Windows 7 VMware 8 BSOD after install

Bdizzle

Posts: 11   +0
So I installed VMware 8 and after the install when I try to load the program it gives me a BSOD everytime I try to start the program.
Microsoft (R) Windows Debugger Version 6.11.0001.402 X86
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Windows\Minidump\080812-22963-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
WARNING: Whitespace at end of path element
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols

Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17835.amd64fre.win7sp1_gdr.120503-2030
Machine Name:
Kernel base = 0xfffff800`03250000 PsLoadedModuleList = 0xfffff800`03494670
Debug session time: Wed Aug 8 17:20:36.046 2012 (GMT-7)
System Uptime: 0 days 0:04:24.264
Loading Kernel Symbols
...............................................................
................................................................
........................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff8000331d987, fffff880079a9e40, 0}
Probably caused by : ntkrnlmp.exe ( nt!wcsstr+13 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8000331d987, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff880079a9e40, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!wcsstr+13
fffff800`0331d987 0fb701 movzx eax,word ptr [rcx]
CONTEXT: fffff880079a9e40 -- (.cxr 0xfffff880079a9e40)
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff880041bf4b0 rsi=000000000000000a rdi=fffffa8009e76b10
rip=fffff8000331d987 rsp=fffff880079aa828 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000001 r10=fffff880041bf4b0
r11=0000000000000000 r12=fffffa8008562e50 r13=fffffa8007b15a80
r14=fffffa8009e76c70 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
nt!wcsstr+0x13:
fffff800`0331d987 0fb701 movzx eax,word ptr [rcx] ds:002b:00000000`00000000=????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: vmware-usbarbi
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff8000331d987
STACK_TEXT:
fffff880`079aa828 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!wcsstr+0x13

FOLLOWUP_IP:
nt!wcsstr+13
fffff800`0331d987 0fb701 movzx eax,word ptr [rcx]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!wcsstr+13
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4fa390f3
STACK_COMMAND: .cxr 0xfffff880079a9e40 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!wcsstr+13
BUCKET_ID: X64_0x3B_nt!wcsstr+13
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8000331d987, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff880079a9e40, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!wcsstr+13
fffff800`0331d987 0fb701 movzx eax,word ptr [rcx]
CONTEXT: fffff880079a9e40 -- (.cxr 0xfffff880079a9e40)
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff880041bf4b0 rsi=000000000000000a rdi=fffffa8009e76b10
rip=fffff8000331d987 rsp=fffff880079aa828 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000001 r10=fffff880041bf4b0
r11=0000000000000000 r12=fffffa8008562e50 r13=fffffa8007b15a80
r14=fffffa8009e76c70 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
nt!wcsstr+0x13:
fffff800`0331d987 0fb701 movzx eax,word ptr [rcx] ds:002b:00000000`00000000=????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: vmware-usbarbi
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff8000331d987
STACK_TEXT:
fffff880`079aa828 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!wcsstr+0x13

FOLLOWUP_IP:
nt!wcsstr+13
fffff800`0331d987 0fb701 movzx eax,word ptr [rcx]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!wcsstr+13
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4fa390f3
STACK_COMMAND: .cxr 0xfffff880079a9e40 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!wcsstr+13
BUCKET_ID: X64_0x3B_nt!wcsstr+13
Followup: MachineOwner
---------


Here is my specs
Intel 2500k 3.3ghz
gigabyte z68A-D3-B3
GTX 560 TI
g.skill ripjaw 2 x 4gb ddr3 1600 9-9-9-28
750gb WD HDD
Corsair TX650 V2
Windows 7 Ultimate
 

Attachments

  • Minidump.zip
    50.3 KB · Views: 2
Back