SHARE
TWEET

Untitled

a guest Feb 14th, 2020 91 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1.  
  2. Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5.  
  6. Loading Dump File [C:\Users\ritha\Documents\My Games\Skyrim\SKSE\Crashdumps\2020-02-15_00.35.17.dmp]
  7. User Mini Dump File: Only registers, stack and portions of memory are available
  8.  
  9. WARNING: Minidump contains unknown stream type 0x15
  10. WARNING: Minidump contains unknown stream type 0x16
  11. Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
  12. Executable search path is:
  13. Windows 7 Version 18362 MP (16 procs) Free x86 compatible
  14. Product: WinNt, suite: SingleUserTS
  15. Machine Name:
  16. Debug session time: Fri Feb 14 17:36:59.000 2020 (UTC - 7:00)
  17. System Uptime: not available
  18. Process Uptime: 0 days 0:01:43.000
  19. ................................................................
  20. ................................................................
  21. ......................................
  22. This dump file has an exception of interest stored in it.
  23. The stored exception information can be accessed via .ecxr.
  24. (392c.ab4): Access violation - code c0000005 (first/second chance not available)
  25. eax=00000000 ebx=56a31048 ecx=0000716b edx=00000003 esi=56a30ff8 edi=56a31008
  26. eip=77a02c4c esp=0019d570 ebp=0019d57c iopl=0         nv up ei pl nz ac po nc
  27. cs=0023  ss=002b  ds=002b  es=002b  fs=0053  gs=002b             efl=00000212
  28. ntdll!ZwGetContextThread+0xc:
  29. 77a02c4c c20800          ret     8
  30. 0:000> !analyze -v
  31. *******************************************************************************
  32. *                                                                             *
  33. *                        Exception Analysis                                   *
  34. *                                                                             *
  35. *******************************************************************************
  36.  
  37. Unable to load image F:\Steam\steamapps\common\Skyrim\data\SKSE\Plugins\hdtHighHeelNative.dll, Win32 error 0n2
  38. *** WARNING: Unable to verify timestamp for hdtHighHeelNative.dll
  39. *** ERROR: Module load completed but symbols could not be loaded for hdtHighHeelNative.dll
  40. *** ERROR: Symbol file could not be found.  Defaulted to export symbols for nvd3dum.dll -
  41. *** WARNING: Unable to verify checksum for d3d9.dll
  42. *** ERROR: Symbol file could not be found.  Defaulted to export symbols for d3d9.dll -
  43. Failed calling InternetOpenUrl, GLE=12029
  44.  
  45. FAULTING_IP:
  46. TESV+b52ecc
  47. 00f52ecc 8807            mov     byte ptr [edi],al
  48.  
  49. EXCEPTION_RECORD:  ffffffff -- (.exr 0xffffffffffffffff)
  50. ExceptionAddress: 00f52ecc (TESV+0x00b52ecc)
  51.    ExceptionCode: c0000005 (Access violation)
  52.   ExceptionFlags: 00000000
  53. NumberParameters: 2
  54.    Parameter[0]: 00000001
  55.    Parameter[1]: 6b6fa719
  56. Attempt to write to address 6b6fa719
  57.  
  58. PROCESS_NAME:  TESV.exe
  59.  
  60. ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  61.  
  62. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
  63.  
  64. EXCEPTION_PARAMETER1:  00000001
  65.  
  66. EXCEPTION_PARAMETER2:  6b6fa719
  67.  
  68. WRITE_ADDRESS:  6b6fa719
  69.  
  70. FOLLOWUP_IP:
  71. TESV+b52ecc
  72. 00f52ecc 8807            mov     byte ptr [edi],al
  73.  
  74. MOD_LIST: <ANALYSIS/>
  75.  
  76. CHKIMG_EXTENSION: !chkimg -lo 50 -d !TESV
  77.     00f52e4c-00f52efa  175 bytes - TESV+b52e4c
  78.     [ 1f 1c 7d 93 8d 5e 37 81:a4 01 00 00 81 f9 00 01 ]
  79.     00f52efc-00f52f4b  80 bytes - TESV+b52efc (+0xb0)
  80.     [ 2b e4 cd 61 94 93 3d 67:01 c1 e9 02 88 47 01 83 ]
  81. 255 errors : !TESV (00f52e4c-00f52f4b)
  82.  
  83. FAULTING_THREAD:  00000ab4
  84.  
  85. BUGCHECK_STR:  APPLICATION_FAULT_MEMORY_CORRUPTION_INVALID_POINTER_WRITE_LARGE
  86.  
  87. PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_LARGE
  88.  
  89. DEFAULT_BUCKET_ID:  MEMORY_CORRUPTION_LARGE
  90.  
  91. LAST_CONTROL_TRANSFER:  from 00b29ab1 to 00f52ecc
  92.  
  93. STACK_TEXT:  
  94. WARNING: Stack unwind information not available. Following frames may be wrong.
  95. 0019ef28 00b29ab1 6b6fa719 16e7868c 0000716e TESV+0xb52ecc
  96. 0019ef2c 6b6fa719 16e7868c 0000716e 397a1024 TESV+0x729ab1
  97. 0019ef30 16e7868c 0000716e 397a1024 6b6fa719 0x6b6fa719
  98. 0019ef34 00000000 397a1024 6b6fa719 0000716e 0x16e7868c
  99.  
  100.  
  101. STACK_COMMAND:  ~0s; .ecxr ; kb
  102.  
  103. SYMBOL_NAME:  memory_corruption!TESV
  104.  
  105. FOLLOWUP_NAME:  MachineOwner
  106.  
  107. MODULE_NAME: memory_corruption
  108.  
  109. IMAGE_NAME:  memory_corruption
  110.  
  111. DEBUG_FLR_IMAGE_TIMESTAMP:  0
  112.  
  113. FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE_c0000005_memory_corruption!TESV
  114.  
  115. BUCKET_ID:  APPLICATION_FAULT_MEMORY_CORRUPTION_INVALID_POINTER_WRITE_LARGE_memory_corruption!TESV
  116.  
  117. WATSON_STAGEONE_URL:  http://watson.microsoft.com/StageOne/TESV_exe/1_9_32_0/51437ce5/TESV_exe/1_9_32_0/51437ce5/c0000005/00b52ecc.htm?Retriage=1
  118.  
  119. Followup: MachineOwner
  120. ---------
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
Top