0x0 (size_t) [RSP+15F0] 0x0 (size_t) [RSP+15F8] 0x0 (size_t) [RSP+1600] 0x0 (size_t) [RSP+1608] 0x0 (size_t) [RSP+1610] 0x0 (size_t) [RSP+1618] 0x0 (size_t) [RSP+1620] 0x0 (size_t) [RSP+1628] 0x0 (size_t) [RSP+1630] 0x0 (size_t) [RSP+1638] 0x0 (size_t) [RSP+1640] 0x0 (size_t) [RSP+1648] 0x0 (size_t) [RSP+1650] 0x0 (size_t) [RSP+1658] 0x0 (size_t) [RSP+1660] 0x0 (size_t) [RSP+1668] 0x0 (size_t) [RSP+1670] 0x0 (size_t) [RSP+1678] 0x0 (size_t) [RSP+1680] 0x0 (size_t) [RSP+1688] 0x0 (size_t) [RSP+1690] 0x0 (size_t) [RSP+1698] 0x0 (size_t) [RSP+16A0] 0x0 (size_t) [RSP+16A8] 0x0 (size_t) [RSP+16B0] 0x0 (size_t) [RSP+16B8] 0x0 (size_t) [RSP+16C0] 0x0 (size_t) [RSP+16C8] 0x0 (size_t) [RSP+16D0] 0x0 (size_t) [RSP+16D8] 0x0 (size_t) MODULES: _nvngx.dll Address: 0x7FFF19A80000 SHA: BD3BCA0B91A2C7E1F742990BDC791DBBB86F855748BCD74601FC8B55A971AE569A53BEF892D333664CA0149DAB461980EE977CCD9D2C07D3280C43ADDFC22BF8 Version: v32.0.15.7700 ADVAPI32.dll Address: 0x7FFF4CC20000 SHA: 5BB36C31B92CBE8762FE3C60983B8DC1982E2FBED9C28117B4E0AA622C242CF1549009DE5B574C6A056852044889B78CCCAEE8E8874A36294575A9A13279C538 Version: v10.0.19041.1165 amsi.dll Address: 0x7FFF420C0000 SHA: 40C757624C834F4766BC1D16C225AD9B1E6CA7E99BF4E321A2E365A0B0A61C60120E8ACF65F2F912A400498E01EE0D058E95B05D84A79B8BBB438F9D84949D05 Version: v10.0.19041.4355 AUDIOSES.DLL Address: 0x7FFF45E70000 SHA: 070606F05102478459CE974CDAB6C91FD54C5220284154195A8DF1C60579641031A49F41A4B9716B13DB6A23C48003A6889DE051CE6FA5FE1932758D36DD2F7F Version: v10.0.19041.1165 AutoHideHUDAndWidgets.dll Address: 0x7FFF1D9F0000 SHA: 833632AD5747B4291D6B3C262011772DD1BD5C8F9113D17E0DCFD63BE0637B9CDAD4E2CAA673439CE6DC9AB8A1A537BD3A46FF1C6862AA163E1FD012DF873BE8 Version: v5.1.0 bcrypt.dll Address: 0x7FFF4B870000 SHA: BEF2ED2B4C80F75BBC1653D2AD8258FB1C569B7AB38BBA97C72211DFEF01AF11988674E6DF21BE2FCD237922E24EC0F22D8B9D7A8B92ED759056C32B2357F55F Version: v10.0.19041.1165 bcryptPrimitives.dll Address: 0x7FFF4BBB0000 SHA: E5490CE12A77C17AACD45BF4DC1B07A52554F2F8C230552FAD7895593A990AD03D54508C5DDCDBAB58F5403C57DBF98D4E4591E251212BA0363FE1150AD0DD93 Version: v10.0.19041.5007 bink2w64.dll Address: 0x7FFF1E560000 SHA: 61AB61B895332AE98F5491D07975E5D6A1E42747DE1AE292298CB008AB63AB410F8A7684DB7DDA694EBCC351783D68EDB167B4EEEAB74DBEC6C1BB238E62BEED Version: v2023.2.0 cfgmgr32.dll Address: 0x7FFF4BAC0000 SHA: 4906AB14D229825F00639ABD2ACCE25B1154B9226D0E97148CC85B4EFBEF9386171C80AEA1CC4F8A2458C0B4A90F07B4C62013CB900D821F4D3764CE3EF010F1 Version: v10.0.19041.3996 clbcatq.dll Address: 0x7FFF4D330000 SHA: AFA02856163C38761BE25B575403F125FA2D25A3FBA0B86B42E07B39DAFF09C35F462BA90BD40002A7EFB7EC2CCC2FC3B5127D3237DEADC0E0B6C000FB2B0ADA Version: v2001.12.10941.16384 com_antivirus.dll Address: 0x7FFF41E90000 SHA: 4EC4E2353704D0ED174F97A5A6F09165DE5139AB1156B158CB58FD8B57866D070991B5BEEE932D93424831B290BB475F0FE8F29313B64B436D8E48FA3905730D Version: v21.21.7.298 combase.dll Address: 0x7FFF4C240000 SHA: E851245C9F5288058827727623DCB04B1430E925C604F4FADF551BACC9764C1EB6CA8B61774A27A75B71313317CEBCC2F95F951BFA75BA5F13CFC27B6F42E0C8 Version: v10.0.19041.3636 CONCRT140.dll Address: 0x7FFF2E120000 SHA: 11FE4C0519CB1DF73695CE38B5FDEA2A563DE565116A47FF0032D5A68B8C51FE732AD66738A7167E56D79193C60AF9204A7EE0BEAE8FF8BB75ABD0B484C2D764 Version: v14.44.35211 CoreMessaging.dll Address: 0x7FFF48660000 SHA: 76EEB0E32ED7B3A11470718292453B2F9F865AD956E78DA33BC9ACB752F4098FD851223E121D9A6AC281C2232924E4D8E3E8A158E758F3A35347FE1B9F48C86D Version: v10.0.19041.4355 CoreUIComponents.dll Address: 0x7FFF482D0000 SHA: 4BA4C9EC65EA58150E531A91CD3B45D609B19982AE0C1099214575D946416BBB0243DE6196206D3B110B537CD008FC3AB9ABCBE456C4BF80A9DBA6841308D610 Version: v10.0.19041.3636 CRYPT32.dll Address: 0x7FFF4BD90000 SHA: 77AA4E63B85277B9EE20C5FDD4CE4DD65C38FFCC510EE6618ED9E0418749325B0FC2D0DE07033128A1BE97C859740F202510C0FD7E3FB2DA1399ED595CECD532 Version: v10.0.19041.1165 CRYPTBASE.DLL Address: 0x7FFF4AE20000 SHA: 4BCBB5E7E8C31A47DD110C0100288670C8C3664BC9B46373A2687289997D81E02807860E6B11177A3D781B40B9CE0EC2CA8AEA0E3D3928244AAE51047EC3745A Version: v10.0.19041.3636 cryptnet.dll Address: 0x7FFF45680000 SHA: FB00453D0C8DF4BD73AD8EEABCFAD8DEDE0F29874EA7AEF75F8DDE355D0C0DDE0AD1ED477F09EBD8A88C72F47E9489E866DB4A895A75CE62348BF3CB2489AD4A