Advertisement
Guest User

Untitled

a guest
Jul 2nd, 2019
245
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 16.60 KB | None | 0 0
  1. Dr. Memory version 2.1.0 build 1 built on Mar 18 2019 00:02:08
  2. Windows version: WinVer=105;Rel=1803;Build=17134;Edition=Enterprise
  3. Dr. Memory results for pid 2616: "test3.exe"
  4. Application cmdline: "C:\Users\משתמש\source\repos\Test\Debug\test3.exe"
  5. Recorded 117 suppression(s) from default C:\Program Files (x86)\Dr. Memory\bin\suppress-default.txt
  6.  
  7. Error #1: UNINITIALIZED READ: reading register eax
  8. # 0 KERNELBASE.dll!FindNextFileW +0x109 (0x76012469 <KERNELBASE.dll+0xf2469>)
  9. # 1 test3.exe!? +0x0 (0x003c5115 <test3.exe+0x15115>)
  10. # 2 test3.exe!? +0x0 (0x003c5591 <test3.exe+0x15591>)
  11. # 3 test3.exe!? +0x0 (0x003c5bb3 <test3.exe+0x15bb3>)
  12. # 4 test3.exe!? +0x0 (0x003c54d5 <test3.exe+0x154d5>)
  13. # 5 test3.exe!? +0x0 (0x003c51d9 <test3.exe+0x151d9>)
  14. # 6 test3.exe!? +0x0 (0x003c21ae <test3.exe+0x121ae>)
  15. # 7 test3.exe!? +0x0 (0x003c2017 <test3.exe+0x12017>)
  16. # 8 test3.exe!? +0x0 (0x003c1ead <test3.exe+0x11ead>)
  17. # 9 test3.exe!? +0x0 (0x003c2228 <test3.exe+0x12228>)
  18. #10 KERNEL32.dll!BaseThreadInitThunk +0x23 (0x75e28494 <KERNEL32.dll+0x18494>)
  19. Note: @0:00:00.162 in thread 1576
  20. Note: instruction: cmp %eax $0x00000018
  21.  
  22. Error #2: UNINITIALIZED READ: reading register eax
  23. # 0 KERNELBASE.dll!FindNextFileW +0x12e (0x7601248e <KERNELBASE.dll+0xf248e>)
  24. # 1 test3.exe!? +0x0 (0x003c5115 <test3.exe+0x15115>)
  25. # 2 test3.exe!? +0x0 (0x003c5591 <test3.exe+0x15591>)
  26. # 3 test3.exe!? +0x0 (0x003c5bb3 <test3.exe+0x15bb3>)
  27. # 4 test3.exe!? +0x0 (0x003c54d5 <test3.exe+0x154d5>)
  28. # 5 test3.exe!? +0x0 (0x003c51d9 <test3.exe+0x151d9>)
  29. # 6 test3.exe!? +0x0 (0x003c21ae <test3.exe+0x121ae>)
  30. # 7 test3.exe!? +0x0 (0x003c2017 <test3.exe+0x12017>)
  31. # 8 test3.exe!? +0x0 (0x003c1ead <test3.exe+0x11ead>)
  32. # 9 test3.exe!? +0x0 (0x003c2228 <test3.exe+0x12228>)
  33. #10 KERNEL32.dll!BaseThreadInitThunk +0x23 (0x75e28494 <KERNEL32.dll+0x18494>)
  34. Note: @0:00:00.165 in thread 1576
  35. Note: instruction: data16 mov %cx -> 0x00000234(%esi,%eax,2)
  36.  
