Does FormatVolumeEx write zero to every memory locations in Windows CE 6.0 Build 3122?
Hi, I would like to know if FormatVolumeEx write zeros to all memory locations in Windows CE 6.0 Build 3122 if I set FORMAT_OPTIONS.dwFlags to FATUTIL_FULL_FORMAT?
This forum is for XP Embedded. Please try one of the Windows CE forums:
http://social.msdn.microsoft.com/Forums/en-US/category/windowsembeddedcompact
-Sean
www.annabooks.com / www.seanliming.com / Book Author - Pro Guide to WE8S, Pro Guide to WES 7, Pro Guide to POS for .NET
Similar Messages
-
Pretty simple: I want to know how I can keep Firefox from using so much memory when in use. 100-200 meg is common. Thank you
Hi musicfan,<br />Sorry you are having problems with Firefox. Maybe you should have asked earlier and we could have fixed it.
Reading your comments I do not see that rolling back to an insecure Firefox 22 will actually help you much. You are probably best using IE, unless you have also damaged that.
*[[Export bookmarks to Internet Explorer]]
You should not use old versions they are insecure. Security fixes are publicised and exploitable.
* [[Install an older version of Firefox]]
* https://www.mozilla.org/security/known-vulnerabilities/firefox.html
Most others will not be having such problems. We are now able to say that with confidence because after developers missed a regression in Firefox 4 telemetry was introduced so that data was obtained. It may be an idea to turn on your telemetry, if you have not already done so, and decide to stick with Firefox.
*[[Send performance data to Mozilla to help improve Firefox]]
Trying safe mode takes seconds. Unfortunatly if you are not willing to do even rudimentary troubleshooting there is not anything we can do to help you.
*[[Troubleshoot Firefox issues using Safe Mode]] -
How to write and read data in a specific memory location ??
Hi Everyone:
Does anyone know how to write and read data in a specific memory location by using Java ?
I need pointers, but I don't know how to do it ??
Thanks for answering
RodgerHi Everyone:
Does anyone know how to write and read data in a
specific memory location by using Java ?
I need pointers, but I don't know how to do it ??
Thanks for answering
RodgerWith Java you cannot write to a specific memory location. Java does not have pointers. If you really want to do it, you need to use JNI, i.e write the required functions in C (or other languages that support pointers) and make those functions available to Java (through JNI). This approach is not portable. You can have a look at http://java.sun.com/docs/books/tutorial/native1.1/index.html
Regards. -
Virtualization: Write zeros to NSS free space?
I have some old Netware 6.5 servers that are being decommissioned, and the hardware disposed or reused for Windows domain servers. I want to preserve the old Netware environment as VMWare Server 2.0 virtual machines on an offline USB external hard drive, in case we ever need to go back and retrieve something.
Here is the virtualization process for Netware, since the free VMWare Converter cannot deal with Netware volumes directly:
1. Copy VMWare Tools onto Netware server before conversion.
2. Boot Netware server with Windows Preboot Environment (WinPE / BartPE ) and RAID disk drivers
3. Run Symantec Ghost32.exe at the Windows command line and capture the Novell disks (DOS/SYS, VOL1) to Ghost disk images on an external USB hard drive, fast compression
4. On another machine, Use VMWare Converter to convert the Ghost images into VMDK files for the virtual machine.
5. Build the virtual machine using the converted VMDK's. Netware will likely fail to mount SYS and VOL1 at first due to the VM disk controller difference, but then start working after fiddling with HDETECT, etc.
Okay, the issue I have here is that the old Netware file server had a huge VOL1, something like 900 gigs, but less than 30% is being used at the time of decommissioning. Both the ghost images and the VMWare disk images can be smaller if the free space is zeroed before imaging. So if there is some way to zero the free space, I would like to do that.
I do not know the technicalities of NSS file purging. When a file is purged what is the state of the purged disk sectors? What do they contain? (If auto-zeroed when purged, then I don't need to do anything.)
Are there any built-in Netware console methods for NSS to write zeroes to free space?
Also, Windows XP and newer have the ability to create files containing zeroes of arbitrary size, but on NTFS these are "sparse files" that don't actually take up any disk space. I do not know what the state is of these files when created on a mapped NSS volume. Are they automatically created sparse by NSS, or do they really take up space?
4.91 SP5 client, Map O: to NSS volume, create 1 gig test file:
C:\> fsutil file createnew O:\zero-test.txt 10000000000
It's not a huge problem if I cannot zero the free NSS disk space. It just would be nice to shrink the virtual machine volumes so they don't have some 600 gigs of wasted space archived in the Netware VMs.
(And actually I'm not sure that writing zeroes is specifically necessary, if VMDK's can use sector data compression. Writing say all 0xFF's to free space would prevent creation of sparse files in NSS, and can still compress very high.)
- Dale MahalkoUse any method you want to make a file filled with zeros. Copy that file to the desired NSS volume. Then you can use BASH, or NCO ( on the server ) or any other method you like, on the server console to copy that file over and over with different names. Once you have a folder full of these files, then duplicate the folders, untill you are near out of space. Done. Since AFP and CIFS can both allow the creation of huge files, you can mount the FS from, say, a Linux box and dd ibs=1M obs=1M count=1000 if=/dev/zero of=/mnt/theserver/thevolume/thefile
-- Bob -
I have a set of sample code vis which are wrappers around an external dll using the call library function nodes. These work in all versions of LabVIEW from 6.1 to 8.2. In version 8 and 8.2, there is an inconsistent error which appears after a vi is opened, run successfully, closed and then re-opened some time later - all without closing LabVIEW. The error is reported without an error number as 'Error loading "myDll.dll". Invalid access to memory location.' If LabVIEW is closed, reopened and the vi loaded again and run, it works fine. The same error occurs if a second vi calling the same .dll is loaded and run after the first is successful.
Since the vi works just fine the first time it is opened, why does this error occur the second time? What do I have to change so that I don't have to close LabVIEW every time I want to run a different VI?
Thanks in advance.
Mike.Mea culpa. We have found a fix for this. It relates to our dll structure. We create a message pump in the dll associated with a hidden window. When the dll is initialized, the window is registered with the operating system. When the dll is unloaded, the window is closed but we weren't de-registering it. This caused the problem the second time the dll was loaded. By de-registering when the dll is unloaded, the problem has been solved.
Mike. -
Java - Write And Read From memory Like CheatEngine ( Writing not working?)
Hello Oracle Forum
I came here some time ago to ask about javaFX , i solved all my issues and im right now waiting for javaFx tot ake over swing and hmm, im working on learning LIBGDX to create games in java.
However, im in need to create an app to change values of memory to fix a bug in an old program that i have, and the only way until now is using cheatEngine, So i decided to take a tutorial and learn how to do that in java.
Well, im able to read from the memory but the write isnt working somehow... Im posting the code here, if anyone can give me a hint, i would thank and a lot, because theres a community that really needs this app to automate the fix without using cheat engine.
package MainStart;
import com.br.HM.User32;
import com.br.kernel.Kernel32;
import com.sun.jna.Memory;
import com.sun.jna.Native;
import com.sun.jna.Pointer;
import com.sun.jna.ptr.IntByReference;
public class Cheater {
static Kernel32 kernel32 = (Kernel32) Native.loadLibrary("kernel32", Kernel32.class);
static User32 user32 = (User32) Native.loadLibrary("user32", User32.class);
static int readRight = 0x0010;
static int writeRight = 0x0020;
//static int PROCESS_VM_OPERATION = 0x0008;
public static void main(String[] args) {
//Read Memory
//MineSweeper = Campo Minado
int pid = getProcessId("Campo Minado"); // get our process ID
System.out.println("Pid = " + pid);
Pointer readprocess = openProcess(readRight, pid); // open the process ID with read priviledges.
Pointer writeprocess = openProcess(writeRight, pid);
int size = 4; // we want to read 4 bytes
int address = 0x004053C8;
//Read Memory
Memory read = readMemory(readprocess, address, size); // read 4 bytes of memory starting at the address 0x00AB0C62.
System.out.println(read.getInt(0)); // print out the value!
//Write Memory
int writeMemory = writeMemory(writeprocess, address, new short[0x22222222]);
System.out.println("WriteMemory :" + writeMemory);
Memory readM = readMemory(readprocess, address, size);
System.out.println(readM.getInt(0));
public static int writeMemory(Pointer process, int address, short[] data) {
IntByReference written = new IntByReference(0);
Memory toWrite = new Memory(data.length);
for (long i = 0; i < data.length; i++) {
toWrite.setShort(0, data[new Integer(Long.toString(i))]);
boolean b = kernel32.WriteProcessMemory(process, address, toWrite, data.length, written);
System.out.println("kernel32.WriteProcessMemory : " + b); // Retorna false
return written.getValue();
public static Pointer openProcess(int permissions, int pid) {
Pointer process = kernel32.OpenProcess(permissions, true, pid);
return process;
public static int getProcessId(String window) {
IntByReference pid = new IntByReference(0);
user32.GetWindowThreadProcessId(user32.FindWindowA(null, window), pid);
return pid.getValue();
public static Memory readMemory(Pointer process, int address, int bytesToRead) {
IntByReference read = new IntByReference(0);
Memory output = new Memory(bytesToRead);
kernel32.ReadProcessMemory(process, address, output, bytesToRead, read);
return output;
package com.br.HM;
import com.sun.jna.Native;
import com.sun.jna.Pointer;
import com.sun.jna.Structure;
import com.sun.jna.platform.win32.WinDef.RECT;
import com.sun.jna.ptr.ByteByReference;
import com.sun.jna.ptr.IntByReference;
import com.sun.jna.win32.StdCallLibrary.StdCallCallback;
import com.sun.jna.win32.W32APIOptions;
* Provides access to the w32 user32 library. Incomplete implementation to
* support demos.
* @author Todd Fast, [email protected]
* @author [email protected]
public interface User32 extends W32APIOptions {
User32 INSTANCE = (User32) Native.loadLibrary("user32", User32.class, DEFAULT_OPTIONS);
Pointer GetDC(Pointer hWnd);
int ReleaseDC(Pointer hWnd, Pointer hDC);
int FLASHW_STOP = 0;
int FLASHW_CAPTION = 1;
int FLASHW_TRAY = 2;
int FLASHW_ALL = (FLASHW_CAPTION | FLASHW_TRAY);
int FLASHW_TIMER = 4;
int FLASHW_TIMERNOFG = 12;
public static class FLASHWINFO extends Structure {
public int cbSize;
public Pointer hWnd;
public int dwFlags;
public int uCount;
public int dwTimeout;
int IMAGE_BITMAP = 0;
int IMAGE_ICON = 1;
int IMAGE_CURSOR = 2;
int IMAGE_ENHMETAFILE = 3;
int LR_DEFAULTCOLOR = 0x0000;
int LR_MONOCHROME = 0x0001;
int LR_COLOR = 0x0002;
int LR_COPYRETURNORG = 0x0004;
int LR_COPYDELETEORG = 0x0008;
int LR_LOADFROMFILE = 0x0010;
int LR_LOADTRANSPARENT = 0x0020;
int LR_DEFAULTSIZE = 0x0040;
int LR_VGACOLOR = 0x0080;
int LR_LOADMAP3DCOLORS = 0x1000;
int LR_CREATEDIBSECTION = 0x2000;
int LR_COPYFROMRESOURCE = 0x4000;
int LR_SHARED = 0x8000;
Pointer FindWindowA(String winClass, String title);
int GetClassName(Pointer hWnd, byte[] lpClassName, int nMaxCount);
public static class GUITHREADINFO extends Structure {
public int cbSize = size();
public int flags;
Pointer hwndActive;
Pointer hwndFocus;
Pointer hwndCapture;
Pointer hwndMenuOwner;
Pointer hwndMoveSize;
Pointer hwndCaret;
RECT rcCaret;
boolean GetGUIThreadInfo(int idThread, GUITHREADINFO lpgui);
public static class WINDOWINFO extends Structure {
public int cbSize = size();
public RECT rcWindow;
public RECT rcClient;
public int dwStyle;
public int dwExStyle;
public int dwWindowStatus;
public int cxWindowBorders;
public int cyWindowBorders;
public short atomWindowType;
public short wCreatorVersion;
boolean GetWindowInfo(Pointer hWnd, WINDOWINFO pwi);
boolean GetWindowRect(Pointer hWnd, RECT rect);
int GetWindowText(Pointer hWnd, byte[] lpString, int nMaxCount);
int GetWindowTextLength(Pointer hWnd);
int GetWindowModuleFileName(Pointer hWnd, byte[] lpszFileName, int cchFileNameMax);
int GetWindowThreadProcessId(Pointer hWnd, IntByReference lpdwProcessId);
interface WNDENUMPROC extends StdCallCallback {
* Return whether to continue enumeration.
