Does FormatVolumeEx write zero to every memory locations in Windows CE 6.0 Build 3122?

Hi, I would like to know if FormatVolumeEx write zeros to all memory locations in Windows CE 6.0 Build 3122 if I set FORMAT_OPTIONS.dwFlags to FATUTIL_FULL_FORMAT?

This forum is for XP Embedded. Please try one of the Windows CE forums:
http://social.msdn.microsoft.com/Forums/en-US/category/windowsembeddedcompact
-Sean
www.annabooks.com / www.seanliming.com / Book Author - Pro Guide to WE8S, Pro Guide to WES 7, Pro Guide to POS for .NET

Similar Messages

  • Why does Firefox use up so much memory? My Windows Task Manager shows it using 109 Meg just now asking this question. Thanks

    Pretty simple: I want to know how I can keep Firefox from using so much memory when in use. 100-200 meg is common. Thank you

    Hi musicfan,<br />Sorry you are having problems with Firefox. Maybe you should have asked earlier and we could have fixed it.
    Reading your comments I do not see that rolling back to an insecure Firefox 22 will actually help you much. You are probably best using IE, unless you have also damaged that.
    *[[Export bookmarks to Internet Explorer]]
    You should not use old versions they are insecure. Security fixes are publicised and exploitable.
    * [[Install an older version of Firefox]]
    * https://www.mozilla.org/security/known-vulnerabilities/firefox.html
    Most others will not be having such problems. We are now able to say that with confidence because after developers missed a regression in Firefox 4 telemetry was introduced so that data was obtained. It may be an idea to turn on your telemetry, if you have not already done so, and decide to stick with Firefox.
    *[[Send performance data to Mozilla to help improve Firefox]]
    Trying safe mode takes seconds. Unfortunatly if you are not willing to do even rudimentary troubleshooting there is not anything we can do to help you.
    *[[Troubleshoot Firefox issues using Safe Mode]]

  • How to write and read data in a specific memory location ??

    Hi Everyone:
    Does anyone know how to write and read data in a specific memory location by using Java ?
    I need pointers, but I don't know how to do it ??
    Thanks for answering
    Rodger

    Hi Everyone:
    Does anyone know how to write and read data in a
    specific memory location by using Java ?
    I need pointers, but I don't know how to do it ??
    Thanks for answering
    RodgerWith Java you cannot write to a specific memory location. Java does not have pointers. If you really want to do it, you need to use JNI, i.e write the required functions in C (or other languages that support pointers) and make those functions available to Java (through JNI). This approach is not portable. You can have a look at http://java.sun.com/docs/books/tutorial/native1.1/index.html
    Regards.

  • Virtualization: Write zeros to NSS free space?

    I have some old Netware 6.5 servers that are being decommissioned, and the hardware disposed or reused for Windows domain servers. I want to preserve the old Netware environment as VMWare Server 2.0 virtual machines on an offline USB external hard drive, in case we ever need to go back and retrieve something.
    Here is the virtualization process for Netware, since the free VMWare Converter cannot deal with Netware volumes directly:
    1. Copy VMWare Tools onto Netware server before conversion.
    2. Boot Netware server with Windows Preboot Environment (WinPE / BartPE ) and RAID disk drivers
    3. Run Symantec Ghost32.exe at the Windows command line and capture the Novell disks (DOS/SYS, VOL1) to Ghost disk images on an external USB hard drive, fast compression
    4. On another machine, Use VMWare Converter to convert the Ghost images into VMDK files for the virtual machine.
    5. Build the virtual machine using the converted VMDK's. Netware will likely fail to mount SYS and VOL1 at first due to the VM disk controller difference, but then start working after fiddling with HDETECT, etc.
    Okay, the issue I have here is that the old Netware file server had a huge VOL1, something like 900 gigs, but less than 30% is being used at the time of decommissioning. Both the ghost images and the VMWare disk images can be smaller if the free space is zeroed before imaging. So if there is some way to zero the free space, I would like to do that.
    I do not know the technicalities of NSS file purging. When a file is purged what is the state of the purged disk sectors? What do they contain? (If auto-zeroed when purged, then I don't need to do anything.)
    Are there any built-in Netware console methods for NSS to write zeroes to free space?
    Also, Windows XP and newer have the ability to create files containing zeroes of arbitrary size, but on NTFS these are "sparse files" that don't actually take up any disk space. I do not know what the state is of these files when created on a mapped NSS volume. Are they automatically created sparse by NSS, or do they really take up space?
    4.91 SP5 client, Map O: to NSS volume, create 1 gig test file:
    C:\> fsutil file createnew O:\zero-test.txt 10000000000
    It's not a huge problem if I cannot zero the free NSS disk space. It just would be nice to shrink the virtual machine volumes so they don't have some 600 gigs of wasted space archived in the Netware VMs.
    (And actually I'm not sure that writing zeroes is specifically necessary, if VMDK's can use sector data compression. Writing say all 0xFF's to free space would prevent creation of sparse files in NSS, and can still compress very high.)
    - Dale Mahalko

    Use any method you want to make a file filled with zeros. Copy that file to the desired NSS volume. Then you can use BASH, or NCO ( on the server ) or any other method you like, on the server console to copy that file over and over with different names. Once you have a folder full of these files, then duplicate the folders, untill you are near out of space. Done. Since AFP and CIFS can both allow the creation of huge files, you can mount the FS from, say, a Linux box and dd ibs=1M obs=1M count=1000 if=/dev/zero of=/mnt/theserver/thevolume/thefile
    -- Bob

  • What causes inconsiste​nt error: Error loading "mydll.dll​" Invalid access to memory location.

    I have a set of sample code vis which are wrappers around an external dll using the call library function nodes.  These work in all versions of LabVIEW from 6.1 to 8.2.  In version 8 and 8.2, there is an inconsistent error which appears after a vi is opened, run successfully, closed and then re-opened some time later - all without closing LabVIEW.  The error is reported without an error number as 'Error loading "myDll.dll". Invalid access to memory location.'  If LabVIEW is closed, reopened and the vi loaded again and run, it works fine.  The same error occurs if a second vi calling the same .dll is loaded and run after the first is successful.
    Since the vi works just fine the first time it is opened, why does this error occur the second time?  What do I have to change so that I don't  have to close LabVIEW every time I want to run a different VI?
    Thanks in advance.
    Mike.

    Mea culpa. We have found a fix for this.  It relates to our dll structure.  We create a message pump in the dll associated with a hidden window.  When the dll is initialized, the window is registered with the operating system.  When the dll is unloaded, the window is closed but we weren't de-registering it.  This caused the problem the second time the dll was loaded.  By de-registering when the dll is unloaded, the problem has been solved.
    Mike.

  • Java - Write And Read From memory Like CheatEngine ( Writing not working?)

    Hello Oracle Forum
    I came here some time ago to ask about javaFX , i solved all my issues and im right now waiting for javaFx tot ake over swing and hmm, im working on learning LIBGDX to create games in java.
    However, im in need to create an app to change values of memory to fix a bug in an old program that i have, and the only way until now is using cheatEngine, So i decided to take a tutorial and learn how to do that in java.
    Well, im able to read from the memory but the write isnt working somehow... Im posting the code here, if anyone can give me a hint, i would thank and a lot, because theres a community that really needs this app to automate the fix without using cheat engine.
    package MainStart;
    import com.br.HM.User32;
    import com.br.kernel.Kernel32;
    import com.sun.jna.Memory;
    import com.sun.jna.Native;
    import com.sun.jna.Pointer;
    import com.sun.jna.ptr.IntByReference;
    public class Cheater {
        static Kernel32 kernel32 = (Kernel32) Native.loadLibrary("kernel32", Kernel32.class);
        static User32 user32 = (User32) Native.loadLibrary("user32", User32.class);
        static int readRight = 0x0010;
        static int writeRight = 0x0020;
        //static int PROCESS_VM_OPERATION = 0x0008;
        public static void main(String[] args) {
            //Read Memory
            //MineSweeper = Campo Minado
            int pid = getProcessId("Campo Minado"); // get our process ID
            System.out.println("Pid = " + pid);
            Pointer readprocess = openProcess(readRight, pid); // open the process ID with read priviledges.
            Pointer writeprocess = openProcess(writeRight, pid);
            int size = 4; // we want to read 4 bytes
            int address = 0x004053C8;
            //Read Memory
            Memory read = readMemory(readprocess, address, size); // read 4 bytes of memory starting at the address 0x00AB0C62.
            System.out.println(read.getInt(0)); // print out the value!      
            //Write Memory
            int writeMemory = writeMemory(writeprocess, address, new short[0x22222222]);
            System.out.println("WriteMemory :" + writeMemory);
            Memory readM = readMemory(readprocess, address, size);
            System.out.println(readM.getInt(0));
        public static int writeMemory(Pointer process, int address, short[] data) {
            IntByReference written = new IntByReference(0);
            Memory toWrite = new Memory(data.length);
            for (long i = 0; i < data.length; i++) {
                toWrite.setShort(0, data[new Integer(Long.toString(i))]);
            boolean b = kernel32.WriteProcessMemory(process, address, toWrite, data.length, written);
            System.out.println("kernel32.WriteProcessMemory : " + b); // Retorna false
            return written.getValue();
        public static Pointer openProcess(int permissions, int pid) {
            Pointer process = kernel32.OpenProcess(permissions, true, pid);
            return process;
        public static int getProcessId(String window) {
            IntByReference pid = new IntByReference(0);
            user32.GetWindowThreadProcessId(user32.FindWindowA(null, window), pid);
            return pid.getValue();
        public static Memory readMemory(Pointer process, int address, int bytesToRead) {
            IntByReference read = new IntByReference(0);
            Memory output = new Memory(bytesToRead);
            kernel32.ReadProcessMemory(process, address, output, bytesToRead, read);
            return output;
    package com.br.HM;
    import com.sun.jna.Native;
    import com.sun.jna.Pointer;
    import com.sun.jna.Structure;
    import com.sun.jna.platform.win32.WinDef.RECT;
    import com.sun.jna.ptr.ByteByReference;
    import com.sun.jna.ptr.IntByReference;
    import com.sun.jna.win32.StdCallLibrary.StdCallCallback;
    import com.sun.jna.win32.W32APIOptions;
    * Provides access to the w32 user32 library. Incomplete implementation to
    * support demos.
    * @author Todd Fast, [email protected]
    * @author [email protected]
    public interface User32 extends W32APIOptions {
        User32 INSTANCE = (User32) Native.loadLibrary("user32", User32.class, DEFAULT_OPTIONS);
        Pointer GetDC(Pointer hWnd);
        int ReleaseDC(Pointer hWnd, Pointer hDC);
        int FLASHW_STOP = 0;
        int FLASHW_CAPTION = 1;
        int FLASHW_TRAY = 2;
        int FLASHW_ALL = (FLASHW_CAPTION | FLASHW_TRAY);
        int FLASHW_TIMER = 4;
        int FLASHW_TIMERNOFG = 12;
        public static class FLASHWINFO extends Structure {
            public int cbSize;
            public Pointer hWnd;
            public int dwFlags;
            public int uCount;
            public int dwTimeout;
        int IMAGE_BITMAP = 0;
        int IMAGE_ICON = 1;
        int IMAGE_CURSOR = 2;
        int IMAGE_ENHMETAFILE = 3;
        int LR_DEFAULTCOLOR = 0x0000;
        int LR_MONOCHROME = 0x0001;
        int LR_COLOR = 0x0002;
        int LR_COPYRETURNORG = 0x0004;
        int LR_COPYDELETEORG = 0x0008;
        int LR_LOADFROMFILE = 0x0010;
        int LR_LOADTRANSPARENT = 0x0020;
        int LR_DEFAULTSIZE = 0x0040;
        int LR_VGACOLOR = 0x0080;
        int LR_LOADMAP3DCOLORS = 0x1000;
        int LR_CREATEDIBSECTION = 0x2000;
        int LR_COPYFROMRESOURCE = 0x4000;
        int LR_SHARED = 0x8000;
        Pointer FindWindowA(String winClass, String title);
        int GetClassName(Pointer hWnd, byte[] lpClassName, int nMaxCount);
        public static class GUITHREADINFO extends Structure {
            public int cbSize = size();
            public int flags;
            Pointer hwndActive;
            Pointer hwndFocus;
            Pointer hwndCapture;
            Pointer hwndMenuOwner;
            Pointer hwndMoveSize;
            Pointer hwndCaret;
            RECT rcCaret;
        boolean GetGUIThreadInfo(int idThread, GUITHREADINFO lpgui);
        public static class WINDOWINFO extends Structure {
            public int cbSize = size();
            public RECT rcWindow;
            public RECT rcClient;
            public int dwStyle;
            public int dwExStyle;
            public int dwWindowStatus;
            public int cxWindowBorders;
            public int cyWindowBorders;
            public short atomWindowType;
            public short wCreatorVersion;
        boolean GetWindowInfo(Pointer hWnd, WINDOWINFO pwi);
        boolean GetWindowRect(Pointer hWnd, RECT rect);
        int GetWindowText(Pointer hWnd, byte[] lpString, int nMaxCount);
        int GetWindowTextLength(Pointer hWnd);
        int GetWindowModuleFileName(Pointer hWnd, byte[] lpszFileName, int cchFileNameMax);
        int GetWindowThreadProcessId(Pointer hWnd, IntByReference lpdwProcessId);
        interface WNDENUMPROC extends StdCallCallback {
             * Return whether to continue enumeration.
            boolean callback(Pointer hWnd, Pointer data);
        boolean EnumWindows(WNDENUMPROC lpEnumFunc, Pointer data);
        boolean EnumThreadWindows(int dwThreadId, WNDENUMPROC lpEnumFunc, Pointer data);
        boolean FlashWindowEx(FLASHWINFO info);
        Pointer LoadIcon(Pointer hInstance, String iconName);
        Pointer LoadImage(Pointer hinst, // handle to instance
                String name, // image to load
                int type, // image type
                int xDesired, // desired width
                int yDesired, // desired height
                int load // load options
        boolean DestroyIcon(Pointer hicon);
        int GWL_EXSTYLE = -20;
        int GWL_STYLE = -16;
        int GWL_WNDPROC = -4;
        int GWL_HINSTANCE = -6;
        int GWL_ID = -12;
        int GWL_USERDATA = -21;
        int DWL_DLGPROC = 4;
        int DWL_MSGRESULT = 0;
        int DWL_USER = 8;
        int WS_EX_COMPOSITED = 0x20000000;
        int WS_EX_LAYERED = 0x80000;
        int WS_EX_TRANSPARENT = 32;
        int GetWindowLong(Pointer hWnd, int nIndex);
        int SetWindowLong(Pointer hWnd, int nIndex, int dwNewLong);
        int LWA_COLORKEY = 1;
        int LWA_ALPHA = 2;
        int ULW_COLORKEY = 1;
        int ULW_ALPHA = 2;
        int ULW_OPAQUE = 4;
        boolean SetLayeredWindowAttributes(Pointer hwnd, int crKey,
                byte bAlpha, int dwFlags);
        boolean GetLayeredWindowAttributes(Pointer hwnd,
                IntByReference pcrKey,
                ByteByReference pbAlpha,
                IntByReference pdwFlags);
         * Defines the x- and y-coordinates of a point.
        public static class POINT extends Structure {
            public int x, y;
         * Specifies the width and height of a rectangle.
        public static class SIZE extends Structure {
            public int cx, cy;
        int AC_SRC_OVER = 0x00;
        int AC_SRC_ALPHA = 0x01;
        int AC_SRC_NO_PREMULT_ALPHA = 0x01;
        int AC_SRC_NO_ALPHA = 0x02;
        public static class BLENDFUNCTION extends Structure {
            public byte BlendOp = AC_SRC_OVER; // only valid value
            public byte BlendFlags = 0; // only valid value
            public byte SourceConstantAlpha;
            public byte AlphaFormat;
        boolean UpdateLayeredWindow(Pointer hwnd, Pointer hdcDst,
                POINT pptDst, SIZE psize,
                Pointer hdcSrc, POINT pptSrc, int crKey,
                BLENDFUNCTION pblend, int dwFlags);
        int SetWindowRgn(Pointer hWnd, Pointer hRgn, boolean bRedraw);
        int VK_SHIFT = 16;
        int VK_LSHIFT = 0xA0;
        int VK_RSHIFT = 0xA1;
        int VK_CONTROL = 17;
        int VK_LCONTROL = 0xA2;
        int VK_RCONTROL = 0xA3;
        int VK_MENU = 18;
        int VK_LMENU = 0xA4;
        int VK_RMENU = 0xA5;
        boolean GetKeyboardState(byte[] state);
        short GetAsyncKeyState(int vKey);
    package com.br.kernel;
    import com.sun.jna.*;
    import com.sun.jna.win32.StdCallLibrary;
    import com.sun.jna.ptr.IntByReference;
    // by deject3d
    public interface Kernel32 extends StdCallLibrary
        // description from msdn
        //BOOL WINAPI WriteProcessMemory(
        //__in   HANDLE hProcess,
        //__in   LPVOID lpBaseAddress,
        //__in   LPCVOID lpBuffer,
        //__in   SIZE_T nSize,
        //__out  SIZE_T *lpNumberOfBytesWritten
        boolean WriteProcessMemory(Pointer p, int address, Pointer buffer, int size, IntByReference written);
        //BOOL WINAPI ReadProcessMemory(
        //          __in   HANDLE hProcess,
        //          __in   LPCVOID lpBaseAddress,
        //          __out  LPVOID lpBuffer,
        //          __in   SIZE_T nSize,
        //          __out  SIZE_T *lpNumberOfBytesRead
        boolean ReadProcessMemory(Pointer hProcess, int inBaseAddress, Pointer outputBuffer, int nSize, IntByReference outNumberOfBytesRead);
        //HANDLE WINAPI OpenProcess(
        //  __in  DWORD dwDesiredAccess,
        //  __in  BOOL bInheritHandle,
        //  __in  DWORD dwProcessId
        Pointer OpenProcess(int desired, boolean inherit, int pid);
        /* derp */
        int GetLastError();
    http://pastebin.com/Vq8wfy39

