Generated by JEB on 2019/08/01

PE: C:\Windows\SysWOW64\KBDKOR.DLL Base=0x52A00000 SHA-256=3C286508B24166427B760EE6E3439840C13D80DA700A7F2830DB5A69A0655456
PDB: wkbdkor.pdb GUID={57F856BD-5681-682A-3AA2795723AA3C63} Age=2

69 located named symbols:
0x52A04014: "__stdcall _imp__RtlAppendUnicodeStringToString" __imp__RtlAppendUnicodeStringToString@8
0x52A04044: "__cdecl _IMPORT_DESCRIPTOR_ntdll" __IMPORT_DESCRIPTOR_ntdll
0x52A034C8: " JPN" ??_C@_19JMDAGNIF@?$AA?5?$AAJ?$AAP?$AAN?$AA?$AA@
0x52A04000: "__stdcall _imp__LdrDisableThreadCalloutsForDll" __imp__LdrDisableThreadCalloutsForDll@4
0x52A03180: "__cdecl __security_cookie" ___security_cookie
0x52A01A51: "__fastcall __security_check_cookie" @__security_check_cookie@4
0x52A0176A: "__stdcall _DllMainCRTStartupForGS" __DllMainCRTStartupForGS@12
0x52A01495: "__stdcall KbdLayerRealDllFile" _KbdLayerRealDllFile@20
0x52A01894: "__cdecl __report_rangecheckfailure" ___report_rangecheckfailure
0x52A04028: "__stdcall _imp__RtlInitUnicodeString" __imp__RtlInitUnicodeString@8
0x52A03310: "LayerDriver" ??_C@_1BI@LGDPBHJM@?$AAL?$AAa?$AAy?$AAe?$AAr?$AAD?$AAr?$AAi?$AAv?$AAe?$AAr?$AA?$AA@
0x52A04040: "__cdecl __guard_check_icall_fptr" ___guard_check_icall_fptr
0x52A034D4: " KOR" ??_C@_19LINFDFHC@?$AA?5?$AAK?$AAO?$AAR?$AA?$AA@
0x52A033F8: "kbd101a.dll" ??_C@_1BI@OADNEPHB@?$AAk?$AAb?$AAd?$AA1?$AA0?$AA1?$AAa?$AA?4?$AAd?$AAl?$AAl?$AA?$AA@
0x52A01702: "__stdcall KbdLayerMultiDescriptor" _KbdLayerMultiDescriptor@8
0x52A0401C: "__stdcall _imp__RtlAppendUnicodeToString" __imp__RtlAppendUnicodeToString@8
0x52A01000: "__stdcall StringCchCopyW" _StringCchCopyW@12
0x52A011AD: "__stdcall KbdLayerRealDllFileNT4" _KbdLayerRealDllFileNT4@4
0x52A01A4B: "__stdcall RtlUnhandledExceptionFilter" _RtlUnhandledExceptionFilter@4
0x52A03340: "\Registry\Machine\System\Current" ??_C@_1LI@KCBBHCBI@?$AA?2?$AAR?$AAe?$AAg?$AAi?$AAs?$AAt?$AAr?$AAy?$AA?2?$AAM?$AAa?$AAc?$AAh?$AAi?$AAn?$AAe?$AA?2?$AAS?$AAy?$AAs?$AAt?$AAe?$AAm?$AA?2?$AAC?$AAu?$AAr?$AAr?$AAe?$AAn?$AAt@
0x52A02C38: "__cdecl KbdTables101a" _KbdTables101a
0x52A03410: "\Registry\Machine\System\Current" ??_C@_1LI@IGPECKOP@?$AA?2?$AAR?$AAe?$AAg?$AAi?$AAs?$AAt?$AAr?$AAy?$AA?2?$AAM?$AAa?$AAc?$AAh?$AAi?$AAn?$AAe?$AA?2?$AAS?$AAy?$AAs?$AAt?$AAe?$AAm?$AA?2?$AAC?$AAu?$AAr?$AAr?$AAe?$AAn?$AAt@
0x52A03278: "\Registry\Machine\System\Current" ??_C@_1JA@FCPGJCDI@?$AA?2?$AAR?$AAe?$AAg?$AAi?$AAs?$AAt?$AAr?$AAy?$AA?2?$AAM?$AAa?$AAc?$AAh?$AAi?$AAn?$AAe?$AA?2?$AAS?$AAy?$AAs?$AAt?$AAe?$AAm?$AA?2?$AAC?$AAu?$AAr?$AAr?$AAe?$AAn?$AAt@
0x52A01907: "__cdecl __security_init_cookie" ___security_init_cookie