boolean callback(Pointer hWnd, Pointer data);
boolean EnumWindows(WNDENUMPROC lpEnumFunc, Pointer data);
boolean EnumThreadWindows(int dwThreadId, WNDENUMPROC lpEnumFunc, Pointer data);
boolean FlashWindowEx(FLASHWINFO info);
Pointer LoadIcon(Pointer hInstance, String iconName);
Pointer LoadImage(Pointer hinst, // handle to instance
String name, // image to load
int type, // image type
int xDesired, // desired width
int yDesired, // desired height
int load // load options
boolean DestroyIcon(Pointer hicon);
int GWL_EXSTYLE = -20;
int GWL_STYLE = -16;
int GWL_WNDPROC = -4;
int GWL_HINSTANCE = -6;
int GWL_ID = -12;
int GWL_USERDATA = -21;
int DWL_DLGPROC = 4;
int DWL_MSGRESULT = 0;
int DWL_USER = 8;
int WS_EX_COMPOSITED = 0x20000000;
int WS_EX_LAYERED = 0x80000;
int WS_EX_TRANSPARENT = 32;
int GetWindowLong(Pointer hWnd, int nIndex);
int SetWindowLong(Pointer hWnd, int nIndex, int dwNewLong);
int LWA_COLORKEY = 1;
int LWA_ALPHA = 2;
int ULW_COLORKEY = 1;
int ULW_ALPHA = 2;
int ULW_OPAQUE = 4;
boolean SetLayeredWindowAttributes(Pointer hwnd, int crKey,
byte bAlpha, int dwFlags);
boolean GetLayeredWindowAttributes(Pointer hwnd,
IntByReference pcrKey,
ByteByReference pbAlpha,
IntByReference pdwFlags);
* Defines the x- and y-coordinates of a point.
public static class POINT extends Structure {
public int x, y;
* Specifies the width and height of a rectangle.
public static class SIZE extends Structure {
public int cx, cy;
int AC_SRC_OVER = 0x00;
int AC_SRC_ALPHA = 0x01;
int AC_SRC_NO_PREMULT_ALPHA = 0x01;
int AC_SRC_NO_ALPHA = 0x02;
public static class BLENDFUNCTION extends Structure {
public byte BlendOp = AC_SRC_OVER; // only valid value
public byte BlendFlags = 0; // only valid value
public byte SourceConstantAlpha;
public byte AlphaFormat;
boolean UpdateLayeredWindow(Pointer hwnd, Pointer hdcDst,
POINT pptDst, SIZE psize,
Pointer hdcSrc, POINT pptSrc, int crKey,
BLENDFUNCTION pblend, int dwFlags);
int SetWindowRgn(Pointer hWnd, Pointer hRgn, boolean bRedraw);
int VK_SHIFT = 16;
int VK_LSHIFT = 0xA0;
int VK_RSHIFT = 0xA1;
int VK_CONTROL = 17;
int VK_LCONTROL = 0xA2;
int VK_RCONTROL = 0xA3;
int VK_MENU = 18;
int VK_LMENU = 0xA4;
int VK_RMENU = 0xA5;
boolean GetKeyboardState(byte[] state);
short GetAsyncKeyState(int vKey);
package com.br.kernel;
import com.sun.jna.*;
import com.sun.jna.win32.StdCallLibrary;
import com.sun.jna.ptr.IntByReference;
// by deject3d
public interface Kernel32 extends StdCallLibrary
// description from msdn
//BOOL WINAPI WriteProcessMemory(
//__in HANDLE hProcess,
//__in LPVOID lpBaseAddress,
//__in LPCVOID lpBuffer,
//__in SIZE_T nSize,
//__out SIZE_T *lpNumberOfBytesWritten
boolean WriteProcessMemory(Pointer p, int address, Pointer buffer, int size, IntByReference written);
//BOOL WINAPI ReadProcessMemory(
// __in HANDLE hProcess,
// __in LPCVOID lpBaseAddress,
// __out LPVOID lpBuffer,
// __in SIZE_T nSize,
// __out SIZE_T *lpNumberOfBytesRead
boolean ReadProcessMemory(Pointer hProcess, int inBaseAddress, Pointer outputBuffer, int nSize, IntByReference outNumberOfBytesRead);
//HANDLE WINAPI OpenProcess(
// __in DWORD dwDesiredAccess,
// __in BOOL bInheritHandle,
// __in DWORD dwProcessId
Pointer OpenProcess(int desired, boolean inherit, int pid);
/* derp */
int GetLastError();
http://pastebin.com/Vq8wfy39Hello there,
this tutorial was exactly what I needed, so thank you.
Your problem seems to be in this line:
int writeMemory = writeMemory(writeprocess, address, new short[0x22222222]);
The problem is, you're creating a new short array with the length of 0x22222222. Which not only results in an java.lang.OutOfMemoryError: Java heap space
but also, if it would work, would create an empty array with the length of 0x22222222.
I think you want to write 0x22222222 as value in your address.
Correctly stored the code you'd need to write would be:
short[] sarray = new short[]{(short) 0x22222222};
But because the value is too long for the short, the value stored in your array would be the number 8738.
I think, what you want to do is to store the number 572662306, which would be the hex value, stored in an int variable.
So first of all you need to strip down your hex-value to shorts:
Short in Java uses 16 Bit = 2 Byte. 0x22222222 -> 0x2222 for your high byte and 0x2222 for your low byte
So your array would be
short[] sarray = new short[]{0x2222,0x2222};//notice, that sarray[0] is the lowbyte and sarray[1] the high byte, if you want to store 20 it would be new short[]{20,0} or if you use hex new short[]{0x14,0x00}
The next part is your writeToMemory Method. If I'm right, the method in the tutorial is a little bit wrong. The right version should be this:
public static int writeMemory(Pointer process, int address, short[] data) {
IntByReference written = new IntByReference(0);
int size = data.length*Short.SIZE/8;
Memory toWrite = new Memory(size);
for (int i = 0; i < data.length; i++) {
toWrite.setShort(i*Short.SIZE/8,
data[i]);
boolean b = kernel32.WriteProcessMemory(process, address, toWrite,
size, written);
return written.getValue();
You need to calculate your offset right. And the size of your memory. Maybe you could write this method not with shorts, but with integers. But this should work.
If you pass your new array to this function, it should write 0x22222222 to your adress. If you read out your toWrite value with toWrite.getInt(0) you get the right value.
And there is one more thing. In order to write data to a process, you need to grant two access rights:
A handle to the process memory to be modified. The handle must have PROCESS_VM_WRITE and PROCESS_VM_OPERATION access to the process.
You have to grant the right to write data: PROCESS_VM_WRITE: 0x0020 and PROCESS_VM_OPERATION: 0x0008
So your writeProcess needs to get initialized this way:
Pointer writeprocess = openProcess(0x0020|0x0008,pid);
I hope this works for you. Let me know.
Greetings
Edit:
Because every data you write will be 1 byte to whatever count of byte I think the best way is to use the following method to write data to the memory:
public static void writeMemory(Pointer process, long address, byte[] data)
int size = data.length;
Memory toWrite = new Memory(size);
for(int i = 0; i < size; i++)
toWrite.setByte(i, data[i]);
boolean b = kernel32.WriteProcessMemory(process, address, toWrite, size, null);
You can see some changes. First I changed all address values from int to long, because some addresses are out of range. And with all, i mean all. Not only in writeMemory, but also in readMemory and in your kernel32 Class.
Second I don't use the IntByReference anymore..
To use this method you need to store your data the following way if you would write 4 Byte data:
byte[] values = new byte[]{0x14,0x00,0x00,0x00};
This value would be the number 20. Index 0 will be the lowest byte and index 3 will be the highest byte.
And one more thing I wrote is an method which you can use to calculate your address if you have a baseAddress.
If you restart your program/game your old addresses won't point at the same values of your game. With some research (I use CheatEngine) you can get the baseaddress. This one will alway be the same.
To get from your baseaddress to the dynamic adress you use offsets.
public static long findDynAddy(Pointer process, int[] offsets, long baseAddress)
long pointer = baseAddress;
int size = 4;
Memory pTemp = new Memory(size);
long pointerAddress = 0;
for(int i = 0; i < offsets.length; i++)
if(i == 0)
kernel32.ReadProcessMemory(process, pointer, pTemp, size, null);
pointerAddress = ((pTemp.getInt(0)+offsets[i]));
if(i != offsets.length-1)
kernel32.ReadProcessMemory(process, pointerAddress, pTemp, size, null);
return pointerAddress;
This methods gets a process, an array of offsets (hex-values) and your baseadress and returns the dynamic address.
For Solitaire the following code would give you the address to the score:
long baseAddr = 0x10002AFA8L;
int[] offsets = new int[]{0x50,0x14};
long addr = findDynAddy(process, offsets, baseAddr);
If somebody wants to get the whole code (user32, kernel32 and the cheater) just pm me and I will give you a link. -
HT201991 How does one write a review for an app?
I would like to write a review for an app I bought from the App Store.
"Locate the item that you would like to write a review for."
Where? In the App Store via the internet (e.g. on my iMac), OR via the App Store button on my iPad Mini?
"Click "Write a Review" in the Customer Reviews section."
How? I could find no active link associated with the Customer Reviews section once I had located the item for which I wanted to write a review.
So the question remains "How does one write a review for an app?" … and, so far as things stand, the instructions provided in the page <http://support.apple.com/kb/ht3928> are, as far as I can tell useless. Certainly, the Apple website and associated instructions have become, for this long-time user, more akin to Microsoft Windows in their impenetrable lack of intuitive, user-friendly ccharacter.
Oh yeh. To add to my 'disgruntledness' … How come there is no iPad Mini option in the Product drop down below?
Where is Steve Jobs when you need him?!I have been having this issue for months, now--at least 3-4. I updated my credit card info on my account, thinking maybe that would do it, but NOPE--can't review a single thing I've ever purchased in iTunes--not from my iPhone 5, PC or iPad 2. Ridiculous, at this point...just remove the ability to review at all, if this is how it's going to be. SO frustrating.
-
Ram Upgrade Does it mater who makes the memory card?
I have a 2007 20" iMac wtih at 2.4 Ghz Intel Core 2 Duo with 1 GB 667 MHz DDR2 SDRAM
I am going to upgrade from 1 GB Ram to at least 4 GB and maybe as much as 6 or 8 depending on pricing?
Does it matter who manufactures the memory card?
ThanksThe mid-2007 and Early 2008 iMacs officially can accept 4G of RAM (two 2GB modules); with newer modules made since Apple engraved the specs in stone, you can go to 6GB RAM (one 2GB +2 4GB) but no more.
The only brand issue I've encountered is that some Intel Macs using PC2-5300 RAM were rather unhappy with Kingston "Value RAM." The regular line fo Kingston was fine.
For the past decade, I've web-ordered all my Mac RAM (and we have 16 Macs in the family) from only two vendors. I have never had RAM go bad or received the wrong RAM from these firms. Then there is the added pleasure of their being among the lowest priced. Here are their listings for PC2-5300 for your iMac:
Other World Computing:
http://eshop.macsales.com/shop/apple/memory/iMac/Intel_Core_2_Duo
Data Memory Systems:
http://www.datamemorysystems.com/_apple_info/Apple_Aluminum_Intel_Core_2_Duo_iMa c_20_2.4GHz_Memory_1467.asp
You don't show a geographic location in your profile (a very useful thing to include around here ) so I've listed US firms because that's who I use. If you are somewhere other than North America, let us know and someone may be able to provide resources local to you. The first firm I linked ships internationally with only a very "can't do" countries, but shipping and VAT may make it less attractive than a local source. -
What does SQL write to that allow changes to be undone or rolled back in case of a system failure?
What does SQL write to that allow changes to be undone or rolled back in case of a system failure?
