Created
October 9, 2015 22:48
-
-
Save KindDragon/fcb0757383efd6b4018a to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
'vld_main.exe' (Win32): Loaded 'D:\Work\vld\src\bin\Win32\Debug-v140\vld_main.exe'. Symbols loaded. | |
'vld_main.exe' (Win32): Loaded 'C:\Windows\SysWOW64\ntdll.dll'. Symbols loaded. | |
'vld_main.exe' (Win32): Loaded 'C:\Windows\SysWOW64\kernel32.dll'. Symbols loaded. | |
'vld_main.exe' (Win32): Loaded 'C:\Windows\SysWOW64\KernelBase.dll'. Symbols loaded. | |
'vld_main.exe' (Win32): Loaded 'D:\Work\vld\src\bin\Win32\Debug-v140\vld_x86.dll'. Symbols loaded. | |
'vld_main.exe' (Win32): Loaded 'C:\Windows\SysWOW64\ucrtbased.dll'. Symbols loaded. | |
'vld_main.exe' (Win32): Loaded 'C:\Windows\SysWOW64\vcruntime140d.dll'. Symbols loaded. | |
'vld_main.exe' (Win32): Loaded 'C:\Windows\SysWOW64\advapi32.dll'. Symbols loaded. | |
'vld_main.exe' (Win32): Loaded 'C:\Windows\SysWOW64\msvcrt.dll'. Symbols loaded. | |
'vld_main.exe' (Win32): Loaded 'C:\Windows\SysWOW64\sechost.dll'. Symbols loaded. | |
'vld_main.exe' (Win32): Loaded 'C:\Windows\SysWOW64\rpcrt4.dll'. Symbols loaded. | |
'vld_main.exe' (Win32): Loaded 'C:\Windows\SysWOW64\sspicli.dll'. Symbols loaded. | |
'vld_main.exe' (Win32): Loaded 'D:\Work\vld\src\bin\Win32\Debug-v140\dbghelp.dll'. Symbols loaded. | |
'vld_main.exe' (Win32): Loaded 'C:\Windows\SysWOW64\cryptbase.dll'. Symbols loaded. | |
'vld_main.exe' (Win32): Loaded 'C:\Windows\SysWOW64\bcryptprimitives.dll'. Symbols loaded. | |
Visual Leak Detector read settings from: d:\Work\vld\src\bin\vld.ini | |
Visual Leak Detector Version 2.4RC2 installed. | |
WARNING: Visual Leak Detector detected memory leaks! | |
---------- Block 4 at 0x0044B050: 1 bytes ---------- | |
CRT Alloc ID: 133 | |
Leak Hash: 0xA285EE95, Count: 1, Total 1 bytes | |
Call Stack (TID 19184): | |
d:\th\minkernel\crts\ucrt\src\appcrt\heap\malloc.cpp (16): ucrtbased.dll!malloc() | |
d:\work\vld\src\tests\vld_main\vld_main.cpp (14): vld_main.exe!MemoryLeak::MemoryLeak() + 0x2F bytes | |
d:\work\vld\src\tests\vld_main\vld_main.cpp (23): vld_main.exe!`dynamic initializer for 'pml''() + 0x77 bytes | |
d:\th\minkernel\crts\ucrt\src\appcrt\startup\initterm.cpp (22): ucrtbased.dll!_initterm() | |
f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (230): vld_main.exe!__scrt_common_main_seh() + 0xF bytes | |
f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (309): vld_main.exe!__scrt_common_main() | |
f:\dd\vctools\crt\vcstartup\src\startup\exe_wmain.cpp (17): vld_main.exe!wmainCRTStartup() | |
KERNEL32.DLL!BaseThreadInitThunk() + 0x24 bytes | |
ntdll.dll!__RtlUserThreadStart() + 0x2F bytes | |
ntdll.dll!_RtlUserThreadStart() + 0x1B bytes | |
Data: | |
CD ........ ........ | |
---------- Block 1 at 0x0044BB20: 1 bytes ---------- | |
CRT Alloc ID: 130 | |
Leak Hash: 0x66AAF654, Count: 1, Total 1 bytes | |
Call Stack (TID 19184): | |