    Hello there,
    this tutorial was exactly what I needed, so thank you.
    Your problem seems to be in this line:
    int writeMemory = writeMemory(writeprocess, address, new short[0x22222222]); 
    The problem is, you're creating a new short array with the length of 0x22222222. Which not only results in an java.lang.OutOfMemoryError: Java heap space
    but also, if it would work, would create an empty array with the length of 0x22222222.
    I think you want to write 0x22222222 as value in your address.
    Correctly stored the code you'd need to write would be:
    short[] sarray = new short[]{(short) 0x22222222};
    But because the value is too long for the short, the value stored in your array would be the number 8738.
    I think, what you want to do is to store the number 572662306, which would be the hex value, stored in an int variable.
    So first of all you need to strip down your hex-value to shorts:
    Short in Java uses 16 Bit = 2 Byte. 0x22222222 -> 0x2222 for your high byte and 0x2222 for your low byte
    So your array would be
    short[] sarray = new short[]{0x2222,0x2222};//notice, that sarray[0] is the lowbyte and sarray[1] the high byte, if you want to store 20 it would be new short[]{20,0} or if you use hex new short[]{0x14,0x00}
    The next part is your writeToMemory Method. If I'm right, the method in the tutorial is a little bit wrong. The right version should be this:
    public static int writeMemory(Pointer process, int address, short[] data) {
      IntByReference written = new IntByReference(0);
      int size = data.length*Short.SIZE/8;
      Memory toWrite = new Memory(size);
      for (int i = 0; i < data.length; i++) {
      toWrite.setShort(i*Short.SIZE/8,
      data[i]);
      boolean b = kernel32.WriteProcessMemory(process, address, toWrite,
      size, written);
      return written.getValue();
    You need to calculate your offset right. And the size of your memory. Maybe you could write this method not with shorts, but with integers. But this should work.
    If you pass your new array to this function, it should write 0x22222222 to your adress. If you read out your toWrite value with toWrite.getInt(0) you get the right value.
    And there is one more thing. In order to write data to a process, you need to grant two access rights:
    A handle to the process memory to be modified. The handle must have PROCESS_VM_WRITE and PROCESS_VM_OPERATION access to the process.
    You have to grant the right to write data: PROCESS_VM_WRITE: 0x0020 and PROCESS_VM_OPERATION: 0x0008
    So your writeProcess needs to get initialized this way:
    Pointer writeprocess = openProcess(0x0020|0x0008,pid);
    I hope this works for you. Let me know.
    Greetings
    Edit:
    Because every data you write will be 1 byte to whatever count of byte I think the best way is to use the following method to write data to the memory:
    public static void writeMemory(Pointer process, long address, byte[] data)
      int size = data.length;
      Memory toWrite = new Memory(size);
      for(int i = 0; i < size; i++)
      toWrite.setByte(i, data[i]);
      boolean b = kernel32.WriteProcessMemory(process, address, toWrite, size, null);
    You can see some changes. First I changed all address values from int to long, because some addresses are out of range. And with all, i mean all. Not only in writeMemory, but also in readMemory and in your kernel32 Class.
    Second I don't use the IntByReference anymore..
    To use this method you need to store your data the following way if you would write 4 Byte data:
    byte[] values = new byte[]{0x14,0x00,0x00,0x00};
    This value would be the number 20. Index 0 will be the lowest byte and index 3 will be the highest byte.
    And one more thing I wrote is an method which you can use to calculate your address if you have a baseAddress.
    If you restart your program/game your old addresses won't point at the same values of your game. With some research (I use CheatEngine) you can get the baseaddress. This one will alway be the same.
    To get from your baseaddress to the dynamic adress you use offsets.
    public static long findDynAddy(Pointer process, int[] offsets, long baseAddress)
      long pointer = baseAddress;
      int size = 4;
      Memory pTemp = new Memory(size);
      long pointerAddress = 0;
      for(int i = 0; i < offsets.length; i++)
      if(i == 0)
      kernel32.ReadProcessMemory(process, pointer, pTemp, size, null);
      pointerAddress = ((pTemp.getInt(0)+offsets[i]));
      if(i != offsets.length-1)
      kernel32.ReadProcessMemory(process, pointerAddress, pTemp, size, null);
      return pointerAddress;
    This methods gets a process, an array of offsets (hex-values) and your baseadress and returns the dynamic address.
    For Solitaire the following code would give you the address to the score:
    long baseAddr = 0x10002AFA8L;
      int[] offsets = new int[]{0x50,0x14};
      long addr = findDynAddy(process, offsets, baseAddr);
    If somebody wants to get the whole code (user32, kernel32 and the cheater) just pm me and I will give you a link.

  • HT201991 How does one write a review for an app?

    I would like to write a review for an app I bought from the App Store.
    "Locate the item that you would like to write a review for."
    Where? In the App Store via the internet (e.g. on my iMac), OR via the App Store button on my iPad Mini?
    "Click "Write a Review" in the Customer Reviews section."
    How? I could find no active link associated with the Customer Reviews section once I had located the item for which I wanted to write a review.
    So the question remains "How does one write a review for an app?" … and, so far as things stand, the instructions provided in the page <http://support.apple.com/kb/ht3928> are, as far as I can tell useless. Certainly, the Apple website and associated instructions have become, for this long-time user, more akin to Microsoft Windows in their impenetrable lack of intuitive, user-friendly ccharacter.
    Oh yeh. To add to my 'disgruntledness' … How come there is no iPad Mini option in the Product drop down below?
    Where is Steve Jobs when you need him?!

    I have been having this issue for months, now--at least 3-4.  I updated my credit card info on my account, thinking maybe that would do it, but NOPE--can't review a single thing I've ever purchased in iTunes--not from my iPhone 5, PC or iPad 2.  Ridiculous, at this point...just remove the ability to review at all, if this is how it's going to be. SO frustrating.

  • Ram Upgrade Does it mater who makes the memory card?

    I have a 2007 20" iMac wtih at 2.4 Ghz Intel Core 2 Duo with 1 GB 667 MHz DDR2 SDRAM
    I am going to upgrade from 1 GB Ram to at least 4 GB and maybe as much as 6 or 8 depending on pricing?
    Does it matter who manufactures the memory card?
    Thanks

    The mid-2007 and Early 2008 iMacs officially can accept 4G of RAM (two 2GB modules); with newer modules made since Apple engraved the specs in stone, you can go to 6GB RAM (one 2GB +2 4GB) but no more.
    The only brand issue I've encountered is that some Intel Macs using PC2-5300 RAM were rather unhappy with Kingston "Value RAM." The regular line fo Kingston was fine.
    For the past decade, I've web-ordered all my Mac RAM (and we have 16 Macs in the family) from only two vendors. I have never had RAM go bad or received the wrong RAM from these firms. Then there is the added pleasure of their being among the lowest priced. Here are their listings for PC2-5300 for your iMac:
    Other World Computing:
    http://eshop.macsales.com/shop/apple/memory/iMac/Intel_Core_2_Duo
    Data Memory Systems:
    http://www.datamemorysystems.com/_apple_info/Apple_Aluminum_Intel_Core_2_Duo_iMa c_20_2.4GHz_Memory_1467.asp
    You don't show a geographic location in your profile (a very useful thing to include around here ) so I've listed US firms because that's who I use. If you are somewhere other than North America, let us know and someone may be able to provide resources local to you. The first firm I linked ships internationally with only a very "can't do" countries, but shipping and VAT may make it less attractive than a local source.

