Starfield
0 of 0

File information

Last updated

Original upload

Created by

shadeMe

Uploaded by

shademe

Virus scan

Safe to use

Tags for this mod

36 comments

  1. shademe
    shademe
    • premium
    • 699 kudos
    Locked
    Sticky
    If you think something is wrong with NPC dialogue after installing this plugin, please read the description or the bundled ReadMe to understand why this is happening and how to "fix" it.
  2. PalateSwap
    PalateSwap
    • premium
    • 15 kudos
    Had a CTD when using quick melee key with this mod enabled. Bizarre
  3. silvermetal
    silvermetal
    • premium
    • 26 kudos
    I just had a crash playin with this mod. It was right when I...

    Spoiler:  
    Show

    Deposited Reginald Orlase's ID for Vae Victis


    And trainwreck shows this crash log:

    Spoiler:  
    Show

    Starfield v1.8.88
    trainwreck v1.3.1
    Unhandled exception "EXCEPTION_ACCESS_VIOLATION" at 0x7FFA2FBB2AC7 Starfield-Silent-Voice.dll+0022AC7
    SYSTEM SPECS:
        OS: Microsoft Windows 10 Enterprise 22H2 19045.3803
        CPU: AuthenticAMD AMD Ryzen 5 5600X 6-Core Processor             
        GPU #1: NVIDIA GeForce RTX 4070
        GPU #2: Microsoft Basic Render Driver
        RAM: 13.79 GiB/15.92 GiB
        PAGE FILE: 21.75 GiB/24.67 GiB
    PROBABLE CALL STACK:
        [0] 0x7FFA2FBB2AC7 Starfield-Silent-Voice.dll+0022AC7 
            movzx edi,byte ptr [rax+0E8h]
    REGISTERS:
        RAX 0x0                (size_t)
        RBX 0xB08AEFEE90       (char*) "Data\\Sound\\Voice\\Starfield.esm\\AnnouncerFUCSystemVoice\\008380A7.wem"
        RCX 0xFFFFFFEE         (size_t)
        RDX 0x7FF7BABDEC30     (void* -> Starfield.exe+498EC30)
            and byte ptr [rsp+5],0
        RSI 0x2166380E930      (TESTopicInfo*)
        RDI 0x0                (size_t)
        RBP 0xB08AEFEDA9       (void*)
        RSP 0xB08AEFED10       (void*)
        R8  0xF                (size_t)
        R9  0x0                (size_t)
        R10 0x7FF7B6250000     (void* -> Starfield.exe+0000000)
            pop r10
        R11 0xB08AEFECA0       (void*)
        R12 0x0                (size_t)
        R13 0x2163379F2C0      (TESObjectREFR*)
        R14 0x21665782E00      (void*)
        R15 0xFFFFFFFF         (size_t)
    STACK:
        [RSP+0   ] 0xB08AEFEE90       (char*) "Data\\Sound\\Voice\\Starfield.esm\\AnnouncerFUCSystemVoice\\008380A7.wem"
        [RSP+8   ] 0x33BCC            (size_t)
        [RSP+10  ] 0x2166380E930      (TESTopicInfo*)
        [RSP+18  ] 0x0                (size_t)
        [RSP+20  ] 0x0                (size_t)
        [RSP+28  ] 0x2163C266410      (BGSVoiceType*)
        [RSP+30  ] 0x0                (size_t)
        [RSP+38  ] 0x7FF7BA61E16C     (char*) "%08X"
        [RSP+40  ] 0xB08AEFEE90       (char*) "Data\\Sound\\Voice\\Starfield.esm\\AnnouncerFUCSystemVoice\\008380A7.wem"
        [RSP+48  ] 0xB08AEFEDF0       (void*)
        [RSP+50  ] 0xB08AEFEE10       (char*) "008380A7"
        [RSP+58  ] 0x7FF7B67FE03E     (void* -> Starfield.exe+05AE03E)
            mov rbx,[rsp+40h]
        [RSP+60  ] 0x36               (size_t)
        [RSP+68  ] 0x7FF7B67F398E     (void* -> Starfield.exe+05A398E)
            xor eax,eax
        [RSP+70  ] 0xB08AEFEE90       (char*) "Data\\Sound\\Voice\\Starfield.esm\\AnnouncerFUCSystemVoice\\008380A7.wem"
        [RSP+78  ] 0x2163C269CF8      (char*) "AnnouncerFUCSystemVoice"
        [RSP+80  ] 0x0                (size_t)
        [RSP+88  ] 0xB08AEFEDF0       (void*)
        [RSP+90  ] 0x43               (size_t)
        [RSP+98  ] 0x7FF7B74CD722     (void* -> Starfield.exe+127D722)
            mov rsi,[rsp+38h]
        [RSP+A0  ] 0xB08AEFEE90       (char*) "Data\\Sound\\Voice\\Starfield.esm\\AnnouncerFUCSystemVoice\\008380A7.wem"
        [RSP+A8  ] 0x7FF7BA6C5520     (char*) "wem"
        [RSP+B0  ] 0x2166380E930      (TESTopicInfo*)
        [RSP+B8  ] 0x7FF7B6A87A4C     (void* -> Starfield.exe+0837A4C)
            mov rsi,rax
        [RSP+C0  ] 0x6BF6A7426BDD     (size_t)
        [RSP+C8  ] 0x7FF7B7DCD36E     (void* -> Starfield.exe+1B7D36E)
            jmp short 5
        [RSP+D0  ] 0x2163C266410      (BGSVoiceType*)
        [RSP+D8  ] 0x0                (size_t)
        [RSP+E0  ] 0x2166380E930      (TESTopicInfo*)
        [RSP+E8  ] 0x21665782E00      (void*)
        [RSP+F0  ] 0x21656812168      (char*) "\x10\x0eqc\x16\x02"
        [RSP+F8  ] 0x7FF7B624002A     (void*)
            add rsp,20h
        [RSP+100 ] 0x3741303833383030 (size_t)
        [RSP+108 ] 0x7FF7B7DD5600     (void* -> Starfield.exe+1B85600)
            adc [rax-75h],ecx
        [RSP+110 ] 0x21663800008      (void*)
        [RSP+118 ] 0x7FF7BB7F3988     (void* -> Starfield.exe+55A3988)
            add [rax],al
        [RSP+120 ] 0x7FFAAE2213AF     (void* -> VCRUNTIME140.dll+00013AF)
            movzx ecx,word ptr [rdx]
        [RSP+128 ] 0x6D               (size_t)
        [RSP+130 ] 0xB08AEFEE90       (char*) "Data\\Sound\\Voice\\Starfield.esm\\AnnouncerFUCSystemVoice\\008380A7.wem"
        [RSP+138 ] 0xB08AEFEE90       (char*) "Data\\Sound\\Voice\\Starfield.esm\\AnnouncerFUCSystemVoice\\008380A7.wem"
        [RSP+140 ] 0x21665782E00      (void*)
        [RSP+148 ] 0x21656812168      (char*) "\x10\x0eqc\x16\x02"
        [RSP+150 ] 0x1                (size_t)
        [RSP+158 ] 0xADE70            (size_t)
        [RSP+160 ] 0x7FF7BA6C5520     (char*) "wem"
        [RSP+168 ] 0x7FF7B67E1362     (void* -> Starfield.exe+0591362)
            test eax,0FFFh
        [RSP+170 ] 0x7FF7BB7F3434     (void* -> Starfield.exe+55A3434)
            add [rax],al
        [RSP+178 ] 0x7FF7B67C5893     (void* -> Starfield.exe+0575893)
            test al,al
        [RSP+180 ] 0x756F535C61746144 (size_t)
        [RSP+188 ] 0x6563696F565C646E (size_t)
        [RSP+190 ] 0x656966726174535C (size_t)
        [RSP+198 ] 0x415C6D73652E646C (size_t)
        [RSP+1A0 ] 0x7265636E756F6E6E (size_t)
        [RSP+1A8 ] 0x6574737953435546 (size_t)
        [RSP+1B0 ] 0x305C6563696F566D (size_t)
        [RSP+1B8 ] 0x2E37413038333830 (size_t)
        [RSP+1C0 ] 0x216006D6577      (char*) "sh"
        [RSP+1C8 ] 0x7FF7B7DCE0EF     (void* -> Starfield.exe+1B7E0EF)
            cmp rax,[3A25369h]
        [RSP+1D0 ] 0x6A               (size_t)
        [RSP+1D8 ] 0x7FF7B6A87401     (void* -> Starfield.exe+0837401)
            add rsp,28h
        [RSP+1E0 ] 0xB08AEFEF40       (void*)
        [RSP+1E8 ] 0x7FF7BB7F3470     (void* -> Starfield.exe+55A3470)
            add [rax],al
        [RSP+1F0 ] 0x21656812168      (char*) "\x10\x0eqc\x16\x02"
        [RSP+1F8 ] 0x7FF7B8EEF215     (void* -> Starfield.exe+2C9F215)
            mov rsi,rax
        [RSP+200 ] 0x21656812168      (char*) "\x10\x0eqc\x16\x02"
        [RSP+208 ] 0x7FF7B7DCCCCF     (void* -> Starfield.exe+1B7CCCF)
            mov rbx,[rsp+58h]
        [RSP+210 ] 0x6A               (size_t)
        [RSP+218 ] 0x21663808730      (char*) "\x10\x0eqc\x16\x02"
        [RSP+220 ] 0x0                (size_t)
        [RSP+228 ] 0x20D8E495A60      (void*)
        [RSP+230 ] 0x2166382E300      (void*)
        [RSP+238 ] 0x20DFC0B2110      (SharedHeapAllocator*)
        [RSP+240 ] 0x20DFE280080      (SharedHeapAllocator*)
        [RSP+248 ] 0x7FF7B6797DEB     (void* -> Starfield.exe+0547DEB)
            mov rbx,rax
        [RSP+250 ] 0x0                (size_t)
        [RSP+258 ] 0x0                (size_t)
        [RSP+260 ] 0x7FF7BB790D00     (char*) "\x01"
        [RSP+268 ] 0x80               (size_t)
        [RSP+270 ] 0xB08AEFF280       (void*)
        [RSP+278 ] 0x2163379F2C0      (TESObjectREFR*)
        [RSP+280 ] 0x4300000000       (size_t)
        [RSP+288 ] 0x7FF7B67FF756     (void* -> Starfield.exe+05AF756)
            xor r9d,r9d
        [RSP+290 ] 0xFFFFFFFF         (size_t)
        [RSP+298 ] 0xB08AEFF280       (void*)
        [RSP+2A0 ] 0x2166382E348      (TESTopic*)
        [RSP+2A8 ] 0x0                (size_t)
        [RSP+2B0 ] 0x21656812168      (char*) "\x10\x0eqc\x16\x02"
        [RSP+2B8 ] 0x7FF7B8559EA8     (void* -> Starfield.exe+2309EA8)
            mov rbp,rax
        [RSP+2C0 ] 0x21665782E00      (void*)
        [RSP+2C8 ] 0x2166380E930      (TESTopicInfo*)
        [RSP+2D0 ] 0xB08AEFF150       (void*)
        [RSP+2D8 ] 0xB08AEFF0B8       (void*)
        [RSP+2E0 ] 0xFFFFFFFF         (size_t)
        [RSP+2E8 ] 0xFFFFFFFF         (size_t)
        [RSP+2F0 ] 0x21656812168      (char*) "\x10\x0eqc\x16\x02"
        [RSP+2F8 ] 0x0                (size_t)
        [RSP+300 ] 0x0                (size_t)
        [RSP+308 ] 0x0                (size_t)
        [RSP+310 ] 0x2166380E930      (TESTopicInfo*)
        [RSP+318 ] 0x0                (size_t)
        [RSP+320 ] 0x2163379F2C0      (TESObjectREFR*)
        [RSP+328 ] 0x0                (size_t)
        [RSP+330 ] 0xB08AEFF150       (void*)
        [RSP+338 ] 0x7FF7B7DD14FB     (void* -> Starfield.exe+1B814FB)
            mov r8,rax
        [RSP+340 ] 0xB08AEFF0B8       (void*)
        [RSP+348 ] 0x2                (size_t)
        [RSP+350 ] 0x21665782E00      (void*)
        [RSP+358 ] 0x100000001        (size_t)
        [RSP+360 ] 0x2163379F2C0      (TESObjectREFR*)
        [RSP+368 ] 0xFFFF             (size_t)
        [RSP+370 ] 0xFFFFFFFF         (size_t)
        [RSP+378 ] 0x100000001        (size_t)
        [RSP+380 ] 0x100000000        (size_t)
        [RSP+388 ] 0x100000001        (size_t)
        [RSP+390 ] 0x100000001        (size_t)
        [RSP+398 ] 0x100000001        (size_t)
        [RSP+3A0 ] 0x100000002        (size_t)
        [RSP+3A8 ] 0x0                (size_t)
        [RSP+3B0 ] 0x0                (size_t)
        [RSP+3B8 ] 0x2166380E930      (TESTopicInfo*)
        [RSP+3C0 ] 0x2166382E348      (TESTopic*)
        [RSP+3C8 ] 0x211FEA49F90      (TESQuest*)
        [RSP+3D0 ] 0xFFFFFFFF0003C933 (size_t)
        [RSP+3D8 ] 0x100000000        (size_t)
        [RSP+3E0 ] 0x100000001        (size_t)
        [RSP+3E8 ] 0x100000001        (size_t)
        [RSP+3F0 ] 0x100000001        (size_t)
        [RSP+3F8 ] 0x100000001        (size_t)
        [RSP+400 ] 0x20E5D7F2FA0      (bhkCharRigidBodyController*)
        [RSP+408 ] 0x7FF7B8F8AB42     (void* -> Starfield.exe+2D3AB42)
            mov ecx,[rax]
        [RSP+410 ] 0xB08AEFF1B0       (void*)
        [RSP+418 ] 0x20E5D7F2F01      (void*)
        [RSP+420 ] 0x20D967D14C0      (void*)
        [RSP+428 ] 0x7FF7B8F8AB0D     (void* -> Starfield.exe+2D3AB0D)
            mov rax,rbx
        [RSP+430 ] 0x0                (size_t)
        [RSP+438 ] 0x20E5D7F2FA0      (bhkCharRigidBodyController*)
        [RSP+440 ] 0x1010013C0        (size_t)
        [RSP+448 ] 0x100000001        (size_t)
        [RSP+450 ] 0x20D967D14C0      (void*)
        [RSP+458 ] 0x7FF7B8F8AB0D     (void* -> Starfield.exe+2D3AB0D)
            mov rax,rbx
        [RSP+460 ] 0x0                (size_t)
        [RSP+468 ] 0x20E5D7F2FA0      (bhkCharRigidBodyController*)
        [RSP+470 ] 0x1010013C0        (size_t)
        [RSP+478 ] 0x0                (size_t)
        [RSP+480 ] 0x0                (size_t)
        [RSP+488 ] 0x100000002        (size_t)