  37. Error #3: UNINITIALIZED READ: reading register eax
  38. # 0 KERNELBASE.dll!FindNextFileW +0xc5 (0x76012425 <KERNELBASE.dll+0xf2425>)
  39. # 1 test3.exe!? +0x0 (0x003c5115 <test3.exe+0x15115>)
  40. # 2 test3.exe!? +0x0 (0x003c5591 <test3.exe+0x15591>)
  41. # 3 test3.exe!? +0x0 (0x003c5bb3 <test3.exe+0x15bb3>)
  42. # 4 test3.exe!? +0x0 (0x003c54d5 <test3.exe+0x154d5>)
  43. # 5 test3.exe!? +0x0 (0x003c51d9 <test3.exe+0x151d9>)
  44. # 6 test3.exe!? +0x0 (0x003c21ae <test3.exe+0x121ae>)
  45. # 7 test3.exe!? +0x0 (0x003c2017 <test3.exe+0x12017>)
  46. # 8 test3.exe!? +0x0 (0x003c1ead <test3.exe+0x11ead>)
  47. # 9 test3.exe!? +0x0 (0x003c2228 <test3.exe+0x12228>)
  48. #10 KERNEL32.dll!BaseThreadInitThunk +0x23 (0x75e28494 <KERNEL32.dll+0x18494>)
  49. Note: @0:00:00.286 in thread 1576
  50. Note: instruction: cmp %eax $0x00000206
  51.  
  52. Error #4: UNINITIALIZED READ: reading register eax
  53. # 0 KERNELBASE.dll!FindNextFileW +0xf4 (0x76012454 <KERNELBASE.dll+0xf2454>)
  54. # 1 test3.exe!? +0x0 (0x003c5115 <test3.exe+0x15115>)
  55. # 2 test3.exe!? +0x0 (0x003c5591 <test3.exe+0x15591>)
  56. # 3 test3.exe!? +0x0 (0x003c5bb3 <test3.exe+0x15bb3>)
  57. # 4 test3.exe!? +0x0 (0x003c54d5 <test3.exe+0x154d5>)
  58. # 5 test3.exe!? +0x0 (0x003c51d9 <test3.exe+0x151d9>)
  59. # 6 test3.exe!? +0x0 (0x003c21ae <test3.exe+0x121ae>)
  60. # 7 test3.exe!? +0x0 (0x003c2017 <test3.exe+0x12017>)
  61. # 8 test3.exe!? +0x0 (0x003c1ead <test3.exe+0x11ead>)
  62. # 9 test3.exe!? +0x0 (0x003c2228 <test3.exe+0x12228>)
  63. #10 KERNEL32.dll!BaseThreadInitThunk +0x23 (0x75e28494 <KERNEL32.dll+0x18494>)
  64. Note: @0:00:00.287 in thread 1576
  65. Note: instruction: data16 mov %cx -> 0x2c(%esi,%eax,2)
  66.  
  67. Error #5: UNINITIALIZED READ: reading 0x01251628-0x0125162c 4 byte(s)
  68. # 0 KERNELBASE.dll!FindNextFileW +0x136 (0x76012496 <KERNELBASE.dll+0xf2496>)
  69. # 1 test3.exe!? +0x0 (0x003c5115 <test3.exe+0x15115>)
  70. # 2 test3.exe!? +0x0 (0x003c5591 <test3.exe+0x15591>)
  71. # 3 test3.exe!? +0x0 (0x003c5bb3 <test3.exe+0x15bb3>)
  72. # 4 test3.exe!? +0x0 (0x003c54d5 <test3.exe+0x154d5>)
  73. # 5 test3.exe!? +0x0 (0x003c51d9 <test3.exe+0x151d9>)
  74. # 6 test3.exe!? +0x0 (0x003c21ae <test3.exe+0x121ae>)
  75. # 7 test3.exe!? +0x0 (0x003c2017 <test3.exe+0x12017>)
  76. # 8 test3.exe!? +0x0 (0x003c1ead <test3.exe+0x11ead>)
  77. # 9 test3.exe!? +0x0 (0x003c2228 <test3.exe+0x12228>)
  78. #10 KERNEL32.dll!BaseThreadInitThunk +0x23 (0x75e28494 <KERNEL32.dll+0x18494>)
  79. Note: @0:00:00.289 in thread 1576
  80. Note: instruction: test 0x38(%ebx) $0x00000400
  81.  
