none
EXCEPTION_ACCESS_VIOLATION

    Question

  • Can anyone please help me with this,,

    Current time is 14:06:42 08/05/14. ===================================================================== BugCheck Dump ===================================================================== This file is generated by Microsoft SQL Server version 10.50.4000.0 upon detection of fatal unexpected error. Please return this file, the query or program that produced the bugcheck, the database and the error log, and any other pertinent information with a Service Request. Computer type is Intel(R) Xeon(R) CPU X5675 @ 3.07GHz. Bios Version is INTEL - 6040000 PhoenixBIOS 4.0 Release 6.0 8 X64 level 8664, 10 Mhz processor (s). Windows NT 6.1 Build 7601 CSD Service Pack 1. Memory MemoryLoad = 80% Total Physical = 73727 MB Available Physical = 14390 MB Total Page File = 83965 MB Available Page File = 24237 MB Total Virtual = 8388607 MB Available Virtual = 8307514 MB ***Stack Dump being sent to S:\MSSQL10_50.MSSQLSERVER\MSSQL\LOG\SQLDump0100.txt SqlDumpExceptionHandler: Process 128 generated fatal exception c0000005 EXCEPTION_ACCESS_VIOLATION. SQL Server is terminating this process. * ******************************************************************************* * * BEGIN STACK DUMP: * 08/05/14 14:06:42 spid 128 * * * Exception Address = 000000002F82C410 Module(psqlodbc30a+000000000003C410) * Exception Code = c0000005 EXCEPTION_ACCESS_VIOLATION * Access Violation occurred reading address 0000000000000018 * Input Buffer 338 bytes - * EXEC master.dbo.sp_columns_ex @table_server = N'STRONGMAIL61' * , @table_name = N'failure', @table_schema = N'public', @table_catalog = * N'postgres', @ODBCVer = 3 * * * MODULE BASE END SIZE * sqlservr 0000000000240000 0000000003E51FFF 03c12000 * ntdll 0000000077A80000 0000000077C28FFF 001a9000 * kernel32 0000000077860000 000000007797EFFF 0011f000 * KERNELBASE 000007FEFD8F0000 000007FEFD95AFFF 0006b000 * ADVAPI32 000007FEFF480000 000007FEFF55AFFF 000db000 * msvcrt 000007FEFF6A0000 000007FEFF73EFFF 0009f000 * sechost 000007FEFE110000 000007FEFE12EFFF 0001f000 * RPCRT4 000007FEFFA30000 000007FEFFB5CFFF 0012d000 * MSVCR80 00000000753E0000 00000000754A8FFF 000c9000 * MSVCP80 0000000075010000 0000000075118FFF 00109000 * sqlos 000000005DF30000 000000005DF36FFF 00007000 * Secur32 000007FEFD4E0000 000007FEFD4EAFFF 0000b000 * SSPICLI 000007FEFD690000 000007FEFD6B4FFF 00025000 * pdh 000007FEF1B30000 000007FEF1B7DFFF 0004e000 * SHLWAPI 000007FEFE150000 000007FEFE1C0FFF 00071000 * GDI32 000007FEFF630000 000007FEFF696FFF 00067000 * USER32 0000000077980000 0000000077A79FFF 000fa000 * LPK 000007FEFF470000 000007FEFF47DFFF 0000e000 * USP10 000007FEFF560000 000007FEFF628FFF 000c9000 * USERENV 000007FEFCB70000 000007FEFCB8DFFF 0001e000 * profapi 000007FEFD800000 000007FEFD80EFFF 0000f000 * WINMM 000007FEEE180000 000007FEEE1BAFFF 0003b000 * IPHLPAPI 000007FEFBC90000 000007FEFBCB6FFF 00027000 * NSI 000007FEFE1D0000 000007FEFE1D7FFF 00008000 * WINNSI 000007FEFBC80000 000007FEFBC8AFFF 0000b000 * opends60 000000005D6C0000 000000005D6C7FFF 00008000 * NETAPI32 000007FEFB760000 000007FEFB775FFF 00016000 * netutils 000007FEFCD00000 000007FEFCD0BFFF 0000c000 * srvcli 000007FEFD370000 000007FEFD392FFF 00023000 * wkscli 000007FEFB740000 000007FEFB754FFF 00015000 * LOGONCLI 000007FEFCEC0000 000007FEFCEEFFFF 00030000 * SAMCLI 000007FEFAB20000 000007FEFAB33FFF 00014000 * BatchParser 000000005D690000 000000005D6BCFFF 0002d000 * IMM32 000007FEFDC70000 000007FEFDC9DFFF 