        [RSP+490 ] 0x20E5D7F2FA0      (bhkCharRigidBodyController*)
        [RSP+498 ] 0x7FF7B8F8AB42     (void* -> Starfield.exe+2D3AB42)
            mov ecx,[rax]
        [RSP+4A0 ] 0xB08AEFF240       (void*)
        [RSP+4A8 ] 0x20E5D7F2FA0      (bhkCharRigidBodyController*)
        [RSP+4B0 ] 0x20D967D14C0      (void*)
        [RSP+4B8 ] 0x7FF7B8F8AB0D     (void* -> Starfield.exe+2D3AB0D)
            mov rax,rbx
        [RSP+4C0 ] 0x2163D3E4000      (hknpBSWorld*)
        [RSP+4C8 ] 0x7FF7B8F8AB42     (void* -> Starfield.exe+2D3AB42)
            mov ecx,[rax]
        [RSP+4D0 ] 0xB08AEFF640       (void*)
        [RSP+4D8 ] 0x20E5D7F2FA0      (bhkCharRigidBodyController*)
        [RSP+4E0 ] 0x0                (size_t)
        [RSP+4E8 ] 0x2                (size_t)
        [RSP+4F0 ] 0x0                (size_t)
        [RSP+4F8 ] 0x0                (size_t)
        [RSP+500 ] 0x0                (size_t)
        [RSP+508 ] 0x2163379F2C0      (TESObjectREFR*)
        [RSP+510 ] 0xB08AEFF3D0       (void*)
        [RSP+518 ] 0x7FF7B7DD0823     (void* -> Starfield.exe+1B80823)
            test al,al
        [RSP+520 ] 0x2166382E348      (TESTopic*)
        [RSP+528 ] 0x2163379F2C0      (TESObjectREFR*)
        [RSP+530 ] 0x0                (size_t)
        [RSP+538 ] 0x215FFAC8F88      (void*)
        [RSP+540 ] 0x0                (size_t)
        [RSP+548 ] 0x0                (size_t)
        [RSP+550 ] 0x0                (size_t)
        [RSP+558 ] 0x7FF7B6AAFFFF     (void* -> Starfield.exe+085FFFF)
            cmp r9d,1
        [RSP+560 ] 0x1FFFFFFFF        (size_t)
        [RSP+568 ] 0x100000001        (size_t)
        [RSP+570 ] 0x0                (size_t)
        [RSP+578 ] 0x0                (size_t)
        [RSP+580 ] 0x0                (size_t)
        [RSP+588 ] 0x0                (size_t)
        [RSP+590 ] 0x0                (size_t)
        [RSP+598 ] 0xFFFFFFFF00000000 (size_t)
        [RSP+5A0 ] 0x0                (size_t)
        [RSP+5A8 ] 0x2163379F2C0      (TESObjectREFR*)
        [RSP+5B0 ] 0x0                (size_t)
        [RSP+5B8 ] 0x7FF7B7C78BCF     (void* -> Starfield.exe+1A28BCF)
            mov r14,rax
        [RSP+5C0 ] 0x2166382E348      (TESTopic*)
        [RSP+5C8 ] 0x2166382E348      (TESTopic*)
        [RSP+5D0 ] 0x40AFEB0442730753 (size_t)
        [RSP+5D8 ] 0x216C01FDC56      (void*)
        [RSP+5E0 ] 0x0                (size_t)
        [RSP+5E8 ] 0x7FF7B7C5B726     (void* -> Starfield.exe+1A0B726)
            mov al,bl
        [RSP+5F0 ] 0x2163379FFFF      (void*)
        [RSP+5F8 ] 0xFFFFFFFF         (size_t)
        [RSP+600 ] 0xB08AEFF360       (void*)
        [RSP+608 ] 0xB08AEFF3B8       (void*)
        [RSP+610 ] 0x0                (size_t)
        [RSP+618 ] 0x7FF700000000     (size_t)
        [RSP+620 ] 0x40AFEB0442730753 (size_t)
        [RSP+628 ] 0x7FF7C01FDC56     (size_t)
        [RSP+630 ] 0x3                (size_t)
        [RSP+638 ] 0x7FF7B9006CEF     (void* -> Starfield.exe+2DB6CEF)
            mov rsi,rax
        [RSP+640 ] 0x215FFADBDB8      (void*)
        [RSP+648 ] 0xB08AEFF3B8       (void*)
        [RSP+650 ] 0xB08AEFF400       (void*)
        [RSP+658 ] 0x7FF7BDCE9940     (BSComponentDB2::DB*)
        [RSP+660 ] 0x21633795AE8      (TESObjectCELL*)
        [RSP+668 ] 0x7FF7B81FF459     (void* -> Starfield.exe+1FAF459)
            nop
        [RSP+670 ] 0xB08AEFF438       (void*)
        [RSP+678 ] 0x2160BD1F1E0      (void*)
        [RSP+680 ] 0x7FF7BDCE9940     (BSComponentDB2::DB*)
        [RSP+688 ] 0x215FFADBDA8      (BSComponentDB2::Memory::ConcurrentPageAllocImpl*)
        [RSP+690 ] 0x215FFADBDA8      (BSComponentDB2::Memory::ConcurrentPageAllocImpl*)
        [RSP+698 ] 0x7FF7B751D71D     (void* -> Starfield.exe+12CD71D)
            jmp short 6
        [RSP+6A0 ] 0x216468A12C8      (void*)
        [RSP+6A8 ] 0x7FF7B67E1362     (void* -> Starfield.exe+0591362)
            test eax,0FFFh
        [RSP+6B0 ] 0xB08AEFF490       (void*)
        [RSP+6B8 ] 0x7FF7B81FFD2B     (void* -> Starfield.exe+1FAFD2B)
            mov rbx,[rbp-38h]
        [RSP+6C0 ] 0x216468A12C8      (void*)
        [RSP+6C8 ] 0x7FF7B67C5893     (void* -> Starfield.exe+0575893)
            test al,al
        [RSP+6D0 ] 0x80000000         (size_t)
        [RSP+6D8 ] 0x7FF7B6A87401     (void* -> Starfield.exe+0837401)
            add rsp,28h
        [RSP+6E0 ] 0x216337900C4      (void*)
        [RSP+6E8 ] 0x7FF7B8EEB782     (void* -> Starfield.exe+2C9B782)
            mov edx,eax
        [RSP+6F0 ] 0x0                (size_t)
        [RSP+6F8 ] 0x0                (size_t)
        [RSP+700 ] 0x2                (size_t)
        [RSP+708 ] 0x7FF7B85CA7D0     (void* -> Starfield.exe+237A7D0)
            nop
        [RSP+710 ] 0x216337900A0      (char*) "\x01"
        [RSP+718 ] 0x7FF7B6AA2019     (void* -> Starfield.exe+0852019)
            add rsp,28h
        [RSP+720 ] 0x20E04C02580      (char*) "\x02"
        [RSP+728 ] 0x216468A12C0      (char*) "\x01"
        [RSP+730 ] 0x0                (size_t)
        [RSP+738 ] 0x7FF7B76FEFFE     (void* -> Starfield.exe+14AEFFE)
            test al,al
        [RSP+740 ] 0xB08AEFF4B0       (void*)
        [RSP+748 ] 0x7FF7B7C5E400     (void* -> Starfield.exe+1A0E400)
            mov rbx,[rsp+38h]
        [RSP+750 ] 0x0                (size_t)
        [RSP+758 ] 0x0                (size_t)
        [RSP+760 ] 0x0                (size_t)
        [RSP+768 ] 0x2166382E348      (TESTopic*)
        [RSP+770 ] 0x0                (size_t)
        [RSP+778 ] 0x2163379F2C0      (TESObjectREFR*)
        [RSP+780 ] 0xB08AEFF519       (void*)
        [RSP+788 ] 0x7FF7B7C74AFE     (void* -> Starfield.exe+1A24AFE)
            mov dil,[rbp-29h]
        [RSP+790 ] 0x2163379F2C0      (TESObjectREFR*)
        [RSP+798 ] 0xB08AEFF4F0       (void*)
        [RSP+7A0 ] 0x0                (size_t)
        [RSP+7A8 ] 0x0                (size_t)
        [RSP+7B0 ] 0x0                (size_t)
        [RSP+7B8 ] 0x0                (size_t)
        [RSP+7C0 ] 0x2163379F2C0      (TESObjectREFR*)
        [RSP+7C8 ] 0x0                (size_t)
        [RSP+7D0 ] 0x7FF7BA5F3288     (void* -> Starfield.exe+43A3288)
            jo short 000000000000001Bh
        [RSP+7D8 ] 0xB08AEFF508       (void*)
        [RSP+7E0 ] 0x0                (size_t)
        [RSP+7E8 ] 0x7FF7B67C5893     (void* -> Starfield.exe+0575893)
            test al,al
        [RSP+7F0 ] 0x0                (size_t)
        [RSP+7F8 ] 0x7FF7B6A87401     (void* -> Starfield.exe+0837401)
            add rsp,28h
        [RSP+800 ] 0xB08AEFF580       (void*)
        [RSP+808 ] 0x7FF7B768937F     (void* -> Starfield.exe+143937F)
            mov rbx,[rsp+58h]
        [RSP+810 ] 0x2166384CDE8      (void*)
        [RSP+818 ] 0x7FF7B7C74DD4     (void* -> Starfield.exe+1A24DD4)
            cmp rbx,rdi
        [RSP+820 ] 0x2166384CD6B      (void*)
        [RSP+828 ] 0x7FF7B767E703     (void* -> Starfield.exe+142E703)
            mov al,bl
        [RSP+830 ] 0x0                (size_t)
        [RSP+838 ] 0x0                (size_t)
        [RSP+840 ] 0x0                (size_t)
        [RSP+848 ] 0x0                (size_t)
        [RSP+850 ] 0xB08AEFF5F9       (void*)
        [RSP+858 ] 0x7FF7B7D64CC7     (void* -> Starfield.exe+1B14CC7)
            mov rax,[rdi]
        [RSP+860 ] 0x2166384CDE8      (void*)
        [RSP+868 ] 0x21663826DD0      (BGSScene*)
        [RSP+870 ] 0x2166384CDC8      (BGSSceneActionDialogue*)
        [RSP+878 ] 0x21663826DD0      (BGSScene*)
        [RSP+880 ] 0x2163379F2C0      (TESObjectREFR*)
        [RSP+888 ] 0x0                (size_t)
        [RSP+890 ] 0x7FF7BBCC5FC0     (void* -> Starfield.exe+5A75FC0)
            add [rax+25h],bl
        [RSP+898 ] 0x1                (size_t)
        [RSP+8A0 ] 0x0                (size_t)
        [RSP+8A8 ] 0x7FF7B74A6275     (void* -> Starfield.exe+1256275)
            mov rdx,[rsp+40h]
        [RSP+8B0 ] 0x216337900C4      (void*)
        [RSP+8B8 ] 0x2163379F2C0      (TESObjectREFR*)
        [RSP+8C0 ] 0x0                (size_t)
        [RSP+8C8 ] 0x0                (size_t)
        [RSP+8D0 ] 0x211FEA49F90      (TESQuest*)
        [RSP+8D8 ] 0x0                (size_t)
        [RSP+8E0 ] 0x0                (size_t)
        [RSP+8E8 ] 0x7FF7B6AA2019     (void* -> Starfield.exe+0852019)
            add rsp,28h
        [RSP+8F0 ] 0x0                (size_t)
        [RSP+8F8 ] 0x0                (size_t)
        [RSP+900 ] 0x0                (size_t)
        [RSP+908 ] 0x0                (size_t)
        [RSP+910 ] 0x7FF7BBBC23C0     (UI*)
        [RSP+918 ] 0x0                (size_t)
        [RSP+920 ] 0x211FEA49F90      (TESQuest*)
        [RSP+928 ] 0x0                (size_t)
        [RSP+930 ] 0x2166384CDC8      (BGSSceneActionDialogue*)
        [RSP+938 ] 0xB08AEFF6C0       (void*)
        [RSP+940 ] 0x0                (size_t)
        [RSP+948 ] 0x7FF7B7D5DBA9     (void* -> Starfield.exe+1B0DBA9)
            mov rax,[rdi]
        [RSP+950 ] 0x21663826DD0      (BGSScene*)
        [RSP+958 ] 0x21663826DD0      (BGSScene*)
        [RSP+960 ] 0x0                (size_t)
        [RSP+968 ] 0x3C933            (size_t)
        [RSP+970 ] 0x21663826DD0      (BGSScene*)
        [RSP+978 ] 0x260              (size_t)
        [RSP+980 ] 0xB08AEFF6D0       (void*)
        [RSP+988 ] 0x7FF7B7D62CBC     (void* -> Starfield.exe+1B12CBC)
            cmp eax,1
        [RSP+990 ] 0x2166379C7C0      (void*)
        [RSP+998 ] 0x2160003C933      (char*) "t\x06\x14l@9"
        [RSP+9A0 ] 0x2163379F2C0      (TESObjectREFR*)
        [RSP+9A8 ] 0x260              (size_t)
        [RSP+9B0 ] 0x21663826DD0      (BGSScene*)
        [RSP+9B8 ] 0x20100000000      (size_t)
        [RSP+9C0 ] 0xB08AEFF789       (void*)
        [RSP+9C8 ] 0x7FF7B7D61AC7     (void* -> Starfield.exe+1B11AC7)
            mov eax,[rbx+48h]
        [RSP+9D0 ] 0x2166379C7C0      (void*)
        [RSP+9D8 ] 0x2166379C7C8      (void*)
        [RSP+9E0 ] 0x21663826DD0      (BGSScene*)
        [RSP+9E8 ] 0x21663828630      (void*)
        [RSP+9F0 ] 0x21663E4DC00      (void*)
        [RSP+9F8 ] 0x7FF7B7F297BB     (void* -> Starfield.exe+1CD97BB)
            add rdi,8
        [RSP+A00 ] 0x211FEA51B70      (void*)
        [RSP+A08 ] 0x21663E4DC90      (void*)
        [RSP+A10 ] 0x7FF7BBBE2F4C     (void* -> Starfield.exe+5992F4C)
            add [rax],al
        [RSP+A18 ] 0x260              (size_t)
        [RSP+A20 ] 0x21600017800      (void*)
        [RSP+A28 ] 0x0                (size_t)
        [RSP+A30 ] 0xB08AEFF7D0       (void*)
        [RSP+A38 ] 0x7FF7B93BB060     (void* -> Starfield.exe+316B060)
            vmovups xmm0,[rax]
        [RSP+A40 ] 0x0                (size_t)
        [RSP+A48 ] 0xB08AEFF878       (void*)
        [RSP+A50 ] 0x0                (size_t)
        [RSP+A58 ] 0x7FF7B93BAB15     (void* -> Starfield.exe+316AB15)
            inc dword ptr [rbx+8]
        [RSP+A60 ] 0xB08AEFF7C0       (void*)
        [RSP+A68 ] 0xB08AEFF800       (void*)
        [RSP+A70 ] 0x211FEA49F90      (TESQuest*)
        [RSP+A78 ] 0x211FEA51B68      (void*)
        [RSP+A80 ] 0x2165810CC88      (BSJobs2::Detail::ControlNodeJob*)