  82. Error #6: UNINITIALIZED READ: reading register ecx
  83. # 0 ucrtbased.dll!wctob +0x1eb (0x0f626cab <ucrtbased.dll+0x86cab>)
  84. # 1 ucrtbased.dll!wcstombs_s_l +0x1c2 (0x0f6273f3 <ucrtbased.dll+0x873f3>)
  85. # 2 ucrtbased.dll!wcstombs_s +0x1f (0x0f6275f0 <ucrtbased.dll+0x875f0>)
  86. # 3 test3.exe!? +0x0 (0x003c5af4 <test3.exe+0x15af4>)
  87. # 4 test3.exe!? +0x0 (0x003c55c2 <test3.exe+0x155c2>)
  88. # 5 test3.exe!? +0x0 (0x003c5bb3 <test3.exe+0x15bb3>)
  89. # 6 test3.exe!? +0x0 (0x003c54d5 <test3.exe+0x154d5>)
  90. # 7 test3.exe!? +0x0 (0x003c51d9 <test3.exe+0x151d9>)
  91. # 8 test3.exe!? +0x0 (0x003c21ae <test3.exe+0x121ae>)
  92. # 9 test3.exe!? +0x0 (0x003c2017 <test3.exe+0x12017>)
  93. #10 test3.exe!? +0x0 (0x003c1ead <test3.exe+0x11ead>)
  94. #11 test3.exe!? +0x0 (0x003c2228 <test3.exe+0x12228>)
  95. #12 KERNEL32.dll!BaseThreadInitThunk +0x23 (0x75e28494 <KERNEL32.dll+0x18494>)
  96. Note: @0:00:00.294 in thread 1576
  97. Note: instruction: cmp %ecx $0x000000ff
  98.  
  99. Error #7: UNINITIALIZED READ: reading 0x00aff2a8-0x00aff2aa 2 byte(s) within 0x00aff2a8-0x00aff2ac
  100. # 0 ucrtbased.dll!wctob +0x23b (0x0f626cfb <ucrtbased.dll+0x86cfb>)
  101. # 1 ucrtbased.dll!wcstombs_s_l +0x1c2 (0x0f6273f3 <ucrtbased.dll+0x873f3>)
  102. # 2 ucrtbased.dll!wcstombs_s +0x1f (0x0f6275f0 <ucrtbased.dll+0x875f0>)
  103. # 3 test3.exe!? +0x0 (0x003c5af4 <test3.exe+0x15af4>)
  104. # 4 test3.exe!? +0x0 (0x003c55c2 <test3.exe+0x155c2>)
  105. # 5 test3.exe!? +0x0 (0x003c5bb3 <test3.exe+0x15bb3>)
  106. # 6 test3.exe!? +0x0 (0x003c54d5 <test3.exe+0x154d5>)
  107. # 7 test3.exe!? +0x0 (0x003c51d9 <test3.exe+0x151d9>)
  108. # 8 test3.exe!? +0x0 (0x003c21ae <test3.exe+0x121ae>)
  109. # 9 test3.exe!? +0x0 (0x003c2017 <test3.exe+0x12017>)
  110. #10 test3.exe!? +0x0 (0x003c1ead <test3.exe+0x11ead>)
  111. #11 test3.exe!? +0x0 (0x003c2228 <test3.exe+0x12228>)
  112. #12 KERNEL32.dll!BaseThreadInitThunk +0x23 (0x75e28494 <KERNEL32.dll+0x18494>)
  113. Note: @0:00:00.295 in thread 1576
  114. Note: instruction: cmp 0xffffffa4(%ebp) $0x00000000
  115.  
