WARNING: Visual Leak Detector detected memory leaks! ---------- Block 3 at 0x000000000034C2D0: 30 bytes ---------- Leak Hash: 0x66CE1CBF, Count: 1, Total 30 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (263): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_APPAUTH_TOKEN''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 41 70 70 6C 69 63 61 74 69 6F 6E 41 75 74 68 6F Applicat ionAutho 72 69 7A 61 74 69 6F 6E 54 6F 6B 65 6E 00 rization Token... ---------- Block 6 at 0x000000000034C330: 25 bytes ---------- Leak Hash: 0x8F1135E1, Count: 1, Total 25 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (266): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_PROV_PERM_PROF''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 50 72 6F 76 69 64 65 50 65 72 6D 69 73 73 69 6F ProvideP ermissio 6E 50 72 6F 66 69 6C 65 00 nProfile ........ ---------- Block 7 at 0x000000000034C390: 29 bytes ---------- Leak Hash: 0xF123E243, Count: 1, Total 29 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (267): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_PROV_PERM_EXP''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 50 72 6F 76 69 64 65 50 65 72 6D 69 73 73 69 6F ProvideP ermissio 6E 45 78 70 72 65 73 73 69 6F 6E 73 00 nExpress ions.... ---------- Block 13 at 0x000000000034C3F0: 28 bytes ---------- Leak Hash: 0xEA7C9E07, Count: 1, Total 28 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (273): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_SUPPORT_OPR''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 53 75 70 70 6F 72 74 4F 70 74 69 6D 69 7A 65 64 SupportO ptimized 50 61 75 73 65 52 65 73 75 6D 65 00 PauseRes ume..... ---------- Block 15 at 0x000000000034C450: 21 bytes ---------- Leak Hash: 0x23C5538B, Count: 1, Total 21 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (275): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_SUPPORT_BATCH''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 53 75 70 70 6F 72 74 42 61 74 63 68 52 65 71 75 SupportB atchRequ 65 73 74 73 00 ests.... ........ ---------- Block 17 at 0x000000000034C4B0: 26 bytes ---------- Leak Hash: 0x8550CB02, Count: 1, Total 26 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (277): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_SUPPORT_ENH_SYMBOL_LIST''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 53 75 70 70 6F 72 74 45 6E 68 61 6E 63 65 64 53 SupportE nhancedS 79 6D 62 6F 6C 4C 69 73 74 00 ymbolLis t....... ---------- Block 18 at 0x000000000034C510: 34 bytes ---------- Leak Hash: 0xA5E428C5, Count: 1, Total 34 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (278): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_SUPPORT_PROVIDER_DICTIONARY_DOWNLOAD''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 53 75 70 70 6F 72 74 50 72 6F 76 69 64 65 72 44 SupportP roviderD 69 63 74 69 6F 6E 61 72 79 44 6F 77 6E 6C 6F 61 ictionar yDownloa 64 00 d....... ........ ---------- Block 19 at 0x000000000034C570: 22 bytes ---------- Leak Hash: 0x69EEC09B, Count: 1, Total 22 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (279): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_SEQUENCE_RETRY_INTERVAL''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 53 65 71 75 65 6E 63 65 52 65 74 72 79 49 6E 74 Sequence RetryInt 65 72 76 61 6C 00 erval... ........ ---------- Block 21 at 0x000000000034C5D0: 23 bytes ---------- Leak Hash: 0xA359B619, Count: 1, Total 23 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (281): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_SEQUENCE_NUMBER_RECOVERY''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 53 65 71 75 65 6E 63 65 4E 75 6D 62 65 72 52 65 Sequence NumberRe 63 6F 76 65 72 79 00 covery.. ........ ---------- Block 23 at 0x000000000034C630: 23 bytes ---------- Leak Hash: 0x26806E76, Count: 1, Total 23 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (283): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_AUTH_EXTENDED''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 41 75 74 68 65 6E 74 69 63 61 74 69 6F 6E 45 78 Authenti cationEx 74 65 6E 64 65 64 00 tended.. ........ ---------- Block 24 at 0x000000000034C690: 27 bytes ---------- Leak Hash: 0xF7EC934A, Count: 1, Total 27 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (284): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_AUTH_EXTENDED_RESP''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 41 75 74 68 65 6E 74 69 63 61 74 69 6F 6E 45 78 Authenti cationEx 74 65 6E 64 65 64 52 65 73 70 00 tendedRe sp...... ---------- Block 25 at 0x000000000034C6F0: 24 bytes ---------- Leak Hash: 0xCB5BAB55, Count: 1, Total 24 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (285): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_AUTH_TT_REISSUE''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 41 75 74 68 65 6E 74 69 63 61 74 69 6F 6E 54 54 Authenti cationTT 52 65 69 73 73 75 65 00 Reissue. ........ ---------- Block 26 at 0x000000000034C750: 24 bytes ---------- Leak Hash: 0x860880E3, Count: 1, Total 24 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (286): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_AUTH_ERRORCODE''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 41 75 74 68 65 6E 74 69 63 61 74 69 6F 6E 45 72 Authenti cationEr 72 6F 72 43 6F 64 65 00 rorCode. ........ ---------- Block 27 at 0x000000000034C7B0: 24 bytes ---------- Leak Hash: 0xD32E7325, Count: 1, Total 24 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (287): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_AUTH_ERRORTEXT''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 41 75 74 68 65 6E 74 69 63 61 74 69 6F 6E 45 72 Authenti cationEr 72 6F 72 54 65 78 74 00 rorText. ........ ---------- Block 39 at 0x000000000034C810: 21 bytes ---------- Leak Hash: 0x191DF25D, Count: 1, Total 21 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (305): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_DICTIONARYS_PROVIDED''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 44 69 63 74 69 6F 6E 61 72 69 65 73 50 72 6F 76 Dictiona riesProv 69 64 65 64 00 ided.... ........ ---------- Block 44 at 0x000000000034C870: 27 bytes ---------- Leak Hash: 0x10E6D462, Count: 1, Total 27 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (310): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_SUPPS_OOB_SNAPSHOTS''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 53 75 70 70 6F 72 74 73 4F 75 74 4F 66 42 61 6E Supports OutOfBan 64 53 6E 61 70 73 68 6F 74 73 00 dSnapsho ts...... ---------- Block 45 at 0x000000000034C8D0: 24 bytes ---------- Leak Hash: 0xD909E901, Count: 1, Total 24 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (311): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_ACCEPTING_CONS_STATUS''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 41 63 63 65 70 74 69 6E 67 43 6F 6E 73 75 6D 65 Acceptin gConsume 72 53 74 61 74 75 73 00 rStatus. ........ ---------- Block 63 at 0x000000000034C930: 25 bytes ---------- Leak Hash: 0x244BF302, Count: 1, Total 25 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (335): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_CONS_CONN_STATUS''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 43 6F 6E 73 75 6D 65 72 43 6F 6E 6E 65 63 74 69 Consumer Connecti 6F 6E 53 74 61 74 75 73 00 onStatus ........ ---------- Block 64 at 0x000000000034C990: 25 bytes ---------- Leak Hash: 0x623CE8ED, Count: 1, Total 25 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (336): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_DOWNLOAD_CON_CONFIG''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 44 6F 77 6E 6C 6F 61 64 43 6F 6E 6E 65 63 74 69 Download Connecti 6F 6E 43 6F 6E 66 69 67 00 onConfig ........ ---------- Block 98 at 0x000000000034C9F0: 21 bytes ---------- Leak Hash: 0x0F4119FD, Count: 1, Total 21 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (385): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_SYMBOL_LIST_BEHAVIORS''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 3A 53 79 6D 62 6F 6C 4C 69 73 74 42 65 68 61 76 :SymbolL istBehav 69 6F 72 73 00 iors.... ........ ---------- Block 102 at 0x000000000034CA50: 30 bytes ---------- Leak Hash: 0x1F782E1D, Count: 1, Total 30 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (263): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_APPAUTH_TOKEN''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 41 70 70 6C 69 63 61 74 69 6F 6E 41 75 74 68 6F Applicat ionAutho 72 69 7A 61 74 69 6F 6E 54 6F 6B 65 6E 00 rization Token... ---------- Block 105 at 0x000000000034CAB0: 25 bytes ---------- Leak Hash: 0x5ACA0BE5, Count: 1, Total 25 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (266): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_PROV_PERM_PROF''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 50 72 6F 76 69 64 65 50 65 72 6D 69 73 73 69 6F ProvideP ermissio 6E 50 72 6F 66 69 6C 65 00 nProfile ........ ---------- Block 106 at 0x000000000034CB10: 29 bytes ---------- Leak Hash: 0xF4137CFC, Count: 1, Total 29 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (267): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_PROV_PERM_EXP''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 50 72 6F 76 69 64 65 50 65 72 6D 69 73 73 69 6F ProvideP ermissio 6E 45 78 70 72 65 73 73 69 6F 6E 73 00 nExpress ions.... ---------- Block 112 at 0x000000000034CB70: 28 bytes ---------- Leak Hash: 0x9BD7FF4D, Count: 1, Total 28 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (273): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_SUPPORT_OPR''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 53 75 70 70 6F 72 74 4F 70 74 69 6D 69 7A 65 64 SupportO ptimized 50 61 75 73 65 52 65 73 75 6D 65 00 PauseRes ume..... ---------- Block 114 at 0x000000000034CBD0: 21 bytes ---------- Leak Hash: 0xF4193975, Count: 1, Total 21 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (275): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_SUPPORT_BATCH''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 53 75 70 70 6F 72 74 42 61 74 63 68 52 65 71 75 SupportB atchRequ 65 73 74 73 00 ests.... ........ ---------- Block 116 at 0x000000000034CC30: 26 bytes ---------- Leak Hash: 0xABFAC3AA, Count: 1, Total 26 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (277): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_SUPPORT_ENH_SYMBOL_LIST''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 53 75 70 70 6F 72 74 45 6E 68 61 6E 63 65 64 53 SupportE nhancedS 79 6D 62 6F 6C 4C 69 73 74 00 ymbolLis t....... ---------- Block 117 at 0x000000000034CC90: 34 bytes ---------- Leak Hash: 0x8B4E206D, Count: 1, Total 34 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (278): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_SUPPORT_PROVIDER_DICTIONARY_DOWNLOAD''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 53 75 70 70 6F 72 74 50 72 6F 76 69 64 65 72 44 SupportP roviderD 69 63 74 69 6F 6E 61 72 79 44 6F 77 6E 6C 6F 61 ictionar yDownloa 64 00 d....... ........ ---------- Block 118 at 0x000000000034CCF0: 22 bytes ---------- Leak Hash: 0xDFE5CBA5, Count: 1, Total 22 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (279): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_SEQUENCE_RETRY_INTERVAL''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 53 65 71 75 65 6E 63 65 52 65 74 72 79 49 6E 74 Sequence RetryInt 65 72 76 61 6C 00 erval... ........ ---------- Block 120 at 0x000000000034CD50: 23 bytes ---------- Leak Hash: 0x96829846, Count: 1, Total 23 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (281): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_SEQUENCE_NUMBER_RECOVERY''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 53 65 71 75 65 6E 63 65 4E 75 6D 62 65 72 52 65 Sequence NumberRe 63 6F 76 65 72 79 00 covery.. ........ ---------- Block 122 at 0x000000000034CDB0: 23 bytes ---------- Leak Hash: 0xC5900BB8, Count: 1, Total 23 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (283): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_AUTH_EXTENDED''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 41 75 74 68 65 6E 74 69 63 61 74 69 6F 6E 45 78 Authenti cationEx 74 65 6E 64 65 64 00 tended.. ........ ---------- Block 123 at 0x000000000034CE10: 27 bytes ---------- Leak Hash: 0xED8A94D2, Count: 1, Total 27 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (284): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_AUTH_EXTENDED_RESP''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 41 75 74 68 65 6E 74 69 63 61 74 69 6F 6E 45 78 Authenti cationEx 74 65 6E 64 65 64 52 65 73 70 00 tendedRe sp...... ---------- Block 124 at 0x000000000034CE70: 24 bytes ---------- Leak Hash: 0xE0D5B650, Count: 1, Total 24 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (285): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_AUTH_TT_REISSUE''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 41 75 74 68 65 6E 74 69 63 61 74 69 6F 6E 54 54 Authenti cationTT 52 65 69 73 73 75 65 00 Reissue. ........ ---------- Block 505 at 0x000000000034D450: 39 bytes ---------- Leak Hash: 0x1D7E5C32, Count: 1, Total 39 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!PQclear() + 0x387 bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 50 6F 77 65 72 20 6F 66 20 2D 31 34 2E 20 53 74 Power.of .-14..St 72 69 6E 67 65 72 61 74 69 6F 6E 20 76 61 6C 75 ringerat ion.valu 65 20 69 73 20 30 00 e.is.0.. ........ ---------- Block 585 at 0x000000000034D4C0: 37 bytes ---------- Leak Hash: 0x66C1A344, Count: 1, Total 37 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!PQclear() + 0x21B7 bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 46 69 65 6C 64 49 64 4E 6F 74 46 6F 75 6E 64 44 FieldIdN otFoundD 69 63 74 69 6F 6E 61 72 79 55 6E 61 76 61 69 6C ictionar yUnavail 61 62 6C 65 00 able.... ........ ---------- Block 1639 at 0x000000000034D530: 40 bytes ---------- Leak Hash: 0x805B3376, Count: 1, Total 40 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() f:\dd\vctools\crt\vcstartup\src\heap\new_array.cpp (29): MdsDemo.exe!operator new[]() MdsDemo.exe!thomsonreuters::ema::access::EmaVector::push_back() + 0x68 bytes MdsDemo.exe!thomsonreuters::ema::access::GlobalPool::GlobalPool() + 0xB0 bytes MdsDemo.exe!PQclear() + 0x1AD41 bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ 00 00 00 00 00 00 00 00 ........ ........ ---------- Block 1640 at 0x000000000034D5A0: 40 bytes ---------- Leak Hash: 0x7C34D9BB, Count: 1, Total 40 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() f:\dd\vctools\crt\vcstartup\src\heap\new_array.cpp (29): MdsDemo.exe!operator new[]() MdsDemo.exe!thomsonreuters::ema::access::EmaVector::push_back() + 0x68 bytes MdsDemo.exe!thomsonreuters::ema::access::GlobalPool::GlobalPool() + 0x130 bytes MdsDemo.exe!PQclear() + 0x1AD41 bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ 00 00 00 00 00 00 00 00 ........ ........ ---------- Block 1641 at 0x000000000034D610: 40 bytes ---------- Leak Hash: 0x6E7210FD, Count: 1, Total 40 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() f:\dd\vctools\crt\vcstartup\src\heap\new_array.cpp (29): MdsDemo.exe!operator new[]() MdsDemo.exe!thomsonreuters::ema::access::EmaVector::push_back() + 0x68 bytes MdsDemo.exe!thomsonreuters::ema::access::GlobalPool::GlobalPool() + 0x1B0 bytes MdsDemo.exe!PQclear() + 0x1AD41 bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 50 C1 B4 18 00 00 00 00 00 00 00 00 00 00 00 00 P....... ........ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ 00 00 00 00 00 00 00 00 ........ ........ ---------- Block 1642 at 0x000000000034D680: 40 bytes ---------- Leak Hash: 0x6B6B9866, Count: 1, Total 40 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() f:\dd\vctools\crt\vcstartup\src\heap\new_array.cpp (29): MdsDemo.exe!operator new[]() MdsDemo.exe!thomsonreuters::ema::access::EmaVector::push_back() + 0x68 bytes MdsDemo.exe!thomsonreuters::ema::access::GlobalPool::GlobalPool() + 0x230 bytes MdsDemo.exe!PQclear() + 0x1AD41 bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ 00 00 00 00 00 00 00 00 ........ ........ ---------- Block 1643 at 0x000000000034D6F0: 40 bytes ---------- Leak Hash: 0x039F9D05, Count: 1, Total 40 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() f:\dd\vctools\crt\vcstartup\src\heap\new_array.cpp (29): MdsDemo.exe!operator new[]() MdsDemo.exe!thomsonreuters::ema::access::EmaVector::push_back() + 0x68 bytes MdsDemo.exe!thomsonreuters::ema::access::GlobalPool::GlobalPool() + 0x2B0 bytes MdsDemo.exe!PQclear() + 0x1AD41 bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ 00 00 00 00 00 00 00 00 ........ ........ ---------- Block 1644 at 0x000000000034D760: 40 bytes ---------- Leak Hash: 0x56267A48, Count: 1, Total 40 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() f:\dd\vctools\crt\vcstartup\src\heap\new_array.cpp (29): MdsDemo.exe!operator new[]() MdsDemo.exe!thomsonreuters::ema::access::EmaVector::push_back() + 0x68 bytes MdsDemo.exe!thomsonreuters::ema::access::GlobalPool::GlobalPool() + 0x330 bytes MdsDemo.exe!PQclear() + 0x1AD41 bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ 00 00 00 00 00 00 00 00 ........ ........ ---------- Block 1645 at 0x000000000034D7D0: 40 bytes ---------- Leak Hash: 0x7655E4C5, Count: 1, Total 40 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() f:\dd\vctools\crt\vcstartup\src\heap\new_array.cpp (29): MdsDemo.exe!operator new[]() MdsDemo.exe!thomsonreuters::ema::access::EmaVector::push_back() + 0x68 bytes MdsDemo.exe!thomsonreuters::ema::access::GlobalPool::GlobalPool() + 0x3B0 bytes MdsDemo.exe!PQclear() + 0x1AD41 bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ 00 00 00 00 00 00 00 00 ........ ........ ---------- Block 1646 at 0x000000000034D840: 40 bytes ---------- Leak Hash: 0x783A704F, Count: 1, Total 40 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() f:\dd\vctools\crt\vcstartup\src\heap\new_array.cpp (29): MdsDemo.exe!operator new[]() MdsDemo.exe!thomsonreuters::ema::access::EmaVector::push_back() + 0x68 bytes MdsDemo.exe!thomsonreuters::ema::access::GlobalPool::GlobalPool() + 0x430 bytes MdsDemo.exe!PQclear() + 0x1AD41 bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ 00 00 00 00 00 00 00 00 ........ ........ ---------- Block 1647 at 0x000000000034D8B0: 40 bytes ---------- Leak Hash: 0x3D1BB96F, Count: 1, Total 40 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() f:\dd\vctools\crt\vcstartup\src\heap\new_array.cpp (29): MdsDemo.exe!operator new[]() MdsDemo.exe!thomsonreuters::ema::access::EmaVector::push_back() + 0x68 bytes MdsDemo.exe!thomsonreuters::ema::access::GlobalPool::GlobalPool() + 0x4B0 bytes MdsDemo.exe!PQclear() + 0x1AD41 bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ 00 00 00 00 00 00 00 00 ........ ........ ---------- Block 1648 at 0x000000000034D920: 40 bytes ---------- Leak Hash: 0x8F238693, Count: 1, Total 40 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() f:\dd\vctools\crt\vcstartup\src\heap\new_array.cpp (29): MdsDemo.exe!operator new[]() MdsDemo.exe!thomsonreuters::ema::access::EmaVector::push_back() + 0x68 bytes MdsDemo.exe!thomsonreuters::ema::access::GlobalPool::GlobalPool() + 0x530 bytes MdsDemo.exe!PQclear() + 0x1AD41 bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ 00 00 00 00 00 00 00 00 ........ ........ ---------- Block 1649 at 0x000000000034D990: 40 bytes ---------- Leak Hash: 0xA7BDEE03, Count: 1, Total 40 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() f:\dd\vctools\crt\vcstartup\src\heap\new_array.cpp (29): MdsDemo.exe!operator new[]() MdsDemo.exe!thomsonreuters::ema::access::EmaVector::push_back() + 0x68 bytes MdsDemo.exe!thomsonreuters::ema::access::GlobalPool::GlobalPool() + 0x5B0 bytes MdsDemo.exe!PQclear() + 0x1AD41 bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ 00 00 00 00 00 00 00 00 ........ ........ ---------- Block 1650 at 0x000000000034DA00: 40 bytes ---------- Leak Hash: 0x0EF4F708, Count: 1, Total 40 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() f:\dd\vctools\crt\vcstartup\src\heap\new_array.cpp (29): MdsDemo.exe!operator new[]() MdsDemo.exe!thomsonreuters::ema::access::EmaVector::push_back() + 0x68 bytes MdsDemo.exe!thomsonreuters::ema::access::GlobalPool::GlobalPool() + 0x630 bytes MdsDemo.exe!PQclear() + 0x1AD41 bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ 00 00 00 00 00 00 00 00 ........ ........ ---------- Block 1651 at 0x000000000034DA70: 40 bytes ---------- Leak Hash: 0xBCCCC8F4, Count: 1, Total 40 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() f:\dd\vctools\crt\vcstartup\src\heap\new_array.cpp (29): MdsDemo.exe!operator new[]() MdsDemo.exe!thomsonreuters::ema::access::EmaVector::push_back() + 0x68 bytes MdsDemo.exe!thomsonreuters::ema::access::GlobalPool::GlobalPool() + 0x6B0 bytes MdsDemo.exe!PQclear() + 0x1AD41 bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ 00 00 00 00 00 00 00 00 ........ ........ ---------- Block 1652 at 0x000000000034DAE0: 40 bytes ---------- Leak Hash: 0x8A3A0E08, Count: 1, Total 40 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() f:\dd\vctools\crt\vcstartup\src\heap\new_array.cpp (29): MdsDemo.exe!operator new[]() MdsDemo.exe!thomsonreuters::ema::access::EmaVector::push_back() + 0x68 bytes MdsDemo.exe!thomsonreuters::ema::access::GlobalPool::GlobalPool() + 0x730 bytes MdsDemo.exe!PQclear() + 0x1AD41 bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ 00 00 00 00 00 00 00 00 ........ ........ ---------- Block 1653 at 0x000000000034DB50: 40 bytes ---------- Leak Hash: 0x98684C5C, Count: 1, Total 40 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() f:\dd\vctools\crt\vcstartup\src\heap\new_array.cpp (29): MdsDemo.exe!operator new[]() MdsDemo.exe!thomsonreuters::ema::access::EmaVector::push_back() + 0x68 bytes MdsDemo.exe!thomsonreuters::ema::access::GlobalPool::GlobalPool() + 0x7B0 bytes MdsDemo.exe!PQclear() + 0x1AD41 bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ 00 00 00 00 00 00 00 00 ........ ........ ---------- Block 1654 at 0x000000000034DBC0: 40 bytes ---------- Leak Hash: 0xA994DDD3, Count: 1, Total 40 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() f:\dd\vctools\crt\vcstartup\src\heap\new_array.cpp (29): MdsDemo.exe!operator new[]() MdsDemo.exe!thomsonreuters::ema::access::EmaVector::push_back() + 0x68 bytes MdsDemo.exe!thomsonreuters::ema::access::GlobalPool::GlobalPool() + 0x830 bytes MdsDemo.exe!PQclear() + 0x1AD41 bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ 00 00 00 00 00 00 00 00 ........ ........ ---------- Block 1655 at 0x000000000034DC30: 40 bytes ---------- Leak Hash: 0xD11A0917, Count: 1, Total 40 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() f:\dd\vctools\crt\vcstartup\src\heap\new_array.cpp (29): MdsDemo.exe!operator new[]() MdsDemo.exe!thomsonreuters::ema::access::EmaVector::push_back() + 0x68 bytes MdsDemo.exe!thomsonreuters::ema::access::GlobalPool::GlobalPool() + 0x8B0 bytes MdsDemo.exe!PQclear() + 0x1AD41 bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 40 68 E0 02 00 00 00 00 00 00 00 00 00 00 00 00 @h...... ........ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ 00 00 00 00 00 00 00 00 ........ ........ ---------- Block 1656 at 0x000000000034DCA0: 40 bytes ---------- Leak Hash: 0x6A8C1CFC, Count: 1, Total 40 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() f:\dd\vctools\crt\vcstartup\src\heap\new_array.cpp (29): MdsDemo.exe!operator new[]() MdsDemo.exe!thomsonreuters::ema::access::EmaVector::push_back() + 0x68 bytes MdsDemo.exe!thomsonreuters::ema::access::GlobalPool::GlobalPool() + 0x930 bytes MdsDemo.exe!PQclear() + 0x1AD41 bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ 00 00 00 00 00 00 00 00 ........ ........ ---------- Block 1657 at 0x000000000034DD10: 40 bytes ---------- Leak Hash: 0x725D9C1C, Count: 1, Total 40 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() f:\dd\vctools\crt\vcstartup\src\heap\new_array.cpp (29): MdsDemo.exe!operator new[]() MdsDemo.exe!thomsonreuters::ema::access::EmaVector::push_back() + 0x68 bytes MdsDemo.exe!thomsonreuters::ema::access::GlobalPool::GlobalPool() + 0x9B0 bytes MdsDemo.exe!PQclear() + 0x1AD41 bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ 00 00 00 00 00 00 00 00 ........ ........ ---------- Block 1658 at 0x000000000034DD80: 40 bytes ---------- Leak Hash: 0x2160C8EB, Count: 1, Total 40 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() f:\dd\vctools\crt\vcstartup\src\heap\new_array.cpp (29): MdsDemo.exe!operator new[]() MdsDemo.exe!thomsonreuters::ema::access::EmaVector::push_back() + 0x68 bytes MdsDemo.exe!thomsonreuters::ema::access::GlobalPool::GlobalPool() + 0xA30 bytes MdsDemo.exe!PQclear() + 0x1AD41 bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ 00 00 00 00 00 00 00 00 ........ ........ ---------- Block 1659 at 0x000000000034DDF0: 40 bytes ---------- Leak Hash: 0xE79124AA, Count: 1, Total 40 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() f:\dd\vctools\crt\vcstartup\src\heap\new_array.cpp (29): MdsDemo.exe!operator new[]() MdsDemo.exe!thomsonreuters::ema::access::EmaVector::push_back() + 0x68 bytes MdsDemo.exe!thomsonreuters::ema::access::GlobalPool::GlobalPool() + 0xAB0 bytes MdsDemo.exe!PQclear() + 0x1AD41 bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ 00 00 00 00 00 00 00 00 ........ ........ ---------- Block 1660 at 0x000000000034DE60: 40 bytes ---------- Leak Hash: 0x825C678C, Count: 1, Total 40 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() f:\dd\vctools\crt\vcstartup\src\heap\new_array.cpp (29): MdsDemo.exe!operator new[]() MdsDemo.exe!thomsonreuters::ema::access::EmaVector::push_back() + 0x68 bytes MdsDemo.exe!thomsonreuters::ema::access::GlobalPool::GlobalPool() + 0xB30 bytes MdsDemo.exe!PQclear() + 0x1AD41 bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ 00 00 00 00 00 00 00 00 ........ ........ ---------- Block 1 at 0x0000000000353780: 14 bytes ---------- Leak Hash: 0xB625BC04, Count: 1, Total 14 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (261): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_APP_ID''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 41 70 70 6C 69 63 61 74 69 6F 6E 49 64 00 Applicat ionId... ---------- Block 2 at 0x0000000000353820: 16 bytes ---------- Leak Hash: 0xD020C82B, Count: 1, Total 16 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (262): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_APP_NAME''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 41 70 70 6C 69 63 61 74 69 6F 6E 4E 61 6D 65 00 Applicat ionName. ---------- Block 4 at 0x0000000000353870: 9 bytes ---------- Leak Hash: 0xF3AA04CA, Count: 1, Total 9 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (264): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_POSITION''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 50 6F 73 69 74 69 6F 6E 00 Position ........ ---------- Block 5 at 0x00000000003538C0: 9 bytes ---------- Leak Hash: 0x59E7E346, Count: 1, Total 9 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (265): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_PASSWORD''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 50 61 73 73 77 6F 72 64 00 Password ........ ---------- Block 8 at 0x0000000000353910: 17 bytes ---------- Leak Hash: 0x16AD5291, Count: 1, Total 17 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (268): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_ALLOW_SUSPECT_DATA''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 41 6C 6C 6F 77 53 75 73 70 65 63 74 44 61 74 61 AllowSus pectData 00 ........ ........ ---------- Block 9 at 0x0000000000353960: 11 bytes ---------- Leak Hash: 0x518F13EC, Count: 1, Total 11 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (269): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_SINGLE_OPEN''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 53 69 6E 67 6C 65 4F 70 65 6E 00 SingleOp en...... ---------- Block 10 at 0x00000000003539B0: 11 bytes ---------- Leak Hash: 0x0990A66F, Count: 1, Total 11 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (270): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_INST_ID''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 49 6E 73 74 61 6E 63 65 49 64 00 Instance Id...... ---------- Block 11 at 0x0000000000353A00: 5 bytes ---------- Leak Hash: 0xC8E17389, Count: 1, Total 5 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (271): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_ROLE''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 52 6F 6C 65 00 Role.... ........ ---------- Block 12 at 0x0000000000353A50: 19 bytes ---------- Leak Hash: 0x4CE9068E, Count: 1, Total 19 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (272): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_SUPPORT_PR''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 53 75 70 70 6F 72 74 50 61 75 73 65 52 65 73 75 SupportP auseResu 6D 65 00 me...... ........ ---------- Block 14 at 0x0000000000353AA0: 15 bytes ---------- Leak Hash: 0x9D85FBB2, Count: 1, Total 15 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (274): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_SUPPORT_POST''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 53 75 70 70 6F 72 74 4F 4D 4D 50 6F 73 74 00 SupportO MMPost.. ---------- Block 16 at 0x0000000000353AF0: 20 bytes ---------- Leak Hash: 0x1C3EAB67, Count: 1, Total 20 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (276): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_SUPPORT_VIEW''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 53 75 70 70 6F 72 74 56 69 65 77 52 65 71 75 65 SupportV iewReque 73 74 73 00 sts..... ........ ---------- Block 20 at 0x0000000000353B40: 18 bytes ---------- Leak Hash: 0xACC74C66, Count: 1, Total 18 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (280): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_UPDATE_BUFFER_LIMIT''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 55 70 64 61 74 65 42 75 66 66 65 72 4C 69 6D 69 UpdateBu fferLimi 74 00 t....... ........ ---------- Block 22 at 0x0000000000353B90: 20 bytes ---------- Leak Hash: 0x78E4C92E, Count: 1, Total 20 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (282): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_AUTH_TOKEN''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 41 75 74 68 65 6E 74 69 63 61 74 69 6F 6E 54 6F Authenti cationTo 6B 65 6E 00 ken..... ........ ---------- Block 28 at 0x0000000000353BE0: 9 bytes ---------- Leak Hash: 0xFD97BC08, Count: 1, Total 9 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (288): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_USERNAME''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 55 73 65 72 4E 61 6D 65 00 UserName ........ ---------- Block 29 at 0x0000000000353C30: 13 bytes ---------- Leak Hash: 0xAA38A947, Count: 1, Total 13 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (289): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_USERNAME_TYPE''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 55 73 65 72 4E 61 6D 65 54 79 70 65 00 UserName Type.... ---------- Block 30 at 0x0000000000353C80: 15 bytes ---------- Leak Hash: 0xDAF14A20, Count: 1, Total 15 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (290): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_SEQ_NUM''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 53 65 71 75 65 6E 63 65 4E 75 6D 62 65 72 00 Sequence Number.. ---------- Block 31 at 0x0000000000353CD0: 6 bytes ---------- Leak Hash: 0xB322FA04, Count: 1, Total 6 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (291): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_STATE''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 53 74 61 74 65 00 State... ........ ---------- Block 32 at 0x0000000000353D20: 10 bytes ---------- Leak Hash: 0x624E0738, Count: 1, Total 10 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (292): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_SOLICITED''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 53 6F 6C 69 63 69 74 65 64 00 Solicite d....... ---------- Block 33 at 0x0000000000353D70: 11 bytes ---------- Leak Hash: 0xC60489D7, Count: 1, Total 11 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (293): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_CLEARCACHE''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 43 6C 65 61 72 43 61 63 68 65 00 ClearCac he...... ---------- Block 34 at 0x0000000000353DC0: 5 bytes ---------- Leak Hash: 0x524724E5, Count: 1, Total 5 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (300): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_NAME''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 4E 61 6D 65 00 Name.... ........ ---------- Block 35 at 0x0000000000353E10: 10 bytes ---------- Leak Hash: 0xC803E0B4, Count: 1, Total 10 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (301): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_SERVICE_ID''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 53 65 72 76 69 63 65 49 44 00 ServiceI D....... ---------- Block 36 at 0x0000000000353E60: 7 bytes ---------- Leak Hash: 0x91B55203, Count: 1, Total 7 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (302): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_VENDOR''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 56 65 6E 64 6F 72 00 Vendor.. ........ ---------- Block 37 at 0x0000000000353EB0: 9 bytes ---------- Leak Hash: 0x1E9352D4, Count: 1, Total 9 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (303): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_IS_SOURCE''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 49 73 53 6F 75 72 63 65 00 IsSource ........ ---------- Block 38 at 0x0000000000353F00: 13 bytes ---------- Leak Hash: 0xFA135908, Count: 1, Total 13 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (304): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_CAPABILITIES''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 43 61 70 61 62 69 6C 69 74 69 65 73 00 Capabili ties.... ---------- Block 40 at 0x0000000000353F50: 17 bytes ---------- Leak Hash: 0xCB7FB46F, Count: 1, Total 17 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (306): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_DICTIONARYS_USED''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 44 69 63 74 69 6F 6E 61 72 69 65 73 55 73 65 64 Dictiona riesUsed 00 ........ ........ ---------- Block 42 at 0x0000000000353FA0: 17 bytes ---------- Leak Hash: 0x2D76593A, Count: 1, Total 17 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (308): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_SUPPS_QOS_RANGE''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 53 75 70 70 6F 72 74 73 51 6F 53 52 61 6E 67 65 Supports QoSRange 00 ........ ........ ---------- Block 41 at 0x000000000035C530: 4 bytes ---------- Leak Hash: 0x516D80D1, Count: 1, Total 4 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (307): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_QOS''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 51 6F 53 00 QoS..... ........ ---------- Block 75 at 0x000000000035C570: 4 bytes ---------- Leak Hash: 0xCDC22AB3, Count: 1, Total 4 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (353): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_FIELD_ID''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 46 49 44 00 FID..... ........ ---------- Block 86 at 0x000000000035C5B0: 4 bytes ---------- Leak Hash: 0x0966BE40, Count: 1, Total 4 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (366): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_ENUM_FID''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 46 49 44 00 FID..... ........ ---------- Block 140 at 0x000000000035C5F0: 4 bytes ---------- Leak Hash: 0xB867E20D, Count: 1, Total 4 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (307): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_QOS''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 51 6F 53 00 QoS..... ........ ---------- Block 174 at 0x000000000035C630: 4 bytes ---------- Leak Hash: 0xAD2B7C38, Count: 1, Total 4 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (353): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_FIELD_ID''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 46 49 44 00 FID..... ........ ---------- Block 185 at 0x000000000035C670: 4 bytes ---------- Leak Hash: 0x5867F256, Count: 1, Total 4 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (366): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_ENUM_FID''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 46 49 44 00 FID..... ........ ---------- Block 239 at 0x000000000035C6B0: 4 bytes ---------- Leak Hash: 0x0671BADB, Count: 1, Total 4 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (307): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_QOS''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 51 6F 53 00 QoS..... ........ ---------- Block 273 at 0x000000000035C6F0: 4 bytes ---------- Leak Hash: 0xB74D7BA0, Count: 1, Total 4 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (353): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_FIELD_ID''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 46 49 44 00 FID..... ........ ---------- Block 284 at 0x000000000035C730: 4 bytes ---------- Leak Hash: 0x87A6CB40, Count: 1, Total 4 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (366): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_ENUM_FID''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 46 49 44 00 FID..... ........ ---------- Block 338 at 0x000000000035C7F0: 4 bytes ---------- Leak Hash: 0x475EDA0F, Count: 1, Total 4 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (307): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_QOS''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 51 6F 53 00 QoS..... ........ ---------- Block 372 at 0x000000000035C830: 4 bytes ---------- Leak Hash: 0xB8214557, Count: 1, Total 4 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (353): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_FIELD_ID''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 46 49 44 00 FID..... ........ ---------- Block 383 at 0x000000000035C870: 4 bytes ---------- Leak Hash: 0x88CAF5B7, Count: 1, Total 4 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (366): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_ENUM_FID''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 46 49 44 00 FID..... ........ ---------- Block 9185 at 0x0000000000361050: 64 bytes ---------- Leak Hash: 0x95A34C7D, Count: 1, Total 64 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() f:\dd\vctools\crt\vcstartup\src\heap\new_scalar.cpp (34): MdsDemo.exe!operator new() + 0xA bytes c:\program files (x86)\microsoft visual studio\2017\community\vc\tools\msvc\14.12.25827\include\xmemory0 (138): MdsDemo.exe!std::_Allocate >() + 0x5 bytes c:\program files (x86)\microsoft visual studio\2017\community\vc\tools\msvc\14.12.25827\include\list (656): MdsDemo.exe!std::_List_alloc,std::allocator > const ,mdsdemo::Data * __ptr64>,std::allocator,std::allocator > const ,mdsd() + 0x11 bytes c:\program files (x86)\microsoft visual studio\2017\community\vc\tools\msvc\14.12.25827\include\list (556): MdsDemo.exe!std::_List_alloc,std::allocator > const ,mdsdemo::Data * __ptr64>,std::allocator,std::allocator > const ,mdsd() + 0xA bytes c:\dptgdemo_mt\mdsusingema\main.cpp (76): MdsDemo.exe!main() + 0x15 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (79): MdsDemo.exe!invoke_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (283): MdsDemo.exe!__scrt_common_main_seh() + 0x5 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 00 FA 60 14 00 00 00 00 00 FA 60 14 00 00 00 00 ..`..... ..`..... CD CD CD CD CD CD CD CD CD CD CD CD CD CD CD CD ........ ........ CD CD CD CD CD CD CD CD CD CD CD CD CD CD CD CD ........ ........ CD CD CD CD CD CD CD CD CD CD CD CD CD CD CD CD ........ ........ ---------- Block 43 at 0x0000000000361120: 9 bytes ---------- Leak Hash: 0x9B5E01A9, Count: 1, Total 9 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (309): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_ITEM_LIST''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 49 74 65 6D 4C 69 73 74 00 ItemList ........ ---------- Block 46 at 0x0000000000361170: 20 bytes ---------- Leak Hash: 0x398D0EA0, Count: 1, Total 20 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (312): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_CONS_SOURCE_MIROR_MODE''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 53 6F 75 72 63 65 4D 69 72 72 6F 72 69 6E 67 4D SourceMi rroringM 6F 64 65 00 ode..... ........ ---------- Block 47 at 0x00000000003611C0: 15 bytes ---------- Leak Hash: 0xE12A418B, Count: 1, Total 15 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (313): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_CONS_STATUS''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 43 6F 6E 73 75 6D 65 72 53 74 61 74 75 73 00 Consumer Status.. ---------- Block 48 at 0x0000000000361210: 13 bytes ---------- Leak Hash: 0x59695135, Count: 1, Total 13 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (314): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_SVC_STATE''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 53 65 72 76 69 63 65 53 74 61 74 65 00 ServiceS tate.... ---------- Block 49 at 0x0000000000361260: 18 bytes ---------- Leak Hash: 0x1DEF060F, Count: 1, Total 18 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (315): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_ACCEPTING_REQS''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 41 63 63 65 70 74 69 6E 67 52 65 71 75 65 73 74 Acceptin gRequest 73 00 s....... ........ ---------- Block 50 at 0x00000000003612B0: 7 bytes ---------- Leak Hash: 0xFA45A9E7, Count: 1, Total 7 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (316): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_STATUS''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 53 74 61 74 75 73 00 Status.. ........ ---------- Block 51 at 0x0000000000361300: 6 bytes ---------- Leak Hash: 0x4D4A4433, Count: 1, Total 6 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (317): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_GROUP''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 47 72 6F 75 70 00 Group... ........ ---------- Block 52 at 0x0000000000361350: 14 bytes ---------- Leak Hash: 0xF65B5AE5, Count: 1, Total 14 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (318): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_MERG_TO_GRP''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 4D 65 72 67 65 64 54 6F 47 72 6F 75 70 00 MergedTo Group... ---------- Block 53 at 0x00000000003613A0: 10 bytes ---------- Leak Hash: 0xF2CFCA70, Count: 1, Total 10 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (319): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_OPEN_LIMIT''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 4F 70 65 6E 4C 69 6D 69 74 00 OpenLimi t....... ---------- Block 54 at 0x00000000003613F0: 11 bytes ---------- Leak Hash: 0xBBA89993, Count: 1, Total 11 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (320): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_OPEN_WINDOW''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 4F 70 65 6E 57 69 6E 64 6F 77 00 OpenWind ow...... ---------- Block 55 at 0x0000000000361440: 11 bytes ---------- Leak Hash: 0x44C38DD9, Count: 1, Total 11 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (321): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_LOAD_FACT''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 4C 6F 61 64 46 61 63 74 6F 72 00 LoadFact or...... ---------- Block 56 at 0x0000000000361490: 5 bytes ---------- Leak Hash: 0x5C7A9C27, Count: 1, Total 5 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (322): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_TYPE''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 54 79 70 65 00 Type.... ........ ---------- Block 57 at 0x00000000003614E0: 5 bytes ---------- Leak Hash: 0xDAA7BACF, Count: 1, Total 5 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (323): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_DATA''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 44 61 74 61 00 Data.... ........ ---------- Block 58 at 0x0000000000361530: 10 bytes ---------- Leak Hash: 0xBF9CE1C6, Count: 1, Total 10 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (324): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_LINK_STATE''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 4C 69 6E 6B 53 74 61 74 65 00 LinkStat e....... ---------- Block 59 at 0x0000000000361580: 9 bytes ---------- Leak Hash: 0x9D4377B5, Count: 1, Total 9 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (325): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_LINK_CODE''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 4C 69 6E 6B 43 6F 64 65 00 LinkCode ........ ---------- Block 60 at 0x00000000003615D0: 15 bytes ---------- Leak Hash: 0xC499E44C, Count: 1, Total 15 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (332): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_SUPPORT_STANDBY''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 53 75 70 70 6F 72 74 53 74 61 6E 64 62 79 00 SupportS tandby.. ---------- Block 61 at 0x0000000000361620: 16 bytes ---------- Leak Hash: 0xAF8B8C95, Count: 1, Total 16 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (333): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_WARMSTANDBY_INFO''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 57 61 72 6D 53 74 61 6E 64 62 79 49 6E 66 6F 00 WarmStan dbyInfo. ---------- Block 62 at 0x0000000000361670: 16 bytes ---------- Leak Hash: 0x2A46DFE8, Count: 1, Total 16 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (334): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_WARMSTANDBY_MODE''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 57 61 72 6D 53 74 61 6E 64 62 79 4D 6F 64 65 00 WarmStan dbyMode. ---------- Block 65 at 0x00000000003616C0: 17 bytes ---------- Leak Hash: 0xAEB2F749, Count: 1, Total 17 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (337): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_CONNECTION_CONFIG''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 43 6F 6E 6E 65 63 74 69 6F 6E 43 6F 6E 66 69 67 Connecti onConfig 00 ........ ........ ---------- Block 66 at 0x0000000000361710: 18 bytes ---------- Leak Hash: 0xD85CB393, Count: 1, Total 18 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (338): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_NUM_STANDBY_SERVERS''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 4E 75 6D 53 74 61 6E 64 62 79 53 65 72 76 65 72 NumStand byServer 73 00 s....... ........ ---------- Block 67 at 0x0000000000361760: 9 bytes ---------- Leak Hash: 0x12A9BEEC, Count: 1, Total 9 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (339): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_HOSTNAME''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 48 6F 73 74 6E 61 6D 65 00 Hostname ........ ---------- Block 68 at 0x00000000003617B0: 5 bytes ---------- Leak Hash: 0x71FD7C2C, Count: 1, Total 5 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (340): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_PORT''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 50 6F 72 74 00 Port.... ........ ---------- Block 69 at 0x0000000000361800: 11 bytes ---------- Leak Hash: 0x8164B357, Count: 1, Total 11 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (341): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_SERVER_TYPE''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 53 65 72 76 65 72 54 79 70 65 00 ServerTy pe...... ---------- Block 70 at 0x0000000000361850: 9 bytes ---------- Leak Hash: 0x727D7551, Count: 1, Total 9 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (342): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_SYSTEM_ID''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 53 79 73 74 65 6D 49 44 00 SystemID ........ ---------- Block 71 at 0x00000000003618A0: 13 bytes ---------- Leak Hash: 0x1A134953, Count: 1, Total 13 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (349): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_DICTIONARY_ID''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 44 69 63 74 69 6F 6E 61 72 79 49 64 00 Dictiona ryId.... ---------- Block 72 at 0x00000000003618F0: 5 bytes ---------- Leak Hash: 0x9ACDD73C, Count: 1, Total 5 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (350): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_DICT_TYPE''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 54 79 70 65 00 Type.... ........ ---------- Block 73 at 0x0000000000361940: 8 bytes ---------- Leak Hash: 0x870B2A9E, Count: 1, Total 8 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (351): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_DICT_VERSION''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 56 65 72 73 69 6F 6E 00 Version. ........ ---------- Block 74 at 0x0000000000361990: 5 bytes ---------- Leak Hash: 0xFE033E67, Count: 1, Total 5 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (352): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_FIELD_NAME''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 4E 41 4D 45 00 NAME.... ........ ---------- Block 76 at 0x00000000003619E0: 9 bytes ---------- Leak Hash: 0xFF8463E0, Count: 1, Total 9 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (354): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_FIELD_RIPPLETO''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 52 49 50 50 4C 45 54 4F 00 RIPPLETO ........ ---------- Block 77 at 0x0000000000361A30: 5 bytes ---------- Leak Hash: 0x460810AD, Count: 1, Total 5 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (355): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_FIELD_TYPE''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 54 59 50 45 00 TYPE.... ........ ---------- Block 78 at 0x0000000000361A80: 7 bytes ---------- Leak Hash: 0x166BDE96, Count: 1, Total 7 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (356): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_FIELD_LENGTH''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 4C 45 4E 47 54 48 00 LENGTH.. ........ ---------- Block 79 at 0x0000000000361AD0: 8 bytes ---------- Leak Hash: 0x08F568D5, Count: 1, Total 8 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (357): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_FIELD_RWFTYPE''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 52 57 46 54 59 50 45 00 RWFTYPE. ........ ---------- Block 80 at 0x0000000000361B20: 7 bytes ---------- Leak Hash: 0xAE60F05C, Count: 1, Total 7 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (358): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_FIELD_RWFLENGTH''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 52 57 46 4C 45 4E 00 RWFLEN.. ........ ---------- Block 81 at 0x0000000000361B70: 11 bytes ---------- Leak Hash: 0x42CA70D7, Count: 1, Total 11 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (359): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_FIELD_ENUMLENGTH''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 45 4E 55 4D 4C 45 4E 47 54 48 00 ENUMLENG TH...... ---------- Block 82 at 0x0000000000361BC0: 9 bytes ---------- Leak Hash: 0x2F6FC35B, Count: 1, Total 9 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (360): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_FIELD_LONGNAME''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 4C 4F 4E 47 4E 41 4D 45 00 LONGNAME ........ ---------- Block 83 at 0x0000000000361C10: 11 bytes ---------- Leak Hash: 0x48EDEAF3, Count: 1, Total 11 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (362): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_ENUM_RT_VERSION''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 52 54 5F 56 65 72 73 69 6F 6E 00 RT_Versi on...... ---------- Block 84 at 0x0000000000361C60: 11 bytes ---------- Leak Hash: 0x866EE424, Count: 1, Total 11 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (363): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_ENUM_DT_VERSION''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 44 54 5F 56 65 72 73 69 6F 6E 00 DT_Versi on...... ---------- Block 85 at 0x0000000000361CB0: 5 bytes ---------- Leak Hash: 0x90EA4D18, Count: 1, Total 5 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (365): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_ENUM_FIDS''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 46 49 44 53 00 FIDS.... ........ ---------- Block 87 at 0x0000000000361D00: 7 bytes ---------- Leak Hash: 0x66EA0385, Count: 1, Total 7 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (367): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_ENUM_VALUES''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 56 41 4C 55 45 53 00 VALUES.. ........ ---------- Block 88 at 0x0000000000361D50: 6 bytes ---------- Leak Hash: 0x0610928B, Count: 1, Total 6 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (368): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_ENUM_VALUE''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 56 41 4C 55 45 00 VALUE... ........ ---------- Block 89 at 0x0000000000361DA0: 9 bytes ---------- Leak Hash: 0xC2569545, Count: 1, Total 9 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (369): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_ENUM_DISPLAYS''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 44 49 53 50 4C 41 59 53 00 DISPLAYS ........ ---------- Block 90 at 0x0000000000361DF0: 8 bytes ---------- Leak Hash: 0xA2AC044B, Count: 1, Total 8 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (370): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_ENUM_DISPLAY''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 44 49 53 50 4C 41 59 00 DISPLAY. ........ ---------- Block 91 at 0x0000000000361E40: 9 bytes ---------- Leak Hash: 0x8F05BEF3, Count: 1, Total 9 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (371): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_ENUM_MEANINGS''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 4D 45 41 4E 49 4E 47 53 00 MEANINGS ........ ---------- Block 92 at 0x0000000000361E90: 8 bytes ---------- Leak Hash: 0x16894DAB, Count: 1, Total 8 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (372): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_ENUM_MEANING''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 4D 45 41 4E 49 4E 47 00 MEANING. ........ ---------- Block 93 at 0x0000000000361EE0: 5 bytes ---------- Leak Hash: 0x095C6FE1, Count: 1, Total 5 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (374): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_TEXT''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 54 65 78 74 00 Text.... ........ ---------- Block 94 at 0x0000000000361F30: 8 bytes ---------- Leak Hash: 0x1EBD0867, Count: 1, Total 8 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (375): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_VERSION''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 56 65 72 73 69 6F 6E 00 Version. ........ ---------- Block 95 at 0x0000000000361F80: 10 bytes ---------- Leak Hash: 0x897EAC28, Count: 1, Total 10 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (382): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_BATCH_ITEM_LIST''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 3A 49 74 65 6D 4C 69 73 74 00 :ItemLis t....... ---------- Block 96 at 0x0000000000361FD0: 10 bytes ---------- Leak Hash: 0xC73DF20B, Count: 1, Total 10 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (383): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_VIEW_TYPE''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 3A 56 69 65 77 54 79 70 65 00 :ViewTyp e....... ---------- Block 97 at 0x0000000000362020: 10 bytes ---------- Leak Hash: 0x09BEFCDC, Count: 1, Total 10 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (384): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_VIEW_DATA''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 3A 56 69 65 77 44 61 74 61 00 :ViewDat a....... ---------- Block 99 at 0x0000000000362070: 13 bytes ---------- Leak Hash: 0x0942A17A, Count: 1, Total 13 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() MdsDemo.exe!thomsonreuters::ema::access::EmaString::EmaString() + 0x70 bytes c:\dptgdemo_mt\elektron-sdk1.1.1.win.rrg\ema\src\rdm\include\emardm.h (386): MdsDemo.exe!thomsonreuters::ema::rdm::`dynamic initializer for 'ENAME_DATA_STREAMS''() + 0x1D bytes ucrtbased.dll!initterm() + 0x59 bytes f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (253): MdsDemo.exe!__scrt_common_main_seh() f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl (326): MdsDemo.exe!__scrt_common_main() f:\dd\vctools\crt\vcstartup\src\startup\exe_main.cpp (17): MdsDemo.exe!mainCRTStartup() kernel32.dll!BaseThreadInitThunk() + 0xD bytes ntdll.dll!RtlUserThreadStart() + 0x21 bytes Data: 3A 44 61 74 61 53 74 72 65 61 6D 73 00 :DataStr eams.... ---------- Block 9188 at 0x00000000003623E0: 128 bytes ---------- Leak Hash: 0x27D40162, Count: 1, Total 128 bytes Call Stack (TID 7636): ucrtbased.dll!malloc() f:\dd\vctools\crt\vcstartup\src\heap\new_scalar.cpp (34): MdsDemo.exe!operator new() + 0xA bytes c:\program files (x86)\microsoft visual studio\2017\community\vc\tools\msvc\14.12.25827\include\xmemory0 (138): MdsDemo.exe!std::_Allocate >() + 0x5 bytes c:\program files (x86)\microsoft visual studio\2017\community\vc\tools\msvc\14.12.25827\include\vector (1549): MdsDemo.exe!std::vector,std::allocator > const ,mdsdemo::Data * __ptr64> > > >,std::allocator,std::allocator >,mdsdemo::Data * __ptr64,std::_Uhash_compare,std::allocator >,std::hash