Advertisement
Guest User

Untitled

a guest
Feb 24th, 2024
34
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.13 KB | Gaming | 0 0
  1. 02/24/2024 12:39:53.361: DebugHelper Symbol Search Path......: ;C:\Users\*******\AppData\Local\Programs\Special K
  2. 02/24/2024 12:39:53.361: Unable to load Special K Debug Symbols ('C:\Users\*******\AppData\Local\Programs\Special K\SpecialK64.pdb'), crash log will not be accurate.
  3.  
  4. ==================================================================================================
  5. <+> System Memory Load....: 43%
  6. # Current Working Set....: 0.392 GiB (Max Used: 0.472 GiB out of Total Physical: 15.899 GiB)
  7. # Current Virtual Memory.: 1.292 GiB (Max Used: 1.292 GiB)
  8.  
  9. ==================================================================================================
  10.  
  11. 02/24/2024 12:39:54.424: Unhandled Top-Level Exception (c0000005):
  12.  
  13. -----------------------------------------------------------
  14. [! Except !] << EXCEPTION_ACCESS_VIOLATION >>
  15. -----------------------------------------------------------
  16. [ FaultMod ] # File.....: 'C:\Users\Beecula\AppData\Local\Programs\Special K\SpecialK64.dll'
  17. [ FaultMod ] * RIP Addr.: SpecialK64.dll+000000000050E819h
  18. [StackFrame] <-> Rip=00018050e819h, Rsp=00f2997ee940h, Rbp=00f2997eea40h
  19. [StackFrame] >-< Rsi=000000000000h, Rdi=000000000a00h
  20. [ GP Reg ] rax: 0x000000000000 rbx: 0x02090b57ab30
  21. [ GP Reg ] rcx: 0x000000000000 rdx: 0x00000000012a
  22. [ GP Reg ] r8: 0x020905252a00 r9: 0x000000000001
  23. [ GP Reg ] r10: 0x000000000003 r11: 0x00f2997ee910
  24. [ GP Reg ] r12: 0x000000210bba r13: 0x02090b57ab68
  25. [ GP Reg ] r14: 0x02090b57abc8 r15: 0x0000000005a0
  26. [ GP Flags ] EFlags: 0x00010246
  27. -----------------------------------------------------------
  28. SpecialK64.dll > wglDeleteContext
  29. SpecialK64.dll > wglDeleteContext
  30. SpecialK64.dll > SwapBuffers
  31. tomb1.dll > run
  32. tomb1.dll > run
  33. tomb1.dll > run
  34. KERNEL32.DLL > BaseThreadInitThunk
  35. ntdll.dll > RtlUserThreadStart
  36. -----------------------------------------------------------
  37.  
  38. 02/24/2024 12:39:54.432: Unhandled Top-Level Exception (c0000005):
  39.  
  40. -----------------------------------------------------------
  41. [! Except !] << EXCEPTION_ACCESS_VIOLATION >>
  42. -----------------------------------------------------------
  43. [ FaultMod ] # File.....: 'C:\Users\Beecula\AppData\Local\Programs\Special K\SpecialK64.dll'
  44. [ FaultMod ] * RIP Addr.: SpecialK64.dll+000000000050E819h
  45. [StackFrame] <-> Rip=00018050e819h, Rsp=00f2997ee940h, Rbp=00f2997eea40h
  46. [StackFrame] >-< Rsi=000000000000h, Rdi=000000000a00h
  47. [ GP Reg ] rax: 0x000000000000 rbx: 0x02090b57ab30
  48. [ GP Reg ] rcx: 0x000000000000 rdx: 0x00000000012a
  49. [ GP Reg ] r8: 0x020905252a00 r9: 0x000000000001
  50. [ GP Reg ] r10: 0x000000000003 r11: 0x00f2997ee910
  51. [ GP Reg ] r12: 0x000000210bba r13: 0x02090b57ab68
  52. [ GP Reg ] r14: 0x02090b57abc8 r15: 0x0000000005a0
  53. [ GP Flags ] EFlags: 0x00010246
  54. -----------------------------------------------------------
  55. SpecialK64.dll > wglDeleteContext
  56. SpecialK64.dll > wglDeleteContext
  57. SpecialK64.dll > SwapBuffers
  58. tomb1.dll > run
  59. tomb1.dll > run
  60. tomb1.dll > run
  61. KERNEL32.DLL > BaseThreadInitThunk
  62. ntdll.dll > RtlUserThreadStart
  63. -----------------------------------------------------------
  64.  