Version: v10.0.19041.3636 cryptsp.dll Address: 0x7FFF4AE30000 SHA: 1DAF57F3550D1BDDB60972C63AF8AECE03E35118DDB7D747A104295106F82ABA67F4BF9F203E8FF65927982283BEC95B4215BFA0FBBEF3CC42DF0B3797E0CFAB Version: v10.0.19041.3636 d3d11.dll Address: 0x7FFF47140000 SHA: C201D83562EF04459A6DBA69D046916800BC8A5CD6550D9999A8D472B85F351E7A16AF0AE2904486304121D498ABCD2ED0C5CAFA38852A61EDD0AB3237830FAD Version: v10.0.19041.4355 d3d11on12.dll Address: 0x7FFF0B5A0000 SHA: AC49A13A16B9E325CA345291CFB9AD3991E90B382FF04338C3B16609E59E3DB39331C3AD0FA26F9516FF80A7C80A06F3A3D73E356A86435EECB33831FFB841E6 Version: v10.0.19041.4355 d3d12.dll Address: 0x7FFF2E0F0000 SHA: F15ADCF3FDBEDE6927A47E8EA76CB5C7A239BD496782A070E0BBB0A320EF8944A5FC2A4BCC9BD2E83E6CE7195F9C96BD19B1AC0557C28946DBDB1B7E266B6DF3 Version: v10.0.19041.4355 D3D12Core.dll Address: 0x7FFF19310000 SHA: B44437ED5E2BCC9ADF44E7458312C0EF0C7B6548231542F31664B9E51DB932DFD40C8F7D17470ED0DA938D73FEE5ADDBD6184B91A66BD0B8EEA0B206137A0388 Version: v1.608.2 d3dcompiler_47_64.dll Address: 0x7FFF10D20000 SHA: E8757069D772821E928401CBB5829CF8733E9362BA1DCF8687048387BF626912A119046FC55A120B2B1AB73F058991EA2AE7D6EA4D6A87AD182A279226E7441F Version: v6.3.9600.16384 D3DSCache.dll Address: 0x7FFF2CED0000 SHA: 83BC9C7DBC7E03D1D97A6CFF06A3FEEA1B2A7C5EEF46526F5B2597A8BD10A20E1B533F76030E93AD7501E14FA514E8DDC687D2480E0DF9CAE3468AC654189A2D Version: v10.0.19041.1165 Daimos22_BMC_S.dll Address: 0x7FFF36E60000 SHA: A4DD3E209AD2C5A9C9E53573410062787DB19F058CAC5F2607C04E88C31A2D541CD1BB1CF033C8B170D8F6E47B4DB913E249604B19F8F41E08C67E48296E338F dbgcore.DLL Address: 0x7FFF3FAF0000 SHA: 6AAF72F5DD5AC32F636B34316859DA8FDCC1DEA88856E8205D8E50168592A50B0BCC1CA17293E7A626DF31C1A155ED19FACAD1E2B8CBA665E8CD4C3B450D9D22 Version: v10.0.19041.4355 dbghelp.dll Address: 0x7FFF40640000 SHA: A1B672B4964A5D511789E99FD3635BE69C1512065158F5F67D86244D39138299B77C9560985D0BBB84702FA97181C2D3B599BF64FB8225E1EFCF4B414763BE2A Version: v10.0.19041.3636 dcomp.dll Address: 0x7FFF47B00000 SHA: 3B55D4896E021EE98334B8E2199A8248FEDC907E645CBF7CE3DA3D8ED9985440ABA3290EA02EF5CDB18A6DF358BDA79AC3427FA2DF7EB785447FEA47EBF7F662 Version: v10.0.19041.4597 devobj.dll Address: 0x7FFF4B230000 SHA: AA917F2B57F7147C3BA188ECDE279006DDDB91CD44D4DFEBC83284F79DF570742147A0BF10E29C935AD28AF08DBE223071EA5393C1BBA3E1BA8F97C7D6235218 Version: v10.0.19041.4355 DEVRTL.dll Address: 0x7FFF44AC0000 SHA: 77A490B99710F9186F47CD0FF750642647685E887F919F5BBC3115A89946FF54777C3D28CFAA5B2A214D34E2D7686934C2181A92F149F19873BE0721AA8D90EA Version: v10.0.19041.3996 dhcpcsvc.DLL Address: 0x7FFF45E50000 SHA: 15ED6CAB586D1AFAB2C45F28AC377C5ABAFE6E982BED81899E4BE0805AF40C2477E6B90ADAFBE34F854AD208BCB441CD49BE71C7C8D65DFAE68E36984273F521 Version: v10.0.19041.1165 DINPUT8.dll Address: 0x7FFF2B540000 SHA: 8724CECA11C21C29E2BC3C7712E8228FF3C30E4C320C176830E8B9FE8B50A93B0FA72CB473EEA40913F1D85C432CA1C2BEAC9A0E761322B1A65B40BBE9FD490E Version: v10.0.19041.1165 DNSAPI.dll Address: 0x7FFF4A950000 SHA: 4DF18424C89DC3C97107E7724D70127FA88787275AA3A80C73A67A89A6A7F700CEF130B05CA529C932C5CB5B0587CE01E124398EDF72341D8A2A436C4E5AE759 Version: v10.0.19041.1165 DPAPI.DLL Address: 0x7FFF4B290000 SHA: D4B3849944B608E1C19EFA4D52DB38005EAF1C17441ED3A848D1F2C83F60EFEDCD83D283079C367103B58BA5C7029140015B0AD2414B53252D4210A13210D4EC Version: v10.0.19041.3636 drvstore.dll Address: 0x7FFF45530000 SHA: 58A4318870907BF1377DAC971D115E502B07F07CB225DD4B895FE3C078AF748718D4DD25102E11C22737E67C57806E4C7C2625DDB9736BF37050EBE8834C2D4F Version: v10.0.19041.5369 DSOUND.DLL Address: 0x7FFF199E0000 SHA: C2242C561B28CCF93831F8192953A5071E0BF57521D5EEE71D78790A4D393568160BA3D31ECA2EC891405816A091E6003F910DEA1543FE0C6BA94F3A7528B754 Version: v10.0.19041.1165 dwmapi.dll Address: 0x7FFF49110000 SHA: 6058BE3D4946E32FBFBA799F88932A22FB1645957C500755E3173E9D141F71CB02A3287BD9C513E95ED0A00E525F435E6D39E35E8FFBDDF8E3A8D5CFCD6A1FF8 Version: v10.0.19041.1165 dxcore.dll Address: 0x7FFF420E0000 SHA: 4F1777A7A98870EFAAD139C2D611B64D8AB4C1ED25E7D185B32A84D82571CF656C643E79F3080D362C5F4E05B77E50521C87A45CECAFF430B53B0748CAA994CC Version: v10.0.19041.4474 dxgi.dll Address: 0x7FFF49E00000 SHA: 