Advertisement
Guest User

Untitled

a guest
Dec 29th, 2016
400
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. PCSX2 1.5.0-20161227120818 - compiled on Dec 27 2016
  2. Savestate version: 0x9a0c0000
  3.  
  4. Host Machine Init:
  5. Operating System = Microsoft Windows 10 Pro (build 14393), 64-bit
  6. Physical RAM = 8129 MB
  7. CPU name = Intel(R) Core(TM) i7-3770 CPU @ 3.40GHz
  8. Vendor/Model = GenuineIntel (stepping 09)
  9. CPU speed = 3.391 ghz (8 logical threads)
  10. x86PType = Standard OEM
  11. x86Flags = bfebfbff 7fbae3ff
  12. x86EFlags = 28100000
  13.  
  14. x86 Features Detected:
  15. SSE2.. SSE3.. SSSE3.. SSE4.1.. SSE4.2.. AVX
  16.  
  17. Loading language translation databases for 'Dutch' [nl_NL]
  18. pcsx2_Main not found -- translation dictionary may be incomplete.
  19. pcsx2_Iconized not found -- translation dictionary may be incomplete.
  20. SetLanguage: Requested translation is not implemented yet.
  21. Reserving memory for recompilers...
  22.  
  23. Loading plugins...
  24. Binding GS: C:\Program Files (x86)\PCSX2 1.4.0\plugins\GSdx32-AVX.dll
  25. Binding PAD: C:\Program Files (x86)\PCSX2 1.4.0\plugins\LilyPad.dll
  26. Binding SPU2: C:\Program Files (x86)\PCSX2 1.4.0\plugins\Spu2-X.dll
  27. Binding CDVD: C:\Program Files (x86)\PCSX2 1.4.0\plugins\cdvdGigaherz.dll
  28. Binding USB: C:\Program Files (x86)\PCSX2 1.4.0\plugins\USBnull.dll
  29. Binding FW: C:\Program Files (x86)\PCSX2 1.4.0\plugins\FWnull.dll
  30. Binding DEV9: C:\Program Files (x86)\PCSX2 1.4.0\plugins\DEV9null.dll
  31. Plugins loaded successfully.
  32.  
  33. (GameDB) 9709 games on record (loaded in 156ms)
  34. (CdvdSource) HotSwapping CDVD source types from ISO to Plugin.
  35. HotSwapping to new ISO src image!
  36. HLE Notice: ELF does not have a path.
  37.  
  38.  
  39. Initializing plugins...
  40. Init GS
  41. Init PAD
  42. Init SPU2
  43. Init CDVD
  44. Init USB
  45. Init FW
  46. Init DEV9
  47. Plugins initialized successfully.
  48.  
  49. Patches: No CRC found, using 00000000 instead.
  50. Opening plugins...
  51. Opening GS
  52. Opening PAD
  53. Opening SPU2
  54. Current Renderer: Direct3D9 (Software mode)
  55. AMD Radeon R9 200 Series (21.19.384.0)
  56. Opening CDVD
  57. isoFile open ok: H:\PS2\CHEAT\CodeBreaker v10.iso
  58. Image type = DVD
  59. * CDVD Disk Open: DVD, Single layer or unknown:
  60. * * Track 1: Data (Mode 1) (612048 sectors)
  61. Opening USB
  62. Opening FW
  63. Opening DEV9
  64. GSdx Lookup CRC:0
  65. McdSlot 0 [File]: C:\Program Files (x86)\PCSX2 1.4.0\memcards\Mcd001.ps2
  66. McdSlot 1 [File]: C:\Program Files (x86)\PCSX2 1.4.0\memcards\Mcd002.ps2
  67. Plugins opened successfully.
  68. EE/iR5900-32 Recompiler Reset
  69. Bios Found: Europe v02.00(14/06/2004) Console
  70. Patches: No CRC found, using 00000000 instead.
  71. (SYSTEM.CNF) Detected PS2 Disc = cdrom0:\SLUS_203.44;1
  72. (SYSTEM.CNF) Software version = 1.04
  73. (SYSTEM.CNF) Disc region type = PAL/NTSC
  74. type: executable
  75. machine: mips_rs3000
  76. version: 1
  77. entry: 01000008
  78. flags: 20924001
  79. eh size: 00000034
  80. ph off: 00000034
  81. ph entsiz: 00000020
  82. ph num: 00000001
  83. sh off: 0038474c
  84. sh entsiz: 00000028
  85. sh num: 00000009
  86. sh strndx: 00000008
  87.  
