ntleah.dll
Description:
Authors:
Version:
Architecture: 32-bit
Operating System:
SHA256: 2c71a207eb8b3e32b0cb91ab26df0f10
File Size: 18.0 KB
Uploaded At: March 28, 2026, 12:55 a.m.
Views: 16
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: VirtualAllocEx, CreateRemoteThread, WriteProcessMemory
Exported Functions
No exported functions.
Imported DLLs & Functions
GDI32.dll
- CreateFontIndirectA (Address: 0x4055bc)
- CreateFontIndirectW (Address: 0x4055c0)
- EnumFontFamiliesExA (Address: 0x4055b8)
KERNEL32.dll
- CloseHandle (Address: 0x4053f0)
- CompareStringA (Address: 0x405410)
- CreateEventA (Address: 0x40548c)
- CreateFileA (Address: 0x40540c)
- CreateFileMappingA (Address: 0x4053e4)
- CreateFileW (Address: 0x405474)
- CreateProcessA (Address: 0x405414)
- CreateProcessW (Address: 0x405418)
- CreateRemoteThread (Address: 0x4054ac)
- CreateThread (Address: 0x4053b0)
- ExitProcess (Address: 0x405454)
- FlushInstructionCache (Address: 0x405470)
- GetACP (Address: 0x405400)
- GetCommandLineA (Address: 0x405434)
- GetCommandLineW (Address: 0x405438)
- GetCPInfo (Address: 0x405408)
- GetCurrentThreadId (Address: 0x4054b4)
- GetLastError (Address: 0x4053bc)
- GetModuleHandleA (Address: 0x4053e0)
- GetModuleHandleW (Address: 0x40545c)
- GetOEMCP (Address: 0x405404)
- GetProcAddress (Address: 0x4053fc)
- GetSystemDefaultLangID (Address: 0x40542c)
- GetSystemDefaultLCID (Address: 0x405424)
- GetSystemDirectoryA (Address: 0x405478)
- GetSystemDirectoryW (Address: 0x405460)
- GetThreadContext (Address: 0x4054a4)
- GetThreadLocale (Address: 0x405420)
- GetTimeZoneInformation (Address: 0x40541c)
- GetUserDefaultLangID (Address: 0x405430)
- GetUserDefaultLCID (Address: 0x405428)
- GetVersionExA (Address: 0x4053f4)
- GlobalAddAtomA (Address: 0x4053d0)
- GlobalFindAtomA (Address: 0x4053cc)
- HeapAlloc (Address: 0x4053b8)
- HeapCreate (Address: 0x4053ac)
- HeapFree (Address: 0x405458)
- IsBadWritePtr (Address: 0x4053dc)
- IsDBCSLeadByte (Address: 0x40543c)
- IsDBCSLeadByteEx (Address: 0x405448)
- LoadLibraryA (Address: 0x4053f8)
- LoadLibraryW (Address: 0x405468)
- lstrcatA (Address: 0x405480)
- lstrcatW (Address: 0x405464)
- lstrcmpiA (Address: 0x4053c8)
- lstrlenA (Address: 0x40547c)
- lstrlenW (Address: 0x405484)
- MapViewOfFile (Address: 0x4053e8)
- MultiByteToWideChar (Address: 0x4053d8)
- OpenEventA (Address: 0x405440)
- ReadFile (Address: 0x405488)
- ReadProcessMemory (Address: 0x405490)
- ResumeThread (Address: 0x405498)
- SetEvent (Address: 0x405444)
- SetLastError (Address: 0x4053c0)
- SetUnhandledExceptionFilter (Address: 0x40544c)
- Sleep (Address: 0x40549c)
- SuspendThread (Address: 0x4054a0)
- TerminateProcess (Address: 0x405450)
- TlsAlloc (Address: 0x4053a8)
- TlsGetValue (Address: 0x4053b4)
- TlsSetValue (Address: 0x4053c4)
