{"id":44733,"date":"2015-02-06T07:00:00","date_gmt":"2015-02-06T22:00:00","guid":{"rendered":"https:\/\/blogs.msdn.microsoft.com\/oldnewthing\/2015\/02\/06\/use-gflags-to-catch-the-silent-killer-silent-but-deadly\/"},"modified":"2019-03-13T12:12:41","modified_gmt":"2019-03-13T19:12:41","slug":"20150206-00","status":"publish","type":"post","link":"https:\/\/devblogs.microsoft.com\/oldnewthing\/20150206-00\/?p=44733","title":{"rendered":"Use GFlags to catch the silent killer (silent but deadly)"},"content":{"rendered":"<p>Suppose you have some process that is mysteriously dying and you can&#8217;t figure out why. You think that some other process is doing a <code>Terminate&shy;Process<\/code> but heck if you can figure out who that is. <\/p>\n<p>Starting in Windows&nbsp;7 and Windows Server 2008&nbsp;R2, the GFlags tool will let you catch these miscreants. <\/p>\n<p><a HREF=\"http:\/\/bugslasher.net\/2011\/04\/17\/who-the-hell-killed-my-process\/\">On the <i>Silent Process Exit<\/i> tab<\/a>, you enter the program you want to keep an extra eye on and check the box <i>Enable Silent Process Exit Monitoring<\/i> and select what you want to happen when one of these mysterious exits occurs. You can ask for an entry in the event log that identifies the killer, and you can ask for debugging minidumps to be created of both the killer and the victim. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Silent Process Exit.<\/p>\n","protected":false},"author":1069,"featured_media":111744,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[25],"class_list":["post-44733","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-oldnewthing","tag-code"],"acf":[],"blog_post_summary":"<p>Silent Process Exit.<\/p>\n","_links":{"self":[{"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/posts\/44733","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/users\/1069"}],"replies":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/comments?post=44733"}],"version-history":[{"count":0,"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/posts\/44733\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/media\/111744"}],"wp:attachment":[{"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/media?parent=44733"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/categories?post=44733"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/tags?post=44733"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}