pla.dll

Description: Performance Logs & Alerts

Authors: © Microsoft Corporation. All rights reserved.

Version: 10.0.19041.1

Architecture: 32-bit

Operating System: Windows NT

SHA256: c2a583893795478556573db3a020ee60

File Size: 1.5 MB

Uploaded At: Dec. 1, 2025, 8:03 a.m.

Views: 6

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess

Exported Functions

  • ServiceMain (Ordinal: 1, Address: 0x1d400)
  • SvchostPushServiceGlobals (Ordinal: 2, Address: 0x1d850)
  • DllCanUnloadNow (Ordinal: 3, Address: 0x1c8e0)
  • DllGetClassObject (Ordinal: 4, Address: 0x1c900)
  • DllRegisterServer (Ordinal: 5, Address: 0x1cb60)
  • DllUnregisterServer (Ordinal: 6, Address: 0x1cb60)
  • PlaDeleteReport (Ordinal: 7, Address: 0x139bf0)
  • PlaExpandTaskArguments (Ordinal: 8, Address: 0x115c70)
  • PlaExtractCabinet (Ordinal: 9, Address: 0x139d20)
  • PlaGetLegacyAlertActionsFlagsFromString (Ordinal: 10, Address: 0xf0be0)
  • PlaGetLegacyAlertActionsStringFromFlags (Ordinal: 11, Address: 0xf1100)
  • PlaGetServerCapabilities (Ordinal: 12, Address: 0x4c4d0)
  • PlaHost (Ordinal: 13, Address: 0x116ec0)
  • PlaServer (Ordinal: 14, Address: 0x1cb70)
  • PlaUpgrade (Ordinal: 15, Address: 0x20910)

