Below is the data from the error log:
* -------------------------------------------------------------------------------
2002-08-26 10:04:24.78 spid57 Using 'dbghelp.dll' version '4.0.5'
*Stack Dump being sent to D:\Program Files\Microsoft SQL Server\MSSQL\log\SQL02124.dmp
2002-08-26 10:04:24.79 spid57 Error: 0, Severity: 19, State: 0
2002-08-26 10:04:24.79 spid57 SqlDumpExceptionHandler: Process 57 generated fatal exception c0000005 EXCEPTION_ACCESS_VIOLATION. SQL Server is terminating this process..
* *******************************************************************************
*
* BEGIN STACK DUMP:
* 08/26/02 10:04:24 spid 57
*
* Exception Address = 00401EA0 (RecBase::Resize + 00000005 Line 0+00000000)
* Exception Code = c0000005 EXCEPTION_ACCESS_VIOLATION
* Access Violation occurred reading address 00000000
* q d 0c 01 00 00 01 00 00 71 00 00 00 00 00 00 00 07 64 07
* , 00 00 00 00 00 00 e0 03 00 00 2c 01 00 00 09 04 00 00
* V h x . 56 00 09 00 68 00 08 00 78 00 06 00 84 00 2e 00 e0 00
* î 07 00 00 00 00 00 ee 00 04 00 f6 00 00 00 f6 00 0b 00
* P ì¯ C I 00 50 8b ec af 83 00 00 00 00 0c 01 00 00 43 00 49 00
* N C A S E 0 1 s c 4e 00 43 00 41 00 53 00 45 00 30 00 31 00 73 00 63 00
* h u e l l e s¥ ¥ ¥ 68 00 75 00 65 00 6c 00 6c 00 65 00 73 a5 b3 a5 e3 a5
* ¥3¥ó¥M i c r o s e3 a5 33 a5 f3 a5 4d 00 69 00 63 00 72 00 6f 00 73 00
* o f t ( R ) W i 6f 00 66 00 74 00 28 00 52 00 29 00 20 00 57 00 69 00
* n d o w s ( R ) 6e 00 64 00 6f 00 77 00 73 00 20 00 28 00 52 00 29 00
* 2 0 0 0 O p e 20 00 32 00 30 00 30 00 30 00 20 00 4f 00 70 00 65 00
* r a t i n g S y 72 00 61 00 74 00 69 00 6e 00 67 00 20 00 53 00 79 00
* s t e m ( l o c a 73 00 74 00 65 00 6d 00 28 00 6c 00 6f 00 63 00 61 00
* l ) O D B C D i n 6c 00 29 00 4f 00 44 00 42 00 43 00 44 00 69 00 6e 00
* s m o r e _ C M 73 00 6d 00 6f 00 72 00 65 00 5f 00 43 00 4d 00
*
*
* MODULE BASE END SIZE
* sqlservr 00400000 00B19FFF 0071a000
* ntdll 77F80000 77FFAFFF 0007b000
* KERNEL32 77E80000 77F34FFF 000b5000
* ADVAPI32 77DB0000 77E0AFFF 0005b000
* RPCRT4 77D40000 77DAFFFF 00070000
* USER32 77E10000 77E73FFF 00064000
* GDI32 77F40000 77F7BFFF 0003c000
* OPENDS60 41060000 41065FFF 00006000
* MSVCRT 78000000 78045FFF 00046000
* UMS 41070000 4107CFFF 0000d000
* SQLSORT 42AE0000 42B6FFFF 00090000
* MSVCIRT 780A0000 780B1FFF 00012000
* sqlevn70 41080000 41086FFF 00007000
* NETAPI32 75170000 751BEFFF 0004f000
* SECUR32 77BE0000 77BEEFFF 0000f000
* NETRAP 751C0000 751C5FFF 00006000
* SAMLIB 75150000 7515FFFF 00010000
* WS2_32 75030000 75042FFF 00013000
* WS2HELP 75020000 75027FFF 00008000
* WLDAP32 77950000 77978FFF 00029000
* DNSAPI 77980000 779A3FFF 00024000
* WSOCK32 75050000 75057FFF 00008000
* ole32 77A50000 77B45FFF 000f6000
* wmi 76110000 76113FFF 00004000
* XOLEHLP 65450000 65457FFF 00008000
* MSDTCPRX 699E0000 69A8EFFF 000af000
* MTXCLU 6A7A0000 6A7AFFFF 00010000
* VERSION 77820000 77826FFF 00007000
* LZ32 759B0000 759B5FFF 00006000
* CLUSAPI 73930000 7393FFFF 00010000
* RESUTILS 689D0000 689DCFFF 0000d000
* USERENV 77C10000 77C6CFFF 0005d000
* rnr20 785C0000 785CBFFF 0000c000
* iphlpapi 77340000 77352FFF 00013000
* ICMP 77520000 77524FFF 00005000
* MPRAPI 77320000 77336FFF 00017000
* OLEAUT32 779B0000 77A4AFFF 0009b000
* ACTIVEDS 773B0000 773DDFFF 0002e000
* ADSLDPC 77380000 773A1FFF 00022000
* RTUTILS 77830000 7783DFFF 0000e000
* SETUPAPI 77880000 7790CFFF 0008d000
* RASAPI32 774E0000 77511FFF 00032000