d:\th\minkernel\crts\ucrt\src\appcrt\heap\malloc.cpp (16): ucrtbased.dll!malloc() | |
d:\work\vld\src\tests\vld_main\vld_main.cpp (20): vld_main.exe!`dynamic initializer for 's_m''() + 0x28 bytes | |
d:\th\minkernel\crts\ucrt\src\appcrt\startup\initterm.cpp (22): ucrtbased.dll!_initterm() | |
f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (230): vld_main.exe!__scrt_common_main_seh() + 0xF bytes | |
f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (309): vld_main.exe!__scrt_common_main() | |
f:\dd\vctools\crt\vcstartup\src\startup\exe_wmain.cpp (17): vld_main.exe!wmainCRTStartup() | |
KERNEL32.DLL!BaseThreadInitThunk() + 0x24 bytes | |
ntdll.dll!__RtlUserThreadStart() + 0x2F bytes | |
ntdll.dll!_RtlUserThreadStart() + 0x1B bytes | |
Data: | |
CD ........ ........ | |
---------- Block 6 at 0x004547E8: 1 bytes ---------- | |
CRT Alloc ID: 135 | |
Leak Hash: 0x35837BC4, Count: 1, Total 1 bytes | |
Call Stack (TID 19184): | |
d:\th\minkernel\crts\ucrt\src\appcrt\heap\malloc.cpp (16): ucrtbased.dll!malloc() | |
d:\work\vld\src\tests\vld_main\vld_main.cpp (26): vld_main.exe!`dynamic initializer for 'g_m''() + 0x28 bytes | |
d:\th\minkernel\crts\ucrt\src\appcrt\startup\initterm.cpp (22): ucrtbased.dll!_initterm() | |
f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (230): vld_main.exe!__scrt_common_main_seh() + 0xF bytes | |
f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (309): vld_main.exe!__scrt_common_main() | |
f:\dd\vctools\crt\vcstartup\src\startup\exe_wmain.cpp (17): vld_main.exe!wmainCRTStartup() | |
KERNEL32.DLL!BaseThreadInitThunk() + 0x24 bytes | |
ntdll.dll!__RtlUserThreadStart() + 0x2F bytes | |
ntdll.dll!_RtlUserThreadStart() + 0x1B bytes | |
Data: | |
CD ........ ........ | |
---------- Block 2 at 0x004550D0: 1 bytes ---------- | |
CRT Alloc ID: 131 | |
Leak Hash: 0xC69DA75D, Count: 1, Total 1 bytes | |
Call Stack (TID 19184): | |
f:\dd\vctools\crt\vcstartup\src\heap\new_array.cpp (15): vld_main.exe!operator new[]() + 0x9 bytes | |
d:\work\vld\src\tests\vld_main\vld_main.cpp (21): vld_main.exe!`dynamic initializer for 's_n''() + 0x25 bytes | |
d:\th\minkernel\crts\ucrt\src\appcrt\startup\initterm.cpp (22): ucrtbased.dll!_initterm() | |
f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (230): vld_main.exe!__scrt_common_main_seh() + 0xF bytes | |
f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (309): vld_main.exe!__scrt_common_main() | |
f:\dd\vctools\crt\vcstartup\src\startup\exe_wmain.cpp (17): vld_main.exe!wmainCRTStartup() | |
KERNEL32.DLL!BaseThreadInitThunk() + 0x24 bytes | |
ntdll.dll!__RtlUserThreadStart() + 0x2F bytes | |
ntdll.dll!_RtlUserThreadStart() + 0x1B bytes | |
Data: | |
CD ........ ........ | |
---------- Block 3 at 0x00456920: 1 bytes ---------- | |
CRT Alloc ID: 132 | |
Leak Hash: 0x5A6F63D6, Count: 1, Total 1 bytes | |
Call Stack (TID 19184): | |
f:\dd\vctools\crt\vcstartup\src\heap\new_scalar.cpp (19): vld_main.exe!operator new() + 0x9 bytes | |