Imported DLLs & Functions

ADVAPI32.dll
  • AccessCheck (Address: 0x1014e020)
  • AddAccessAllowedAceEx (Address: 0x1014e03c)
  • AddAce (Address: 0x1014e040)
  • AdjustTokenPrivileges (Address: 0x1014e08c)
  • CheckTokenMembership (Address: 0x1014e0b4)
  • ControlTraceW (Address: 0x1014e080)
  • CreateWellKnownSid (Address: 0x1014e0b8)
  • DuplicateTokenEx (Address: 0x1014e018)
  • EnableTraceEx (Address: 0x1014e084)
  • EnumerateTraceGuidsEx (Address: 0x1014e07c)
  • EqualSid (Address: 0x1014e044)
  • EventAccessQuery (Address: 0x1014e090)
  • EventAccessRemove (Address: 0x1014e0a0)
  • FlushTraceW (Address: 0x1014e070)
  • GetAce (Address: 0x1014e048)
  • GetAclInformation (Address: 0x1014e04c)
  • GetFileSecurityW (Address: 0x1014e024)
  • GetLengthSid (Address: 0x1014e054)
  • GetSecurityDescriptorDacl (Address: 0x1014e09c)
  • GetSecurityDescriptorGroup (Address: 0x1014e05c)
  • GetSecurityDescriptorOwner (Address: 0x1014e060)
  • GetSecurityDescriptorSacl (Address: 0x1014e098)
  • GetTokenInformation (Address: 0x1014e0a4)
  • ImpersonateLoggedOnUser (Address: 0x1014e030)
  • InitializeAcl (Address: 0x1014e050)
  • InitializeSecurityDescriptor (Address: 0x1014e00c)
  • LogonUserW (Address: 0x1014e034)
  • LookupAccountNameW (Address: 0x1014e028)
  • MakeAbsoluteSD (Address: 0x1014e058)
  • OpenProcessToken (Address: 0x1014e0a8)
  • OpenThreadToken (Address: 0x1014e0ac)
  • QueryAllTracesW (Address: 0x1014e06c)
  • QueryTraceW (Address: 0x1014e088)
  • RegCloseKey (Address: 0x1014e0d0)
  • RegConnectRegistryW (Address: 0x1014e0b0)
  • RegCreateKeyExW (Address: 0x1014e068)
  • RegDeleteKeyW (Address: 0x1014e0c8)
  • RegDeleteValueW (Address: 0x1014e064)
  • RegEnumKeyExW (Address: 0x1014e0bc)
  • RegEnumKeyW (Address: 0x1014e010)
  • RegEnumValueW (Address: 0x1014e0c0)
  • RegFlushKey (Address: 0x1014e014)
  • RegOpenKeyExW (Address: 0x1014e0d8)
  • RegQueryInfoKeyW (Address: 0x1014e0c4)
  • RegQueryValueExW (Address: 0x1014e0d4)
  • RegSetValueExW (Address: 0x1014e0cc)
  • RevertToSelf (Address: 0x1014e02c)
  • SetNamedSecurityInfoW (Address: 0x1014e094)
  • SetSecurityDescriptorDacl (Address: 0x1014e038)
  • SetSecurityDescriptorGroup (Address: 0x1014e004)
  • SetSecurityDescriptorOwner (Address: 0x1014e008)
  • SetThreadToken (Address: 0x1014e01c)
  • StartTraceW (Address: 0x1014e000)
  • StopTraceW (Address: 0x1014e074)
  • UpdateTraceW (Address: 0x1014e078)
api-ms-win-service-core-l1-1-0.dll
  • RegisterServiceCtrlHandlerExW (Address: 0x1014e328)
  • SetServiceStatus (Address: 0x1014e32c)
api-ms-win-service-management-l1-1-0.dll
  • CloseServiceHandle (Address: 0x1014e340)
  • OpenSCManagerW (Address: 0x1014e334)
  • OpenServiceW (Address: 0x1014e338)
  • StartServiceW (Address: 0x1014e33c)
api-ms-win-service-management-l2-1-0.dll
  • ChangeServiceConfig2W (Address: 0x1014e350)
  • ChangeServiceConfigW (Address: 0x1014e348)
  • QueryServiceConfigW (Address: 0x1014e34c)
api-ms-win-service-winsvc-l1-1-0.dll
  • ControlService (Address: 0x1014e358)
  • QueryServiceStatus (Address: 0x1014e35c)
