)
Call Windows VMM 16-bit entry point with:
AX = function number
---registry functions---
0100h "RegOpenKey"
STACK: DWORD -> DWORD for returned key handle
DWORD -> ASCIZ registry key name
DWORD HKEY (see #02644)
0101h "RegCreateKey"
STACK: DWORD -> DWORD for returned key handle
DWORD -> ASCIZ registry key name
DWORD HKEY (see #02644)
0102h "RegCloseKey"
STACK: DWORD key handle from RegOpenKey or RegCreateKey
0103h "RegDeleteKey"
STACK: DWORD -> ASCIZ registry key name
DWORD HKEY (see #02644)
0104h "RegSetValue"
STACK: DWORD ???
DWORD -> ???
DWORD ???
DWORD -> ???
DWORD HKEY (see #02644)
0105h "RegQueryValue"
STACK: DWORD -> DWORD for ???
DWORD -> ASCIZ ???
DWORD -> ASCIZ ???
DWORD HKEY (see #02644)
0106h "RegEnumKey"
STACK: DWORD ???
DWORD -> ASCIZ ???
DWORD ???
DWORD HKEY (see #02644)
0107h "RegDeleteValue"
0108h "RegEnumValue"
STACK: DWORD -> DWORD for ???
DWORD -> BYTE ???
DWORD -> DWORD for ???
DWORD -> DWORD for ???
DWORD -> DWORD for ???
DWORD -> ASCIZ ???
DWORD ???
DWORD HKEY (see #02644)
0109h "RegQueryValueEx"
010Ah "RegSetValueEx"
010Bh "RegFlushKey"
010Ch "RegLoadKey"
010Dh "RegUnLoadKey"
010Eh "RegSaveKey"
010Fh "RegRestore"
0110h "RegRemapPreDefKey"
Return: parameters popped from stack
DX:AX = return value