|Error code: 0xC0000005|
|Type: Windows NT Status Code|
This problem can be caused by malicious programs, such as worms, trojans, and viruses. On Windows XP SP2 and Windows Server 2003 SP1, a new feature called DEP (Data Execution Prevention) performs additional checks on memory to help protect against malicious code exploits. There is a type of attack that attempts to insert and execute code from a non-executable memory locations. DEP helps prevent these attacks by intercepting them and raising an exception. A user mode DEP exception, which is an exception caused by an application that does not run in kernel mode results in a STATUS_ACCESS_VIOLATION (0xC0000005) on Windows systems. In most processes, the STATUS_ACCESS_VIOLATION exception will be an unhandled exception and results in the termination of the process.
See "Data Execution Prevention" and "Changes to Functionality in Microsoft Windows XP Service Pack 2" for additional information on DEP.
A memory access violation occurred. (Parameter 4 of the bug check is the address, which the driver attempted to access.) Typically generated by faulty drivers.
This status code maps to Win32 error code "ERROR_NOACCESS".
|Links: M158552, M169861, M170907, M177762, M195731, M224929, M228530, M240023, M257379, M303824, M312956, M818888, M822689, M832823, M836721, Data Execution Prevention, Changes to Functionality in Microsoft Windows XP Service Pack 2|
Keywords: error code 0xC0000005 and Windows NT Status Code: Google - Bing - Microsoft - Yahoo
Keywords: STATUS_ACCESS_VIOLATION: Google - Bing - Microsoft - Yahoo
|Feedback: If you have additional details about this error code, please send it to us.|