Cabinet.dll
  • (Address: 0x1014e0e0)
  • (Address: 0x1014e0e4)
  • (Address: 0x1014e0e8)
  • (Address: 0x1014e0ec)
  • (Address: 0x1014e0f0)
  • (Address: 0x1014e0f4)
  • (Address: 0x1014e0f8)
KERNEL32.dll
  • CloseHandle (Address: 0x1014e110)
  • CompareStringW (Address: 0x1014e1d8)
  • CopyFileExW (Address: 0x1014e12c)
  • CopyFileW (Address: 0x1014e294)
  • CreateDirectoryW (Address: 0x1014e23c)
  • CreateEventW (Address: 0x1014e10c)
  • CreateFileW (Address: 0x1014e1a0)
  • CreateProcessW (Address: 0x1014e284)
  • CreateThread (Address: 0x1014e1f0)
  • CreateWaitableTimerW (Address: 0x1014e1e0)
  • DebugBreak (Address: 0x1014e1fc)
  • DelayLoadFailureHook (Address: 0x1014e134)
  • DeleteCriticalSection (Address: 0x1014e210)
  • DeleteFileW (Address: 0x1014e29c)
  • DisableThreadLibraryCalls (Address: 0x1014e24c)
  • DosDateTimeToFileTime (Address: 0x1014e118)
  • DuplicateHandle (Address: 0x1014e1c0)
  • EnterCriticalSection (Address: 0x1014e108)
  • ExpandEnvironmentStringsW (Address: 0x1014e22c)
  • FileTimeToDosDateTime (Address: 0x1014e11c)
  • FileTimeToLocalFileTime (Address: 0x1014e214)
  • FileTimeToSystemTime (Address: 0x1014e1c8)
  • FindClose (Address: 0x1014e1bc)
  • FindFirstFileW (Address: 0x1014e1b4)
  • FindNextFileW (Address: 0x1014e1b8)
  • FindResourceW (Address: 0x1014e148)
  • FormatMessageW (Address: 0x1014e13c)
  • FreeLibrary (Address: 0x1014e190)
  • FreeResource (Address: 0x1014e160)
  • GetCommandLineW (Address: 0x1014e178)
  • GetComputerNameW (Address: 0x1014e138)
  • GetCurrentProcess (Address: 0x1014e170)
  • GetCurrentProcessId (Address: 0x1014e1b0)
  • GetCurrentThread (Address: 0x1014e16c)
  • GetCurrentThreadId (Address: 0x1014e184)
  • GetDateFormatW (Address: 0x1014e218)
  • GetDiskFreeSpaceExW (Address: 0x1014e220)
  • GetExitCodeProcess (Address: 0x1014e280)
  • GetExitCodeThread (Address: 0x1014e1ec)
  • GetFileAttributesW (Address: 0x1014e174)
  • GetFileInformationByHandle (Address: 0x1014e260)
  • GetFileMUIPath (Address: 0x1014e278)
  • GetFileSizeEx (Address: 0x1014e224)
  • GetFullPathNameW (Address: 0x1014e20c)
  • GetLastError (Address: 0x1014e254)
  • GetLocaleInfoW (Address: 0x1014e230)
  • GetLocalTime (Address: 0x1014e234)
  • GetModuleFileNameW (Address: 0x1014e204)
  • GetProcessHeap (Address: 0x1014e228)
  • GetSystemDirectoryW (Address: 0x1014e250)
  • GetSystemTime (Address: 0x1014e290)
  • GetSystemTimeAsFileTime (Address: 0x1014e1c4)
  • GetTempFileNameW (Address: 0x1014e288)
  • GetTempPathW (Address: 0x1014e26c)
  • GetTickCount (Address: 0x1014e128)
  • GetTickCount64 (Address: 0x1014e248)
  • GetTimeFormatW (Address: 0x1014e21c)
  • GetTimeZoneInformation (Address: 0x1014e238)
  • GetUserDefaultUILanguage (Address: 0x1014e1d0)
  • GetWindowsDirectoryW (Address: 0x1014e258)
  • GlobalAlloc (Address: 0x1014e158)
  • GlobalFree (Address: 0x1014e168)
  • GlobalLock (Address: 0x1014e15c)
  • GlobalUnlock (Address: 0x1014e164)
  • HeapAlloc (Address: 0x1014e1f4)
  • HeapFree (Address: 0x1014e18c)
