• Below is the data from the error log:

    * -------------------------------------------------------------------------------

    2002-08-26 10:04:24.78 spid57 Using 'dbghelp.dll' version '4.0.5'

    *Stack Dump being sent to D:\Program Files\Microsoft SQL Server\MSSQL\log\SQL02124.dmp

    2002-08-26 10:04:24.79 spid57 Error: 0, Severity: 19, State: 0

    2002-08-26 10:04:24.79 spid57 SqlDumpExceptionHandler: Process 57 generated fatal exception c0000005 EXCEPTION_ACCESS_VIOLATION. SQL Server is terminating this process..

    * *******************************************************************************

    *

    * BEGIN STACK DUMP:

    * 08/26/02 10:04:24 spid 57

    *

    * Exception Address = 00401EA0 (RecBase::Resize + 00000005 Line 0+00000000)

    * Exception Code = c0000005 EXCEPTION_ACCESS_VIOLATION

    * Access Violation occurred reading address 00000000

    * q d 0c 01 00 00 01 00 00 71 00 00 00 00 00 00 00 07 64 07

    * , 00 00 00 00 00 00 e0 03 00 00 2c 01 00 00 09 04 00 00

    * V h x . 56 00 09 00 68 00 08 00 78 00 06 00 84 00 2e 00 e0 00

    * î 07 00 00 00 00 00 ee 00 04 00 f6 00 00 00 f6 00 0b 00

    * P ì¯ C I 00 50 8b ec af 83 00 00 00 00 0c 01 00 00 43 00 49 00

    * N C A S E 0 1 s c 4e 00 43 00 41 00 53 00 45 00 30 00 31 00 73 00 63 00

    * h u e l l e s¥ ¥ ¥ 68 00 75 00 65 00 6c 00 6c 00 65 00 73 a5 b3 a5 e3 a5

    * ¥3¥ó¥M i c r o s e3 a5 33 a5 f3 a5 4d 00 69 00 63 00 72 00 6f 00 73 00

    * o f t ( R ) W i 6f 00 66 00 74 00 28 00 52 00 29 00 20 00 57 00 69 00

    * n d o w s ( R ) 6e 00 64 00 6f 00 77 00 73 00 20 00 28 00 52 00 29 00

    * 2 0 0 0 O p e 20 00 32 00 30 00 30 00 30 00 20 00 4f 00 70 00 65 00

    * r a t i n g S y 72 00 61 00 74 00 69 00 6e 00 67 00 20 00 53 00 79 00

    * s t e m ( l o c a 73 00 74 00 65 00 6d 00 28 00 6c 00 6f 00 63 00 61 00

    * l ) O D B C D i n 6c 00 29 00 4f 00 44 00 42 00 43 00 44 00 69 00 6e 00

    * s m o r e _ C M 73 00 6d 00 6f 00 72 00 65 00 5f 00 43 00 4d 00

    *

    *

    * MODULE BASE END SIZE

    * sqlservr 00400000 00B19FFF 0071a000

    * ntdll 77F80000 77FFAFFF 0007b000

    * KERNEL32 77E80000 77F34FFF 000b5000

    * ADVAPI32 77DB0000 77E0AFFF 0005b000

    * RPCRT4 77D40000 77DAFFFF 00070000

    * USER32 77E10000 77E73FFF 00064000

    * GDI32 77F40000 77F7BFFF 0003c000

    * OPENDS60 41060000 41065FFF 00006000

    * MSVCRT 78000000 78045FFF 00046000

    * UMS 41070000 4107CFFF 0000d000

    * SQLSORT 42AE0000 42B6FFFF 00090000

    * MSVCIRT 780A0000 780B1FFF 00012000

    * sqlevn70 41080000 41086FFF 00007000

    * NETAPI32 75170000 751BEFFF 0004f000

    * SECUR32 77BE0000 77BEEFFF 0000f000

    * NETRAP 751C0000 751C5FFF 00006000

    * SAMLIB 75150000 7515FFFF 00010000

    * WS2_32 75030000 75042FFF 00013000

    * WS2HELP 75020000 75027FFF 00008000

    * WLDAP32 77950000 77978FFF 00029000

    * DNSAPI 77980000 779A3FFF 00024000

    * WSOCK32 75050000 75057FFF 00008000

    * ole32 77A50000 77B45FFF 000f6000

    * wmi 76110000 76113FFF 00004000

    * XOLEHLP 65450000 65457FFF 00008000

    * MSDTCPRX 699E0000 69A8EFFF 000af000

    * MTXCLU 6A7A0000 6A7AFFFF 00010000

    * VERSION 77820000 77826FFF 00007000

    * LZ32 759B0000 759B5FFF 00006000

    * CLUSAPI 73930000 7393FFFF 00010000

    * RESUTILS 689D0000 689DCFFF 0000d000

    * USERENV 77C10000 77C6CFFF 0005d000

    * rnr20 785C0000 785CBFFF 0000c000

    * iphlpapi 77340000 77352FFF 00013000

    * ICMP 77520000 77524FFF 00005000

    * MPRAPI 77320000 77336FFF 00017000

    * OLEAUT32 779B0000 77A4AFFF 0009b000

    * ACTIVEDS 773B0000 773DDFFF 0002e000

    * ADSLDPC 77380000 773A1FFF 00022000

    * RTUTILS 77830000 7783DFFF 0000e000

    * SETUPAPI 77880000 7790CFFF 0008d000

    * RASAPI32 774E0000 77511FFF 00032000

