SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8057a2e9175, The address that the exception occurred at
Arg3: ffffca8e85b47728, Exception Record Address
Arg4: ffffca8e85b46f10, Context Record Address
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for BEDaisy.sys
PROCESS_NAME: System
READ_ADDRESS: fffff8057afc34c0: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
00000000000004c0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 00000000000004c0
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
ffffca8e`85b47960 fffff805`7a2e902c : ffff8588`708964a8 ffff8588`6bedc498 00000000`00000000 00000000`00000100 : nt!ExpUnblockPushLock+0x39
ffffca8e`85b479c0 fffff805`108fdd77 : ffff8588`708964a8 fffff805`10741c04 ffffcc88`0a6bac58 00000040`0000000c : nt!ExfUnblockPushLock+0xc
ffffca8e`85b479f0 ffff8588`708964a8 : fffff805`10741c04 ffffcc88`0a6bac58 00000040`0000000c ffff8588`708964a8 : BEDaisy+0x1bdd77
ffffca8e`85b479f8 fffff805`10741c04 : ffffcc88`0a6bac58 00000040`0000000c ffff8588`708964a8 fffff805`7a8a69b6 : 0xffff8588`708964a8
ffffca8e`85b47a00 ffffcc88`0a6bac58 : 00000040`0000000c ffff8588`708964a8 fffff805`7a8a69b6 00000000`00000004 : BEDaisy+0x1c04
ffffca8e`85b47a08 00000040`0000000c : ffff8588`708964a8 fffff805`7a8a69b6 00000000`00000004 00000000`00000000 : 0xffffcc88`0a6bac58
ffffca8e`85b47a10 ffff8588`708964a8 : fffff805`7a8a69b6 00000000`00000004 00000000`00000000 ffff8588`6bedc498 : 0x00000040`0000000c
ffffca8e`85b47a18 fffff805`7a8a69b6 : 00000000`00000004 00000000`00000000 ffff8588`6bedc498 ffffb701`b42ed100 : 0xffff8588`708964a8
ffffca8e`85b47a20 fffff805`108fddb3 : ffff8588`70896080 ffffca8e`85b47af0 00000000`00000000 ffffca8e`85b47a80 : nt!ExEnumHandleTable+0x1a6
ffffca8e`85b47a80 ffff8588`70896080 : ffffca8e`85b47af0 00000000`00000000 ffffca8e`85b47a80 ffffcc88`0a602000 : BEDaisy+0x1bddb3
ffffca8e`85b47a88 ffffca8e`85b47af0 : 00000000`00000000 ffffca8e`85b47a80 ffffcc88`0a602000 fffff805`108ff760 : 0xffff8588`70896080
ffffca8e`85b47a90 00000000`00000000 : ffffca8e`85b47a80 ffffcc88`0a602000 fffff805`108ff760 ffffca8e`85b47af0 : 0xffffca8e`85b47af0
SYMBOL_NAME: BEDaisy+1bdd77
MODULE_NAME: BEDaisy
IMAGE_NAME: BEDaisy.sys
STACK_COMMAND: .cxr 0xffffca8e85b46f10 ; kb
BUCKET_ID_FUNC_OFFSET: 1bdd77
FAILURE_BUCKET_ID: AV_BEDaisy!unknown_function