  116. Error #8: UNINITIALIZED READ: reading register eflags
  117. # 0 test3.exe!? +0x0 (0x003c562e <test3.exe+0x1562e>)
  118. # 1 test3.exe!? +0x0 (0x003c5bb3 <test3.exe+0x15bb3>)
  119. # 2 test3.exe!? +0x0 (0x003c54d5 <test3.exe+0x154d5>)
  120. # 3 test3.exe!? +0x0 (0x003c51d9 <test3.exe+0x151d9>)
  121. # 4 test3.exe!? +0x0 (0x003c21ae <test3.exe+0x121ae>)
  122. # 5 test3.exe!? +0x0 (0x003c2017 <test3.exe+0x12017>)
  123. # 6 test3.exe!? +0x0 (0x003c1ead <test3.exe+0x11ead>)
  124. # 7 test3.exe!? +0x0 (0x003c2228 <test3.exe+0x12228>)
  125. # 8 KERNEL32.dll!BaseThreadInitThunk +0x23 (0x75e28494 <KERNEL32.dll+0x18494>)
  126. Note: @0:00:00.297 in thread 1576
  127. Note: instruction: jz $0x003c563c
  128.  
  129. Error #9: UNINITIALIZED READ: reading register eflags
  130. # 0 test3.exe!? +0x0 (0x003c5642 <test3.exe+0x15642>)
  131. # 1 test3.exe!? +0x0 (0x003c5bb3 <test3.exe+0x15bb3>)
  132. # 2 test3.exe!? +0x0 (0x003c54d5 <test3.exe+0x154d5>)
  133. # 3 test3.exe!? +0x0 (0x003c51d9 <test3.exe+0x151d9>)
  134. # 4 test3.exe!? +0x0 (0x003c21ae <test3.exe+0x121ae>)
  135. # 5 test3.exe!? +0x0 (0x003c2017 <test3.exe+0x12017>)
  136. # 6 test3.exe!? +0x0 (0x003c1ead <test3.exe+0x11ead>)
  137. # 7 test3.exe!? +0x0 (0x003c2228 <test3.exe+0x12228>)
  138. # 8 KERNEL32.dll!BaseThreadInitThunk +0x23 (0x75e28494 <KERNEL32.dll+0x18494>)
  139. Note: @0:00:00.299 in thread 1576
  140. Note: instruction: jz $0x003c5650
  141.  
  142. Error #10: UNINITIALIZED READ: reading register ecx
  143. # 0 replace_strcmp [d:\drmemory_package\drmemory\replace.c:494]
  144. # 1 test3.exe!? +0x0 (0x003c54f2 <test3.exe+0x154f2>)
  145. # 2 test3.exe!? +0x0 (0x003c51d9 <test3.exe+0x151d9>)
  146. # 3 test3.exe!? +0x0 (0x003c21ae <test3.exe+0x121ae>)
  147. # 4 test3.exe!? +0x0 (0x003c2017 <test3.exe+0x12017>)
  148. # 5 test3.exe!? +0x0 (0x003c1ead <test3.exe+0x11ead>)
  149. # 6 test3.exe!? +0x0 (0x003c2228 <test3.exe+0x12228>)
  150. # 7 KERNEL32.dll!BaseThreadInitThunk +0x23 (0x75e28494 <KERNEL32.dll+0x18494>)
  151. Note: @0:00:00.318 in thread 1576
  152. Note: instruction: test %ecx %ecx
  153.  
  154. Error #11: UNINITIALIZED READ: reading register ecx
  155. # 0 replace_strcmp [d:\drmemory_package\drmemory\replace.c:501]
  156. # 1 test3.exe!? +0x0 (0x003c54f2 <test3.exe+0x154f2>)
  157. # 2 test3.exe!? +0x0 (0x003c51d9 <test3.exe+0x151d9>)
  158. # 3 test3.exe!? +0x0 (0x003c21ae <test3.exe+0x121ae>)
  159. # 4 test3.exe!? +0x0 (0x003c2017 <test3.exe+0x12017>)
  160. # 5 test3.exe!? +0x0 (0x003c1ead <test3.exe+0x11ead>)
  161. # 6 test3.exe!? +0x0 (0x003c2228 <test3.exe+0x12228>)
  162. # 7 KERNEL32.dll!BaseThreadInitThunk +0x23 (0x75e28494 <KERNEL32.dll+0x18494>)
  163. Note: @0:00:00.320 in thread 1576
  164. Note: instruction: cmp %ecx %eax
  165.  