0x52A01A20: "__cdecl _aullshr" __aullshr
0x52A0193A: "__cdecl __security_init_cookie_ex" ___security_init_cookie_ex
0x52A03184: "__cdecl __security_cookie_complement" ___security_cookie_complement
0x52A03270: "" ??_C@_11LOCGONAA@?$AA?$AA@
0x52A01A3F: "__stdcall NtTerminateProcess" _NtTerminateProcess@8
0x52A04018: "__stdcall _imp__NtEnumerateValueKey" __imp__NtEnumerateValueKey@24
0x52A04030: "__stdcall _imp__NtClose" __imp__NtClose@4
0x52A04010: "__stdcall _imp__RtlAnsiStringToUnicodeString" __imp__RtlAnsiStringToUnicodeString@12
0x52A04020: "__stdcall _imp__RtlIntegerToChar" __imp__RtlIntegerToChar@16
0x52A01A61: "__fastcall _guard_check_icall_nop" @_guard_check_icall_nop@4
0x52A04008: "__stdcall _imp__RtlCaptureContext" __imp__RtlCaptureContext@4
0x52A03328: "kbd101.dll" ??_C@_1BG@OMEMBNIJ@?$AAk?$AAb?$AAd?$AA1?$AA0?$AA1?$AA?4?$AAd?$AAl?$AAl?$AA?$AA@
0x52A0400C: "__stdcall _imp__RtlUnhandledExceptionFilter" __imp__RtlUnhandledExceptionFilter@4
0x52A018A2: "__cdecl __report_securityfailure" ___report_securityfailure
0x52A01095: "__stdcall GetRealDllFileNameWorker" _GetRealDllFileNameWorker@8
0x52A01542: "__stdcall UnpackDynamicLayoutInformation" _UnpackDynamicLayoutInformation@12
0x52A017A5: "__cdecl __report_gsfailure" ___report_gsfailure
0x52A016F6: "__stdcall KbdNlsLayerDescriptor" _KbdNlsLayerDescriptor@0
0x52A04038: "__stdcall _imp__NtQueryValueKey" __imp__NtQueryValueKey@24
0x52A02D50: "__cdecl _load_config_used" __load_config_used
0x52A0402C: "__stdcall _imp__RtlCopyUnicodeString" __imp__RtlCopyUnicodeString@8
0x52A0403C: ntdll_NULL_THUNK_DATA
0x52A034E0: "\Registry\Machine\System\Current" ??_C@_1KG@CFOFJFJB@?$AA?2?$AAR?$AAe?$AAg?$AAi?$AAs?$AAt?$AAr?$AAy?$AA?2?$AAM?$AAa?$AAc?$AAh?$AAi?$AAn?$AAe?$AA?2?$AAS?$AAy?$AAs?$AAt?$AAe?$AAm?$AA?2?$AAC?$AAu?$AAr?$AAr?$AAe?$AAn?$AAt@
0x52A016EA: "__stdcall KbdLayerDescriptor" _KbdLayerDescriptor@0
0x52A02D28: "__cdecl KbdNlsTables101a" _KbdNlsTables101a
0x52A04024: "__stdcall _imp__NtOpenKey" __imp__NtOpenKey@12
0x52A015C3: "__stdcall EnumDynamicSwitchingLayouts" _EnumDynamicSwitchingLayouts@12
0x52A0178A: "__cdecl __raise_securityfailure" ___raise_securityfailure
0x52A04004: "__stdcall _imp__NtTerminateProcess" __imp__NtTerminateProcess@8
0x52A011C3: "__stdcall KbdLayerRealDllFileForWBT" _KbdLayerRealDllFileForWBT@20
0x52A01A45: "__stdcall RtlCaptureContext" _RtlCaptureContext@4
0x52A04034: "__cdecl _imp__wcschr" __imp__wcschr
0x52A04058: "__cdecl _NULL_IMPORT_DESCRIPTOR" __NULL_IMPORT_DESCRIPTOR

[JEB Decompiler by PNF Software]