  • What does SQL write to that allow changes to be undone or rolled back in case of a system failure?

    What does SQL write to that allow changes to be undone or rolled back in case of a system failure?

    What does SQL write to that allow changes to be undone or rolled back in case of a system failure?
    Hello,
    If i read your question correctly you are asking about how uncommited transaction are rolled back.For this, concept of transaction log came into picture.where first changes were first made to transaction log and then into memory .Before any change is made
    to real data file change is made to trn log files so that if rollback comes it can see in log and rollback it.
    I would suggest you to read Famous article by log which will explain you
    http://technet.microsoft.com/en-us/magazine/2009.02.logging.aspx
    Please mark this reply as the answer or vote as helpful, as appropriate, to make it useful for other readers

  • Sybase ASE 15.7.0.130 error - Attempted read from memory location...

    Hi all,
    i recently updated ASE 15.7 from SP 42 to SP 130.
    Everything was fine during update procedure. After the procedure terminated this error started appears (every five minutes) on the database log.
    00:0006:00000:00152:2014/11/18 11:10:00.72 kernel  attempted read from memory location 0000000000000019 from instruction at location 0x0000000074AC346E
    00:0006:00000:00152:2014/11/18 11:10:00.72 kernel  Adaptive Server Enterprise system exception (0xc0000005) generated by a storage access violation.
    00:0007:00000:00153:2014/11/18 11:10:00.72 kernel  attempted read from memory location 0000000000000018 from instruction at location 0x0000000074AC346E
    00:0006:00000:00152:2014/11/18 11:10:00.72 kernel  pc: 0x0000000074AC346E vcwprintf_s+ 0x26ce (0x0000000000000001, 0x000000000EDAB6D4, 0x000000000EDABBC0, 0x0000000000000000)
    00:0007:00000:00153:2014/11/18 11:10:00.72 kernel  Adaptive Server Enterprise system exception (0xc0000005) generated by a storage access violation.
    00:0006:00000:00152:2014/11/18 11:10:00.72 kernel  pc: 0x0000000074AA1AA3 sprintf+ 0x7b (0x0000000000000000, 0x000000000EDACBD0, 0x00000000FFFF0000, 0x0000000000000019)
    00:0007:00000:00153:2014/11/18 11:10:00.72 kernel  pc: 0x0000000074AC346E vcwprintf_s+ 0x26ce (0x0000000000000001, 0x000000000EEAB6D4, 0x000000000EEABBC0, 0x0000000000000000)
    00:0006:00000:00152:2014/11/18 11:10:00.72 kernel  pc: 0x0000000000FC9C87 ex_stuffp+ 0x4f7 (0x000000005B0952A0, 0x000000000EDABBC0, 0x000000000EDACBD0, 0x0000000000000061)
    00:0007:00000:00153:2014/11/18 11:10:00.72 kernel  pc: 0x0000000074AA1AA3 sprintf+ 0x7b (0x0000000000000000, 0x000000000EEACBD0, 0x00000000FFFF0000, 0x0000000000000018)
    00:0006:00000:00152:2014/11/18 11:10:00.72 kernel  pc: 0x0000000000FCB1FD ex__logprint+ 0x38d (0x000000005B0952A0, 0x000000005B0952A0, 0x00000000805CE000, 0x0000000000000000)
    00:0007:00000:00153:2014/11/18 11:10:00.72 kernel  pc: 0x0000000000FC9C87 ex_stuffp+ 0x4f7 (0x000000005B0B2890, 0x000000000EEABBC0, 0x000000000EEACBD0, 0x0000000000000061)
    00:0006:00000:00152:2014/11/18 11:10:00.72 kernel  pc: 0x0000000000FCB776 ex_logprint+ 0xe6 (0x000000005B0952A0, 0x0000000000000000, 0x00000000FFFF0000, 0x000000000000002B)
    00:0007:00000:00153:2014/11/18 11:10:00.72 kernel  pc: 0x0000000000FCB1FD ex__logprint+ 0x38d (0x000000005B0B2890, 0x000000005B0B2890, 0x0000000080EF2800, 0x0000000000000000)
    00:0006:00000:00152:2014/11/18 11:10:00.72 kernel  pc: 0x0000000000BE6C31 proc_read__backout+ 0x1d1 (0x00000000812BF000, 0x000000000000001C, 0x0000000000000012, 0x000000005B0952A0)
    00:0007:00000:00153:2014/11/18 11:10:00.72 kernel  pc: 0x0000000000FCB776 ex_logprint+ 0xe6 (0x000000005B0B2890, 0x0000000000000000, 0x00000000FFFF0000, 0x000000000000002B)
    00:0006:00000:00152:2014/11/18 11:10:00.72 kernel  pc: 0x0000000000BE6A2E proc_handle+ 0x9e (0x000000005B0AD420, 0x0000000000000000, 0x0000000000000012, 0x0000000000BE633A)
    00:0007:00000:00153:2014/11/18 11:10:00.72 kernel  pc: 0x0000000000BE6C31 proc_read__backout+ 0x1d1 (0x00000000812C9000, 0x000000000000001C, 0x0000000000000012, 0x000000005B0B2890)
    00:0006:00000:00152:2014/11/18 11:10:00.72 kernel  pc: 0x0000000000FCE317 exc__raise+ 0x6c7 (0x000000005B0952A0, 0x0000000000400000, 0x0000000000000000, 0x0000000000000AF5)
    00:0007:00000:00153:2014/11/18 11:10:00.72 kernel  pc: 0x0000000000BE6A2E proc_handle+ 0x9e (0x000000005B0CAA10, 0x0000000000000000, 0x0000000000000012, 0x0000000000BE633A)
    00:0006:00000:00152:2014/11/18 11:10:00.72 kernel  pc: 0x0000000000FCE96E exc_raise+ 0x11e (0x000000000102523B, 0x000000000000001C, 0x0000000000000005, 0x0000000000000012)
    00:0007:00000:00153:2014/11/18 11:10:00.72 kernel  pc: 0x0000000000FCE317 exc__raise+ 0x6c7 (0x000000005B0B2890, 0x0000000000400000, 0x0000000000000000, 0x0000000000000AF5)
    00:0006:00000:00152:2014/11/18 11:10:00.72 kernel  pc: 0x0000000000BED3D4 proc_read+ 0xbe4 (0x0000000000000000, 0x0000000000000001, 0x000000005B0952A0, 0x000000004ED2AAB0)
    00:0007:00000:00153:2014/11/18 11:10:00.72 kernel  pc: 0x0000000000FCE96E exc_raise+ 0x11e (0x000000000102523B, 0x000000000000001C, 0x0000000000000005, 0x0000000000000012)
    00:0006:00000:00152:2014/11/18 11:10:00.72 kernel  pc: 0x0000000000BEE1A7 proc_get+ 0x3f7 (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000)
    00:0007:00000:00153:2014/11/18 11:10:00.72 kernel  pc: 0x0000000000BED3D4 proc_read+ 0xbe4 (0x0000000000000000, 0x0000000000000001, 0x000000005B0B2890, 0x000000004E7F98B0)
    00:0006:00000:00152:2014/11/18 11:10:00.72 kernel  pc: 0x0000000000F3E97B s_getTreeOrPlan+ 0x19b (0x000000005B0952A0, 0x000000000EDAE810, 0x0000000000000001, 0x0000000000000000)
    00:0007:00000:00153:2014/11/18 11:10:00.72 kernel  pc: 0x0000000000BEE1A7 proc_get+ 0x3f7 (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000)
    00:0006:00000:00152:2014/11/18 11:10:00.72 kernel  pc: 0x0000000000EDE2D4 execproc+ 0x3a4 (0x00000000000000E0, 0x0000000000000001, 0x000000000EDAED60, 0x00000000000000E0)
    00:0007:00000:00153:2014/11/18 11:10:00.72 kernel  pc: 0x0000000000F3E97B s_getTreeOrPlan+ 0x19b (0x000000005B0B2890, 0x000000000EEAE810, 0x0000000000000001, 0x0000000000000000)
    00:0006:00000:00152:2014/11/18 11:10:00.72 kernel  pc: 0x0000000000EE4D02 s_execute+ 0x4692 (0x000000005B0952A0, 0x000000005B0952A0, 0x0000000080760960, 0x0000000000000001)
    00:0007:00000:00153:2014/11/18 11:10:00.72 kernel  pc: 0x0000000000EDE2D4 execproc+ 0x3a4 (0x00000000000000E0, 0x0000000000000001, 0x000000000EEAED60, 0x00000000000000E0)
    00:0006:00000:00152:2014/11/18 11:10:00.72 kernel  pc: 0x0000000000EF7476 sequencer+ 0x1f86 (0x000000005B0952A0, 0x000000005B0952A0, 0x0000000000000021, 0x0000000000000001)
    00:0007:00000:00153:2014/11/18 11:10:00.72 kernel  pc: 0x0000000000EE4D02 s_execute+ 0x4692 (0x000000005B0B2890, 0x000000005B0B2890, 0x00000000806DD960, 0x0000000000000001)
    00:0006:00000:00152:2014/11/18 11:10:00.72 kernel  pc: 0x0000000000467406 tdsrecv_language+ 0x706 (0x0000000000000021, 0x0000000000400000, 0x0000000000000000, 0x0000000000000021)
    00:0007:00000:00153:2014/11/18 11:10:00.72 kernel  pc: 0x0000000000EF7476 sequencer+ 0x1f86 (0x000000005B0B2890, 0x000000005B0B2890, 0x0000000000000021, 0x0000000000000001)
    00:0006:00000:00152:2014/11/18 11:10:00.72 kernel  pc: 0x000000000042BF87 conn_hdlr+ 0x2307 (0x00000000284ACB70, 0x00000000284ACB70, 0x0000000000000000, 0x0000000000000000)
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  pc: 0x0000000000467406 tdsrecv_language+ 0x706 (0x0000000000000021, 0x0000000000400000, 0x0000000000000000, 0x0000000000000021)
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  pc: 0x00000000013AFEF1 kpntwrapper+ 0x51 (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000)
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  pc: 0x000000000042BF87 conn_hdlr+ 0x2307 (0x00000000284AD0B0, 0x00000000284AD0B0, 0x0000000000000000, 0x0000000000000000)
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  pc: 0x0000000077248FED CreateFiberEx+ 0x27d (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000)
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  end of stack trace, spid 152, kpid 18677903, suid 4
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  pc: 0x00000000013AFEF1 kpntwrapper+ 0x51 (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000)
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  pc: 0x0000000077248FED CreateFiberEx+ 0x27d (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000)
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  end of stack trace, spid 153, kpid 18808976, suid 4
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  DUMP OF LOADED MODULES:-
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  DUMP OF LOADED MODULES:-
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  sqlsrvr.exe loaded at 0000000000400000 [G:\sybase\DEV\ASE-15_0\bin\sqlsrvr.exe]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  sqlsrvr.exe loaded at 0000000000400000 [G:\sybase\DEV\ASE-15_0\bin\sqlsrvr.exe]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  ntdll.dll loaded at 0000000077360000 [C:\Windows\SYSTEM32\ntdll.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  ntdll.dll loaded at 0000000077360000 [C:\Windows\SYSTEM32\ntdll.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  kernel32.dll loaded at 0000000077240000 [C:\Windows\system32\kernel32.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  kernel32.dll loaded at 0000000077240000 [C:\Windows\system32\kernel32.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  KERNELBASE.dll loaded at 000007FEFD5B0000 [C:\Windows\system32\KERNELBASE.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  KERNELBASE.dll loaded at 000007FEFD5B0000 [C:\Windows\system32\KERNELBASE.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  MSVCR100.dll loaded at 0000000074A70000 [C:\Windows\system32\MSVCR100.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  MSVCR100.dll loaded at 0000000074A70000 [C:\Windows\system32\MSVCR100.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  libsybblk64.dll loaded at 0000000180000000 [G:\sybase\DEV\ASE-15_0\bin\libsybblk64.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  libsybblk64.dll loaded at 0000000180000000 [G:\sybase\DEV\ASE-15_0\bin\libsybblk64.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  libsybct64.dll loaded at 0000000000110000 [G:\sybase\DEV\ASE-15_0\bin\libsybct64.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  libsybct64.dll loaded at 0000000000110000 [G:\sybase\DEV\ASE-15_0\bin\libsybct64.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  libsybcs64.dll loaded at 00000000001E0000 [G:\sybase\DEV\ASE-15_0\bin\libsybcs64.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  libsybcs64.dll loaded at 00000000001E0000 [G:\sybase\DEV\ASE-15_0\bin\libsybcs64.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  libsybcomn64.dll loaded at 0000000000310000 [G:\sybase\DEV\ASE-15_0\bin\libsybcomn64.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  libsybcomn64.dll loaded at 0000000000310000 [G:\sybase\DEV\ASE-15_0\bin\libsybcomn64.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  libsybintl64.dll loaded at 00000000003E0000 [G:\sybase\DEV\ASE-15_0\bin\libsybintl64.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  libsybintl64.dll loaded at 00000000003E0000 [G:\sybase\DEV\ASE-15_0\bin\libsybintl64.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  ADVAPI32.dll loaded at 000007FEFDB50000 [C:\Windows\system32\ADVAPI32.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  ADVAPI32.dll loaded at 000007FEFDB50000 [C:\Windows\system32\ADVAPI32.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  msvcrt.dll loaded at 000007FEFDAB0000 [C:\Windows\system32\msvcrt.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  msvcrt.dll loaded at 000007FEFDAB0000 [C:\Windows\system32\msvcrt.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  sechost.dll loaded at 000007FEFE350000 [C:\Windows\SYSTEM32\sechost.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  sechost.dll loaded at 000007FEFE350000 [C:\Windows\SYSTEM32\sechost.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  RPCRT4.dll loaded at 000007FEFDDB0000 [C:\Windows\system32\RPCRT4.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  RPCRT4.dll loaded at 000007FEFDDB0000 [C:\Windows\system32\RPCRT4.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  MSVCR80.dll loaded at 000000006F690000 [C:\Windows\WinSxS\amd64_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.6229_none_88dcc0bf2fb1b808\MSVCR80.