* RASMAN 774C0000 774D0FFF 00011000
* TAPI32 77530000 77551FFF 00022000
* COMCTL32 71780000 71809FFF 0008a000
* SHLWAPI 70BD0000 70C33FFF 00064000
* DHCPCSVC 77360000 77378FFF 00019000
* CLBCATQ 775A0000 77624FFF 00085000
* winrnr 777E0000 777E7FFF 00008000
* rasadhlp 777F0000 777F4FFF 00005000
* SSNETLIB 42CF0000 42D05FFF 00016000
* SSNMPN70 410D0000 410D5FFF 00006000
* security 75500000 75503FFF 00004000
* msafd 74FD0000 74FEEFFF 0001f000
* wshtcpip 75010000 75016FFF 00007000
* SSmsLPCn 42CD0000 42CD6FFF 00007000
* ntdsapi 77BF0000 77C00FFF 00011000
* mswsock 74FF0000 75001FFF 00012000
* kerberos 78280000 782B2FFF 00033000
* CRYPTDLL 76670000 7667DFFF 0000e000
* MSASN1 77430000 7743FFFF 00010000
* SQLFTQRY 41020000 41051FFF 00032000
* sqloledb 75370000 753E8FFF 00079000
* MSDART 3ACE0000 3AD02FFF 00023000
* comdlg32 76B30000 76B6DFFF 0003e000
* SHELL32 782F0000 78531FFF 00242000
* MSDATL3 3AD10000 3AD25FFF 00016000
* oledb32 3AFB0000 3B01EFFF 0006f000
* OLEDB32R 3B040000 3B050FFF 00011000
* msv1_0 782D0000 782EDFFF 0001e000
* xpsqlbot 42F00000 42F05FFF 00006000
* rsabase 7CA00000 7CA21FFF 00022000
* CRYPT32 77440000 774B4FFF 00075000
* xpstar 410F0000 41135FFF 00046000
* SQLRESLD 42AC0000 42AC6FFF 00007000
* SQLSVC 42C40000 42C56FFF 00017000
* ODBC32 3B240000 3B274FFF 00035000
* odbcbcp 41150000 41156FFF 00007000
* W95SCM 41140000 4114BFFF 0000c000
* SQLUNIRL 41090000 410BCFFF 0002d000
* WINSPOOL 77800000 7781CFFF 0001d000
* SHFOLDER 71A20000 71A27FFF 00008000
* odbcint 3B380000 3B395FFF 00016000
* NDDEAPI 769A0000 769A6FFF 00007000
* SQLSVC 43970000 43975FFF 00006000
* xpstar 439E0000 439E8FFF 00009000
* dbghelp 72A00000 72A2CFFF 0002d000
*
* Edi: 00000005:
* Esi: 23801674: 00000000 0000001A 00000000 00000000 00000003 00000009
* Eax: 00000000:
* Ebx: 2382FFFD: 01006000 00000007 00000000 00000000 00000100 00000000
* Ecx: 23801674: 00000000 0000001A 00000000 00000000 00000003 00000009
* Edx: 00000E00:
* Eip: 00401EA0: E183088A 04E9830E 1C6B840F 4949001A 4E8B5275 08668304
* Ebp: 3ACDDCF0: 3ACDDD04 005ACC39 00A4AEF0 3ACDDD00 3ACDEE2C 3ACDF1E8
* SegCs: 0000001B:
* EFlags: 00010246: 00720050 0067006F 00610072 0020006D 00690046 0065006C
* Esp: 3ACDDCDC: 23801674 00441CFD 00000000 00000002 23821958 3ACDDD04
* SegSs: 00000023:
* *******************************************************************************
* -------------------------------------------------------------------------------
* Short Stack Dump
* 00401EA0 Module(sqlservr+00001EA0) (RecBase::Resize+00000005)
* 00441CFD Module(sqlservr+00041CFD) (CSysScan::GetVaried+0000002A)
* 005ACC39 Module(sqlservr+001ACC39) (CUserScan::CbGroupBitmap+00000016)
* 00622033 Module(sqlservr+00222033) (SecCache::FGetFromDiskScedb+00000317)
* 0043FF36 Module(sqlservr+0003FF36) (checkdbperm+000000EF)
* 004400FF Module(sqlservr+000400FF) (usedb+0000009F)
* 00869AFA Module(sqlservr+00469AFA) (FDetermineSessionDb+000000DA)
* 004DFA73 Module(sqlservr+000DFA73) (login+00000361)
* 004DF59F Module(sqlservr+000DF59F) (process_login+0000008A)
* 004110EC Module(sqlservr+000110EC) (process_commands+000001DF)
* 41073379 Module(UMS+00003379) (ProcessWorkRequests+0000024A)
* 41073071 Module(UMS+00003071) (ThreadStartRoutine+000000BD)
* 7800A27B Module(MSVCRT+0000A27B) (beginthread+000000CE)
* 77E8758A Module(KERNEL32+0000758A) (SetFilePointer+0000018A)
* -------------------------------------------------------------------------------