6EDD5346656E5D593A6BC984EB2B6FCA06D353B336DCDC27E4F6ABB54C69087004C9F65323A2A79E01E0ACB96B44CBFBE5E114A9C4AA5B1A4039BDB7AF5309CB Version: v10.0.19041.5198 dxilconv.dll Address: 0x7FFEF7AC0000 SHA: 5DD5A91D06AEE42FC5C734A5304560CB1A7FF934E323A70FC06B1F360D056548951F0800A6715D23C7CBB761886CFFC850E814F9EAC268B8FFA997CEC2FA4AD1 Version: v10.0.19041.1 fastprox.dll Address: 0x7FFF42F90000 SHA: 290DC4D3D5BF784B39F62622F13543E7E1568C177D5BE551FC06C264A5B0CC888706B75BA3822D1DF3BEF5733531C99B9C89801718480D84858F583FE788F02D Version: v10.0.19041.4355 fwpuclnt.dll Address: 0x7FFF45200000 SHA: 756856989336FB3DA5103DDB1A9B4A5EF0DED507EC96E7DB89F5EE077EA8C136E13CA66F716FF2FF8637A4EADA0B444CBBB2B9C0F3F7629CE7233F042966B758 Version: v10.0.19041.1165 gameoverlayrenderer64.dll Address: 0x7FFF1AEA0000 SHA: 046080C6E922642B5C322B8EC0F7B2874E64E98F81AB4B694EF5D304FECCC954CAD0D9F697D900D72C2FEB2FAD31F389D4359879F26568F9F7DCCC5EE9FEC25E Version: v9.86.62.31 GDI32.dll Address: 0x7FFF4BEF0000 SHA: 610F74CFC49462766FC9572CC669C203784E6C2D1B9464C16CAA7C0F98803C0817D19D4CA2030F0917EB3B57143BC647A94CFBAB9F62BFB261D03844752526AB Version: v10.0.19041.4474 gdi32full.dll Address: 0x7FFF4BC70000 SHA: 22DD65195DF05F768BBDE22EEC434A8171BF52D3FDDE08BB3358CDC86A2F0AB3D5A4D11C01A4E029A15A2C0B088E56B293B4964101CAFE38BA2F22C7FBDDD3D0 Version: v10.0.19041.4957 GetReferenceInfo.dll Address: 0x7FFF1B760000 SHA: 0B288223AD3BA6269BBFC33D3A158E54E4AE917204CAB047104D9774442CF02A16D85530FBA2736F4D7F685428E1E37DD8517C7D9532246DB55C478C90C0A8E3 Version: v7.0.0 gpapi.dll Address: 0x7FFF49DD0000 SHA: 5AE94F4803E301355A28D566A8001D4BD6E60A1A7AECFAEE98C8E288B2D229DEC53C1F828D8E3D658B55EA299A5886327B3A11F7D64B08216E67F4C5CE3539FA Version: v10.0.19041.1165 HID.DLL Address: 0x7FFF49DC0000 SHA: 6269C673CC8F6763EF3D2ABA489C9BFCE1F5760F21408715AFE9F2CE23FEAE3124B568E0AA0ADDAABC43E624F9FC1E4DD9F7796135F6DC094B48BFDD810198D6 Version: v10.0.19041.1165 iertutil.dll Address: 0x7FFF3BD30000 SHA: 764F529360AD64212C7169F550607613EDD87A5F57454A89A8AB0EB6514B80A02E768573147E1B920383F9CBDC0EB92B49116F76F0858E9F65288435C0F14BCC Version: v11.0.19041.1165 imagehlp.dll Address: 0x7FFF4D580000 SHA: F74688513B70E559316E4F583B36365126E5904C24EFF65B70C9AE2D86B43A5258E29732D7F00D758E2271DB283D549459180B26E90D3E552C264C9E9B681B5E Version: v10.0.19041.3636 IMM32.dll Address: 0x7FFF4C130000 SHA: 93BFA30DD70DCE8EE68F72FD8D35C1BF5BCB05B4249762618F249AED69429AF2DA79FECC3A79CD7B69428610E9CE194474B521DC72E6EFDD02E7FA2E9CA91DD8 Version: v10.0.19041.4474 inputhost.dll Address: 0x7FFF376E0000 SHA: A290C7595DF0EB13F4E33BAC30AEB97CA209D52089BBB836501DFD09F5EDA4559012298C2735034BAB978C572BA0E948A1677ED857F2A04FCBAF7A07C8FB8EA7 Version: v10.0.19041.4355 IPHLPAPI.DLL Address: 0x7FFF4A910000 SHA: 5C89A265540E72183CAA65B245A846C2F958C07AC58A011FC3DDC640FBDF81C51BBEFFFF9FE3752B809EF5CC58692FC69ABDC2E0DDB2390EC8121D8133677664 Version: v10.0.19041.1165 kernel.appcore.dll Address: 0x7FFF49410000 SHA: 1913D97EDD8421A7985B131656AA1B3FE9CB629E0CD3D9BE31A3CE40788F59111C50EC3E80BF2A775D72690FC0142935D205DFB06538F0C7CB3D0193057F6662 Version: v10.0.19041.3758 KERNEL32.DLL Address: 0x7FFF4D650000 SHA: 7332A2E291493235D52CCDFF9B0DCF17FFDD432586DE5F4258816B0D0D4D6CAD259E5C456034B8C5DCE8B6A98A80E370B59D59FFB1A1D4352C10717A6BB49FAE Version: v10.0.19041.5072 KERNELBASE.dll Address: 0x7FFF4B570000 SHA: 44993F855E9368EC6DD6BC748CBD03452C39E4F37C7F6C44FA031C193F7AA44A98495B54B24DC18EFD91732A18E2931A98B15FC9FA371F0C824353983467DBF8 Version: v10.0.19041.5072 libxess.dll Address: 0x7FFF11500000 SHA: FF63203BC0DF4975771A13622CB88617D0B90EDA81BC22A1BB21BDEF5E60DE89A959766ADAE453D447449993847BCA211E9FDF32F068F5D4DCD3C1786310833E Version: v1.2.0.13 Lumin.dll Address: 0x7FFF27E20000 SHA: ACC3719F0D4E3F7124CBA2DC56EF542C2A6B3E73A4BC89DB791B9B32769F9F9D902251BAACC2429AC3252BA8FF89B0CCC0D46BD20B6112C7ECA1C9E52E971980 Version: v5.1.0 mdnsNSP.dll Address: 0x000054EE0000 SHA: 6643A7066974ABFD5904DF73ED225FD5EED4A84341B12199B6EB9A8A2AD234DBA865D50F8CCFF8A88002CE4C6AE2131745CF43AAC88A3A0A66B596FB0D93E56E Version: v3.0.0.10 MMDevApi.dll Address: 0x7FFF45DB0000 SHA: BDE405C7B49EDC42C160B757FEB621A5693278AE1BD355494D6B718BDFB64812C0BB4E0ABD341E9CDD01B89FEFD0C544FAD48EC3CA491987F5D673FBC01D9300 Version: v10.0.19041.1165 msasn1.dll Address: 0x7FFF4B060000 SHA: D81A60DA80E4499DD704C983A8AFB7DFDAAF821CF6B9C224AC92609344C8E310C206D18FE93D817362C5F625626F632A2C0B6999C8BD31A92BE3FC6221DEA7D4 Version: v10.0.19041.3636 MSCTF.dll Address: 0x7FFF4D0E0000 SHA: 2FB7ED3D95F91C09CC4F24C40C9FA9271D331DE74C89A02A7AA796D7563C410AF2316CCF0468A67D8685945A88F66F9A0DFF2C56D9F44B3F80A5FDC1281E43B9 Version: v10.0.19041.1165 mskeyprotect.dll Address: 0x7FFF3FFF0000 SHA: 1947763BCCA8B67BC315A51CD86E97893F9D1056E3FB3E15D1E912DF6E8D45D6C817C85EC38662E3D4BEC5DE5AA5AEF903C5928FEF55829CF44C57090F4E5F9D Version: v10.0.19041.1165 MSVCP140.dll Address: 0x7FFF1B8C0000 SHA: B7AEE12E1BF86027E3C42AE28F6F6FB34DCA81C1F5AF6983EA4AAC559F2FEDF945956A381F529C553D71BC83CD71DCBAD12266FAD86C944F17F63DB92B8CA95B Version: v14.44.35211 msvcp_win.dll Address: 0x7FFF4BB10000 SHA: 924022BB40C542A3FF0D09DA35B8156113A83336D57924888D921F070F6192D83FCEC6B89BDE89957731E55E41118CA2AFFEB5885541BD345DA7857996C22FD5 Version: v10.0.19041.3636 msvcrt.dll Address: 0x7FFF4D040000 SHA: DA3B0D985CB6E8D64176B8024EB783C276970AEE486D25CBC2468A781D51A455315840D6C9DA063C84C484DB7D7AD2994AF337C4A66160D6EB7B64E77041CEAD Version: v7.0.19041.3636 MSWSOCK.dll Address: 0x7FFF4AC30000 SHA: C55D28AE1299B467EE45496CE7631D72639048F9962A112A7BF8157A00F746BFC0CB9814E865ED16405F5D1729A7E1CDBD0B8C0037AF3B0B42A8B0B47801C97C Version: v10.0.19041.1165 napinsp.dll Address: 0x7FFF28DD0000 SHA: 8383EDCB53E967759FE31A0BB053A2D2E8EDC7C4B6D8E73C839D3393741138EA1BB53D34CCE93265539B31CBDED01475A0FB9CA3A7D721A81DAFC4D50F89B85D Version: v10.0.19041.1165 ncrypt.dll Address: 0x7FFF4AF40000 SHA: D0AF95031B5845645389F9C290E7D8728D2CFDC4661E0F99B22A101D4B966AA7F7F1B2C9A2D4669D680228F43A7EC26204CA635AD7DEF293373BC7A711CE8B43 Version: v10.0.19041.1165 ncryptsslp.dll Address: 0x7FFF2E220000 SHA: 785475254865E1D40DB78E36BF1083CCD253CF1BD45DDE258189907FE944F85E01533A271E5583C4BF9B3671F78CCCEE8B6957E0B8DDA4C6946910F7F0CD7257 Version: v10.0.19041.3636 netprofm.dll Address: 0x7FFF48BA0000 SHA: A9D044732896311DAFE7F868723DB4DB4A7CBAACD4CAF9C95E1F24172BA462296CE178ED2434F4EE588545C24B1D8950EE6B8C3FA2E17BFEBD6C830E841DBE1D Version: v10.0.19041.4355 netutils.dll Address: 0x7FFF4AA20000 SHA: 6B38B7BFD22A455C9B7E21ADEFCFE25E619E26BAD91FC1EA095B94CFB2BC9131AE3428498D13FBC885252998D7ADA4ED63CB084A1FD6F81A8B887E6143D2C2F1 Version: v10.0.19041.3636 NLAapi.dll Address: 0x7FFF47980000 SHA: 7C6E96085594E98ED756B35F1B5CAA73AAE3FF8CA1B99AD86742598B43EC58118D44245E0081A830497D8CF208DDAE1E625401B61629F118E99B512C22481924 Version: v10.0.19041.4123 npmproxy.dll Address: 0x7FFF44F80000 SHA: 1B0AF7B9BBDAABF7305AD89796AE2FC747D852BA9EE7867393F09348E65C5D339C219C1BDC24C272B1A72283B6069FD19E8A61C82A8C78DB74CCD43E8331758F Version: v10.0.19041.4239 NSI.dll Address: 0x7FFF4D720000 SHA: AC76FFCAF5401343BD62D6FE32B675F0A38463D5362FF9D7C2AA9B061D8D2B29E3A6865272DB2BCD8C3405E6D927F0B58400FD238670F464059CA9274FE64CC6 Version: v10.0.19041.3636 NTASN1.dll Address: 0x7FFF4AF00000 SHA: F3D13E43C01DB40AE0278AB78AA395EC4013E4BDE8C0EF1A28570E17FCAECB3FEC424135D3889762423D971FAA161074A4A378109961DC9D300F938B0F39772D Version: v10.0.19041.1 ntdll.dll Address: 0x7FFF4DF10000 SHA: 9A8D3D1C1470119CA99B5E74B4B154A1AFDA7A7348FAA4425C2DEC7ADCEF631413C8035171E06FCC7CC03BE804100107CCAA2755064979F0869C825F56E9B39F Version: v10.0.19041.4842 ntmarta.dll Address: 0x7FFF4A7A0000 SHA: 373EF3ACEB49B71CA4989E727ED938E54C6BB2060D133DA2EDAF7DD7ED3F9B2EA76BD0A8714D1C46372CD48B52C190055B68C8D1E65913CC834B87033BE59A06 Version: v10.0.19041.1165 nvapi64.dll Address: 0x7FFF40020000 SHA: 048569D251097D0197D6FFC5F28A4DB2EEDB9D30AC23AF01C7409B3AC1C04EB3B1D2F93BBD6920AB13B31FAE0E888762F7654172137995C721AB6AF2E8A97D08 Version: v32.0.15.7700 NvCamera64.dll Address: 0x7FFF09E10000 SHA: 04764FE8A9B041E7D6C7BDBEE262B3E22D44BBB82ACE81D076190F0FE70BD4F259BAA1E5D54BD7521DFFFEFBD6F18BDF0330F1ADA2954F033CA4D68F3929D551 Version: v7.1.0 nvcuda.dll Address: 0x7FFF11130000 SHA: CBD5105D262AD0CB28E9EF2C97B2ABB7A622DB69C99521C783BDE0D0111F3DB9772072FCE65482CA05547AC23BFDE53B21083D8A5BE5D7F1B93F3ACAE2EDFFCA Version: v32.0.15.7700 nvcuda64.dll Address: 0x7FFF0EBC0000 SHA: 00A58AB711E9EBEBED477BAA6C06D6657E205A3499BF9A6CB17F49639E75479B8CC6383638162DCB4EBDC0A943A7E227D259086970F18B46F9AFD50BE2E085CB