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  MSVCR80.dll loaded at 000000006F690000 [C:\Windows\WinSxS\amd64_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.6229_none_88dcc0bf2fb1b808\MSVCR80.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  libsybunic64.dll loaded at 0000000002E70000 [G:\sybase\DEV\ASE-15_0\bin\libsybunic64.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  libsybunic64.dll loaded at 0000000002E70000 [G:\sybase\DEV\ASE-15_0\bin\libsybunic64.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  libsybtcl64.dll loaded at 0000000002EF0000 [G:\sybase\DEV\ASE-15_0\bin\libsybtcl64.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  libsybtcl64.dll loaded at 0000000002EF0000 [G:\sybase\DEV\ASE-15_0\bin\libsybtcl64.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  WS2_32.dll loaded at 000007FEFE430000 [C:\Windows\system32\WS2_32.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  WS2_32.dll loaded at 000007FEFE430000 [C:\Windows\system32\WS2_32.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  NSI.dll loaded at 000007FEFE420000 [C:\Windows\system32\NSI.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  NSI.dll loaded at 000007FEFE420000 [C:\Windows\system32\NSI.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  WSOCK32.dll loaded at 000007FEFA6B0000 [C:\Windows\system32\WSOCK32.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  WSOCK32.dll loaded at 000007FEFA6B0000 [C:\Windows\system32\WSOCK32.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  MSWSOCK.DLL loaded at 000007FEFCAE0000 [C:\Windows\system32\MSWSOCK.DLL]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  MSWSOCK.DLL loaded at 000007FEFCAE0000 [C:\Windows\system32\MSWSOCK.DLL]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  user32.dll loaded at 0000000077140000 [C:\Windows\system32\user32.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  user32.dll loaded at 0000000077140000 [C:\Windows\system32\user32.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  GDI32.dll loaded at 000007FEFF290000 [C:\Windows\system32\GDI32.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  GDI32.dll loaded at 000007FEFF290000 [C:\Windows\system32\GDI32.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  LPK.dll loaded at 000007FEFE410000 [C:\Windows\system32\LPK.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  LPK.dll loaded at 000007FEFE410000 [C:\Windows\system32\LPK.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  USP10.dll loaded at 000007FEFDEE0000 [C:\Windows\system32\USP10.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  USP10.dll loaded at 000007FEFDEE0000 [C:\Windows\system32\USP10.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  COMDLG32.dll loaded at 000007FEFD8E0000 [C:\Windows\system32\COMDLG32.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  COMDLG32.dll loaded at 000007FEFD8E0000 [C:\Windows\system32\COMDLG32.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  SHLWAPI.dll loaded at 000007FEFE1C0000 [C:\Windows\system32\SHLWAPI.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  SHLWAPI.dll loaded at 000007FEFE1C0000 [C:\Windows\system32\SHLWAPI.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  COMCTL32.dll loaded at 000007FEFA140000 [C:\Windows\WinSxS\amd64_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_a4d6a923711520a9\COMCTL32.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  COMCTL32.dll loaded at 000007FEFA140000 [C:\Windows\WinSxS\amd64_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_a4d6a923711520a9\COMCTL32.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  SHELL32.dll loaded at 000007FEFE480000 [C:\Windows\system32\SHELL32.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  SHELL32.dll loaded at 000007FEFE480000 [C:\Windows\system32\SHELL32.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  NETAPI32.dll loaded at 000007FEFAC60000 [C:\Windows\system32\NETAPI32.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  NETAPI32.dll loaded at 000007FEFAC60000 [C:\Windows\system32\NETAPI32.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  netutils.dll loaded at 000007FEFC770000 [C:\Windows\system32\netutils.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  netutils.dll loaded at 000007FEFC770000 [C:\Windows\system32\netutils.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  srvcli.dll loaded at 000007FEFCDC0000 [C:\Windows\system32\srvcli.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  srvcli.dll loaded at 000007FEFCDC0000 [C:\Windows\system32\srvcli.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  wkscli.dll loaded at 000007FEFAC40000 [C:\Windows\system32\wkscli.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  wkscli.dll loaded at 000007FEFAC40000 [C:\Windows\system32\wkscli.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  dbghelp.dll loaded at 000007FEF9FB0000 [C:\Windows\system32\dbghelp.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  dbghelp.dll loaded at 000007FEF9FB0000 [C:\Windows\system32\dbghelp.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  PSAPI.DLL loaded at 0000000077520000 [C:\Windows\system32\PSAPI.DLL]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  PSAPI.DLL loaded at 0000000077520000 [C:\Windows\system32\PSAPI.DLL]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  IPHLPAPI.DLL loaded at 000007FEFB6B0000 [C:\Windows\system32\IPHLPAPI.DLL]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  IPHLPAPI.DLL loaded at 000007FEFB6B0000 [C:\Windows\system32\IPHLPAPI.DLL]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  WINNSI.DLL loaded at 000007FEFB660000 [C:\Windows\system32\WINNSI.DLL]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  WINNSI.DLL loaded at 000007FEFB660000 [C:\Windows\system32\WINNSI.DLL]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  loadperf.dll loaded at 000007FEF3B30000 [C:\Windows\system32\loadperf.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  loadperf.dll loaded at 000007FEF3B30000 [C:\Windows\system32\loadperf.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  ole32.dll loaded at 000007FEFDFB0000 [C:\Windows\system32\ole32.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  ole32.dll loaded at 000007FEFDFB0000 [C:\Windows\system32\ole32.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  OLEAUT32.dll loaded at 000007FEFF300000 [C:\Windows\system32\OLEAUT32.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  OLEAUT32.dll loaded at 000007FEFF300000 [C:\Windows\system32\OLEAUT32.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  sybcsi_core29.dll loaded at 0000000002F40000 [G:\sybase\DEV\ASE-15_0\bin\sybcsi_core29.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  sybcsi_core29.dll loaded at 0000000002F40000 [G:\sybase\DEV\ASE-15_0\bin\sybcsi_core29.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  sybcsi_profiler29.dll loaded at 0000000002FA0000 [G:\sybase\DEV\ASE-15_0\bin\sybcsi_profiler29.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  sybcsi_profiler29.dll loaded at 0000000002FA0000 [G:\sybase\DEV\ASE-15_0\bin\sybcsi_profiler29.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  sybcsi_propertiesconfig29.dll loaded at 0000000002FC0000 [G:\sybase\DEV\ASE-15_0\bin\sybcsi_propertiesconfig29.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  sybcsi_propertiesconfig29.dll loaded at 0000000002FC0000 [G:\sybase\DEV\ASE-15_0\bin\sybcsi_propertiesconfig29.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  sybcsi_openssl29.dll loaded at 0000000002FE0000 [G:\sybase\DEV\ASE-15_0\bin\sybcsi_openssl29.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  sybcsi_openssl29.dll loaded at 0000000002FE0000 [G:\sybase\DEV\ASE-15_0\bin\sybcsi_openssl29.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  MPR.dll loaded at 000007FEFA610000 [C:\Windows\system32\MPR.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  MPR.dll loaded at 000007FEFA610000 [C:\Windows\system32\MPR.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  IMM32.DLL loaded at 000007FEFF3E0000 [C:\Windows\system32\IMM32.DLL]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  IMM32.DLL loaded at 000007FEFF3E0000 [C:\Windows\system32\IMM32.DLL]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  MSCTF.dll loaded at 000007FEFE240000 [C:\Windows\system32\MSCTF.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  MSCTF.dll loaded at 000007FEFE240000 [C:\Windows\system32\MSCTF.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  ntmarta.dll loaded at 000007FEFC3D0000 [C:\Windows\system32\ntmarta.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  ntmarta.dll loaded at 000007FEFC3D0000 [C:\Windows\system32\ntmarta.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  WLDAP32.dll loaded at 000007FEFD860000 [C:\Windows\system32\WLDAP32.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  WLDAP32.dll loaded at 000007FEFD860000 [C:\Windows\system32\WLDAP32.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  SYBEVENT.DLL loaded at 0000000010000000 [G:\sybase\DEV\ASE-15_0\dll\SYBEVENT.DLL]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  SYBEVENT.DLL loaded at 0000000010000000 [G:\sybase\DEV\ASE-15_0\dll\SYBEVENT.DLL]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  DNSAPI.dll loaded at 000007FEFC960000 [C:\Windows\system32\DNSAPI.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  DNSAPI.dll loaded at 000007FEFC960000 [C:\Windows\system32\DNSAPI.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  dhcpcsvc6.DLL loaded at 000007FEFB330000 [C:\Windows\system32\dhcpcsvc6.DLL]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  dhcpcsvc6.DLL loaded at 000007FEFB330000 [C:\Windows\system32\dhcpcsvc6.DLL]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  dhcpcsvc.DLL loaded at 000007FEFB310000 [C:\Windows\system32\dhcpcsvc.DLL]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  dhcpcsvc.DLL loaded at 000007FEFB310000 [C:\Windows\system32\dhcpcsvc.DLL]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  icmp.Dll loaded at 0000000070890000 [C:\Windows\system32\icmp.Dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  icmp.Dll loaded at 0000000070890000 [C:\Windows\system32\icmp.Dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  wship6.dll loaded at 000007FEFCAD0000 [C:\Windows\System32\wship6.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  wship6.dll loaded at 000007FEFCAD0000 [C:\Windows\System32\wship6.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  libsybaseldap64.dll loaded at 0000000005160000 [G:\sybase\DEV\ASE-15_0\bin\libsybaseldap64.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  libsybaseldap64.dll loaded at 0000000005160000 [G:\sybase\DEV\ASE-15_0\bin\libsybaseldap64.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  CRYPTSP.dll loaded at 000007FEFCB40000 [C:\Windows\system32\CRYPTSP.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  CRYPTSP.dll loaded at 000007FEFCB40000 [C:\Windows\system32\CRYPTSP.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  rsaenh.dll loaded at 000007FEFC840000 [C:\Windows\system32\rsaenh.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  rsaenh.dll loaded at 000007FEFC840000 [C:\Windows\system32\rsaenh.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  CRYPTBASE.dll loaded at 000007FEFD1A0000 [C:\Windows\system32\CRYPTBASE.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  CRYPTBASE.dll loaded at 000007FEFD1A0000 [C:\Windows\system32\CRYPTBASE.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  wshtcpip.dll loaded at 000007FEFC4C0000 [C:\Windows\System32\wshtcpip.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  wshtcpip.dll loaded at 000007FEFC4C0000 [C:\Windows\System32\wshtcpip.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  rasadhlp.dll loaded at 000007FEFA890000 [C:\Windows\system32\rasadhlp.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  rasadhlp.dll loaded at 000007FEFA890000 [C:\Windows\system32\rasadhlp.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  fwpuclnt.dll loaded at 000007FEFB460000 [C:\Windows\System32\fwpuclnt.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  fwpuclnt.dll loaded at 000007FEFB460000 [C:\Windows\System32\fwpuclnt.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  apphelp.dll loaded at 000007FEFD140000 [C:\Windows\system32\apphelp.dll]
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  apphelp.dll loaded at 000007FEFD140000 [C:\Windows\system32\apphelp.dll]
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  ************************************
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  ************************************
