Sandboxie/Sandboxie/install/Templates.ini

4208 lines
127 KiB
INI

#
# Sandboxie Official Configuration Templates
#
# PLEASE DO NOT EDIT
#
# You may place local (custom) templates in your Sandboxie.ini
# file. Use the examples here to create your own templates, but
# do not copy the [TemplateSettings] section.
#
# Please name your own local templates in such a way that
# it will not introduce conflicts with the official templates.
#
# For example, if you design a local template to resolve
# a conflict with the utility ExampleSoft:
#
# [Template_Local_ExampleSoft]
# Tmpl.Title=ExampleSoft
# Tmpl.Class=Local
# OpenWinClass=ExampleSoft_WindowClass
# OpenIpcPath=*\BaseNamedObjects*\ExampleSoft_*
#
# Note the use of the word "local" to prevent a conflict,
# should this official template file later be revised to
# include a template for ExampleSoft.
#
# Local templates that appear in your Sandboxie.ini are
# treated the same way as any official template in this file,
# and can be activated in the Sandboxie user interface.
#
[DefaultTemplates]
Template=RpcPortBindings
Template=SpecialImages
Template=COM
Template=WindowsExplorer
Template=ThirdPartyIsolation
Template=BlockSoftwareUpdaters
Template=BlockWinRM
Template=OpenWinInetCache
[TemplateSettings]
Tmpl.Version=1
# Firefox-based profile paths
Tmpl.Firefox=%AppData%\Mozilla\Firefox\Profiles\*
Tmpl.Waterfox=%AppData%\Waterfox\Profiles\*
Tmpl.PaleMoon=%AppData%\Moonchild Productions\Pale Moon\Profiles\*
Tmpl.SeaMonkey=%AppData%\Mozilla\SeaMonkey\Profiles\*
Tmpl.LibreWolf=%AppData%\LibreWolf\Profiles\*
# Firefox-based addon path
Tmpl.Zotero=%Tmpl.Firefox%\zotero
# Chromium-based profile paths
Tmpl.Chrome=%Local AppData%\Google\Chrome\User Data\Default
Tmpl.Edge=%Local AppData%\Microsoft\Edge\User Data\Default
Tmpl.Vivaldi=%Local AppData%\Vivaldi\User Data\Default
Tmpl.Brave=%Local AppData%\BraveSoftware\Brave-Browser\User Data\Default
Tmpl.Opera=%AppData%\Opera Software\Opera Stable\Default
Tmpl.Yandex=%Local AppData%\Yandex\YandexBrowser\User Data\Default
Tmpl.Ungoogled=%Local AppData%\Chromium\User Data\Default
Tmpl.Iron=%Local AppData%\Chromium\User Data\Default
Tmpl.Maxthon_6=%Local AppData%\Maxthon\Application\User Data\Default
Tmpl.Dragon=%Local AppData%\Comodo\Dragon\User Data\Default
Tmpl.Osiris=%Local AppData%\Osiris\Osiris-Browser\User Data\Default
Tmpl.Slimjet=%Local AppData%\Slimjet\User Data\Default
# Email Readers profile paths
Tmpl.Office_Outlook=%Local AppData%\Microsoft\Outlook
Tmpl.Windows_Vista_Mail=%Local AppData%\Microsoft\Windows Mail
Tmpl.Windows_Live_Mail=%Local AppData%\Microsoft\Windows Live Mail
Tmpl.Thunderbird=%Local AppData%\Thunderbird
Tmpl.Thunderbird:ExpectFile=xulstore.json
Tmpl.Opera_Mail=%Local AppData%\Opera\*\mail
Tmpl.Opera_Mail:ExpectFile=accounts.ini
Tmpl.Incredimail=%Local AppData%\IM
Tmpl.TheBat=%AppData%\The Bat!
Tmpl.eM_Client=%AppData%\eM Client
# Miscellaneous paths
Tmpl.eDocPrinter=%ProgramFiles%\ITEKSOFT\eDocPrinter*
Tmpl.FinePrint=%Personal%\FinePrint files
Tmpl.RoboForm=%Personal%\My RoboForm Data
Tmpl.KasperskyDataRoot=%AllUsersProfile%\Kaspersky Lab
#
# Default access rules
#
[TemplateDefaultPaths]