  166. Error #12: UNINITIALIZED READ: reading register edx
  167. # 0 replace_strcmp [d:\drmemory_package\drmemory\replace.c:503]
  168. # 1 test3.exe!? +0x0 (0x003c54f2 <test3.exe+0x154f2>)
  169. # 2 test3.exe!? +0x0 (0x003c51d9 <test3.exe+0x151d9>)
  170. # 3 test3.exe!? +0x0 (0x003c21ae <test3.exe+0x121ae>)
  171. # 4 test3.exe!? +0x0 (0x003c2017 <test3.exe+0x12017>)
  172. # 5 test3.exe!? +0x0 (0x003c1ead <test3.exe+0x11ead>)
  173. # 6 test3.exe!? +0x0 (0x003c2228 <test3.exe+0x12228>)
  174. # 7 KERNEL32.dll!BaseThreadInitThunk +0x23 (0x75e28494 <KERNEL32.dll+0x18494>)
  175. Note: @0:00:00.321 in thread 1576
  176. Note: instruction: cmp %edx %ecx
  177.  
  178. Error #13: UNINITIALIZED READ: reading register ecx
  179. # 0 replace_strcmp [d:\drmemory_package\drmemory\replace.c:494]
  180. # 1 test3.exe!? +0x0 (0x003c550a <test3.exe+0x1550a>)
  181. # 2 test3.exe!? +0x0 (0x003c51d9 <test3.exe+0x151d9>)
  182. # 3 test3.exe!? +0x0 (0x003c21ae <test3.exe+0x121ae>)
  183. # 4 test3.exe!? +0x0 (0x003c2017 <test3.exe+0x12017>)
  184. # 5 test3.exe!? +0x0 (0x003c1ead <test3.exe+0x11ead>)
  185. # 6 test3.exe!? +0x0 (0x003c2228 <test3.exe+0x12228>)
  186. # 7 KERNEL32.dll!BaseThreadInitThunk +0x23 (0x75e28494 <KERNEL32.dll+0x18494>)
  187. Note: @0:00:00.326 in thread 1576
  188. Note: instruction: test %ecx %ecx
  189.  
  190. Error #14: UNINITIALIZED READ: reading register ecx
  191. # 0 replace_strcmp [d:\drmemory_package\drmemory\replace.c:501]
  192. # 1 test3.exe!? +0x0 (0x003c550a <test3.exe+0x1550a>)
  193. # 2 test3.exe!? +0x0 (0x003c51d9 <test3.exe+0x151d9>)
  194. # 3 test3.exe!? +0x0 (0x003c21ae <test3.exe+0x121ae>)
  195. # 4 test3.exe!? +0x0 (0x003c2017 <test3.exe+0x12017>)
  196. # 5 test3.exe!? +0x0 (0x003c1ead <test3.exe+0x11ead>)
  197. # 6 test3.exe!? +0x0 (0x003c2228 <test3.exe+0x12228>)
  198. # 7 KERNEL32.dll!BaseThreadInitThunk +0x23 (0x75e28494 <KERNEL32.dll+0x18494>)
  199. Note: @0:00:00.329 in thread 1576
  200. Note: instruction: cmp %ecx %eax
  201.  
  202. Error #15: UNINITIALIZED READ: reading register edx
  203. # 0 replace_strcmp [d:\drmemory_package\drmemory\replace.c:503]
  204. # 1 test3.exe!? +0x0 (0x003c550a <test3.exe+0x1550a>)
  205. # 2 test3.exe!? +0x0 (0x003c51d9 <test3.exe+0x151d9>)
  206. # 3 test3.exe!? +0x0 (0x003c21ae <test3.exe+0x121ae>)
  207. # 4 test3.exe!? +0x0 (0x003c2017 <test3.exe+0x12017>)
  208. # 5 test3.exe!? +0x0 (0x003c1ead <test3.exe+0x11ead>)
  209. # 6 test3.exe!? +0x0 (0x003c2228 <test3.exe+0x12228>)
  210. # 7 KERNEL32.dll!BaseThreadInitThunk +0x23 (0x75e28494 <KERNEL32.dll+0x18494>)
  211. Note: @0:00:00.330 in thread 1576
  212. Note: instruction: cmp %edx %ecx
  213.  
  214. Error #16: UNINITIALIZED READ: reading register eax
  215. # 0 KERNELBASE.dll!FindNextFileW +0x7a (0x760123da <KERNELBASE.dll+0xf23da>)
  216. # 1 test3.exe!? +0x0 (0x003c5115 <test3.exe+0x15115>)
  217. # 2 test3.exe!? +0x0 (0x003c5591 <test3.exe+0x15591>)
  218. # 3 test3.exe!? +0x0 (0x003c5bb3 <test3.exe+0x15bb3>)
  219. # 4 test3.exe!? +0x0 (0x003c54d5 <test3.exe+0x154d5>)
  220. # 5 test3.exe!? +0x0 (0x003c51d9 <test3.exe+0x151d9>)
  221. # 6 test3.exe!? +0x0 (0x003c21ae <test3.exe+0x121ae>)
  222. # 7 test3.exe!? +0x0 (0x003c2017 <test3.exe+0x12017>)
  223. # 8 test3.exe!? +0x0 (0x003c1ead <test3.exe+0x11ead>)
  224. # 9 test3.exe!? +0x0 (0x003c2228 <test3.exe+0x12228>)
  225. #10 KERNEL32.dll!BaseThreadInitThunk +0x23 (0x75e28494 <KERNEL32.dll+0x18494>)
  226. Note: @0:00:00.336 in thread 1576
  227. Note: instruction: test %eax %eax
  228.  
  229. ===========================================================================
  230. FINAL SUMMARY:
  231.  
  232. DUPLICATE ERROR COUNTS:
  233. Error # 1: 50
  234. Error # 2: 50
  235. Error # 3: 18
  236. Error # 4: 18
  237. Error # 5: 18
  238. Error # 6: 108
  239. Error # 7: 108
  240. Error # 8: 18
  241. Error # 9: 18
  242. Error # 10: 18
  243. Error # 11: 18
  244. Error # 12: 18
  245. Error # 13: 18
  246. Error # 14: 18
  247. Error # 15: 18
  248. Error # 16: 17
  249.  
  250. SUPPRESSIONS USED:
  251.  
  252. ERRORS FOUND:
  253. 0 unique, 0 total unaddressable access(es)
  254. 16 unique, 531 total uninitialized access(es)
  255. 0 unique, 0 total invalid heap argument(s)
  256. 0 unique, 0 total GDI usage error(s)
  257. 0 unique, 0 total handle leak(s)
  258. 0 unique, 0 total warning(s)
  259. 0 unique, 0 total, 0 byte(s) of leak(s)
  260. 0 unique, 0 total, 0 byte(s) of possible leak(s)
  261. ERRORS IGNORED:
  262. 9 potential error(s) (suspected false positives)
  263. (details: C:\Users\משתמש\AppData\Roaming\Dr. Memory\DrMemory-test3.exe.2616.000\potential_errors.txt)
  264. 2 potential leak(s) (suspected false positives)
  265. (details: C:\Users\משתמש\AppData\Roaming\Dr. Memory\DrMemory-test3.exe.2616.000\potential_errors.txt)
  266. 20 unique, 31 total, 6632 byte(s) of still-reachable allocation(s)
  267. (re-run with "-show_reachable" for details)
  268. Details: C:\Users\משתמש\AppData\Roaming\Dr. Memory\DrMemory-test3.exe.2616.000\results.txt
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement