Current time is 16:16:17 09/14/21. ===================================================================== BugCheck Dump ===================================================================== This file is generated by Microsoft SQL Server version 10.0.1600.22 upon detection of fatal unexpected error. Please return this file, the query or program that produced the bugcheck, the database and the error log, and any other pertinent information with a Service Request. Computer type is Intel(R) Xeon(R) CPU X5570 @ 2.93GHz. Bios Version is HP - 2 16 X64 level 8664, 2 Mhz processor (s). Windows NT 6.1 Build 7601 CSD Service Pack 1. Memory MemoryLoad = 12% Total Physical = 16373 MB Available Physical = 14359 MB Total Page File = 32745 MB Available Page File = 26789 MB Total Virtual = 8388607 MB Available Virtual = 8371809 MB ***Stack Dump being sent to E:\Program Files\Microsoft SQL Server\MSSQL10.MSSQLSERVER\MSSQL\LOG\SQLDump0002.txt SqlDumpExceptionHandler: Process 9 generated fatal exception c0000005 EXCEPTION_ACCESS_VIOLATION. SQL Server is t erminating this process. * ******************************************************************************* * * BEGIN STACK DUMP: * 09/14/21 16:16:17 spid 9 * * * Exception Address = 00000000034E7B88 Module(sqlservr+0000000002867B88) * Exception Code = c0000005 EXCEPTION_ACCESS_VIOLATION * Access Violation occurred reading address 0000000000000000 * * * MODULE BASE END SIZE * sqlservr 0000000000C80000 00000000044C3FFF 03844000 * ntdll 0000000077440000 00000000775DEFFF 0019f000 * kernel32 0000000077320000 000000007743EFFF 0011f000 * KERNELBASE 000007FEFD210000 000007FEFD276FFF 00067000 * SYSFER 0000000074C60000 0000000074D0DFFF 000ae000 * MSVCR80 0000000074B40000 0000000074C08FFF 000c9000 * msvcrt 000007FEFF560000 000007FEFF5FEFFF 0009f000 * MSVCP80 00000000747C0000 00000000748C8FFF 00109000 * ADVAPI32 000007FEFEF70000 000007FEFF04AFFF 000db000 * sechost 000007FEFD970000 000007FEFD98EFFF 0001f000 * RPCRT4 000007FEFE040000 000007FEFE16BFFF 0012c000 * sqlos 0000000074730000 0000000074736FFF 00007000 * USER32 0000000077220000 000000007731AFFF 000fb000 * GDI32 000007FEFEF00000 000007FEFEF66FFF 00067000 * LPK 000007FEFD430000 000007FEFD43DFFF 0000e000 * USP10 000007FEFD350000 000007FEFD41AFFF 000cb000 * CRYPT32 000007FEFCFB0000 000007FEFD11CFFF 0016d000 * MSASN1 000007FEFCF90000 000007FEFCF9EFFF 0000f000 * Secur32 000007FEFCAC0000 000007FEFCACAFFF 0000b000 * SSPICLI 000007FEFCD50000 000007FEFCD74FFF 00025000 * MSWSOCK 000007FEFC6C0000 000007FEFC714FFF 00055000 * WS2_32 000007FEFDF50000 000007FEFDF9CFFF 0004d000 * NSI 000007FEFD420000 000007FEFD427FFF 00008000 * pdh 000007FEF6BE0000 000007FEF6C2DFFF 0004e000 * SHLWAPI 000007FEFF600000 000007FEFF670FFF 00071000 * USERENV 000007FEFD120000 000007FEFD13EFFF 0001f000 * profapi 000007FEFCFA0000 000007FEFCFAEFFF 0000f000 * SHELL32 000007FEFE170000 000007FEFEEFAFFF 00d8b000 * WINMM 000007FEF6BA0000 000007FEF6BDAFFF 0003b000 * opends60 0000000074710000 0000000074717FFF 00008000 * NETAPI32 000007FEFBAA0000 000007FEFBAB5FFF 00016000 * netutils 000007FEFBA90000 000007FEFBA9BFFF 0000c000 * srvcli 000007FEFC980000 000007FEFC9A2FFF 00023000 * wkscli 000007FEFB870000 000007FEFB884FFF 00015000 * LOGONCLI 000007FEFC510000 000007FEFC53FFFF 00030000 * SAMCLI 000007FEFA3C0000 000007FEFA3D3FFF 00014000 * BatchParser 00000000746C0000 00000000746EBFFF 0002c000 * apphelp 000007FEFCD80000 000007FEFCDD6FFF 00057000 * AcXtrnal 000007FEF6730000 000007FEF6B96FFF 00467000 * api-ms-win-core-synch-l1-2-0 000007FEFCDF0000 000007FEFCDF2FFF 00003000 * IMM32 000007FEFF6E0000 000007FEFF70DFFF 0002e000 * MSCTF 000007FEFD990000 000007FEFDA9AFFF 0010b000 * psapi 00000000775F0000 00000000775F6FFF 00007000 * instapi10 0000000074720000 000000007472CFFF 0000d000 * cscapi 