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  SQL causing error : declare @js_runid int
    declare @js_sjobid int
    select @js_runid = 460200
    select @js_sjobid = 2
    set chained on exec saptools..SP_DBH_ERRORLOG
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  SQL causing error : declare @js_runid int
    declare @js_sjobid int
    select @js_runid = 460199
    select @js_sjobid = 13
    set chained on exec saptools..SP_DBH_THREADS
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  ************************************
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  ************************************
    00:0006:00000:00152:2014/11/18 11:10:00.73 server  SQL Text: declare @js_runid int
    declare @js_sjobid int
    select @js_runid = 460200
    select @js_sjobid = 2
    set chained on exec saptools..SP_DBH_ERRORLOG
    00:0007:00000:00153:2014/11/18 11:10:00.73 server  SQL Text: declare @js_runid int
    declare @js_sjobid int
    select @js_runid = 460199
    select @js_sjobid = 13
    set chained on exec saptools..SP_DBH_THREADS
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  curdb = 5 tempdb = 2 pstat = 0x10000 p2stat = 0x101000
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  curdb = 5 tempdb = 2 pstat = 0x10000 p2stat = 0x101000
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  p3stat = 0x80800 p4stat = 0x0 p5stat = 0x8 p6stat = 0x1 p7stat = 0x10000
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  p3stat = 0x80800 p4stat = 0x0 p5stat = 0x8 p6stat = 0x1 p7stat = 0x10000
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  lasterror = 2805 preverror = 0 transtate = 1
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  lasterror = 2805 preverror = 0 transtate = 1
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  curcmd = 224 program = JS Agent - sapsa             
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  curcmd = 224 program = JS Agent - sapsa             
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  extended error information: hostname:  login: sapsa
    00:0007:00000:00153:2014/11/18 11:10:00.73 kernel  extended error information: hostname:  login: sapsa
    00:0006:00000:00152:2014/11/18 11:10:00.73 kernel  pc: 0x0000000001403C58 os_get_cur_stk_desc+ 0xf8 (0x000000000EDA70F0, 0x000000000EDA70F0, 0x000000000EDA9080, 0x0000000000000000)
    00:0007:00000:00153:2014/11/18 11:10:00.75 kernel  pc: 0x0000000001403C58 os_get_cur_stk_desc+ 0xf8 (0x000000000EEA70F0, 0x000000000EEA70F0, 0x000000000EEA9080, 0x0000000000000000)
    00:0006:00000:00152:2014/11/18 11:10:00.75 kernel  pc: 0x0000000001382872 pcstkwalk+ 0x3e2 (0x0000000000000001, 0x00000000011D008F, 0x000000000000270F, 0x0000000077263566)
    00:0007:00000:00153:2014/11/18 11:10:00.75 kernel  pc: 0x0000000001382872 pcstkwalk+ 0x3e2 (0x0000000000000001, 0x00000000011F0090, 0x000000000000270F, 0x0000000077263566)
    00:0006:00000:00152:2014/11/18 11:10:00.75 kernel  pc: 0x0000000001383089 ucstkgentrace+ 0x339 (0x0000000000FAFEF1, 0x0000000000000001, 0x0000000000000000, 0x0000000000FAFEF1)
    00:0007:00000:00153:2014/11/18 11:10:00.75 kernel  pc: 0x0000000001383089 ucstkgentrace+ 0x339 (0x0000000000FAFEF1, 0x0000000000000001, 0x0000000000000000, 0x0000000000FAFEF1)
    00:0006:00000:00152:2014/11/18 11:10:00.75 kernel  pc: 0x000000000138135F ucbacktrace+ 0xbf (0x00000000C0000005, 0x000000000EDAA370, 0x000000000EDAA370, 0x00000000284ACB70)
    00:0007:00000:00153:2014/11/18 11:10:00.75 kernel  pc: 0x000000000138135F ucbacktrace+ 0xbf (0x00000000C0000005, 0x000000000EEAA370, 0x000000000EEAA370, 0x00000000284AD0B0)
    00:0006:00000:00152:2014/11/18 11:10:00.75 kernel  pc: 0x0000000000409C4B terminate_process+ 0x1b3b (0x00000000011D008F, 0x00000000FFFFFFFF, 0x00000000284ACB70, 0x0000000074A70000)
    00:0007:00000:00153:2014/11/18 11:10:00.75 kernel  pc: 0x0000000000409C4B terminate_process+ 0x1b3b (0x00000000011F0090, 0x00000000FFFFFFFF, 0x00000000284AD0B0, 0x0000000074A70000)
    00:0006:00000:00152:2014/11/18 11:10:00.75 kernel  pc: 0x00000000013CEEFF kiexception+ 0x50f (0x00000000013AFEF1, 0x0000000077389B3E, 0x000000000EDAA470, 0x0000000000000000)
    00:0007:00000:00153:2014/11/18 11:10:00.75 kernel  pc: 0x00000000013CEEFF kiexception+ 0x50f (0x00000000013AFEF1, 0x0000000077389B3E, 0x000000000EEAA470, 0x0000000000000000)
    00:0006:00000:00152:2014/11/18 11:10:00.75 kernel  pc: 0x0000000001CEC2F3 kpntwrapper$filt$0+ 0x13 (0x0000000000000000, 0x00000000000002B7, 0x0000000000000000, 0x0000000000004000)
    00:0007:00000:00153:2014/11/18 11:10:00.75 kernel  pc: 0x0000000001CEC2F3 kpntwrapper$filt$0+ 0x13 (0x0000000000000000, 0x00000000000002B7, 0x0000000000000000, 0x0000000000004000)
    00:0006:00000:00152:2014/11/18 11:10:00.75 kernel  pc: 0x0000000074AE12E3 _C_specific_handler+ 0x97 (0x000000000EDB0000, 0x000000000EDAFF80, 0x000000000EDAFF80, 0x0000000002E11F5C)
    00:0007:00000:00153:2014/11/18 11:10:00.75 kernel  pc: 0x0000000074AE12E3 _C_specific_handler+ 0x97 (0x000000000EEB0000, 0x000000000EEAFF80, 0x000000000EEAFF80, 0x0000000002E11F5C)
    00:0006:00000:00152:2014/11/18 11:10:00.75 kernel  pc: 0x0000000077389D0D RtlDecodePointer+ 0xbd (0x000000000EDB0000, 0x0000000002D87194, 0x00000000000CB3AC, 0x000000000026AC80)
    00:0007:00000:00153:2014/11/18 11:10:00.75 kernel  pc: 0x0000000077389D0D RtlDecodePointer+ 0xbd (0x000000000EEB0000, 0x0000000002D87194, 0x00000000000CB3AC, 0x000000000026AC80)
    00:0006:00000:00152:2014/11/18 11:10:00.75 kernel  pc: 0x00000000773791AF RtlUnwindEx+ 0xbbf (0x000000000EDAAFB0, 0x000000000EDAAAC0, 0x0000000000000000, 0x0000000000000000)
    00:0007:00000:00153:2014/11/18 11:10:00.75 kernel  pc: 0x00000000773791AF RtlUnwindEx+ 0xbbf (0x000000000EEAAFB0, 0x000000000EEAAAC0, 0x0000000000000000, 0x0000000000000000)
    00:0006:00000:00152:2014/11/18 11:10:00.75 kernel  pc: 0x00000000773B1278 KiUserExceptionDispatcher+ 0x2e (0x000000000EDAB7B0, 0x000000000EDAB2E0, 0x000000000EDAB510, 0xFFFFFFFFFFFFFFFF)
    00:0007:00000:00153:2014/11/18 11:10:00.75 kernel  pc: 0x00000000773B1278 KiUserExceptionDispatcher+ 0x2e (0x000000000EEAB7B0, 0x000000000EEAB2E0, 0x000000000EEAB510, 0xFFFFFFFFFFFFFFFF)
    00:0006:00000:00152:2014/11/18 11:10:00.75 kernel  pc: 0x0000000074AC346E vcwprintf_s+ 0x26ce (0x0000000000000001, 0x000000000EDAB6D4, 0x000000000EDABBC0, 0x0000000000000000)
    00:0007:00000:00153:2014/11/18 11:10:00.75 kernel  pc: 0x0000000074AC346E vcwprintf_s+ 0x26ce (0x0000000000000001, 0x000000000EEAB6D4, 0x000000000EEABBC0, 0x0000000000000000)
    00:0006:00000:00152:2014/11/18 11:10:00.75 kernel  pc: 0x0000000074AA1AA3 sprintf+ 0x7b (0x0000000000000000, 0x000000000EDACBD0, 0x00000000FFFF0000, 0x0000000000000019)
    00:0007:00000:00153:2014/11/18 11:10:00.75 kernel  pc: 0x0000000074AA1AA3 sprintf+ 0x7b (0x0000000000000000, 0x000000000EEACBD0, 0x00000000FFFF0000, 0x0000000000000018)
    00:0006:00000:00152:2014/11/18 11:10:00.75 kernel  pc: 0x0000000000FC9C87 ex_stuffp+ 0x4f7 (0x000000005B0952A0, 0x000000000EDABBC0, 0x000000000EDACBD0, 0x0000000000000061)
    00:0007:00000:00153:2014/11/18 11:10:00.75 kernel  pc: 0x0000000000FC9C87 ex_stuffp+ 0x4f7 (0x000000005B0B2890, 0x000000000EEABBC0, 0x000000000EEACBD0, 0x0000000000000061)
    00:0006:00000:00152:2014/11/18 11:10:00.75 kernel  pc: 0x0000000000FCB1FD ex__logprint+ 0x38d (0x000000005B0952A0, 0x000000005B0952A0, 0x00000000805CE000, 0x0000000000000000)
    00:0007:00000:00153:2014/11/18 11:10:00.75 kernel  pc: 0x0000000000FCB1FD ex__logprint+ 0x38d (0x000000005B0B2890, 0x000000005B0B2890, 0x0000000080EF2800, 0x0000000000000000)
    00:0006:00000:00152:2014/11/18 11:10:00.75 kernel  pc: 0x0000000000FCB776 ex_logprint+ 0xe6 (0x000000005B0952A0, 0x0000000000000000, 0x00000000FFFF0000, 0x000000000000002B)
    00:0007:00000:00153:2014/11/18 11:10:00.75 kernel  pc: 0x0000000000FCB776 ex_logprint+ 0xe6 (0x000000005B0B2890, 0x0000000000000000, 0x00000000FFFF0000, 0x000000000000002B)
    00:0006:00000:00152:2014/11/18 11:10:00.75 kernel  pc: 0x0000000000BE6C31 proc_read__backout+ 0x1d1 (0x00000000812BF000, 0x000000000000001C, 0x0000000000000012, 0x000000005B0952A0)
    00:0007:00000:00153:2014/11/18 11:10:00.75 kernel  pc: 0x0000000000BE6C31 proc_read__backout+ 0x1d1 (0x00000000812C9000, 0x000000000000001C, 0x0000000000000012, 0x000000005B0B2890)
    00:0006:00000:00152:2014/11/18 11:10:00.75 kernel  pc: 0x0000000000BE6A2E proc_handle+ 0x9e (0x000000005B0AD420, 0x0000000000000000, 0x0000000000000012, 0x0000000000BE633A)
    00:0007:00000:00153:2014/11/18 11:10:00.75 kernel  pc: 0x0000000000BE6A2E proc_handle+ 0x9e (0x000000005B0CAA10, 0x0000000000000000, 0x0000000000000012, 0x0000000000BE633A)
    00:0006:00000:00152:2014/11/18 11:10:00.75 kernel  pc: 0x0000000000FCE317 exc__raise+ 0x6c7 (0x000000005B0952A0, 0x0000000000400000, 0x0000000000000000, 0x0000000000000AF5)
    00:0007:00000:00153:2014/11/18 11:10:00.75 kernel  pc: 0x0000000000FCE317 exc__raise+ 0x6c7 (0x000000005B0B2890, 0x0000000000400000, 0x0000000000000000, 0x0000000000000AF5)
    00:0006:00000:00152:2014/11/18 11:10:00.75 kernel  pc: 0x0000000000FCE96E exc_raise+ 0x11e (0x000000000102523B, 0x000000000000001C, 0x0000000000000005, 0x0000000000000012)
    00:0007:00000:00153:2014/11/18 11:10:00.75 kernel  pc: 0x0000000000FCE96E exc_raise+ 0x11e (0x000000000102523B, 0x000000000000001C, 0x0000000000000005, 0x0000000000000012)
    00:0006:00000:00152:2014/11/18 11:10:00.75 kernel  pc: 0x0000000000BED3D4 proc_read+ 0xbe4 (0x0000000000000000, 0x0000000000000001, 0x000000005B0952A0, 0x000000004ED2AAB0)
    00:0007:00000:00153:2014/11/18 11:10:00.75 kernel  pc: 0x0000000000BED3D4 proc_read+ 0xbe4 (0x0000000000000000, 0x0000000000000001, 0x000000005B0B2890, 0x000000004E7F98B0)
    00:0006:00000:00152:2014/11/18 11:10:00.75 kernel  pc: 0x0000000000BEE1A7 proc_get+ 0x3f7 (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000)
    00:0007:00000:00153:2014/11/18 11:10:00.75 kernel  pc: 0x0000000000BEE1A7 proc_get+ 0x3f7 (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000)
    00:0006:00000:00152:2014/11/18 11:10:00.75 kernel  pc: 0x0000000000F3E97B s_getTreeOrPlan+ 0x19b (0x000000005B0952A0, 0x000000000EDAE810, 0x0000000000000001, 0x0000000000000000)
    00:0007:00000:00153:2014/11/18 11:10:00.75 kernel  pc: 0x0000000000F3E97B s_getTreeOrPlan+ 0x19b (0x000000005B0B2890, 0x000000000EEAE810, 0x0000000000000001, 0x0000000000000000)
    00:0006:00000:00152:2014/11/18 11:10:00.75 kernel  pc: 0x0000000000EDE2D4 execproc+ 0x3a4 (0x00000000000000E0, 0x0000000000000001, 0x000000000EDAED60, 0x00000000000000E0)
    00:0007:00000:00153:2014/11/18 11:10:00.75 kernel  pc: 0x0000000000EDE2D4 execproc+ 0x3a4 (0x00000000000000E0, 0x0000000000000001, 0x000000000EEAED60, 0x00000000000000E0)
    00:0006:00000:00152:2014/11/18 11:10:00.75 kernel  pc: 0x0000000000EE4D02 s_execute+ 0x4692 (0x000000005B0952A0, 0x000000005B0952A0, 0x0000000080760960, 0x0000000000000001)
    00:0007:00000:00153:2014/11/18 11:10:00.75 kernel  pc: 0x0000000000EE4D02 s_execute+ 0x4692 (0x000000005B0B2890, 0x000000005B0B2890, 0x00000000806DD960, 0x0000000000000001)
    00:0006:00000:00152:2014/11/18 11:10:00.75 kernel  pc: 0x0000000000EF7476 sequencer+ 0x1f86 (0x000000005B0952A0, 0x000000005B0952A0, 0x0000000000000021, 0x0000000000000001)
    00:0007:00000:00153:2014/11/18 11:10:00.75 kernel  pc: 0x0000000000EF7476 sequencer+ 0x1f86 (0x000000005B0B2890, 0x000000005B0B2890, 0x0000000000000021, 0x0000000000000001)
    00:0006:00000:00152:2014/11/18 11:10:00.75 kernel  pc: 0x0000000000467406 tdsrecv_language+ 0x706 (0x0000000000000021, 0x0000000000400000, 0x0000000000000000, 0x0000000000000021)
    00:0007:00000:00153:2014/11/18 11:10:00.77 kernel  pc: 0x0000000000467406 tdsrecv_language+ 0x706 (0x0000000000000021, 0x0000000000400000, 0x0000000000000000, 0x0000000000000021)
    00:0006:00000:00152:2014/11/18 11:10:00.77 kernel  pc: 0x000000000042BF87 conn_hdlr+ 0x2307 (0x00000000284ACB70, 0x00000000284ACB70, 0x0000000000000000, 0x0000000000000000)
    00:0007:00000:00153:2014/11/18 11:10:00.77 kernel  pc: 0x000000000042BF87 conn_hdlr+ 0x2307 (0x00000000284AD0B0, 0x00000000284AD0B0, 0x0000000000000000, 0x0000000000000000)
    00:0006:00000:00152:2014/11/18 11:10:00.77 kernel  pc: 0x00000000013AFEF1 kpntwrapper+ 0x51 (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000)
    00:0007:00000:00153:2014/11/18 11:10:00.77 kernel  pc: 0x00000000013AFEF1 kpntwrapper+ 0x51 (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000)
    00:0006:00000:00152:2014/11/18 11:10:00.77 kernel  pc: 0x0000000077248FED CreateFiberEx+ 0x27d (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000)
