I reproduce the error-causing code.
BEDaisy+0x5442eb:
fffff801`936342eb 4431840400dd3e98 xor dword ptr [rsp+rax-67C12300h],r8d
fffff801`936342f3 410fbed9 movsx ebx,r9b
fffff801`936342f7 4a8d8c4932d3b915 lea rcx,[rcx+r9*2+15B9D332h]
fffff801`936342ff 80c916 or cl,16h
fffff801`93634302 5b pop rbx
fffff801`93634303 4981c914929c0e or r9,0E9C9214h
fffff801`9363430a ffcd dec ebp
fffff801`9363430c 0c9b or al,9Bh
fffff801`9363430e 4d63c0 movsxd r8,r8d
fffff801`93634311 4d13d8 adc r11,r8
fffff801`93634314 4c8b843de5f6c1dc mov r8,qword ptr [rbp+rdi-233E091Bh]
fffff801`9363431c 668bb42fedf6c1dc mov si,word ptr [rdi+rbp-233E0913h]
fffff801`93634324 488dbc386fdc3e98 lea rdi,[rax+rdi-67C12391h]
fffff801`9363432c c0f863 sar al,63h
fffff801`9363432f 660fabd1 bts cx,dx
fffff801`93634333 36664289b4000ddc3e98 mov word ptr ss:[rax+r8-67C123F3h],si
From what I see from reverse engineering, there are several problems in the code.
Unsafe Memory Access:
xor dword ptr [rsp+rax-67C12300h], r8d ; High-risk stack write with unvalidated offset.
mov r8, qword ptr [rbp+rdi-233E091Bh] ; Potential dereference of wild pointer (rbp/rdi not verified).
Unchecked Pointer Arithmetic:
lea rcx, [rcx+r9*2+15B9D332h] ; Address generation with untrusted inputs (rcx/r9).
lea rdi, [rax+rdi-67C12391h] ; Large negative offset risks crossing memory boundaries.
Stack/Register Corruption:
pop rbx ; Potential stack imbalance.
sar al, 63h ; Destructive bitwise operation on register state.
The assembly code exhibits poor pointer hygiene and lack of bounds checks , directly correlating to the observed BSOD (0x50 ) presents above.