ntleah.dll

Description:

Authors:

Version:

Architecture: 32-bit

Operating System:

SHA256: 2c71a207eb8b3e32b0cb91ab26df0f10

File Size: 18.0 KB

Uploaded At: March 28, 2026, 12:55 a.m.

Views: 16

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: VirtualAllocEx, CreateRemoteThread, WriteProcessMemory

Exported Functions

No exported functions.

Imported DLLs & Functions

GDI32.dll
  • CreateFontIndirectA (Address: 0x4055bc)
  • CreateFontIndirectW (Address: 0x4055c0)
  • EnumFontFamiliesExA (Address: 0x4055b8)
KERNEL32.dll
  • CloseHandle (Address: 0x4053f0)
  • CompareStringA (Address: 0x405410)
  • CreateEventA (Address: 0x40548c)
  • CreateFileA (Address: 0x40540c)
  • CreateFileMappingA (Address: 0x4053e4)
  • CreateFileW (Address: 0x405474)
  • CreateProcessA (Address: 0x405414)
  • CreateProcessW (Address: 0x405418)
  • CreateRemoteThread (Address: 0x4054ac)
  • CreateThread (Address: 0x4053b0)
  • ExitProcess (Address: 0x405454)
  • FlushInstructionCache (Address: 0x405470)
  • GetACP (Address: 0x405400)
  • GetCommandLineA (Address: 0x405434)
  • GetCommandLineW (Address: 0x405438)
  • GetCPInfo (Address: 0x405408)
  • GetCurrentThreadId (Address: 0x4054b4)
  • GetLastError (Address: 0x4053bc)
  • GetModuleHandleA (Address: 0x4053e0)
  • GetModuleHandleW (Address: 0x40545c)
  • GetOEMCP (Address: 0x405404)
  • GetProcAddress (Address: 0x4053fc)
  • GetSystemDefaultLangID (Address: 0x40542c)
  • GetSystemDefaultLCID (Address: 0x405424)
  • GetSystemDirectoryA (Address: 0x405478)
  • GetSystemDirectoryW (Address: 0x405460)
  • GetThreadContext (Address: 0x4054a4)
  • GetThreadLocale (Address: 0x405420)
  • GetTimeZoneInformation (Address: 0x40541c)
  • GetUserDefaultLangID (Address: 0x405430)
  • GetUserDefaultLCID (Address: 0x405428)
  • GetVersionExA (Address: 0x4053f4)
  • GlobalAddAtomA (Address: 0x4053d0)
  • GlobalFindAtomA (Address: 0x4053cc)
  • HeapAlloc (Address: 0x4053b8)
  • HeapCreate (Address: 0x4053ac)
  • HeapFree (Address: 0x405458)
  • IsBadWritePtr (Address: 0x4053dc)
  • IsDBCSLeadByte (Address: 0x40543c)
  • IsDBCSLeadByteEx (Address: 0x405448)
  • LoadLibraryA (Address: 0x4053f8)
  • LoadLibraryW (Address: 0x405468)
  • lstrcatA (Address: 0x405480)
  • lstrcatW (Address: 0x405464)
  • lstrcmpiA (Address: 0x4053c8)
  • lstrlenA (Address: 0x40547c)
  • lstrlenW (Address: 0x405484)
  • MapViewOfFile (Address: 0x4053e8)
  • MultiByteToWideChar (Address: 0x4053d8)
  • OpenEventA (Address: 0x405440)
  • ReadFile (Address: 0x405488)
  • ReadProcessMemory (Address: 0x405490)
  • ResumeThread (Address: 0x405498)
  • SetEvent (Address: 0x405444)
  • SetLastError (Address: 0x4053c0)
  • SetUnhandledExceptionFilter (Address: 0x40544c)
  • Sleep (Address: 0x40549c)
  • SuspendThread (Address: 0x4054a0)
  • TerminateProcess (Address: 0x405450)
  • TlsAlloc (Address: 0x4053a8)
  • TlsGetValue (Address: 0x4053b4)
  • TlsSetValue (Address: 0x4053c4)