        [RSP+A88 ] 0x7FF7B93B9DDE     (void* -> Starfield.exe+3169DDE)
            mov [r14],rdi
        [RSP+A90 ] 0x2165810CC39      (void*)
        [RSP+A98 ] 0x2165810C248      (BSJobs2::Detail::TNodeJob<<lambda_a9ee20319e4bbe329d8ace8962c5824e> const &,TESQuest * const &>*)
        [RSP+AA0 ] 0x0                (size_t)
        [RSP+AA8 ] 0x0                (size_t)
        [RSP+AB0 ] 0x0                (size_t)
        [RSP+AB8 ] 0xB08AEFF920       (void*)
        [RSP+AC0 ] 0x20DFE28D5C0      (void*)
        [RSP+AC8 ] 0x20D8E498BF8      (stl::unique_function_impl::detail::TypeErasedFuncImpl<<lambda_8291e7d1e643b42ca1ce574da97d71a6>,void *>*)
        [RSP+AD0 ] 0xB08AEFF830       (void*)
        [RSP+AD8 ] 0x7FF7B7F2B493     (void* -> Starfield.exe+1CDB493)
            mov r13,[r15+10h]
        [RSP+AE0 ] 0x21663E4DC90      (void*)
        [RSP+AE8 ] 0x0                (size_t)
        [RSP+AF0 ] 0xBEE06A979        (size_t)
        [RSP+AF8 ] 0x21663826DD0      (BGSScene*)
        [RSP+B00 ] 0x20DFE28D5C0      (void*)
        [RSP+B08 ] 0x100000000        (size_t)
        [RSP+B10 ] 0x0                (size_t)
        [RSP+B18 ] 0x1E               (size_t)
        [RSP+B20 ] 0x0                (size_t)
        [RSP+B28 ] 0x0                (size_t)
        [RSP+B30 ] 0x0                (size_t)
        [RSP+B38 ] 0x0                (size_t)
        [RSP+B40 ] 0xB08AEFF920       (void*)
        [RSP+B48 ] 0x20DFE28D5C0      (void*)
        [RSP+B50 ] 0xBEE06A979        (size_t)
        [RSP+B58 ] 0x7FF7B93B99ED     (void* -> Starfield.exe+31699ED)
            mov rdx,rbx
        [RSP+B60 ] 0x20D8E498BF8      (stl::unique_function_impl::detail::TypeErasedFuncImpl<<lambda_8291e7d1e643b42ca1ce574da97d71a6>,void *>*)
        [RSP+B68 ] 0x7FF7BB3267C0     (char*) "\t"
        [RSP+B70 ] 0x0                (size_t)
        [RSP+B78 ] 0x20D8E498BF8      (stl::unique_function_impl::detail::TypeErasedFuncImpl<<lambda_8291e7d1e643b42ca1ce574da97d71a6>,void *>*)
        [RSP+B80 ] 0x7FF7BDEFA900     (char*) "\x03\x13\x01"
        [RSP+B88 ] 0x7FF7B93BA649     (void* -> Starfield.exe+316A649)
            jmp short 0000000000000078h
        [RSP+B90 ] 0x0                (size_t)
        [RSP+B98 ] 0x2165810C249      (void*)
        [RSP+BA0 ] 0xBEE06A979        (size_t)
        [RSP+BA8 ] 0x20DFE28D5C0      (void*)
        [RSP+BB0 ] 0x7FF7BA821D00     (void* -> Starfield.exe+45D1D00)
            in al,dx
        [RSP+BB8 ] 0x20DFE28DB28      (BSJobs2::Detail::GroupThread*)
        [RSP+BC0 ] 0x2165810C249      (void*)
        [RSP+BC8 ] 0x2                (size_t)
        [RSP+BD0 ] 0x0                (size_t)
        [RSP+BD8 ] 0x20DFE28DB28      (BSJobs2::Detail::GroupThread*)
        [RSP+BE0 ] 0x7FF7BA821D20     (void* -> Starfield.exe+45D1D20)
        [RSP+BE8 ] 0x0                (size_t)
        [RSP+BF0 ] 0x7FF7BBC0ECC0     (BSFixedSizeBlockAllocator::TAlloc<4294967296,16777216,128>*)
        [RSP+BF8 ] 0x7FF7B93B8760     (void* -> Starfield.exe+3168760)
            mov ecx,[240C154h]
        [RSP+C00 ] 0xBEE06A979        (size_t)
        [RSP+C08 ] 0x0                (size_t)
        [RSP+C10 ] 0x2165810C249      (void*)
        [RSP+C18 ] 0x1                (size_t)
        [RSP+C20 ] 0x0                (size_t)
        [RSP+C28 ] 0x7FF7B93BABFE     (void* -> Starfield.exe+316ABFE)
            xor eax,eax
        [RSP+C30 ] 0x0                (size_t)
        [RSP+C38 ] 0x0                (size_t)
        [RSP+C40 ] 0x20DFE28DB28      (BSJobs2::Detail::GroupThread*)
        [RSP+C48 ] 0x7FF7BA821D20     (void* -> Starfield.exe+45D1D20)
        [RSP+C50 ] 0x20DFE28DB28      (BSJobs2::Detail::GroupThread*)
        [RSP+C58 ] 0x7FF7B8EEDA71     (void* -> Starfield.exe+2C9DA71)
            mov rcx,[2CF2DEFh]
        [RSP+C60 ] 0x7FF7BBC0ECC0     (BSFixedSizeBlockAllocator::TAlloc<4294967296,16777216,128>*)
        [RSP+C68 ] 0x7FF7BA821D20     (void* -> Starfield.exe+45D1D20)
        [RSP+C70 ] 0x0                (size_t)
        [RSP+C78 ] 0x7FF7BDCD45C8     (BSThreadEvent::`anonymous namespace'::Source*)
        [RSP+C80 ] 0x20DFE28DB28      (BSJobs2::Detail::GroupThread*)
        [RSP+C88 ] 0x0                (size_t)
        [RSP+C90 ] 0x0                (size_t)
        [RSP+C98 ] 0x0                (size_t)
        [RSP+CA0 ] 0x7FF7BA821D20     (void* -> Starfield.exe+45D1D20)
        [RSP+CA8 ] 0xB08AEFF990       (void*)
        [RSP+CB0 ] 0x7FF7BDCD45C8     (BSThreadEvent::`anonymous namespace'::Source*)
        [RSP+CB8 ] 0x0                (size_t)
        [RSP+CC0 ] 0x0                (size_t)
        [RSP+CC8 ] 0x0                (size_t)
        [RSP+CD0 ] 0x0                (size_t)
        [RSP+CD8 ] 0x7FFABED47344     (void* -> KERNEL32.DLL+0017344)
            mov ecx,eax
        [RSP+CE0 ] 0x0                (size_t)
        [RSP+CE8 ] 0x0                (size_t)
        [RSP+CF0 ] 0x0                (size_t)
        [RSP+CF8 ] 0x0                (size_t)
        [RSP+D00 ] 0x0                (size_t)
        [RSP+D08 ] 0x7FFAC04426B1     (void* -> ntdll.dll+00526B1)
            jmp short 0000000000000022h
        [RSP+D10 ] 0x0                (size_t)
        [RSP+D18 ] 0x0                (size_t)
        [RSP+D20 ] 0x0                (size_t)
        [RSP+D28 ] 0x0                (size_t)
        [RSP+D30 ] 0x0                (size_t)
        [RSP+D38 ] 0x0                (size_t)
        [RSP+D40 ] 0xAD609BD500000000 (size_t)
        [RSP+D48 ] 0x0                (size_t)
        [RSP+D50 ] 0x0                (size_t)
        [RSP+D58 ] 0x7FFABDBFDE30     (void* -> KERNELBASE.dll+012DE30)
            mov [rsp+10h],rbx
        [RSP+D60 ] 0xB08AEFDE80       (void*)
        [RSP+D68 ] 0xFA2F280003FFD086 (size_t)
        [RSP+D70 ] 0x7FFA10DF45E5     (size_t)
        [RSP+D78 ] 0xB08AEFDE80       (void*)
        [RSP+D80 ] 0x0                (size_t)
        [RSP+D88 ] 0x0                (size_t)
        [RSP+D90 ] 0x0                (size_t)
        [RSP+D98 ] 0x0                (size_t)
        [RSP+DA0 ] 0x0                (size_t)
        [RSP+DA8 ] 0x0                (size_t)
        [RSP+DB0 ] 0x0                (size_t)
        [RSP+DB8 ] 0x0                (size_t)
        [RSP+DC0 ] 0x0                (size_t)
        [RSP+DC8 ] 0x0                (size_t)
        [RSP+DD0 ] 0x0                (size_t)
        [RSP+DD8 ] 0x0                (size_t)
        [RSP+DE0 ] 0x0                (size_t)
        [RSP+DE8 ] 0x0                (size_t)
        [RSP+DF0 ] 0x0                (size_t)
        [RSP+DF8 ] 0x0                (size_t)
        [RSP+E00 ] 0x0                (size_t)
        [RSP+E08 ] 0x0                (size_t)
        [RSP+E10 ] 0x0                (size_t)
        [RSP+E18 ] 0x0                (size_t)
        [RSP+E20 ] 0x0                (size_t)
        [RSP+E28 ] 0x0                (size_t)
        [RSP+E30 ] 0x0                (size_t)
        [RSP+E38 ] 0x0                (size_t)
        [RSP+E40 ] 0x0                (size_t)
        [RSP+E48 ] 0x0                (size_t)
        [RSP+E50 ] 0x0                (size_t)
        [RSP+E58 ] 0x0                (size_t)
        [RSP+E60 ] 0x0                (size_t)
        [RSP+E68 ] 0x0                (size_t)
        [RSP+E70 ] 0x0                (size_t)
        [RSP+E78 ] 0x0                (size_t)
        [RSP+E80 ] 0x0                (size_t)
        [RSP+E88 ] 0x0                (size_t)
        [RSP+E90 ] 0x0                (size_t)
        [RSP+E98 ] 0x0                (size_t)
        [RSP+EA0 ] 0x0                (size_t)
        [RSP+EA8 ] 0x0                (size_t)
        [RSP+EB0 ] 0x0                (size_t)
        [RSP+EB8 ] 0x0                (size_t)
        [RSP+EC0 ] 0x0                (size_t)
        [RSP+EC8 ] 0x0                (size_t)
        [RSP+ED0 ] 0x0                (size_t)
        [RSP+ED8 ] 0x0                (size_t)
        [RSP+EE0 ] 0x0                (size_t)
        [RSP+EE8 ] 0x0                (size_t)
        [RSP+EF0 ] 0x0                (size_t)
        [RSP+EF8 ] 0x0                (size_t)
        [RSP+F00 ] 0x0                (size_t)
        [RSP+F08 ] 0x0                (size_t)
        [RSP+F10 ] 0x0                (size_t)
        [RSP+F18 ] 0x0                (size_t)
        [RSP+F20 ] 0x0                (size_t)
        [RSP+F28 ] 0x0                (size_t)
        [RSP+F30 ] 0x0                (size_t)
        [RSP+F38 ] 0x0                (size_t)
        [RSP+F40 ] 0x0                (size_t)
        [RSP+F48 ] 0x0                (size_t)
        [RSP+F50 ] 0x0                (size_t)
        [RSP+F58 ] 0x0                (size_t)
        [RSP+F60 ] 0x0                (size_t)
        [RSP+F68 ] 0x0                (size_t)
        [RSP+F70 ] 0x0                (size_t)
        [RSP+F78 ] 0x0                (size_t)
        [RSP+F80 ] 0x0                (size_t)
        [RSP+F88 ] 0x0                (size_t)
        [RSP+F90 ] 0x0                (size_t)
        [RSP+F98 ] 0x0                (size_t)
        [RSP+FA0 ] 0x0                (size_t)
        [RSP+FA8 ] 0x0                (size_t)
        [RSP+FB0 ] 0x0                (size_t)
        [RSP+FB8 ] 0x0                (size_t)
        [RSP+FC0 ] 0x0                (size_t)
        [RSP+FC8 ] 0x0                (size_t)
        [RSP+FD0 ] 0x0                (size_t)
        [RSP+FD8 ] 0x0                (size_t)
        [RSP+FE0 ] 0x0                (size_t)
        [RSP+FE8 ] 0x0                (size_t)
        [RSP+FF0 ] 0x0                (size_t)
        [RSP+FF8 ] 0x0                (size_t)
        [RSP+1000] 0x0                (size_t)
        [RSP+1008] 0x0                (size_t)
        [RSP+1010] 0x0                (size_t)
        [RSP+1018] 0x0                (size_t)
        [RSP+1020] 0x0                (size_t)
        [RSP+1028] 0x0                (size_t)
        [RSP+1030] 0x0                (size_t)
        [RSP+1038] 0x0                (size_t)
        [RSP+1040] 0x0                (size_t)
        [RSP+1048] 0x0                (size_t)
        [RSP+1050] 0x0                (size_t)
        [RSP+1058] 0x0                (size_t)
        [RSP+1060] 0x0                (size_t)
        [RSP+1068] 0x0                (size_t)
        [RSP+1070] 0x0                (size_t)
        [RSP+1078] 0x0                (size_t)
        [RSP+1080] 0x0                (size_t)
        [RSP+1088] 0x0                (size_t)
        [RSP+1090] 0x0                (size_t)
        [RSP+1098] 0x0                (size_t)
        [RSP+10A0] 0x0                (size_t)
        [RSP+10A8] 0x0                (size_t)
        [RSP+10B0] 0x0                (size_t)
        [RSP+10B8] 0x0                (size_t)
        [RSP+10C0] 0x0                (size_t)
        [RSP+10C8] 0x0                (size_t)
        [RSP+10D0] 0x0                (size_t)
        [RSP+10D8] 0x0                (size_t)
        [RSP+10E0] 0x0                (size_t)
        [RSP+10E8] 0x0                (size_t)
        [RSP+10F0] 0x0                (size_t)
        [RSP+10F8] 0x0                (size_t)
        [RSP+1100] 0x0                (size_t)
        [RSP+1108] 0x0                (size_t)
