Leaked source code of windows server 2003
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
|
|
REGEDIT HKEY_CLASSES_ROOT\CLSID HKEY_CLASSES_ROOT\Interface
HKEY_CLASSES_ROOT\CLSID\{00000138-0001-0008-C000-000000000046} = CPrxyBalls HKEY_CLASSES_ROOT\CLSID\{00000138-0001-0008-C000-000000000046}\InprocServer32 = d:\sur1173\dump\iballs.dll
HKEY_CLASSES_ROOT\Interface\{00000138-0001-0008-C000-000000000046} = IBalls HKEY_CLASSES_ROOT\Interface\{00000138-0001-0008-C000-000000000046}\ProxyStubClsid32 = {00000138-0001-0008-C000-000000000046}
HKEY_CLASSES_ROOT\Interface\{00000139-0001-0008-C000-000000000046} = ICube HKEY_CLASSES_ROOT\Interface\{00000139-0001-0008-C000-000000000046}\ProxyStubClsid32 = {00000138-0001-0008-C000-000000000046}
HKEY_CLASSES_ROOT\Interface\{00000136-0001-0008-C000-000000000046} = ILoops HKEY_CLASSES_ROOT\Interface\{00000136-0001-0008-C000-000000000046}\ProxyStubClsid32 = {00000138-0001-0008-C000-000000000046}
HKEY_CLASSES_ROOT\Interface\{00000137-0001-0008-C000-000000000046} = IRpcTest HKEY_CLASSES_ROOT\Interface\{00000137-0001-0008-C000-000000000046}\ProxyStubClsid32 = {00000138-0001-0008-C000-000000000046}
HKEY_CLASSES_ROOT\CLSID\{0000013a-0001-0008-C000-000000000046} = CBallsClassFactory HKEY_CLASSES_ROOT\CLSID\{0000013a-0001-0008-C000-000000000046}\LocalServer32 = d:\sur1173\dump\ballsrv.exe HKEY_CLASSES_ROOT\CLSID\{0000013a-0001-0008-C000-000000000046}\ProgID = ProgID60
HKEY_CLASSES_ROOT\CLSID\{0000013b-0001-0008-C000-000000000046} = CCubesClassFactory HKEY_CLASSES_ROOT\CLSID\{0000013b-0001-0008-C000-000000000046}\LocalServer32 = d:\sur1173\dump\cubesrv.exe
HKEY_CLASSES_ROOT\CLSID\{0000013c-0001-0008-C000-000000000046} = CLoopClassFactory HKEY_CLASSES_ROOT\CLSID\{0000013c-0001-0008-C000-000000000046}\LocalServer32 = d:\sur1173\dump\loopsrv.exe
HKEY_CLASSES_ROOT\CLSID\{0000013d-0001-0008-C000-000000000046} = CRpcTestClassFactory HKEY_CLASSES_ROOT\CLSID\{0000013d-0001-0008-C000-000000000046}\LocalServer32 = d:\sur1173\dump\rpctst.exe
HKEY_CLASSES_ROOT\CLSID\{0000013e-0001-0008-C000-000000000046} = ICubesHandCraftedProxy HKEY_CLASSES_ROOT\CLSID\{0000013e-0001-0008-C000-000000000046}\InprocServer32 = d:\sur1173\dump\myproxy.dll
HKEY_CLASSES_ROOT\CLSID\{00000140-0000-0008-C000-000000000046} = CQueryInterface HKEY_CLASSES_ROOT\CLSID\{00000140-0000-0008-C000-000000000046}\LocalServer32 = d:\sur1173\dump\qisrv.exe HKEY_CLASSES_ROOT\CLSID\{00000140-0000-0008-C000-000000000046}\InprocServer32 = d:\sur1173\dump\qisrv.dll