d:\work\vld\src\tests\vld_main\vld_main.cpp (23): vld_main.exe!`dynamic initializer for 'pml''() + 0x44 bytes | |
d:\th\minkernel\crts\ucrt\src\appcrt\startup\initterm.cpp (22): ucrtbased.dll!_initterm() | |
f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (230): vld_main.exe!__scrt_common_main_seh() + 0xF bytes | |
f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (309): vld_main.exe!__scrt_common_main() | |
f:\dd\vctools\crt\vcstartup\src\startup\exe_wmain.cpp (17): vld_main.exe!wmainCRTStartup() | |
KERNEL32.DLL!BaseThreadInitThunk() + 0x24 bytes | |
ntdll.dll!__RtlUserThreadStart() + 0x2F bytes | |
ntdll.dll!_RtlUserThreadStart() + 0x1B bytes | |
Data: | |
50 P....... ........ | |
---------- Block 7 at 0x00457090: 1 bytes ---------- | |
CRT Alloc ID: 136 | |
Leak Hash: 0xEA494B5A, Count: 1, Total 1 bytes | |
Call Stack (TID 19184): | |
f:\dd\vctools\crt\vcstartup\src\heap\new_array.cpp (15): vld_main.exe!operator new[]() + 0x9 bytes | |
d:\work\vld\src\tests\vld_main\vld_main.cpp (27): vld_main.exe!`dynamic initializer for 'g_n''() + 0x25 bytes | |
d:\th\minkernel\crts\ucrt\src\appcrt\startup\initterm.cpp (22): ucrtbased.dll!_initterm() | |
f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (230): vld_main.exe!__scrt_common_main_seh() + 0xF bytes | |
f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (309): vld_main.exe!__scrt_common_main() | |
f:\dd\vctools\crt\vcstartup\src\startup\exe_wmain.cpp (17): vld_main.exe!wmainCRTStartup() | |
KERNEL32.DLL!BaseThreadInitThunk() + 0x24 bytes | |
ntdll.dll!__RtlUserThreadStart() + 0x2F bytes | |
ntdll.dll!_RtlUserThreadStart() + 0x1B bytes | |
Data: | |
CD ........ ........ | |
---------- Block 5 at 0x0045C430: 1 bytes ---------- | |
CRT Alloc ID: 134 | |
Leak Hash: 0x41D6EFA7, Count: 1, Total 1 bytes | |
Call Stack (TID 19184): | |
d:\th\minkernel\crts\ucrt\src\appcrt\heap\malloc.cpp (16): ucrtbased.dll!malloc() | |
d:\work\vld\src\tests\vld_main\vld_main.cpp (14): vld_main.exe!MemoryLeak::MemoryLeak() + 0x2F bytes | |
d:\work\vld\src\tests\vld_main\vld_main.cpp (24): vld_main.exe!`dynamic initializer for 'ml''() + 0x36 bytes | |
d:\th\minkernel\crts\ucrt\src\appcrt\startup\initterm.cpp (22): ucrtbased.dll!_initterm() | |
f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (230): vld_main.exe!__scrt_common_main_seh() + 0xF bytes | |
f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (309): vld_main.exe!__scrt_common_main() | |
f:\dd\vctools\crt\vcstartup\src\startup\exe_wmain.cpp (17): vld_main.exe!wmainCRTStartup() | |
KERNEL32.DLL!BaseThreadInitThunk() + 0x24 bytes | |
ntdll.dll!__RtlUserThreadStart() + 0x2F bytes | |
ntdll.dll!_RtlUserThreadStart() + 0x1B bytes | |
Data: | |
CD ........ ........ | |
---------- Block 8 at 0x0045C4B0: 1 bytes ---------- | |
CRT Alloc ID: 137 | |
Leak Hash: 0xF217FDFB, Count: 1, Total 1 bytes | |
Call Stack (TID 19184): | |