Hello,
If i read your question correctly you are asking about how uncommited transaction are rolled back.For this, concept of transaction log came into picture.where first changes were first made to transaction log and then into memory .Before any change is made
to real data file change is made to trn log files so that if rollback comes it can see in log and rollback it.
I would suggest you to read Famous article by log which will explain you
http://technet.microsoft.com/en-us/magazine/2009.02.logging.aspx
Please mark this reply as the answer or vote as helpful, as appropriate, to make it useful for other readers -
Hi all,
i recently updated ASE 15.7 from SP 42 to SP 130.
Everything was fine during update procedure. After the procedure terminated this error started appears (every five minutes) on the database log.
00:0006:00000:00152:2014/11/18 11:10:00.72 kernel attempted read from memory location 0000000000000019 from instruction at location 0x0000000074AC346E
00:0006:00000:00152:2014/11/18 11:10:00.72 kernel Adaptive Server Enterprise system exception (0xc0000005) generated by a storage access violation.
00:0007:00000:00153:2014/11/18 11:10:00.72 kernel attempted read from memory location 0000000000000018 from instruction at location 0x0000000074AC346E
00:0006:00000:00152:2014/11/18 11:10:00.72 kernel pc: 0x0000000074AC346E vcwprintf_s+ 0x26ce (0x0000000000000001, 0x000000000EDAB6D4, 0x000000000EDABBC0, 0x0000000000000000)
00:0007:00000:00153:2014/11/18 11:10:00.72 kernel Adaptive Server Enterprise system exception (0xc0000005) generated by a storage access violation.
00:0006:00000:00152:2014/11/18 11:10:00.72 kernel pc: 0x0000000074AA1AA3 sprintf+ 0x7b (0x0000000000000000, 0x000000000EDACBD0, 0x00000000FFFF0000, 0x0000000000000019)
00:0007:00000:00153:2014/11/18 11:10:00.72 kernel pc: 0x0000000074AC346E vcwprintf_s+ 0x26ce (0x0000000000000001, 0x000000000EEAB6D4, 0x000000000EEABBC0, 0x0000000000000000)
00:0006:00000:00152:2014/11/18 11:10:00.72 kernel pc: 0x0000000000FC9C87 ex_stuffp+ 0x4f7 (0x000000005B0952A0, 0x000000000EDABBC0, 0x000000000EDACBD0, 0x0000000000000061)
00:0007:00000:00153:2014/11/18 11:10:00.72 kernel pc: 0x0000000074AA1AA3 sprintf+ 0x7b (0x0000000000000000, 0x000000000EEACBD0, 0x00000000FFFF0000, 0x0000000000000018)
00:0006:00000:00152:2014/11/18 11:10:00.72 kernel pc: 0x0000000000FCB1FD ex__logprint+ 0x38d (0x000000005B0952A0, 0x000000005B0952A0, 0x00000000805CE000, 0x0000000000000000)
00:0007:00000:00153:2014/11/18 11:10:00.72 kernel pc: 0x0000000000FC9C87 ex_stuffp+ 0x4f7 (0x000000005B0B2890, 0x000000000EEABBC0, 0x000000000EEACBD0, 0x0000000000000061)
00:0006:00000:00152:2014/11/18 11:10:00.72 kernel pc: 0x0000000000FCB776 ex_logprint+ 0xe6 (0x000000005B0952A0, 0x0000000000000000, 0x00000000FFFF0000, 0x000000000000002B)
00:0007:00000:00153:2014/11/18 11:10:00.72 kernel pc: 0x0000000000FCB1FD ex__logprint+ 0x38d (0x000000005B0B2890, 0x000000005B0B2890, 0x0000000080EF2800, 0x0000000000000000)
00:0006:00000:00152:2014/11/18 11:10:00.72 kernel pc: 0x0000000000BE6C31 proc_read__backout+ 0x1d1 (0x00000000812BF000, 0x000000000000001C, 0x0000000000000012, 0x000000005B0952A0)
00:0007:00000:00153:2014/11/18 11:10:00.72 kernel pc: 0x0000000000FCB776 ex_logprint+ 0xe6 (0x000000005B0B2890, 0x0000000000000000, 0x00000000FFFF0000, 0x000000000000002B)
00:0006:00000:00152:2014/11/18 11:10:00.72 kernel pc: 0x0000000000BE6A2E proc_handle+ 0x9e (0x000000005B0AD420, 0x0000000000000000, 0x0000000000000012, 0x0000000000BE633A)
00:0007:00000:00153:2014/11/18 11:10:00.72 kernel pc: 0x0000000000BE6C31 proc_read__backout+ 0x1d1 (0x00000000812C9000, 0x000000000000001C, 0x0000000000000012, 0x000000005B0B2890)
00:0006:00000:00152:2014/11/18 11:10:00.72 kernel pc: 0x0000000000FCE317 exc__raise+ 0x6c7 (0x000000005B0952A0, 0x0000000000400000, 0x0000000000000000, 0x0000000000000AF5)
00:0007:00000:00153:2014/11/18 11:10:00.72 kernel pc: 0x0000000000BE6A2E proc_handle+ 0x9e (0x000000005B0CAA10, 0x0000000000000000, 0x0000000000000012, 0x0000000000BE633A)
00:0006:00000:00152:2014/11/18 11:10:00.72 kernel pc: 0x0000000000FCE96E exc_raise+ 0x11e (0x000000000102523B, 0x000000000000001C, 0x0000000000000005, 0x0000000000000012)
00:0007:00000:00153:2014/11/18 11:10:00.72 kernel pc: 0x0000000000FCE317 exc__raise+ 0x6c7 (0x000000005B0B2890, 0x0000000000400000, 0x0000000000000000, 0x0000000000000AF5)
00:0006:00000:00152:2014/11/18 11:10:00.72 kernel pc: 0x0000000000BED3D4 proc_read+ 0xbe4 (0x0000000000000000, 0x0000000000000001, 0x000000005B0952A0, 0x000000004ED2AAB0)
00:0007:00000:00153:2014/11/18 11:10:00.72 kernel pc: 0x0000000000FCE96E exc_raise+ 0x11e (0x000000000102523B, 0x000000000000001C, 0x0000000000000005, 0x0000000000000012)
00:0006:00000:00152:2014/11/18 11:10:00.72 kernel pc: 0x0000000000BEE1A7 proc_get+ 0x3f7 (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000)
00:0007:00000:00153:2014/11/18 11:10:00.72 kernel pc: 0x0000000000BED3D4 proc_read+ 0xbe4 (0x0000000000000000, 0x0000000000000001, 0x000000005B0B2890, 0x000000004E7F98B0)
00:0006:00000:00152:2014/11/18 11:10:00.72 kernel pc: 0x0000000000F3E97B s_getTreeOrPlan+ 0x19b (0x000000005B0952A0, 0x000000000EDAE810, 0x0000000000000001, 0x0000000000000000)
00:0007:00000:00153:2014/11/18 11:10:00.72 kernel pc: 0x0000000000BEE1A7 proc_get+ 0x3f7 (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000)
00:0006:00000:00152:2014/11/18 11:10:00.72 kernel pc: 0x0000000000EDE2D4 execproc+ 0x3a4 (0x00000000000000E0, 0x0000000000000001, 0x000000000EDAED60, 0x00000000000000E0)
00:0007:00000:00153:2014/11/18 11:10:00.72 kernel pc: 0x0000000000F3E97B s_getTreeOrPlan+ 0x19b (0x000000005B0B2890, 0x000000000EEAE810, 0x0000000000000001, 0x0000000000000000)
00:0006:00000:00152:2014/11/18 11:10:00.72 kernel pc: 0x0000000000EE4D02 s_execute+ 0x4692 (0x000000005B0952A0, 0x000000005B0952A0, 0x0000000080760960, 0x0000000000000001)
00:0007:00000:00153:2014/11/18 11:10:00.72 kernel pc: 0x0000000000EDE2D4 execproc+ 0x3a4 (0x00000000000000E0, 0x0000000000000001, 0x000000000EEAED60, 0x00000000000000E0)
00:0006:00000:00152:2014/11/18 11:10:00.72 kernel pc: 0x0000000000EF7476 sequencer+ 0x1f86 (0x000000005B0952A0, 0x000000005B0952A0, 0x0000000000000021, 0x0000000000000001)
00:0007:00000:00153:2014/11/18 11:10:00.72 kernel pc: 0x0000000000EE4D02 s_execute+ 0x4692 (0x000000005B0B2890, 0x000000005B0B2890, 0x00000000806DD960, 0x0000000000000001)
00:0006:00000:00152:2014/11/18 11:10:00.72 kernel pc: 0x0000000000467406 tdsrecv_language+ 0x706 (0x0000000000000021, 0x0000000000400000, 0x0000000000000000, 0x0000000000000021)
00:0007:00000:00153:2014/11/18 11:10:00.72 kernel pc: 0x0000000000EF7476 sequencer+ 0x1f86 (0x000000005B0B2890, 0x000000005B0B2890, 0x0000000000000021, 0x0000000000000001)
00:0006:00000:00152:2014/11/18 11:10:00.72 kernel pc: 0x000000000042BF87 conn_hdlr+ 0x2307 (0x00000000284ACB70, 0x00000000284ACB70, 0x0000000000000000, 0x0000000000000000)
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel pc: 0x0000000000467406 tdsrecv_language+ 0x706 (0x0000000000000021, 0x0000000000400000, 0x0000000000000000, 0x0000000000000021)
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel pc: 0x00000000013AFEF1 kpntwrapper+ 0x51 (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000)
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel pc: 0x000000000042BF87 conn_hdlr+ 0x2307 (0x00000000284AD0B0, 0x00000000284AD0B0, 0x0000000000000000, 0x0000000000000000)
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel pc: 0x0000000077248FED CreateFiberEx+ 0x27d (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000)
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel end of stack trace, spid 152, kpid 18677903, suid 4
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel pc: 0x00000000013AFEF1 kpntwrapper+ 0x51 (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000)
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel pc: 0x0000000077248FED CreateFiberEx+ 0x27d (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000)
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel end of stack trace, spid 153, kpid 18808976, suid 4
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel DUMP OF LOADED MODULES:-
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel DUMP OF LOADED MODULES:-
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel sqlsrvr.exe loaded at 0000000000400000 [G:\sybase\DEV\ASE-15_0\bin\sqlsrvr.exe]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel sqlsrvr.exe loaded at 0000000000400000 [G:\sybase\DEV\ASE-15_0\bin\sqlsrvr.exe]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel ntdll.dll loaded at 0000000077360000 [C:\Windows\SYSTEM32\ntdll.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel ntdll.dll loaded at 0000000077360000 [C:\Windows\SYSTEM32\ntdll.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel kernel32.dll loaded at 0000000077240000 [C:\Windows\system32\kernel32.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel kernel32.dll loaded at 0000000077240000 [C:\Windows\system32\kernel32.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel KERNELBASE.dll loaded at 000007FEFD5B0000 [C:\Windows\system32\KERNELBASE.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel KERNELBASE.dll loaded at 000007FEFD5B0000 [C:\Windows\system32\KERNELBASE.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel MSVCR100.dll loaded at 0000000074A70000 [C:\Windows\system32\MSVCR100.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel MSVCR100.dll loaded at 0000000074A70000 [C:\Windows\system32\MSVCR100.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel libsybblk64.dll loaded at 0000000180000000 [G:\sybase\DEV\ASE-15_0\bin\libsybblk64.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel libsybblk64.dll loaded at 0000000180000000 [G:\sybase\DEV\ASE-15_0\bin\libsybblk64.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel libsybct64.dll loaded at 0000000000110000 [G:\sybase\DEV\ASE-15_0\bin\libsybct64.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel libsybct64.dll loaded at 0000000000110000 [G:\sybase\DEV\ASE-15_0\bin\libsybct64.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel libsybcs64.dll loaded at 00000000001E0000 [G:\sybase\DEV\ASE-15_0\bin\libsybcs64.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel libsybcs64.dll loaded at 00000000001E0000 [G:\sybase\DEV\ASE-15_0\bin\libsybcs64.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel libsybcomn64.dll loaded at 0000000000310000 [G:\sybase\DEV\ASE-15_0\bin\libsybcomn64.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel libsybcomn64.dll loaded at 0000000000310000 [G:\sybase\DEV\ASE-15_0\bin\libsybcomn64.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel libsybintl64.dll loaded at 00000000003E0000 [G:\sybase\DEV\ASE-15_0\bin\libsybintl64.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel libsybintl64.dll loaded at 00000000003E0000 [G:\sybase\DEV\ASE-15_0\bin\libsybintl64.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel ADVAPI32.dll loaded at 000007FEFDB50000 [C:\Windows\system32\ADVAPI32.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel ADVAPI32.dll loaded at 000007FEFDB50000 [C:\Windows\system32\ADVAPI32.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel msvcrt.dll loaded at 000007FEFDAB0000 [C:\Windows\system32\msvcrt.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel msvcrt.dll loaded at 000007FEFDAB0000 [C:\Windows\system32\msvcrt.