# Key
# Application Hives
OpenKeyPath=\REGISTRY\A\*
# File
# named pipe root
OpenFilePath=\Device\NamedPipe\
# mail slot root
OpenFilePath=\Device\MailSlot\
# Windows 7 fault-tolerant heap
OpenFilePath=\Device\NamedPipe\ProtectedPrefix\LocalService\FTHPIPE
# printer
OpenFilePath=\Device\NamedPipe\spoolss
OpenFilePath=\Device\NamedPipe\spooler*
OpenFilePath=%DefaultSpoolDirectory%\*
OpenFilePath=%DefaultSpoolDirectory2%\*
# doPDF
OpenFilePath=\Device\NamedPipe\*_doPDF*
# multimedia
OpenFilePath=\Device\NamedPipe\AudioSrv
# third-party software
OpenFilePath=\Device\NamedPipe\Adobe LM Service*
# Novell NetIdentity
OpenFilePath=\Device\NamedPipe\XTIERRPCPIPE
#
# the LanmanRedirector/Mup devices (when accessed without extra paths)
# is a security attack, and must be closed
ClosedFilePath=\Device\LanmanRedirector
ClosedFilePath=\Device\Mup
#
# Block access to imdisk, force terminated proxy processes can result in a BSOD
ClosedFilePath=\Device\ImDiskCtl
# IPC
OpenIpcPath=\Windows\ApiPort
OpenIpcPath=\Sessions\*\Windows\ApiPort
OpenIpcPath=\Sessions\*\Windows\SharedSection
# bSession0
OpenIpcPath=\Windows\SharedSection
# now required by Chromium browsers
OpenIpcPath=\Sessions\*\BaseNamedObjects\CrSharedMem_*
OpenIpcPath=\ThemeApiPort
OpenIpcPath=\KnownDlls\*
# _WIN64
OpenIpcPath=\KnownDlls32\*
# _M_ARM64
OpenIpcPath=\KnownDllsChpe32\*
OpenIpcPath=\NLS\*
OpenIpcPath=*\BaseNamedObjects*\ShimCacheMutex
OpenIpcPath=*\BaseNamedObjects*\ShimSharedMemory
OpenIpcPath=*\BaseNamedObjects*\SHIMLIB_LOG_MUTEX
OpenIpcPath=*\BaseNamedObjects*\msgina: ReturnToWelcome
OpenIpcPath=\Security\LSA_AUTHENTICATION_INITIALIZED
OpenIpcPath=\LsaAuthenticationPort
OpenIpcPath=\NlsCacheMutant
OpenIpcPath=\KernelObjects\*
# miscellaneous services
OpenIpcPath=\NLAPublicPort
OpenIpcPath=\RPC Control\nlaapi
OpenIpcPath=\RPC Control\tapsrvlpc
OpenIpcPath=\RPC Control\senssvc
OpenIpcPath=\RPC Control\samss lpc
OpenIpcPath=*\BaseNamedObjects*\SENS Information Cache
OpenIpcPath=*\BaseNamedObjects*\TabletHardwarePresent
OpenIpcPath=*\BaseNamedObjects*\userenv: * Group Policy has been applied
OpenIpcPath=*\BaseNamedObjects*\TermSrvReadyEvent
# network
OpenIpcPath=\RPC Control\dhcpcsvc
OpenIpcPath=\RPC Control\dhcpcsvc6
OpenIpcPath=\RPC Control\DNSResolver
OpenIpcPath=\RPC Control\RasmanRpc
OpenIpcPath=*\BaseNamedObjects*\WininetStartupMutex
OpenIpcPath=*\BaseNamedObjects*\WininetConnectionMutex
OpenIpcPath=*\BaseNamedObjects*\WininetProxyRegistryMutex
OpenIpcPath=*\BaseNamedObjects*\RasPbFile
# cicero multi-language subsystem
OpenIpcPath=*\BaseNamedObjects*\CTF.*
OpenIpcPath=*\BaseNamedObjects*\MSCTF.*
OpenIpcPath=*\BaseNamedObjects*\MSUIM.*
OpenIpcPath=*\BaseNamedObjects*\CtfmonInstMutex*
OpenIpcPath=*\BaseNamedObjects*\CiceroSharedMemDefault*
OpenIpcPath=*\BaseNamedObjects*\CicLoadWinStaWinSta*
# Sysinternals DebugView (dbgview)
OpenIpcPath=*\BaseNamedObjects*\DBWinMutex
OpenIpcPath=*\BaseNamedObjects*\DBWIN_BUFFER
OpenIpcPath=*\BaseNamedObjects*\DBWIN_BUFFER_READY
OpenIpcPath=*\BaseNamedObjects*\DBWIN_DATA_READY
# multimedia
OpenIpcPath=\RPC Control\AudioSrv
OpenIpcPath=*\BaseNamedObjects*\mmGlobalPnpInfo
OpenIpcPath=*\BaseNamedObjects*\Guard*mmGlobalPnpInfoGuard
OpenIpcPath=*\BaseNamedObjects*\MidiMapper_modLongMessage_RefCnt
OpenIpcPath=*\BaseNamedObjects*\MidiMapper_Configure
OpenIpcPath=*\BaseNamedObjects*\SsiMidiDllCs
OpenIpcPath=*\BaseNamedObjects*\StaccatoSynthCore11Mutex
OpenIpcPath=*\BaseNamedObjects*\WDMAUD_Callbacks
OpenIpcPath=*\BaseNamedObjects*\DirectSound*
OpenIpcPath=*\BaseNamedObjects*\AMResourceMutex*
OpenIpcPath=*\BaseNamedObjects*\AMResourceMapping*
OpenIpcPath=*\BaseNamedObjects*\VideoRenderer
OpenIpcPath=*\BaseNamedObjects*\VIDEOMEMORY
OpenIpcPath=*\BaseNamedObjects*\mxrapi
OpenIpcPath=*\BaseNamedObjects*\mixercallback
OpenIpcPath=*\BaseNamedObjects*\hardwaremixercallback
OpenIpcPath=*\BaseNamedObjects*\DINPUTWINMM
OpenIpcPath=*\BaseNamedObjects*\DDrawDriverObjectListMutex
OpenIpcPath=*\BaseNamedObjects*\__DDrawExclMode__
OpenIpcPath=*\BaseNamedObjects*\__DDrawCheckExclMode__
OpenIpcPath=*\BaseNamedObjects*\DDrawWindowListMutex
OpenIpcPath=*\BaseNamedObjects*\DDrawCheckFullscreenSemaphore
OpenIpcPath=*\BaseNamedObjects*\D3D9CheckFullscreenSemaphore
OpenIpcPath=*\BaseNamedObjects*\WinMMConsoleAudioEvent
# multimedia (Vista)
OpenIpcPath=\MmcssApiPort
OpenIpcPath=\RPC Control\AudioClientRpc
# AudioDg
OpenIpcPath=*\BaseNamedObjects*\SYSTEM_AUDIO_STREAM_*
# Windows Aero
OpenIpcPath=\UxSmsApiPort
OpenIpcPath=*\BaseNamedObjects*\Dwm-*-ApiPort-*
OpenIpcPath=*\BaseNamedObjects*\DwmDxBltEvent*
# following resource is needed on Windows Vista and later,
# but also provided by the SRS Audio Sandbox program
OpenIpcPath=*\BaseNamedObjects*\AudioEngineDuplicateHandleApiPort*
# NComputing audio server/driver ?
OpenIpcPath=\RPC Control\NCWTSAudioServer
# printer
OpenIpcPath=\RPC Control\spoolss
OpenIpcPath=*\BaseNamedObjects*\EPSON-PrgMtr-*
OpenIpcPath=*\BaseNamedObjects*\RouterPreInitEvent
# Sandboxie service
OpenIpcPath=\RPC Control\SbieSvcPort
OpenIpcPath=*\BaseNamedObjects*\Sandboxie_StartMenu_WorkArea_*
# objects in an unnamed directory
OpenIpcPath=\...\*
# miscellaneous services (Vista)
# licensing
OpenIpcPath=\RPC Control\SLCTransportEndpoint-*
# parental controls
OpenIpcPath=\RPC Control\wpcsvc
# Windows Firewall
OpenIpcPath=*\BaseNamedObjects*\BFE_Notify_Event_*
# _WIN64
# 64-bit spooler for 32-bit programs
OpenIpcPath=*\BaseNamedObjects*\WinSpl64To32Mutex*_0
OpenIpcPath=\RPC Control\splwow64_*_0
OpenIpcPath=\RPC Control\umpdproxy_*_0
#
OpenIpcPath=\ConsoleEvent-0x*
OpenIpcPath=*\BaseNamedObjects*\ConsoleEvent-0x*
OpenIpcPath=\RPC Control\console-0x*-lpc-handle
OpenIpcPath=\RPC Control\ConsoleEvent-0x*
OpenIpcPath=\RPC Control\ConsoleLPC-0x*
OpenIpcPath=\RPC Control\lsapolicylookup
OpenIpcPath=\RPC Control\lsasspirpc
OpenIpcPath=\RPC Control\LSARPC_ENDPOINT
OpenIpcPath=\RPC Control\umpo
OpenIpcPath=*\BaseNamedObjects*\FlipEx*
OpenIpcPath=*\BaseNamedObjects*\FontCachePort
OpenIpcPath=*\BaseNamedObjects*\FntCache-*
# Windows 8
OpenIpcPath=\Windows\Theme*
OpenIpcPath=\Sessions\*\Windows\Theme*
OpenIpcPath=\Sessions\*\Windows\DwmApiPort
OpenIpcPath=*\BaseNamedObjects*\DWM_DX_FULLSCREEN_TRANSITION_EVENT
# _WIN64
# 64-bit spooler for 32-bit programs
OpenIpcPath=*\BaseNamedObjects*\WinSpl64To32Mutex*_2000
OpenIpcPath=\RPC Control\splwow64_*_2000
OpenIpcPath=\RPC Control\umpdproxy_*_2000
#
# Windows 10
OpenIpcPath=*\BaseNamedObjects*\CoreMessagingRegistrar
OpenIpcPath=*\BaseNamedObjects\[CoreUI]-*
# open paths Windows 11
# 22449.1000 accesses this before sbiedll load
OpenIpcPath=*\BaseNamedObjects\SM*:WilStaging_*
# _M_ARM64 22621.819 used by emulated processes
OpenIpcPath=\{BEC19D6F-D7B2-41A8-860C-8787BB964F2D}
#
ReadIpcPath=\??\pipe\*
ReadIpcPath=$:explorer.exe
OpenWinClass=Shell_TrayWnd
OpenWinClass=TrayNotifyWnd
# Power Meter dialog box:
OpenWinClass=SystemTray_Main
OpenWinClass=Connections Tray
OpenWinClass=MS_WebcheckMonitor
OpenWinClass=PrintTray_Notify_WndClass
OpenWinClass=CicLoaderWndClass
OpenWinClass=CicMarshalWndClass
OpenWinClass=Credential Dialog Xaml Host
# Windows 7
OpenWinClass=Sandbox:*:ConsoleWindowClass
OpenWinClass=MSTaskSwWClass
#
# third party
#
OpenIpcPath=*\BaseNamedObjects*\ATITRAY_SMEM
OpenIpcPath=*\BaseNamedObjects*\ATITRAY_OSDM
OpenIpcPath=*\BaseNamedObjects*\AMCreateListenSock*
# Ad Muncher
OpenIpcPath=*\BaseNamedObjects*\AMIPC_*
# DevLdr32 sound card driver
OpenIpcPath=*\BaseNamedObjects*\devldr32
# ThreatFire
OpenIpcPath=*\BaseNamedObjects*\ThreatfireApiHookIpc2Map
# third party - key-logger-related
OpenIpcPath=*\BaseNamedObjects*\00MemoryShareKeyloggerHunter
# hardware - wacom tablet
OpenIpcPath=*\BaseNamedObjects*\WacomNewFrontAppEventName
OpenIpcPath=*\BaseNamedObjects*\WacomTouchingAppNameMutexName
OpenWinClass=CTouchPadSynchronizer
OpenWinClass=Type32_Main_Window
OpenWinClass=TForm_AshampooFirewall
# Tight VNC
OpenWinClass=WinVNC desktop sink
# Download Accelerator Plus
OpenWinClass=Afx:400000:0
# nVidia nView
OpenWinClass=NVIDIA TwinView Window
OpenWinClass=SWFlash_PlaceHolderX
# PowerPoint
OpenWinClass=MdiClass
# joystick
OpenWinClass=Logitech Wingman Internal Message Router
# devldr32 sound card driver
OpenWinClass=devldr
#
# Network access rules
# depending on the preset, either the "Open" or the "Close" directives are applied
#
[TemplateNetworkPaths]
OpenFilePath=\Device\NamedPipe\ROUTER
OpenFilePath=\Device\NamedPipe\ShimViewer
OpenFilePath=\Device\Afd
OpenFilePath=\Device\Afd\Endpoint
OpenFilePath=\Device\Afd\AsyncConnectHlp
OpenFilePath=\Device\Afd\AsyncSelectHlp
OpenFilePath=\Device\Afd\ROUTER
OpenFilePath=\Device\Afd\Mio
OpenFilePath=\Device\WS2IFSL
OpenFilePath=\Device\WS2IFSL\NifsPvd
OpenFilePath=\Device\WS2IFSL\NifsSct
OpenFilePath=\Device\Tcp
OpenFilePath=\Device\Tcp6
OpenFilePath=\Device\Ip
OpenFilePath=\Device\Ip6
OpenFilePath=\Device\Udp
OpenFilePath=\Device\Udp6
OpenFilePath=\Device\RawIp
OpenFilePath=\Device\RawIp6
OpenFilePath=\Device\NetBT_Tcpip_*
OpenFilePath=\Device\Http\*
OpenFilePath=\Device\Nsi
ClosedFilePath=\Device\afd*
ClosedFilePath=\Device\ip
ClosedFilePath=\Device\ip6
ClosedFilePath=\Device\udp
ClosedFilePath=\Device\udp6
ClosedFilePath=\Device\tcp
ClosedFilePath=\Device\tcp6
ClosedFilePath=\Device\http\*
ClosedFilePath=\Device\rawip
ClosedFilePath=\Device\rawip6
ClosedFilePath=\Device\nsi
#
# Access rules for device restricted boxes
#
[TemplateSModPaths]
ClosedFilePath=\Device\*
NormalFilePath=\Device\NamedPipe\*
NormalFilePath=\Device\CNG
NormalFilePath=\Device\ConDrv\*
NormalFilePath=\Device\DeviceApi*
NormalFilePath=\Device\DfsClient
NormalFilePath=\Device\KsecDD
NormalFilePath=\Device\MountPointManager
NormalFilePath=\Device\Ndis
NormalFilePath=\Device\PcwDrv
NormalFilePath=\Device\Null
NormalFilePath=\Device\BootDevice\Windows\*
NormalFilePath=\Device\BootPartition\Windows\*
# Smart App Control
NormalFilePath=\Device\SrpDevice
#
# Access rules for privacy enhanced boxes
#
[TemplatePModPaths]
#NormalKeyPath=HKEY_LOCAL_MACHINE\*
#NormalKeyPath=HKEY_CURRENT_USER\software\Microsoft\*
#NormalKeyPath=HKEY_CURRENT_USER\software\WOW6432Node\Microsoft\*
#NormalKeyPath=\REGISTRY\USER\*_Classes\*
WriteKeyPath=\REGISTRY\USER\*
#
NormalFilePath=%SystemRoot%\*
NormalFilePath=%SbieHome%\*
NormalFilePath=%ProgramFiles%\*
NormalFilePath=%ProgramFiles% (x86)\*
NormalFilePath=%ProgramData%\Microsoft\*
# recycle bin
NormalFilePath=?:\$Recycle.Bin\*
WriteFilePath=?:\$Recycle.Bin\**\*
# shell & ui
NormalKeyPath=HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Themes\Personalize\*
NormalKeyPath=HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders\*
NormalKeyPath=HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\*
NormalKeyPath=HKEY_CURRENT_USER\SOFTWARE\Classes\*
NormalKeyPath=HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\ApplicationAssociationToasts\*
NormalKeyPath=HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\*
NormalKeyPath=HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\*
NormalKeyPath=HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\FileAssociations\*
NormalKeyPath=HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Associations\*
NormalKeyPath=HKEY_CURRENT_USER\AppEvents\*
NormalKeyPath=HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX\UserGpuPreferences\*
NormalKeyPath=HKEY_CURRENT_USER\Environment\*
#
# Access rules for app compartment boxes
#
[TemplateAppCPaths]
# open those in compartment mode as do not use the de-administrator-ize proxy in File_NtCreateFilePipe
OpenFilePath=\device\*pipe\lsarpc
OpenFilePath=\device\*pipe\srvsvc
OpenFilePath=\device\*pipe\wkssvc
OpenFilePath=\device\*pipe\samr
OpenFilePath=\device\*pipe\netlogon
# enable AppContainer isolation support
OpenIpcPath=\Sessions\*\AppContainerNamedObjects\*
OpenFilePath=\Device\NamedPipe\Sessions\*\AppContainerNamedObjects\*
#
# Sbie builds after 5.27-1 opens this (it breaks IE's source view and cache though)
#
[Template_OpenWinInetCache]