d:\th\minkernel\crts\ucrt\src\appcrt\heap\malloc.cpp (16): ucrtbased.dll!malloc() | |
d:\work\vld\src\tests\vld_main\vld_main.cpp (32): vld_main.exe!wmain() + 0xA bytes | |
f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (89): vld_main.exe!invoke_main() + 0x1B bytes | |
f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (264): vld_main.exe!__scrt_common_main_seh() + 0x5 bytes | |
f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (309): vld_main.exe!__scrt_common_main() | |
f:\dd\vctools\crt\vcstartup\src\startup\exe_wmain.cpp (17): vld_main.exe!wmainCRTStartup() | |
KERNEL32.DLL!BaseThreadInitThunk() + 0x24 bytes | |
ntdll.dll!__RtlUserThreadStart() + 0x2F bytes | |
ntdll.dll!_RtlUserThreadStart() + 0x1B bytes | |
Data: | |
CD ........ ........ | |
---------- Block 9 at 0x0045C510: 1 bytes ---------- | |
CRT Alloc ID: 138 | |
Leak Hash: 0xC70E1DB1, Count: 1, Total 1 bytes | |
Call Stack (TID 19184): | |
f:\dd\vctools\crt\vcstartup\src\heap\new_array.cpp (15): vld_main.exe!operator new[]() + 0x9 bytes | |
d:\work\vld\src\tests\vld_main\vld_main.cpp (33): vld_main.exe!wmain() + 0x7 bytes | |
f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (89): vld_main.exe!invoke_main() + 0x1B bytes | |
f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (264): vld_main.exe!__scrt_common_main_seh() + 0x5 bytes | |
f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (309): vld_main.exe!__scrt_common_main() | |
f:\dd\vctools\crt\vcstartup\src\startup\exe_wmain.cpp (17): vld_main.exe!wmainCRTStartup() | |
KERNEL32.DLL!BaseThreadInitThunk() + 0x24 bytes | |
ntdll.dll!__RtlUserThreadStart() + 0x2F bytes | |
ntdll.dll!_RtlUserThreadStart() + 0x1B bytes | |
Data: | |
CD ........ ........ | |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
dynamic initializer for 'ml''() + 0x36 bytes**
This should have been freed by class destructor as there is a free statement there`++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
'vld_main.exe' (Win32): Loaded 'D:\Work\vld\src\bin\Win32\Debug-v140\vld_main.exe'. Symbols loaded.
'vld_main.exe' (Win32): Loaded 'C:\Windows\SysWOW64\ntdll.dll'. Symbols loaded.
'vld_main.exe' (Win32): Loaded 'C:\Windows\SysWOW64\kernel32.dll'. Symbols loaded.
'vld_main.exe' (Win32): Loaded 'C:\Windows\SysWOW64\KernelBase.dll'. Symbols loaded.
'vld_main.exe' (Win32): Loaded 'D:\Work\vld\src\bin\Win32\Debug-v140\vld_x86.dll'. Symbols loaded.
'vld_main.exe' (Win32): Loaded 'C:\Windows\SysWOW64\ucrtbased.dll'. Symbols loaded.
'vld_main.exe' (Win32): Loaded 'C:\Windows\SysWOW64\vcruntime140d.dll'. Symbols loaded.
'vld_main.exe' (Win32): Loaded 'C:\Windows\SysWOW64\advapi32.dll'. Symbols loaded.
'vld_main.exe' (Win32): Loaded 'C:\Windows\SysWOW64\msvcrt.dll'. Symbols loaded.
'vld_main.exe' (Win32): Loaded 'C:\Windows\SysWOW64\sechost.dll'. Symbols loaded.
'vld_main.exe' (Win32): Loaded 'C:\Windows\SysWOW64\rpcrt4.dll'. Symbols loaded.