  88.  
  89. Elf32 Program Header
  90. type:
  91. load
  92.  
  93.  
  94. offset: 00001000
  95. vaddr: 01000000
  96. paddr: 01000000
  97. file size: 0038363a
  98. mem size: 00385710
  99. flags: 00000007
  100. palign: 00001000
  101.  
  102.  
  103. ELF32 Section Header [0]
  104.  
  105.  
  106. type: null
  107. flags: 00000000
  108. addr: 00000000
  109. offset: 00000000
  110. size: 00000000
  111. link: 00000000
  112. info: 00000000
  113. addralign: 00000000
  114. entsize: 00000000
  115. ELF32 Section Header [1] .text
  116.  
  117.  
  118. type: progbits
  119. flags: 00000006
  120. addr: 01000000
  121. offset: 00001000
  122. size: 000108b8
  123. link: 00000000
  124. info: 00000000
  125. addralign: 00000010
  126. entsize: 00000000
  127. ELF32 Section Header [2] .reginfo
  128.  
  129.  
  130. type: unknown 70000006
  131. type: (null)
  132. flags: 00000000
  133. addr: 010108b8
  134. offset: 003846e8
  135. size: 00000018
  136. link: 00000000
  137. info: 00000000
  138. addralign: 00000004
  139. entsize: 00000001
  140. ELF32 Section Header [3] .data
  141.  
  142.  
  143. type: progbits
  144. flags: 00000003
  145. addr: 01010900
  146. offset: 00011900
  147. size: 00372374
  148. link: 00000000
  149. info: 00000000
  150. addralign: 00000040
  151. entsize: 00000000
  152. ELF32 Section Header [4] .rodata
  153.  
  154.  
  155. type: progbits
  156. flags: 00000002
  157. addr: 01382c80
  158. offset: 00383c80
  159. size: 000008e0
  160. link: 00000000
  161. info: 00000000
  162. addralign: 00000010
  163. entsize: 00000000
  164. ELF32 Section Header [5] .sdata
  165.  
  166.  
  167. type: progbits
  168. flags: 10000003
  169. addr: 01383580
  170. offset: 00384580
  171. size: 000000ba
  172. link: 00000000
  173. info: 00000000
  174. addralign: 00000008
  175. entsize: 00000000
  176. ELF32 Section Header [6] .sbss
  177.  
  178.  
  179. type: no bits
  180. flags: 10000003
  181. addr: 01383680
  182. offset: 00384680
  183. size: 00000018
  184. link: 00000000
  185. info: 00000000
  186. addralign: 00000008
  187. entsize: 00000000
  188. ELF32 Section Header [7] .bss
  189.  
  190.  
  191. type: no bits
  192. flags: 00000003
  193. addr: 01383700
  194. offset: 003846e8
  195. size: 00002010
  196. link: 00000000
  197. info: 00000000
  198. addralign: 00000040
  199. entsize: 00000000
  200. ELF32 Section Header [8] .shstrtab
  201.  
  202.  
  203. type: strtab
  204. flags: 00000000
  205. addr: 00000000
  206. offset: 00384700
  207. size: 0000004a
  208. link: 00000000
  209. info: 00000000
  210. addralign: 00000001
  211. entsize: 00000000
  212. ELF (cdrom0:\SLUS_203.44;1) Game CRC = 0x5207CCA3, EntryPoint = 0x01000008
  213. (SYSTEM.CNF) Detected PS2 Disc = cdrom0:\SLUS_203.44;1
  214. (SYSTEM.CNF) Software version = 1.04
  215. (SYSTEM.CNF) Disc region type = PAL/NTSC
  216. Elf entry point @ 0x01000008 about to get recompiled. Load patches first.
  217. Overall 0 Widescreen hacks loaded
  218. (Wide Screen Cheats DB) Patches Loaded: 0
  219. GSdx Lookup CRC:5207CCA3
  220. (UpdateVSyncRate) Mode Changed to NTSC.
