SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8057a2e9175, The address that the exception occurred at
Arg3: ffffca8e85b47728, Exception Record Address
Arg4: ffffca8e85b46f10, Context Record Address
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for BEDaisy.sys
PROCESS_NAME:  System
READ_ADDRESS: fffff8057afc34c0: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 00000000000004c0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
EXCEPTION_CODE_STR:  c0000005
EXCEPTION_PARAMETER1:  0000000000000000
EXCEPTION_PARAMETER2:  00000000000004c0
EXCEPTION_STR:  0xc0000005
STACK_TEXT: 
ffffca8e`85b47960 fffff805`7a2e902c     : ffff8588`708964a8 ffff8588`6bedc498 00000000`00000000 00000000`00000100 : nt!ExpUnblockPushLock+0x39
ffffca8e`85b479c0 fffff805`108fdd77     : ffff8588`708964a8 fffff805`10741c04 ffffcc88`0a6bac58 00000040`0000000c : nt!ExfUnblockPushLock+0xc
ffffca8e`85b479f0 ffff8588`708964a8     : fffff805`10741c04 ffffcc88`0a6bac58 00000040`0000000c ffff8588`708964a8 : BEDaisy+0x1bdd77
ffffca8e`85b479f8 fffff805`10741c04     : ffffcc88`0a6bac58 00000040`0000000c ffff8588`708964a8 fffff805`7a8a69b6 : 0xffff8588`708964a8
ffffca8e`85b47a00 ffffcc88`0a6bac58     : 00000040`0000000c ffff8588`708964a8 fffff805`7a8a69b6 00000000`00000004 : BEDaisy+0x1c04
ffffca8e`85b47a08 00000040`0000000c     : ffff8588`708964a8 fffff805`7a8a69b6 00000000`00000004 00000000`00000000 : 0xffffcc88`0a6bac58
ffffca8e`85b47a10 ffff8588`708964a8     : fffff805`7a8a69b6 00000000`00000004 00000000`00000000 ffff8588`6bedc498 : 0x00000040`0000000c
ffffca8e`85b47a18 fffff805`7a8a69b6     : 00000000`00000004 00000000`00000000 ffff8588`6bedc498 ffffb701`b42ed100 : 0xffff8588`708964a8
ffffca8e`85b47a20 fffff805`108fddb3     : ffff8588`70896080 ffffca8e`85b47af0 00000000`00000000 ffffca8e`85b47a80 : nt!ExEnumHandleTable+0x1a6
ffffca8e`85b47a80 ffff8588`70896080     : ffffca8e`85b47af0 00000000`00000000 ffffca8e`85b47a80 ffffcc88`0a602000 : BEDaisy+0x1bddb3
ffffca8e`85b47a88 ffffca8e`85b47af0     : 00000000`00000000 ffffca8e`85b47a80 ffffcc88`0a602000 fffff805`108ff760 : 0xffff8588`70896080
ffffca8e`85b47a90 00000000`00000000     : ffffca8e`85b47a80 ffffcc88`0a602000 fffff805`108ff760 ffffca8e`85b47af0 : 0xffffca8e`85b47af0
SYMBOL_NAME:  BEDaisy+1bdd77
MODULE_NAME: BEDaisy
IMAGE_NAME:  BEDaisy.sys
STACK_COMMAND: .cxr 0xffffca8e85b46f10 ; kb
BUCKET_ID_FUNC_OFFSET:  1bdd77
FAILURE_BUCKET_ID:  AV_BEDaisy!unknown_function