0002e000 * MSCTF 000007FEFE3F0000 000007FEFE4F8FFF 00109000 * psapi 0000000077C50000 0000000077C56FFF 00007000 * instapi10 0000000074F70000 0000000074F7CFFF 0000d000 * CLUSAPI 000007FEF2AF0000 000007FEF2B3FFFF 00050000 * cryptdll 000007FEFD350000 000007FEFD363FFF 00014000 * RESUTILS 000007FEF2AD0000 000007FEF2AE8FFF 00019000 * cscapi 000007FEF2640000 000007FEF264EFFF 0000f000 * sqlevn70 000000005D480000 000000005D683FFF 00204000 * CRYPTSP 000007FEFD0D0000 000007FEFD0E6FFF 00017000 * rsaenh 000007FEFCDD0000 000007FEFCE16FFF 00047000 * CRYPTBASE 000007FEFD730000 000007FEFD73EFFF 0000f000 * BROWCLI 000007FEF2720000 000007FEF2731FFF 00012000 * AUTHZ 000007FEFD2A0000 000007FEFD2CEFFF 0002f000 * MSCOREE 000007FEFAA70000 000007FEFAADEFFF 0006f000 * mscoreei 000007FEFA9D0000 000007FEFAA66FFF 00097000 * ole32 000007FEFE1E0000 000007FEFE3E2FFF 00203000 * credssp 000007FEFCCD0000 000007FEFCCD9FFF 0000a000 * msv1_0 000007FEFD000000 000007FEFD050FFF 00051000 * kerberos 000007FEFD0F0000 000007FEFD1A3FFF 000b4000 * MSASN1 000007FEFD8E0000 000007FEFD8EEFFF 0000f000 * schannel 000007FEFCE60000 000007FEFCEB6FFF 00057000 * CRYPT32 000007FEFD960000 000007FEFDACBFFF 0016c000 * WS2_32 000007FEFF900000 000007FEFF94CFFF 0004d000 * mswsock 000007FEFD070000 000007FEFD0C4FFF 00055000 * wshtcpip 000007FEFCA50000 000007FEFCA56FFF 00007000 * wship6 000007FEFD060000 000007FEFD066FFF 00007000 * DNSAPI 000007FEFCEF0000 000007FEFCF4AFFF 0005b000 * rasadhlp 000007FEFAFD0000 000007FEFAFD7FFF 00008000 * fwpuclnt 000007FEFBC20000 000007FEFBC72FFF 00053000 * security 0000000074790000 0000000074792FFF 00003000 * OLEAUT32 000007FEFF950000 000007FEFFA26FFF 000d7000 * ftimport 0000000060000000 0000000060024FFF 00025000 * MSFTE 0000000049980000 0000000049D2DFFF 003ae000 * VERSION 000007FEFC950000 000007FEFC95BFFF 0000c000 * dbghelp 000000005D320000 000000005D47DFFF 0015e000 * WINTRUST 000007FEFDB00000 000007FEFDB39FFF 0003a000 * ntmarta 000007FEFC960000 000007FEFC98CFFF 0002d000 * WLDAP32 000007FEFF740000 000007FEFF791FFF 00052000 * ncrypt 000007FEFD250000 000007FEFD29CFFF 0004d000 * bcrypt 000007FEFD220000 000007FEFD241FFF 00022000 * ntdsapi 000007FEFAFA0000 000007FEFAFC6FFF 00027000 * bcryptprimitives 000007FEFCD10000 000007FEFCD5BFFF 0004c000 * SAMLIB 000007FEFB010000 000007FEFB02CFFF 0001d000 * CLBCatQ 000007FEFDCA0000 000007FEFDD38FFF 00099000 * sqlncli10 000000005CF40000 000000005D1FCFFF 002bd000 * COMCTL32 000007FEF24A0000 000007FEF253FFFF 000a0000 * COMDLG32 000007FEFE070000 000007FEFE106FFF 00097000 * SHELL32 000007FEFE500000 000007FEFF287FFF 00d88000 * SQLNCLIR10 000000005CEA0000 000000005CED6FFF 00037000 * netbios 000007FEF16F0000 000007FEF16F9FFF 0000a000 * xpsqlbot 000000005CE90000 000000005CE97FFF 00008000 * dsrole 000007FEFC5A0000 000007FEFC5ABFFF 0000c000 * xpstar 000000005C2E0000 000000005C367FFF 00088000 * SQLSCM 000000005CEE0000 000000005CEEDFFF 0000e000 * ODBC32 000007FEF21D0000 000007FEF2280FFF 000b1000 * ATL80 0000000075350000 000000007536FFFF 00020000 * odbcint 0000000073C40000 0000000073C77FFF 00038000 * xpstar 000000005C2B0000 000000005C2D4FFF 00025000 * xplog70 000000005C880000 000000005C88FFFF 00010000 * xplog70 000000005C250000 000000005C251FFF 00002000 * apphelp 000007FEFD6D0000 000007FEFD726FFF 00057000 * mlang 000007FEFAAE0000 000007FEFAB1AFFF 0003b000 * sqlevn70 000000005B240000 000000005B4B2FFF 00273000 * sqlevn70 000000005AFC0000 000000005B230FFF 00271000 * sqlevn70 000000005AE60000 000000005AFB2FFF 00153000 * sqlevn70 000000005AC00000 