CNMLMCT.DLL

Description: IJ Language Monitor

Authors: Copyright CANON INC. 2000-2023

Version: 0.3.0.1

Architecture: 64-bit

Operating System: Windows NT

SHA256: debc5c01ae037bc4a4234c56d9514b3d

File Size: 397.0 KB

Uploaded At: Dec. 1, 2025, 7:24 a.m.

Views: 9

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess

Exported Functions

  • DllMain (Ordinal: 1, Address: 0xfe2c)
  • InitializePrintMonitor2 (Ordinal: 2, Address: 0xfe7c)

Imported DLLs & Functions

ADVAPI32.dll
  • ConvertStringSecurityDescriptorToSecurityDescriptorW (Address: 0x67381080)
  • CreateProcessAsUserW (Address: 0x673810b0)
  • CryptAcquireContextW (Address: 0x67381070)
  • CryptCreateHash (Address: 0x67381050)
  • CryptDeriveKey (Address: 0x67381068)
  • CryptDestroyHash (Address: 0x67381040)
  • CryptDestroyKey (Address: 0x67381048)
  • CryptEncrypt (Address: 0x67381058)
  • CryptHashData (Address: 0x67381038)
  • CryptReleaseContext (Address: 0x67381060)
  • DuplicateTokenEx (Address: 0x67381010)
  • GetTokenInformation (Address: 0x67381018)
  • GetUserNameW (Address: 0x67381000)
  • InitializeSecurityDescriptor (Address: 0x673810a0)
  • LookupAccountSidW (Address: 0x67381020)
  • OpenProcessToken (Address: 0x67381008)
  • RegCloseKey (Address: 0x67381098)
  • RegCreateKeyExW (Address: 0x67381090)
  • RegDeleteValueW (Address: 0x67381088)
  • RegOpenKeyExW (Address: 0x67381028)
  • RegQueryValueExW (Address: 0x67381030)
  • RegSetValueExW (Address: 0x67381078)
  • SetSecurityDescriptorDacl (Address: 0x673810a8)
KERNEL32.dll
  • CancelIo (Address: 0x673811a8)
  • CloseHandle (Address: 0x67381270)
  • CopyFileW (Address: 0x67381150)
  • CreateDirectoryW (Address: 0x67381108)
  • CreateEventW (Address: 0x67381290)
  • CreateFileW (Address: 0x67381160)
  • CreateMailslotW (Address: 0x673811b0)
  • CreateMutexW (Address: 0x67381130)
  • CreateProcessW (Address: 0x67381308)
  • CreateThread (Address: 0x67381298)
  • DeleteCriticalSection (Address: 0x67381260)
  • DeleteFileW (Address: 0x67381128)
  • EnterCriticalSection (Address: 0x673811c8)
  • FindClose (Address: 0x673810d0)
  • FindFirstFileW (Address: 0x673810f8)
  • FindNextFileW (Address: 0x673810c0)
  • FreeLibrary (Address: 0x67381288)
  • GetComputerNameW (Address: 0x673811e8)
  • GetCurrentProcess (Address: 0x673812e8)
  • GetCurrentProcessId (Address: 0x673812d0)
  • GetCurrentThreadId (Address: 0x673811c0)
  • GetFileAttributesW (Address: 0x673810e0)
  • GetLastError (Address: 0x673811f0)
  • GetLocalTime (Address: 0x67381198)
  • GetModuleFileNameW (Address: 0x67381100)
  • GetModuleHandleW (Address: 0x673811b8)
  • GetOverlappedResult (Address: 0x673811a0)
  • GetPrivateProfileIntW (Address: 0x67381120)
  • GetPrivateProfileStringW (Address: 0x67381110)
  • GetProcAddress (Address: 0x67381220)
  • GetSystemDefaultLangID (Address: 0x67381228)
  • GetSystemTimeAsFileTime (Address: 0x673812d8)
  • GetSystemWindowsDirectoryW (Address: 0x673810e8)
  • GetTickCount (Address: 0x67381218)
  • GetUserDefaultUILanguage (Address: 0x67381158)
  • GetVersionExW (Address: 0x67381138)
  • GlobalAlloc (Address: 0x67381178)
  • GlobalFree (Address: 0x673811e0)
  • InitializeCriticalSectionAndSpinCount (Address: 0x67381258)
  • LeaveCriticalSection (Address: 0x673811d0)
  • LoadLibraryExW (Address: 0x67381240)
  • LoadLibraryW (Address: 0x67381148)