'vld_main.exe' (Win32): Loaded 'C:\Windows\SysWOW64\sspicli.dll'. Symbols loaded.
'vld_main.exe' (Win32): Loaded 'D:\Work\vld\src\bin\Win32\Debug-v140\dbghelp.dll'. Symbols loaded.
'vld_main.exe' (Win32): Loaded 'C:\Windows\SysWOW64\cryptbase.dll'. Symbols loaded.
'vld_main.exe' (Win32): Loaded 'C:\Windows\SysWOW64\bcryptprimitives.dll'. Symbols loaded.
Visual Leak Detector read settings from: d:\Work\vld\src\bin\vld.ini
Visual Leak Detector Version 2.4RC2 installed.
WARNING: Visual Leak Detector detected memory leaks!
---------- Block 4 at 0x0044B050: 1 bytes ----------
CRT Alloc ID: 133
Leak Hash: 0xA285EE95, Count: 1, Total 1 bytes
Call Stack (TID 19184):
d:\th\minkernel\crts\ucrt\src\appcrt\heap\malloc.cpp (16): ucrtbased.dll!malloc()
d:\work\vld\src\tests\vld_main\vld_main.cpp (14): vld_main.exe!MemoryLeak::MemoryLeak() + 0x2F bytes
d:\work\vld\src\tests\vld_main\vld_main.cpp (23): vld_main.exe!`dynamic initializer for 'pml''() + 0x77 bytes
d:\th\minkernel\crts\ucrt\src\appcrt\startup\initterm.cpp (22): ucrtbased.dll!_initterm()
f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (230): vld_main.exe!__scrt_common_main_seh() + 0xF bytes
f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (309): vld_main.exe!__scrt_common_main()
f:\dd\vctools\crt\vcstartup\src\startup\exe_wmain.cpp (17): vld_main.exe!wmainCRTStartup()
KERNEL32.DLL!BaseThreadInitThunk() + 0x24 bytes
ntdll.dll!__RtlUserThreadStart() + 0x2F bytes
ntdll.dll!_RtlUserThreadStart() + 0x1B bytes
Data:
CD ........ ........
---------- Block 1 at 0x0044BB20: 1 bytes ----------
CRT Alloc ID: 130
Leak Hash: 0x66AAF654, Count: 1, Total 1 bytes
Call Stack (TID 19184):
d:\th\minkernel\crts\ucrt\src\appcrt\heap\malloc.cpp (16): ucrtbased.dll!malloc()
**d:\work\vld\src\tests\vld_main\vld_main.cpp (20): vld_main.exe!
dynamic initializer for 's_m''() + 0x28 bytes**
OK`d:\th\minkernel\crts\ucrt\src\appcrt\startup\initterm.cpp (22): ucrtbased.dll!_initterm()
f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (230): vld_main.exe!__scrt_common_main_seh() + 0xF bytes
f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (309): vld_main.exe!__scrt_common_main()
f:\dd\vctools\crt\vcstartup\src\startup\exe_wmain.cpp (17): vld_main.exe!wmainCRTStartup()
KERNEL32.DLL!BaseThreadInitThunk() + 0x24 bytes
ntdll.dll!__RtlUserThreadStart() + 0x2F bytes
ntdll.dll!_RtlUserThreadStart() + 0x1B bytes
Data:
CD ........ ........