Version: v32.0.15.7700 nvdxgdmal64.dll Address: 0x7FFF1A890000 SHA: 51ED3C2CF3BD26D31BD9A18396AE746A7DAD0FD97F2361311F385A38E1D9CB521D5686977C7E01073FC69CD034CDEB630677DAE9193CCF304DC63847E0247A1A nvgpucomp64.dll Address: 0x7FFF37840000 SHA: 442866A512F9B573BF1D1882A812A4C5D8DE682054E0315EF180B93F228B690FA0BC8964A793B3780E22EE8C5EE653AB08E9CB30C09E0C375E99AD46AC18DE79 Version: v32.0.15.7700 nvldumdx.dll Address: 0x7FFF41DB0000 SHA: 88B49B8B66D887215DFC20B7F4510714F195A18E4112B8FE0BCD9A97F33F81A4824A63CBE78E14DA5FB9B9C3E3D5F157AB2D0A75F03BB6DF7CC371D3D0B77E2A Version: v32.0.15.7700 NvMemMapStoragex.dll Address: 0x7FFF3D950000 SHA: F48A4C4C560E80785CDF52B6A25F99DF5561E3EB3CD48347FC75DC6260464824DAB87AE7FFEDD1FC9E13FCE9F130C6561C21E69DCC4EF43143140A48934F8ED8 NvMessageBus.dll Address: 0x7FFF3B980000 SHA: 5005036A7631D83644ECA39996430B1AE14E089499DAF80A3D3A9AC3BB4BD1AC2353B0AF9CDCC267804C964557FF05821B576852CCF3FF19ED42288C4DBAD809 nvngx_dlss.dll Address: 0x7FFF0BA40000 SHA: 56037EF9ACEA29A074CFBD63D2F4B15325864DAC8F871EDED336D8EE50A4EDE7652212090009420A1A8E2EE4541DB238E17586DD0246FEE3F6A935B140B68BD7 Version: v3.5.0 nvngx_dlssg.dll Address: 0x7FFF0A680000 SHA: E7E49E838D14190D80B748ECD6168F58C64421B50EFFA9F930C08F28BF24ADD8D88226E0268B63DB61B80385052BA991AB24626F517F96C99B6B8B8670319751 Version: v3.5.0 nvppex.dll Address: 0x7FFF19C00000 SHA: EE7413A151729CF2D9BAD45494D1756577C9EDB19E53606771F0E55DBC97B1D8F9E8C4393D0F7831D1CB16CA213E26F89E30B013EB16212A0A2640352422667E Version: v32.0.15.7700 nvwgf2umx.dll Address: 0x7FFF2F8E0000 SHA: 8D67765A387BB730F89B492AF76F5039E2644A5F91FDE7924F8C78CF1CCE44949759AFDFF792CE773E75530A5B2C8B09B983774F115ED47844673379E36D2FA1 Version: v32.0.15.7700 ole32.dll Address: 0x7FFF4D200000 SHA: 99603CC986F6A6A29D0B5CB69E16AC65DC5DE5AC86DC89F5DDDE822A0C8B78EDDB34CE4FD5265E5A53687B7DACBB85752B3B30843F3A15F415F0E6A3287BB954 Version: v10.0.19041.3636 OLEAUT32.dll Address: 0x7FFF4CF70000 SHA: B3AA801EAC2556C3ED701BD51094E83A28A3D5EE4C24D66FE5A77E6937238C1A136F5ACEF683BACE24905D6892EA3C1117D239F010EF19491C1C3AADCFE74B49 Version: v10.0.19041.3636 ondemandconnroutehelper.dll Address: 0x7FFF2DE50000 SHA: F32E657C837DA5E83538E44CCA18588703B327A68A3655183A14734CEB86A239E0FFB2223176B2FC26B8968C1D931B040D4C8FD47C3104C9C5801407B4A006BD Version: v10.0.19041.4355 PhotoMetadataHandler.dll Address: 0x7FFF251A0000 SHA: 61FDC2979C1DC42BCD2D40602541D600A3C4970377EF035202DC6C9379E3C1E34C613AF94695ED8960D16CBCCCDF62FFCB19817A1E893C3C6C6B4D0C6158AFCB Version: v10.0.19041.4355 pnrpnsp.dll Address: 0x7FFF28C50000 SHA: 4DF6D2FE84D4F1728C55E279A8828F26C0844E150941E440F8A9E43CF237963B7AF95AFE0CD173A9774A7CEBBC35D96E3D0091CAED6F9C3C92E885A7A207D9D1 Version: v10.0.19041.1165 POWRPROF.dll Address: 0x7FFF4B3D0000 SHA: A256201A737D8C43875F8A033D10AAF67F51C89F58CD539200C5FFCC14454A3AAA528F4C58C134A6FF115E993B74B1B86079862405E5212EAD4CAFF1FBFFA814 Version: v10.0.19041.1165 profapi.dll Address: 0x7FFF4B4A0000 SHA: 4F2ACABD2492E479ADCE9D402F23CF4D42DA3D834028A2B1904A61232DEF9B2A0DA0A1F9BABBF29D37EF86FDE9C02446824F0D033510ABF706D459F47EC7713F Version: v10.0.19041.4355 PROPSYS.dll Address: 0x7FFF46820000 SHA: 9F4AE5D85E8109415CC3997927A7B5B1534E13F7A9B9ADD3B2BE5EA269D3156AD89841BD303B69E3F05E22528054B1D2D8D926ED504863AA2A80943E4788DC07 Version: v7.0.19041.3636 PSAPI.DLL Address: 0x7FFF4D510000 SHA: 76F56242C21B4EAEAA50283A25C66F97F55EDE0BB355FC9E520FA2E2F6AC30CC4C841DB16BDCECB7FA33883486A5F5D0A01E8280599F5E56123E1FA65EDEEC54 Version: v10.0.19041.3636 rasadhlp.dll Address: 0x7FFF40010000 SHA: 246EB46BD457A8B91D9A84B607A4C197ADE81CC9D79920785C801F1405B2D05D3769E74BAE56046697806668E6E82991187F024C122CBF341715B98BCD1E3941 Version: v10.0.19041.3636 resourcepolicyclient.dll Address: 0x7FFF49010000 SHA: D8E006A0ADFB9D09973D8A879F878B9ADB5123B6C11CEC787597B6B90A76F8E713D3E6966CB7FD55AF5A3F4D7CDC98ACE1B6281B0E14DDC9D91E31F399B769DF Version: v10.0.19041.4355 RPCRT4.dll Address: 0x7FFF4D3E0000 SHA: 87A9F5E860298117AD3FD353A46893CA809BAC770D5EB60B42FF4D6283C5190F4EF353AA5F20273C0857E2E2221324E85130BF8442820D378C4BB506000866E9 Version: v10.0.19041.3636 rsaenh.dll Address: 0x7FFF4A550000 SHA: D3F376274CB7CCFB392996FF0F2BE902896796D12839609FEE0F420CEB373774861184CE2FDF8E3597D5632E817AF755A96860269C4650E4751F456E9B0D5BFE Version: v10.0.19041.1 schannel.DLL Address: 0x7FFF4A460000 SHA: 782F4BFD94944371DAE03E88BF10200C4E20CC74C1763C7200FA6869D59F224F99FFA8AB157FB816F7011D8CB33726965949A16F7D48BF33BC2079A347A84F87 Version: v10.0.19041.1165 sechost.dll Address: 0x7FFF4C670000 SHA: 227D232A2154195536B18F1A7C38AD77E94782261D1BA340DB691E96E0CC09E1CF64A83120092407EFD94B95866FB373D60A5269A9119CF124194FB0E5B4FE15 Version: v10.0.19041.1 Secur32.dll Address: 0x7FFF41E80000 SHA: 2631AA4988B34F31620BFC4CD0333EDF540D0E663ED440C95AF6DB1CC9A67914A53598C76D6EE4CC0DD6AE4C049A55CA20E8ABA21C03CFAC447CBB4A401D87B6 Version: v10.0.19041.3636 SETUPAPI.dll Address: 0x7FFF4C710000 SHA: B5313F3650CB9B47475013831AEEC4E00C50473AD61846716D438B4CFA6424D557488A866B0379ADBB85BA26B25DFEEA0DAE61779C401504B74C340B36BF8E14 Version: v10.0.19041.1165 sfee.dll Address: 0x7FFF1ACA0000 SHA: 4F7AEF06DC886E96D9D0D341C9EB187DF6E6C11FC9295A34873D753F6FE81ABCC44E2B28B8A32DCD8B9E9BB85786EE301290460245EE873B9397780841B00F19 Version: v1.1.0.18 sfse_1_15_216.dll Address: 0x7FFF2F3C0000 SHA: A83DC7137B1593AF52C1E6EA04C33E23CF1C7DA0ADEB356AE13AAEC4939CF27A16D90F356A9041B685CFB3EBE0DC3FEBEA2F21E93BF25A7CF81C6B8FEF72E1E1 Version: v0.0.2.17 sfse_plugin_console.dll Address: 0x7FFF47AA0000 SHA: 5FF62CEAFC10F730D4293A92DAFB4EB466C01799E34409FA7A6B3005EF3F81D42B49DAFD857047AC3D0E9105C196DA0D4F0E888659B872DD43AA6BCDCF2F1563 Version: v1.17.0 SHCORE.dll Address: 0x7FFF4D5A0000 SHA: 2C75C2CDB5393F58A7664066A42C6FCA84EF4DC14923AFBAACED132F5CF9584245301E6D8E4A68451C83A9C8EBE20E58A87E6E11ED5CA70B641FAB86CD9F3301 Version: v10.0.19041.1165 SHELL32.dll Address: 0x7FFF4D730000 SHA: 16139DD624FE185AD631723ADA13A7CADB8378FC777A86EFB5E02810047D9D89D169DFCDB0A977746465FD2AF1299C39C50E08FF8E2175D144CB37C1DADCC5A9 Version: v10.0.19041.5198 SHLWAPI.dll Address: 0x7FFF4C0D0000 SHA: 6FEAAC64A3D283A997408E06A2C6B09D10B54BAD7FCBD34428DCA4E9B44D48FCDE33E40C4878CAEF137AA3B632C317771DCD061C3ECCC0882F322E17DCC47701 Version: v10.0.19041.1165 sl.common.dll Address: 0x7FFF1A7E0000 SHA: 843457A2F9F0BA83B6C2FEA37FB05F1C52F715C2046232C904DF79B1ED30F3725B967163EBFE5B3F01DAABBD9CAC27799C80DBF8269211F5319FD62F3EEF7B3E Version: v2.2.0 sl.dlss.dll Address: 0x7FFF28590000 SHA: 54B6D2F71B8D16114AE1A576A37E64683BA91CD8BB8AA379706D5AE21DF4571B6B4126F1085E6E5A2448D7E8B169539642AD5D7A31012C4FDEB9AC38B62ED7B8 Version: v2.2.0 sl.interposer.dll Address: 0x7FFF215C0000 SHA: 4197A38D36FE41A21B11814B00F17F5BF2AE7F418DC5CCB94A6C097615B87B9C5B530DFA0296CA0580BB5618D0AB43AC02C2E1FC08E07D55B5E8BBFF8DA7160A Version: v2.2.0 sl.reflex.dll Address: 0x7FFF2B390000 SHA: C5DF9877DEDFCC443ECAD9A8EA0F10C5DC8C97C4F6F10A1BEA1831AF6EB27D89C695F67B55E451603A6550EBA084E0CD7B676FE8C56E302324025D9A97ED7FC5 Version: v2.2.0 SPINF.dll Address: 0x7FFF42B80000 SHA: 5BC943D927859944C144945E93DEDB2BDCCAE31860D66D82AE6B4EB8558E79D84649962D91D43A396B7037B150C396F60753AB047D6AFC593900CA904762B3AC Version: v10.0.19041.3636 srvcli.dll Address: 0x7FFF3BFF0000 SHA: C45B86ABAE77F395AB4926F4581759FC04AE748131644789B8FC4137A0248EEC106ED91A0D18B734F7D48A92A96EA14668A354541D5EC4AA64A7985BB2427724 Version: v10.0.19041.3636 SSPICLI.DLL Address: 0x7FFF4B450000 SHA: E97B200B93F98B0C8E4BD83E38D75016F5CBED4D75F9151F6D2B5FC825552A7F3D4746645D7D53B5403EAE623FD194128D5D4D13A0B956960DCE9CD68FE16683 Version: v10.0.19041.5369 Starfield.exe Address: 0x7FF79F950000 SHA: 41AF1614C5E400F3F89B5185E4E0C28B385CA67C1A993AAF21572E3B73EDAF6C01B200EB0A101EB27EB8A767C24D3F095E15C76581A89472C6D59B64E49D80F6 Version: v1.15.216 StarfieldEngineFixes.dll Address: 0x7FFF1AB90000 SHA: 73E642E053085F02A7A2E2E652C3780479F6C9B9E634F4CE500EA63CBCF979BFFF91F1A1C915E88FEA97BD8BF3FAC751A421633E874D09A42BB6C7BFDE71947D Version: v11.2.0 steam_api64.dll Address: 0x7FFF2D690000 SHA: C08DE8C6E331D13DFE868AB340E41552FC49123A9F782A5A63B95795D5D979E68B5A6AB171153978679C0791DC3E3809C883471A05864041CE60B240CCDD4C21 Version: v7.40.51.27 steamclient64.dll Address: 0x7FFEF8E50000 SHA: A9EF650160D1CA21491EE1FBF77060B5264A0EEB9D70133A76DA437AFF9B48881A4F266C95E72163B8914BCDBE62ACC6E67965583B4D62858D7245E3FC909C01 Version: v9.86.62.31 textinputframework.dll Address: 