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel sechost.dll loaded at 000007FEFE350000 [C:\Windows\SYSTEM32\sechost.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel sechost.dll loaded at 000007FEFE350000 [C:\Windows\SYSTEM32\sechost.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel RPCRT4.dll loaded at 000007FEFDDB0000 [C:\Windows\system32\RPCRT4.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel RPCRT4.dll loaded at 000007FEFDDB0000 [C:\Windows\system32\RPCRT4.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel MSVCR80.dll loaded at 000000006F690000 [C:\Windows\WinSxS\amd64_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.6229_none_88dcc0bf2fb1b808\MSVCR80.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel MSVCR80.dll loaded at 000000006F690000 [C:\Windows\WinSxS\amd64_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.6229_none_88dcc0bf2fb1b808\MSVCR80.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel libsybunic64.dll loaded at 0000000002E70000 [G:\sybase\DEV\ASE-15_0\bin\libsybunic64.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel libsybunic64.dll loaded at 0000000002E70000 [G:\sybase\DEV\ASE-15_0\bin\libsybunic64.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel libsybtcl64.dll loaded at 0000000002EF0000 [G:\sybase\DEV\ASE-15_0\bin\libsybtcl64.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel libsybtcl64.dll loaded at 0000000002EF0000 [G:\sybase\DEV\ASE-15_0\bin\libsybtcl64.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel WS2_32.dll loaded at 000007FEFE430000 [C:\Windows\system32\WS2_32.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel WS2_32.dll loaded at 000007FEFE430000 [C:\Windows\system32\WS2_32.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel NSI.dll loaded at 000007FEFE420000 [C:\Windows\system32\NSI.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel NSI.dll loaded at 000007FEFE420000 [C:\Windows\system32\NSI.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel WSOCK32.dll loaded at 000007FEFA6B0000 [C:\Windows\system32\WSOCK32.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel WSOCK32.dll loaded at 000007FEFA6B0000 [C:\Windows\system32\WSOCK32.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel MSWSOCK.DLL loaded at 000007FEFCAE0000 [C:\Windows\system32\MSWSOCK.DLL]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel MSWSOCK.DLL loaded at 000007FEFCAE0000 [C:\Windows\system32\MSWSOCK.DLL]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel user32.dll loaded at 0000000077140000 [C:\Windows\system32\user32.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel user32.dll loaded at 0000000077140000 [C:\Windows\system32\user32.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel GDI32.dll loaded at 000007FEFF290000 [C:\Windows\system32\GDI32.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel GDI32.dll loaded at 000007FEFF290000 [C:\Windows\system32\GDI32.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel LPK.dll loaded at 000007FEFE410000 [C:\Windows\system32\LPK.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel LPK.dll loaded at 000007FEFE410000 [C:\Windows\system32\LPK.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel USP10.dll loaded at 000007FEFDEE0000 [C:\Windows\system32\USP10.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel USP10.dll loaded at 000007FEFDEE0000 [C:\Windows\system32\USP10.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel COMDLG32.dll loaded at 000007FEFD8E0000 [C:\Windows\system32\COMDLG32.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel COMDLG32.dll loaded at 000007FEFD8E0000 [C:\Windows\system32\COMDLG32.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel SHLWAPI.dll loaded at 000007FEFE1C0000 [C:\Windows\system32\SHLWAPI.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel SHLWAPI.dll loaded at 000007FEFE1C0000 [C:\Windows\system32\SHLWAPI.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel COMCTL32.dll loaded at 000007FEFA140000 [C:\Windows\WinSxS\amd64_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_a4d6a923711520a9\COMCTL32.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel COMCTL32.dll loaded at 000007FEFA140000 [C:\Windows\WinSxS\amd64_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_a4d6a923711520a9\COMCTL32.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel SHELL32.dll loaded at 000007FEFE480000 [C:\Windows\system32\SHELL32.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel SHELL32.dll loaded at 000007FEFE480000 [C:\Windows\system32\SHELL32.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel NETAPI32.dll loaded at 000007FEFAC60000 [C:\Windows\system32\NETAPI32.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel NETAPI32.dll loaded at 000007FEFAC60000 [C:\Windows\system32\NETAPI32.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel netutils.dll loaded at 000007FEFC770000 [C:\Windows\system32\netutils.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel netutils.dll loaded at 000007FEFC770000 [C:\Windows\system32\netutils.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel srvcli.dll loaded at 000007FEFCDC0000 [C:\Windows\system32\srvcli.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel srvcli.dll loaded at 000007FEFCDC0000 [C:\Windows\system32\srvcli.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel wkscli.dll loaded at 000007FEFAC40000 [C:\Windows\system32\wkscli.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel wkscli.dll loaded at 000007FEFAC40000 [C:\Windows\system32\wkscli.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel dbghelp.dll loaded at 000007FEF9FB0000 [C:\Windows\system32\dbghelp.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel dbghelp.dll loaded at 000007FEF9FB0000 [C:\Windows\system32\dbghelp.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel PSAPI.DLL loaded at 0000000077520000 [C:\Windows\system32\PSAPI.DLL]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel PSAPI.DLL loaded at 0000000077520000 [C:\Windows\system32\PSAPI.DLL]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel IPHLPAPI.DLL loaded at 000007FEFB6B0000 [C:\Windows\system32\IPHLPAPI.DLL]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel IPHLPAPI.DLL loaded at 000007FEFB6B0000 [C:\Windows\system32\IPHLPAPI.DLL]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel WINNSI.DLL loaded at 000007FEFB660000 [C:\Windows\system32\WINNSI.DLL]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel WINNSI.DLL loaded at 000007FEFB660000 [C:\Windows\system32\WINNSI.DLL]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel loadperf.dll loaded at 000007FEF3B30000 [C:\Windows\system32\loadperf.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel loadperf.dll loaded at 000007FEF3B30000 [C:\Windows\system32\loadperf.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel ole32.dll loaded at 000007FEFDFB0000 [C:\Windows\system32\ole32.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel ole32.dll loaded at 000007FEFDFB0000 [C:\Windows\system32\ole32.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel OLEAUT32.dll loaded at 000007FEFF300000 [C:\Windows\system32\OLEAUT32.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel OLEAUT32.dll loaded at 000007FEFF300000 [C:\Windows\system32\OLEAUT32.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel sybcsi_core29.dll loaded at 0000000002F40000 [G:\sybase\DEV\ASE-15_0\bin\sybcsi_core29.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel sybcsi_core29.dll loaded at 0000000002F40000 [G:\sybase\DEV\ASE-15_0\bin\sybcsi_core29.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel sybcsi_profiler29.dll loaded at 0000000002FA0000 [G:\sybase\DEV\ASE-15_0\bin\sybcsi_profiler29.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel sybcsi_profiler29.dll loaded at 0000000002FA0000 [G:\sybase\DEV\ASE-15_0\bin\sybcsi_profiler29.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel sybcsi_propertiesconfig29.dll loaded at 0000000002FC0000 [G:\sybase\DEV\ASE-15_0\bin\sybcsi_propertiesconfig29.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel sybcsi_propertiesconfig29.dll loaded at 0000000002FC0000 [G:\sybase\DEV\ASE-15_0\bin\sybcsi_propertiesconfig29.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel sybcsi_openssl29.dll loaded at 0000000002FE0000 [G:\sybase\DEV\ASE-15_0\bin\sybcsi_openssl29.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel sybcsi_openssl29.dll loaded at 0000000002FE0000 [G:\sybase\DEV\ASE-15_0\bin\sybcsi_openssl29.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel MPR.dll loaded at 000007FEFA610000 [C:\Windows\system32\MPR.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel MPR.dll loaded at 000007FEFA610000 [C:\Windows\system32\MPR.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel IMM32.DLL loaded at 000007FEFF3E0000 [C:\Windows\system32\IMM32.DLL]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel IMM32.DLL loaded at 000007FEFF3E0000 [C:\Windows\system32\IMM32.DLL]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel MSCTF.dll loaded at 000007FEFE240000 [C:\Windows\system32\MSCTF.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel MSCTF.dll loaded at 000007FEFE240000 [C:\Windows\system32\MSCTF.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel ntmarta.dll loaded at 000007FEFC3D0000 [C:\Windows\system32\ntmarta.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel ntmarta.dll loaded at 000007FEFC3D0000 [C:\Windows\system32\ntmarta.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel WLDAP32.dll loaded at 000007FEFD860000 [C:\Windows\system32\WLDAP32.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel WLDAP32.dll loaded at 000007FEFD860000 [C:\Windows\system32\WLDAP32.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel SYBEVENT.DLL loaded at 0000000010000000 [G:\sybase\DEV\ASE-15_0\dll\SYBEVENT.DLL]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel SYBEVENT.DLL loaded at 0000000010000000 [G:\sybase\DEV\ASE-15_0\dll\SYBEVENT.DLL]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel DNSAPI.dll loaded at 000007FEFC960000 [C:\Windows\system32\DNSAPI.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel DNSAPI.dll loaded at 000007FEFC960000 [C:\Windows\system32\DNSAPI.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel dhcpcsvc6.DLL loaded at 000007FEFB330000 [C:\Windows\system32\dhcpcsvc6.DLL]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel dhcpcsvc6.DLL loaded at 000007FEFB330000 [C:\Windows\system32\dhcpcsvc6.DLL]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel dhcpcsvc.DLL loaded at 000007FEFB310000 [C:\Windows\system32\dhcpcsvc.DLL]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel dhcpcsvc.DLL loaded at 000007FEFB310000 [C:\Windows\system32\dhcpcsvc.DLL]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel icmp.Dll loaded at 0000000070890000 [C:\Windows\system32\icmp.Dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel icmp.Dll loaded at 0000000070890000 [C:\Windows\system32\icmp.Dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel wship6.dll loaded at 000007FEFCAD0000 [C:\Windows\System32\wship6.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel wship6.dll loaded at 000007FEFCAD0000 [C:\Windows\System32\wship6.