Tech Note 919 - Using The ProcDump Utility To Capture A Wonderware Process Dump
Tech Note 919 - Using The ProcDump Utility To Capture A Wonderware Process Dump
All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms of Use for more information.
Topic#: 002732
Created: March 2013
Introduction
ProcDump is a Microsoft command-line utility whose primary purpose is for monitoring an application for CPU spikes and for generating
crash dumps during a spike. An administrator or developer can use the generated .dmp file to determine the cause of the spike.
ProcDump also includes hung window monitoring (using the same definition of a window hang that Windows and Task Manager Use),
unhandled exception monitoring and it can generate dumps based on the values of system performance counters. It also can serve as a
general process dump utility that you can embed in other scripts.
For example, for Wonderware Applications you can use the utility to collect the complete memory when the blue screen appears. This
determines which product does this.
Application Versions
ProcDump 5.13
3. Move the cursor to your C:\ drive (cd) and execute procdump.exe with the required parameters.
4. Click Agree.
Using ProcDump
For complete information on the utility options, click HERE.
C:\>procdump -c 90 -s 5 -n 3 aaEngine.exe
Write a mini dump for a process called view.exe (InTouch) when one of its Windows is unresponsive for more than 5 seconds:
Write a mini dump for w3wp.exe (based on IIS Pool, such as WIS Application) if an exception's code/name contains NotFound:
Write a full dump of a process with PID '4572' (i.e. related to InTouch), and will collect all code/names exceptions (to understand
when second exception is required):
Write a full memory dump if the aaBotstrap.exe will be terminated within a 1st chance exception (usefully for missing reference
exception on services)
Write a full memory dump for an aaEngine.exe (referenced by his PID 1234) when a crash will be happening, collecting the 2nd
chance exception:
Write a full memory dump for an aaEngine.exe (referenced by hi PID 1234) when a specific exception will be encountered, such
as “AccessViolation” 0x000000c most common.
M. Salah, P. Iodice
Tech Notes are published occasionally by Wonderware Technical Support. Publisher: Invensys Systems, Inc., 26561 Rancho Parkway South, Lake Forest, CA 92630. There is also
technical information on our software products at Wonderware Technical Support.
Back to top
©2013 Invensys Systems, Inc. All rights reserved. No part of the material protected by this copyright may be reproduced or utilized in any form or by any means, electronic or
mechanical, including photocopying, recording, broadcasting, or by anyinformation storage and retrieval system, without permission in writing from Invensys Systems, Inc.
Terms of Use.