        [RSP+1110] 0x0                (size_t)
        [RSP+1118] 0x0                (size_t)
        [RSP+1120] 0x0                (size_t)
        [RSP+1128] 0x0                (size_t)
        [RSP+1130] 0x0                (size_t)
        [RSP+1138] 0x0                (size_t)
        [RSP+1140] 0x0                (size_t)
        [RSP+1148] 0x0                (size_t)
        [RSP+1150] 0x0                (size_t)
        [RSP+1158] 0x0                (size_t)
        [RSP+1160] 0x0                (size_t)
        [RSP+1168] 0x0                (size_t)
        [RSP+1170] 0x0                (size_t)
        [RSP+1178] 0x0                (size_t)
        [RSP+1180] 0x0                (size_t)
        [RSP+1188] 0x0                (size_t)
        [RSP+1190] 0x0                (size_t)
        [RSP+1198] 0x0                (size_t)
        [RSP+11A0] 0x0                (size_t)
        [RSP+11A8] 0x0                (size_t)
        [RSP+11B0] 0x0                (size_t)
        [RSP+11B8] 0x0                (size_t)
        [RSP+11C0] 0x0                (size_t)
        [RSP+11C8] 0x0                (size_t)
        [RSP+11D0] 0x0                (size_t)
        [RSP+11D8] 0x0                (size_t)
        [RSP+11E0] 0x0                (size_t)
        [RSP+11E8] 0x0                (size_t)
        [RSP+11F0] 0x0                (size_t)
        [RSP+11F8] 0x0                (size_t)
        [RSP+1200] 0x0                (size_t)
        [RSP+1208] 0x0                (size_t)
        [RSP+1210] 0x0                (size_t)
        [RSP+1218] 0x0                (size_t)
        [RSP+1220] 0x0                (size_t)
        [RSP+1228] 0x0                (size_t)
        [RSP+1230] 0x0                (size_t)
        [RSP+1238] 0x0                (size_t)
        [RSP+1240] 0x0                (size_t)
        [RSP+1248] 0x0                (size_t)
        [RSP+1250] 0x0                (size_t)
        [RSP+1258] 0x0                (size_t)
        [RSP+1260] 0x0                (size_t)
        [RSP+1268] 0x0                (size_t)
        [RSP+1270] 0x0                (size_t)
        [RSP+1278] 0x0                (size_t)
        [RSP+1280] 0x0                (size_t)
        [RSP+1288] 0x0                (size_t)
        [RSP+1290] 0x0                (size_t)
        [RSP+1298] 0x0                (size_t)
        [RSP+12A0] 0x0                (size_t)
        [RSP+12A8] 0x0                (size_t)
        [RSP+12B0] 0x0                (size_t)
        [RSP+12B8] 0x0                (size_t)
        [RSP+12C0] 0x0                (size_t)
        [RSP+12C8] 0x0                (size_t)
        [RSP+12D0] 0x0                (size_t)
        [RSP+12D8] 0x0                (size_t)
        [RSP+12E0] 0x0                (size_t)
        [RSP+12E8] 0x0                (size_t)
    MODULES:
        _nvngx.dll
            Address: 0x7FFA2F3A0000
            SHA: 02BB26D4219C969936D58A320B5752CFB79B798091207DDEF914BB5F69F1922BA4B9EDEC78DD95086F936DC6E0A2E489365AF113CFA819FB6548E18F535D01E8
            Version: v31.0.15.4617
        ADVAPI32.dll
            Address: 0x7FFAC0290000
            SHA: A5C264F7F0DD55701FD9E892C5102531AC4B5A822E857B2EA3024C6FCFBA29C0B2DB35EA5CDE8C7A849F9997CC2149C2220F2FA2D3187BF0C4E951617C09DF2D
            Version: v10.0.19041.1
        amsi.dll
            Address: 0x7FFAB3EE0000
            SHA: 14EF622CA3E0EC21F97D764FAC70FD32BB2DDC3CB9BF9C0B4B3CB85F51082DC63F9059B3F915C16567E6D87AE46C8759E55037DE9F9FC98BC83FE721FEDC0D02
            Version: v10.0.19041.3636
        AUDIOSES.DLL
            Address: 0x7FFAA5C90000
            SHA: 0603AAFEE812C6BD1C269A7B8C7C7C757DF1484155369C4719BA6185F13FD95D44A0570ECBAE5A7AE216232C78C79DA0981153BBDDDF1A0FC765128CA2893038
            Version: v10.0.19041.1
        bcrypt.dll
            Address: 0x7FFABDE90000
            SHA: 056256298C8117FA61BC5802AF62514A2345EC43CEA58D5EEC9AEDCA61BA773C32B899C6ED934062D2A5D26672FCE3C4687FC55D617BD5197E82D6F0D8957CA1
            Version: v10.0.19041.1
        bcryptPrimitives.dll
            Address: 0x7FFABE080000
            SHA: 5E454772EB93E34A5F83BBBF07200B6D741AFEF84E49C1B3E9D9C42D9BE2A93458B7FE08277A5BAE59D1D8A33A13B41B23A5ED1A98DDE5F118CE91BC692555FC
            Version: v10.0.19041.3636
        BetterConsole.dll
            Address: 0x7FFA8A0D0000
            SHA: 562B5939A9F2C603E0F799A8F516ADD8A271EF2ADA4A9F3BE827F305D7D7E479D67368B9996CF8BE6E8A4B1B7E752ECC6CB8C1BAB1EDCF76F815DE0151133375
            Version: v1.2.11
        bink2w64.dll
            Address: 0x7FFAAF2B0000
            SHA: 61AB61B895332AE98F5491D07975E5D6A1E42747DE1AE292298CB008AB63AB410F8A7684DB7DDA694EBCC351783D68EDB167B4EEEAB74DBEC6C1BB238E62BEED
            Version: v2023.2.0
        CFGMGR32.dll
            Address: 0x7FFABDDD0000
            SHA: BD64CC7D22F54D81CFCB27412C6CE23B14FE8F727462B07613BAEBDECEB834754F084FA9B47A5A2DDB0EC11A19D35350CFCDA90BF7AD39A5DFC02A8B9BAA7746
            Version: v10.0.19041.3636
        clbcatq.dll
            Address: 0x7FFABFB60000
            SHA: AFA02856163C38761BE25B575403F125FA2D25A3FBA0B86B42E07B39DAFF09C35F462BA90BD40002A7EFB7EC2CCC2FC3B5127D3237DEADC0E0B6C000FB2B0ADA
            Version: v2001.12.10941.16384
        combase.dll
            Address: 0x7FFABF0C0000
            SHA: E46996CEB8466342FBA744254A1EA0E03138EB924BEAC56665440A3750B275C73390EC21A5EACF0CC4F923DB45B070DBBE1EAC82DDE66B2D4A175A6C91318FBB
            Version: v10.0.19041.3636
        CONCRT140.dll
            Address: 0x7FFAAF390000
            SHA: BBFFC87FB3405A90CAE2A696AF1B155254252E532628A979FA35279DEBFF8BC3D74C82986B388762A3E7AE990B08E351E9412B73A9B12233FBB44DE9AA06C4CE
            Version: v14.36.32532
        CoreMessaging.dll
            Address: 0x7FFABAE10000
            SHA: 8044FDD5353BED240BB887C4A99D35CB5C7BC39B242CD57E91E54E64DB6DDF0518A3D9EC582BB047700A0F1C679A3A0D55EE3273396F5E9336FDB6796AB7E07A
            Version: v10.0.19041.3636
        CoreUIComponents.dll
            Address: 0x7FFABAAB0000
            SHA: 4BA4C9EC65EA58150E531A91CD3B45D609B19982AE0C1099214575D946416BBB0243DE6196206D3B110B537CD008FC3AB9ABCBE456C4BF80A9DBA6841308D610
            Version: v10.0.19041.3636
        CRYPT32.dll
            Address: 0x7FFABE110000
            SHA: 9DE737F88BAE0E29F7712CB53D5BB043611051E7B0DCAB13FF9C0D79D53BA347D6A93E113894404EAB6D670E8D70CD783A63C80E436C57AA03324F5C4CE2A0B3
            Version: v10.0.19041.1
        CRYPTBASE.DLL
            Address: 0x7FFABD460000
            SHA: 4BCBB5E7E8C31A47DD110C0100288670C8C3664BC9B46373A2687289997D81E02807860E6B11177A3D781B40B9CE0EC2CA8AEA0E3D3928244AAE51047EC3745A
            Version: v10.0.19041.3636
        cryptnet.dll
            Address: 0x7FFAB7870000
            SHA: FB00453D0C8DF4BD73AD8EEABCFAD8DEDE0F29874EA7AEF75F8DDE355D0C0DDE0AD1ED477F09EBD8A88C72F47E9489E866DB4A895A75CE62348BF3CB2489AD4A
            Version: v10.0.19041.3636
        cryptsp.dll
            Address: 0x7FFABD470000
            SHA: 1DAF57F3550D1BDDB60972C63AF8AECE03E35118DDB7D747A104295106F82ABA67F4BF9F203E8FF65927982283BEC95B4215BFA0FBBEF3CC42DF0B3797E0CFAB
            Version: v10.0.19041.3636
        d3d11.dll
            Address: 0x7FFAB9AB0000
            SHA: F34CF0032B6238F792EA7224086CCC16D854BB37C1EE6104419A1A67AD055FB3D22C7E8CA173F65BD3B562A2F5B49639930BDBDFA02B627611189E17BF1E61D5
            Version: v10.0.19041.3636
        d3d11on12.dll
            Address: 0x7FFA2E9B0000
            SHA: E1EE5B6283479BE446CB473FAFF1EE6A93117FFB69C45A6C220497AA87B9E2DAFDD436B8DEDCF04E5A4A08C8061CF94377BEF9927D15480E848E926442BEAD08
            Version: v10.0.19041.3636
        d3d12.dll
            Address: 0x7FFAAF0F0000
            SHA: AD43A6D7FE6BC7CE5ACE8ED4BF916E85C88B69243396E0314D3A74762A5A780E8CE9C3933916360231BEE45BFC984096C2D8AAC2326A1F5EAB91CBCB5ADD2356
            Version: v10.0.19041.3636
        D3D12Core.dll
            Address: 0x7FFA2F540000
            SHA: B44437ED5E2BCC9ADF44E7458312C0EF0C7B6548231542F31664B9E51DB932DFD40C8F7D17470ED0DA938D73FEE5ADDBD6184B91A66BD0B8EEA0B206137A0388
            Version: v1.608.2
        D3DCOMPILER_47.dll
            Address: 0x7FFAB9650000
            SHA: 40EB4C7DE0A78C254FA79636F5D95CC62C78C03564ECFEC9A92A7222564C2CD5D14E7E3BFF0A84323533C72F706B7C7EE393D70AA4BC05EAEBF354AEFBB7D3B3
            Version: v10.0.19041.3636
        d3dcompiler_47_64.dll
            Address: 0x7FFA2EA50000
            SHA: 496BB9C840145F1FA797122795344183B38157E1E32750AFAD4A484799A77325CAD7EA26957A956DA50F2597B127CE0890E92B04EDBF62BEB02D0C9EAA3666CD
            Version: v6.3.9600.16384
        D3DSCache.dll
            Address: 0x020D8F660000
            SHA: A12F4D198088955DCC0C7AA7BBBF35B64B7A0F59E46C39993102B936633AB1A1CD5F55D897B405916F01ACD69EE4365416B8D1E6165317383ED23041D8E8864B
            Version: v10.0.19041.1
        dbgcore.DLL
            Address: 0x7FFAA5060000
            SHA: AAE04354115E3A2746A50567D4E7E23E51E05EDDB64C70E1C826965B9163149EACD5FDD9065A762B3B883051FD340A77279BCB4B6B01F385A0C0FE349158373B
            Version: v10.0.19041.3636
        dbghelp.dll
            Address: 0x7FFAB6560000
            SHA: A1B672B4964A5D511789E99FD3635BE69C1512065158F5F67D86244D39138299B77C9560985D0BBB84702FA97181C2D3B599BF64FB8225E1EFCF4B414763BE2A
            Version: v10.0.19041.3636
        dcomp.dll
            Address: 0x7FFABA440000
            SHA: 29705EB9D41083A1AFC36338E1EDC477FDBEB6C54BED4A71385A7A93DDA315ECD0BEB8FB9981956B87E6C86FFC051AFAE95F5280CAADC39F20184C1008D6A11B
            Version: v10.0.19041.3693
        DEF_TOLS.dll
            Address: 0x7FFAAF5A0000
            SHA: 796C765CB51F23A8DE24DEAD220AB71F622712C593710C7DC3981D84116B3198C5EE09D62700B8B6C66E6214E92815F1522A4DDE02A77247C67D0997D87886FF
        devobj.dll
            Address: 0x7FFABD860000
            SHA: 5148A9D0F496BC02B1F38D5FBC628A0CFA2529716AFCEC0552094C5DBED4C343082C9EA876EEDE8055140A47F5364B3FB6A97C1388B16086C94DC6F216FD1655
            Version: v10.0.19041.3636
        DEVRTL.dll
            Address: 0x7FFAB6820000
            SHA: C3981D698DC1F0784D97EE6B5D8D2792B6A2953078A772D4AF753C02652B8FF593FBFC5AC8C5D237A7874D8B66DBC92C1CAC4D23A2BDE5419A5F8DF753D146C4
            Version: v10.0.19041.3636
        dhcpcsvc.DLL
            Address: 0x7FFAB8500000
            SHA: 15ED6CAB586D1AFAB2C45F28AC377C5ABAFE6E982BED81899E4BE0805AF40C2477E6B90ADAFBE34F854AD208BCB441CD49BE71C7C8D65DFAE68E36984273F521
            Version: v10.0.19041.1
        dhcpcsvc6.DLL
            Address: 0x7FFAB8520000
            SHA: F8901FDE45B93D20EFAB9F340D85BB831F99A085BDF769E06808CD80C7BCCDF1E3BE660AA1089673215433211DA2B983A6B6F08BF4878E53B9D3953D1FCC2666
            Version: v10.0.19041.1
        DINPUT8.dll
            Address: 0x7FFA9B500000
            SHA: 8724CECA11C21C29E2BC3C7712E8228FF3C30E4C320C176830E8B9FE8B50A93B0FA72CB473EEA40913F1D85C432CA1C2BEAC9A0E761322B1A65B40BBE9FD490E
            Version: v10.0.19041.1
        DNSAPI.dll
            Address: 0x7FFABCF60000
            SHA: FD8B7979D2CEEAB9F1ED0F698AA43E637F730DCE5FD6F4E07D2F9EE6E35C1A22DC5C87DCF7B40EBA4BF864A8F5ACAF7A15B9281814E96CBC466204FCED716635
