Current time is 13:13:45 04/08/21. ===================================================================== BugCheck Dump ===================================================================== This file is generated by Microsoft SQL Server version 10.0.1600.22 upon detection of fatal unexpected error. Please return this file, the query or program that produced the bugcheck, the database and the error log, and any other pertinent information with a Service Request. Computer type is Intel(R) Xeon(R) CPU X5570 @ 2.93GHz. Bios Version is HP - 2 16 X64 level 8664, 2 Mhz processor (s). Windows NT 6.1 Build 7601 CSD Service Pack 1. Memory MemoryLoad = 12% Total Physical = 16373 MB Available Physical = 14331 MB Total Page File = 32745 MB Available Page File = 26745 MB Total Virtual = 8388607 MB Available Virtual = 8371810 MB ***Stack Dump being sent to E:\Program Files\Microsoft SQL Server\MSSQL10.MSSQLSERVER\MSSQL\LOG\SQLDump0001.txt SqlDumpExceptionHandler: Process 9 generated fatal exception c0000005 EXCEPTION_ACCESS_VIOLATION. SQL Server is t erminating this process. * ******************************************************************************* * * BEGIN STACK DUMP: * 04/08/21 13:13:45 spid 9 * * * Exception Address = 0000000002D17B88 Module(sqlservr+0000000002867B88) * Exception Code = c0000005 EXCEPTION_ACCESS_VIOLATION * Access Violation occurred reading address 0000000000000000 * * * MODULE BASE END SIZE * sqlservr 00000000004B0000 0000000003CF3FFF 03844000 * ntdll 0000000077CA0000 0000000077E3EFFF 0019f000 * kernel32 0000000077B80000 0000000077C9EFFF 0011f000 * KERNELBASE 000007FEFDB40000 000007FEFDBA6FFF 00067000 * SYSFER 00000000754D0000 0000000075564FFF 00095000 * ADVAPI32 000007FEFF060000 000007FEFF13AFFF 000db000 * msvcrt 000007FEFE940000 000007FEFE9DEFFF 0009f000 * sechost 000007FEFE9E0000 000007FEFE9FEFFF 0001f000 * RPCRT4 000007FEFEA80000 000007FEFEBABFFF 0012c000 * MSVCR80 00000000753B0000 0000000075478FFF 000c9000 * MSVCP80 0000000075030000 0000000075138FFF 00109000 * sqlos 0000000074FA0000 0000000074FA6FFF 00007000 * USER32 0000000077A80000 0000000077B7AFFF 000fb000 * GDI32 000007FEFF890000 000007FEFF8F6FFF 00067000 * LPK 000007FEFF5B0000 000007FEFF5BDFFF 0000e000 * USP10 000007FEFF140000 000007FEFF20AFFF 000cb000 * CRYPT32 000007FEFD8E0000 000007FEFDA4CFFF 0016d000 * MSASN1 000007FEFD7F0000 000007FEFD7FEFFF 0000f000 * Secur32 000007FEFD430000 000007FEFD43AFFF 0000b000 * SSPICLI 000007FEFD5F0000 000007FEFD614FFF 00025000 * MSWSOCK 000007FEFCF30000 000007FEFCF84FFF 00055000 * WS2_32 000007FEFF010000 000007FEFF05CFFF 0004d000 * NSI 000007FEFEBB0000 000007FEFEBB7FFF 00008000 * pdh 000007FEF7440000 000007FEF748DFFF 0004e000 * SHLWAPI 000007FEFF530000 000007FEFF5A0FFF 00071000 * USERENV 000007FEFDAE0000 000007FEFDAFEFFF 0001f000 * profapi 000007FEFD800000 000007FEFD80EFFF 0000f000 * SHELL32 000007FEFDBB0000 000007FEFE93AFFF 00d8b000 * WINMM 000007FEF7400000 000007FEF743AFFF 0003b000 * opends60 0000000074F90000 0000000074F97FFF 00008000 * NETAPI32 000007FEFC0B0000 000007FEFC0C5FFF 00016000 * netutils 000007FEFC0A0000 000007FEFC0ABFFF 0000c000 * srvcli 000007FEFD2C0000 000007FEFD2E2FFF 00023000 * wkscli 000007FEFBE60000 000007FEFBE74FFF 00015000 * LOGONCLI 000007FEFCD80000 000007FEFCDAFFFF 00030000 * SAMCLI 000007FEFA7E0000 000007FEFA7F3FFF 00014000 * BatchParser 0000000074F60000 0000000074F8BFFF 0002c000 * apphelp 000007FEFD630000 000007FEFD686FFF 00057000 * AcXtrnal 000007FEF6F90000 000007FEF73F6FFF 00467000 * IMM32 000007FEFF370000 000007FEFF39DFFF 0002e000 * MSCTF 000007FEFEE60000 000007FEFEF6AFFF 0010b000 * psapi 0000000077E40000 0000000077E46FFF 