    00:0007:00000:00153:2014/11/18 11:10:00.77 kernel  pc: 0x0000000077248FED CreateFiberEx+ 0x27d (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000)
    00:0006:00000:00152:2014/11/18 11:10:00.77 kernel  end of stack trace, spid 152, kpid 18677903, suid 4
    00:0007:00000:00153:2014/11/18 11:10:00.77 kernel  end of stack trace, spid 153, kpid 18808976, suid 4
    00:0006:00000:00153:2014/11/18 11:10:00.77 kernel  attempted read from memory location 0000000000000018 from instruction at location 0x0000000074AC346E
    00:0006:00000:00153:2014/11/18 11:10:00.77 kernel  Adaptive Server Enterprise system exception (0xc0000005) generated by a storage access violation.
    00:0006:00000:00153:2014/11/18 11:10:00.77 kernel  pc: 0x0000000074AC346E vcwprintf_s+ 0x26ce (0x0000000000000001, 0x000000000EEA7DC4, 0x000000000EEA82B0, 0x0000000000000000)
    00:0006:00000:00153:2014/11/18 11:10:00.77 kernel  pc: 0x0000000074AA1AA3 sprintf+ 0x7b (0x0000000000000000, 0x000000000EEA92C0, 0x00000000812C9000, 0x0000000000000018)
    00:0006:00000:00153:2014/11/18 11:10:00.77 kernel  pc: 0x0000000000FC9C87 ex_stuffp+ 0x4f7 (0x000000005B0B2890, 0x000000000EEA82B0, 0x000000000EEA92C0, 0x0000000000000061)
    00:0006:00000:00153:2014/11/18 11:10:00.77 kernel  pc: 0x0000000000FCB1FD ex__logprint+ 0x38d (0x00000000FFFFFFFF, 0x000007FEFCAE24A1, 0x000000000471F7A0, 0x000007FEFE4317C0)
    00:0006:00000:00153:2014/11/18 11:10:00.77 kernel  pc: 0x0000000000FCB776 ex_logprint+ 0xe6 (0x000000005B0B2890, 0x0000000000000000, 0x00000000812C9000, 0x00000000812C9000)
    00:0006:00000:00153:2014/11/18 11:10:00.77 kernel  pc: 0x0000000000BE6C31 proc_read__backout+ 0x1d1 (0x00000000812C9000, 0x000000000EEA9899, 0x000000000EEAA370, 0x0000000000000000)
    00:0006:00000:00153:2014/11/18 11:10:00.77 kernel  pc: 0x0000000000428D85 kill_proc+ 0x1f5 (0x0000000000000000, 0x00000000C0000005, 0x000000000EEAA370, 0x00000000284AD0B0)
    00:0006:00000:00153:2014/11/18 11:10:00.77 kernel  pc: 0x000000000040A2B4 terminate_process+ 0x21a4 (0x00000000011F0090, 0x00000000FFFFFFFF, 0x00000000284AD0B0, 0x0000000074A70000)
    00:0007:00000:00152:2014/11/18 11:10:00.77 kernel  attempted read from memory location 0000000000000019 from instruction at location 0x0000000074AC346E
    00:0007:00000:00152:2014/11/18 11:10:00.77 kernel  Adaptive Server Enterprise system exception (0xc0000005) generated by a storage access violation.
    00:0006:00000:00153:2014/11/18 11:10:00.77 kernel  pc: 0x00000000013CEEFF kiexception+ 0x50f (0x00000000013AFEF1, 0x0000000077389B3E, 0x000000000EEAA470, 0x0000000000000000)
    00:0007:00000:00152:2014/11/18 11:10:00.77 kernel  pc: 0x0000000074AC346E vcwprintf_s+ 0x26ce (0x0000000000000001, 0x000000000EDA7DC4, 0x000000000EDA82B0, 0x0000000000000000)
    00:0006:00000:00153:2014/11/18 11:10:00.77 kernel  pc: 0x0000000001CEC2F3 kpntwrapper$filt$0+ 0x13 (0x0000000000000000, 0x00000000000002B7, 0x0000000000000000, 0x0000000000004000)
    00:0007:00000:00152:2014/11/18 11:10:00.77 kernel  pc: 0x0000000074AA1AA3 sprintf+ 0x7b (0x0000000000000000, 0x000000000EDA92C0, 0x00000000812BF000, 0x0000000000000019)
    00:0006:00000:00153:2014/11/18 11:10:00.77 kernel  pc: 0x0000000074AE12E3 _C_specific_handler+ 0x97 (0x000000000EEB0000, 0x000000000EEAFF80, 0x000000000EEAFF80, 0x0000000002E11F5C)
    00:0007:00000:00152:2014/11/18 11:10:00.77 kernel  pc: 0x0000000000FC9C87 ex_stuffp+ 0x4f7 (0x000000005B0952A0, 0x000000000EDA82B0, 0x000000000EDA92C0, 0x0000000000000061)
    00:0006:00000:00153:2014/11/18 11:10:00.77 kernel  pc: 0x0000000077389D0D RtlDecodePointer+ 0xbd (0x000000000EEB0000, 0x0000000002D87194, 0x00000000000CB3AC, 0x000000000026AC80)
    00:0007:00000:00152:2014/11/18 11:10:00.77 kernel  pc: 0x0000000000FCB1FD ex__logprint+ 0x38d (0x00000000FFFFFFFF, 0x000007FEFCAE24A1, 0x000000000471FE80, 0x000007FEFE4317C0)
    00:0006:00000:00153:2014/11/18 11:10:00.77 kernel  pc: 0x00000000773791AF RtlUnwindEx+ 0xbbf (0x000000000EEAAFB0, 0x000000000EEAAAC0, 0x0000000000000000, 0x0000000000000000)
    00:0007:00000:00152:2014/11/18 11:10:00.77 kernel  pc: 0x0000000000FCB776 ex_logprint+ 0xe6 (0x000000005B0952A0, 0x0000000000000000, 0x00000000812BF000, 0x00000000812BF000)
    00:0006:00000:00153:2014/11/18 11:10:00.77 kernel  pc: 0x00000000773B1278 KiUserExceptionDispatcher+ 0x2e (0x000000000EEAB7B0, 0x000000000EEAB2E0, 0x000000000EEAB510, 0xFFFFFFFFFFFFFFFF)
    00:0007:00000:00152:2014/11/18 11:10:00.77 kernel  pc: 0x0000000000BE6C31 proc_read__backout+ 0x1d1 (0x00000000812BF000, 0x000000000EDA9899, 0x000000000EDAA370, 0x0000000000000000)
    00:0006:00000:00153:2014/11/18 11:10:00.77 kernel  pc: 0x0000000074AC346E vcwprintf_s+ 0x26ce (0x0000000000000001, 0x000000000EEAB6D4, 0x000000000EEABBC0, 0x0000000000000000)
    00:0007:00000:00152:2014/11/18 11:10:00.77 kernel  pc: 0x0000000000428D85 kill_proc+ 0x1f5 (0x0000000000000000, 0x00000000C0000005, 0x000000000EDAA370, 0x00000000284ACB70)
    00:0006:00000:00153:2014/11/18 11:10:00.77 kernel  pc: 0x0000000074AA1AA3 sprintf+ 0x7b (0x0000000000000000, 0x000000000EEACBD0, 0x00000000FFFF0000, 0x0000000000000018)
    00:0007:00000:00152:2014/11/18 11:10:00.77 kernel  pc: 0x000000000040A2B4 terminate_process+ 0x21a4 (0x00000000011D008F, 0x00000000FFFFFFFF, 0x00000000284ACB70, 0x0000000074A70000)
    00:0006:00000:00153:2014/11/18 11:10:00.77 kernel  pc: 0x0000000000FC9C87 ex_stuffp+ 0x4f7 (0x000000005B0B2890, 0x000000000EEABBC0, 0x000000000EEACBD0, 0x0000000000000061)
    00:0007:00000:00152:2014/11/18 11:10:00.77 kernel  pc: 0x00000000013CEEFF kiexception+ 0x50f (0x00000000013AFEF1, 0x0000000077389B3E, 0x000000000EDAA470, 0x0000000000000000)
    00:0006:00000:00153:2014/11/18 11:10:00.77 kernel  pc: 0x0000000000FCB1FD ex__logprint+ 0x38d (0x000000005B0B2890, 0x000000005B0B2890, 0x0000000080EF2800, 0x0000000000000000)
    00:0007:00000:00152:2014/11/18 11:10:00.77 kernel  pc: 0x0000000001CEC2F3 kpntwrapper$filt$0+ 0x13 (0x0000000000000000, 0x00000000000002B7, 0x0000000000000000, 0x0000000000004000)
    00:0006:00000:00153:2014/11/18 11:10:00.77 kernel  pc: 0x0000000000FCB776 ex_logprint+ 0xe6 (0x000000005B0B2890, 0x0000000000000000, 0x00000000FFFF0000, 0x000000000000002B)
    00:0007:00000:00152:2014/11/18 11:10:00.77 kernel  pc: 0x0000000074AE12E3 _C_specific_handler+ 0x97 (0x000000000EDB0000, 0x000000000EDAFF80, 0x000000000EDAFF80, 0x0000000002E11F5C)
    00:0006:00000:00153:2014/11/18 11:10:00.77 kernel  pc: 0x0000000000BE6C31 proc_read__backout+ 0x1d1 (0x00000000812C9000, 0x000000000000001C, 0x0000000000000012, 0x000000005B0B2890)
    00:0007:00000:00152:2014/11/18 11:10:00.77 kernel  pc: 0x0000000077389D0D RtlDecodePointer+ 0xbd (0x000000000EDB0000, 0x0000000002D87194, 0x00000000000CB3AC, 0x000000000026AC80)
    00:0006:00000:00153:2014/11/18 11:10:00.77 kernel  pc: 0x0000000000BE6A2E proc_handle+ 0x9e (0x000000005B0CAA10, 0x0000000000000000, 0x0000000000000012, 0x0000000000BE633A)
    00:0007:00000:00152:2014/11/18 11:10:00.77 kernel  pc: 0x00000000773791AF RtlUnwindEx+ 0xbbf (0x000000000EDAAFB0, 0x000000000EDAAAC0, 0x0000000000000000, 0x0000000000000000)
    00:0007:00000:00152:2014/11/18 11:10:00.77 kernel  pc: 0x00000000773B1278 KiUserExceptionDispatcher+ 0x2e (0x000000000EDAB7B0, 0x000000000EDAB2E0, 0x000000000EDAB510, 0xFFFFFFFFFFFFFFFF)
    00:0006:00000:00153:2014/11/18 11:10:00.77 kernel  pc: 0x0000000000FCE317 exc__raise+ 0x6c7 (0x000000005B0B2890, 0x0000000000400000, 0x0000000000000000, 0x0000000000000AF5)
    00:0007:00000:00152:2014/11/18 11:10:00.77 kernel  pc: 0x0000000074AC346E vcwprintf_s+ 0x26ce (0x0000000000000001, 0x000000000EDAB6D4, 0x000000000EDABBC0, 0x0000000000000000)
    00:0006:00000:00153:2014/11/18 11:10:00.77 kernel  pc: 0x0000000000FCE96E exc_raise+ 0x11e (0x000000000102523B, 0x000000000000001C, 0x0000000000000005, 0x0000000000000012)
    00:0007:00000:00152:2014/11/18 11:10:00.77 kernel  pc: 0x0000000074AA1AA3 sprintf+ 0x7b (0x0000000000000000, 0x000000000EDACBD0, 0x00000000FFFF0000, 0x0000000000000019)
    00:0006:00000:00153:2014/11/18 11:10:00.77 kernel  pc: 0x0000000000BED3D4 proc_read+ 0xbe4 (0x0000000000000000, 0x0000000000000001, 0x000000005B0B2890, 0x000000004E7F98B0)
    00:0007:00000:00152:2014/11/18 11:10:00.77 kernel  pc: 0x0000000000FC9C87 ex_stuffp+ 0x4f7 (0x000000005B0952A0, 0x000000000EDABBC0, 0x000000000EDACBD0, 0x0000000000000061)
    00:0006:00000:00153:2014/11/18 11:10:00.77 kernel  pc: 0x0000000000BEE1A7 proc_get+ 0x3f7 (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000)
    00:0007:00000:00152:2014/11/18 11:10:00.77 kernel  pc: 0x0000000000FCB1FD ex__logprint+ 0x38d (0x000000005B0952A0, 0x000000005B0952A0, 0x00000000805CE000, 0x0000000000000000)
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  pc: 0x0000000000F3E97B s_getTreeOrPlan+ 0x19b (0x000000005B0B2890, 0x000000000EEAE810, 0x0000000000000001, 0x0000000000000000)
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  pc: 0x0000000000FCB776 ex_logprint+ 0xe6 (0x000000005B0952A0, 0x0000000000000000, 0x00000000FFFF0000, 0x000000000000002B)
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  pc: 0x0000000000EDE2D4 execproc+ 0x3a4 (0x00000000000000E0, 0x0000000000000001, 0x000000000EEAED60, 0x00000000000000E0)
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  pc: 0x0000000000BE6C31 proc_read__backout+ 0x1d1 (0x00000000812BF000, 0x000000000000001C, 0x0000000000000012, 0x000000005B0952A0)
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  pc: 0x0000000000EE4D02 s_execute+ 0x4692 (0x000000005B0B2890, 0x000000005B0B2890, 0x00000000806DD960, 0x0000000000000001)
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  pc: 0x0000000000BE6A2E proc_handle+ 0x9e (0x000000005B0AD420, 0x0000000000000000, 0x0000000000000012, 0x0000000000BE633A)
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  pc: 0x0000000000EF7476 sequencer+ 0x1f86 (0x000000005B0B2890, 0x000000005B0B2890, 0x0000000000000021, 0x0000000000000001)
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  pc: 0x0000000000FCE317 exc__raise+ 0x6c7 (0x000000005B0952A0, 0x0000000000400000, 0x0000000000000000, 0x0000000000000AF5)
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  pc: 0x0000000000467406 tdsrecv_language+ 0x706 (0x0000000000000021, 0x0000000000400000, 0x0000000000000000, 0x0000000000000021)
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  pc: 0x0000000000FCE96E exc_raise+ 0x11e (0x000000000102523B, 0x000000000000001C, 0x0000000000000005, 0x0000000000000012)
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  pc: 0x000000000042BF87 conn_hdlr+ 0x2307 (0x00000000284AD0B0, 0x00000000284AD0B0, 0x0000000000000000, 0x0000000000000000)
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  end of stack trace, spid 153, kpid 18808976, suid 4
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  pc: 0x0000000000BED3D4 proc_read+ 0xbe4 (0x0000000000000000, 0x0000000000000001, 0x000000005B0952A0, 0x000000004ED2AAB0)
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  DUMP OF LOADED MODULES:-
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  sqlsrvr.exe loaded at 0000000000400000 [G:\sybase\DEV\ASE-15_0\bin\sqlsrvr.exe]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  pc: 0x0000000000BEE1A7 proc_get+ 0x3f7 (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000)
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  ntdll.dll loaded at 0000000077360000 [C:\Windows\SYSTEM32\ntdll.dll]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  kernel32.dll loaded at 0000000077240000 [C:\Windows\system32\kernel32.dll]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  KERNELBASE.dll loaded at 000007FEFD5B0000 [C:\Windows\system32\KERNELBASE.dll]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  MSVCR100.dll loaded at 0000000074A70000 [C:\Windows\system32\MSVCR100.dll]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  pc: 0x0000000000F3E97B s_getTreeOrPlan+ 0x19b (0x000000005B0952A0, 0x000000000EDAE810, 0x0000000000000001, 0x0000000000000000)
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  libsybblk64.dll loaded at 0000000180000000 [G:\sybase\DEV\ASE-15_0\bin\libsybblk64.dll]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  libsybct64.dll loaded at 0000000000110000 [G:\sybase\DEV\ASE-15_0\bin\libsybct64.dll]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  pc: 0x0000000000EDE2D4 execproc+ 0x3a4 (0x00000000000000E0, 0x0000000000000001, 0x000000000EDAED60, 0x00000000000000E0)
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  libsybcs64.dll loaded at 00000000001E0000 [G:\sybase\DEV\ASE-15_0\bin\libsybcs64.dll]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  libsybcomn64.dll loaded at 0000000000310000 [G:\sybase\DEV\ASE-15_0\bin\libsybcomn64.dll]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  pc: 0x0000000000EE4D02 s_execute+ 0x4692 (0x000000005B0952A0, 0x000000005B0952A0, 0x0000000080760960, 0x0000000000000001)