            Version: v10.0.19041.1
        DPAPI.DLL
            Address: 0x7FFABD8C0000
            SHA: D4B3849944B608E1C19EFA4D52DB38005EAF1C17441ED3A848D1F2C83F60EFEDCD83D283079C367103B58BA5C7029140015B0AD2414B53252D4210A13210D4EC
            Version: v10.0.19041.3636
        drvstore.dll
            Address: 0x7FFAB6870000
            SHA: 5019BA2FBA7B984C08CC60ADFA9ABBB3B59DCF67538975CC7BA31B4CC100267425C3D45F3EA91B840897F65810BFC6CD22B8B551B4747D692BAB89B69D314B8F
            Version: v10.0.19041.3636
        DSOUND.DLL
            Address: 0x7FFA50900000
            SHA: 8CB710F3694239ABE7794CC98DDD35646BEB646638D23A17075F84C08772FBDDC298FF100823CD955FCBCF64AFFD099494820D49462D4C192AEA1AB8EB85132C
            Version: v10.0.19041.1
        dwmapi.dll
            Address: 0x7FFABB6C0000
            SHA: 1E5207627B54C9453C6983FE5BCD5B91D125232E8E38E53FD75C7F84377F938DB607598179DC532156FC9845A5B3E36C2678C404923B0BCE4C08FB0C81087122
            Version: v10.0.19041.1
        dxcore.dll
            Address: 0x7FFAB6430000
            SHA: E30BA492F77530FC3E8A23A4047FAF32545E213C501BE03B5C5D13EB68214C24F753ECEFC20F0B8D4091CAE8C30921F51FF94D4451D351D564CB45FB406B1451
            Version: v10.0.19041.3636
        dxgi.dll
            Address: 0x7FFABC390000
            SHA: 6F5373ECFD8BC87F059601ACDD09A9DEFB1986375D17A5DD85188C44DCEADA5A7727A37AE4514FB1E4DFE9B53CC968599C2E2F28BE0B92E3F509D9A665999A71
            Version: v10.0.19041.3636
        dxilconv.dll
            Address: 0x7FFA1BA80000
            SHA: 5DD5A91D06AEE42FC5C734A5304560CB1A7FF934E323A70FC06B1F360D056548951F0800A6715D23C7CBB761886CFFC850E814F9EAC268B8FFA997CEC2FA4AD1
            Version: v10.0.19041.1
        fastprox.dll
            Address: 0x7FFAB4BC0000
            SHA: 9E5E9D44CFD301E4D82561C30427B8CD6B676E674DF478E205492FE47AD262D2920D05ACC239ECE31DD7AE04C1A50D3028A3F5D3CF524E3D41B9CB02AC471EE5
            Version: v10.0.19041.3636
        fwpuclnt.dll
            Address: 0x7FFAB5820000
            SHA: B3C7ACD07B0601D6A71D92EA8A64EA303A2125E9712F29945ECC0EC22BD30D3E9EEC7E50B6ADCF34555412FD70D792C5AEB0EA34E56F2FCA7EBD5EC7516BB962
            Version: v10.0.19041.3636
        GameOverlayRenderer64.dll
            Address: 0x7FFA9BC80000
            SHA: 14E7967CD8BF8DD89919BDACAAFF8934699630E2C5E1B64C6294171C0491916489666443082E12E509F4C4B73BAC7919C0F205CED8E54349CA6064EDFE85AA5D
            Version: v8.56.38.63
        GDI32.dll
            Address: 0x7FFABFD60000
            SHA: CA659EB220FAD80C50E3544BD614CBAA6B30F13D207543F9F99741891F1B6B945F96EB9901CF2F29AD346581C77862425937FF51BED94CE00BFF2A5FA197703D
            Version: v10.0.19041.3636
        gdi32full.dll
            Address: 0x7FFABDEC0000
            SHA: EF91E679FC18CD87E752AC2771A57547E18BB644E9E15BB64F378AC86A95B5D52C72960236B9ADB3743CC49EDD43DFB76FD3DBD772F118BFCE8AA988430A506E
            Version: v10.0.19041.3758
        gpapi.dll
            Address: 0x7FFABC360000
            SHA: D246998CF06DD50633997CDA0075F419A5D0290466876C29825BDD7FA1298319F434CA0DE5D9B36B0C744E235ACAF4254C8B905C9D5C6F4A2596DD664E3D8F07
            Version: v10.0.19041.1
        HID.DLL
            Address: 0x7FFABC350000
            SHA: 6269C673CC8F6763EF3D2ABA489C9BFCE1F5760F21408715AFE9F2CE23FEAE3124B568E0AA0ADDAABC43E624F9FC1E4DD9F7796135F6DC094B48BFDD810198D6
            Version: v10.0.19041.1
        iertutil.dll
            Address: 0x7FFAA61B0000
            SHA: 59F478CB77777D8A9A195FE42C9F3981E01AC5C65AB707E7A684BB617FF949A199E78C61C19F6F8D87B0EF144EC4B148D988943CFF59D650560D8601708EB25A
            Version: v11.0.19041.1
        imagehlp.dll
            Address: 0x7FFABFC70000
            SHA: F74688513B70E559316E4F583B36365126E5904C24EFF65B70C9AE2D86B43A5258E29732D7F00D758E2271DB283D549459180B26E90D3E552C264C9E9B681B5E
            Version: v10.0.19041.3636
        IMM32.dll
            Address: 0x7FFABFD30000
            SHA: 71D7DA8B5820EF6F84A8647B3D1D6246D0B48DF0290AD4710B102C67F510921553267E32BD44A0B90DE6C516654D75492EE2AB0685ADC0673E760306B225DC04
            Version: v10.0.19041.3636
        inputhost.dll
            Address: 0x7FFA9FA60000
            SHA: 8F36CA58CAA0ACA22136EFCC8C9B213DB4D299D3C10A71D3A08888B0D8C9467591201C6E9D414C4ECD5E28CB1063E8D43B4F3935FBB9F364546E428957465AAD
            Version: v10.0.19041.3636
        IPHLPAPI.DLL
            Address: 0x7FFABCF10000
            SHA: 5C89A265540E72183CAA65B245A846C2F958C07AC58A011FC3DDC640FBDF81C51BBEFFFF9FE3752B809EF5CC58692FC69ABDC2E0DDB2390EC8121D8133677664
            Version: v10.0.19041.1
        kernel.appcore.dll
            Address: 0x7FFABB9B0000
            SHA: 1913D97EDD8421A7985B131656AA1B3FE9CB629E0CD3D9BE31A3CE40788F59111C50EC3E80BF2A775D72690FC0142935D205DFB06538F0C7CB3D0193057F6662
            Version: v10.0.19041.3758
        KERNEL32.DLL
            Address: 0x7FFABED30000
            SHA: 3C621FD72E852535A5380731F2430853C583EA109428243CCA309D8BD5B612D3680F91FFD510C3C3985872A5B54B65906E5F2379ACB903BAC509520D00A0331E
            Version: v10.0.19041.3636
        KERNELBASE.dll
            Address: 0x7FFABDAD0000
            SHA: 788E37DDDD2AC09D199794C2D529B0BA67F8F5EE6B07F4A70240670ABA365CC61CEA12965A4458C2CE19E0EC27F1B6927EF3C779F252CEF012E874BA4905A64B
            Version: v10.0.19041.3636
        MessageBus.dll
            Address: 0x7FFAA4440000
            SHA: 0783076531BF04E0AA7E5DEBFC0D1403A7D8A05DBD7EF524CB3DF7BBAF6BD13CA611742BB229BA24103DC1147BA69A7E26FDC46F2BD64A159A328C8E6B20CDD8
        MessageBus.dll
            Address: 0x7FFAB4480000
            SHA: 55C9CE79C25662000DCB71C6AAA944C812E5F3B038214CAD4E070E5D09989FDFBF12DE63073A265D4A00AE587B03D4C2537832EAE66012482EC4AFF32D00206D
        MMDevApi.dll
            Address: 0x7FFAB53B0000
            SHA: EE35283CE08848C4619C4BE0AC7DD9603A302FB47E6738B52DCFE231C2E2BD83D0E71C765658D19081AE98CBD52C6CF399D7EB389B04E4392CE1A6B2FE8FECBC
            Version: v10.0.19041.1
        MpOav.dll
            Address: 0x7FFAB3E60000
            SHA: 7C6E03FFA78BDEF40FAAA7FC9C5132DF81A6EDB4F1278A2A5542A4EE8C5E4A46EE993C00E13D1904D083986705A6550B4555661D3DF24D83D0EC1AF5FBBE9813
            Version: v4.18.23110.3
        msasn1.dll
            Address: 0x7FFABD6A0000
            SHA: D81A60DA80E4499DD704C983A8AFB7DFDAAF821CF6B9C224AC92609344C8E310C206D18FE93D817362C5F625626F632A2C0B6999C8BD31A92BE3FC6221DEA7D4
            Version: v10.0.19041.3636
        MSCTF.dll
            Address: 0x7FFABEDF0000
            SHA: A5592184373E1240C1DBE4DF188C7C5B948F4FEBA7CECD107DE72FF83CAA30AE52D1AE16ACA6973BF3B46AEAEE05410937B5881AC7FE5A5A9C23BF4EE5E5FB92
            Version: v10.0.19041.1
        mskeyprotect.dll
            Address: 0x7FFAAD5A0000
            SHA: 1947763BCCA8B67BC315A51CD86E97893F9D1056E3FB3E15D1E912DF6E8D45D6C817C85EC38662E3D4BEC5DE5AA5AEF903C5928FEF55829CF44C57090F4E5F9D
            Version: v10.0.19041.1
        MSVCP140.dll
            Address: 0x7FFAAE240000
            SHA: 9887D9F5838AA1555EA87968E014EDFE2F7747F138F1B551D1F609BC1D5D8214A5FDAB0D76FCAC98864C1DA5EB81405CA373B2A30CB12203C011D89EA6D069AF
            Version: v14.36.32532
        msvcp_win.dll
            Address: 0x7FFABDFE0000
            SHA: 924022BB40C542A3FF0D09DA35B8156113A83336D57924888D921F070F6192D83FCEC6B89BDE89957731E55E41118CA2AFFEB5885541BD345DA7857996C22FD5
            Version: v10.0.19041.3636
        msvcrt.dll
            Address: 0x7FFABE4B0000
            SHA: DA3B0D985CB6E8D64176B8024EB783C276970AEE486D25CBC2468A781D51A455315840D6C9DA063C84C484DB7D7AD2994AF337C4A66160D6EB7B64E77041CEAD
            Version: v7.0.19041.3636
        MSWSOCK.dll
            Address: 0x7FFABD270000
            SHA: C55D28AE1299B467EE45496CE7631D72639048F9962A112A7BF8157A00F746BFC0CB9814E865ED16405F5D1729A7E1CDBD0B8C0037AF3B0B42A8B0B47801C97C
            Version: v10.0.19041.1
        napinsp.dll
            Address: 0x7FFA86380000
            SHA: 8383EDCB53E967759FE31A0BB053A2D2E8EDC7C4B6D8E73C839D3393741138EA1BB53D34CCE93265539B31CBDED01475A0FB9CA3A7D721A81DAFC4D50F89B85D
            Version: v10.0.19041.1
        NativeAnimationFrameworkSF.dll
            Address: 0x7FFA33980000
            SHA: 389F89DCEA90014753A384A3257EED5F380EA18B1207E1C722E7B67CB3D4BE9E22E28876E573D0233F00FBF2F4BBAD8ED879FA2E20BBB14A00980F7119E90F2C
            Version: v1.0.2
        ncrypt.dll
            Address: 0x7FFABD580000
            SHA: AA556623873FA76DD559786EDCD12ED2116E1E31EA1657B8E78B69AD1106A4DAB8B0181DC82BE3F0E804EC59A9D9BA3B653F8CB1E897E09946049B1681B036BA
            Version: v10.0.19041.1
        ncryptsslp.dll
            Address: 0x7FFAADA00000
            SHA: 785475254865E1D40DB78E36BF1083CCD253CF1BD45DDE258189907FE944F85E01533A271E5583C4BF9B3671F78CCCEE8B6957E0B8DDA4C6946910F7F0CD7257
            Version: v10.0.19041.3636
        netutils.dll
            Address: 0x7FFABCF50000
            SHA: 6B38B7BFD22A455C9B7E21ADEFCFE25E619E26BAD91FC1EA095B94CFB2BC9131AE3428498D13FBC885252998D7ADA4ED63CB084A1FD6F81A8B887E6143D2C2F1
            Version: v10.0.19041.3636
        NLAapi.dll
            Address: 0x7FFAB9490000
            SHA: 1BBCEF14A19A53A1198155919F802B548EA2C90C19904A6F005C4AA8B17A4676BD222486F255C19F37A5D6E0EBFF641E1B98E8B8369C790805541AA6D6224F6E
            Version: v10.0.19041.3636
        NSI.dll
            Address: 0x7FFABF4D0000
            SHA: AC76FFCAF5401343BD62D6FE32B675F0A38463D5362FF9D7C2AA9B061D8D2B29E3A6865272DB2BCD8C3405E6D927F0B58400FD238670F464059CA9274FE64CC6
            Version: v10.0.19041.3636
        NTASN1.dll
            Address: 0x7FFABD540000
            SHA: F3D13E43C01DB40AE0278AB78AA395EC4013E4BDE8C0EF1A28570E17FCAECB3FEC424135D3889762423D971FAA161074A4A378109961DC9D300F938B0F39772D
            Version: v10.0.19041.1
        ntdll.dll
            Address: 0x7FFAC03F0000
            SHA: CB30DD40C54E4277F012777D6A86E2B22749246887E2E32D93675136AEE2173B1B29A65E7287172EF5FC41903410D3580877F9B6F889707B186DF7F1C0F32D1C
            Version: v10.0.19041.3636
        ntmarta.dll
            Address: 0x7FFABCC50000
            SHA: 373EF3ACEB49B71CA4989E727ED938E54C6BB2060D133DA2EDAF7DD7ED3F9B2EA76BD0A8714D1C46372CD48B52C190055B68C8D1E65913CC834B87033BE59A06
            Version: v10.0.19041.1
        nvapi64.dll
            Address: 0x7FFAAC1A0000
            SHA: B78423ADCB3FC4720402D34109087E0E5AF534EA76FAE0D1B80F2CFBCA0347ACA0D75B6FA3AC9F1CD6AA6786930FD3A31692FDD7B8A29BFAFB0861CD687DA372
            Version: v31.0.15.4617
        NvCamera64.dll
            Address: 0x7FFA1D9B0000
            SHA: DF95866BACB23CC3E0B93D976896F77F07DB8CED5D2275ED9895CF7B90888DAA38504B0829B3AF65B7414D0CC7B0AAEAE4EB7C8C635151B4C4F86A879B7C5B20
            Version: v7.1.0
        nvcuda.dll
            Address: 0x7FFA2EEC0000
            SHA: 8FDF7A031EDF7ACC73D1C648BE96786A5A5E09F3818FDBBB51C26D4C427F9A22B11D8023EC634383E033D7A4FF150CD3F05F06E6653722123E932132F0D54E26
            Version: v31.0.15.4617
        nvcuda64.dll
            Address: 0x7FFA1D000000
            SHA: FAE0126EC0AE71DA06E87B5291C822AE65FFFB28F4905713CEDBFD465ECC487ACBDE3A96068B61BBC43760570965ACB884A4C7B93CEA284A9C71C37B041C3ABA