HKEY_CLASSES_ROOT\CLSID\{00000141-0000-0008-C000-000000000046} = CQueryInterfaceHandler HKEY_CLASSES_ROOT\CLSID\{00000141-0000-0008-C000-000000000046}\LocalServer32 = d:\sur1173\dump\qisrv.exe HKEY_CLASSES_ROOT\CLSID\{00000141-0000-0008-C000-000000000046}\InprocHandler32 = ole32.dll
HKEY_CLASSES_ROOT\.ut4 = ProgID50 HKEY_CLASSES_ROOT\.ut5 = ProgID51 HKEY_CLASSES_ROOT\.ut6 = ProgID52 HKEY_CLASSES_ROOT\.ut7 = ProgID53 HKEY_CLASSES_ROOT\.ut8 = ProgID54 HKEY_CLASSES_ROOT\.ut9 = ProgID55 HKEY_CLASSES_ROOT\.bls = ProgID60
HKEY_CLASSES_ROOT\CLSID\{99999999-0000-0008-C000-000000000050} = SDI HKEY_CLASSES_ROOT\CLSID\{99999999-0000-0008-C000-000000000050}\LocalServer32 = d:\sur1173\dump\sdi.exe
HKEY_CLASSES_ROOT\CLSID\{99999999-0000-0008-C000-000000000051} = MDI HKEY_CLASSES_ROOT\CLSID\{99999999-0000-0008-C000-000000000051}\LocalServer32 = d:\sur1173\dump\mdi.exe
HKEY_CLASSES_ROOT\CLSID\{99999999-0000-0008-C000-000000000052} = InprocNoRegister HKEY_CLASSES_ROOT\CLSID\{99999999-0000-0008-C000-000000000052}\InprocServer32 = d:\sur1173\dump\dlltest.dll
HKEY_CLASSES_ROOT\CLSID\{99999999-0000-0008-C000-000000000053} = InprocRegister HKEY_CLASSES_ROOT\CLSID\{99999999-0000-0008-C000-000000000053}\InprocServer32 = d:\sur1173\dump\dlltest.dll
HKEY_CLASSES_ROOT\CLSID\{99999999-0000-0008-C000-000000000054} = InprocRegister HKEY_CLASSES_ROOT\CLSID\{99999999-0000-0008-C000-000000000054}\TreatAs = {99999999-0000-0008-C000-000000000050}
HKEY_CLASSES_ROOT\CLSID\{99999999-0000-0008-C000-000000000055} = MDI HKEY_CLASSES_ROOT\CLSID\{99999999-0000-0008-C000-000000000055}\LocalServer32 = d:\sur1173\dump\db.exe HKEY_CLASSES_ROOT\CLSID\{99999999-0000-0008-C000-000000000055}\ActivateAtBits = Y
HKEY_CLASSES_ROOT\ProgID50 = objact sdi HKEY_CLASSES_ROOT\ProgID50\CLSID = {99999999-0000-0008-C000-000000000050}
HKEY_CLASSES_ROOT\ProgID51 = objact mdi HKEY_CLASSES_ROOT\ProgID51\CLSID = {99999999-0000-0008-C000-000000000051}
HKEY_CLASSES_ROOT\ProgID52 = objact dll HKEY_CLASSES_ROOT\ProgID52\CLSID = {99999999-0000-0008-C000-000000000052}
HKEY_CLASSES_ROOT\ProgID53 = objact dll reg HKEY_CLASSES_ROOT\ProgID53\CLSID = {99999999-0000-0008-C000-000000000053}
HKEY_CLASSES_ROOT\ProgID54 = objact dll reg HKEY_CLASSES_ROOT\ProgID54\CLSID = {99999999-0000-0008-C000-000000000054}
HKEY_CLASSES_ROOT\ProgID55 = remote activation HKEY_CLASSES_ROOT\ProgID55\CLSID = {99999999-0000-0008-C000-000000000055}
HKEY_CLASSES_ROOT\ProgID60 = CLSIDFromProgID test HKEY_CLASSES_ROOT\ProgID60\CLSID = {0000013a-0001-0008-C000-000000000046}
|