  221. (UpdateVSyncRate) FPS Limit Changed : 59.94 fps
  222. HotSwapping to new ISO src image!
  223. Closing CDVD
  224. Opening plugins...
  225. Opening CDVD
  226. isoFile open ok: H:\PS2\NTSC\SMTNOCTURNE.ISO
  227. Image type = DVD
  228. * CDVD Disk Open: DVD, Single layer or unknown:
  229. * * Track 1: Data (Mode 1) (2085072 sectors)
  230. Plugins opened successfully.
  231. (SYSTEM.CNF) Detected PS2 Disc = cdrom0:\SLUS_209.11;1
  232. (SYSTEM.CNF) Software version = 1.01
  233. (SYSTEM.CNF) Disc region type = NTSC
  234. type: executable
  235. machine: mips_rs3000
  236. version: 1
  237. entry: 00100008
  238. flags: 20924001
  239. eh size: 00000034
  240. ph off: 00000034
  241. ph entsiz: 00000020
  242. ph num: 00000003
  243. sh off: 00456fb0
  244. sh entsiz: 00000028
  245. sh num: 0000001c
  246. sh strndx: 0000001b
  247.  
  248.  
  249. Elf32 Program Header
  250. type:
  251. unknown 70000000
  252.  
  253.  
  254. offset: 001f6610
  255. vaddr: 002f5610
  256. paddr: 002f5610
  257. file size: 00000018
  258. mem size: 00000018
  259. flags: 00000004
  260. palign: 00000004
  261.  
  262.  
  263. Elf32 Program Header
  264. type:
  265. load
  266.  
  267.  
  268. offset: 00001000
  269. vaddr: 00100000
  270. paddr: 00100000
  271. file size: 001f5628
  272. mem size: 001f5628
  273. flags: 00000007
  274. palign: 00001000
  275.  
  276.  
  277. Elf32 Program Header
  278. type:
  279. load
  280.  
  281.  
  282. offset: 001f6680
  283. vaddr: 002f5680
  284. paddr: 002f5680
  285. file size: 0025c4d5
  286. mem size: 002aacb0
  287. flags: 00000006
  288. palign: 00001000
  289.  
  290.  
  291. ELF32 Section Header [0]
  292.  
  293.  
  294. type: null
  295. flags: 00000000
  296. addr: 00000000
  297. offset: 00000000
  298. size: 00000000
  299. link: 00000000
  300. info: 00000000
  301. addralign: 00000000
  302. entsize: 00000000
  303. ELF32 Section Header [1] .text
  304.  
  305.  
  306. type: progbits
  307. flags: 00000006
  308. addr: 00100000
  309. offset: 00001000
  310. size: 001e6e44
  311. link: 00000000
  312. info: 00000000
  313. addralign: 00000040
  314. entsize: 00000000
  315. ELF32 Section Header [2] .vutext
  316.  
  317.  
  318. type: progbits
  319. flags: 00000006
  320. addr: 002e6e50
  321. offset: 001e7e50
  322. size: 0000e7b0
  323. link: 00000000
  324. info: 00000000
  325. addralign: 00000010
  326. entsize: 00000000
  327. ELF32 Section Header [3] .ctors
  328.  
  329.  
  330. type: progbits
  331. flags: 00000003
  332. addr: 002f5600
  333. offset: 001f6600
  334. size: 00000008
  335. link: 00000000
  336. info: 00000000
  337. addralign: 00000004
  338. entsize: 00000000
  339. ELF32 Section Header [4] .dtors
  340.  
  341.  
  342. type: progbits
  343. flags: 00000003
  344. addr: 002f5608
  345. offset: 001f6608
  346. size: 00000008
  347. link: 00000000
  348. info: 00000000
  349. addralign: 00000004
  350. entsize: 00000000
  351. ELF32 Section Header [5] .reginfo
  352.  
  353.  
  354. type: unknown 70000006
  355. type: (null)
  356. flags: 00000002
  357. addr: 002f5610
  358. offset: 001f6610
  359. size: 00000018
  360. link: 00000000
  361. info: 00000000
  362. addralign: 00000004
  363. entsize: 00000001
  364. ELF32 Section Header [6] .data
  365.  
  366.  