000007FEF6700000 000007FEF670EFFF 0000f000 * sqlevn70 00000000744C0000 00000000746BCFFF 001fd000 * CRYPTSP 000007FEFC720000 000007FEFC737FFF 00018000 * rsaenh 000007FEFC420000 000007FEFC466FFF 00047000 * CRYPTBASE 000007FEFCDE0000 000007FEFCDEEFFF 0000f000 * BROWCLI 000007FEF2820000 000007FEF2831FFF 00012000 * AUTHZ 000007FEFC940000 000007FEFC96EFFF 0002f000 * MSCOREE 000007FEF9880000 000007FEF98EEFFF 0006f000 * mscoreei 000007FEF97D0000 000007FEF9878FFF 000a9000 * ole32 000007FEFF360000 000007FEFF55EFFF 001ff000 * credssp 000007FEFC380000 000007FEFC389FFF 0000a000 * msv1_0 000007FEFC650000 000007FEFC6A1FFF 00052000 * cryptdll 000007FEFCA20000 000007FEFCA32FFF 00013000 * kerberos 000007FEFC740000 000007FEFC7F8FFF 000b9000 * schannel 000007FEFC4B0000 000007FEFC507FFF 00058000 * security 00000000744B0000 00000000744B2FFF 00003000 * OLEAUT32 000007FEFF1E0000 000007FEFF2BAFFF 000db000 * ftimport 0000000060000000 0000000060024FFF 00025000 * MSFTE 0000000049980000 0000000049D2DFFF 003ae000 * VERSION 000007FEFC050000 000007FEFC05BFFF 0000c000 * dbghelp 0000000072410000 000000007256DFFF 0015e000 * WINTRUST 000007FEFD1C0000 000007FEFD1FAFFF 0003b000 * ncrypt 000007FEFC8F0000 000007FEFC93FFFF 00050000 * bcrypt 000007FEFC8C0000 000007FEFC8E1FFF 00022000 * ntmarta 000007FEFC020000 000007FEFC04CFFF 0002d000 * WLDAP32 000007FEFF680000 000007FEFF6D1FFF 00052000 * dbghelp 0000000071970000 0000000071ACDFFF 0015e000 * * P1Home: 0000000007BCE1D0: 00000000C0000005 0000000000000000 00000000034E7B88 0000000000000002 00000000 00000000 0000000000000000 * P2Home: 0000000007BCDCE0: 0000000007BCE1D0 0000000007BCDCE0 0000000000000000 0000000000000000 00000000 00000001 FFFFFFFFFFFFFFFE * P3Home: 0000000000000000: * P4Home: 0000000000000000: * P5Home: 0000000000000001: * P6Home: FFFFFFFFFFFFFFFE: * ContextFlags: 000000000010001F: 0000000000000000 0000000000000000 0000000000000000 0000000000000000 000000 0000000000 0000000000000000 * MxCsr: 0000000000001FA0: * SegCs: 0000000000000033: * SegDs: 000000000000002B: * SegEs: 000000000000002B: * SegFs: 0000000000000053: * SegGs: 000000000000002B: * SegSs: 000000000000002B: * EFlags: 0000000000010246: 0000000000000000 0000000101580000 0000000102680000 0000000102780000 00000000 00000000 0000001000000000 * Rax: 0000000000000000: * Rcx: 0000000000000000: * Rdx: 0000000000000000: * Rbx: 0000000000000000: * Rsp: 0000000007BCE2A0: 0000000000000000 0000000000000000 00000000806D0240 00000000806BD070 00000000 00000000 00000000034E81C8 * Rbp: 0000000000001DB3: * Rsi: 0000000000000001: * Rdi: 0000000003E32B90: 0050005C003A0045 00720067006F0072 00460020006D0061 00730065006C0069 00630069 004D005C 006F0073006F0072 * R8: 0000000000000000: * R9: 00000000001A6240: 00000000001A02A0 00000000006E0240 0000000000000001 00000000001A2088 00000050 00000001 0000000000000100 * R10: 0000000000000000: * R11: 0000000007BCE090: 0000000000000001 0000000008EE0080 00000000009E21A0 0000000000000008 00000000 03E32B90 000000000255A5AC * R12: 0000000000000008: * R13: 00000000009E21A0: 0000000000000000 0000000000000000 00000000009E01B0 00000000009EA1B0 00000000 00000001 00000000001A2190 * R14: 0000000008EE0080: 0000000000000000 0000000000000000 0000000008EE0080 0A00064000640001 3400D008 00000000 0000000000020000 * R15: 0000000000000001: * Rip: 00000000034E7B88: 38244C8D4C018B48 E81850FF05508D41 D88BC085FFFF9D14 E80000758DB90C79 8348C38B FEC64B94 90909090C35B20C4 * ******************************************************************************* * ------------------------------------------------------------------------------- * Short Stack Dump 00000000034E7B88 Module(sqlservr+0000000002867B88) 00000000034E81C8 Module(sqlservr+00000000028681C8) 00000000034E87C5 Module(sqlservr+00000000028687C5) 00000000034EB0A1 Module(sqlservr+000000000286B0A1)