Generated by JEB on 2019/08/01

PE: C:\Windows\SysWOW64\KBDJPN.DLL Base=0x52A00000 SHA-256=195119242A87DF7D63A880CAECB4A8CE6CDD78FEAAC12E885880B6B3D7B566B3
PDB: wkbdjpn.pdb GUID={11399785-ACA5-2453-041DBEB4A3C6DD35} Age=2

69 located named symbols:
0x52A04014: "__stdcall _imp__RtlAppendUnicodeStringToString" __imp__RtlAppendUnicodeStringToString@8
0x52A04044: "__cdecl _IMPORT_DESCRIPTOR_ntdll" __IMPORT_DESCRIPTOR_ntdll
0x52A03688: " JPN" ??_C@_19JMDAGNIF@?$AA?5?$AAJ?$AAP?$AAN?$AA?$AA@
0x52A04000: "__stdcall _imp__LdrDisableThreadCalloutsForDll" __imp__LdrDisableThreadCalloutsForDll@4
0x52A03348: "__cdecl __security_cookie" ___security_cookie
0x52A01A71: "__fastcall __security_check_cookie" @__security_check_cookie@4
0x52A0178E: "__stdcall _DllMainCRTStartupForGS" __DllMainCRTStartupForGS@12
0x52A01495: "__stdcall KbdLayerRealDllFile" _KbdLayerRealDllFile@20
0x52A018B8: "__cdecl __report_rangecheckfailure" ___report_rangecheckfailure
0x52A04028: "__stdcall _imp__RtlInitUnicodeString" __imp__RtlInitUnicodeString@8
0x52A034D0: "LayerDriver" ??_C@_1BI@LGDPBHJM@?$AAL?$AAa?$AAy?$AAe?$AAr?$AAD?$AAr?$AAi?$AAv?$AAe?$AAr?$AA?$AA@
0x52A04040: "__cdecl __guard_check_icall_fptr" ___guard_check_icall_fptr
0x52A03694: " KOR" ??_C@_19LINFDFHC@?$AA?5?$AAK?$AAO?$AAR?$AA?$AA@
0x52A035B8: "kbd101a.dll" ??_C@_1BI@OADNEPHB@?$AAk?$AAb?$AAd?$AA1?$AA0?$AA1?$AAa?$AA?4?$AAd?$AAl?$AAl?$AA?$AA@
0x52A01702: "__stdcall KbdLayerMultiDescriptor" _KbdLayerMultiDescriptor@8
0x52A0401C: "__stdcall _imp__RtlAppendUnicodeToString" __imp__RtlAppendUnicodeToString@8
0x52A01000: "__stdcall StringCchCopyW" _StringCchCopyW@12
0x52A011AD: "__stdcall KbdLayerRealDllFileNT4" _KbdLayerRealDllFileNT4@4
0x52A01A6B: "__stdcall RtlUnhandledExceptionFilter" _RtlUnhandledExceptionFilter@4
0x52A03500: "\Registry\Machine\System\Current" ??_C@_1LI@KCBBHCBI@?$AA?2?$AAR?$AAe?$AAg?$AAi?$AAs?$AAt?$AAr?$AAy?$AA?2?$AAM?$AAa?$AAc?$AAh?$AAi?$AAn?$AAe?$AA?2?$AAS?$AAy?$AAs?$AAt?$AAe?$AAm?$AA?2?$AAC?$AAu?$AAr?$AAr?$AAe?$AAn?$AAt@
0x52A035D0: "\Registry\Machine\System\Current" ??_C@_1LI@IGPECKOP@?$AA?2?$AAR?$AAe?$AAg?$AAi?$AAs?$AAt?$AAr?$AAy?$AA?2?$AAM?$AAa?$AAc?$AAh?$AAi?$AAn?$AAe?$AA?2?$AAS?$AAy?$AAs?$AAt?$AAe?$AAm?$AA?2?$AAC?$AAu?$AAr?$AAr?$AAe?$AAn?$AAt@
0x52A03438: "\Registry\Machine\System\Current" ??_C@_1JA@FCPGJCDI@?$AA?2?$AAR?$AAe?$AAg?$AAi?$AAs?$AAt?$AAr?$AAy?$AA?2?$AAM?$AAa?$AAc?$AAh?$AAi?$AAn?$AAe?$AA?2?$AAS?$AAy?$AAs?$AAt?$AAe?$AAm?$AA?2?$AAC?$AAu?$AAr?$AAr?$AAe?$AAn?$AAt@
0x52A02D68: "__cdecl KbdTables101" _KbdTables101
0x52A0192B: "__cdecl __security_init_cookie" ___security_init_cookie