OpenClsid={0358B920-0AC7-461F-98F4-58E32CD89148}
OpenIpcPath=\RPC Control\webcache_*
OpenIpcPath=*\BaseNamedObjects\windows_webcache_counters_*
#
# Windows Remote Management (WinRM) is a large security hole.
# A sandboxed app running in an elevated cmd shell can send any admin command to the host.
# Block the WinRS.exe and the automation dlls to make it very difficult for someone to use.
# See ICD-10136 "Sandboxie security hole allows guest to run any command in host as admin"
#
[Template_BlockWinRM]
ClosedFilePath=|%SystemRoot%\Sys*\wsmsvc.dll
ClosedFilePath=|%SystemRoot%\Sys*\wsmauto.dll
ClosedFilePath=|%SystemRoot%\Sys*\winrs.exe
#
# this template replaces OpenProtectedStorage=y
#
[Template_OpenProtectedStorage]
Tmpl.Title=Open Protected Storage
Tmpl.Class=Misc
#FuncSkipHook=PStoreCreateInstance
OpenFilePath=|\Device\NamedPipe\protected_storage
OpenIpcPath=*\BaseNamedObjects*\PS_SERVICE_STARTED
OpenIpcPath=\RPC Control\protected_storage
#
# useful exceptions for confidential boxes
#
[Template_LessConfidentialBox]
Tmpl.Title=Allow some Windows processes to access processes in a confidential box
Tmpl.Class=Misc
DenyHostAccess=audiodg.exe,n
#
# Custom handling for special images
#
[Template_SpecialImages]
#Tmpl.Title=#xxxx
#Tmpl.Class=Misc
SpecialImage=chrome,chrome.exe
SpecialImage=chrome,msedge.exe
SpecialImage=chrome,msedgewebview2.exe
SpecialImage=chrome,iron.exe
SpecialImage=chrome,dragon.exe
SpecialImage=chrome,opera.exe
SpecialImage=chrome,neon.exe
SpecialImage=chrome,maxthon.exe
SpecialImage=chrome,vivaldi.exe
SpecialImage=chrome,brave.exe
SpecialImage=chrome,browser.exe
SpecialImage=chrome,osiris.exe
SpecialImage=chrome,slimjet.exe
SpecialImage=firefox,firefox.exe
SpecialImage=firefox,waterfox.exe
SpecialImage=firefox,palemoon.exe
SpecialImage=firefox,basilisk.exe
SpecialImage=firefox,seamonkey.exe
SpecialImage=firefox,k-meleon.exe
SpecialImage=firefox,librewolf.exe
SpecialImage=thunderbird,thunderbird.exe
SpecialImage=mail,winmail.exe
SpecialImage=mail,IncMail.exe
SpecialImage=mail,eudora.exe
SpecialImage=mail,thebat32.exe
SpecialImage=mail,thebat64.exe
SpecialImage=mail,Foxmail.exe
SpecialImage=mail,Mailbird.exe
SpecialImage=mail,MailClient.exe
SpecialImage=mail,postbox.exe
SpecialImage=mail,Inky.exe
SpecialImage=browser,PuffinSecureBrowser.exe
SpecialImage=chrome,wechat.exe
SpecialImage=chrome,slack.exe
SpecialImage=chrome,spotify.exe
SpecialImage=chrome,Amazon Music.exe
#
# other image specific presets
#
PreferExternalManifest=spotify.exe,y
#
# updater blockage, usage:
# SoftwareUpdater=starting_image.exe,updater_path\updater_image.exe
#
[Template_BlockSoftwareUpdaters]
#Tmpl.Title=#xxxx
#Tmpl.Class=Misc
#BlockSoftwareUpdaters=y
SoftwareUpdater=firefox.exe,*\mozilla firefox\updater.exe
SoftwareUpdater=firefox.exe,*\mozilla*\updates\*updater.exe
SoftwareUpdater=waterfox.exe,*\Waterfox\updater.exe
SoftwareUpdater=palemoon.exe,*\Pale Moon\updater.exe
SoftwareUpdater=seamonkey.exe,*\SeaMonkey\updater.exe
SoftwareUpdater=GoogleUpdate.exe,*\google\update\*chrome_installer.exe
SoftwareUpdater=msedge.exe,*\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
SoftwareUpdater=msedge.exe,*\Microsoft\EdgeUpdate\*MicrosoftEdgeUpdateBroker.exe
SoftwareUpdater=vivaldi.exe,*\Vivaldi\Application\update_notifier.exe
SoftwareUpdater=brave.exe,*\BraveSoftware\Update\BraveUpdate.exe
SoftwareUpdater=brave.exe,*\BraveSoftware\Update\*BraveUpdateBroker.exe
SoftwareUpdater=opera.exe,*\Opera\*opera_autoupdate.exe
SoftwareUpdater=launcher.exe,*\Opera\*opera_autoupdate.exe
SoftwareUpdater=yandex.exe,*\Yandex\YandexBrowser\Application\*service_update.exe
SoftwareUpdater=maxthon.exe,*\Maxthon\Application\*mxupdater.exe
SoftwareUpdater=dragon.exe,*\Comodo\Dragon\dragon_updater.exe
SoftwareUpdater=osiris.exe,*\Osiris\update.exe
SoftwareUpdater=app_launcher.exe,*\Osiris\update.exe
SoftwareUpdater=slimjet.exe,*\Slimjet\updater.exe
SoftwareUpdater=thunderbird.exe,*\mozilla*\updates\*updater.exe
[Template_COM]
# block BITS service (issue 1081)
ClosedClsid={4991D34B-80A1-4291-83B6-3328366B9097}
[Template_WindowsExplorer]
# make search box wait (issue 1002)
ClosedClsid={C2F03A33-21F5-47FA-B4BB-156362A2F239}
# prevent context menu hang
ClosedClsid={470C0EBD-5D73-4D58-9CED-E91E22E23282}
# never fake admin rights for explorer.exe (issue 3516)
FakeAdminRights=explorer.exe,n
[Template_ThirdPartyIsolation]
# block VMNet0 virtual network configuration (issue 1102)
ClosedFilePath=vmnetcfg.exe,\Device\VMnetUserif
#
# Internet Explorer
#
[Template_IExplore_Force]
Tmpl.Title=#4323,Internet Explorer
Tmpl.Class=WebBrowser
ForceProcess=iexplore.exe
[Template_IExplore_Favorites_DirectAccess]
Tmpl.Title=#4326,Internet Explorer
Tmpl.Class=WebBrowser
OpenFilePath=iexplore.exe,%Favorites%
#OpenFilePath=firefox.exe,%Favorites%
[Template_IExplore_Favorites_RecoverFolder]
Tmpl.Title=#4327
Tmpl.Class=WebBrowser
RecoverFolder=%Favorites%
[Template_IExplore_History_DirectAccess]
Tmpl.Title=#4336,Internet Explorer
Tmpl.Class=WebBrowser
OpenFilePath=iexplore.exe,%Favorites%
OpenFilePath=iexplore.exe,%History%\History.IE5\*
OpenKeyPath=iexplore.exe,HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs
# Windows Search features needed for address bar in IE 8
OpenClsid={7D096C5F-AC08-4F1F-BEB7-5C22C517CE39}
OpenClsid={9E175B6D-F52A-11D8-B9A5-505054503030}
OpenPipePath=\Device\NamedPipe\MsFteWds
# Internet Explorer 10 history pane
OpenFilePath=|%Local AppData%\Microsoft\Windows\
[Template_IExplore_Cookies_DirectAccess]
Tmpl.Title=#4328,Internet Explorer
Tmpl.Class=WebBrowser
OpenFilePath=iexplore.exe,%Cookies%
# Internet Explorer 10 cookies
OpenClsid={0358b920-0ac7-461f-98f4-58e32cd89148}
OpenIpcPath=\RPC Control\webcache_*
OpenIpcPath=*\BaseNamedObjects*\windows_webcache_*
OpenFilePath=%Local AppData%\Microsoft\Internet Explorer\DOMStore\*
[Template_IExplore_Feeds_DirectAccess]
Tmpl.Title=#4325,Internet Explorer
Tmpl.Class=WebBrowser
OpenFilePath=iexplore.exe,%Local AppData%\Microsoft\Feeds\
OpenFilePath=iexplore.exe,%Local AppData%\Microsoft\Feeds Cache\
[Template_IExplore_ProtectedStorage]
Tmpl.Title=#4329
Tmpl.Class=WebBrowser
OpenProtectedStorage=y
OpenKeyPath=iexplore.exe,HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\IntelliForms
OpenKeyPath=iexplore.exe,HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs
# [Template_IExplore_Credentials]
# Tmpl.Title=#4330
# Tmpl.Class=WebBrowser
# OpenCredentials=y
#
# Firefox / Waterfox / PaleMoon / SeaMonkey / LibreWolf
#
#
# Firefox
#
[Template_Firefox_Force]
Tmpl.Title=#4323,Mozilla Firefox
Tmpl.Class=WebBrowser
ForceProcess=firefox.exe
[Template_Firefox_Bookmarks_DirectAccess]
Tmpl.Title=#4336,Mozilla Firefox
Tmpl.Class=WebBrowser
OpenFilePath=firefox.exe,%Tmpl.Firefox%\bookmark*
OpenFilePath=firefox.exe,%Tmpl.Firefox%\places*
OpenFilePath=firefox.exe,%Tmpl.Firefox%\favicons.sqlite
[Template_Firefox_Cookies_DirectAccess]
Tmpl.Title=#4328,Mozilla Firefox
Tmpl.Class=WebBrowser
OpenFilePath=firefox.exe,%Tmpl.Firefox%\cookies*
[Template_Firefox_Passwords_DirectAccess]
Tmpl.Title=#4331,Mozilla Firefox
Tmpl.Class=WebBrowser
OpenFilePath=firefox.exe,%Tmpl.Firefox%\logins.json
OpenFilePath=firefox.exe,%Tmpl.Firefox%\key*.db
[Template_Firefox_Session_DirectAccess]
Tmpl.Title=#4340,Mozilla Firefox
Tmpl.Class=WebBrowser
