8: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the BugCheck.
Arg2: ffff83814ddaca88
Arg3: 81000000700a5867
Arg4: ffff8380fcb76630
Debugging Details:
------------------
KEY_VALUES_STRING: 1
    Key  : Analysis.CPU.mSec
    Value: 2952
    Key  : Analysis.Elapsed.mSec
    Value: 6730
    Key  : Analysis.IO.Other.Mb
    Value: 0
    Key  : Analysis.IO.Read.Mb
    Value: 0
    Key  : Analysis.IO.Write.Mb
    Value: 0
    Key  : Analysis.Init.CPU.mSec
    Value: 374
    Key  : Analysis.Init.Elapsed.mSec
    Value: 1829
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 92
    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x1a
    Key  : Failure.Bucket
    Value: 0x1a_403_nt!MiDeletePteRun
    Key  : Failure.Hash
    Value: {6e89a852-58e8-3dbb-af93-60d80dcc29e5}
    Key  : WER.OS.Branch
    Value: ni_release
    Key  : WER.OS.Version
    Value: 10.0.22621.1
BUGCHECK_CODE:  1a
BUGCHECK_P1: 403
BUGCHECK_P2: ffff83814ddaca88
BUGCHECK_P3: 81000000700a5867
BUGCHECK_P4: ffff8380fcb76630
FILE_IN_CAB:  062323-7625-01.dmp
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT:  1
PROCESS_NAME:  VALORANT-Win64-Shipping.exe
STACK_TEXT: 
ffffaa8b`d000ccd8 fffff805`6fea17ec     : 00000000`0000001a 00000000`00000403 ffff8381`4ddaca88 81000000`700a5867 : nt!KeBugCheckEx
ffffaa8b`d000cce0 fffff805`6fc78b48     : 00000000`00000000 ffffaa8b`d000d390 ffff8381`4ddacff8 00000000`00000000 : nt!MiDeletePteRun+0x22ca6c
ffffaa8b`d000ced0 fffff805`6fc318e9     : ffffaa8b`d000d2e0 ffff8381`4ddacff8 ffff6cf7`3e016e04 ffffae86`130e8700 : nt!MiDeleteVaTail+0x48
ffffaa8b`d000cf00 fffff805`6fc31a2a     : ffffaa8b`00000000 ffffae86`130e8700 ffff83c1`00000000 ffffaa8b`d000d330 : nt!MiWalkPageTablesRecursively+0x4e9
ffffaa8b`d000cf90 fffff805`6fc31a2a     : ffffaa8b`d000d2e0 ffffae86`130e8700 ffff83c1`00000000 ffffaa8b`d000d340 : nt!MiWalkPageTablesRecursively+0x62a
ffffaa8b`d000d020 fffff805`6fc31a2a     : ffffaa8b`d000d2e0 ffffae86`130e8700 ffff83c1`00000000 ffffaa8b`d000d350 : nt!MiWalkPageTablesRecursively+0x62a
ffffaa8b`d000d0b0 fffff805`6fc48de1     : 00000000`00000000 ffffae86`130e8700 00000000`00000000 ffffaa8b`d000d360 : nt!MiWalkPageTablesRecursively+0x62a
ffffaa8b`d000d140 fffff805`6fc79ea2     : ffffaa8b`d000d2e0 0000029b`00000001 00000000`00000002 ffffaa8b`00000000 : nt!MiWalkPageTables+0x371
ffffaa8b`d000d240 fffff805`6fc8aeee     : ffffae86`1b953080 fffff805`6fc843e2 ffffaa8b`d000d5e0 ffffae86`17967490 : nt!MiDeletePagablePteRange+0x3c2
ffffaa8b`d000d550 fffff805`700a6417     : 00000000`00000000 00000000`00000001 ffffaa8b`d000d620 ffffaa8b`d000d620 : nt!MiDeleteVirtualAddresses+0x4e
ffffaa8b`d000d5a0 fffff805`70173a26     : 0000029b`b4df0000 ffffae86`17967490 ffffae86`130e8080 00000000`00000000 : nt!MiDeleteVad+0x1b7
ffffaa8b`d000d660 fffff805`70088169     : ffffae86`1c917450 ffffae86`1c917450 ffffae86`1c917450 ffffae86`130e8080 : nt!MiCleanVad+0x42
ffffaa8b`d000d690 fffff805`700dd159     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffae86`130e8080 : nt!MmCleanProcessAddressSpace+0x10d
ffffaa8b`d000d710 fffff805`70104fea     : ffffae86`130e8080 ffff978a`139c0920 ffffaa8b`d000d939 00000000`00000000 : nt!PspRundownSingleProcess+0xc1
ffffaa8b`d000d7a0 fffff805`701062b8     : 78d88168`00000001 2b70c860`9c773001 ffffae86`1b9530f4 000000c8`b8d24000 : nt!PspExitThread+0x64e
ffffaa8b`d000d8a0 fffff805`6fd1350d     : ffff8381`4df6ad78 ffffae86`130e8700 ffffae86`130e87c0 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffffaa8b`d000d8e0 fffff805`6fe32420     : 00000000`00000001 ffffaa8b`d000d9a0 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x47d
ffffaa8b`d000d9a0 fffff805`6fe4108f     : ffffae86`1b953080 ffffae86`0e01fc60 00000000`00000000 00000000`00000000 : nt!KiInitiateUserApc+0x70
ffffaa8b`d000dae0 00007ffd`0d84ecd4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000c8`cb8ffbc8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`0d84ecd4
SYMBOL_NAME:  nt!MiDeletePteRun+22ca6c
MODULE_NAME: nt
IMAGE_VERSION:  10.0.22621.1848
STACK_COMMAND:  .cxr; .ecxr ; kb
IMAGE_NAME:  ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET:  22ca6c
FAILURE_BUCKET_ID:  0x1a_403_nt!MiDeletePteRun
OS_VERSION:  10.0.22621.1
BUILDLAB_STR:  ni_release
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {6e89a852-58e8-3dbb-af93-60d80dcc29e5}
Followup:     MachineOwner
---------