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel libsybaseldap64.dll loaded at 0000000005160000 [G:\sybase\DEV\ASE-15_0\bin\libsybaseldap64.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel libsybaseldap64.dll loaded at 0000000005160000 [G:\sybase\DEV\ASE-15_0\bin\libsybaseldap64.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel CRYPTSP.dll loaded at 000007FEFCB40000 [C:\Windows\system32\CRYPTSP.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel CRYPTSP.dll loaded at 000007FEFCB40000 [C:\Windows\system32\CRYPTSP.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel rsaenh.dll loaded at 000007FEFC840000 [C:\Windows\system32\rsaenh.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel rsaenh.dll loaded at 000007FEFC840000 [C:\Windows\system32\rsaenh.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel CRYPTBASE.dll loaded at 000007FEFD1A0000 [C:\Windows\system32\CRYPTBASE.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel CRYPTBASE.dll loaded at 000007FEFD1A0000 [C:\Windows\system32\CRYPTBASE.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel wshtcpip.dll loaded at 000007FEFC4C0000 [C:\Windows\System32\wshtcpip.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel wshtcpip.dll loaded at 000007FEFC4C0000 [C:\Windows\System32\wshtcpip.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel rasadhlp.dll loaded at 000007FEFA890000 [C:\Windows\system32\rasadhlp.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel rasadhlp.dll loaded at 000007FEFA890000 [C:\Windows\system32\rasadhlp.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel fwpuclnt.dll loaded at 000007FEFB460000 [C:\Windows\System32\fwpuclnt.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel fwpuclnt.dll loaded at 000007FEFB460000 [C:\Windows\System32\fwpuclnt.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel apphelp.dll loaded at 000007FEFD140000 [C:\Windows\system32\apphelp.dll]
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel apphelp.dll loaded at 000007FEFD140000 [C:\Windows\system32\apphelp.dll]
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel ************************************
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel ************************************
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel SQL causing error : declare @js_runid int
declare @js_sjobid int
select @js_runid = 460200
select @js_sjobid = 2
set chained on exec saptools..SP_DBH_ERRORLOG
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel SQL causing error : declare @js_runid int
declare @js_sjobid int
select @js_runid = 460199
select @js_sjobid = 13
set chained on exec saptools..SP_DBH_THREADS
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel ************************************
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel ************************************
00:0006:00000:00152:2014/11/18 11:10:00.73 server SQL Text: declare @js_runid int
declare @js_sjobid int
select @js_runid = 460200
select @js_sjobid = 2
set chained on exec saptools..SP_DBH_ERRORLOG
00:0007:00000:00153:2014/11/18 11:10:00.73 server SQL Text: declare @js_runid int
declare @js_sjobid int
select @js_runid = 460199
select @js_sjobid = 13
set chained on exec saptools..SP_DBH_THREADS
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel curdb = 5 tempdb = 2 pstat = 0x10000 p2stat = 0x101000
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel curdb = 5 tempdb = 2 pstat = 0x10000 p2stat = 0x101000
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel p3stat = 0x80800 p4stat = 0x0 p5stat = 0x8 p6stat = 0x1 p7stat = 0x10000
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel p3stat = 0x80800 p4stat = 0x0 p5stat = 0x8 p6stat = 0x1 p7stat = 0x10000
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel lasterror = 2805 preverror = 0 transtate = 1
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel lasterror = 2805 preverror = 0 transtate = 1
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel curcmd = 224 program = JS Agent - sapsa
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel curcmd = 224 program = JS Agent - sapsa
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel extended error information: hostname: login: sapsa
00:0007:00000:00153:2014/11/18 11:10:00.73 kernel extended error information: hostname: login: sapsa
00:0006:00000:00152:2014/11/18 11:10:00.73 kernel pc: 0x0000000001403C58 os_get_cur_stk_desc+ 0xf8 (0x000000000EDA70F0, 0x000000000EDA70F0, 0x000000000EDA9080, 0x0000000000000000)
00:0007:00000:00153:2014/11/18 11:10:00.75 kernel pc: 0x0000000001403C58 os_get_cur_stk_desc+ 0xf8 (0x000000000EEA70F0, 0x000000000EEA70F0, 0x000000000EEA9080, 0x0000000000000000)
00:0006:00000:00152:2014/11/18 11:10:00.75 kernel pc: 0x0000000001382872 pcstkwalk+ 0x3e2 (0x0000000000000001, 0x00000000011D008F, 0x000000000000270F, 0x0000000077263566)
00:0007:00000:00153:2014/11/18 11:10:00.75 kernel pc: 0x0000000001382872 pcstkwalk+ 0x3e2 (0x0000000000000001, 0x00000000011F0090, 0x000000000000270F, 0x0000000077263566)
00:0006:00000:00152:2014/11/18 11:10:00.75 kernel pc: 0x0000000001383089 ucstkgentrace+ 0x339 (0x0000000000FAFEF1, 0x0000000000000001, 0x0000000000000000, 0x0000000000FAFEF1)
00:0007:00000:00153:2014/11/18 11:10:00.75 kernel pc: 0x0000000001383089 ucstkgentrace+ 0x339 (0x0000000000FAFEF1, 0x0000000000000001, 0x0000000000000000, 0x0000000000FAFEF1)
00:0006:00000:00152:2014/11/18 11:10:00.75 kernel pc: 0x000000000138135F ucbacktrace+ 0xbf (0x00000000C0000005, 0x000000000EDAA370, 0x000000000EDAA370, 0x00000000284ACB70)
00:0007:00000:00153:2014/11/18 11:10:00.75 kernel pc: 0x000000000138135F ucbacktrace+ 0xbf (0x00000000C0000005, 0x000000000EEAA370, 0x000000000EEAA370, 0x00000000284AD0B0)
00:0006:00000:00152:2014/11/18 11:10:00.75 kernel pc: 0x0000000000409C4B terminate_process+ 0x1b3b (0x00000000011D008F, 0x00000000FFFFFFFF, 0x00000000284ACB70, 0x0000000074A70000)
00:0007:00000:00153:2014/11/18 11:10:00.75 kernel pc: 0x0000000000409C4B terminate_process+ 0x1b3b (0x00000000011F0090, 0x00000000FFFFFFFF, 0x00000000284AD0B0, 0x0000000074A70000)
00:0006:00000:00152:2014/11/18 11:10:00.75 kernel pc: 0x00000000013CEEFF kiexception+ 0x50f (0x00000000013AFEF1, 0x0000000077389B3E, 0x000000000EDAA470, 0x0000000000000000)
00:0007:00000:00153:2014/11/18 11:10:00.75 kernel pc: 0x00000000013CEEFF kiexception+ 0x50f (0x00000000013AFEF1, 0x0000000077389B3E, 0x000000000EEAA470, 0x0000000000000000)
00:0006:00000:00152:2014/11/18 11:10:00.75 kernel pc: 0x0000000001CEC2F3 kpntwrapper$filt$0+ 0x13 (0x0000000000000000, 0x00000000000002B7, 0x0000000000000000, 0x0000000000004000)
00:0007:00000:00153:2014/11/18 11:10:00.75 kernel pc: 0x0000000001CEC2F3 kpntwrapper$filt$0+ 0x13 (0x0000000000000000, 0x00000000000002B7, 0x0000000000000000, 0x0000000000004000)
00:0006:00000:00152:2014/11/18 11:10:00.75 kernel pc: 0x0000000074AE12E3 _C_specific_handler+ 0x97 (0x000000000EDB0000, 0x000000000EDAFF80, 0x000000000EDAFF80, 0x0000000002E11F5C)
00:0007:00000:00153:2014/11/18 11:10:00.75 kernel pc: 0x0000000074AE12E3 _C_specific_handler+ 0x97 (0x000000000EEB0000, 0x000000000EEAFF80, 0x000000000EEAFF80, 0x0000000002E11F5C)
00:0006:00000:00152:2014/11/18 11:10:00.75 kernel pc: 0x0000000077389D0D RtlDecodePointer+ 0xbd (0x000000000EDB0000, 0x0000000002D87194, 0x00000000000CB3AC, 0x000000000026AC80)
00:0007:00000:00153:2014/11/18 11:10:00.75 kernel pc: 0x0000000077389D0D RtlDecodePointer+ 0xbd (0x000000000EEB0000, 0x0000000002D87194, 0x00000000000CB3AC, 0x000000000026AC80)
00:0006:00000:00152:2014/11/18 11:10:00.75 kernel pc: 0x00000000773791AF RtlUnwindEx+ 0xbbf (0x000000000EDAAFB0, 0x000000000EDAAAC0, 0x0000000000000000, 0x0000000000000000)
00:0007:00000:00153:2014/11/18 11:10:00.75 kernel pc: 0x00000000773791AF RtlUnwindEx+ 0xbbf (0x000000000EEAAFB0, 0x000000000EEAAAC0, 0x0000000000000000, 0x0000000000000000)
00:0006:00000:00152:2014/11/18 11:10:00.75 kernel pc: 0x00000000773B1278 KiUserExceptionDispatcher+ 0x2e (0x000000000EDAB7B0, 0x000000000EDAB2E0, 0x000000000EDAB510, 0xFFFFFFFFFFFFFFFF)
00:0007:00000:00153:2014/11/18 11:10:00.75 kernel pc: 0x00000000773B1278 KiUserExceptionDispatcher+ 0x2e (0x000000000EEAB7B0, 0x000000000EEAB2E0, 0x000000000EEAB510, 0xFFFFFFFFFFFFFFFF)
00:0006:00000:00152:2014/11/18 11:10:00.75 kernel pc: 0x0000000074AC346E vcwprintf_s+ 0x26ce (0x0000000000000001, 0x000000000EDAB6D4, 0x000000000EDABBC0, 0x0000000000000000)
00:0007:00000:00153:2014/11/18 11:10:00.75 kernel pc: 0x0000000074AC346E vcwprintf_s+ 0x26ce (0x0000000000000001, 0x000000000EEAB6D4, 0x000000000EEABBC0, 0x0000000000000000)
00:0006:00000:00152:2014/11/18 11:10:00.75 kernel pc: 0x0000000074AA1AA3 sprintf+ 0x7b (0x0000000000000000, 0x000000000EDACBD0, 0x00000000FFFF0000, 0x0000000000000019)
00:0007:00000:00153:2014/11/18 11:10:00.75 kernel pc: 0x0000000074AA1AA3 sprintf+ 0x7b (0x0000000000000000, 0x000000000EEACBD0, 0x00000000FFFF0000, 0x0000000000000018)
00:0006:00000:00152:2014/11/18 11:10:00.75 kernel pc: 0x0000000000FC9C87 ex_stuffp+ 0x4f7 (0x000000005B0952A0, 0x000000000EDABBC0, 0x000000000EDACBD0, 0x0000000000000061)
00:0007:00000:00153:2014/11/18 11:10:00.75 kernel pc: 0x0000000000FC9C87 ex_stuffp+ 0x4f7 (0x000000005B0B2890, 0x000000000EEABBC0, 0x000000000EEACBD0, 0x0000000000000061)
00:0006:00000:00152:2014/11/18 11:10:00.75 kernel pc: 0x0000000000FCB1FD ex__logprint+ 0x38d (0x000000005B0952A0, 0x000000005B0952A0, 0x00000000805CE000, 0x0000000000000000)
00:0007:00000:00153:2014/11/18 11:10:00.75 kernel pc: 0x0000000000FCB1FD ex__logprint+ 0x38d (0x000000005B0B2890, 0x000000005B0B2890, 0x0000000080EF2800, 0x0000000000000000)
00:0006:00000:00152:2014/11/18 11:10:00.75 kernel pc: 0x0000000000FCB776 ex_logprint+ 0xe6 (0x000000005B0952A0, 0x0000000000000000, 0x00000000FFFF0000, 0x000000000000002B)
00:0007:00000:00153:2014/11/18 11:10:00.75 kernel pc: 0x0000000000FCB776 ex_logprint+ 0xe6 (0x000000005B0B2890, 0x0000000000000000, 0x00000000FFFF0000, 0x000000000000002B)
00:0006:00000:00152:2014/11/18 11:10:00.75 kernel pc: 0x0000000000BE6C31 proc_read__backout+ 0x1d1 (0x00000000812BF000, 0x000000000000001C, 0x0000000000000012, 0x000000005B0952A0)
00:0007:00000:00153:2014/11/18 11:10:00.75 kernel pc: 0x0000000000BE6C31 proc_read__backout+ 0x1d1 (0x00000000812C9000, 0x000000000000001C, 0x0000000000000012, 0x000000005B0B2890)
00:0006:00000:00152:2014/11/18 11:10:00.75 kernel pc: 0x0000000000BE6A2E proc_handle+ 0x9e (0x000000005B0AD420, 0x0000000000000000, 0x0000000000000012, 0x0000000000BE633A)
00:0007:00000:00153:2014/11/18 11:10:00.75 kernel pc: 0x0000000000BE6A2E proc_handle+ 0x9e (0x000000005B0CAA10, 0x0000000000000000, 0x0000000000000012, 0x0000000000BE633A)
00:0006:00000:00152:2014/11/18 11:10:00.75 kernel pc: 0x0000000000FCE317 exc__raise+ 0x6c7 (0x000000005B0952A0, 0x0000000000400000, 0x0000000000000000, 0x0000000000000AF5)
00:0007:00000:00153:2014/11/18 11:10:00.75 kernel pc: 0x0000000000FCE317 exc__raise+ 0x6c7 (0x000000005B0B2890, 0x0000000000400000, 0x0000000000000000, 0x0000000000000AF5)
00:0006:00000:00152:2014/11/18 11:10:00.75 kernel pc: 0x0000000000FCE96E exc_raise+ 0x11e (0x000000000102523B, 0x000000000000001C, 0x0000000000000005, 0x0000000000000012)
00:0007:00000:00153:2014/11/18 11:10:00.75 kernel pc: 0x0000000000FCE96E exc_raise+ 0x11e (0x000000000102523B, 0x000000000000001C, 0x0000000000000005, 0x0000000000000012)
00:0006:00000:00152:2014/11/18 11:10:00.75 kernel pc: 0x0000000000BED3D4 proc_read+ 0xbe4 (0x0000000000000000, 0x0000000000000001, 0x000000005B0952A0, 0x000000004ED2AAB0)