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  libsybintl64.dll loaded at 00000000003E0000 [G:\sybase\DEV\ASE-15_0\bin\libsybintl64.dll]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  ADVAPI32.dll loaded at 000007FEFDB50000 [C:\Windows\system32\ADVAPI32.dll]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  msvcrt.dll loaded at 000007FEFDAB0000 [C:\Windows\system32\msvcrt.dll]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  pc: 0x0000000000EF7476 sequencer+ 0x1f86 (0x000000005B0952A0, 0x000000005B0952A0, 0x0000000000000021, 0x0000000000000001)
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  sechost.dll loaded at 000007FEFE350000 [C:\Windows\SYSTEM32\sechost.dll]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  RPCRT4.dll loaded at 000007FEFDDB0000 [C:\Windows\system32\RPCRT4.dll]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  MSVCR80.dll loaded at 000000006F690000 [C:\Windows\WinSxS\amd64_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.6229_none_88dcc0bf2fb1b808\MSVCR80.dll]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  pc: 0x0000000000467406 tdsrecv_language+ 0x706 (0x0000000000000021, 0x0000000000400000, 0x0000000000000000, 0x0000000000000021)
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  libsybunic64.dll loaded at 0000000002E70000 [G:\sybase\DEV\ASE-15_0\bin\libsybunic64.dll]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  libsybtcl64.dll loaded at 0000000002EF0000 [G:\sybase\DEV\ASE-15_0\bin\libsybtcl64.dll]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  WS2_32.dll loaded at 000007FEFE430000 [C:\Windows\system32\WS2_32.dll]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  pc: 0x000000000042BF87 conn_hdlr+ 0x2307 (0x00000000284ACB70, 0x00000000284ACB70, 0x0000000000000000, 0x0000000000000000)
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  end of stack trace, spid 152, kpid 18677903, suid 4
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  NSI.dll loaded at 000007FEFE420000 [C:\Windows\system32\NSI.dll]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  DUMP OF LOADED MODULES:-
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  WSOCK32.dll loaded at 000007FEFA6B0000 [C:\Windows\system32\WSOCK32.dll]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  sqlsrvr.exe loaded at 0000000000400000 [G:\sybase\DEV\ASE-15_0\bin\sqlsrvr.exe]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  MSWSOCK.DLL loaded at 000007FEFCAE0000 [C:\Windows\system32\MSWSOCK.DLL]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  ntdll.dll loaded at 0000000077360000 [C:\Windows\SYSTEM32\ntdll.dll]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  user32.dll loaded at 0000000077140000 [C:\Windows\system32\user32.dll]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  kernel32.dll loaded at 0000000077240000 [C:\Windows\system32\kernel32.dll]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  GDI32.dll loaded at 000007FEFF290000 [C:\Windows\system32\GDI32.dll]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  KERNELBASE.dll loaded at 000007FEFD5B0000 [C:\Windows\system32\KERNELBASE.dll]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  LPK.dll loaded at 000007FEFE410000 [C:\Windows\system32\LPK.dll]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  MSVCR100.dll loaded at 0000000074A70000 [C:\Windows\system32\MSVCR100.dll]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  USP10.dll loaded at 000007FEFDEE0000 [C:\Windows\system32\USP10.dll]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  libsybblk64.dll loaded at 0000000180000000 [G:\sybase\DEV\ASE-15_0\bin\libsybblk64.dll]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  COMDLG32.dll loaded at 000007FEFD8E0000 [C:\Windows\system32\COMDLG32.dll]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  libsybct64.dll loaded at 0000000000110000 [G:\sybase\DEV\ASE-15_0\bin\libsybct64.dll]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  SHLWAPI.dll loaded at 000007FEFE1C0000 [C:\Windows\system32\SHLWAPI.dll]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  libsybcs64.dll loaded at 00000000001E0000 [G:\sybase\DEV\ASE-15_0\bin\libsybcs64.dll]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  COMCTL32.dll loaded at 000007FEFA140000 [C:\Windows\WinSxS\amd64_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_a4d6a923711520a9\COMCTL32.dll]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  libsybcomn64.dll loaded at 0000000000310000 [G:\sybase\DEV\ASE-15_0\bin\libsybcomn64.dll]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  libsybintl64.dll loaded at 00000000003E0000 [G:\sybase\DEV\ASE-15_0\bin\libsybintl64.dll]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  SHELL32.dll loaded at 000007FEFE480000 [C:\Windows\system32\SHELL32.dll]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  ADVAPI32.dll loaded at 000007FEFDB50000 [C:\Windows\system32\ADVAPI32.dll]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  NETAPI32.dll loaded at 000007FEFAC60000 [C:\Windows\system32\NETAPI32.dll]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  msvcrt.dll loaded at 000007FEFDAB0000 [C:\Windows\system32\msvcrt.dll]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  netutils.dll loaded at 000007FEFC770000 [C:\Windows\system32\netutils.dll]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  sechost.dll loaded at 000007FEFE350000 [C:\Windows\SYSTEM32\sechost.dll]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  srvcli.dll loaded at 000007FEFCDC0000 [C:\Windows\system32\srvcli.dll]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  RPCRT4.dll loaded at 000007FEFDDB0000 [C:\Windows\system32\RPCRT4.dll]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  wkscli.dll loaded at 000007FEFAC40000 [C:\Windows\system32\wkscli.dll]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  MSVCR80.dll loaded at 000000006F690000 [C:\Windows\WinSxS\amd64_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.6229_none_88dcc0bf2fb1b808\MSVCR80.dll]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  dbghelp.dll loaded at 000007FEF9FB0000 [C:\Windows\system32\dbghelp.dll]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  libsybunic64.dll loaded at 0000000002E70000 [G:\sybase\DEV\ASE-15_0\bin\libsybunic64.dll]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  PSAPI.DLL loaded at 0000000077520000 [C:\Windows\system32\PSAPI.DLL]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  libsybtcl64.dll loaded at 0000000002EF0000 [G:\sybase\DEV\ASE-15_0\bin\libsybtcl64.dll]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  IPHLPAPI.DLL loaded at 000007FEFB6B0000 [C:\Windows\system32\IPHLPAPI.DLL]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  WS2_32.dll loaded at 000007FEFE430000 [C:\Windows\system32\WS2_32.dll]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  WINNSI.DLL loaded at 000007FEFB660000 [C:\Windows\system32\WINNSI.DLL]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  NSI.dll loaded at 000007FEFE420000 [C:\Windows\system32\NSI.dll]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  loadperf.dll loaded at 000007FEF3B30000 [C:\Windows\system32\loadperf.dll]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  WSOCK32.dll loaded at 000007FEFA6B0000 [C:\Windows\system32\WSOCK32.dll]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  ole32.dll loaded at 000007FEFDFB0000 [C:\Windows\system32\ole32.dll]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  MSWSOCK.DLL loaded at 000007FEFCAE0000 [C:\Windows\system32\MSWSOCK.DLL]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  OLEAUT32.dll loaded at 000007FEFF300000 [C:\Windows\system32\OLEAUT32.dll]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  user32.dll loaded at 0000000077140000 [C:\Windows\system32\user32.dll]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  sybcsi_core29.dll loaded at 0000000002F40000 [G:\sybase\DEV\ASE-15_0\bin\sybcsi_core29.dll]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  GDI32.dll loaded at 000007FEFF290000 [C:\Windows\system32\GDI32.dll]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  sybcsi_profiler29.dll loaded at 0000000002FA0000 [G:\sybase\DEV\ASE-15_0\bin\sybcsi_profiler29.dll]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  LPK.dll loaded at 000007FEFE410000 [C:\Windows\system32\LPK.dll]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  USP10.dll loaded at 000007FEFDEE0000 [C:\Windows\system32\USP10.dll]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  sybcsi_propertiesconfig29.dll loaded at 0000000002FC0000 [G:\sybase\DEV\ASE-15_0\bin\sybcsi_propertiesconfig29.dll]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  COMDLG32.dll loaded at 000007FEFD8E0000 [C:\Windows\system32\COMDLG32.dll]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  sybcsi_openssl29.dll loaded at 0000000002FE0000 [G:\sybase\DEV\ASE-15_0\bin\sybcsi_openssl29.dll]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  SHLWAPI.dll loaded at 000007FEFE1C0000 [C:\Windows\system32\SHLWAPI.dll]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  MPR.dll loaded at 000007FEFA610000 [C:\Windows\system32\MPR.dll]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  COMCTL32.dll loaded at 000007FEFA140000 [C:\Windows\WinSxS\amd64_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_a4d6a923711520a9\COMCTL32.dll]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  IMM32.DLL loaded at 000007FEFF3E0000 [C:\Windows\system32\IMM32.DLL]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  SHELL32.dll loaded at 000007FEFE480000 [C:\Windows\system32\SHELL32.dll]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  MSCTF.dll loaded at 000007FEFE240000 [C:\Windows\system32\MSCTF.dll]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  NETAPI32.dll loaded at 000007FEFAC60000 [C:\Windows\system32\NETAPI32.dll]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  ntmarta.dll loaded at 000007FEFC3D0000 [C:\Windows\system32\ntmarta.dll]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  netutils.dll loaded at 000007FEFC770000 [C:\Windows\system32\netutils.dll]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  WLDAP32.dll loaded at 000007FEFD860000 [C:\Windows\system32\WLDAP32.dll]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  srvcli.dll loaded at 000007FEFCDC0000 [C:\Windows\system32\srvcli.dll]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  SYBEVENT.DLL loaded at 0000000010000000 [G:\sybase\DEV\ASE-15_0\dll\SYBEVENT.DLL]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  wkscli.dll loaded at 000007FEFAC40000 [C:\Windows\system32\wkscli.dll]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  DNSAPI.dll loaded at 000007FEFC960000 [C:\Windows\system32\DNSAPI.dll]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  dbghelp.dll loaded at 000007FEF9FB0000 [C:\Windows\system32\dbghelp.dll]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  dhcpcsvc6.DLL loaded at 000007FEFB330000 [C:\Windows\system32\dhcpcsvc6.DLL]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  PSAPI.DLL loaded at 0000000077520000 [C:\Windows\system32\PSAPI.DLL]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  dhcpcsvc.DLL loaded at 000007FEFB310000 [C:\Windows\system32\dhcpcsvc.DLL]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  IPHLPAPI.DLL loaded at 000007FEFB6B0000 [C:\Windows\system32\IPHLPAPI.DLL]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  icmp.Dll loaded at 0000000070890000 [C:\Windows\system32\icmp.Dll]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  WINNSI.DLL loaded at 000007FEFB660000 [C:\Windows\system32\WINNSI.DLL]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  wship6.dll loaded at 000007FEFCAD0000 [C:\Windows\System32\wship6.dll]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  loadperf.dll loaded at 000007FEF3B30000 [C:\Windows\system32\loadperf.dll]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  libsybaseldap64.dll loaded at 0000000005160000 [G:\sybase\DEV\ASE-15_0\bin\libsybaseldap64.dll]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  ole32.dll loaded at 000007FEFDFB0000 [C:\Windows\system32\ole32.dll]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  CRYPTSP.dll loaded at 000007FEFCB40000 [C:\Windows\system32\CRYPTSP.dll]
    00:0007:00000:00152:2014/11/18 11:10:00.78 kernel  OLEAUT32.dll loaded at 000007FEFF300000 [C:\Windows\system32\OLEAUT32.dll]
    00:0006:00000:00153:2014/11/18 11:10:00.78 kernel  rsaenh.dll loaded at