  • UnmapViewOfFile (Address: 0x4053ec)
  • VirtualAllocEx (Address: 0x4054a8)
  • VirtualProtect (Address: 0x40546c)
  • WaitForMultipleObjects (Address: 0x4054b0)
  • WideCharToMultiByte (Address: 0x4053d4)
  • WriteProcessMemory (Address: 0x405494)
ntdll.dll
  • RtlMultiByteToUnicodeSize (Address: 0x4055c8)
  • RtlOemToUnicodeN (Address: 0x4055d0)
  • RtlUnicodeToMultiByteSize (Address: 0x4055cc)
  • RtlUnicodeToOemN (Address: 0x4055d4)
USER32.dll
  • CallNextHookEx (Address: 0x4054cc)
  • CallWindowProcA (Address: 0x4054e0)
  • CallWindowProcW (Address: 0x4054ec)
  • CharNextA (Address: 0x405560)
  • CharNextExA (Address: 0x405568)
  • CharPrevA (Address: 0x40555c)
  • CharPrevExA (Address: 0x405564)
  • CreateDialogIndirectParamA (Address: 0x40552c)
  • CreateDialogIndirectParamW (Address: 0x405508)
  • CreateDialogParamA (Address: 0x405530)
  • CreateDialogParamW (Address: 0x40550c)
  • CreateWindowExA (Address: 0x405534)
  • CreateWindowExW (Address: 0x40558c)
  • DefDlgProcA (Address: 0x40551c)
  • DefDlgProcW (Address: 0x405598)
  • DefFrameProcA (Address: 0x405520)
  • DefFrameProcW (Address: 0x40559c)
  • DefMDIChildProcA (Address: 0x405518)
  • DefMDIChildProcW (Address: 0x405594)
  • DefWindowProcA (Address: 0x405514)
  • DefWindowProcW (Address: 0x405590)
  • DialogBoxIndirectParamA (Address: 0x405528)
  • DialogBoxIndirectParamW (Address: 0x405504)
  • DialogBoxParamA (Address: 0x405524)
  • DialogBoxParamW (Address: 0x405510)
  • GetClassInfoA (Address: 0x4054bc)
  • GetClassInfoW (Address: 0x4054c0)
  • GetClassNameA (Address: 0x4054c8)
  • GetForegroundWindow (Address: 0x405580)
  • GetMenuItemInfoW (Address: 0x405570)
  • GetMenuStringA (Address: 0x405558)
  • GetMenuStringW (Address: 0x40556c)
  • GetPropA (Address: 0x4054d0)
  • GetWindowLongA (Address: 0x4054d8)
  • GetWindowLongW (Address: 0x4054e4)
  • GetWindowTextA (Address: 0x40553c)
  • GetWindowTextW (Address: 0x405578)
  • IsWindowUnicode (Address: 0x4054c4)
  • MessageBoxA (Address: 0x405584)
  • PostMessageA (Address: 0x405550)
  • PostMessageW (Address: 0x4054f4)
  • RemovePropA (Address: 0x4054e8)
  • SendMessageA (Address: 0x405540)
  • SendMessageCallbackA (Address: 0x405544)
  • SendMessageCallbackW (Address: 0x4054fc)
  • SendMessageTimeoutA (Address: 0x405548)
  • SendMessageTimeoutW (Address: 0x405500)
  • SendMessageW (Address: 0x4054f0)
  • SendNotifyMessageA (Address: 0x40554c)
  • SendNotifyMessageW (Address: 0x4054f8)
  • SetMenuItemInfoW (Address: 0x405574)
  • SetPropA (Address: 0x4054d4)
  • SetWindowLongA (Address: 0x405554)
  • SetWindowLongW (Address: 0x4054dc)
  • SetWindowsHookExA (Address: 0x4055a0)
  • SetWindowsHookExW (Address: 0x4055a4)
  • SetWindowTextA (Address: 0x405538)
  • SetWindowTextW (Address: 0x405588)
  • UnhookWindowsHookEx (Address: 0x4055a8)
  • wsprintfA (Address: 0x40557c)
VERSION.dll
  • VerQueryValueA (Address: 0x4055b0)