00:0007:00000:00153:2014/11/18 11:10:00.75 kernel pc: 0x0000000000BED3D4 proc_read+ 0xbe4 (0x0000000000000000, 0x0000000000000001, 0x000000005B0B2890, 0x000000004E7F98B0)
00:0006:00000:00152:2014/11/18 11:10:00.75 kernel pc: 0x0000000000BEE1A7 proc_get+ 0x3f7 (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000)
00:0007:00000:00153:2014/11/18 11:10:00.75 kernel pc: 0x0000000000BEE1A7 proc_get+ 0x3f7 (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000)
00:0006:00000:00152:2014/11/18 11:10:00.75 kernel pc: 0x0000000000F3E97B s_getTreeOrPlan+ 0x19b (0x000000005B0952A0, 0x000000000EDAE810, 0x0000000000000001, 0x0000000000000000)
00:0007:00000:00153:2014/11/18 11:10:00.75 kernel pc: 0x0000000000F3E97B s_getTreeOrPlan+ 0x19b (0x000000005B0B2890, 0x000000000EEAE810, 0x0000000000000001, 0x0000000000000000)
00:0006:00000:00152:2014/11/18 11:10:00.75 kernel pc: 0x0000000000EDE2D4 execproc+ 0x3a4 (0x00000000000000E0, 0x0000000000000001, 0x000000000EDAED60, 0x00000000000000E0)
00:0007:00000:00153:2014/11/18 11:10:00.75 kernel pc: 0x0000000000EDE2D4 execproc+ 0x3a4 (0x00000000000000E0, 0x0000000000000001, 0x000000000EEAED60, 0x00000000000000E0)
00:0006:00000:00152:2014/11/18 11:10:00.75 kernel pc: 0x0000000000EE4D02 s_execute+ 0x4692 (0x000000005B0952A0, 0x000000005B0952A0, 0x0000000080760960, 0x0000000000000001)
00:0007:00000:00153:2014/11/18 11:10:00.75 kernel pc: 0x0000000000EE4D02 s_execute+ 0x4692 (0x000000005B0B2890, 0x000000005B0B2890, 0x00000000806DD960, 0x0000000000000001)
00:0006:00000:00152:2014/11/18 11:10:00.75 kernel pc: 0x0000000000EF7476 sequencer+ 0x1f86 (0x000000005B0952A0, 0x000000005B0952A0, 0x0000000000000021, 0x0000000000000001)
00:0007:00000:00153:2014/11/18 11:10:00.75 kernel pc: 0x0000000000EF7476 sequencer+ 0x1f86 (0x000000005B0B2890, 0x000000005B0B2890, 0x0000000000000021, 0x0000000000000001)
00:0006:00000:00152:2014/11/18 11:10:00.75 kernel pc: 0x0000000000467406 tdsrecv_language+ 0x706 (0x0000000000000021, 0x0000000000400000, 0x0000000000000000, 0x0000000000000021)
00:0007:00000:00153:2014/11/18 11:10:00.77 kernel pc: 0x0000000000467406 tdsrecv_language+ 0x706 (0x0000000000000021, 0x0000000000400000, 0x0000000000000000, 0x0000000000000021)
00:0006:00000:00152:2014/11/18 11:10:00.77 kernel pc: 0x000000000042BF87 conn_hdlr+ 0x2307 (0x00000000284ACB70, 0x00000000284ACB70, 0x0000000000000000, 0x0000000000000000)
00:0007:00000:00153:2014/11/18 11:10:00.77 kernel pc: 0x000000000042BF87 conn_hdlr+ 0x2307 (0x00000000284AD0B0, 0x00000000284AD0B0, 0x0000000000000000, 0x0000000000000000)
00:0006:00000:00152:2014/11/18 11:10:00.77 kernel pc: 0x00000000013AFEF1 kpntwrapper+ 0x51 (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000)
00:0007:00000:00153:2014/11/18 11:10:00.77 kernel pc: 0x00000000013AFEF1 kpntwrapper+ 0x51 (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000)
00:0006:00000:00152:2014/11/18 11:10:00.77 kernel pc: 0x0000000077248FED CreateFiberEx+ 0x27d (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000)
00:0007:00000:00153:2014/11/18 11:10:00.77 kernel pc: 0x0000000077248FED CreateFiberEx+ 0x27d (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000)
00:0006:00000:00152:2014/11/18 11:10:00.77 kernel end of stack trace, spid 152, kpid 18677903, suid 4
00:0007:00000:00153:2014/11/18 11:10:00.77 kernel end of stack trace, spid 153, kpid 18808976, suid 4
00:0006:00000:00153:2014/11/18 11:10:00.77 kernel attempted read from memory location 0000000000000018 from instruction at location 0x0000000074AC346E
00:0006:00000:00153:2014/11/18 11:10:00.77 kernel Adaptive Server Enterprise system exception (0xc0000005) generated by a storage access violation.
00:0006:00000:00153:2014/11/18 11:10:00.77 kernel pc: 0x0000000074AC346E vcwprintf_s+ 0x26ce (0x0000000000000001, 0x000000000EEA7DC4, 0x000000000EEA82B0, 0x0000000000000000)
00:0006:00000:00153:2014/11/18 11:10:00.77 kernel pc: 0x0000000074AA1AA3 sprintf+ 0x7b (0x0000000000000000, 0x000000000EEA92C0, 0x00000000812C9000, 0x0000000000000018)
00:0006:00000:00153:2014/11/18 11:10:00.77 kernel pc: 0x0000000000FC9C87 ex_stuffp+ 0x4f7 (0x000000005B0B2890, 0x000000000EEA82B0, 0x000000000EEA92C0, 0x0000000000000061)
00:0006:00000:00153:2014/11/18 11:10:00.77 kernel pc: 0x0000000000FCB1FD ex__logprint+ 0x38d (0x00000000FFFFFFFF, 0x000007FEFCAE24A1, 0x000000000471F7A0, 0x000007FEFE4317C0)
00:0006:00000:00153:2014/11/18 11:10:00.77 kernel pc: 0x0000000000FCB776 ex_logprint+ 0xe6 (0x000000005B0B2890, 0x0000000000000000, 0x00000000812C9000, 0x00000000812C9000)
00:0006:00000:00153:2014/11/18 11:10:00.77 kernel pc: 0x0000000000BE6C31 proc_read__backout+ 0x1d1 (0x00000000812C9000, 0x000000000EEA9899, 0x000000000EEAA370, 0x0000000000000000)
00:0006:00000:00153:2014/11/18 11:10:00.77 kernel pc: 0x0000000000428D85 kill_proc+ 0x1f5 (0x0000000000000000, 0x00000000C0000005, 0x000000000EEAA370, 0x00000000284AD0B0)
00:0006:00000:00153:2014/11/18 11:10:00.77 kernel pc: 0x000000000040A2B4 terminate_process+ 0x21a4 (0x00000000011F0090, 0x00000000FFFFFFFF, 0x00000000284AD0B0, 0x0000000074A70000)
00:0007:00000:00152:2014/11/18 11:10:00.77 kernel attempted read from memory location 0000000000000019 from instruction at location 0x0000000074AC346E
00:0007:00000:00152:2014/11/18 11:10:00.77 kernel Adaptive Server Enterprise system exception (0xc0000005) generated by a storage access violation.
00:0006:00000:00153:2014/11/18 11:10:00.77 kernel pc: 0x00000000013CEEFF kiexception+ 0x50f (0x00000000013AFEF1, 0x0000000077389B3E, 0x000000000EEAA470, 0x0000000000000000)
00:0007:00000:00152:2014/11/18 11:10:00.77 kernel pc: 0x0000000074AC346E vcwprintf_s+ 0x26ce (0x0000000000000001, 0x000000000EDA7DC4, 0x000000000EDA82B0, 0x0000000000000000)
00:0006:00000:00153:2014/11/18 11:10:00.77 kernel pc: 0x0000000001CEC2F3 kpntwrapper$filt$0+ 0x13 (0x0000000000000000, 0x00000000000002B7, 0x0000000000000000, 0x0000000000004000)
00:0007:00000:00152:2014/11/18 11:10:00.77 kernel pc: 0x0000000074AA1AA3 sprintf+ 0x7b (0x0000000000000000, 0x000000000EDA92C0, 0x00000000812BF000, 0x0000000000000019)
00:0006:00000:00153:2014/11/18 11:10:00.77 kernel pc: 0x0000000074AE12E3 _C_specific_handler+ 0x97 (0x000000000EEB0000, 0x000000000EEAFF80, 0x000000000EEAFF80, 0x0000000002E11F5C)
00:0007:00000:00152:2014/11/18 11:10:00.77 kernel pc: 0x0000000000FC9C87 ex_stuffp+ 0x4f7 (0x000000005B0952A0, 0x000000000EDA82B0, 0x000000000EDA92C0, 0x0000000000000061)
00:0006:00000:00153:2014/11/18 11:10:00.77 kernel pc: 0x0000000077389D0D RtlDecodePointer+ 0xbd (0x000000000EEB0000, 0x0000000002D87194, 0x00000000000CB3AC, 0x000000000026AC80)
00:0007:00000:00152:2014/11/18 11:10:00.77 kernel pc: 0x0000000000FCB1FD ex__logprint+ 0x38d (0x00000000FFFFFFFF, 0x000007FEFCAE24A1, 0x000000000471FE80, 0x000007FEFE4317C0)
00:0006:00000:00153:2014/11/18 11:10:00.77 kernel pc: 0x00000000773791AF RtlUnwindEx+ 0xbbf (0x000000000EEAAFB0, 0x000000000EEAAAC0, 0x0000000000000000, 0x0000000000000000)
00:0007:00000:00152:2014/11/18 11:10:00.77 kernel pc: 0x0000000000FCB776 ex_logprint+ 0xe6 (0x000000005B0952A0, 0x0000000000000000, 0x00000000812BF000, 0x00000000812BF000)
00:0006:00000:00153:2014/11/18 11:10:00.77 kernel pc: 0x00000000773B1278 KiUserExceptionDispatcher+ 0x2e (0x000000000EEAB7B0, 0x000000000EEAB2E0, 0x000000000EEAB510, 0xFFFFFFFFFFFFFFFF)
00:0007:00000:00152:2014/11/18 11:10:00.77 kernel pc: 0x0000000000BE6C31 proc_read__backout+ 0x1d1 (0x00000000812BF000, 0x000000000EDA9899, 0x000000000EDAA370, 0x0000000000000000)
00:0006:00000:00153:2014/11/18 11:10:00.77 kernel pc: 0x0000000074AC346E vcwprintf_s+ 0x26ce (0x0000000000000001, 0x000000000EEAB6D4, 0x000000000EEABBC0, 0x0000000000000000)
00:0007:00000:00152:2014/11/18 11:10:00.77 kernel pc: 0x0000000000428D85 kill_proc+ 0x1f5 (0x0000000000000000, 0x00000000C0000005, 0x000000000EDAA370, 0x00000000284ACB70)
00:0006:00000:00153:2014/11/18 11:10:00.77 kernel pc: 0x0000000074AA1AA3 sprintf+ 0x7b (0x0000000000000000, 0x000000000EEACBD0, 0x00000000FFFF0000, 0x0000000000000018)
00:0007:00000:00152:2014/11/18 11:10:00.77 kernel pc: 0x000000000040A2B4 terminate_process+ 0x21a4 (0x00000000011D008F, 0x00000000FFFFFFFF, 0x00000000284ACB70, 0x0000000074A70000)
00:0006:00000:00153:2014/11/18 11:10:00.77 kernel pc: 0x0000000000FC9C87 ex_stuffp+ 0x4f7 (0x000000005B0B2890, 0x000000000EEABBC0, 0x000000000EEACBD0, 0x0000000000000061)
00:0007:00000:00152:2014/11/18 11:10:00.77 kernel pc: 0x00000000013CEEFF kiexception+ 0x50f (0x00000000013AFEF1, 0x0000000077389B3E, 0x000000000EDAA470, 0x0000000000000000)
00:0006:00000:00153:2014/11/18 11:10:00.77 kernel pc: 0x0000000000FCB1FD ex__logprint+ 0x38d (0x000000005B0B2890, 0x000000005B0B2890, 0x0000000080EF2800, 0x0000000000000000)
00:0007:00000:00152:2014/11/18 11:10:00.77 kernel pc: 0x0000000001CEC2F3 kpntwrapper$filt$0+ 0x13 (0x0000000000000000, 0x00000000000002B7, 0x0000000000000000, 0x0000000000004000)
00:0006:00000:00153:2014/11/18 11:10:00.77 kernel pc: 0x0000000000FCB776 ex_logprint+ 0xe6 (0x000000005B0B2890, 0x0000000000000000, 0x00000000FFFF0000, 0x000000000000002B)
00:0007:00000:00152:2014/11/18 11:10:00.77 kernel pc: 0x0000000074AE12E3 _C_specific_handler+ 0x97 (0x000000000EDB0000, 0x000000000EDAFF80, 0x000000000EDAFF80, 0x0000000002E11F5C)
00:0006:00000:00153:2014/11/18 11:10:00.77 kernel pc: 0x0000000000BE6C31 proc_read__backout+ 0x1d1 (0x00000000812C9000, 0x000000000000001C, 0x0000000000000012, 0x000000005B0B2890)
00:0007:00000:00152:2014/11/18 11:10:00.77 kernel pc: 0x0000000077389D0D RtlDecodePointer+ 0xbd (0x000000000EDB0000, 0x0000000002D87194, 0x00000000000CB3AC, 0x000000000026AC80)
00:0006:00000:00153:2014/11/18 11:10:00.77 kernel pc: 0x0000000000BE6A2E proc_handle+ 0x9e (0x000000005B0CAA10, 0x0000000000000000, 0x0000000000000012, 0x0000000000BE633A)
00:0007:00000:00152:2014/11/18 11:10:00.77 kernel pc: 0x00000000773791AF RtlUnwindEx+ 0xbbf (0x000000000EDAAFB0, 0x000000000EDAAAC0, 0x0000000000000000, 0x0000000000000000)
00:0007:00000:00152:2014/11/18 11:10:00.77 kernel pc: 0x00000000773B1278 KiUserExceptionDispatcher+ 0x2e (0x000000000EDAB7B0, 0x000000000EDAB2E0, 0x000000000EDAB510, 0xFFFFFFFFFFFFFFFF)
00:0006:00000:00153:2014/11/18 11:10:00.77 kernel pc: 0x0000000000FCE317 exc__raise+ 0x6c7 (0x000000005B0B2890, 0x0000000000400000, 0x0000000000000000, 0x0000000000000AF5)
00:0007:00000:00152:2014/11/18 11:10:00.77 kernel pc: 0x0000000074AC346E vcwprintf_s+ 0x26ce (0x0000000000000001, 0x000000000EDAB6D4, 0x000000000EDABBC0, 0x0000000000000000)
00:0006:00000:00153:2014/11/18 11:10:00.77 kernel pc: 0x0000000000FCE96E exc_raise+ 0x11e (0x000000000102523B, 0x000000000000001C, 0x0000000000000005, 0x0000000000000012)
00:0007:00000:00152:2014/11/18 11:10:00.77 kernel pc: 0x0000000074AA1AA3 sprintf+ 0x7b (0x0000000000000000, 0x000000000EDACBD0, 0x00000000FFFF0000, 0x0000000000000019)
00:0006:00000:00153:2014/11/18 11:10:00.77 kernel pc: 0x0000000000BED3D4 proc_read+ 0xbe4 (0x0000000000000000, 0x0000000000000001, 0x000000005B0B2890, 0x000000004E7F98B0)
00:0007:00000:00152:2014/11/18 11:10:00.77 kernel pc: 0x0000000000FC9C87 ex_stuffp+ 0x4f7 (0x000000005B0952A0, 0x000000000EDABBC0, 0x000000000EDACBD0, 0x0000000000000061)
00:0006:00000:00153:2014/11/18 11:10:00.77 kernel pc: 0x0000000000BEE1A7 proc_get+ 0x3f7 (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000)
