When a Windows VM crashes unexpectedly, the crash can originate from either the guest operating system or the virtualization layer. Use the following steps to identify the source and determine the appropriate resolution path.
Step 1: Collect diagnostic data
- Collect the Windows memory dump from the guest OS. The default location is
C:\Windows\MEMORY.DMP or C:\Windows\Minidump\.
- Collect the VM's vmware.log file from the VM directory on the datastore.
- If hypervisor involvement is suspected, collect an ESXi support bundle from the host where the VM was running at the time of the crash.
Step 2: Determine the crash origin
Use the methodology in Windows VM crash investigation: How to use vmware.log to determine crash origin to determine whether the crash originated from the guest OS or the hypervisor.
Step 3: Follow the appropriate resolution path
If the crash originated within the guest OS:
- Engage Microsoft Support or use Windows debugging tools to analyze the memory dump.
- Review Windows Event Viewer for errors preceding the crash.
- Check for recently installed drivers, updates, or software changes.
- Verify the guest OS is fully patched and VMware Tools is up to date.
If the crash was triggered by the hypervisor or virtual hardware:
- Collect an ESXi support bundle if not already collected.
- Review vmkernel.log for errors related to storage, memory, or CPU near the crash time.
- Check for pending ESXi and server firmware updates.
- Open a case with Broadcom Support for further analysis.
If the crash was caused by a manual NMI injection:
- Identify who initiated the NMI and why. See Manual Crash Triggered by NMI on Virtual machine hosted on vCenter/ESXi.
- Review whether the NMI was sent intentionally to collect diagnostic data from a hung VM.
- If the NMI was unintentional, review administrative access and procedures.