            Version: v31.0.15.4617
        nvgpucomp64.dll
            Address: 0x7FFAB0760000
            SHA: 81A6775A79C96135A938963EE3C42A42CF6E1D2E99BE7102A296D5B45DFCCFE9F594B617756218DF5A8335B04F96AABF54F72CEEE62FB63D6877FBFA7CC06FF9
            Version: v31.0.15.4617
        nvldumdx.dll
            Address: 0x7FFAB5690000
            SHA: BAED955D35F829879749667278EA950D5FBA9B2E2BF0AD5A26EC084EECDE44BE6423A22F0B3C71548F0977BE8B022FD43E15EC2B693593AEFD7AA1C9DCFF50BD
            Version: v31.0.15.4617
        nvngx_dlss.dll
            Address: 0x7FFA1EE50000
            SHA: 56037EF9ACEA29A074CFBD63D2F4B15325864DAC8F871EDED336D8EE50A4EDE7652212090009420A1A8E2EE4541DB238E17586DD0246FEE3F6A935B140B68BD7
            Version: v3.5.0
        nvngx_dlssg.dll
            Address: 0x7FFA1E220000
            SHA: E7E49E838D14190D80B748ECD6168F58C64421B50EFFA9F930C08F28BF24ADD8D88226E0268B63DB61B80385052BA991AB24626F517F96C99B6B8B8670319751
            Version: v3.5.0
        nvofapi64.dll
            Address: 0x7FFA2E900000
            SHA: 9FFB57607DAA0A7CEFA686BA49D2784828CED54AC7DFEDDEB026A84AD18BD7EE75FE6BFC63BFDA6584969328A489F7B19D5D9493A44A223E83ECA5FE461A4778
            Version: v31.0.15.4617
        nvspcap64.dll
            Address: 0x7FFA90940000
            SHA: D0E47961DD6417D2202CAB0473624A50015F2D445D9949EB7D9B5C46526F6BED4710B3F9A342ADBEBEC8C6BFCCEB8122663349D1D240BDD18C2C278E290D29C9
            Version: v3.27.0.120
        NvTelemetryAPI64.dll
            Address: 0x7FFAB3390000
            SHA: 4CB08B41D5E5ED15348180354CD6672E5C6229D18C83D09E21001B7A51D5B3A6E43A1F0A474A6BDD0D3C8F756D3159122E2C539B0ECC9AB5ABA59DA83C9E0D70
            Version: v17.1.7
        NvTelemetryBridge64.dll
            Address: 0x7FFA98AE0000
            SHA: 35690C721848A1845012BE05E4C51E8C717738812239C027177B4514F329684D2B6AF13B09ACC5C7EA740EE256807B383929D3DFD982065C0A0B232FC75AE713
            Version: v17.1.7
        nvwgf2umx.dll
            Address: 0x7FFAA6860000
            SHA: A700AB28F6EB3AE4645AEB6E19D6BB3F0B74D6FB7F4266FFAC740D254F1EB813A452E2A10782DD36844E90534A717DCFBBECAF953E046F30545AC3013B1B0F17
            Version: v31.0.15.4617
        ole32.dll
            Address: 0x7FFABFD90000
            SHA: 61E5DD5E970662A8B117E72C48EBD50506DB3B756C4051BBEEBD6ABE70C140FE2873D7846B63A3B2BF0E2231BBE58D552FA0CDCADDECAA58641B1E2DC96BC98D
            Version: v10.0.19041.3636
        OLEAUT32.dll
            Address: 0x7FFAC0020000
            SHA: B3AA801EAC2556C3ED701BD51094E83A28A3D5EE4C24D66FE5A77E6937238C1A136F5ACEF683BACE24905D6892EA3C1117D239F010EF19491C1C3AADCFE74B49
            Version: v10.0.19041.3636
        ondemandconnroutehelper.dll
            Address: 0x7FFA887B0000
            SHA: DF88E9B8E277D9EBB46705672691586C88AC137019FEDC633296F02D45808F2CF1608B5AE0B52AB40C9A24BE7B79804AFE925027BBC3B66F89DFA17EDBF9DCB4
            Version: v10.0.19041.3636
        pnrpnsp.dll
            Address: 0x7FFA86360000
            SHA: 4DF6D2FE84D4F1728C55E279A8828F26C0844E150941E440F8A9E43CF237963B7AF95AFE0CD173A9774A7CEBBC35D96E3D0091CAED6F9C3C92E885A7A207D9D1
            Version: v10.0.19041.1
        po3_EnemyFriendlyFire.dll
            Address: 0x7FFA899F0000
            SHA: EF46744B0E3E9D56EF4B8806B1448494DBBD8B616F87C38236B255B535400F2731211702E575C8EFA2A76CCA0B8B5E0E6B42CD50CEEC2947DE377084EAF2CF2A
            Version: v1.0.3
        po3_SimpleOffenseSuppression.dll
            Address: 0x7FFA32DF0000
            SHA: FA198DA5CE7BE0CEF0B88D31D412F3124AAD808F594D25DEF2C276AA19A3C9314D515BEE65E43714BC631EEDED0D30C07C0F2F5FB5A803A7F5686F9DC961BB7B
            Version: v1.1.1
        po3_TweaksSF.dll
            Address: 0x7FFA32D20000
            SHA: EBD39677A8E2DB9BC1C3A993C91D1A3FE59659B83FCE3FDAEE46DC54494E3C59DF7673478E649E35FC8210B1F4DDB54E8B8CFE435021275FF68DB4DD123DB0EB
            Version: v1.1.2
        POWRPROF.dll
            Address: 0x7FFABD080000
            SHA: A256201A737D8C43875F8A033D10AAF67F51C89F58CD539200C5FFCC14454A3AAA528F4C58C134A6FF115E993B74B1B86079862405E5212EAD4CAFF1FBFFA814
            Version: v10.0.19041.1
        profapi.dll
            Address: 0x7FFABDA00000
            SHA: 6E1F224B35AF75AF03D8F7C78490E9125005F53812F751F8C9D1651C4BF301CD08E87180195825F6A1FCA79E75EF59BCD2057931F531F70B6244D4E578269F25
            Version: v10.0.19041.3636
        PROPSYS.dll
            Address: 0x7FFABA9B0000
            SHA: 5775981BF5D43F3ACF941C16F6E7A3118C85D6853FDD339603323199E66FC28A1912CD06D05EF36272CCA54EA0344BD7AB834FC7A28861F4EB86D290454A01AE
            Version: v7.0.19041.3636
        PSAPI.DLL
            Address: 0x7FFABFD10000
            SHA: 76F56242C21B4EAEAA50283A25C66F97F55EDE0BB355FC9E520FA2E2F6AC30CC4C841DB16BDCECB7FA33883486A5F5D0A01E8280599F5E56123E1FA65EDEEC54
            Version: v10.0.19041.3636
        rasadhlp.dll
            Address: 0x7FFAB6810000
            SHA: 246EB46BD457A8B91D9A84B607A4C197ADE81CC9D79920785C801F1405B2D05D3769E74BAE56046697806668E6E82991187F024C122CBF341715B98BCD1E3941
            Version: v10.0.19041.3636
        resourcepolicyclient.dll
            Address: 0x7FFABB5C0000
            SHA: 2999128720381D9E05E4105AF02AE74C557C461420C87FBB553D87A73947A53333E6750EB07671380B28153F3AFF64DC978318EC743F12E7F92C205491407EA8
            Version: v10.0.19041.3636
        RPCRT4.dll
            Address: 0x7FFABF950000
            SHA: AD7C36ECF6BFF2070A93B57B2B40330F3E052A8A88B0B772115AF1D98E59AEE7335E69D783DC13E22BC1397727EC2D30C9C6C4DD7BBD854C34B64F145FE0AF0A
            Version: v10.0.19041.3636
        rsaenh.dll
            Address: 0x7FFABCB30000
            SHA: D3F376274CB7CCFB392996FF0F2BE902896796D12839609FEE0F420CEB373774861184CE2FDF8E3597D5632E817AF755A96860269C4650E4751F456E9B0D5BFE
            Version: v10.0.19041.1
        schannel.DLL
            Address: 0x7FFABCA40000
            SHA: 46EAF04E529C3FF756977E61AE177EC46834ECF7BD28D54F7845800D0CA80724266C701474A5BB315A2515C1F860034C72C4C4B32370560C0BF6EC7C2AD2D8A1
            Version: v10.0.19041.1
        sechost.dll
            Address: 0x7FFABFEC0000
            SHA: 22687B5B393C9C8AF44EB29109CCCBE57203DC531A14B36DC60713B834C29B3291DE1570DD7E2EAFCA5F744A427478D52DFFA0E8E9CA1BF612364B8F538790F4
            Version: v10.0.19041.1
        Secur32.dll
            Address: 0x7FFAADB40000
            SHA: 2631AA4988B34F31620BFC4CD0333EDF540D0E663ED440C95AF6DB1CC9A67914A53598C76D6EE4CC0DD6AE4C049A55CA20E8ABA21C03CFAC447CBB4A401D87B6
            Version: v10.0.19041.3636
        SETUPAPI.dll
            Address: 0x7FFABF4E0000
            SHA: B0BD0A4CDB0A8D7E275D8B8C0F5700C39B45E48A14796912E6B22BEA5A0AA1AF6A48493BB9765BFAB0D8A46D14BFDAABD73203C0C97E0ED902E772705DF45287
            Version: v10.0.19041.1
        sfse_1_8_88.dll
            Address: 0x7FFAA5B70000
            SHA: DDE5024CA0090B624DF88CE25A8611F6486CA03E05F1D112B8F8E9086C7BF16B80A145D41051F4E0A80D702F18C7B36BCCDFBD27A0446DE2D3CDB95723BD30E6
            Version: v0.0.2.1
        SHCORE.dll
            Address: 0x7FFABF420000
            SHA: E99613819C2FEE7D4F84D134EFA3F05547660794A80025800C39707DD58D06D473CA62B7FD20B582043B50F3B9FCBEB4C3B9AD1F4DB2BA1CF880FD404A73EC0A
            Version: v10.0.19041.1
        SHELL32.dll
            Address: 0x7FFABE5E0000
            SHA: 212A90471483A91190F476309E6830CA68FF51B3B09CA0CF4AFC2704E975DCA218A4E18F25E849FF97B79D51F3708B03DB9C546F8F65835882F38C33CB8C6540
            Version: v10.0.19041.3636
        SHLWAPI.dll
            Address: 0x7FFABFF60000
            SHA: 191891B714012F02D08FB82BB2BE134319E7390E696FF56F02567033B2CDBA0C456E86C9C91E88889E048962CB46D95D81B419189D78543805B0203144B9E848
            Version: v10.0.19041.1
        sl.common.dll
            Address: 0x7FFA341D0000
            SHA: 843457A2F9F0BA83B6C2FEA37FB05F1C52F715C2046232C904DF79B1ED30F3725B967163EBFE5B3F01DAABBD9CAC27799C80DBF8269211F5319FD62F3EEF7B3E
            Version: v2.2.0
        sl.dlss.dll
            Address: 0x7FFA8A520000
            SHA: 54B6D2F71B8D16114AE1A576A37E64683BA91CD8BB8AA379706D5AE21DF4571B6B4126F1085E6E5A2448D7E8B169539642AD5D7A31012C4FDEB9AC38B62ED7B8
            Version: v2.2.0
        sl.dlss_g.dll
            Address: 0x7FFA2EE60000
            SHA: 97370DF420A6BA860BE92F895ED8B5DE9299E7FF7F7E955BB514A49CE591AA5ACDC1599BF46A93E1F87B6335EA7DCB7111671D9FCD20C9029EE82A1953FF44CF
            Version: v2.2.0
        sl.interposer.dll
            Address: 0x7FFA8A620000
            SHA: 4197A38D36FE41A21B11814B00F17F5BF2AE7F418DC5CCB94A6C097615B87B9C5B530DFA0296CA0580BB5618D0AB43AC02C2E1FC08E07D55B5E8BBFF8DA7160A
            Version: v2.2.0
        sl.reflex.dll
            Address: 0x7FFA9BC50000
            SHA: C5DF9877DEDFCC443ECAD9A8EA0F10C5DC8C97C4F6F10A1BEA1831AF6EB27D89C695F67B55E451603A6550EBA084E0CD7B676FE8C56E302324025D9A97ED7FC5
            Version: v2.2.0
        SPINF.dll
            Address: 0x7FFAB2C60000
            SHA: 5BC943D927859944C144945E93DEDB2BDCCAE31860D66D82AE6B4EB8558E79D84649962D91D43A396B7037B150C396F60753AB047D6AFC593900CA904762B3AC
            Version: v10.0.19041.3636
        srvcli.dll
            Address: 0x7FFAAD5C0000
            SHA: C45B86ABAE77F395AB4926F4581759FC04AE748131644789B8FC4137A0248EEC106ED91A0D18B734F7D48A92A96EA14668A354541D5EC4AA64A7985BB2427724
            Version: v10.0.19041.3636
        SSPICLI.DLL
            Address: 0x7FFABD9B0000
            SHA: E64D6158DAAD81ED2C1F6D6B41E921CE9AA2C5751732342F3D11174DF978253D6F20E58232100E3CFF1CA49F6CEC8FA01AD168EABAA292BF200817062000AF06
            Version: v10.0.19041.3636
        Starfield-Silent-Voice.dll
            Address: 0x7FFA2FB90000
            SHA: E91EB86F782C5B3D2BABF60649C15563A07FC0ECEC2D38CB76C1A6B82D882E095AD6F32B9448715C07B1D8903EFCA92967EE430C54B2A313895E2EEE43E654C0
            Version: v1.3.0
        Starfield.exe
            Address: 0x7FF7B6250000
            SHA: B812AB0D6E924EA9DC4FD9DE6B8BFEC34DB2A1355299932A2D58A64C0B10A195785114FCDC698B0EFA6B8F7B903BD7194E616733370BC32E051695753A31C006
            Version: v1.8.88
        steam_api64.dll
            Address: 0x7FFAAF5C0000
            SHA: C08DE8C6E331D13DFE868AB340E41552FC49123A9F782A5A63B95795D5D979E68B5A6AB171153978679C0791DC3E3809C883471A05864041CE60B240CCDD4C21
            Version: v7.40.51.27
        steamclient64.dll
            Address: 0x7FFA21FD0000
            SHA: 68D637FECE0789126108C50C8A1886A74AF0A1A2432D480468A923FD1BB33D64FA7CBD2F74F197E6F6A8713EFC9FAAE45D923B7C4E85C79F7DAF5F8A8EE94990
            Version: v8.56.38.63
        textinputframework.dll
            Address: 0x7FFAA0FB0000
            SHA: B72D11176F3D8EE0F9C35043335364A0602D8FD5792ABF717FCED13AB1412DDC857C9DFA225636DFA953CFDE14D1181F0C0E08B1D92B062DCAAEB3A8BEEA03AB
            Version: v10.0.19041.3758
        tier0_s64.dll
            Address: 0x7FFA8A270000
            SHA: DE88368F4297A720B91E13B2060F70337F64333BD7AC228A7BDA0602785F3A76066CA738ECC2F22972F9C80B14DC6E5C8064EBB278B514DA0702B8E3A1AB4410
            Version: v8.56.38.63
        trainwreck.dll
            Address: 0x7FFA8A170000