00:0007:00000:00152:2014/11/18 11:10:00.77 kernel pc: 0x0000000000FCB1FD ex__logprint+ 0x38d (0x000000005B0952A0, 0x000000005B0952A0, 0x00000000805CE000, 0x0000000000000000)
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel pc: 0x0000000000F3E97B s_getTreeOrPlan+ 0x19b (0x000000005B0B2890, 0x000000000EEAE810, 0x0000000000000001, 0x0000000000000000)
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel pc: 0x0000000000FCB776 ex_logprint+ 0xe6 (0x000000005B0952A0, 0x0000000000000000, 0x00000000FFFF0000, 0x000000000000002B)
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel pc: 0x0000000000EDE2D4 execproc+ 0x3a4 (0x00000000000000E0, 0x0000000000000001, 0x000000000EEAED60, 0x00000000000000E0)
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel pc: 0x0000000000BE6C31 proc_read__backout+ 0x1d1 (0x00000000812BF000, 0x000000000000001C, 0x0000000000000012, 0x000000005B0952A0)
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel pc: 0x0000000000EE4D02 s_execute+ 0x4692 (0x000000005B0B2890, 0x000000005B0B2890, 0x00000000806DD960, 0x0000000000000001)
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel pc: 0x0000000000BE6A2E proc_handle+ 0x9e (0x000000005B0AD420, 0x0000000000000000, 0x0000000000000012, 0x0000000000BE633A)
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel pc: 0x0000000000EF7476 sequencer+ 0x1f86 (0x000000005B0B2890, 0x000000005B0B2890, 0x0000000000000021, 0x0000000000000001)
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel pc: 0x0000000000FCE317 exc__raise+ 0x6c7 (0x000000005B0952A0, 0x0000000000400000, 0x0000000000000000, 0x0000000000000AF5)
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel pc: 0x0000000000467406 tdsrecv_language+ 0x706 (0x0000000000000021, 0x0000000000400000, 0x0000000000000000, 0x0000000000000021)
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel pc: 0x0000000000FCE96E exc_raise+ 0x11e (0x000000000102523B, 0x000000000000001C, 0x0000000000000005, 0x0000000000000012)
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel pc: 0x000000000042BF87 conn_hdlr+ 0x2307 (0x00000000284AD0B0, 0x00000000284AD0B0, 0x0000000000000000, 0x0000000000000000)
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel end of stack trace, spid 153, kpid 18808976, suid 4
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel pc: 0x0000000000BED3D4 proc_read+ 0xbe4 (0x0000000000000000, 0x0000000000000001, 0x000000005B0952A0, 0x000000004ED2AAB0)
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel DUMP OF LOADED MODULES:-
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel sqlsrvr.exe loaded at 0000000000400000 [G:\sybase\DEV\ASE-15_0\bin\sqlsrvr.exe]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel pc: 0x0000000000BEE1A7 proc_get+ 0x3f7 (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000)
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel ntdll.dll loaded at 0000000077360000 [C:\Windows\SYSTEM32\ntdll.dll]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel kernel32.dll loaded at 0000000077240000 [C:\Windows\system32\kernel32.dll]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel KERNELBASE.dll loaded at 000007FEFD5B0000 [C:\Windows\system32\KERNELBASE.dll]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel MSVCR100.dll loaded at 0000000074A70000 [C:\Windows\system32\MSVCR100.dll]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel pc: 0x0000000000F3E97B s_getTreeOrPlan+ 0x19b (0x000000005B0952A0, 0x000000000EDAE810, 0x0000000000000001, 0x0000000000000000)
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel libsybblk64.dll loaded at 0000000180000000 [G:\sybase\DEV\ASE-15_0\bin\libsybblk64.dll]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel libsybct64.dll loaded at 0000000000110000 [G:\sybase\DEV\ASE-15_0\bin\libsybct64.dll]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel pc: 0x0000000000EDE2D4 execproc+ 0x3a4 (0x00000000000000E0, 0x0000000000000001, 0x000000000EDAED60, 0x00000000000000E0)
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel libsybcs64.dll loaded at 00000000001E0000 [G:\sybase\DEV\ASE-15_0\bin\libsybcs64.dll]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel libsybcomn64.dll loaded at 0000000000310000 [G:\sybase\DEV\ASE-15_0\bin\libsybcomn64.dll]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel pc: 0x0000000000EE4D02 s_execute+ 0x4692 (0x000000005B0952A0, 0x000000005B0952A0, 0x0000000080760960, 0x0000000000000001)
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel libsybintl64.dll loaded at 00000000003E0000 [G:\sybase\DEV\ASE-15_0\bin\libsybintl64.dll]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel ADVAPI32.dll loaded at 000007FEFDB50000 [C:\Windows\system32\ADVAPI32.dll]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel msvcrt.dll loaded at 000007FEFDAB0000 [C:\Windows\system32\msvcrt.dll]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel pc: 0x0000000000EF7476 sequencer+ 0x1f86 (0x000000005B0952A0, 0x000000005B0952A0, 0x0000000000000021, 0x0000000000000001)
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel sechost.dll loaded at 000007FEFE350000 [C:\Windows\SYSTEM32\sechost.dll]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel RPCRT4.dll loaded at 000007FEFDDB0000 [C:\Windows\system32\RPCRT4.dll]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel MSVCR80.dll loaded at 000000006F690000 [C:\Windows\WinSxS\amd64_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.6229_none_88dcc0bf2fb1b808\MSVCR80.dll]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel pc: 0x0000000000467406 tdsrecv_language+ 0x706 (0x0000000000000021, 0x0000000000400000, 0x0000000000000000, 0x0000000000000021)
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel libsybunic64.dll loaded at 0000000002E70000 [G:\sybase\DEV\ASE-15_0\bin\libsybunic64.dll]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel libsybtcl64.dll loaded at 0000000002EF0000 [G:\sybase\DEV\ASE-15_0\bin\libsybtcl64.dll]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel WS2_32.dll loaded at 000007FEFE430000 [C:\Windows\system32\WS2_32.dll]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel pc: 0x000000000042BF87 conn_hdlr+ 0x2307 (0x00000000284ACB70, 0x00000000284ACB70, 0x0000000000000000, 0x0000000000000000)
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel end of stack trace, spid 152, kpid 18677903, suid 4
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel NSI.dll loaded at 000007FEFE420000 [C:\Windows\system32\NSI.dll]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel DUMP OF LOADED MODULES:-
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel WSOCK32.dll loaded at 000007FEFA6B0000 [C:\Windows\system32\WSOCK32.dll]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel sqlsrvr.exe loaded at 0000000000400000 [G:\sybase\DEV\ASE-15_0\bin\sqlsrvr.exe]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel MSWSOCK.DLL loaded at 000007FEFCAE0000 [C:\Windows\system32\MSWSOCK.DLL]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel ntdll.dll loaded at 0000000077360000 [C:\Windows\SYSTEM32\ntdll.dll]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel user32.dll loaded at 0000000077140000 [C:\Windows\system32\user32.dll]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel kernel32.dll loaded at 0000000077240000 [C:\Windows\system32\kernel32.dll]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel GDI32.dll loaded at 000007FEFF290000 [C:\Windows\system32\GDI32.dll]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel KERNELBASE.dll loaded at 000007FEFD5B0000 [C:\Windows\system32\KERNELBASE.dll]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel LPK.dll loaded at 000007FEFE410000 [C:\Windows\system32\LPK.dll]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel MSVCR100.dll loaded at 0000000074A70000 [C:\Windows\system32\MSVCR100.dll]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel USP10.dll loaded at 000007FEFDEE0000 [C:\Windows\system32\USP10.dll]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel libsybblk64.dll loaded at 0000000180000000 [G:\sybase\DEV\ASE-15_0\bin\libsybblk64.dll]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel COMDLG32.dll loaded at 000007FEFD8E0000 [C:\Windows\system32\COMDLG32.dll]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel libsybct64.dll loaded at 0000000000110000 [G:\sybase\DEV\ASE-15_0\bin\libsybct64.dll]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel SHLWAPI.dll loaded at 000007FEFE1C0000 [C:\Windows\system32\SHLWAPI.dll]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel libsybcs64.dll loaded at 00000000001E0000 [G:\sybase\DEV\ASE-15_0\bin\libsybcs64.dll]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel COMCTL32.dll loaded at 000007FEFA140000 [C:\Windows\WinSxS\amd64_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_a4d6a923711520a9\COMCTL32.dll]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel libsybcomn64.dll loaded at 0000000000310000 [G:\sybase\DEV\ASE-15_0\bin\libsybcomn64.dll]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel libsybintl64.dll loaded at 00000000003E0000 [G:\sybase\DEV\ASE-15_0\bin\libsybintl64.dll]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel SHELL32.dll loaded at 000007FEFE480000 [C:\Windows\system32\SHELL32.dll]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel ADVAPI32.dll loaded at 000007FEFDB50000 [C:\Windows\system32\ADVAPI32.dll]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel NETAPI32.dll loaded at 000007FEFAC60000 [C:\Windows\system32\NETAPI32.dll]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel msvcrt.dll loaded at 000007FEFDAB0000 [C:\Windows\system32\msvcrt.dll]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel netutils.dll loaded at 000007FEFC770000 [C:\Windows\system32\netutils.dll]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel sechost.dll loaded at 000007FEFE350000 [C:\Windows\SYSTEM32\sechost.dll]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel srvcli.dll loaded at 000007FEFCDC0000 [C:\Windows\system32\srvcli.dll]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel RPCRT4.dll loaded at 000007FEFDDB0000 [C:\Windows\system32\RPCRT4.dll]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel wkscli.dll loaded at 000007FEFAC40000 [C:\Windows\system32\wkscli.dll]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel MSVCR80.dll loaded at 000000006F690000 [C:\Windows\WinSxS\amd64_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.6229_none_88dcc0bf2fb1b808\MSVCR80.dll]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel dbghelp.dll loaded at 000007FEF9FB0000 [C:\Windows\system32\dbghelp.dll]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel libsybunic64.dll loaded at 0000000002E70000 [G:\sybase\DEV\ASE-15_0\bin\libsybunic64.dll]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel PSAPI.DLL loaded at 0000000077520000 [C:\Windows\system32\PSAPI.DLL]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel libsybtcl64.dll loaded at 0000000002EF0000 [G:\sybase\DEV\ASE-15_0\bin\libsybtcl64.dll]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel IPHLPAPI.DLL loaded at 000007FEFB6B0000 [C:\Windows\system32\IPHLPAPI.DLL]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel WS2_32.dll loaded at 000007FEFE430000 [C:\Windows\system32\WS2_32.dll]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel WINNSI.DLL loaded at 000007FEFB660000 [C:\Windows\system32\WINNSI.DLL]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel NSI.dll loaded at 000007FEFE420000 [C:\Windows\system32\NSI.dll]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel loadperf.dll loaded at 000007FEF3B30000 [C:\Windows\system32\loadperf.dll]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel WSOCK32.dll loaded at 000007FEFA6B0000 [C:\Windows\system32\WSOCK32.dll]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel ole32.dll loaded at 000007FEFDFB0000 [C:\Windows\system32\ole32.dll]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel MSWSOCK.DLL loaded at 000007FEFCAE0000 [C:\Windows\system32\MSWSOCK.DLL]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel OLEAUT32.dll loaded at 000007FEFF300000 [C:\Windows\system32\OLEAUT32.dll]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel user32.dll loaded at 0000000077140000 [C:\Windows\system32\user32.dll]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel sybcsi_core29.dll loaded at 0000000002F40000 [G:\sybase\DEV\ASE-15_0\bin\sybcsi_core29.dll]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel GDI32.dll loaded at 000007FEFF290000 [C:\Windows\system32\GDI32.dll]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel sybcsi_profiler29.dll loaded at 0000000002FA0000 [G:\sybase\DEV\ASE-15_0\bin\sybcsi_profiler29.dll]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel LPK.dll loaded at 000007FEFE410000 [C:\Windows\system32\LPK.dll]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel USP10.dll loaded at 000007FEFDEE0000 [C:\Windows\system32\USP10.dll]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel sybcsi_propertiesconfig29.dll loaded at 0000000002FC0000 [G:\sybase\DEV\ASE-15_0\bin\sybcsi_propertiesconfig29.dll]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel COMDLG32.dll loaded at 000007FEFD8E0000 [C:\Windows\system32\COMDLG32.dll]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel sybcsi_openssl29.dll loaded at 0000000002FE0000 [G:\sybase\DEV\ASE-15_0\bin\sybcsi_openssl29.dll]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel SHLWAPI.dll loaded at 000007FEFE1C0000 [C:\Windows\system32\SHLWAPI.dll]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel MPR.dll loaded at 000007FEFA610000 [C:\Windows\system32\MPR.dll]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel COMCTL32.dll loaded at 000007FEFA140000 [C:\Windows\WinSxS\amd64_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_a4d6a923711520a9\COMCTL32.dll]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel IMM32.DLL loaded at 000007FEFF3E0000 [C:\Windows\system32\IMM32.DLL]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel SHELL32.dll loaded at 000007FEFE480000 [C:\Windows\system32\SHELL32.dll]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel MSCTF.dll loaded at 000007FEFE240000 [C:\Windows\system32\MSCTF.dll]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel NETAPI32.dll loaded at 000007FEFAC60000 [C:\Windows\system32\NETAPI32.dll]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel ntmarta.dll loaded at 000007FEFC3D0000 [C:\Windows\system32\ntmarta.dll]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel netutils.dll loaded at 000007FEFC770000 [C:\Windows\system32\netutils.dll]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel WLDAP32.dll loaded at 000007FEFD860000 [C:\Windows\system32\WLDAP32.dll]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel srvcli.dll loaded at 000007FEFCDC0000 [C:\Windows\system32\srvcli.dll]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel SYBEVENT.DLL loaded at 0000000010000000 [G:\sybase\DEV\ASE-15_0\dll\SYBEVENT.DLL]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel wkscli.dll loaded at 000007FEFAC40000 [C:\Windows\system32\wkscli.dll]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel DNSAPI.dll loaded at 000007FEFC960000 [C:\Windows\system32\DNSAPI.dll]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel dbghelp.dll loaded at 000007FEF9FB0000 [C:\Windows\system32\dbghelp.dll]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel dhcpcsvc6.DLL loaded at 000007FEFB330000 [C:\Windows\system32\dhcpcsvc6.DLL]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel PSAPI.DLL loaded at 0000000077520000 [C:\Windows\system32\PSAPI.DLL]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel dhcpcsvc.DLL loaded at 000007FEFB310000 [C:\Windows\system32\dhcpcsvc.DLL]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel IPHLPAPI.DLL loaded at 000007FEFB6B0000 [C:\Windows\system32\IPHLPAPI.DLL]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel icmp.Dll loaded at 0000000070890000 [C:\Windows\system32\icmp.Dll]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel WINNSI.DLL loaded at 000007FEFB660000 [C:\Windows\system32\WINNSI.DLL]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel wship6.dll loaded at 000007FEFCAD0000 [C:\Windows\System32\wship6.dll]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel loadperf.dll loaded at 000007FEF3B30000 [C:\Windows\system32\loadperf.dll]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel libsybaseldap64.dll loaded at 0000000005160000 [G:\sybase\DEV\ASE-15_0\bin\libsybaseldap64.dll]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel ole32.dll loaded at 000007FEFDFB0000 [C:\Windows\system32\ole32.dll]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel CRYPTSP.dll loaded at 000007FEFCB40000 [C:\Windows\system32\CRYPTSP.dll]
00:0007:00000:00152:2014/11/18 11:10:00.78 kernel OLEAUT32.dll loaded at 000007FEFF300000 [C:\Windows\system32\OLEAUT32.dll]
00:0006:00000:00153:2014/11/18 11:10:00.78 kernel rsaenh.dll loaded atHi,
i forgot to update the status, sorry!
Opened a support incident; the upgrade procedure was not fine for saptools database because it was not able to enlarge automatically. Increased the size manually and restart the database.
Upgrade was terminated fine and error in log file disappeared.
Regards. -
Get memory location....need help
I download XSQL servle and set it up already.
Now I try the "Adhoc Query Visualization" from my own database, but if I query from a view or from a object type is varchar2 then I will get the memory location. I tried the same example from OTN live demo, it works normal. So why I get the memory location?
Here is my Demo http://211.75.41.149:7070/xsql/demo/adhocsql/sqltoxml.html
Thank you for your any help.
nullForget it. I tried your URL and see the output. Have to check with a few people who might recall a similar problem.
You'll notice that on your installation,
a query that does not involve user-defined
objects like:
SELECT * FROM EMP
does not have any problem. -
How do I check if the memory location specified in the pointer is freed and available or not? in C.
Barrucadu wrote:
Furthermore, you can't check if a pointer has been freed or not, as the value of the pointer is unchanged. I find it's often useful to have a "checked free" macro like this:
#define xfree(ptr) if(ptr != NULL) { free(ptr); ptr = NULL; }
Now you're safe from accidental double-frees (although, their presence indicates something is wrong with your logic somewhere, even if they're harmless) and you can easily see if a pointer has been freed (which, again, should really not be in doubt, but it's nice to be sure).
free does nothing if the pointer is already NULL, so the if statement is pointless. Use this:
#define xfree(ptr) do { free(ptr); ptr = NULL; } while (0); -
Removing write-protection from a memory card
How does one remove the write-protection from a memory car? I have been trying to copy some sound and pictures from my computer to my memory card, but it has been telling me that the memory card is write protected and I have to remove the write protection. someone please help!!!
Hi tessiebest
Is memory card in SD adapter in card reader on your PC, as there is a little slider on the SD adapter which you can slide to "lock" write protect?
You can also "password protect" a memory card in your phone.
Happy to have helped forum in a small way with a Support Ratio = 37.0 -
RUNDLL Error loading CTMBHA.DLL invalid access to memory locat
Error message at start up:? "Error loading CTMBHA.DLL? Invalid access to memory location"
Does anyone know if this file has to do with Sound Blaster Audigy ADVANCED MB Ready, DR release 5.0.3708 ??If so, I will follow the reinstall instructions per the FAQ.?Thanks.Here's the solution from the_Riddler that works:?So I broke out REGMON from sysinternals, and tried the install when the Status 200 error came up I saw that they were accessing the "C:\Documents and Settings\All Users\Application Data\Creative Labs\Licenses" directory.. So I went to the Directory and renamed the B3420000.dat file there to B3420000.dat.old?Then did another reinstall and sure enough the application continued and allowed me activate the product and continue the install..
-
TH3800.dll loading causes "Invalid access to memory location".
Hello, back again.
I'm writing a thermotron temperature control program for a school project and I'm having an issue with the drivers supplied by Thermotron. I unpacked their drivers and put them in the instr.lib folder, then I put the included TH3800.dll into C:\VXIpnp\WinNT\bin in accordance with directions. I'm using the Student Edition of LabVIEW 2010 with SP1, and every time I load a VI from the library I get an error message that says:
Error loading "TH3800.dll".
Invalid access to memory location.
I have no idea what the problem is exactly, and am not sure what to do to fix it. Any suggestions would be appreciated.
Thanks,
Simon
Solved!
Go to Solution.I'm not positive, but it seems like either the drivers you have are corrupt, don't exist, or are locked in memory somehow. This would definitely be an issue you'd want to bring up with Thermotron as they'll have more details about their DLLs. I tried googling about it and the dll name it's self brings up shockingly little information. Definitely something worth talking to them about!
Maybe you are looking for
-
Installing Mountain Lion from Snow Leopard, Install failed and HD write-locked
I recently downloaded the mountain lion installer from the App Store and I ran the installer. Stupid person as I am, I did not have any backups for my file and I naively assumed that an apple OS installer would be without flaws. Boy, was I wrong. I n
-
Add a custom button on notification page and open a oaf page after button
Hi All, My Requirement is add a custom button on notification page and after button click with take some parameter from notification page like supplier_id and org_id then open a new oaf page and show supplier credit and debit balance but problem is t
-
PO PDF Error - File does not Begin with '%PDF-'
Hi, I am working on Implementing PO PDF with XML data and RTF Template. I have created a new template in XML Publisher and followed the following set up steps Setup / Organizations / Purchasing Options / Control TAB / set 'PO Output Format' = 'PDF' s
-
" unable to allocate space from the buffer cache" Message
Hi I am trying to delete a large volume or records from a BTREE database. I have used the DB_SET_RANGE with a cursor to locate the desired records. After that the Dbc::get() with DB_NEXT is called. After deleting a considerable amount of records I am
-
I can't put my wi-fi on. i have just installed the ios6.0.1
I have just installed the ios 6.0.1, and now i can't put my wifi on, it is just grey