Finally, my computer systems class has real world usefulness!
Registers:
EAX=0x00000000, EBX=0x00000000, ECX=0x0000003e, EDX=0x45ef6140
ESP=0x47e0f628, EBP=0x47e0f648, ESI=0x00000000, EDI=0x45ef6000
EIP=0x5d587c1f, EFLAGS=0x00010202
Top of Stack: (sp=0x47e0f628)
0x47e0f628: 45ef6000 47e0f66c 00000000 40789000
0x47e0f638: 1ac28330 00000000 00000000 40789000
0x47e0f648: 47e0f678 02773a2f 45ef6140 47e0f66c
0x47e0f658: 00000000 00000000 0000003e 00000000
0x47e0f668: 00000000 1a35f3d8 00000000 00000000
0x47e0f678: 47e0f89c 027c7ffc 00000000 00000000
0x47e0f688: 47133380 00000000 00000000 40000000
0x47e0f698: 47e0f6c8 02770a2b 1ac1ee28 00000001
Instructions: (pc=0x5d587c1f)
0x5d587bff: d1 8b c7 5f 8b d6 5e 5b 8b e5 5d c2 14 00 cc cc
0x5d587c0f: cc 55 8b ec 83 e4 f8 83 ec 14 53 56 8b 75 10 57
0x5d587c1f: 8a 46 04 8b 7e 0c 84 c0 75 0f 81 c7 58 4a 2a 00
0x5d587c2f: 84 c0 75 05 8b 46 14 eb 03 8b 46 10 8b 5d 08 ff
Register to memory mapping:
EAX=0x00000000 is an unknown value
EBX=0x00000000 is an unknown value
ECX=0x0000003e is an unknown value
EDX=0x45ef6140 is an unknown value
ESP=0x47e0f628 is pointing into the stack for thread: 0x45ef6000
EBP=0x47e0f648 is pointing into the stack for thread: 0x45ef6000
ESI=0x00000000 is an unknown value
EDI=0x45ef6000 is a thread
If you were building an app in a lower level language like c or even assembly, this error file would be useful. It tells us what the 8 registers of your computer held when the program crashed, what was on top of the stack, and where in the stack ESP and EBP were pointing to.