    Hi,
    i forgot to update the status, sorry!
    Opened a support incident; the upgrade procedure was not fine for saptools database because it was not able to enlarge automatically. Increased the size manually and restart the database.
    Upgrade was terminated fine and error in log file disappeared.
    Regards.

  • Get memory location....need help

    I download XSQL servle and set it up already.
    Now I try the "Adhoc Query Visualization" from my own database, but if I query from a view or from a object type is varchar2 then I will get the memory location. I tried the same example from OTN live demo, it works normal. So why I get the memory location?
    Here is my Demo http://211.75.41.149:7070/xsql/demo/adhocsql/sqltoxml.html
    Thank you for your any help.
    null

    Forget it. I tried your URL and see the output. Have to check with a few people who might recall a similar problem.
    You'll notice that on your installation,
    a query that does not involve user-defined
    objects like:
    SELECT * FROM EMP
    does not have any problem.

  • [C Programming Language] How to check if the memory location speci ...

    How do I check if the memory location specified in the pointer is freed and available or not? in C.

    Barrucadu wrote:
    Furthermore, you can't check if a pointer has been freed or not, as the value of the pointer is unchanged. I find it's often useful to have a "checked free" macro like this:
    #define xfree(ptr) if(ptr != NULL) { free(ptr); ptr = NULL; }
    Now you're safe from accidental double-frees (although, their presence indicates something is wrong with your logic somewhere, even if they're harmless) and you can easily see if a pointer has been freed (which, again, should really not be in doubt, but it's nice to be sure).
    free does nothing if the pointer is already NULL, so the if statement is pointless.  Use this:
    #define xfree(ptr) do { free(ptr); ptr = NULL; } while (0);

  • Removing write-protection from a memory card

    How does one remove the write-protection from a memory car? I have been trying to copy some sound and pictures from my computer to my memory card, but it has been telling me that the memory card is write protected and I have to remove the write protection. someone please help!!!

    Hi tessiebest
    Is memory card in SD adapter in card reader on your PC, as there is a little slider on the SD adapter which you can slide to "lock" write protect?
    You can also "password protect" a memory card in your phone.
    Happy to have helped forum in a small way with a Support Ratio = 37.0

  • RUNDLL Error loading CTMBHA.DLL invalid access to memory locat

    Error message at start up:? "Error loading CTMBHA.DLL? Invalid access to memory location"
    Does anyone know if this file has to do with Sound Blaster Audigy ADVANCED MB Ready, DR release 5.0.3708 ??If so, I will follow the reinstall instructions per the FAQ.?Thanks.

    Here's the solution from the_Riddler that works:?So I broke out REGMON from sysinternals, and tried the install when the Status 200 error came up I saw that they were accessing the "C:\Documents and Settings\All Users\Application Data\Creative Labs\Licenses" directory.. So I went to the Directory and renamed the B3420000.dat file there to B3420000.dat.old?Then did another reinstall and sure enough the application continued and allowed me activate the product and continue the install..

  • TH3800.dll loading causes "Invalid access to memory location".

    Hello, back again.
    I'm writing a thermotron temperature control program for a school project and I'm having an issue with the drivers supplied by Thermotron. I unpacked their drivers and put them in the instr.lib folder, then I put the included TH3800.dll into C:\VXIpnp\WinNT\bin in accordance with directions. I'm using the Student Edition of LabVIEW 2010 with SP1, and every time I load a VI from the library I get an error message that says:
    Error loading "TH3800.dll".
    Invalid access to memory location.
    I have no idea what the problem is exactly, and am not sure what to do to fix it. Any suggestions would be appreciated.
    Thanks,
    Simon
    Solved!
    Go to Solution.

    I'm not positive, but it seems like either the drivers you have are corrupt, don't exist, or are locked in memory somehow. This would definitely be an issue you'd want to bring up with Thermotron as they'll have more details about their DLLs. I tried googling about it and the dll name it's self brings up shockingly little information. Definitely something worth talking to them about!

Maybe you are looking for