Guest User

osronline skse minidump

a guest
Jul 12th, 2017
95
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.73 KB | None | 0 0
  1. Instant Online Crash Analysis, brought to you by OSR Open Systems Resources, Inc.
  2.  
  3. Show DivPrimary Analysis
  4.  
  5. Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
  6. Online Crash Dump Analysis Service
  7. See http://www.osronline.com for more information
  8. Windows 7 Version 7601 (Service Pack 1) MP (8 procs) Free x86 compatible
  9. Product: WinNt, suite: SingleUserTS
  10. kernel32.dll version: 6.1.7601.23807 (win7sp1_ldr.170512-0600)
  11. Machine Name:
  12. Debug session time: Wed Jul 12 02:09:17.000 2017 (UTC - 4:00)
  13. System Uptime: not available
  14. Process Uptime: 0 days 0:00:31.000
  15. Kernel time: 0 days 0:00:06.000
  16. User time: 0 days 0:00:27.000
  17. TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\oca.ini, error 2
  18. TRIAGER: Could not open triage file : e:\dump_analysis\program\winxp\triage.ini, error 2
  19. TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\user.ini, error 2
  20. *******************************************************************************
  21. * *
  22. * Exception Analysis *
  23. * *
  24. *******************************************************************************
  25.  
  26. TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\guids.ini, error 2
  27. *** WARNING: Unable to verify timestamp for XAudio2_6.dll
  28. *** WARNING: Unable to verify timestamp for nvd3dum.dll
  29. *** ERROR: Module load completed but symbols could not be loaded for nvd3dum.dll
  30. *** WARNING: Unable to verify timestamp for JContainers.dll
  31. *** ERROR: Module load completed but symbols could not be loaded for JContainers.dll
  32. TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
  33. GetUrlPageData2 (WinHttp) failed: 12029.
  34.  
  35. FAULTING_IP:
  36. TESV+27eeb8
  37. 0067eeb8 8b16 mov edx,dword ptr [esi]
  38.  
  39. EXCEPTION_RECORD: ffffffff -- (.exr 0xffffffffffffffff)
  40. ExceptionAddress: 0067eeb8 (TESV+0x0027eeb8)
  41. ExceptionCode: c0000005 (Access violation)
  42. ExceptionFlags: 00000000
  43. NumberParameters: 2
  44. Parameter[0]: 00000000
  45. Parameter[1]: 00000000
  46. Attempt to read from address 00000000
  47.  
  48. DEFAULT_BUCKET_ID: NULL_POINTER_READ
  49.  
  50. PROCESS_NAME: TESV.exe
  51.  
  52. ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
  53.  
  54. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
  55.  
  56. EXCEPTION_PARAMETER1: 00000000
  57.  
  58. EXCEPTION_PARAMETER2: 00000000
  59.  
  60. READ_ADDRESS: 00000000
  61.  
  62. FOLLOWUP_IP:
  63. TESV+27eeb8
  64. 0067eeb8 8b16 mov edx,dword ptr [esi]
  65.  
  66. FAULTING_THREAD: 000025d0
  67.  
  68. PRIMARY_PROBLEM_CLASS: NULL_POINTER_READ
  69.  
  70. BUGCHECK_STR: APPLICATION_FAULT_NULL_POINTER_READ
  71.  
  72. LAST_CONTROL_TRANSFER: from 00000000 to 0067eeb8
  73.  
  74. STACK_TEXT:
  75. 0018f664 00000000 0000003d 4a5f1ae8 00000005 TESV+0x27eeb8
  76.  
  77.  
  78. STACK_COMMAND: ~0s; .ecxr ; kb
  79.  
  80. SYMBOL_STACK_INDEX: 0
  81.  
  82. SYMBOL_NAME: TESV+27eeb8
  83.  
  84. FOLLOWUP_NAME: MachineOwner
  85.  
  86. MODULE_NAME: TESV
  87.  
  88. IMAGE_NAME: TESV.exe
  89.  
  90. DEBUG_FLR_IMAGE_TIMESTAMP: 51437ce5
  91.  
  92. FAILURE_BUCKET_ID: NULL_POINTER_READ_c0000005_TESV.exe!Unknown
  93.  
  94. BUCKET_ID: APPLICATION_FAULT_NULL_POINTER_READ_TESV+27eeb8
  95.  
  96. WATSON_STAGEONE_URL: http://watson.microsoft.com/StageOne/TESV_exe/1_9_32_0/51437ce5/TESV_exe/1_9_32_0/51437ce5/c0000005/0027eeb8.htm?Retriage=1
  97.  
  98. Followup: MachineOwner
  99. ---------
  100.  
  101.  
  102. This free analysis is provided by OSR Open Systems Resources, Inc.
  103. Want a deeper understanding of crash dump analysis? Check out our Windows Kernel Debugging and Crash Dump Analysis Seminar (opens in new tab/window)
Add Comment
Please, Sign In to add comment