OpenFilePath=firefox.exe,%Tmpl.Firefox%\sessionstore.js*
[Template_Firefox_Phishing_DirectAccess]
Tmpl.Title=#4337,Mozilla Firefox
Tmpl.Class=WebBrowser
OpenFilePath=firefox.exe,%Tmpl.Firefox%\cert9.db
OpenFilePath=firefox.exe,%Local AppData%\Mozilla\Firefox\Profiles\*\safebrowsing*
[Template_Firefox_Profile_DirectAccess]
Tmpl.Title=#4338,Mozilla Firefox
Tmpl.Class=WebBrowser
OpenFilePath=firefox.exe,%Tmpl.Firefox%\*
[Template_Firefox_Separator]
Tmpl.Title=-
Tmpl.Class=WebBrowser
#
# Waterfox
#
[Template_Waterfox_Force]
Tmpl.Title=#4323,Waterfox
Tmpl.Class=WebBrowser
ForceProcess=waterfox.exe
[Template_Waterfox_Bookmarks_DirectAccess]
Tmpl.Title=#4336,Waterfox
Tmpl.Class=WebBrowser
OpenFilePath=waterfox.exe,%Tmpl.Waterfox%\bookmark*
OpenFilePath=waterfox.exe,%Tmpl.Waterfox%\places*
[Template_Waterfox_Cookies_DirectAccess]
Tmpl.Title=#4328,Waterfox
Tmpl.Class=WebBrowser
OpenFilePath=waterfox.exe,%Tmpl.Waterfox%\cookies*
[Template_Waterfox_Passwords_DirectAccess]
Tmpl.Title=#4331,Waterfox
Tmpl.Class=WebBrowser
OpenFilePath=waterfox.exe,%Tmpl.Waterfox%\logins.json
OpenFilePath=waterfox.exe,%Tmpl.Waterfox%\key*.db
[Template_Waterfox_Session_DirectAccess]
Tmpl.Title=#4340,Waterfox
Tmpl.Class=WebBrowser
OpenFilePath=waterfox.exe,%Tmpl.Waterfox%\sessionstore.js*
[Template_Waterfox_Phishing_DirectAccess]
Tmpl.Title=#4337,Waterfox
Tmpl.Class=WebBrowser
OpenFilePath=waterfox.exe,%Tmpl.Waterfox%\blocklist.xml
OpenFilePath=waterfox.exe,%Tmpl.Waterfox%\cert9.db
OpenFilePath=waterfox.exe,%Local AppData%\Waterfox\Profiles\*\safebrowsing*
[Template_Waterfox_Profile_DirectAccess]
Tmpl.Title=#4338,Waterfox
Tmpl.Class=WebBrowser
OpenFilePath=waterfox.exe,%Tmpl.Waterfox%\*
[Template_Waterfox_Separator]
Tmpl.Title=-
Tmpl.Class=WebBrowser
#
# Pale Moon
#
[Template_PaleMoon_Force]
Tmpl.Title=#4323,Pale Moon
Tmpl.Class=WebBrowser
ForceProcess=palemoon.exe
[Template_PaleMoon_Bookmarks_DirectAccess]
Tmpl.Title=#4336,Pale Moon
Tmpl.Class=WebBrowser
OpenFilePath=palemoon.exe,%Tmpl.PaleMoon%\bookmark*
OpenFilePath=palemoon.exe,%Tmpl.PaleMoon%\places*
[Template_PaleMoon_Cookies_DirectAccess]
Tmpl.Title=#4328,Pale Moon
Tmpl.Class=WebBrowser
OpenFilePath=palemoon.exe,%Tmpl.PaleMoon%\cookies*
[Template_PaleMoon_Passwords_DirectAccess]
Tmpl.Title=#4331,Pale Moon
Tmpl.Class=WebBrowser
OpenFilePath=palemoon.exe,%Tmpl.PaleMoon%\logins.json
OpenFilePath=palemoon.exe,%Tmpl.PaleMoon%\key*.db
[Template_PaleMoon_Session_DirectAccess]
Tmpl.Title=#4340,Pale Moon
Tmpl.Class=WebBrowser
OpenFilePath=palemoon.exe,%Tmpl.PaleMoon%\sessionstore.js
[Template_PaleMoon_Phishing_DirectAccess]
Tmpl.Title=#4337,Pale Moon
Tmpl.Class=WebBrowser
OpenFilePath=palemoon.exe,%Tmpl.PaleMoon%\blocklist.xml
OpenFilePath=palemoon.exe,%Tmpl.PaleMoon%\cert9.db
[Template_PaleMoon_Profile_DirectAccess]
Tmpl.Title=#4338,Pale Moon
Tmpl.Class=WebBrowser
OpenFilePath=palemoon.exe,%Tmpl.PaleMoon%\*
[Template_PaleMoon_Separator]
Tmpl.Title=-
Tmpl.Class=WebBrowser
#
# SeaMonkey Browser
#
[Template_SeaMonkey_Force]
Tmpl.Title=#4323,SeaMonkey
Tmpl.Class=WebBrowser
ForceProcess=seamonkey.exe
[Template_SeaMonkey_Bookmarks_DirectAccess]
Tmpl.Title=#4336,SeaMonkey
Tmpl.Class=WebBrowser
OpenFilePath=seamonkey.exe,%Tmpl.SeaMonkey%\bookmark*
OpenFilePath=seamonkey.exe,%Tmpl.SeaMonkey%\places*
[Template_SeaMonkey_Cookies_DirectAccess]
Tmpl.Title=#4328,SeaMonkey
Tmpl.Class=WebBrowser
OpenFilePath=seamonkey.exe,%Tmpl.SeaMonkey%\cookies*
[Template_SeaMonkey_Passwords_DirectAccess]
Tmpl.Title=#4331,SeaMonkey
Tmpl.Class=WebBrowser
OpenFilePath=seamonkey.exe,%Tmpl.SeaMonkey%\logins.json
OpenFilePath=seamonkey.exe,%Tmpl.SeaMonkey%\key*.db
[Template_SeaMonkey_Session_DirectAccess]
Tmpl.Title=#4340,SeaMonkey
Tmpl.Class=WebBrowser
OpenFilePath=seamonkey.exe,%Tmpl.SeaMonkey%\sessionstore.js
[Template_SeaMonkey_Phishing_DirectAccess]
Tmpl.Title=#4337,SeaMonkey
Tmpl.Class=WebBrowser
OpenFilePath=seamonkey.exe,%Tmpl.SeaMonkey%\blocklist.xml
OpenFilePath=seamonkey.exe,%Tmpl.SeaMonkey%\cert9.db
OpenFilePath=seamonkey.exe,%Local AppData%\Mozilla\SeaMonkey\Profiles\*\safebrowsing*
[Template_SeaMonkey_Profile_DirectAccess]
Tmpl.Title=#4338,SeaMonkey
Tmpl.Class=WebBrowser
OpenFilePath=seamonkey.exe,%Tmpl.SeaMonkey%\*
[Template_SeaMonkey_Separator]
Tmpl.Title=-
Tmpl.Class=WebBrowser
#
# LibreWolf
#
[Template_LibreWolf_Force]
Tmpl.Title=#4323,LibreWolf
Tmpl.Class=WebBrowser
ForceProcess=librewolf.exe
[Template_LibreWolf_Bookmarks_DirectAccess]
Tmpl.Title=#4336,LibreWolf
Tmpl.Class=WebBrowser
OpenFilePath=librewolf.exe,%Tmpl.LibreWolf%\bookmark*
OpenFilePath=librewolf.exe,%Tmpl.LibreWolf%\places*
OpenFilePath=librewolf.exe,%Tmpl.LibreWolf%\favicons.sqlite
[Template_LibreWolf_Cookies_DirectAccess]
Tmpl.Title=#4328,LibreWolf
Tmpl.Class=WebBrowser
OpenFilePath=librewolf.exe,%Tmpl.LibreWolf%\cookies*
[Template_LibreWolf_Passwords_DirectAccess]
Tmpl.Title=#4331,LibreWolf
Tmpl.Class=WebBrowser
OpenFilePath=librewolf.exe,%Tmpl.LibreWolf%\logins.json
OpenFilePath=librewolf.exe,%Tmpl.LibreWolf%\key*.db
[Template_LibreWolf_Session_DirectAccess]
Tmpl.Title=#4340,LibreWolf
Tmpl.Class=WebBrowser
OpenFilePath=librewolf.exe,%Tmpl.LibreWolf%\sessionstore.js*
[Template_LibreWolf_Phishing_DirectAccess]
Tmpl.Title=#4337,LibreWolf
Tmpl.Class=WebBrowser
OpenFilePath=librewolf.exe,%Tmpl.LibreWolf%\cert9.db
OpenFilePath=librewolf.exe,%Local AppData%\LibreWolf\Profiles\*\safebrowsing*
[Template_LibreWolf_Profile_DirectAccess]
Tmpl.Title=#4338,LibreWolf
Tmpl.Class=WebBrowser
OpenFilePath=librewolf.exe,%Tmpl.LibreWolf%\*
#
# Firefox Add-ons
#
[Template_Firefox_Addon_Zotero]
Tmpl.Title=Zotero (with XPDF)
Tmpl.Class=WebBrowser
Tmpl.Url=http://www.zotero.org/
OpenFilePath=<Zotero>,%Tmpl.Zotero%\*
ProcessGroup=<Zotero>,firefox.exe,pdfinfo-Win32.exe,pdftotext-Win32.exe
#
# Google Chrome / Microsoft Edge (Chromium) / Vivaldi / Brave Browser / Opera / Yandex / Ungoogled Chromium /
# SRWare Iron / Maxthon 6 (Chromium) / Comodo Dragon / Osiris Browser / FlashPeak Slimjet /
#
#
# Google Chrome
#
[Template_Chrome_Force]
Tmpl.Title=#4323,Google Chrome
Tmpl.Class=WebBrowser
ForceProcess=chrome.exe
[Template_Chrome_Bookmarks_DirectAccess]
Tmpl.Title=#4356,Google Chrome
Tmpl.Class=WebBrowser
OpenFilePath=chrome.exe,%Tmpl.Chrome%\Bookmarks*
OpenFilePath=chrome.exe,%Tmpl.Chrome%\Favicons*
[Template_Chrome_History_DirectAccess]
Tmpl.Title=#4336,Google Chrome
Tmpl.Class=WebBrowser
OpenFilePath=chrome.exe,%Tmpl.Chrome%\Bookmarks*
OpenFilePath=chrome.exe,%Tmpl.Chrome%\Favicons*
OpenFilePath=chrome.exe,%Tmpl.Chrome%\*History*
OpenFilePath=chrome.exe,%Tmpl.Chrome%\Current *
OpenFilePath=chrome.exe,%Tmpl.Chrome%\Last *
OpenFilePath=chrome.exe,%Tmpl.Chrome%\Visited Links*
[Template_Chrome_Cookies_DirectAccess]
Tmpl.Title=#4328,Google Chrome
Tmpl.Class=WebBrowser
OpenFilePath=chrome.exe,%Tmpl.Chrome%\Network\Cookies*
[Template_Chrome_Passwords_DirectAccess]
Tmpl.Title=#4331,Google Chrome
Tmpl.Class=WebBrowser
OpenFilePath=chrome.exe,%Tmpl.Chrome%\Login Data*
[Template_Chrome_Preferences_DirectAccess]
Tmpl.Title=#4339,Google Chrome
Tmpl.Class=WebBrowser
OpenFilePath=chrome.exe,%Tmpl.Chrome%\Preferences*
[Template_Chrome_Sync_DirectAccess]
Tmpl.Title=#4324,Google Chrome
Tmpl.Class=WebBrowser
OpenFilePath=chrome.exe,%Tmpl.Chrome%\Sync Data\*
OpenFilePath=chrome.exe,%Tmpl.Chrome%\Sync Extension Settings\*
[Template_Chrome_Phishing_DirectAccess]
Tmpl.Title=#4337,Google Chrome
Tmpl.Class=WebBrowser
OpenFilePath=chrome.exe,%Local AppData%\Google\Chrome\User Data\Safe Browsing*
OpenFilePath=chrome.exe,%Local AppData%\Google\Chrome\User Data\CertificateRevocation
[Template_Chrome_Profile_DirectAccess]
Tmpl.Title=#4338,Google Chrome
Tmpl.Class=WebBrowser
OpenFilePath=chrome.exe,%Tmpl.Chrome%\*
#
# Microsoft Edge (Chromium)
#
[Template_Edge_Force]
Tmpl.Title=#4323,Microsoft Edge
Tmpl.Class=WebBrowser
ForceProcess=msedge.exe
[Template_Edge_Bookmarks_DirectAccess]
Tmpl.Title=#4356,Microsoft Edge
Tmpl.Class=WebBrowser
OpenFilePath=msedge.exe,%Tmpl.Edge%\Bookmarks*
OpenFilePath=msedge.exe,%Tmpl.Edge%\Favicons*
[Template_Edge_History_DirectAccess]
Tmpl.Title=#4336,Microsoft Edge
Tmpl.Class=WebBrowser
OpenFilePath=msedge.exe,%Tmpl.Edge%\Bookmarks*
OpenFilePath=msedge.exe,%Tmpl.Edge%\Favicons*
OpenFilePath=msedge.exe,%Tmpl.Edge%\*History*
OpenFilePath=msedge.exe,%Tmpl.Edge%\Current *
OpenFilePath=msedge.exe,%Tmpl.Edge%\Last *
OpenFilePath=msedge.exe,%Tmpl.Edge%\Visited Links*
[Template_Edge_Cookies_DirectAccess]
Tmpl.Title=#4328,Microsoft Edge
Tmpl.Class=WebBrowser
OpenFilePath=msedge.exe,%Tmpl.Edge%\Network\Cookies*
[Template_Edge_Passwords_DirectAccess]
Tmpl.Title=#4331,Microsoft Edge
Tmpl.Class=WebBrowser
OpenFilePath=msedge.exe,%Tmpl.Edge%\Login Data*
[Template_Edge_Preferences_DirectAccess]
Tmpl.Title=#4339,Microsoft Edge
Tmpl.Class=WebBrowser
OpenFilePath=msedge.exe,%Tmpl.Edge%\Preferences*
[Template_Edge_Sync_DirectAccess]
Tmpl.Title=#4324,Microsoft Edge
Tmpl.Class=WebBrowser
OpenFilePath=msedge.exe,%Tmpl.Edge%\Sync Data\*
OpenFilePath=msedge.exe,%Tmpl.Edge%\Sync Extension Settings\*
[Template_Edge_Phishing_DirectAccess]
Tmpl.Title=#4337,Microsoft Edge
Tmpl.Class=WebBrowser
OpenFilePath=msedge.exe,%Local AppData%\Microsoft\Edge\User Data\Safe Browsing*
OpenFilePath=msedge.exe,%Local AppData%\Microsoft\Edge\User Data\CertificateRevocation
OpenFilePath=msedge.exe,%Local AppData%\Microsoft\Edge\User Data\SmartScreen
OpenFilePath=msedge.exe,%Local AppData%\Microsoft\Edge\User Data\Ad Blocking
[Template_Edge_Profile_DirectAccess]
Tmpl.Title=#4338,Microsoft Edge
Tmpl.Class=WebBrowser
OpenFilePath=msedge.exe,%Tmpl.Edge%\*
[Template_Edge_Fix]
Tmpl.Title=#4342,Microsoft Edge
Tmpl.Class=WebBrowser
Tmpl.Url=https://www.microsoft.com/en-us/edge
Tmpl.Scan=s
Tmpl.ScanProduct=Microsoft Edge
Tmpl.ScanService=edgeupdate
# SBIE fix for Windows 11 KB5014019 update (May 2022)
# ExternalManifest breaks MSEdge 111.0.1633.0
#ExternalManifestHack=msedge.exe,y
# SBIE fix for MS Edge 106.x also for Windows 10
#OpenIpcPath=msedge.exe,\Sessions\*\AppContainerNamedObjects\*
#OpenFilePath=msedge.exe,\Device\NamedPipe\Sessions\*\AppContainerNamedObjects\*
# SBIE fix for MS Edge WebView2
#ExternalManifestHack=msedgewebview2.exe,y
NormalFilePath=msedge.exe,%LocalAppData%\Microsoft\Edge\User Data\Default\Secure Preferences
#
# Vivaldi
#
[Template_Vivaldi_Force]
Tmpl.Title=#4323,Vivaldi
Tmpl.Class=WebBrowser
ForceProcess=vivaldi.exe
[Template_Vivaldi_Bookmarks_DirectAccess]
Tmpl.Title=#4356,Vivaldi
Tmpl.Class=WebBrowser
OpenFilePath=vivaldi.exe,%Tmpl.Vivaldi%\Bookmarks*
OpenFilePath=vivaldi.exe,%Tmpl.Vivaldi%\Favicons*
[Template_Vivaldi_History_DirectAccess]
Tmpl.Title=#4336,Vivaldi
Tmpl.Class=WebBrowser
OpenFilePath=vivaldi.exe,%Tmpl.Vivaldi%\Bookmarks*
OpenFilePath=vivaldi.exe,%Tmpl.Vivaldi%\Favicons*
OpenFilePath=vivaldi.exe,%Tmpl.Vivaldi%\*History*
OpenFilePath=vivaldi.exe,%Tmpl.Vivaldi%\Current *
OpenFilePath=vivaldi.exe,%Tmpl.Vivaldi%\Last *
OpenFilePath=vivaldi.exe,%Tmpl.Vivaldi%\Visited Links*
[Template_Vivaldi_Cookies_DirectAccess]
Tmpl.Title=#4328,Vivaldi
Tmpl.Class=WebBrowser
OpenFilePath=vivaldi.exe,%Tmpl.Vivaldi%\Network\Cookies*
[Template_Vivaldi_Notes_DirectAccess]
Tmpl.Title=#4341,Vivaldi
Tmpl.Class=WebBrowser
OpenFilePath=vivaldi.exe,%Tmpl.Vivaldi%\Notes*
[Template_Vivaldi_Passwords_DirectAccess]
Tmpl.Title=#4331,Vivaldi
Tmpl.Class=WebBrowser
OpenFilePath=vivaldi.exe,%Tmpl.Vivaldi%\Login Data*
[Template_Vivaldi_Preferences_DirectAccess]
Tmpl.Title=#4339,Vivaldi
Tmpl.Class=WebBrowser
OpenFilePath=vivaldi.exe,%Tmpl.Vivaldi%\Preferences*
[Template_Vivaldi_Sync_DirectAccess]
Tmpl.Title=#4324,Vivaldi
Tmpl.Class=WebBrowser
OpenFilePath=vivaldi.exe,%Tmpl.Vivaldi%\Sync Data\*
OpenFilePath=vivaldi.exe,%Tmpl.Vivaldi%\Sync Extension Settings\*
[Template_Vivaldi_Phishing_DirectAccess]
Tmpl.Title=#4337,Vivaldi
Tmpl.Class=WebBrowser
OpenFilePath=vivaldi.exe,%Local AppData%\Vivaldi\User Data\Safe Browsing*
OpenFilePath=vivaldi.exe,%Local AppData%\Vivaldi\User Data\CertificateRevocation
[Template_Vivaldi_Profile_DirectAccess]
Tmpl.Title=#4338,Vivaldi
Tmpl.Class=WebBrowser
OpenFilePath=vivaldi.exe,%Tmpl.Vivaldi%\*
[Template_Vivaldi_Separator]
Tmpl.Title=-
Tmpl.Class=WebBrowser
#
# Brave Browser
#
[Template_Brave_Force]
Tmpl.Title=#4323,Brave Browser
Tmpl.Class=WebBrowser
ForceProcess=brave.exe
[Template_Brave_Bookmarks_DirectAccess]
Tmpl.Title=#4356,Brave Browser
Tmpl.Class=WebBrowser
OpenFilePath=brave.exe,%Tmpl.Brave%\Bookmarks*
OpenFilePath=brave.exe,%Tmpl.Brave%\Favicons*
[Template_Brave_History_DirectAccess]
Tmpl.Title=#4336,Brave Browser
Tmpl.Class=WebBrowser
OpenFilePath=brave.exe,%Tmpl.Brave%\Bookmarks*
OpenFilePath=brave.exe,%Tmpl.Brave%\Favicons*
OpenFilePath=brave.exe,%Tmpl.Brave%\*History*
OpenFilePath=brave.exe,%Tmpl.Brave%\Current *
OpenFilePath=brave.exe,%Tmpl.Brave%\Last *
OpenFilePath=brave.exe,%Tmpl.Brave%\Visited Links*
[Template_Brave_Cookies_DirectAccess]
Tmpl.Title=#4328,Brave Browser
Tmpl.Class=WebBrowser
OpenFilePath=brave.exe,%Tmpl.Brave%\Network\Cookies*
[Template_Brave_Passwords_DirectAccess]
Tmpl.Title=#4331,Brave Browser
Tmpl.Class=WebBrowser
OpenFilePath=brave.exe,%Tmpl.Brave%\Login Data*
[Template_Brave_Preferences_DirectAccess]
Tmpl.Title=#4339,Brave Browser
Tmpl.Class=WebBrowser
OpenFilePath=brave.exe,%Tmpl.Brave%\Preferences*
[Template_Brave_Sync_DirectAccess]
Tmpl.Title=#4324,Brave Browser
Tmpl.Class=WebBrowser
OpenFilePath=brave.exe,%Tmpl.Brave%\Sync Data\*
[Template_Brave_Phishing_DirectAccess]
Tmpl.Title=#4337,Brave Browser
Tmpl.Class=WebBrowser
OpenFilePath=brave.exe,%Local AppData%\BraveSoftware\Brave-Browser\User Data\Safe Browsing*
OpenFilePath=brave.exe,%Local AppData%\BraveSoftware\Brave-Browser\User Data\CertificateRevocation
[Template_Brave_Profile_DirectAccess]
Tmpl.Title=#4338,Brave Browser
Tmpl.Class=WebBrowser
OpenFilePath=brave.exe,%Tmpl.Brave%\*
[Template_Brave_Separator]
Tmpl.Title=-
Tmpl.Class=WebBrowser
#
# Opera
#
[Template_Opera_Force]
Tmpl.Title=#4323,Opera
Tmpl.Class=WebBrowser
ForceProcess=opera.exe
[Template_Opera_Bookmarks_DirectAccess]
Tmpl.Title=#4356,Opera
Tmpl.Class=WebBrowser
OpenFilePath=opera.exe,%Tmpl.Opera%\Bookmarks*
OpenFilePath=opera.exe,%Tmpl.Opera%\Favicons*
[Template_Opera_History_DirectAccess]
Tmpl.Title=#4336,Opera
Tmpl.Class=WebBrowser
OpenFilePath=opera.exe,%Tmpl.Opera%\Bookmarks*
OpenFilePath=opera.exe,%Tmpl.Opera%\Favicons*
OpenFilePath=opera.exe,%Tmpl.Opera%\*History*
OpenFilePath=opera.exe,%Tmpl.Opera%\Current *
OpenFilePath=opera.exe,%Tmpl.Opera%\Last *
OpenFilePath=opera.exe,%Tmpl.Opera%\Visited Links*
[Template_Opera_Cookies_DirectAccess]
Tmpl.Title=#4328,Opera
