windows-nt/Source/XPSP1/NT/com/oleutest/balls/cballs.reg

98 lines
4.8 KiB
Reg
Raw Permalink Normal View History

2020-09-26 03:20:57 -05:00
REGEDIT
HKEY_CLASSES_ROOT\CLSID
HKEY_CLASSES_ROOT\Interface
HKEY_CLASSES_ROOT\CLSID\{00000138-0001-0008-C000-000000000046} = CPrxyBalls
HKEY_CLASSES_ROOT\CLSID\{00000138-0001-0008-C000-000000000046}\InprocServer32 = d:\sur1173\dump\iballs.dll
HKEY_CLASSES_ROOT\Interface\{00000138-0001-0008-C000-000000000046} = IBalls
HKEY_CLASSES_ROOT\Interface\{00000138-0001-0008-C000-000000000046}\ProxyStubClsid32 = {00000138-0001-0008-C000-000000000046}
HKEY_CLASSES_ROOT\Interface\{00000139-0001-0008-C000-000000000046} = ICube
HKEY_CLASSES_ROOT\Interface\{00000139-0001-0008-C000-000000000046}\ProxyStubClsid32 = {00000138-0001-0008-C000-000000000046}
HKEY_CLASSES_ROOT\Interface\{00000136-0001-0008-C000-000000000046} = ILoops
HKEY_CLASSES_ROOT\Interface\{00000136-0001-0008-C000-000000000046}\ProxyStubClsid32 = {00000138-0001-0008-C000-000000000046}
HKEY_CLASSES_ROOT\Interface\{00000137-0001-0008-C000-000000000046} = IRpcTest
HKEY_CLASSES_ROOT\Interface\{00000137-0001-0008-C000-000000000046}\ProxyStubClsid32 = {00000138-0001-0008-C000-000000000046}
HKEY_CLASSES_ROOT\CLSID\{0000013a-0001-0008-C000-000000000046} = CBallsClassFactory
HKEY_CLASSES_ROOT\CLSID\{0000013a-0001-0008-C000-000000000046}\LocalServer32 = d:\sur1173\dump\ballsrv.exe
HKEY_CLASSES_ROOT\CLSID\{0000013a-0001-0008-C000-000000000046}\ProgID = ProgID60
HKEY_CLASSES_ROOT\CLSID\{0000013b-0001-0008-C000-000000000046} = CCubesClassFactory
HKEY_CLASSES_ROOT\CLSID\{0000013b-0001-0008-C000-000000000046}\LocalServer32 = d:\sur1173\dump\cubesrv.exe
HKEY_CLASSES_ROOT\CLSID\{0000013c-0001-0008-C000-000000000046} = CLoopClassFactory
HKEY_CLASSES_ROOT\CLSID\{0000013c-0001-0008-C000-000000000046}\LocalServer32 = d:\sur1173\dump\loopsrv.exe
HKEY_CLASSES_ROOT\CLSID\{0000013d-0001-0008-C000-000000000046} = CRpcTestClassFactory
HKEY_CLASSES_ROOT\CLSID\{0000013d-0001-0008-C000-000000000046}\LocalServer32 = d:\sur1173\dump\rpctst.exe
HKEY_CLASSES_ROOT\CLSID\{0000013e-0001-0008-C000-000000000046} = ICubesHandCraftedProxy
HKEY_CLASSES_ROOT\CLSID\{0000013e-0001-0008-C000-000000000046}\InprocServer32 = d:\sur1173\dump\myproxy.dll
HKEY_CLASSES_ROOT\CLSID\{00000140-0000-0008-C000-000000000046} = CQueryInterface
HKEY_CLASSES_ROOT\CLSID\{00000140-0000-0008-C000-000000000046}\LocalServer32 = d:\sur1173\dump\qisrv.exe
HKEY_CLASSES_ROOT\CLSID\{00000140-0000-0008-C000-000000000046}\InprocServer32 = d:\sur1173\dump\qisrv.dll