  367. type: progbits
  368. flags: 00000003
  369. addr: 002f5680
  370. offset: 001f6680
  371. size: 002382bc
  372. link: 00000000
  373. info: 00000000
  374. addralign: 00000040
  375. entsize: 00000000
  376. ELF32 Section Header [7] .eh_frame
  377.  
  378.  
  379. type: progbits
  380. flags: 00000003
  381. addr: 0052d940
  382. offset: 0042e940
  383. size: 00000004
  384. link: 00000000
  385. info: 00000000
  386. addralign: 00000008
  387. entsize: 00000000
  388. ELF32 Section Header [8] .vudata
  389.  
  390.  
  391. type: progbits
  392. flags: 00000003
  393. addr: 0052d944
  394. offset: 0042e944
  395. size: 00000300
  396. link: 00000000
  397. info: 00000000
  398. addralign: 00000001
  399. entsize: 00000000
  400. ELF32 Section Header [9] .rodata
  401.  
  402.  
  403. type: progbits
  404. flags: 00000002
  405. addr: 0052dc80
  406. offset: 0042ec80
  407. size: 0001e4f8
  408. link: 00000000
  409. info: 00000000
  410. addralign: 00000010
  411. entsize: 00000000
  412. ELF32 Section Header [a] .lit4
  413.  
  414.  
  415. type: progbits
  416. flags: 10000003
  417. addr: 0054c180
  418. offset: 0044d180
  419. size: 00002654
  420. link: 00000000
  421. info: 00000000
  422. addralign: 00000004
  423. entsize: 00000000
  424. ELF32 Section Header [b] .sdata
  425.  
  426.  
  427. type: progbits
  428. flags: 10000003
  429. addr: 0054e800
  430. offset: 0044f800
  431. size: 00003355
  432. link: 00000000
  433. info: 00000000
  434. addralign: 00000010
  435. entsize: 00000000
  436. ELF32 Section Header [c] .sbss
  437.  
  438.  
  439. type: no bits
  440. flags: 10000003
  441. addr: 00551b80
  442. offset: 00452b80
  443. size: 000005fc
  444. link: 00000000
  445. info: 00000000
  446. addralign: 00000008
  447. entsize: 00000000
  448. ELF32 Section Header [d] .bss
  449.  
  450.  
  451. type: no bits
  452. flags: 00000003
  453. addr: 00552180
  454. offset: 00452b84
  455. size: 0004e1b0
  456. link: 00000000
  457. info: 00000000
  458. addralign: 00000040
  459. entsize: 00000000
  460. ELF32 Section Header [e] .vubss
  461.  
  462.  
  463. type: no bits
  464. flags: 00000003
  465. addr: 005a0330
  466. offset: 00452b84
  467. size: 00000000
  468. link: 00000000
  469. info: 00000000
  470. addralign: 00000001
  471. entsize: 00000000
  472. ELF32 Section Header [f] .mdebug.eabi64
  473.  
  474.  
  475. type: progbits
  476. flags: 00000000
  477. addr: 00000000
  478. offset: 00452b84
  479. size: 00000000
  480. link: 00000000
  481. info: 00000000
  482. addralign: 00000001
  483. entsize: 00000000
  484. ELF32 Section Header [10] .DVP.ovlytab
  485.  
  486.  
  487. type: unknown 7ffff420
  488. type: (null)
  489. flags: 00000001
  490. addr: 00000000
  491. offset: 00452b84
  492. size: 0000006c
  493. link: 00000011
  494. info: 00000000
  495. addralign: 00000004
  496. entsize: 0000000c
  497. ELF32 Section Header [11] .DVP.ovlystrtab
  498.  
  499.  
  500. type: strtab
  501. flags: 00000001
  502. addr: 00000000
  503. offset: 00452bf0
  504. size: 00000158
  505. link: 00000000
  506. info: 00000000
  507. addralign: 00000001
  508. entsize: 00000000
  509. ELF32 Section Header [12] .DVP.overlay..0x0.3830929603.16.0
  510.  
  511.  
  512. type: unknown 7ffff421
  513. type: (null)
  514. flags: 00000005
  515. addr: 00000000
  516. offset: 00452d48
  517. size: 00000588
  518. link: 00000000
  519. info: 00000000
  520. addralign: 00000001
  521. entsize: 00000000
  522. ELF32 Section Header [13] .DVP.overlay..0x0.48712974.46.0
  523.  
