> Dump of file C:\Program Files\SOYO\HW Monitor\itevio. dll
...
ordinal hint RVA name
4 0 0000158D Inb
3 1 0000157C Outb
2 2 000012BF ReadReg
1 3 000012A8 WriteReg
5 4 0000A17C ___CPPdebugHook
What William said is true, there is not much you can find out
unless you don't spend a lot of time "spying" the calls and/or
dissasembling it. This can be illegal though.
But here is something than can save you some time (but not solve the
problem): Dump of file C:\Program Files\SOYO\HW Monitor\itevio. dll
This tells me the DLL has something to do with a "Hardware Monitor"
for some hardware produced by SOYO (
http://www.soyousa.com/).
Assumption: a motherboard.
Then I look at the function names:
Inb, Outb = in and out a byte to/from a port.
Most probable signatures:
int Outb( unsigned short port, int databyte );
int Inb( unsigned short port );
ReadReg, WriteReg = read and write some registry values
No clue about signatures.
But the main point is this: the functions are pretty low level,
even if you will figure out the parameters, there is no much use.
You have to figure out how to control the hardware using such low
level access (port and registryu level).
I can assure you, without documentation it may be not only difficult,
but also risky (not for you, for the motherboard :-)
Mihai