---------- Block 6 at 0x004547E8: 1 bytes ----------
CRT Alloc ID: 135
Leak Hash: 0x35837BC4, Count: 1, Total 1 bytes
Call Stack (TID 19184):
d:\th\minkernel\crts\ucrt\src\appcrt\heap\malloc.cpp (16): ucrtbased.dll!malloc()
**d:\work\vld\src\tests\vld_main\vld_main.cpp (26): vld_main.exe!
dynamic initializer for 'g_m''() + 0x28 bytes**
OK`d:\th\minkernel\crts\ucrt\src\appcrt\startup\initterm.cpp (22): ucrtbased.dll!_initterm()
f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (230): vld_main.exe!__scrt_common_main_seh() + 0xF bytes
f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (309): vld_main.exe!__scrt_common_main()
f:\dd\vctools\crt\vcstartup\src\startup\exe_wmain.cpp (17): vld_main.exe!wmainCRTStartup()
KERNEL32.DLL!BaseThreadInitThunk() + 0x24 bytes
ntdll.dll!__RtlUserThreadStart() + 0x2F bytes
ntdll.dll!_RtlUserThreadStart() + 0x1B bytes
Data:
CD ........ ........
---------- Block 2 at 0x004550D0: 1 bytes ----------
CRT Alloc ID: 131
Leak Hash: 0xC69DA75D, Count: 1, Total 1 bytes
Call Stack (TID 19184):
f:\dd\vctools\crt\vcstartup\src\heap\new_array.cpp (15): vld_main.exe!operator new + 0x9 bytes
**d:\work\vld\src\tests\vld_main\vld_main.cpp (21): vld_main.exe!
dynamic initializer for 's_n''() + 0x25 bytes**
OK`d:\th\minkernel\crts\ucrt\src\appcrt\startup\initterm.cpp (22): ucrtbased.dll!_initterm()
f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (230): vld_main.exe!__scrt_common_main_seh() + 0xF bytes
f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (309): vld_main.exe!__scrt_common_main()
f:\dd\vctools\crt\vcstartup\src\startup\exe_wmain.cpp (17): vld_main.exe!wmainCRTStartup()
KERNEL32.DLL!BaseThreadInitThunk() + 0x24 bytes
ntdll.dll!__RtlUserThreadStart() + 0x2F bytes
ntdll.dll!_RtlUserThreadStart() + 0x1B bytes
Data:
CD ........ ........
---------- Block 3 at 0x00456920: 1 bytes ----------
CRT Alloc ID: 132
Leak Hash: 0x5A6F63D6, Count: 1, Total 1 bytes
Call Stack (TID 19184):
f:\dd\vctools\crt\vcstartup\src\heap\new_scalar.cpp (19): vld_main.exe!operator new() + 0x9 bytes
**d:\work\vld\src\tests\vld_main\vld_main.cpp (23): vld_main.exe!
dynamic initializer for 'pml''() + 0x44 bytes**
OK`d:\th\minkernel\crts\ucrt\src\appcrt\startup\initterm.cpp (22): ucrtbased.dll!_initterm()
f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (230): vld_main.exe!__scrt_common_main_seh() + 0xF bytes
f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (309): vld_main.exe!__scrt_common_main()
f:\dd\vctools\crt\vcstartup\src\startup\exe_wmain.cpp (17): vld_main.exe!wmainCRTStartup()
KERNEL32.DLL!BaseThreadInitThunk() + 0x24 bytes
ntdll.dll!__RtlUserThreadStart() + 0x2F bytes
ntdll.dll!_RtlUserThreadStart() + 0x1B bytes
Data:
50 P....... ........
---------- Block 7 at 0x00457090: 1 bytes ----------
CRT Alloc ID: 136
Leak Hash: 0xEA494B5A, Count: 1, Total 1 bytes
Call Stack (TID 19184):
f:\dd\vctools\crt\vcstartup\src\heap\new_array.cpp (15): vld_main.exe!operator new + 0x9 bytes
**d:\work\vld\src\tests\vld_main\vld_main.cpp (27): vld_main.exe!
dynamic initializer for 'g_n''() + 0x25 bytes**
OK`d:\th\minkernel\crts\ucrt\src\appcrt\startup\initterm.cpp (22): ucrtbased.dll!_initterm()
f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (230): vld_main.exe!__scrt_common_main_seh() + 0xF bytes
f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (309): vld_main.exe!__scrt_common_main()
f:\dd\vctools\crt\vcstartup\src\startup\exe_wmain.cpp (17): vld_main.exe!wmainCRTStartup()
KERNEL32.DLL!BaseThreadInitThunk() + 0x24 bytes
ntdll.dll!__RtlUserThreadStart() + 0x2F bytes
ntdll.dll!_RtlUserThreadStart() + 0x1B bytes
Data:
CD ........ ........
