Microsoft (R) Windows Debugger Version 10.0.25111.1000 AMD64Copyright (c) Microsoft Corporation. All rights reserved.Loading Dump File [D:\MyFile\Bug\061122-9000-01.dmp]Mini Kernel Dump File: Only registers and stack trace are available************* Path validation summary **************Response Time (ms) LocationDeferred srv*Symbol search path is: srv*Executable search path is: Windows 10 Kernel Version 22000 MP (12 procs) Free x64Product: WinNt, suite: TerminalServer SingleUserTS PersonalEdition build lab: 22000.1.amd64fre.co_release.210604-1628Machine Name:Kernel base = 0xfffff804`68a00000 PsLoadedModuleList = 0xfffff804`69629750Debug session time: Sat Jun 11 20:29:57.817 2022 (UTC + 8:00)System Uptime: 1 days 19:37:17.758Loading Kernel Symbols...................................................................................................................................................................................................................................Loading User SymbolsLoading unloaded module list..................................................For analysis of this file, run !analyze -vnt!KeBugCheckEx:fffff804`68e17820 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffad80`da017100=00000000000001392: kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************KERNEL_SECURITY_CHECK_FAILURE (139)A kernel component has corrupted a critical data structure. The corruptioncould potentially allow a malicious user to gain control of this machine.Arguments:Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).Arg2: ffffad80da017420, Address of the trap frame for the exception that caused the BugCheckArg3: ffffad80da017378, Address of the exception record for the exception that caused the BugCheckArg4: 0000000000000000, ReservedDebugging Details:------------------