8: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the BugCheck.
Arg2: ffff83814ddaca88
Arg3: 81000000700a5867
Arg4: ffff8380fcb76630
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2952
Key : Analysis.Elapsed.mSec
Value: 6730
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 374
Key : Analysis.Init.Elapsed.mSec
Value: 1829
Key : Analysis.Memory.CommitPeak.Mb
Value: 92
Key : Bugcheck.Code.LegacyAPI
Value: 0x1a
Key : Failure.Bucket
Value: 0x1a_403_nt!MiDeletePteRun
Key : Failure.Hash
Value: {6e89a852-58e8-3dbb-af93-60d80dcc29e5}
Key : WER.OS.Branch
Value: ni_release
Key : WER.OS.Version
Value: 10.0.22621.1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 403
BUGCHECK_P2: ffff83814ddaca88
BUGCHECK_P3: 81000000700a5867
BUGCHECK_P4: ffff8380fcb76630
FILE_IN_CAB: 062323-7625-01.dmp
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: VALORANT-Win64-Shipping.exe
STACK_TEXT:
ffffaa8b`d000ccd8 fffff805`6fea17ec : 00000000`0000001a 00000000`00000403 ffff8381`4ddaca88 81000000`700a5867 : nt!KeBugCheckEx
ffffaa8b`d000cce0 fffff805`6fc78b48 : 00000000`00000000 ffffaa8b`d000d390 ffff8381`4ddacff8 00000000`00000000 : nt!MiDeletePteRun+0x22ca6c
ffffaa8b`d000ced0 fffff805`6fc318e9 : ffffaa8b`d000d2e0 ffff8381`4ddacff8 ffff6cf7`3e016e04 ffffae86`130e8700 : nt!MiDeleteVaTail+0x48
ffffaa8b`d000cf00 fffff805`6fc31a2a : ffffaa8b`00000000 ffffae86`130e8700 ffff83c1`00000000 ffffaa8b`d000d330 : nt!MiWalkPageTablesRecursively+0x4e9
ffffaa8b`d000cf90 fffff805`6fc31a2a : ffffaa8b`d000d2e0 ffffae86`130e8700 ffff83c1`00000000 ffffaa8b`d000d340 : nt!MiWalkPageTablesRecursively+0x62a
ffffaa8b`d000d020 fffff805`6fc31a2a : ffffaa8b`d000d2e0 ffffae86`130e8700 ffff83c1`00000000 ffffaa8b`d000d350 : nt!MiWalkPageTablesRecursively+0x62a
ffffaa8b`d000d0b0 fffff805`6fc48de1 : 00000000`00000000 ffffae86`130e8700 00000000`00000000 ffffaa8b`d000d360 : nt!MiWalkPageTablesRecursively+0x62a
ffffaa8b`d000d140 fffff805`6fc79ea2 : ffffaa8b`d000d2e0 0000029b`00000001 00000000`00000002 ffffaa8b`00000000 : nt!MiWalkPageTables+0x371
ffffaa8b`d000d240 fffff805`6fc8aeee : ffffae86`1b953080 fffff805`6fc843e2 ffffaa8b`d000d5e0 ffffae86`17967490 : nt!MiDeletePagablePteRange+0x3c2
ffffaa8b`d000d550 fffff805`700a6417 : 00000000`00000000 00000000`00000001 ffffaa8b`d000d620 ffffaa8b`d000d620 : nt!MiDeleteVirtualAddresses+0x4e
ffffaa8b`d000d5a0 fffff805`70173a26 : 0000029b`b4df0000 ffffae86`17967490 ffffae86`130e8080 00000000`00000000 : nt!MiDeleteVad+0x1b7
ffffaa8b`d000d660 fffff805`70088169 : ffffae86`1c917450 ffffae86`1c917450 ffffae86`1c917450 ffffae86`130e8080 : nt!MiCleanVad+0x42
ffffaa8b`d000d690 fffff805`700dd159 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffae86`130e8080 : nt!MmCleanProcessAddressSpace+0x10d
ffffaa8b`d000d710 fffff805`70104fea : ffffae86`130e8080 ffff978a`139c0920 ffffaa8b`d000d939 00000000`00000000 : nt!PspRundownSingleProcess+0xc1
ffffaa8b`d000d7a0 fffff805`701062b8 : 78d88168`00000001 2b70c860`9c773001 ffffae86`1b9530f4 000000c8`b8d24000 : nt!PspExitThread+0x64e
ffffaa8b`d000d8a0 fffff805`6fd1350d : ffff8381`4df6ad78 ffffae86`130e8700 ffffae86`130e87c0 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffffaa8b`d000d8e0 fffff805`6fe32420 : 00000000`00000001 ffffaa8b`d000d9a0 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x47d
ffffaa8b`d000d9a0 fffff805`6fe4108f : ffffae86`1b953080 ffffae86`0e01fc60 00000000`00000000 00000000`00000000 : nt!KiInitiateUserApc+0x70
ffffaa8b`d000dae0 00007ffd`0d84ecd4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000c8`cb8ffbc8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`0d84ecd4
SYMBOL_NAME: nt!MiDeletePteRun+22ca6c
MODULE_NAME: nt
IMAGE_VERSION: 10.0.22621.1848
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 22ca6c
FAILURE_BUCKET_ID: 0x1a_403_nt!MiDeletePteRun
OS_VERSION: 10.0.22621.1
BUILDLAB_STR: ni_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6e89a852-58e8-3dbb-af93-60d80dcc29e5}
Followup: MachineOwner
---------