Tmpl.Class=WebBrowser
OpenFilePath=opera.exe,%Tmpl.Opera%\Network\Cookies*
[Template_Opera_Passwords_DirectAccess]
Tmpl.Title=#4331,Opera
Tmpl.Class=WebBrowser
OpenFilePath=opera.exe,%Tmpl.Opera%\Login Data*
[Template_Opera_Preferences_DirectAccess]
Tmpl.Title=#4339,Opera
Tmpl.Class=WebBrowser
OpenFilePath=opera.exe,%Tmpl.Opera%\Preferences*
[Template_Opera_Sync_DirectAccess]
Tmpl.Title=#4324,Opera
Tmpl.Class=WebBrowser
OpenFilePath=opera.exe,%Tmpl.Opera%\Sync Data\*
[Template_Opera_Phishing_DirectAccess]
Tmpl.Title=#4337,Opera
Tmpl.Class=WebBrowser
OpenFilePath=opera.exe,%Tmpl.Opera%\CertificateRevocation
[Template_Opera_Profile_DirectAccess]
Tmpl.Title=#4338,Opera
Tmpl.Class=WebBrowser
OpenFilePath=opera.exe,%Tmpl.Opera%\*
OpenFilePath=launcher.exe,%Local AppData%\*\Opera\*
OpenFilePath=opera.exe,%Local AppData%\*\Opera\*\*
[Template_Opera_Separator]
Tmpl.Title=-
Tmpl.Class=WebBrowser
#
# Yandex
#
[Template_Yandex_Force]
Tmpl.Title=#4323,Yandex Browser
Tmpl.Class=WebBrowser
ForceProcess=browser.exe
[Template_Yandex_Bookmarks_DirectAccess]
Tmpl.Title=#4356,Yandex Browser
Tmpl.Class=WebBrowser
OpenFilePath=browser.exe,%Tmpl.Yandex%\Bookmarks*
OpenFilePath=browser.exe,%Tmpl.Yandex%\Favicons*
[Template_Yandex_History_DirectAccess]
Tmpl.Title=#4336,Yandex Browser
Tmpl.Class=WebBrowser
OpenFilePath=browser.exe,%Tmpl.Yandex%\Bookmarks*
OpenFilePath=browser.exe,%Tmpl.Yandex%\Favicons*
OpenFilePath=browser.exe,%Tmpl.Yandex%\*History*
OpenFilePath=browser.exe,%Tmpl.Yandex%\Current *
OpenFilePath=browser.exe,%Tmpl.Yandex%\Last *
OpenFilePath=browser.exe,%Tmpl.Yandex%\Visited Links*
[Template_Yandex_Cookies_DirectAccess]
Tmpl.Title=#4328,Yandex Browser
Tmpl.Class=WebBrowser
OpenFilePath=browser.exe,%Tmpl.Yandex%\Network\Cookies*
[Template_Yandex_Passwords_DirectAccess]
Tmpl.Title=#4331,Yandex Browser
Tmpl.Class=WebBrowser
OpenFilePath=browser.exe,%Tmpl.Yandex%\Ya Passman Data*
[Template_Yandex_Preferences_DirectAccess]
Tmpl.Title=#4339,Yandex Browser
Tmpl.Class=WebBrowser
OpenFilePath=browser.exe,%Tmpl.Yandex%\Preferences*
[Template_Yandex_Sync_DirectAccess]
Tmpl.Title=#4324,Yandex Browser
Tmpl.Class=WebBrowser
OpenFilePath=browser.exe,%Tmpl.Yandex%\Sync Data\*
[Template_Yandex_Phishing_DirectAccess]
Tmpl.Title=#4337,Yandex Browser
Tmpl.Class=WebBrowser
OpenFilePath=browser.exe,%Local AppData%\Yandex\YandexBrowser\User Data\Safe Browsing*
OpenFilePath=browser.exe,%Local AppData%\Yandex\YandexBrowser\User Data\CertificateRevocation
[Template_Yandex_Profile_DirectAccess]
Tmpl.Title=#4338,Yandex Browser
Tmpl.Class=WebBrowser
OpenFilePath=browser.exe,%Tmpl.Yandex%\*
[Template_Yandex_Separator]
Tmpl.Title=-
Tmpl.Class=WebBrowser
#
# Ungoogled Chromium
#
[Template_Ungoogled_Force]
Tmpl.Title=#4323,Ungoogled Chromium
Tmpl.Class=WebBrowser
ForceProcess=chrome.exe
[Template_Ungoogled_Bookmarks_DirectAccess]
Tmpl.Title=#4356,Ungoogled Chromium
Tmpl.Class=WebBrowser
OpenFilePath=chrome.exe,%Tmpl.Ungoogled%\Bookmarks*
OpenFilePath=chrome.exe,%Tmpl.Ungoogled%\Favicons*
[Template_Ungoogled_History_DirectAccess]
Tmpl.Title=#4336,Ungoogled Chromium
Tmpl.Class=WebBrowser
OpenFilePath=chrome.exe,%Tmpl.Ungoogled%\Bookmarks*
OpenFilePath=chrome.exe,%Tmpl.Ungoogled%\Favicons*
OpenFilePath=chrome.exe,%Tmpl.Ungoogled%\*History*
OpenFilePath=chrome.exe,%Tmpl.Ungoogled%\Current *
OpenFilePath=chrome.exe,%Tmpl.Ungoogled%\Last *
OpenFilePath=chrome.exe,%Tmpl.Ungoogled%\Visited Links*
[Template_Ungoogled_Cookies_DirectAccess]
Tmpl.Title=#4328,Ungoogled Chromium
Tmpl.Class=WebBrowser
OpenFilePath=chrome.exe,%Tmpl.Ungoogled%\Network\Cookies*
[Template_Ungoogled_Passwords_DirectAccess]
Tmpl.Title=#4331,Ungoogled Chromium
Tmpl.Class=WebBrowser
OpenFilePath=chrome.exe,%Tmpl.Ungoogled%\Login Data*
[Template_Ungoogled_Preferences_DirectAccess]
Tmpl.Title=#4339,Ungoogled Chromium
Tmpl.Class=WebBrowser
OpenFilePath=chrome.exe,%Tmpl.Ungoogled%\Preferences*
[Template_Ungoogled_Sync_DirectAccess]
Tmpl.Title=#4324,Ungoogled Chromium
Tmpl.Class=WebBrowser
OpenFilePath=chrome.exe,%Tmpl.Ungoogled%\Sync Data\*
[Template_Ungoogled_Profile_DirectAccess]
Tmpl.Title=#4338,Ungoogled Chromium
Tmpl.Class=WebBrowser
OpenFilePath=chrome.exe,%Tmpl.Ungoogled%\*
[Template_Ungoogled_Separator]
Tmpl.Title=-
Tmpl.Class=WebBrowser
#
# SRWare Iron
#
[Template_Iron_Force]
Tmpl.Title=#4323,SRWare Iron
Tmpl.Class=WebBrowser
ForceFolder=C:\Program Files\SRWare Iron (64-Bit)
[Template_Iron_Bookmarks_DirectAccess]
Tmpl.Title=#4356,SRWare Iron
Tmpl.Class=WebBrowser
OpenFilePath=chrome.exe,%Tmpl.Iron%\Bookmarks*
OpenFilePath=chrome.exe,%Tmpl.Iron%\Favicons*
[Template_Iron_History_DirectAccess]
Tmpl.Title=#4336,SRWare Iron
Tmpl.Class=WebBrowser
OpenFilePath=chrome.exe,%Tmpl.Iron%\Bookmarks*
OpenFilePath=chrome.exe,%Tmpl.Iron%\Favicons*
OpenFilePath=chrome.exe,%Tmpl.Iron%\*History*
OpenFilePath=chrome.exe,%Tmpl.Iron%\Current *
OpenFilePath=chrome.exe,%Tmpl.Iron%\Last *
OpenFilePath=chrome.exe,%Tmpl.Iron%\Visited Links*
[Template_Iron_Cookies_DirectAccess]
Tmpl.Title=#4328,SRWare Iron
Tmpl.Class=WebBrowser
OpenFilePath=chrome.exe,%Tmpl.Iron%\Network\Cookies*
[Template_Iron_Passwords_DirectAccess]
Tmpl.Title=#4331,SRWare Iron
Tmpl.Class=WebBrowser
OpenFilePath=chrome.exe,%Tmpl.Iron%\Login Data*
[Template_Iron_Preferences_DirectAccess]
Tmpl.Title=#4339,SRWare Iron
Tmpl.Class=WebBrowser
OpenFilePath=chrome.exe,%Tmpl.Iron%\Preferences*
[Template_Iron_Sync_DirectAccess]
Tmpl.Title=#4324,SRWare Iron
Tmpl.Class=WebBrowser
OpenFilePath=chrome.exe,%Tmpl.Iron%\Sync Data\*
[Template_Iron_Phishing_DirectAccess]
Tmpl.Title=#4337,SRWare Iron
Tmpl.Class=WebBrowser
OpenFilePath=chrome.exe,%Local AppData%\Chromium\User Data\Safe Browsing*
OpenFilePath=chrome.exe,%Local AppData%\Chromium\User Data\CertificateRevocation
[Template_Iron_Profile_DirectAccess]
Tmpl.Title=#4338,SRWare Iron
Tmpl.Class=WebBrowser
OpenFilePath=chrome.exe,%Tmpl.Iron%\*
[Template_Iron_Separator]
Tmpl.Title=-
Tmpl.Class=WebBrowser
#
# Maxthon 6 (Chromium)
#
[Template_Maxthon6_Force]
Tmpl.Title=#4323,Maxthon 6
Tmpl.Class=WebBrowser
ForceProcess=Maxthon.exe
[Template_Maxthon6_Bookmarks_DirectAccess]
Tmpl.Title=#4356,Maxthon 6
Tmpl.Class=WebBrowser
OpenFilePath=Maxthon.exe,%Tmpl.Maxthon_6%\Bookmarks*
OpenFilePath=Maxthon.exe,%Tmpl.Maxthon_6%\Favicons*
[Template_Maxthon6_History_DirectAccess]
Tmpl.Title=#4336,Maxthon 6
Tmpl.Class=WebBrowser
OpenFilePath=Maxthon.exe,%Tmpl.Maxthon_6%\Bookmarks*
OpenFilePath=Maxthon.exe,%Tmpl.Maxthon_6%\Favicons*
OpenFilePath=Maxthon.exe,%Tmpl.Maxthon_6%\*History*
OpenFilePath=Maxthon.exe,%Tmpl.Maxthon_6%\Current *
OpenFilePath=Maxthon.exe,%Tmpl.Maxthon_6%\Last *
OpenFilePath=Maxthon.exe,%Tmpl.Maxthon_6%\Visited Links*
[Template_Maxthon6_Cookies_DirectAccess]
Tmpl.Title=#4328,Maxthon 6
Tmpl.Class=WebBrowser
OpenFilePath=Maxthon.exe,%Tmpl.Maxthon_6%\Network\Cookies*
[Template_Maxthon6_Passwords_DirectAccess]
Tmpl.Title=#4331,Maxthon 6
Tmpl.Class=WebBrowser
OpenFilePath=Maxthon.exe,%Tmpl.Maxthon_6%\Login Data*
[Template_Maxthon6_Preferences_DirectAccess]
Tmpl.Title=#4339,Maxthon 6
Tmpl.Class=WebBrowser
OpenFilePath=Maxthon.exe,%Tmpl.Maxthon_6%\Preferences*
[Template_Maxthon6_Phishing_DirectAccess]
Tmpl.Title=#4337,Maxthon 6
Tmpl.Class=WebBrowser
OpenFilePath=Maxthon.exe,%Local AppData%\Maxthon\Application\User Data\Safe Browsing*