  • HeapReAlloc (Address: 0x1014e1d4)
  • HeapSize (Address: 0x1014e1dc)
  • HeapValidate (Address: 0x1014e100)
  • InitializeCriticalSection (Address: 0x1014e140)
  • IsDebuggerPresent (Address: 0x1014e200)
  • IsWow64Process (Address: 0x1014e17c)
  • K32GetModuleFileNameExW (Address: 0x1014e19c)
  • LeaveCriticalSection (Address: 0x1014e104)
  • LoadLibraryExW (Address: 0x1014e240)
  • LoadLibraryW (Address: 0x1014e274)
  • LoadResource (Address: 0x1014e14c)
  • LocalFileTimeToFileTime (Address: 0x1014e25c)
  • LocalFree (Address: 0x1014e244)
  • LockResource (Address: 0x1014e150)
  • MultiByteToWideChar (Address: 0x1014e264)
  • OpenEventW (Address: 0x1014e2a0)
  • OpenProcess (Address: 0x1014e198)
  • QueryPerformanceCounter (Address: 0x1014e1ac)
  • RemoveDirectoryW (Address: 0x1014e298)
  • ResetEvent (Address: 0x1014e194)
  • ResolveDelayLoadedAPI (Address: 0x1014e130)
  • SetEvent (Address: 0x1014e1f8)
  • SetFileAttributesW (Address: 0x1014e268)
  • SetFileTime (Address: 0x1014e270)
  • SetPriorityClass (Address: 0x1014e28c)
  • SetUnhandledExceptionFilter (Address: 0x1014e124)
  • SetWaitableTimer (Address: 0x1014e1e4)
  • SizeofResource (Address: 0x1014e154)
  • Sleep (Address: 0x1014e208)
  • SystemTimeToFileTime (Address: 0x1014e1cc)
  • TerminateProcess (Address: 0x1014e27c)
  • UnhandledExceptionFilter (Address: 0x1014e120)
  • UnregisterWait (Address: 0x1014e114)
  • WaitForMultipleObjects (Address: 0x1014e1e8)
  • WaitForSingleObject (Address: 0x1014e1a8)
  • WideCharToMultiByte (Address: 0x1014e144)
  • Wow64DisableWow64FsRedirection (Address: 0x1014e180)
  • Wow64RevertWow64FsRedirection (Address: 0x1014e188)
  • WriteFile (Address: 0x1014e1a4)
msvcrt.dll
  • _amsg_exit (Address: 0x1014e384)
  • _close (Address: 0x1014e39c)
  • _errno (Address: 0x1014e394)
  • _except_handler4_common (Address: 0x1014e370)
  • _get_osfhandle (Address: 0x1014e3b0)
  • _initterm (Address: 0x1014e378)
  • _lseek (Address: 0x1014e38c)
  • _purecall (Address: 0x1014e3f8)
  • _read (Address: 0x1014e3a0)
  • _vsnwprintf (Address: 0x1014e400)
  • _wcsicmp (Address: 0x1014e408)
  • _wcsnicmp (Address: 0x1014e3f4)
  • _wfopen (Address: 0x1014e3b8)
  • _wgetenv (Address: 0x1014e3dc)
  • _wopen (Address: 0x1014e3ac)
  • _wremove (Address: 0x1014e3a4)
  • _write (Address: 0x1014e398)
  • _wsplitpath_s (Address: 0x1014e3d8)
  • _wtof (Address: 0x1014e3cc)
  • _wtoi (Address: 0x1014e3bc)
  • _wtol (Address: 0x1014e3d4)
  • _XcptFilter (Address: 0x1014e388)
  • ??1type_info@@UAE@XZ (Address: 0x1014e374)
  • ?name@type_info@@QBEPBDXZ (Address: 0x1014e3fc)
  • fclose (Address: 0x1014e3b4)
  • free (Address: 0x1014e380)
  • fwprintf (Address: 0x1014e3c4)
  • iswspace (Address: 0x1014e3d0)
  • malloc (Address: 0x1014e40c)
  • memcmp (Address: 0x1014e364)
  • memcpy (Address: 0x1014e368)
  • memmove (Address: 0x1014e36c)
  • memset (Address: 0x1014e410)
  • qsort (Address: 0x1014e3c8)
  • rand (Address: 0x1014e3e8)
  • srand (Address: 0x1014e3a8)
  • swscanf_s (Address: 0x1014e3ec)
  • time (Address: 0x1014e390)