            SHA: 8B64DFFE28D8C089ED5F4CEB30850269D8549A7F4872BF5B400BE16B449DC47D08767817B4FD1BDEF36F5AB21F3869B8ABC127B53877FC0E3E684441AFFB1F58
            Version: v1.3.1
        twinapi.appcore.dll
            Address: 0x7FFAB82F0000
            SHA: C12A7B0429DB6D380BC1CE11C63AF6B32766BE61D900DE301F1ADC8741E6361C8A8D4996A4A5ACF31BBF8393A6C6F366EB127C88BEE8042CFC983E1341D576F7
            Version: v10.0.19041.1
        ucrtbase.dll
            Address: 0x7FFABE2A0000
            SHA: BE9420A85C82EEEE685E18913A7FF152FCEAD72A90DDCC2BCC8AB53A4A1743AE98F49354023C0A32B3A1D919BDA64B5D455F6C3A49D4842BBBA4AA37C1D05D67
            Version: v10.0.19041.3636
        UMPDC.dll
            Address: 0x7FFABCEF0000
            SHA: 1E1498F8C8923CCD4C6E9B80947A18BA11AA8633D9BE3A32CE91839346397E2074636424AD23F439D6B2FA55A567C8933CEB81B1B4047A2A7C22AC9CFF24BB2E
        urlmon.dll
            Address: 0x7FFAABF20000
            SHA: 125F07104FB1394BD848914D8928079BDAFF4A5835C01BF02670E33C11C4F5CCBCBCEBA4B34032777E95BB2A1E60A82AAA71DD8044B410D384A1C5EA346B13A3
            Version: v11.0.19041.3636
        user32.dll
            Address: 0x7FFAC00F0000
            SHA: 60F04934BCF755942A189E3A5C8FBA8C727DCFDE1213DFCCFA54338E0163DD0FD8BCE2386EC3E34827E50BF18D24B881BE9540584194D88D54BA655A69F7496A
            Version: v10.0.19041.1
        USERENV.dll
            Address: 0x7FFABD980000
            SHA: CA6F6B18A4A5AFA2F05CDE97D7E6368E4C8948D5B7E505BFB40869D6BE7D2CFDC0A6EB6BCC28C272CF8D686D3A86ADD76514C34D4E5489845BD37E92FF6E4880
            Version: v10.0.19041.1
        usvfs_x64.dll
            Address: 0x7FFA6A290000
            SHA: 6176EE78F31DBD41E7EF6C8E3FEFE9E30294263BCCD8B6819AD7FE8E5F2A1F4A2FC58DFE8F094AFE47C57C7EA4D901ADC0BE7F325AAD643B693371EE88EBA987
        uxtheme.dll
            Address: 0x7FFABB4E0000
            SHA: 5C66694347025389B162F17D491F7E79DDB88A80CE16B9F8747E257EEB53FDDC5F3458D54D1205E9847FAC69CF9D62003126F2BF221442C9312ECCEC61634138
            Version: v10.0.19041.1
        VCRUNTIME140.dll
            Address: 0x7FFAAE220000
            SHA: E09E072F3095379B0C921D41D6E64F4F1CD78400594A2317CFB5E5DCA03DEDB5A8239ED89905C9E967D1ACB376B0585A35ADDF6648422C7DDB472CE38B1BA60D
            Version: v14.36.32532
        vcruntime140_1.DLL
            Address: 0x7FFAAE2D0000
            SHA: D95CD98D22CA048D0FC5BCA551C9DB13D6FA705F6AF120BBBB621CF2B30284BFDC7320D0A819BB26DAB1E0A46253CC311A370BED4EF72ECB60C69791ED720168
            Version: v14.36.32532
        VCRUNTIME140_1.dll
            Address: 0x7FFAB8EE0000
            SHA: 0395AD63759C4B7F1A28AFDD337B2BE1A2606A13506D03789329D60AF97D0BE2E4C1F38DE7F2A86A23128E2C9EB759E9813AF3F912DA733FC9FB6A987CD6FE60
        VERSION.dll
            Address: 0x7FFAB78B0000
            SHA: A7F9BCFE7DFA74067FAB32E313FA74E18C4EF10F6BC40A369F0A13C4FE96D2BB7BC7C25ED7E5F1F80CAE7ECCE2D18215388420D7EE4BE23D7280F06A49E9C370
            Version: v10.0.19041.3636
        vstdlib_s64.dll
            Address: 0x7FFA8A560000
            SHA: 5EEBFCC4C86666C45FD61820E4C83B48DC48C7251BFBFCBF79FA0DD6D874B740FBF8552AAA44B79A1F91F98827C228200F29D5798205B74A09D3E5AB811F654F
            Version: v8.56.38.63
        vulkan-1.dll
            Address: 0x7FFA2F240000
            SHA: 158D2BFE69B94B3BFA779F57734D8A2D0A0BD8DD84EF86943BAAA425E74283EA054E57CF9AC82A13B91BBC7AD360BDD5B38145B3E9886FCD8069D4D1DE34192F
            Version: v1.3.255
        wbemcomn.dll
            Address: 0x7FFAAC110000
            SHA: E777BAB70DEEB247792EE157244657F8701EFF94158A0BA4E468AD83BBB48E208AFDA702D6DEB63479D58DCBB7CFE94ED17467012494A466799D599562ACE8FD
            Version: v10.0.19041.3636
        wbemprox.dll
            Address: 0x7FFAB5B60000
            SHA: 9B4BA189DCA2CB2C6AF1A7077B674374DC730713FDD901E2A2313E0E3C83566D33900BC0F48CBA414918C5218E8BBF5FEC19E01253E9B2E31CE2524AE1BC0F95
            Version: v10.0.19041.3758
        wbemsvc.dll
            Address: 0x7FFAB4460000
            SHA: D450BDC47F5E60D7CAE3C3E6E7E3CECEBA7EA34A37EF08090417DD8D21BB662359553149E057B5C0564F39E7AC0632C64330563C45BC6C70A00D271DBDE538A5
            Version: v10.0.19041.3758
        webio.dll
            Address: 0x7FFAAD930000
            SHA: 2296C620DEDC4A4DC7B557FC99D0EC713D48AD12B96195C45475BBEAB545D8775697DA76550B07C8994F7FD01C8566F00B8FDBE9C129FBF4D00AA9F67BC6AAA7
            Version: v10.0.19041.1
        win32u.dll
            Address: 0x7FFABE270000
            SHA: FFF7BEFD8B270A2B7488468F6D5E77E288108B91F8B208D6C633915F770C5892B67298DF2AAA1765C05D4B2D7C6E4482AA028910E3FD40CA6F11D98206BE4BDF
            Version: v10.0.19041.3803
        WindowManagementAPI.dll
            Address: 0x7FFAB8650000
            SHA: 1A78D10CFB0119898F9D867902B3A5A2C9288DCF74E6F6EF7D48A8AAB9030B17FEBFB3AA2D83942CE08B43D8E766774593F298ED20B44D38A9881BE1FF5E5AAD
        Windows.Gaming.Input.dll
            Address: 0x7FFAB6470000
            SHA: 9DF11482A5505598FFE8080A9DBEB658A7EFB189CC7B91B70ADF591A66D29BA31FD2E3B1D2A96AC398AC9D7653489323C1F6AADF0A4CD41367DB8CBF80B9BEDB
            Version: v10.0.19041.1
        windows.storage.dll
            Address: 0x7FFABBBB0000
            SHA: DED15A0640FEE2AB6A00C4AA2D03DA733B8FAEF37A9490D3CFBFB3F306601510C54514852DB03C479B1EEC235EB80AB11D7BEFDB7D3261FFA765B9D7DB76959C
            Version: v10.0.19041.1
        Windows.UI.dll
            Address: 0x7FFA9EA50000
            SHA: C07318B8CAC171667DD86B4B6D5B46310E51BE7B532CE332463392B4C285D5A1014DB1B3F201B97D4EF0E7943785F61DDAEB0A2B2E73DBA6A3E5B6493534AF33
            Version: v10.0.19041.1
        WindowsCodecs.dll
            Address: 0x7FFAB7F90000
            SHA: 1DF1314F0CBEAFE290BBAA06B572329F7AD3CC9345EE384DB5768C550D988BD2E73D650F5E0DB37C911E6F9F67CC05BAC86EACD737E693C9F6DD025C1B812349
            Version: v10.0.19041.3636
        WINHTTP.dll
            Address: 0x7FFAB7A80000
            SHA: 2C7439DF235014D432A79506D2EACC3CD8BC3D7B7FCAC789F908DECC607E636F1476630A0E4180135876271D43FA773854E988FCA2AAC2DFB533DABBD63095A4
            Version: v10.0.19041.3636
        WININET.dll
            Address: 0x7FFAADCD0000
            SHA: E5E20E0C0BED262B14F000E72ADFD8AC11F3101A038732793652BD5A63E5C591FC4BCB3F64AE3807EBAA25386ECB5550EFF8397513C09C18B766D978ABC8579A
            Version: v11.0.19041.3636
        WINMM.dll
            Address: 0x7FFAAD510000
            SHA: F8C82B424C5384C6CC81498FAB090347F75A08BD51A7B64EC674DA96F56855F3CAB0069B9AE56232A4460021BBE54D93A6D8E2C04D88C1C68BE75030A5CDE8F6
            Version: v10.0.19041.1
        winmmbase.dll
            Address: 0x7FFAAE1F0000
            SHA: 92273692CA3EF2B60FF5AA8C7A29F3ACAA530F6EB20089410167D9EDC51E323D7872B9F925CF74AF5E6A0BC68E747D2369986FBF6002C452827AAA26E1025ABD
            Version: v10.0.19041.1
        WINNSI.DLL
            Address: 0x7FFAB8BC0000
            SHA: 186B0AFCE1CAB899BA6B3E44FD5CE11CB5ED42292F6572546B1B54A8AF2B42AE8B169402ECB6C0A87279BCBA2689F538B81AB2F520794FD0D90F83A824C6449B
            Version: v10.0.19041.3636
        winrnr.dll
            Address: 0x7FFA86320000
            SHA: DFB7CA8D37DBE671B0E9D266C433596B5BB1A6F6689C8C7EAC740139B3646CD5742AD70A1D5E9695BAEAD6FAAE7ADF0361C3F2C4E4C034A179B5B00107AD370F
            Version: v10.0.19041.3636
        wintrust.dll
            Address: 0x7FFABDE20000
            SHA: 6CB97D6EE9F820581F95AA6D0CB34014E885088E56BD5AE40D9A7040550245A9A646E91FFE86F9A9CB0E2589D8FCF4306BF0BC33E91A99BB8B5CF7E5A01A1262
            Version: v10.0.19041.3636
        wintypes.dll
            Address: 0x7FFABA2E0000
            SHA: 284D810D224E60F7D867BA13F72300E4766A0CADE347253B4057B93E2DF585F12549DFD53A8A76450E1129A18A19F97D17853DD8387F79C4050232842275B4AB
            Version: v10.0.19041.3636
        WLDAP32.dll
            Address: 0x7FFABFFC0000
            SHA: 401DA966BC79517A93491672159804B678B17E2077CE8A9CCBAE11FCCB5D0BC0648091322194A090DB3B04643D0375372FC3E2B3AE644E9A6F7FA93A60F1F809
            Version: v10.0.19041.1
        Wldp.dll
            Address: 0x7FFABD510000
            SHA: CBB595A59A3B8A08F254DE4EA3FE3EEFFF040820AFE284EA54A10FB5A55BAEC7C685510445A92F0DF0A90956448E29EABCFFEF94D3699DC31660C94E0E0262C6
            Version: v10.0.19041.1
        WS2_32.dll
            Address: 0x7FFAC0340000
            SHA: 307EB04667A17EC2ECDDFE2F184D3A3655F31E65A451DB010ACCDE8A676705A260F873CA44F4362A2CE7E5ADDA8164504938A131614CE408645B30A9B869E122
            Version: v10.0.19041.3636
        wshbth.dll
            Address: 0x7FFA86340000
            SHA: 8BBAD084869DCD4931105A3B4CFC755EC3F821ACF308BBD897556FE8ADFA88ADEE2DA84E2D5A4EC66883DAA05D632E336FDC182DE22029865D8B910C21EBFEF9
            Version: v10.0.19041.3636
        WSOCK32.dll
            Address: 0x7FFA64E70000
            SHA: 11507004DC8925BF3039372F9F66E2AEA719E5BA7809A5E44224444AD455D0C4748496DE526E4CD0E69607AC8DD628A4129DC2C8A1A14D9441AAD1377D38FD58
            Version: v10.0.19041.1
        XInput1_4.dll
            Address: 0x7FFA9E540000
            SHA: EC915169DAEFA85383CA2A0CF842231BD5D4AB3453F354280065FF4E1766DEEA56D07AB56A0B7BFA3D02CE939600FCDA70AF64F73F8E3FBF778B9D4BA187A644
            Version: v10.0.19041.1
        XINPUT9_1_0.dll
            Address: 0x7FFAB8ED0000
            SHA: 108AFAFF6580DCFDCA30D8EC25D5E9C59AF2F4B3E6840348C9BBA6ED62FF523AE0CFAED01BE2BE51878B33334BE918BC5F4632C86573A768C4670EA6938673BE
            Version: v10.0.19041.1
    SCRIPT EXTENDER PLUGINS:
        BetterConsole.dll                v1.2.11
        DEF_TOLS.dll                     
        NativeAnimationFrameworkSF.dll   v1.0.2
        po3_EnemyFriendlyFire.dll        v1.0.3
        po3_SimpleOffenseSuppression.dll v1.1.1
        po3_TweaksSF.dll                 v1.1.2
        sfse_1_8_88.dll                  v0.0.2.1
        Starfield-Silent-Voice.dll       v1.3.0
        trainwreck.dll                   v1.3.1
    1. silvermetal
      silvermetal
      • premium
      • 26 kudos
      Oh, and I had the voice randomizer turned off btw
    2. shademe
      shademe
      • premium
      • 699 kudos
      Thanks for the report. Could you DM me a save file that I can use to reproduce the issue?
    3. silvermetal
      silvermetal
      • premium
      • 26 kudos
      Damn, sorry, I disabled this mod and kept on playing, now I don't have any save file near that moment :(
    4. shademe
      shademe
      • premium
      • 699 kudos
      I've uploaded a new version that should hopefully fix the crash.
  4. VenpiTheGamer
    VenpiTheGamer
    • premium
    • 46 kudos
    As a mod author there anything I need to do to use this with the Cora series of quests? Though ultimately I'll probably do TTS voice files to get around the engine blocking quests that don't have voice files.  This might let me delay figuring out the wwise converses needed for the tts audio files.
    1. shademe
      shademe
      • premium
      • 699 kudos
      I'm not sure what you're referring to with "Cora series of quests" (I don't/haven't played the game), but as it currently stands, there are no mods that can actually avail this plugin yet. The first ones will come in the months after the Creation Kit's release, which is currently slated for "Early 2024".