0x7FFF3C420000 SHA: 31321B5F5AD4ADD42ACBCD92B181BCC03287E3CB4443ABEDE87ACEABE51682B403C94DCF8A008C561B203462EB0E2A35EA756823BE3C54889D209E6380DA85B1 Version: v10.0.19041.5198 tier0_s64.dll Address: 0x7FFEF8CB0000 SHA: 07F5B34B3716E062E66E94CDD31179FD89310A5DF27B88DB60780D6A20DF7018E36733F1221B86C2D4BCED6BB244E1D25E0AA06244B2E3332288E82C3FE32E1A Version: v9.86.62.31 trainwreck.dll Address: 0x7FFF1AD90000 SHA: 261801A85D41236E35C820A78E4BC3E775EBF0C19336EF1D518A61DA20429BB30B707181606675C1BC650D678CA0A27DC585DFA35BDDD717EB830459BFF60333 Version: v1.4.0 TransferSpaceships.dll Address: 0x7FFF1AA70000 SHA: ADD23D195668A28E6671A7F73102BF805B1FB18A2B1C073E4F00971BB2EBBDCBDD1B6D2BE02C165C0E414AF056D4F6FCB9BB70A29F0607EAAA6261AFA2BF1620 Version: v3.0.0 twinapi.appcore.dll Address: 0x7FFF44AE0000 SHA: F74B648E0C1A5BE68D95AA2E29EBA6E32DECA0BE653AF3E05620C120B98197DCC65DE16183AC3BC2CAB96510E144E7C93C51EBACBA5F4D939F593736A60D55AF Version: v10.0.19041.1165 ucrtbase.dll Address: 0x7FFF4B950000 SHA: BE9420A85C82EEEE685E18913A7FF152FCEAD72A90DDCC2BCC8AB53A4A1743AE98F49354023C0A32B3A1D919BDA64B5D455F6C3A49D4842BBBA4AA37C1D05D67 Version: v10.0.19041.3636 UMPDC.dll Address: 0x7FFF4B3B0000 SHA: 1E1498F8C8923CCD4C6E9B80947A18BA11AA8633D9BE3A32CE91839346397E2074636424AD23F439D6B2FA55A567C8933CEB81B1B4047A2A7C22AC9CFF24BB2E urlmon.dll Address: 0x7FFF3FDE0000 SHA: CBA4F332E1384A3B65DE933F327754EF7F84D4EFDB8F69948DAD028D57543797B857DD980CA30CAE0ACE68F5F088898ABD78C9EFF4A93B067763BA10B22F9E5F Version: v11.0.19041.1165 user32.dll Address: 0x7FFF4CDD0000 SHA: 56A9F0A30B5212953E0F7972F89584C73536012F6FCDEE2EDFF46950CCDCAA72572620DB24553CE5C7479ADA7CC2C3BB07F309DDEF3948613A02E426720FC716 Version: v10.0.19041.1165 USERENV.dll Address: 0x7FFF4B420000 SHA: 7454A7ECD58FDA18250BE9AB84025971CA96F6C62E72DFE0645EFF8052C68EAFF650F61AE51E53455CF1402D9C1042BDF49F55CD3B72B24945D1F6B6A00540FE Version: v10.0.19041.1165 uxtheme.dll Address: 0x7FFF48EA0000 SHA: CF8791769045A8F72360BE3687FBD59A4687FC9D31F836E1966F25BE57F76DD8D61F94BE0A376E282B29143AA984D92ABB7B4AFDBF85C79625DBFD3F3B0A1327 Version: v10.0.19041.1165 VCRUNTIME140.dll Address: 0x7FFF290F0000 SHA: BDA93FF2C306C82F1942EBD538F5C77BA593E3E20792159B2A2F5EBD086C524F6C6BD3DE5AD722C71FF7D832D0149608289929E9B23F7858EBB960DBB3422F5F Version: v14.44.35211 vcruntime140_1.DLL Address: 0x7FFF29220000 SHA: 6BCDD6B16D815D72DC7EFD6A2352319ECE102F3B7D85C648286E4B3B594B7670D61B7E05C580FC416421E1A1622B38737B1E90080171384E7E2CD5E37AC71225 Version: v14.44.35211 VCRUNTIME140_1.dll Address: 0x7FFF2F3F0000 SHA: 49681067F2F8598EB39AABAAD9893F414605AC2A94FC00D570BEED03F99532ECE5E164853B02FBEA2905F1EAF49527151F8EA8F09F796B239B2C933A8DC84058 VERSION.dll Address: 0x7FFF456C0000 SHA: A7F9BCFE7DFA74067FAB32E313FA74E18C4EF10F6BC40A369F0A13C4FE96D2BB7BC7C25ED7E5F1F80CAE7ECCE2D18215388420D7EE4BE23D7280F06A49E9C370 Version: v10.0.19041.3636 vstdlib_s64.dll Address: 0x7FFF2BB10000 SHA: 53105A82F971FBEFFD232F0B54CEBBF1D9FE72A5905832A69C5FD1A891664AA8563B6A518BE83046429EF51E5E3597B3B2F0BE60E4037EDB65A92B0C2643A74C Version: v9.86.62.31 vulkan-1.dll Address: 0x7FFF17050000 SHA: 3CCA9E1BE01F27283EB9EE2CBF10D6A8837888F48E3145463F9005DCA2BAB55BEECFA44C916CA726F730CC320947A353421B1DF6A6C0A53626990AB8D7D2E8CC Version: v1.4.303 wbemcomn.dll Address: 0x7FFF44290000 SHA: DA29A604B8631FC22E1EACD057E8FDFB70ED004BAC0566F6F5C22377A3F55A1EE6DE6E6DE2F1710E24E6087F6CC936B921B0A958E324DC5603D3A719CA141F4D Version: v10.0.19041.4355 wbemprox.dll Address: 0x7FFF44380000 SHA: 8D3B2860634C24434B7DA581B00CF185660CA394E5E700EDAA781BACEA7E58445139252DB317B60263EE08A3322742735CC8E5BA13D4012E7EBE018CACBA0B29 Version: v10.0.19041.4474 wbemsvc.dll Address: 0x7FFF44120000 SHA: 14EE0D2DFA0B1FE7F4E72EDA5098DBD4769EFD4078F621110C7B9346EEC70C0EEA3668FA5F70D0A19B021CEFAC7941BF6B258E6E3D5CC3A14FA85080A82C21C0 Version: v10.0.19041.4474 webio.dll Address: 0x7FFF2EC30000 SHA: 2296C620DEDC4A4DC7B557FC99D0EC713D48AD12B96195C45475BBEAB545D8775697DA76550B07C8994F7FD01C8566F00B8FDBE9C129FBF4D00AA9F67BC6AAA7 Version: v10.0.19041.1165 win32u.dll Address: 0x7FFF4BC40000 SHA: E35DDE027D16776180704DDE4FC60B3E97989F3018FF28A606DE64A090EA34192845A56CCC15C5ACD1FDD4C23765748C0891589EE5C7D19BA9053E69795EF113 Version: v10.0.19041.5247 WindowManagementAPI.dll Address: 0x7FFF44D30000 SHA: 9DD1F57384EBF388B89B1881635ABA9C60B5C59A8B03E1F4934F93C932D7526C750C0D4B1424312832E4F8B09F7D62A3C415D07AE77F8A9FB22860178FE38D1C Windows.Gaming.Input.dll Address: 0x7FFF43D30000 SHA: 46C11F37FD9CDEC2260E86BC3AF12F03BEF322731DC4E7144F763D43712709CE4F08A52B06D542B1AD422ECA43C7A44E191C6BABC313B6D8B96026DF96134F4F Version: v10.0.19041.1 windows.storage.dll Address: 0x7FFF49610000 SHA: A1CC1DE5591405C23989A56EB3E29F6EB934728856E735082B7B5CD5248F0C20FB4A3F17FB7CFB71292C43DDEFA2ABDFCC3181A26D5FD3C7619EE2F7052EAC6C Version: v10.0.19041.1165 Windows.UI.dll Address: 0x7FFF2EAB0000 SHA: F0CBEFEDE88D28B84E3F4F7D1C5FF7F675195AFF3B01C68B3DFA93D6FE3B3885FCB159B8B6B9088E5CE26FE3371C15DBE71F04BCE3B9AE44C9A8DC3E3DAEA7F6 Version: v10.0.19041.1 WindowsCodecs.dll Address: 0x7FFF48C90000 SHA: 9E99C21EAC42C7B5FCA590B84547E8F6C099C5BBF58B5B38E2EB31AF7C7042A37B7D3898245A7D5C5946C5C3D35E0853D4783507BAD5DA9453E5318DEAF673BA Version: v10.0.19041.5129 WINHTTP.dll Address: 0x7FFF46020000 SHA: B88D04C2A79F0C9C44B323D3F873018F6AC757763614469153CF8D7A408CC0C70E785C908C36865212BEE3BCF15ADB5D231634978935FA5DC8E42E5C96178BAD Version: v10.0.19041.3636 WININET.dll Address: 0x7FFF3E640000 SHA: DA63A5A1D13D2451C7427785A47CDB3FD0550537D8B536AB148D3B12AFE62D5F642F7438F01DAA810E9E3B58F199426D2344E79297A2848D8C8B806B94A09F41 Version: v11.0.19041.3636 WINMM.dll Address: 0x7FFF40F80000 SHA: F8C82B424C5384C6CC81498FAB090347F75A08BD51A7B64EC674DA96F56855F3CAB0069B9AE56232A4460021BBE54D93A6D8E2C04D88C1C68BE75030A5CDE8F6 Version: v10.0.19041.1165 winmmbase.dll Address: 0x7FFF225A0000 SHA: 92273692CA3EF2B60FF5AA8C7A29F3ACAA530F6EB20089410167D9EDC51E323D7872B9F925CF74AF5E6A0BC68E747D2369986FBF6002C452827AAA26E1025ABD Version: v10.0.19041.1165 WINNSI.DLL Address: 0x7FFF461B0000 SHA: 186B0AFCE1CAB899BA6B3E44FD5CE11CB5ED42292F6572546B1B54A8AF2B42AE8B169402ECB6C0A87279BCBA2689F538B81AB2F520794FD0D90F83A824C6449B Version: v10.0.19041.3636 winrnr.dll Address: 0x7FFF28C30000 SHA: DFB7CA8D37DBE671B0E9D266C433596B5BB1A6F6689C8C7EAC740139B3646CD5742AD70A1D5E9695BAEAD6FAAE7ADF0361C3F2C4E4C034A179B5B00107AD370F Version: v10.0.19041.3636 wintrust.dll Address: 0x7FFF4BA50000 SHA: 11A3A90F0EADD33BE4EAA3198508F10969CADD2CA7C781C451177722DE2E5EE1047E666CEE99196AC9A5918AF44DEC764BC4172E02F4CFDDB6E36ED1A2C472CE Version: v10.0.19041.5369 wintypes.dll Address: 0x7FFF48070000 SHA: CD18FC473623634E3BD3EDDF1EE2E232B785342DFFEC0BE911E19DC3327C61055BA65C971B4F0C963CC31FA0ADD61D90F566195D2B89EB0A0479E0B224D7A81F Version: v10.0.19041.1165 WLDAP32.dll Address: 0x7FFF4C5A0000 SHA: 70B47064B1E8D10C9D6AC3DC822D3A93E8798CD19CAB03B47A5CBC800E68FB03333BE219575631140E2FDD5D7CB375005A8850D614D4DEBA166928EECFE9FDF1 Version: v10.0.19041.1165 Wldp.dll Address: 0x7FFF4AED0000 SHA: 5E7B9ED4ED0144D5D838E55A6C8FCA08AAE668621514E7E0A3A2834D353583DCFD54FCEA7E75F0DB0D0283D0FEFAFBB464E576C2C890A343BF0A65BDA7142336 Version: v10.0.19041.1165 WS2_32.dll Address: 0x7FFF4C600000 SHA: 307EB04667A17EC2ECDDFE2F184D3A3655F31E65A451DB010ACCDE8A676705A260F873CA44F4362A2CE7E5ADDA8164504938A131614CE408645B30A9B869E122 Version: v10.0.19041.1165 wshbth.dll Address: 0x7FFF3C580000 SHA: 8BBAD084869DCD4931105A3B4CFC755EC3F821ACF308BBD897556FE8ADFA88ADEE2DA84E2D5A4EC66883DAA05D632E336FDC182DE22029865D8B910C21EBFEF9 Version: v10.0.19041.3636 WSOCK32.dll Address: 0x7FFF36FB0000 SHA: 11507004DC8925BF3039372F9F66E2AEA719E5BA7809A5E44224444AD455D0C4748496DE526E4CD0E69607AC8DD628A4129DC2C8A1A14D9441AAD1377D38FD58 Version: v10.0.19041.1165 XInput1_4.dll Address: 0x7FFF2F640000 SHA: EC915169DAEFA85383CA2A0CF842231BD5D4AB3453F354280065FF4E1766DEEA56D07AB56A0B7BFA3D02CE939600FCDA70AF64F73F8E3FBF778B9D4BA187A644 Version: v10.0.19041.1165 XINPUT9_1_0.dll Address: 0x7FFF47A70000 SHA: 108AFAFF6580DCFDCA30D8EC25D5E9C59AF2F4B3E6840348C9BBA6ED62FF523AE0CFAED01BE2BE51878B33334BE918BC5F4632C86573A768C4670EA6938673BE Version: v10.0.19041.1165 SCRIPT EXTENDER PLUGINS: AutoHideHUDAndWidgets.dll v5.1.0 Daimos22_BMC_S.dll GetReferenceInfo.dll v7.0.0 Lumin.dll v5.1.0 sfee.dll v1.1.0.18 sfse_1_15_216.dll v0.0.2.17 sfse_plugin_console.dll v1.17.0 StarfieldEngineFixes.dll v11.2.0 trainwreck.dll v1.4.0 TransferSpaceships.dll v3.0.0