Function call at the end of an application

Posted on 2011-02-14
Last Modified: 2013-11-20

Is there a way for me to determine which functions/messages are called at the end of an application? That is, I have a memory leak which I'm trying to find and I want to see where the problem is.

Question by:IssacJones

Accepted Solution

incerc earned 84 total points
ID: 34891359

You can try to run the program into debugging mode, using the tools that Visual Studio provides for memory leaks detection.

Pls read and (for MFC).

The object dumps & dumps statistics are pretty effective.
LVL 44

Expert Comment

ID: 34894399
>>Is there a way for me to determine which functions/messages are called at the end of an application?

The memory leak might be caused by a line of code right at the application start assigning memory which isn't then released.   Don't make ANY assumptions about where it might be.
LVL 32

Assisted Solution

sarabande earned 83 total points
ID: 34895178
for an SDI or MDI mfc application the program runs nearly all time in CWinThread::Run where the message loop was performed. you could provide an overload of CWinApp::ExitInstance in your application class which would be called as very last function by the mfc framework.

for a dialog-based mfc application the program exits in InitInstance function of your application class after DoModal call.

Threat Intelligence Starter Resources

Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.


Author Comment

ID: 34895341
Hi Andy

I understand what you mean about memory that isn't released. If this is the case how can I find the problem line?

LVL 44

Assisted Solution

AndyAinscow earned 83 total points
ID: 34895370
I'd look at the links provided by incerc, they seem to be relevant.

Look at the output window, it should say what type of object was assigned but not being freed and more info about it.

Author Closing Comment

ID: 34895400
Thank you all

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

In this article, I'll describe -- and show pictures of -- some of the significant additions that have been made available to programmers in the MFC Feature Pack for Visual C++ 2008.  These same feature are in the MFC libraries that come with Visual …
Have you tried to learn about Unicode, UTF-8, and multibyte text encoding and all the articles are just too "academic" or too technical? This article aims to make the whole topic easy for just about anyone to understand.
This video will show you how to get GIT to work in Eclipse.   It will walk you through how to install the EGit plugin in eclipse and how to checkout an existing repository.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor ( If you're interested in additional methods for monitoring bandwidt…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now