000000005AE59FFF 0025a000 * sqlevn70 000000005A990000 000000005ABF0FFF 00261000 * sqlevn70 000000005A740000 000000005A985FFF 00246000 * sqlevn70 000000005A500000 000000005A73BFFF 0023c000 * sqlevn70 000000005A400000 000000005A4F4FFF 000f5000 * sqlevn70 000000005A2B0000 000000005A3F7FFF 00148000 * sqlevn70 000000005A1C0000 000000005A2ACFFF 000ed000 * COMRES 00000000701A0000 00000000702DDFFF 0013e000 * XOLEHLP 000007FEF1610000 000007FEF1623FFF 00014000 * MSDTCPRX 000007FEF1DA0000 000007FEF1E5BFFF 000bc000 * MTXCLU 000007FEF1E60000 000007FEF1EBFFFF 00060000 * ktmw32 000007FEFB730000 000007FEFB739FFF 0000a000 * RpcRtRemote 000007FEFD7E0000 000007FEFD7F3FFF 00014000 * xprepl 0000000071280000 0000000071296FFF 00017000 * msxmlsql 0000000071110000 0000000071260FFF 00151000 * instapi 0000000048060000 000000004806CFFF 0000d000 * ssdebugps 0000000070EF0000 0000000070F02FFF 00013000 * mscorwks 000007FEFA030000 000007FEFA9CCFFF 0099d000 * mscorlib.ni 000007FEF9150000 000007FEFA02CFFF 00edd000 * mscorsec 00000642FFAF0000 00000642FFB08FFF 00019000 * imagehlp 000007FEFE130000 000007FEFE148FFF 00019000 * GPAPI 000007FEFCB50000 000007FEFCB6AFFF 0001b000 * cryptnet 000007FEF83F0000 000007FEF8416FFF 00027000 * SensApi 000007FEEE8A0000 000007FEEE8A8FFF 00009000 * SqlAccess 0000000058320000 0000000058383FFF 00064000 * mscorjit 000007FEF8540000 000007FEF86C2FFF 00183000 * System.Data 0000000046880000 0000000046B7EFFF 002ff000 * System.ni 000007FEF8720000 000007FEF914CFFF 00a2d000 * System.Transactions 000000003AB10000 000000003AB58FFF 00049000 * System.Security.ni 000007FEEC840000 000007FEEC929FFF 000ea000 * System 000000006FA10000 000000006FD1FFFF 00310000 * System.Security 00000000581E0000 0000000058223FFF 00044000 * System.Xml 000000006F270000 000000006F467FFF 001f8000 * System.Configuration 0000000058150000 00000000581BBFFF 0006c000 * oledb32 000007FEE2C30000 000007FEE2D3DFFF 0010e000 * MSDART 000007FEE4450000 000007FEE4477FFF 00028000 * Comctl32 000007FEFC1C0000 000007FEFC3B3FFF 001f4000 * OLEDB32R 000000005BCB0000 000000005BCC3FFF 00014000 * msadce 000007FEEDEA0000 000007FEEDF56FFF 000b7000 * msadcer 0000000070CE0000 0000000070CE1FFF 00002000 * sqloledb 000007FEED2D0000 000007FEED3F7FFF 00128000 * MSDATL3 000007FEF1AC0000 000007FEF1ADFFFF 00020000 * msdaosp 000007FEF1D20000 000007FEF1D3EFFF 0001f000 * msdaps 000007FEEDD30000 000007FEEDD99FFF 0006a000 * msdasql 000007FEED210000 000007FEED2C5FFF 000b6000 * comsvcs 000007FEECEA0000 000007FEED04FFFF 001b0000 * MSDASQLR 0000000070780000 000000007078EFFF 0000f000 * psqlodbc30a 000000002F7F0000 000000002F879FFF 0008a000 * WSOCK32 000007FEF2E90000 000007FEF2E98FFF 00009000 * odbccp32 000007FEF1CE0000 000007FEF1D07FFF 00028000 * dbghelp 000000006E6C0000 000000006E81DFFF 0015e000 * * P1Home: 0000000044D49F70: 00000000C0000005 0000000000000000 000000002F82C410 0000000000000002 00000000 00000000 0000000000000018 * P2Home: 0000000044D49A80: 0000000044D49F70 0000000044D49A80 0000000000000000 0000000000000000 00000000 00000000 0000000000000000 * P3Home: 0000000000000000: * P4Home: 0000000000000000: * P5Home: 0000000000000000: * P6Home: 0000000000000000: * ContextFlags: 000000000010001F: 0000000000000000 0000000000000000 0000000000000000 0000000000000000 000000 0000000000 0000000000000000 * MxCsr: 0000000000001F80: * SegCs: 0000000000000033: * SegDs: 000000000000002B: * SegEs: 000000000000002B: * SegFs: 0000000000000053: * SegGs: 000000000000002B: * SegSs: 000000000000002B: * EFlags: 0000000000010246: 0000000000000000 0000000101580000 0000000102680000 0000000102780000 00000000 00000000 0000000000000000 * Rax: 00008FF84603883F: * Rcx: 8FF84603883F0000: * Rdx: 0000000000000001: * Rbx: 0000000000000000: * Rsp: 0000000044D4A040: 000000002F85D9B0 0000000000000001 0000000044D4A330 0000000000000000 0000000D 00000001 000000002F85D9E8 * Rbp: 0000000000000001: * Rsi: 0000000000000000: * Rdi: 0000000000000000: * R8: 0000000044D4A330: 655F7465675F6770 0000000000727078 00008FF84603883F 000000002F827C52 00000000 77B95430 000000002F8233ED * R9: 0000000000000000: * R10: 0000000044D4A130: 655F7465675F0028 000007FE00727078 000000001D084154 000007FEFF6A2182 00000000 0018A8C0 00000000FFFFFFFA * R11: 0000000044D49FD0: 0000000000000000 0000000000000000 0000000000000000 0000000000000000 00000000 00000000 0000000000000000 * R12: 0000000000000000: * R13: 00000000001DC7A0: 00000000001DEBA0 0000000000000000 0000000000000000 0000000044D4A578 00000000 00000000 0000000000000000 * R14: 0000000000000001: * R15: 0000000000000000: * Rip: 000000002F82C410: 158D481824448B49 850D8D480002431C 0F48C08548000314 8AFFFF6CC1E8D045 6824448B 4C502444 E4334570245C8B48 * ******************************************************************************* * ------------------------------------------------------------------------------- * Short Stack Dump 000000002F82C410 Module(psqlodbc30a+000000000003C410) 000000002F810CE9 Module(psqlodbc30a+0000000000020CE9) 000000002F812129 Module(psqlodbc30a+0000000000022129) 000000002F8163EE Module(psqlodbc30a+00000000000263EE) 000000002F848CC2 Module(psqlodbc30a+0000000000058CC2) 000007FEF2225B5D Module(ODBC32+0000000000055B5D) 000007FEF222FD00 Module(ODBC32+000000000005FD00) 000007FEED2729BE Module(msdasql+00000000000629BE) 000007FEED26FAB9 Module(msdasql+000000000005FAB9) 0000000000D8B0CA Module(sqlservr+0000000000B4B0CA) 0000000000D4C077 Module(sqlservr+0000000000B0C077) 0000000000D1EAD2 Module(sqlservr+0000000000ADEAD2) 0000000000CA22DF Module(sqlservr+0000000000A622DF) 0000000000DCB953 Module(sqlservr+0000000000B8B953) 0000000000DCBFB1 Module(sqlservr+0000000000B8BFB1) 0000000001B3E889 Module(sqlservr+00000000018FE889) 0000000001B3D0FA Module(sqlservr+00000000018FD0FA) 0000000000768D5B Module(sqlservr+0000000000528D5B) 00000000007D79E0 Module(sqlservr+00000000005979E0) 00000000007D7C89 Module(sqlservr+0000000000597C89) 0000000001B28473 Module(sqlservr+00000000018E8473) 0000000000768D5B Module(sqlservr+0000000000528D5B) 000000000079F4C5 Module(sqlservr+000000000055F4C5) 0000000000768D5B Module(sqlservr+0000000000528D5B) 00000000008032C8 Module(sqlservr+00000000005C32C8) 00000000007DBB4C Module(sqlservr+000000000059BB4C) 00000000007DBA6E Module(sqlservr+000000000059BA6E) 000000000079F172 Module(sqlservr+000000000055F172) 00000000007A06AB Module(sqlservr+00000000005606AB) 000000000081C3A9 Module(sqlservr+00000000005DC3A9) 000000000081C202 Module(sqlservr+00000000005DC202) 00000000007C7A2D Module(sqlservr+0000000000587A2D) 00000000007CB3D7 Module(sqlservr+000000000058B3D7) 00000000007CAC8C Module(sqlservr+000000000058AC8C) 00000000017445BC Module(sqlservr+00000000015045BC) 0000000001743F16 Module(sqlservr+0000000001503F16) 0000000001741F25 Module(sqlservr+0000000001501F25) 00000000007C7A2D Module(sqlservr+0000000000587A2D) 00000000007CB3D7 Module(sqlservr+000000000058B3D7) 00000000007CAC8C Module(sqlservr+000000000058AC8C) 00000000007CC800 Module(sqlservr+000000000058C800) 0000000000773DC6 Module(sqlservr+0000000000533DC6) 000000000024AB94 Module(sqlservr+000000000000AB94) 000000000024B05E Module(sqlservr+000000000000B05E) 000000000024AD57 Module(sqlservr+000000000000AD57) 00000000007251DE Module(sqlservr+00000000004E51DE) 0000000000725395 Module(sqlservr+00000000004E5395) 0000000000728925 Module(sqlservr+00000000004E8925) 00000000007259D6 Module(sqlservr+00000000004E59D6) 00000000753E37D7 Module(MSVCR80+00000000000037D7) 00000000753E3894 Module(MSVCR80+0000000000003894) 00000000778759ED Module(kernel32+00000000000159ED) 0000000077AAC541 Module(ntdll+000000000002C541) CSession @0x00000001AF1E23B0 ---------------------------- m_spid = 128 m_cRef = 12 m_rgcRefType[0] = 1 m_rgcRefType[1] = 1 m_rgcRefType[2] = 9 m_rgcRefType[3] = 1 m_rgcRefType[4] = 0 m_rgcRefType[5] = 0 m_pmo = 0x00000001AF1E2080 m_pstackBhfPool = 0x00000002A36CBC80 m_dwLoginFlags = 0x83e0 m_fBackground = 0 m_eConnResetOption = 0 m_fUserProc = -1 m_fConnReset = 0 m_fIsConnReset = 0 m_fInLogin = 0 m_fAuditLoginSent = 1 m_fAuditLoginFailedSent = 0 m_fReplRelease = 0 m_fKill = 0 m_ulLoginStamp = 2863451 m_eclClient = 6 m_protType = 5 m_hHttpToken = FFFFFFFFFFFFFFFF m_pV7LoginRec --------------------- 0000000000000000: b3100000 04000074 00100000 00000006 e4170000 †³......t........ä... 0000000000000014: 00000000 e0830000 00000000 00000000 5e000f00 †....à?..........^... 0000000000000028: 00000000 00000000 7c002600 c8000b00 de000400 †........|.&.È...Þ... 000000000000003C: e2001c00 1a010000 1a010000 065dcbee 19991a01 †â............]Ëî.... 0000000000000050: 930fad10 0000ad10 00000000 0000†††††††††††††††?.­...­....... CPhysicalConnection @0x00000001AF1E2270 --------------------------------------- m_pPhyConn->m_pmo = 0x00000001AF1E2080 m_pPhyConn->m_pNetConn = 0x00000001AF1E2AD0 m_pPhyConn->m_pConnList = 0x00000001AF1E2380 m_pPhyConn->m_pSess = 0x00000001AF1E23B0 m_pPhyConn->m_fTracked = -1 m_pPhyConn->m_cbPacketsize = 4096 m_pPhyConn->m_fMars = 0 m_pPhyConn->m_fKill = 0 CBatch @0x00000001AF1E2FA0 -------------------------- m_pSess = 0x00000001AF1E23B0 m_pConn = 0x00000001AF1E2EA0 m_cRef = 3 m_rgcRefType[0] = 1 m_rgcRefType[1] = 1 m_rgcRefType[2] = 1 m_rgcRefType[3] = 0 m_rgcRefType[4] = 0 m_pTask = 0x0000000005C3A748 EXCEPT (null) @0x0000000044D47538 --------------------------------- exc_number = 0 exc_severity = 0 exc_func = 0x0000000002763100 Task @0x0000000005C3A748 ------------------------ CPU Ticks used (ms) = 0 Task State = 2 WAITINFO_INTERNAL: WaitResource = 0x0000000000000000 WAITINFO_INTERNAL: WaitType = 0x0 WAITINFO_INTERNAL: WaitSpinlock = 0x0000000000000000 WAITINFO_EXTERNAL: WaitResource = 0x0000000000000000 WAITINFO_EXTERNAL: WaitType = 0x200001D9 WAITINFO_EXTERNAL: WaitSpinlock = 0x0000000000000000 SchedulerId = 0x5 ThreadId = 0x3c10 m_state = 0 m_eAbortSev = 0 EC @0x00000001AF1E3F00 ---------------------- spid = 0 ecid = 0 ec_stat = 0x0 ec_stat2 = 0x0 ec_atomic = 0x0 __fSubProc = 1 __pSETLS = 0x00000001AF1E2F10 __pSEParams = 0x00000001AF1E3350 SEInternalTLS @0x00000001AF1E2F10 --------------------------------- m_flags = 0 m_TLSstatus = 3 m_owningTask = 0x0000000005C3A748 m_activeHeapDatasetList = 0x00000001AF1E2F10 m_activeIndexDatasetList = 0x00000001AF1E2F20 m_pDbccContext = 0x0000000000000000 SEParams @0x00000001AF1E3350 ---------------------------- m_lockTimeout = 10000 m_isoLevel = 4096 m_logDontReplicate = 0 m_neverReplicate = 0 m_XactWorkspace = 0x0000000080D0EB50 m_pSessionLocks = 0x00000002A36CB9E0 m_pDbLocks = 0x00000001AF1E3870 m_execStats = 0x0000000107121190 m_pAllocFileLimit = 0x0000000000000000