  65. 02/24/2024 12:39:54.433: Unhandled Top-Level Exception (c0000005):
  66.  
  67. -----------------------------------------------------------
  68. [! Except !] << EXCEPTION_ACCESS_VIOLATION >>
  69. -----------------------------------------------------------
  70. [ FaultMod ] # File.....: 'C:\Users\Beecula\AppData\Local\Programs\Special K\SpecialK64.dll'
  71. [ FaultMod ] * RIP Addr.: SpecialK64.dll+000000000050E819h
  72. [StackFrame] <-> Rip=00018050e819h, Rsp=00f2997ee940h, Rbp=00f2997eea40h
  73. [StackFrame] >-< Rsi=000000000000h, Rdi=000000000a00h
  74. [ GP Reg ] rax: 0x000000000000 rbx: 0x02090b57ab30
  75. [ GP Reg ] rcx: 0x000000000000 rdx: 0x00000000012a
  76. [ GP Reg ] r8: 0x020905252a00 r9: 0x000000000001
  77. [ GP Reg ] r10: 0x000000000003 r11: 0x00f2997ee910
  78. [ GP Reg ] r12: 0x000000210bba r13: 0x02090b57ab68
  79. [ GP Reg ] r14: 0x02090b57abc8 r15: 0x0000000005a0
  80. [ GP Flags ] EFlags: 0x00010246
  81. -----------------------------------------------------------
  82. SpecialK64.dll > wglDeleteContext
  83. SpecialK64.dll > wglDeleteContext
  84. SpecialK64.dll > SwapBuffers
  85. tomb1.dll > run
  86. tomb1.dll > run
  87. tomb1.dll > run
  88. KERNEL32.DLL > BaseThreadInitThunk
  89. ntdll.dll > RtlUserThreadStart
  90. -----------------------------------------------------------
  91.  
  92. 02/24/2024 12:39:54.434: Unhandled Top-Level Exception (c0000005):
  93.  
  94. -----------------------------------------------------------
  95. [! Except !] << EXCEPTION_ACCESS_VIOLATION >>
  96. -----------------------------------------------------------
  97. [ FaultMod ] # File.....: 'C:\Users\Beecula\AppData\Local\Programs\Special K\SpecialK64.dll'
  98. [ FaultMod ] * RIP Addr.: SpecialK64.dll+000000000050E819h
  99. [StackFrame] <-> Rip=00018050e819h, Rsp=00f2997ee940h, Rbp=00f2997eea40h
  100. [StackFrame] >-< Rsi=000000000000h, Rdi=000000000a00h
  101. [ GP Reg ] rax: 0x000000000000 rbx: 0x02090b57ab30
  102. [ GP Reg ] rcx: 0x000000000000 rdx: 0x00000000012a
  103. [ GP Reg ] r8: 0x020905252a00 r9: 0x000000000001
  104. [ GP Reg ] r10: 0x000000000003 r11: 0x00f2997ee910
  105. [ GP Reg ] r12: 0x000000210bba r13: 0x02090b57ab68
  106. [ GP Reg ] r14: 0x02090b57abc8 r15: 0x0000000005a0
  107. [ GP Flags ] EFlags: 0x00010246
  108. -----------------------------------------------------------
  109. SpecialK64.dll > wglDeleteContext
  110. SpecialK64.dll > wglDeleteContext
  111. SpecialK64.dll > SwapBuffers
  112. tomb1.dll > run
  113. tomb1.dll > run
  114. tomb1.dll > run
  115. KERNEL32.DLL > BaseThreadInitThunk
  116. ntdll.dll > RtlUserThreadStart
  117. -----------------------------------------------------------
  118.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement