perf_va.dll
Description: XPerfCore AddIn: VirtualAlloc
Authors: © Microsoft Corporation. All rights reserved.
Version: 10.0.26100.4654
Architecture: 64-bit
Operating System: Windows NT
SHA256: c6c3826e042d5414d88c6c75efb0d6b8
File Size: 242.3 KB
Uploaded At: Dec. 3, 2025, 2:42 a.m.
Views: 7
Exported Functions
- DllCanUnloadNow (Ordinal: 1, Address: 0x4170)
- DllGetClassObject (Ordinal: 2, Address: 0x41a0)
- DllRegisterServer (Ordinal: 3, Address: 0x3c30)
- DllUnregisterServer (Ordinal: 4, Address: 0x3c30)
Imported DLLs & Functions
KERNEL32.dll
- AcquireSRWLockExclusive (Address: 0x180027d30)
- DecodePointer (Address: 0x180027d50)
- DelayLoadFailureHook (Address: 0x180027cb0)
- DeleteCriticalSection (Address: 0x180027cc0)
- EncodePointer (Address: 0x180027d58)
- EnterCriticalSection (Address: 0x180027cd0)
- FindResourceExW (Address: 0x180027d98)
- FreeLibrary (Address: 0x180027d60)
- GetCurrentProcess (Address: 0x180027ce0)
- GetCurrentProcessId (Address: 0x180027d10)
- GetCurrentThreadId (Address: 0x180027d08)
- GetModuleHandleW (Address: 0x180027ca0)
- GetProcAddress (Address: 0x180027ca8)
- GetProcessHeap (Address: 0x180027d70)
- GetSystemTimeAsFileTime (Address: 0x180027d00)
- GetTickCount (Address: 0x180027cf8)
- HeapAlloc (Address: 0x180027d78)
- HeapDestroy (Address: 0x180027d68)
- HeapFree (Address: 0x180027d80)
- HeapReAlloc (Address: 0x180027d88)
- HeapSize (Address: 0x180027d90)
- InitializeCriticalSection (Address: 0x180027db8)
- InitializeCriticalSectionEx (Address: 0x180027d40)
- LeaveCriticalSection (Address: 0x180027dc0)
- LoadLibraryExA (Address: 0x180027cb8)
- LoadResource (Address: 0x180027da0)
- LockResource (Address: 0x180027da8)
- QueryPerformanceCounter (Address: 0x180027d18)
- RaiseException (Address: 0x180027cc8)
- ReleaseSRWLockExclusive (Address: 0x180027d38)
- SetUnhandledExceptionFilter (Address: 0x180027ce8)
- SizeofResource (Address: 0x180027db0)
- Sleep (Address: 0x180027d48)
- SleepConditionVariableSRW (Address: 0x180027d20)
- TerminateProcess (Address: 0x180027cd8)
- UnhandledExceptionFilter (Address: 0x180027cf0)
- WakeAllConditionVariable (Address: 0x180027d28)
msvcrt.dll
- ___lc_codepage_func (Address: 0x180027e68)
- ___lc_handle_func (Address: 0x180027e70)
- __C_specific_handler (Address: 0x180027fc8)
- __crtLCMapStringA (Address: 0x180027df8)
- __CxxFrameHandler3 (Address: 0x180027fd8)
- __dllonexit (Address: 0x180027e28)
- __iob_func (Address: 0x180027fe0)
- __pctype_func (Address: 0x180027e80)
- __uncaught_exception (Address: 0x180027e48)
- _amsg_exit (Address: 0x180027e10)
- _callnewh (Address: 0x180027ec8)
- _CxxThrowException (Address: 0x180027eb0)
- _fseeki64 (Address: 0x180027f18)
- _initterm (Address: 0x180027e18)
- _lock (Address: 0x180027e90)
- _onexit (Address: 0x180027e30)
- _purecall (Address: 0x180027fd0)
- _unlock (Address: 0x180027e88)
- _vscwprintf (Address: 0x180027ed8)
- _wcsdup (Address: 0x180027df0)
- _wcsicmp (Address: 0x180027ee8)
- _wfopen (Address: 0x180027f68)
- _wfsopen (Address: 0x180027e50)
- _wsetlocale (Address: 0x180027e00)
- _XcptFilter (Address: 0x180027e08)
- ??0bad_cast@@QEAA@AEBV0@@Z (Address: 0x180027f50)
- ??0bad_cast@@QEAA@PEBD@Z (Address: 0x180027f40)
- ??0exception@@QEAA@AEBQEBD@Z (Address: 0x180027f90)
- ??0exception@@QEAA@AEBQEBDH@Z (Address: 0x180027eb8)
- ??0exception@@QEAA@AEBV0@@Z (Address: 0x180027f88)
- ??1bad_cast@@UEAA@XZ (Address: 0x180027f48)
- ??1exception@@UEAA@XZ (Address: 0x180027f98)
- ??1type_info@@UEAA@XZ (Address: 0x180027e38)
- ?terminate@@YAXXZ (Address: 0x180027e20)
- ?what@exception@@UEBAPEBDXZ (Address: 0x180027fa0)
- abort (Address: 0x180027e40)
- calloc (Address: 0x180027ed0)
- fclose (Address: 0x180027f60)
- fflush (Address: 0x180027f30)
- fgetc (Address: 0x180027f08)
- fgetpos (Address: 0x180027f10)
- fprintf (Address: 0x180027fb0)
- fputc (Address: 0x180027ef8)
- free (Address: 0x180027f38)
- fseek (Address: 0x180027e58)
- fsetpos (Address: 0x180027f20)
- fwprintf (Address: 0x180027f58)
- fwrite (Address: 0x180027ef0)
- islower (Address: 0x180027e60)
- isupper (Address: 0x180027e78)
- malloc (Address: 0x180027ec0)
- mbstowcs (Address: 0x180027f70)
- memcpy (Address: 0x180027ea8)
- memcpy_s (Address: 0x180027fc0)
- memmove (Address: 0x180027ea0)
- memmove_s (Address: 0x180027fa8)
- memset (Address: 0x180027de8)
- printf (Address: 0x180027f78)
- setlocale (Address: 0x180027e98)
- setvbuf (Address: 0x180027f28)
- swprintf_s (Address: 0x180027fb8)
- ungetc (Address: 0x180027f00)
- vswprintf_s (Address: 0x180027ee0)
- wcschr (Address: 0x180027f80)
- wcscmp (Address: 0x180027fe8)
ntdll.dll
- RtlCaptureContext (Address: 0x180027ff8)
- RtlLookupFunctionEntry (Address: 0x180028000)
- RtlVirtualUnwind (Address: 0x180028008)
USER32.dll
- CharLowerW (Address: 0x180027dd8)
- UnregisterClassA (Address: 0x180027dd0)