0x52A01A40: "__cdecl _aullshr" __aullshr
0x52A0195E: "__cdecl __security_init_cookie_ex" ___security_init_cookie_ex
0x52A0334C: "__cdecl __security_cookie_complement" ___security_cookie_complement
0x52A03430: "" ??_C@_11LOCGONAA@?$AA?$AA@
0x52A01A5F: "__stdcall NtTerminateProcess" _NtTerminateProcess@8
0x52A04018: "__stdcall _imp__NtEnumerateValueKey" __imp__NtEnumerateValueKey@24
0x52A04030: "__stdcall _imp__NtClose" __imp__NtClose@4
0x52A04010: "__stdcall _imp__RtlAnsiStringToUnicodeString" __imp__RtlAnsiStringToUnicodeString@12
0x52A04020: "__stdcall _imp__RtlIntegerToChar" __imp__RtlIntegerToChar@16
0x52A01A81: "__fastcall _guard_check_icall_nop" @_guard_check_icall_nop@4
0x52A04008: "__stdcall _imp__RtlCaptureContext" __imp__RtlCaptureContext@4
0x52A034E8: "kbd101.dll" ??_C@_1BG@OMEMBNIJ@?$AAk?$AAb?$AAd?$AA1?$AA0?$AA1?$AA?4?$AAd?$AAl?$AAl?$AA?$AA@
0x52A0400C: "__stdcall _imp__RtlUnhandledExceptionFilter" __imp__RtlUnhandledExceptionFilter@4
0x52A018C6: "__cdecl __report_securityfailure" ___report_securityfailure
0x52A01095: "__stdcall GetRealDllFileNameWorker" _GetRealDllFileNameWorker@8
0x52A01542: "__stdcall UnpackDynamicLayoutInformation" _UnpackDynamicLayoutInformation@12
0x52A017C9: "__cdecl __report_gsfailure" ___report_gsfailure
0x52A016F6: "__stdcall KbdNlsLayerDescriptor" _KbdNlsLayerDescriptor@0
0x52A04038: "__stdcall _imp__NtQueryValueKey" __imp__NtQueryValueKey@24
0x52A02F00: "__cdecl _load_config_used" __load_config_used
0x52A0402C: "__stdcall _imp__RtlCopyUnicodeString" __imp__RtlCopyUnicodeString@8
0x52A0403C: ntdll_NULL_THUNK_DATA
0x52A036A0: "\Registry\Machine\System\Current" ??_C@_1KG@CFOFJFJB@?$AA?2?$AAR?$AAe?$AAg?$AAi?$AAs?$AAt?$AAr?$AAy?$AA?2?$AAM?$AAa?$AAc?$AAh?$AAi?$AAn?$AAe?$AA?2?$AAS?$AAy?$AAs?$AAt?$AAe?$AAm?$AA?2?$AAC?$AAu?$AAr?$AAr?$AAe?$AAn?$AAt@
0x52A016EA: "__stdcall KbdLayerDescriptor" _KbdLayerDescriptor@0
0x52A02ED8: "__cdecl KbdNlsTables101" _KbdNlsTables101
0x52A04024: "__stdcall _imp__NtOpenKey" __imp__NtOpenKey@12
0x52A015C3: "__stdcall EnumDynamicSwitchingLayouts" _EnumDynamicSwitchingLayouts@12
0x52A017AE: "__cdecl __raise_securityfailure" ___raise_securityfailure
0x52A04004: "__stdcall _imp__NtTerminateProcess" __imp__NtTerminateProcess@8
0x52A011C3: "__stdcall KbdLayerRealDllFileForWBT" _KbdLayerRealDllFileForWBT@20
0x52A01A65: "__stdcall RtlCaptureContext" _RtlCaptureContext@4
0x52A04034: "__cdecl _imp__wcschr" __imp__wcschr
0x52A04058: "__cdecl _NULL_IMPORT_DESCRIPTOR" __NULL_IMPORT_DESCRIPTOR

[JEB Decompiler by PNF Software]