- UnmapViewOfFile (Address: 0x4053ec)
- VirtualAllocEx (Address: 0x4054a8)
- VirtualProtect (Address: 0x40546c)
- WaitForMultipleObjects (Address: 0x4054b0)
- WideCharToMultiByte (Address: 0x4053d4)
- WriteProcessMemory (Address: 0x405494)
ntdll.dll
- RtlMultiByteToUnicodeSize (Address: 0x4055c8)
- RtlOemToUnicodeN (Address: 0x4055d0)
- RtlUnicodeToMultiByteSize (Address: 0x4055cc)
- RtlUnicodeToOemN (Address: 0x4055d4)
USER32.dll
- CallNextHookEx (Address: 0x4054cc)
- CallWindowProcA (Address: 0x4054e0)
- CallWindowProcW (Address: 0x4054ec)
- CharNextA (Address: 0x405560)
- CharNextExA (Address: 0x405568)
- CharPrevA (Address: 0x40555c)
- CharPrevExA (Address: 0x405564)
- CreateDialogIndirectParamA (Address: 0x40552c)
- CreateDialogIndirectParamW (Address: 0x405508)
- CreateDialogParamA (Address: 0x405530)
- CreateDialogParamW (Address: 0x40550c)
- CreateWindowExA (Address: 0x405534)
- CreateWindowExW (Address: 0x40558c)
- DefDlgProcA (Address: 0x40551c)
- DefDlgProcW (Address: 0x405598)
- DefFrameProcA (Address: 0x405520)
- DefFrameProcW (Address: 0x40559c)
- DefMDIChildProcA (Address: 0x405518)
- DefMDIChildProcW (Address: 0x405594)
- DefWindowProcA (Address: 0x405514)
- DefWindowProcW (Address: 0x405590)
- DialogBoxIndirectParamA (Address: 0x405528)
- DialogBoxIndirectParamW (Address: 0x405504)
- DialogBoxParamA (Address: 0x405524)
- DialogBoxParamW (Address: 0x405510)
- GetClassInfoA (Address: 0x4054bc)
- GetClassInfoW (Address: 0x4054c0)
- GetClassNameA (Address: 0x4054c8)
- GetForegroundWindow (Address: 0x405580)
- GetMenuItemInfoW (Address: 0x405570)
- GetMenuStringA (Address: 0x405558)
- GetMenuStringW (Address: 0x40556c)
- GetPropA (Address: 0x4054d0)
- GetWindowLongA (Address: 0x4054d8)
- GetWindowLongW (Address: 0x4054e4)
- GetWindowTextA (Address: 0x40553c)
- GetWindowTextW (Address: 0x405578)
- IsWindowUnicode (Address: 0x4054c4)
- MessageBoxA (Address: 0x405584)
- PostMessageA (Address: 0x405550)
- PostMessageW (Address: 0x4054f4)
- RemovePropA (Address: 0x4054e8)
- SendMessageA (Address: 0x405540)
- SendMessageCallbackA (Address: 0x405544)
- SendMessageCallbackW (Address: 0x4054fc)
- SendMessageTimeoutA (Address: 0x405548)
- SendMessageTimeoutW (Address: 0x405500)
- SendMessageW (Address: 0x4054f0)
- SendNotifyMessageA (Address: 0x40554c)
- SendNotifyMessageW (Address: 0x4054f8)
- SetMenuItemInfoW (Address: 0x405574)
- SetPropA (Address: 0x4054d4)
- SetWindowLongA (Address: 0x405554)
- SetWindowLongW (Address: 0x4054dc)
- SetWindowsHookExA (Address: 0x4055a0)
- SetWindowsHookExW (Address: 0x4055a4)
- SetWindowTextA (Address: 0x405538)
- SetWindowTextW (Address: 0x405588)
- UnhookWindowsHookEx (Address: 0x4055a8)
- wsprintfA (Address: 0x40557c)
VERSION.dll
- VerQueryValueA (Address: 0x4055b0)