OpenFilePath=Maxthon.exe,%Local AppData%\Maxthon\Application\User Data\CertificateRevocation
[Template_Maxthon6_Profile_DirectAccess]
Tmpl.Title=#4338,Maxthon 6
Tmpl.Class=WebBrowser
OpenFilePath=Maxthon.exe,%Tmpl.Maxthon_6%\*
[Template_Maxthon6_Separator]
Tmpl.Title=-
Tmpl.Class=WebBrowser
#
# Comodo Dragon
#
[Template_Dragon_Force]
Tmpl.Title=#4323,Comodo Dragon
Tmpl.Class=WebBrowser
ForceProcess=dragon.exe
[Template_Dragon_Bookmarks_DirectAccess]
Tmpl.Title=#4356,Comodo Dragon
Tmpl.Class=WebBrowser
OpenFilePath=dragon.exe,%Tmpl.Dragon%\Bookmarks*
OpenFilePath=dragon.exe,%Tmpl.Dragon%\Favicons*
[Template_Dragon_History_DirectAccess]
Tmpl.Title=#4336,Comodo Dragon
Tmpl.Class=WebBrowser
OpenFilePath=dragon.exe,%Tmpl.Dragon%\Bookmarks*
OpenFilePath=dragon.exe,%Tmpl.Dragon%\Favicons*
OpenFilePath=dragon.exe,%Tmpl.Dragon%\*History*
OpenFilePath=dragon.exe,%Tmpl.Dragon%\Current *
OpenFilePath=dragon.exe,%Tmpl.Dragon%\Last *
OpenFilePath=dragon.exe,%Tmpl.Dragon%\Visited Links*
[Template_Dragon_Cookies_DirectAccess]
Tmpl.Title=#4328,Comodo Dragon
Tmpl.Class=WebBrowser
OpenFilePath=dragon.exe,%Tmpl.Dragon%\Network\Cookies*
[Template_Dragon_Passwords_DirectAccess]
Tmpl.Title=#4331,Comodo Dragon
Tmpl.Class=WebBrowser
OpenFilePath=dragon.exe,%Tmpl.Dragon%\Login Data*
[Template_Dragon_Preferences_DirectAccess]
Tmpl.Title=#4339,Comodo Dragon
Tmpl.Class=WebBrowser
OpenFilePath=dragon.exe,%Tmpl.Dragon%\Preferences*
[Template_Dragon_Phishing_DirectAccess]
Tmpl.Title=#4337,Comodo Dragon
Tmpl.Class=WebBrowser
OpenFilePath=dragon.exe,%Local AppData%\Comodo\Dragon\User Data\Safe Browsing*
OpenFilePath=dragon.exe,%Local AppData%\Comodo\Dragon\User Data\CertificateRevocation
[Template_Dragon_Profile_DirectAccess]
Tmpl.Title=#4338,Comodo Dragon
Tmpl.Class=WebBrowser
OpenFilePath=dragon.exe,%Tmpl.Dragon%\*
[Template_Dragon_Separator]
Tmpl.Title=-
Tmpl.Class=WebBrowser
#
# Osiris Browser
#
[Template_Osiris_Force]
Tmpl.Title=#4323,Osiris Browser
Tmpl.Class=WebBrowser
ForceProcess=osiris.exe
[Template_Osiris_Bookmarks_DirectAccess]
Tmpl.Title=#4356,Osiris Browser
Tmpl.Class=WebBrowser
OpenFilePath=osiris.exe,%Tmpl.Osiris%\Bookmarks*
OpenFilePath=osiris.exe,%Tmpl.Osiris%\Favicons*
[Template_Osiris_History_DirectAccess]
Tmpl.Title=#4336,Osiris Browser
Tmpl.Class=WebBrowser
OpenFilePath=osiris.exe,%Tmpl.Osiris%\Bookmarks*
OpenFilePath=osiris.exe,%Tmpl.Osiris%\Favicons*
OpenFilePath=osiris.exe,%Tmpl.Osiris%\*History*
OpenFilePath=osiris.exe,%Tmpl.Osiris%\Current *
OpenFilePath=osiris.exe,%Tmpl.Osiris%\Last *
OpenFilePath=osiris.exe,%Tmpl.Osiris%\Visited Links*
[Template_Osiris_Cookies_DirectAccess]
Tmpl.Title=#4328,Osiris Browser
Tmpl.Class=WebBrowser
OpenFilePath=osiris.exe,%Tmpl.Osiris%\Cookies*
[Template_Osiris_Passwords_DirectAccess]
Tmpl.Title=#4331,Osiris Browser
Tmpl.Class=WebBrowser
OpenFilePath=osiris.exe,%Tmpl.Osiris%\Login Data*
[Template_Osiris_Preferences_DirectAccess]
Tmpl.Title=#4339,Osiris Browser
Tmpl.Class=WebBrowser
OpenFilePath=osiris.exe,%Tmpl.Osiris%\Preferences*
[Template_Osiris_Sync_DirectAccess]
Tmpl.Title=#4324,Osiris Browser
Tmpl.Class=WebBrowser
OpenFilePath=osiris.exe,%Tmpl.Osiris%\Sync Data\*
[Template_Osiris_Phishing_DirectAccess]
Tmpl.Title=#4337,Osiris Browser
Tmpl.Class=WebBrowser
OpenFilePath=osiris.exe,%Tmpl.Osiris%\User Data\Safe Browsing*
OpenFilePath=osiris.exe,%Tmpl.Osiris%\User Data\CertificateRevocation
[Template_Osiris_Profile_DirectAccess]
Tmpl.Title=#4338,Osiris Browser
Tmpl.Class=WebBrowser
OpenFilePath=osiris.exe,%Tmpl.Osiris%\*
[Template_Osiris_Separator]
Tmpl.Title=-
Tmpl.Class=WebBrowser
#
# FlashPeak Slimjet
#
[Template_Slimjet_Force]
Tmpl.Title=#4323,Slimjet
Tmpl.Class=WebBrowser
ForceProcess=slimjet.exe
[Template_Slimjet_Bookmarks_DirectAccess]
Tmpl.Title=#4356,Slimjet
Tmpl.Class=WebBrowser
OpenFilePath=slimjet.exe,%Tmpl.Slimjet%\Bookmarks*
OpenFilePath=slimjet.exe,%Tmpl.Slimjet%\Favicons*
[Template_Slimjet_History_DirectAccess]
Tmpl.Title=#4336,Slimjet
Tmpl.Class=WebBrowser
OpenFilePath=slimjet.exe,%Tmpl.Slimjet%\Bookmarks*
OpenFilePath=slimjet.exe,%Tmpl.Slimjet%\Favicons*
OpenFilePath=slimjet.exe,%Tmpl.Slimjet%\*History*
OpenFilePath=slimjet.exe,%Tmpl.Slimjet%\Current *
OpenFilePath=slimjet.exe,%Tmpl.Slimjet%\Last *
OpenFilePath=slimjet.exe,%Tmpl.Slimjet%\Visited Links*
[Template_Slimjet_Cookies_DirectAccess]
Tmpl.Title=#4328,Slimjet
Tmpl.Class=WebBrowser
OpenFilePath=slimjet.exe,%Tmpl.Slimjet%\Network\Cookies*
[Template_Slimjet_Passwords_DirectAccess]
Tmpl.Title=#4331,Slimjet
Tmpl.Class=WebBrowser
OpenFilePath=slimjet.exe,%Tmpl.Slimjet%\Login Data*
[Template_Slimjet_Preferences_DirectAccess]
Tmpl.Title=#4339,Slimjet
Tmpl.Class=WebBrowser
OpenFilePath=slimjet.exe,%Tmpl.Slimjet%\Preferences*
[Template_Slimjet_Sync_DirectAccess]
Tmpl.Title=#4324,Slimjet
Tmpl.Class=WebBrowser
OpenFilePath=slimjet.exe,%Tmpl.Slimjet%\Sync Data\*
OpenFilePath=slimjet.exe,%Tmpl.Slimjet%\Sync Extension Settings\*
[Template_Slimjet_Phishing_DirectAccess]
Tmpl.Title=#4337,Slimjet
Tmpl.Class=WebBrowser
OpenFilePath=slimjet.exe,%Local AppData%\Slimjet\User Data\Safe Browsing*
OpenFilePath=slimjet.exe,%Local AppData%\Slimjet\User Data\CertificateRevocation
[Template_Slimjet_Profile_DirectAccess]
Tmpl.Title=#4338,Slimjet
Tmpl.Class=WebBrowser
OpenFilePath=slimjet.exe,%Local AppData%\Slimjet*
#
# Email Readers
#
[Template_Office_Outlook]
Tmpl.Title=Office Outlook
Tmpl.Class=EmailReader
ProcessGroup=<Office_Outlook>,outlook.exe
OpenFilePath=<Office_Outlook>,%Tmpl.Office_Outlook%
OpenFilePath=<Office_Outlook>,%AppData%\Microsoft\Outlook
OpenFilePath=<Office_Outlook>,%Local AppData%\Microsoft\Outlook
OpenFilePath=outlook.exe,*.eml
OpenKeyPath=<Office_Outlook>,HKEY_CURRENT_USER\Software\Microsoft\Office
OpenKeyPath=<Office_Outlook>,HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager
OpenKeyPath=<Office_Outlook>,HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
# Outlook pst locks
OpenIpcPath=<Office_Outlook>,*\BaseNamedObjects*\OLKCRPC.OBJ=*
OpenIpcPath=<Office_Outlook>,*\BaseNamedObjects*\MAPI-HP*
OpenIpcPath=<Office_Outlook>,*\BaseNamedObjects*\*_WCIDXPACKED
OpenIpcPath=<Office_Outlook>,*\BaseNamedObjects*\*_WCEMPTY
OpenIpcPath=<Office_Outlook>,*\BaseNamedObjects*\*_WCWRITE
OpenIpcPath=<Office_Outlook>,*\BaseNamedObjects*\*_WCINFO
OpenIpcPath=<Office_Outlook>,*\BaseNamedObjects*\*_CACHEMUTEX
OpenIpcPath=<Office_Outlook>,*\BaseNamedObjects*\*_NDB_ZOMBIE
OpenIpcPath=<Office_Outlook>,*\BaseNamedObjects*\NDB_ROOT_MUTEX
OpenIpcPath=<Office_Outlook>,*\BaseNamedObjects*\Shared-NDB-FE
OpenIpcPath=<Office_Outlook>,*\BaseNamedObjects*\Optex_*_LogOptex
OpenIpcPath=<Office_Outlook>,*\BaseNamedObjects*\OfficeSharedLocks_*
OpenIpcPath=<Office_Outlook>,*\BaseNamedObjects\WMS Notif Engine*
OpenWinClass=<Office_Outlook>,WMS ST Notif Class
# Integration with Windows Desktop Search
OpenClsid={7D096C5F-AC08-4F1F-BEB7-5C22C517CE39}
OpenClsid={9E175B6D-F52A-11D8-B9A5-505054503030}
OpenPipePath=\Device\NamedPipe\MsFteWds
[Template_Office_Outlook_NEO_Pro]
Tmpl.Title=Office Outlook + NEO Pro
Tmpl.Class=EmailReader
Tmpl.Url=http://www.caelo.com/
ProcessGroup=<Office_Outlook>,neopro.exe
OpenFilePath=<Office_Outlook>,%Local AppData%\Caelo\NEO Pro\*
OpenKeyPath=<Office_Outlook>,HKEY_CURRENT_USER\Software\Caelo Software\