  • vfwprintf (Address: 0x1014e3c0)
  • wcschr (Address: 0x1014e404)
  • wcscspn (Address: 0x1014e3e4)
  • wcsncmp (Address: 0x1014e3f0)
  • wcsrchr (Address: 0x1014e37c)
  • wcsstr (Address: 0x1014e3e0)
NSI.dll
  • NsiAllocateAndGetTable (Address: 0x1014e2ac)
  • NsiFreeTable (Address: 0x1014e2a8)
ntdll.dll
  • EtwEventRegister (Address: 0x1014e43c)
  • EtwEventUnregister (Address: 0x1014e434)
  • EtwEventWrite (Address: 0x1014e438)
  • EtwNotificationRegister (Address: 0x1014e420)
  • EtwNotificationUnregister (Address: 0x1014e424)
  • NtQuerySystemInformation (Address: 0x1014e41c)
  • NtQuerySystemTime (Address: 0x1014e430)
  • RtlFreeUnicodeString (Address: 0x1014e42c)
  • RtlNtStatusToDosError (Address: 0x1014e418)
  • RtlStringFromGUID (Address: 0x1014e428)
pdh.dll
  • PdhAddCounterW (Address: 0x1014e454)
  • PdhCloseLog (Address: 0x1014e464)
  • PdhCloseQuery (Address: 0x1014e46c)
  • PdhCollectQueryData (Address: 0x1014e450)
  • PdhExpandWildCardPathW (Address: 0x1014e458)
  • PdhGetFormattedCounterValue (Address: 0x1014e44c)
  • PdhOpenLogW (Address: 0x1014e468)
  • PdhOpenQueryW (Address: 0x1014e45c)
  • PdhTranslate009CounterW (Address: 0x1014e448)
  • PdhTranslateLocaleCounterW (Address: 0x1014e444)
  • PdhUpdateLogW (Address: 0x1014e460)
RPCRT4.dll
  • NdrClientCall4 (Address: 0x1014e2cc)
  • NdrServerCall2 (Address: 0x1014e2f0)
  • RpcBindingFree (Address: 0x1014e2dc)
  • RpcBindingFromStringBindingW (Address: 0x1014e2e4)
  • RpcBindingInqAuthClientW (Address: 0x1014e2d4)
  • RpcBindingSetAuthInfoW (Address: 0x1014e2e0)
  • RpcBindingToStringBindingW (Address: 0x1014e2d0)
  • RpcImpersonateClient (Address: 0x1014e2c8)
  • RpcRevertToSelf (Address: 0x1014e2c4)
  • RpcServerInqCallAttributesW (Address: 0x1014e2b4)
  • RpcServerRegisterIf3 (Address: 0x1014e2bc)
  • RpcServerUnregisterIfEx (Address: 0x1014e2b8)
  • RpcServerUseProtseqEpW (Address: 0x1014e2c0)
  • RpcStringBindingComposeW (Address: 0x1014e2e8)
  • RpcStringBindingParseW (Address: 0x1014e2f4)
  • RpcStringFreeW (Address: 0x1014e2d8)
  • UuidCreate (Address: 0x1014e2ec)
SHLWAPI.dll
  • (Address: 0x1014e2fc)
  • PathIsFileSpecW (Address: 0x1014e304)
  • PathIsNetworkPathW (Address: 0x1014e300)
tdh.dll
  • TdhEnumerateProviderFieldInformation (Address: 0x1014e478)
  • TdhEnumerateProviders (Address: 0x1014e480)
  • TdhEnumerateRemoteWBEMProviderFieldInformation (Address: 0x1014e47c)
  • TdhEnumerateRemoteWBEMProviders (Address: 0x1014e474)
USER32.dll
  • CreateWindowExW (Address: 0x1014e320)
  • DestroyWindow (Address: 0x1014e30c)
  • DispatchMessageW (Address: 0x1014e318)
  • LoadStringW (Address: 0x1014e310)
  • MsgWaitForMultipleObjects (Address: 0x1014e314)
  • PeekMessageW (Address: 0x1014e31c)
wevtapi.dll
  • EvtClose (Address: 0x1014e490)
  • EvtCreateRenderContext (Address: 0x1014e48c)
  • EvtGetChannelConfigProperty (Address: 0x1014e498)
  • EvtNext (Address: 0x1014e4a0)
  • EvtOpenChannelConfig (Address: 0x1014e494)
  • EvtRender (Address: 0x1014e488)
  • EvtSubscribe (Address: 0x1014e49c)