00007000 * instapi10 0000000074F50000 0000000074F5CFFF 0000d000 * cscapi 000007FEF6F60000 000007FEF6F6EFFF 0000f000 * sqlevn70 0000000074D30000 0000000074F2CFFF 001fd000 * CRYPTSP 000007FEFCF90000 000007FEFCFA7FFF 00018000 * rsaenh 000007FEFCC90000 000007FEFCCD6FFF 00047000 * CRYPTBASE 000007FEFD690000 000007FEFD69EFFF 0000f000 * BROWCLI 000007FEF0380000 000007FEF0391FFF 00012000 * AUTHZ 000007FEFD1B0000 000007FEFD1DEFFF 0002f000 * MSCOREE 000007FEFA110000 000007FEFA17EFFF 0006f000 * mscoreei 000007FEFA060000 000007FEFA108FFF 000a9000 * api-ms-win-core-synch-l1-2-0 000007FEFA030000 000007FEFA032FFF 00003000 * ole32 000007FEFEC60000 000007FEFEE5EFFF 001ff000 * credssp 000007FEFCBF0000 000007FEFCBF9FFF 0000a000 * msv1_0 000007FEFCEC0000 000007FEFCF11FFF 00052000 * cryptdll 000007FEFD2A0000 000007FEFD2B2FFF 00013000 * kerberos 000007FEFCFB0000 000007FEFD068FFF 000b9000 * schannel 000007FEFCD20000 000007FEFCD77FFF 00058000 * security 0000000074D20000 0000000074D22FFF 00003000 * OLEAUT32 000007FEFF210000 000007FEFF2EAFFF 000db000 * ftimport 0000000060000000 0000000060024FFF 00025000 * MSFTE 0000000049980000 0000000049D2DFFF 003ae000 * VERSION 000007FEFC8C0000 000007FEFC8CBFFF 0000c000 * dbghelp 00000000709B0000 0000000070B0DFFF 0015e000 * WINTRUST 000007FEFDB00000 000007FEFDB3AFFF 0003b000 * ncrypt 000007FEFD160000 000007FEFD1AFFFF 00050000 * bcrypt 000007FEFD130000 000007FEFD151FFF 00022000 * ntmarta 000007FEFC890000 000007FEFC8BCFFF 0002d000 * WLDAP32 000007FEFEA00000 000007FEFEA51FFF 00052000 * dbghelp 0000000070820000 000000007097DFFF 0015e000 * * P1Home: 0000000007FCE150: 00000000C0000005 0000000000000000 0000000002D17B88 0000000000000002 00000000 00000000 0000000000000000 * P2Home: 0000000007FCDC60: 0000000007FCE150 0000000007FCDC60 0000000000000000 0000000000000000 00000000 00000001 FFFFFFFFFFFFFFFE * P3Home: 0000000000000000: * P4Home: 0000000000000000: * P5Home: 0000000000000001: * P6Home: FFFFFFFFFFFFFFFE: * ContextFlags: 000000000010001F: * MxCsr: 0000000000001FA0: * SegCs: 0000000000000033: * SegDs: 000000000000002B: * SegEs: 000000000000002B: * SegFs: 0000000000000053: * SegGs: 000000000000002B: * SegSs: 000000000000002B: * EFlags: 0000000000010246: 0000000000000000 0000000101580000 0000000102680000 0000000102780000 00000000 00000000 0000001000000000 * Rax: 0000000000000000: * Rcx: 0000000000000000: * Rdx: 0000000000000000: * Rbx: 0000000000000000: * Rsp: 0000000007FCE220: 0000000000000000 0000000000000000 0000000080734240 000000008071B130 00000000 00000000 0000000002D181C8 * Rbp: 0000000000001DB3: * Rsi: 0000000000000001: * Rdi: 0000000003662B90: 0050005C003A0045 00720067006F0072 00460020006D0061 00730065006C0069 00630069 004D005C 006F0073006F0072 * R8: 0000000000000000: * R9: 00000000004A6240: 00000000004A02A0 0000000003D40240 0000000000000001 00000000004A2088 00000050 00000001 0000000000000100 * R10: 0000000000000000: * R11: 0000000007FCE010: 0000000000000001 0000000008990080 0000000003D721A0 0000000000000008 00000000 03662B90 0000000001D8A5AC * R12: 0000000000000008: * R13: 0000000003D721A0: 0000000000000000 0000000000000000 0000000003D701B0 0000000003D7A1B0 00000000 00000001 00000000004A2190 * R14: 0000000008990080: 0000000000000000 0000000000000000 0000000008990080 0A00064000640001 3400D008 00000000 0000000000020000 * R15: 0000000000000001: * Rip: 0000000002D17B88: 38244C8D4C018B48 E81850FF05508D41 D88BC085FFFF9D14 E80000758DB90C79 8348C38B FEC64B94 90909090C35B20C4 * ******************************************************************************* * ------------------------------------------------------------------------------- * Short Stack Dump