  524.  
  525. type: unknown 7ffff421
  526. type: (null)
  527. flags: 00000005
  528. addr: 00000000
  529. offset: 004532d0
  530. size: 00000800
  531. link: 00000000
  532. info: 00000000
  533. addralign: 00000001
  534. entsize: 00000000
  535. ELF32 Section Header [14] .DVP.overlay..unknvma.3214916938.75.1
  536.  
  537.  
  538. type: unknown 7ffff421
  539. type: (null)
  540. flags: 00000005
  541. addr: 00000000
  542. offset: 00453ad0
  543. size: 00000800
  544. link: 00000000
  545. info: 00000000
  546. addralign: 00000001
  547. entsize: 00000000
  548. ELF32 Section Header [15] .DVP.overlay..unknvma.3355168705.120.2
  549.  
  550.  
  551. type: unknown 7ffff421
  552. type: (null)
  553. flags: 00000005
  554. addr: 00000000
  555. offset: 004542d0
  556. size: 00000800
  557. link: 00000000
  558. info: 00000000
  559. addralign: 00000001
  560. entsize: 00000000
  561. ELF32 Section Header [16] .DVP.overlay..unknvma.3355168705.511.3
  562.  
  563.  
  564. type: unknown 7ffff421
  565. type: (null)
  566. flags: 00000005
  567. addr: 00000000
  568. offset: 00454ad0
  569. size: 00000800
  570. link: 00000000
  571. info: 00000000
  572. addralign: 00000001
  573. entsize: 00000000
  574. ELF32 Section Header [17] .DVP.overlay..unknvma.3355168705.1034.4
  575.  
  576.  
  577. type: unknown 7ffff421
  578. type: (null)
  579. flags: 00000005
  580. addr: 00000000
  581. offset: 004552d0
  582. size: 00000800
  583. link: 00000000
  584. info: 00000000
  585. addralign: 00000001
  586. entsize: 00000000
  587. ELF32 Section Header [18] .DVP.overlay..unknvma.3963728536.270.5
  588.  
  589.  
  590. type: unknown 7ffff421
  591. type: (null)
  592. flags: 00000005
  593. addr: 00000000
  594. offset: 00455ad0
  595. size: 00000800
  596. link: 00000000
  597. info: 00000000
  598. addralign: 00000001
  599. entsize: 00000000
  600. ELF32 Section Header [19] .DVP.overlay..unknvma.2657164303.15.6
  601.  
  602.  
  603. type: unknown 7ffff421
  604. type: (null)
  605. flags: 00000005
  606. addr: 00000000
  607. offset: 004562d0
  608. size: 00000800
  609. link: 00000000
  610. info: 00000000
  611. addralign: 00000001
  612. entsize: 00000000
  613. ELF32 Section Header [1a] .DVP.overlay..unknvma.2657164303.410.7
  614.  
  615.  
  616. type: unknown 7ffff421
  617. type: (null)
  618. flags: 00000005
  619. addr: 00000000
  620. offset: 00456ad0
  621. size: 000002e0
  622. link: 00000000
  623. info: 00000000
  624. addralign: 00000001
  625. entsize: 00000000
  626. ELF32 Section Header [1b] .shstrtab
  627.  
  628.  
  629. type: strtab
  630. flags: 00000000
  631. addr: 00000000
  632. offset: 00456db0
  633. size: 000001fd
  634. link: 00000000
  635. info: 00000000
  636. addralign: 00000001
  637. entsize: 00000000
  638. ELF (cdrom0:\SLUS_209.11;1) Game CRC = 0xE8FCF8EC, EntryPoint = 0x00100008
  639. (GameDB) Changing EE/FPU roundmode to 0 [N]
  640. Found Widescreen hacks file: 'E8FCF8EC.pnach'
  641. comment: Widescreen Hack.
  642. Loaded 1 Widescreen hacks from 'E8FCF8EC.pnach' at 'C:\Program Files (x86)\PCSX2 1.4.0\cheats_ws'
  643. Overall 1 Widescreen hacks loaded
  644. Found ws patches at cheats_ws --> skipping cheats_ws.zip
Advertisement
RAW Paste Data Copied
Advertisement