  • LocalFree (Address: 0x67381188)
  • lstrcmpA (Address: 0x67381190)
  • lstrcmpiW (Address: 0x673811d8)
  • lstrcmpW (Address: 0x67381200)
  • lstrlenA (Address: 0x67381248)
  • lstrlenW (Address: 0x67381208)
  • MultiByteToWideChar (Address: 0x67381210)
  • OpenProcess (Address: 0x67381300)
  • OutputDebugStringA (Address: 0x673812a8)
  • QueryPerformanceCounter (Address: 0x673812c8)
  • ReadFile (Address: 0x67381310)
  • ReleaseMutex (Address: 0x67381238)
  • RemoveDirectoryW (Address: 0x673810c8)
  • ResetEvent (Address: 0x67381278)
  • RtlCaptureContext (Address: 0x673812c0)
  • RtlLookupFunctionEntry (Address: 0x673812b8)
  • RtlVirtualUnwind (Address: 0x673812b0)
  • SetEvent (Address: 0x67381280)
  • SetFileAttributesW (Address: 0x67381140)
  • SetFilePointer (Address: 0x67381168)
  • SetLastError (Address: 0x673811f8)
  • SetThreadPriority (Address: 0x673812a0)
  • SetUnhandledExceptionFilter (Address: 0x673812f8)
  • Sleep (Address: 0x67381250)
  • TerminateProcess (Address: 0x673812e0)
  • UnhandledExceptionFilter (Address: 0x673812f0)
  • VerifyVersionInfoW (Address: 0x673810d8)
  • VerSetConditionMask (Address: 0x673810f0)
  • WaitForMultipleObjects (Address: 0x67381268)
  • WaitForSingleObject (Address: 0x67381230)
  • WideCharToMultiByte (Address: 0x67381180)
  • WriteFile (Address: 0x67381170)
  • WritePrivateProfileStringW (Address: 0x67381118)
msvcrt.dll
  • __C_specific_handler (Address: 0x67381438)
  • _amsg_exit (Address: 0x67381440)
  • _errno (Address: 0x67381488)
  • _initterm (Address: 0x67381450)
  • _itow (Address: 0x67381420)
  • _time64 (Address: 0x67381480)
  • _vsnprintf (Address: 0x673814b0)
  • _vsnwprintf (Address: 0x673814c0)
  • _wcslwr (Address: 0x67381468)
  • _wstat (Address: 0x673814a0)
  • _wtoi (Address: 0x67381418)
  • _XcptFilter (Address: 0x67381460)
  • ??2@YAPEAX_K@Z (Address: 0x673814a8)
  • ??3@YAXPEAX@Z (Address: 0x67381410)
  • atoi (Address: 0x673814b8)
  • free (Address: 0x67381448)
  • malloc (Address: 0x67381458)
  • memcmp (Address: 0x673814d0)
  • memcpy (Address: 0x67381430)
  • memset (Address: 0x67381428)
  • wcschr (Address: 0x67381470)
  • wcsncmp (Address: 0x67381490)
  • wcsrchr (Address: 0x67381478)
  • wcsstr (Address: 0x67381498)
  • wcstol (Address: 0x673814c8)
PSAPI.DLL
  • EnumProcesses (Address: 0x67381330)
  • EnumProcessModules (Address: 0x67381328)
  • GetModuleBaseNameW (Address: 0x67381320)
SHELL32.dll
  • SHGetFolderPathW (Address: 0x67381340)
SPOOLSS.DLL
  • ClosePrinter (Address: 0x67381368)
  • GetJobW (Address: 0x67381350)
  • GetPrinterDataW (Address: 0x67381388)
  • GetPrinterDriverW (Address: 0x67381398)
  • GetPrinterW (Address: 0x67381370)
  • ImpersonatePrinterClient (Address: 0x67381378)
  • OpenPrinterW (Address: 0x67381390)
  • RevertToPrinterSelf (Address: 0x67381380)
  • SetJobW (Address: 0x67381358)
  • SetPortW (Address: 0x67381360)
USER32.dll
  • CharLowerBuffW (Address: 0x673813b0)
  • CharLowerW (Address: 0x673813b8)
  • CharUpperBuffA (Address: 0x673813c8)
  • LoadStringW (Address: 0x673813a8)
  • SystemParametersInfoW (Address: 0x673813c0)
USERENV.dll
  • CreateEnvironmentBlock (Address: 0x673813e0)
  • DestroyEnvironmentBlock (Address: 0x673813d8)
VERSION.dll
  • GetFileVersionInfoSizeW (Address: 0x67381400)
  • GetFileVersionInfoW (Address: 0x673813f0)
  • VerQueryValueW (Address: 0x673813f8)