      That being said - as a mod author - you don't have to do anything outside of _not_ providing the audio/lip sync files for your dialogue lines.
    2. VenpiTheGamer
      VenpiTheGamer
      • premium
      • 46 kudos
      https://www.nexusmods.com/starfield/mods/7263 for example has a lot of quest dialog. Cool will give it a test and add it as a requirement.
  5. Gangleprime
    Gangleprime
    • premium
    • 1 kudos
    Mod needs updating to 1.8.86, but looks like 1.8.87 is on the horizon, so its probably wise just to wait for CK for this type of mod. But good work nonetheless ! 
  6. DarkSneider71
    DarkSneider71
    • member
    • 1 kudos
    Can we use this SFSE plugin to give voice to our character? 
    1. silvermetal
      silvermetal
      • premium
      • 26 kudos
      No, it doesn't work that way
  7. Commando414
    Commando414
    • member
    • 23 kudos
    Looks like this mod needs an update after Bethesda dropped the new update in Starfield.
    1. shademe
      shademe
      • premium
      • 699 kudos
      Updated to support Address Library.
    2. Commando414
      Commando414
      • member
      • 23 kudos
      Thanks. Took ya long enough, lol! :D
  8. groundZKC
    groundZKC
    • premium
    • 0 kudos
    Fields Ro Doh?
    1. shademe
      shademe
      • premium
      • 699 kudos
      Doesn't roll off the tongue as well, I fear.
    2. FRIENDMYFRIEND
      FRIENDMYFRIEND
      • member
      • 59 kudos
      STAR RO DOH.   THANKS  HOMER     :-)=
  9. slowpard
    slowpard
    • supporter
    • 31 kudos
    What's happened with high-quality mod descriptions? 😭
    1. shademe
      shademe
      • premium
      • 699 kudos
      Got old, lost sense of humour.
  10. Commando414
    Commando414
    • member
    • 23 kudos
    This mod is currently not needed as there are no mods for it yet, but I still hope for the update for this mod. I look forward to people making mods that require your mod right here.
  11. deadair3210
    deadair3210
    • member
    • 0 kudos
    Could the ini be set to false by default instead of true? Or do what other mods do and keep the config file somewhere else and update it whenever new options are added? Currently, anyone with MO2 or Vortex, when they update the mod or reinstall it for whatever reason has to remember to go in and change the flag, or else they get the wonderful word wacky week instead of the actual speech intended