    Tuesday, August 05, 2014 9:42 PM

Answers

  • Venkat,

    Questions does not belong to this forum. You already posted it before even if dump is different answer will not change. You have to open case with Microsoft unless you are lucky to find a MS employe here who would do it for you.

    SQL SERVER BUGCHECK DUMP IS BEST ANALYZED BY MICROSOFT ENGINEER PLEASE OPEN A CASE.


    Please mark this reply as answer if it solved your issue or vote as helpful if it helped so that other forum members can benefit from it.

    My TechNet Wiki Articles

    • Marked as answer by venkat83 Wednesday, August 06, 2014 1:16 PM
    Wednesday, August 06, 2014 9:34 AM

All replies

  • Can anyone please help me with this

    Hello,

    Only Microsoft Support can analyse such dump files, so raise a case if this is a serious issue for you.


    Olaf Helper

    [ Blog] [ Xing] [ MVP]

    Wednesday, August 06, 2014 6:15 AM
  • Venkat,

    Questions does not belong to this forum. You already posted it before even if dump is different answer will not change. You have to open case with Microsoft unless you are lucky to find a MS employe here who would do it for you.

    SQL SERVER BUGCHECK DUMP IS BEST ANALYZED BY MICROSOFT ENGINEER PLEASE OPEN A CASE.


    Please mark this reply as answer if it solved your issue or vote as helpful if it helped so that other forum members can benefit from it.

    My TechNet Wiki Articles

    • Marked as answer by venkat83 Wednesday, August 06, 2014 1:16 PM
    Wednesday, August 06, 2014 9:34 AM