---------- Block 5 at 0x0045C430: 1 bytes ----------
CRT Alloc ID: 134
Leak Hash: 0x41D6EFA7, Count: 1, Total 1 bytes
Call Stack (TID 19184):
d:\th\minkernel\crts\ucrt\src\appcrt\heap\malloc.cpp (16): ucrtbased.dll!malloc()
d:\work\vld\src\tests\vld_main\vld_main.cpp (14): vld_main.exe!MemoryLeak::MemoryLeak() + 0x2F bytes
**d:\work\vld\src\tests\vld_main\vld_main.cpp (24): vld_main.exe!
dynamic initializer for 'ml''() + 0x36 bytes**
This should have been freed by class destructor`d:\th\minkernel\crts\ucrt\src\appcrt\startup\initterm.cpp (22): ucrtbased.dll!_initterm()
f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (230): vld_main.exe!__scrt_common_main_seh() + 0xF bytes
f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (309): vld_main.exe!__scrt_common_main()
f:\dd\vctools\crt\vcstartup\src\startup\exe_wmain.cpp (17): vld_main.exe!wmainCRTStartup()
KERNEL32.DLL!BaseThreadInitThunk() + 0x24 bytes
ntdll.dll!__RtlUserThreadStart() + 0x2F bytes
ntdll.dll!_RtlUserThreadStart() + 0x1B bytes
Data:
CD ........ ........
---------- Block 8 at 0x0045C4B0: 1 bytes ----------
CRT Alloc ID: 137
Leak Hash: 0xF217FDFB, Count: 1, Total 1 bytes
Call Stack (TID 19184):
d:\th\minkernel\crts\ucrt\src\appcrt\heap\malloc.cpp (16): ucrtbased.dll!malloc()
d:\work\vld\src\tests\vld_main\vld_main.cpp (32): vld_main.exe!wmain() + 0xA bytes
OK
f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (89): vld_main.exe!invoke_main() + 0x1B bytes
f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (264): vld_main.exe!__scrt_common_main_seh() + 0x5 bytes
f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (309): vld_main.exe!__scrt_common_main()
f:\dd\vctools\crt\vcstartup\src\startup\exe_wmain.cpp (17): vld_main.exe!wmainCRTStartup()
KERNEL32.DLL!BaseThreadInitThunk() + 0x24 bytes
ntdll.dll!__RtlUserThreadStart() + 0x2F bytes
ntdll.dll!_RtlUserThreadStart() + 0x1B bytes
Data:
CD ........ ........
---------- Block 9 at 0x0045C510: 1 bytes ----------
CRT Alloc ID: 138
Leak Hash: 0xC70E1DB1, Count: 1, Total 1 bytes
Call Stack (TID 19184):
f:\dd\vctools\crt\vcstartup\src\heap\new_array.cpp (15): vld_main.exe!operator new + 0x9 bytes
d:\work\vld\src\tests\vld_main\vld_main.cpp (33): vld_main.exe!wmain() + 0x7 bytes
OK
f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (89): vld_main.exe!invoke_main() + 0x1B bytes
f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (264): vld_main.exe!__scrt_common_main_seh() + 0x5 bytes
f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (309): vld_main.exe!__scrt_common_main()
f:\dd\vctools\crt\vcstartup\src\startup\exe_wmain.cpp (17): vld_main.exe!wmainCRTStartup()
KERNEL32.DLL!BaseThreadInitThunk() + 0x24 bytes
ntdll.dll!__RtlUserThreadStart() + 0x2F bytes
ntdll.dll!_RtlUserThreadStart() + 0x1B bytes
Data:
CD ........ ........