HKEY_CLASSES_ROOT\CLSID\{00000141-0000-0008-C000-000000000046} = CQueryInterfaceHandler
HKEY_CLASSES_ROOT\CLSID\{00000141-0000-0008-C000-000000000046}\LocalServer32 = d:\sur1173\dump\qisrv.exe
HKEY_CLASSES_ROOT\CLSID\{00000141-0000-0008-C000-000000000046}\InprocHandler32 = ole32.dll
HKEY_CLASSES_ROOT\.ut4 = ProgID50
HKEY_CLASSES_ROOT\.ut5 = ProgID51
HKEY_CLASSES_ROOT\.ut6 = ProgID52
HKEY_CLASSES_ROOT\.ut7 = ProgID53
HKEY_CLASSES_ROOT\.ut8 = ProgID54
HKEY_CLASSES_ROOT\.ut9 = ProgID55
HKEY_CLASSES_ROOT\.bls = ProgID60
HKEY_CLASSES_ROOT\CLSID\{99999999-0000-0008-C000-000000000050} = SDI
HKEY_CLASSES_ROOT\CLSID\{99999999-0000-0008-C000-000000000050}\LocalServer32 = d:\sur1173\dump\sdi.exe
HKEY_CLASSES_ROOT\CLSID\{99999999-0000-0008-C000-000000000051} = MDI
HKEY_CLASSES_ROOT\CLSID\{99999999-0000-0008-C000-000000000051}\LocalServer32 = d:\sur1173\dump\mdi.exe
HKEY_CLASSES_ROOT\CLSID\{99999999-0000-0008-C000-000000000052} = InprocNoRegister
HKEY_CLASSES_ROOT\CLSID\{99999999-0000-0008-C000-000000000052}\InprocServer32 = d:\sur1173\dump\dlltest.dll
HKEY_CLASSES_ROOT\CLSID\{99999999-0000-0008-C000-000000000053} = InprocRegister
HKEY_CLASSES_ROOT\CLSID\{99999999-0000-0008-C000-000000000053}\InprocServer32 = d:\sur1173\dump\dlltest.dll
HKEY_CLASSES_ROOT\CLSID\{99999999-0000-0008-C000-000000000054} = InprocRegister
HKEY_CLASSES_ROOT\CLSID\{99999999-0000-0008-C000-000000000054}\TreatAs = {99999999-0000-0008-C000-000000000050}
HKEY_CLASSES_ROOT\CLSID\{99999999-0000-0008-C000-000000000055} = MDI
HKEY_CLASSES_ROOT\CLSID\{99999999-0000-0008-C000-000000000055}\LocalServer32 = d:\sur1173\dump\db.exe
HKEY_CLASSES_ROOT\CLSID\{99999999-0000-0008-C000-000000000055}\ActivateAtBits = Y
HKEY_CLASSES_ROOT\ProgID50 = objact sdi
HKEY_CLASSES_ROOT\ProgID50\CLSID = {99999999-0000-0008-C000-000000000050}
HKEY_CLASSES_ROOT\ProgID51 = objact mdi
HKEY_CLASSES_ROOT\ProgID51\CLSID = {99999999-0000-0008-C000-000000000051}
HKEY_CLASSES_ROOT\ProgID52 = objact dll
HKEY_CLASSES_ROOT\ProgID52\CLSID = {99999999-0000-0008-C000-000000000052}
HKEY_CLASSES_ROOT\ProgID53 = objact dll reg
HKEY_CLASSES_ROOT\ProgID53\CLSID = {99999999-0000-0008-C000-000000000053}
HKEY_CLASSES_ROOT\ProgID54 = objact dll reg
HKEY_CLASSES_ROOT\ProgID54\CLSID = {99999999-0000-0008-C000-000000000054}
HKEY_CLASSES_ROOT\ProgID55 = remote activation
HKEY_CLASSES_ROOT\ProgID55\CLSID = {99999999-0000-0008-C000-000000000055}
HKEY_CLASSES_ROOT\ProgID60 = CLSIDFromProgID test
HKEY_CLASSES_ROOT\ProgID60\CLSID = {0000013a-0001-0008-C000-000000000046}