    * RASMAN 774C0000 774D0FFF 00011000

    * TAPI32 77530000 77551FFF 00022000

    * COMCTL32 71780000 71809FFF 0008a000

    * SHLWAPI 70BD0000 70C33FFF 00064000

    * DHCPCSVC 77360000 77378FFF 00019000

    * CLBCATQ 775A0000 77624FFF 00085000

    * winrnr 777E0000 777E7FFF 00008000

    * rasadhlp 777F0000 777F4FFF 00005000

    * SSNETLIB 42CF0000 42D05FFF 00016000

    * SSNMPN70 410D0000 410D5FFF 00006000

    * security 75500000 75503FFF 00004000

    * msafd 74FD0000 74FEEFFF 0001f000

    * wshtcpip 75010000 75016FFF 00007000

    * SSmsLPCn 42CD0000 42CD6FFF 00007000

    * ntdsapi 77BF0000 77C00FFF 00011000

    * mswsock 74FF0000 75001FFF 00012000

    * kerberos 78280000 782B2FFF 00033000

    * CRYPTDLL 76670000 7667DFFF 0000e000

    * MSASN1 77430000 7743FFFF 00010000

    * SQLFTQRY 41020000 41051FFF 00032000

    * sqloledb 75370000 753E8FFF 00079000

    * MSDART 3ACE0000 3AD02FFF 00023000

    * comdlg32 76B30000 76B6DFFF 0003e000

    * SHELL32 782F0000 78531FFF 00242000

    * MSDATL3 3AD10000 3AD25FFF 00016000

    * oledb32 3AFB0000 3B01EFFF 0006f000

    * OLEDB32R 3B040000 3B050FFF 00011000

    * msv1_0 782D0000 782EDFFF 0001e000

    * xpsqlbot 42F00000 42F05FFF 00006000

    * rsabase 7CA00000 7CA21FFF 00022000

    * CRYPT32 77440000 774B4FFF 00075000

    * xpstar 410F0000 41135FFF 00046000

    * SQLRESLD 42AC0000 42AC6FFF 00007000

    * SQLSVC 42C40000 42C56FFF 00017000

    * ODBC32 3B240000 3B274FFF 00035000

    * odbcbcp 41150000 41156FFF 00007000

    * W95SCM 41140000 4114BFFF 0000c000

    * SQLUNIRL 41090000 410BCFFF 0002d000

    * WINSPOOL 77800000 7781CFFF 0001d000

    * SHFOLDER 71A20000 71A27FFF 00008000

    * odbcint 3B380000 3B395FFF 00016000

    * NDDEAPI 769A0000 769A6FFF 00007000

    * SQLSVC 43970000 43975FFF 00006000

    * xpstar 439E0000 439E8FFF 00009000

    * dbghelp 72A00000 72A2CFFF 0002d000

    *

    * Edi: 00000005:

    * Esi: 23801674: 00000000 0000001A 00000000 00000000 00000003 00000009

    * Eax: 00000000:

    * Ebx: 2382FFFD: 01006000 00000007 00000000 00000000 00000100 00000000

    * Ecx: 23801674: 00000000 0000001A 00000000 00000000 00000003 00000009

    * Edx: 00000E00:

    * Eip: 00401EA0: E183088A 04E9830E 1C6B840F 4949001A 4E8B5275 08668304

    * Ebp: 3ACDDCF0: 3ACDDD04 005ACC39 00A4AEF0 3ACDDD00 3ACDEE2C 3ACDF1E8

    * SegCs: 0000001B:

    * EFlags: 00010246: 00720050 0067006F 00610072 0020006D 00690046 0065006C

    * Esp: 3ACDDCDC: 23801674 00441CFD 00000000 00000002 23821958 3ACDDD04

    * SegSs: 00000023:

    * *******************************************************************************

    * -------------------------------------------------------------------------------

    * Short Stack Dump

    * 00401EA0 Module(sqlservr+00001EA0) (RecBase::Resize+00000005)

    * 00441CFD Module(sqlservr+00041CFD) (CSysScan::GetVaried+0000002A)

    * 005ACC39 Module(sqlservr+001ACC39) (CUserScan::CbGroupBitmap+00000016)

    * 00622033 Module(sqlservr+00222033) (SecCache::FGetFromDiskScedb+00000317)

    * 0043FF36 Module(sqlservr+0003FF36) (checkdbperm+000000EF)

    * 004400FF Module(sqlservr+000400FF) (usedb+0000009F)

    * 00869AFA Module(sqlservr+00469AFA) (FDetermineSessionDb+000000DA)

    * 004DFA73 Module(sqlservr+000DFA73) (login+00000361)

    * 004DF59F Module(sqlservr+000DF59F) (process_login+0000008A)

    * 004110EC Module(sqlservr+000110EC) (process_commands+000001DF)

    * 41073379 Module(UMS+00003379) (ProcessWorkRequests+0000024A)

    * 41073071 Module(UMS+00003071) (ThreadStartRoutine+000000BD)

    * 7800A27B Module(MSVCRT+0000A27B) (beginthread+000000CE)

    * 77E8758A Module(KERNEL32+0000758A) (SetFilePointer+0000018A)

    * -------------------------------------------------------------------------------