LingerProcess=w32mkde.exe
[Template_Office_Outlook_Copernic_Desktop_Search]
Tmpl.Title=Office Outlook + Copernic Desktop Search
Tmpl.Class=EmailReader
Tmpl.Url=http://www.copernic.com/index.html
Tmpl.Scan=s
Tmpl.ScanKey=\REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{728F7B17-0053-4543-B232-EC3F19A97985}
OpenIpcPath=<Office_Outlook>,$:DesktopSearchService.exe
OpenIpcPath=<Office_Outlook>,*\BaseNamedObjects*\*DDCS
[Template_Office_Outlook_Avast_Mail_Scanner]
Tmpl.Title=Office Outlook + avast! Mail Scanner
Tmpl.Class=EmailReader
Tmpl.Url=http://www.avast.com
Tmpl.Scan=s
Tmpl.ScanService=avast! Mail Scanner
OpenIpcPath=<Office_Outlook>,\RPC Control\[Aavm]
OpenIpcPath=<Office_Outlook>,*\BaseNamedObjects*\*Aavm*
OpenIpcPath=<Office_Outlook>,*\BaseNamedObjects*\AvOut*
OpenIpcPath=<Office_Outlook>,*\BaseNamedObjects*\AvSPM*
OpenIpcPath=<Office_Outlook>,*\BaseNamedObjects*\AvRes*
ProcessGroup=<Office_Outlook>,outlook.exe
[Template_Office_Outlook_Rainlendar]
Tmpl.Title=Office Outlook + Rainlendar
Tmpl.Class=EmailReader
Tmpl.Url=http://www.rainlendar.net
Tmpl.Scan=s
Tmpl.ScanProduct=Rainlendar2
OpenIpcPath=<Office_Outlook>,*\BaseNamedObjects*\Mutex_MSOSharedMem
OpenIpcPath=<Office_Outlook>,*\BaseNamedObjects*\MSOutlook97_ANCTinuse
OpenIpcPath=<Office_Outlook>,$:Rainlendar2.exe
ProcessGroup=<Office_Outlook>,outlook.exe
[Template_Windows_Vista_Mail]
Tmpl.Title=Windows Vista Mail
Tmpl.Class=EmailReader
OpenFilePath=winmail.exe,%Tmpl.Windows_Vista_Mail%
OpenFilePath=winmail.exe,%AppData%\Microsoft\Windows Mail
OpenFilePath=winmail.exe,%Local AppData%\Microsoft\Windows Mail
OpenFilePath=winmail.exe,*.eml
OpenKeyPath=winmail.exe,HKEY_CURRENT_USER\Software\Microsoft\Windows Mail
OpenKeyPath=winmail.exe,HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager
[Template_Windows_Live_Mail]
Tmpl.Title=Windows Live Mail
Tmpl.Class=EmailReader
ProcessGroup=<Windows_Live_Mail>,wlmail.exe,wlcomm.exe
OpenFilePath=<Windows_Live_Mail>,%Tmpl.Windows_Live_Mail%
OpenFilePath=<Windows_Live_Mail>,%AppData%\Microsoft\Windows Live Mail
OpenFilePath=<Windows_Live_Mail>,%AppData%\Microsoft\Windows Live Contacts
OpenFilePath=<Windows_Live_Mail>,%Local AppData%\Microsoft\Windows Live Mail
OpenFilePath=<Windows_Live_Mail>,%Local AppData%\Microsoft\Windows Live Contacts
OpenFilePath=<Windows_Live_Mail>,%Local AppData%\Microsoft\Windows Live\Contacts
OpenFilePath=wlmail.exe,*.eml
OpenKeyPath=<Windows_Live_Mail>,HKEY_CURRENT_USER\Software\Microsoft\Windows Live
OpenKeyPath=<Windows_Live_Mail>,HKEY_CURRENT_USER\Software\Microsoft\Windows Live Mail
OpenIpcPath=<Windows_Live_Mail>,\RPC Control\LiveIdSvc
[Template_Thunderbird]
Tmpl.Title=Thunderbird
Tmpl.Class=EmailReader
OpenFilePath=thunderbird.exe,%Tmpl.Thunderbird%
OpenFilePath=thunderbird.exe,%AppData%\Thunderbird
OpenFilePath=thunderbird.exe,%Local AppData%\Thunderbird
OpenKeyPath=thunderbird.exe,HKEY_LOCAL_MACHINE\SOFTWARE\Clients\*\Mozilla Thunderbird*
OpenKeyPath=thunderbird.exe,HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Thunderbird*
[Template_Thunderbird_PGP]
Tmpl.Title=OpenPGP for Thunderbird
Tmpl.Class=EmailReader
OpenFilePath=thunderbird.exe,%AppData%\gnupg
ProcessGroup=<gpg_programs>,gpg.exe,gpg2.exe,gpg-agent.exe
OpenFilePath=<gpg_programs>,%Tmpl.Thunderbird%
OpenFilePath=<gpg_programs>,%AppData%\Thunderbird
OpenFilePath=<gpg_programs>,%Local AppData%\Thunderbird
OpenFilePath=<gpg_programs>,%AppData%\gnupg\
LingerProcess=gpg-agent.exe
[Template_SeaMonkey]
Tmpl.Title=SeaMonkey
Tmpl.Class=EmailReader
OpenFilePath=seamonkey.exe,%Tmpl.SeaMonkey%\Mail*
#OpenFilePath=seamonkey.exe,%AppData%\Mozilla\Profiles\*\Mail*
#OpenFilePath=seamonkey.exe,%Local AppData%\Mozilla\Profiles\*\Mail*
OpenKeyPath=seamonkey.exe,HKEY_CURRENT_USER\Software\Mozilla*\SeaMonkey*
OpenKeyPath=seamonkey.exe,HKEY_LOCAL_MACHINE\Software\Mozilla\SeaMonkey*
[Template_Opera_Mail]
Tmpl.Title=Opera Mail
Tmpl.Class=EmailReader
OpenFilePath=opera.exe,%Tmpl.Opera_Mail%\*
OpenFilePath=opera.exe,%AppData%\Opera\*\mail\*
OpenFilePath=opera.exe,%Local AppData%\Opera\*\mail\*
[Template_IncrediMail]
Tmpl.Title=IncrediMail
Tmpl.Class=EmailReader
OpenFilePath=IncMail.exe,*\IncrediMail\Data\*
OpenFilePath=IncMail.exe,%Tmpl.Incredimail%\
OpenFilePath=IncMail.exe,%Local AppData%\IM\
OpenFilePath=IncMail.exe,%AppData%\IM\
OpenFilePath=ImApp.exe,*\IncrediMail\Data\*
OpenFilePath=ImApp.exe,%Tmpl.Incredimail%\
OpenFilePath=ImApp.exe,%Local AppData%\IM\
OpenFilePath=ImApp.exe,%AppData%\IM\
LingerProcess=ImApp.exe
[Template_Eudora]
Tmpl.Title=Eudora
Tmpl.Class=EmailReader
OpenFilePath=eudora.exe,%Tmpl.Eudora%
OpenKeyPath=eudora.exe,HKEY_CURRENT_USER\Software\Qualcomm\Eudora
[Template_TheBat]
Tmpl.Title=The Bat!
Tmpl.Class=EmailReader
ProcessGroup=<TheBat>,thebat32.exe,thebat64.exe
OpenFilePath=<TheBat>,%Tmpl.TheBat%
OpenKeyPath=<TheBat>,HKEY_CURRENT_USER\Software\RIT\The Bat!
[Template_eM_Client]
Tmpl.Title=eM Client
Tmpl.Class=EmailReader
Tmpl.Url=http://www.emclient.com
OpenFilePath=MailClient.exe,%Tmpl.em_Client%\
[Template_SpamFighter]
Tmpl.Title=SPAMfighter
Tmpl.Class=EmailReader
Tmpl.Url=http://www.spamfighter.com/
OpenIpcPath=*\BaseNamedObjects*\SPAMfighter.*
OpenIpcPath=*\BaseNamedObjects*\sfsg.update_*
OpenIpcPath=*\BaseNamedObjects*\log-*_SPAMfighter_Logs_*
OpenIpcPath=*\BaseNamedObjects*\*?SPAMCFG.EXE
OpenKeyPath=HKEY_CURRENT_USER\Software\SPAMfighter\
[Template_GreatNews]
Tmpl.Title=Great News RSS Reader
Tmpl.Class=EmailReader
Tmpl.Url=http://www.curiostudio.com/download.html
Tmpl.Scan=s
Tmpl.ScanProduct={AA381A22-834B-4b21-AB78-CAFF2B05A4C3}}_is1
OpenFilePath=GreatNews.exe,*\greatnews.ini
OpenFilePath=GreatNews.exe,*\newsfeed.db
#
# PDF and Printing
#
[Template_AdobeAcrobat]
Tmpl.Title=Adobe Acrobat
Tmpl.Class=Print
Tmpl.Url=http://www.adobe.com/
OpenPipePath=\Device\NamedPipe\FLEXnet Licensing Service*
OpenIpcPath=*\BaseNamedObjects*\FLEXnet Licensing Service*
OpenWinClass=AcrobatTrayIcon
[Template_AdobeAcrobatReader]
Tmpl.Title=Adobe Acrobat Reader
Tmpl.Class=Print
Tmpl.Url=http://www.adobe.com/
Tmpl.Scan=s
Tmpl.ScanKey=\REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F9DB5320-233E-11D1-9F84-707F02C10627}
Tmpl.ScanKey=\REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Classes\CLSID\{F9DB5320-233E-11D1-9F84-707F02C10627}
OpenPipePath=\Device\NamedPipe\AIPC_SRV\pdfshell_*
OpenPipePath=\Device\NamedPipe\AIPC_SRV\AcroSBL_*
NoRenameWinClass=AcrobatSDIWindow
[Template_AdobeDistiller]
Tmpl.Title=Adobe Acrobat (version 8 or 9) with Distiller
Tmpl.Class=Print
Tmpl.Url=http://www.adobe.com/
Tmpl.Scan=w
OpenPipePath=\Device\NamedPipe\PMtoDistiller
OpenWinClass=Distiller
[Template_AdobeLicensing]
Tmpl.Title=FlexNet Licensing for Adobe and Autodesk
Tmpl.Class=Print
Tmpl.Url=http://www.adobe.com/
Tmpl.Scan=i
OpenPipePath=\Device\NamedPipe\FLEXnet Licensing Service*
OpenIpcPath=*\BaseNamedObjects*\FLEXnet Licensing Service*
[Template_eDocPrinter]
Tmpl.Title=ITEKSOFT eDocPrinter PDF
Tmpl.Class=Print
Tmpl.Url=http://uk.iteksoft.com/
Tmpl.Scan=s
Tmpl.ScanKey=\REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{E6718EF2-2B9F-4FFE-B783-35E2CDC6F12E}
Tmpl.ScanKey=\REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{621483E9-77B0-4E2E-A737-2DB9D5CD02E0}
OpenIpcPath=*\BaseNamedObjects*\eDocPDF*
OpenIpcPath=*\BaseNamedObjects*\Global\eDocPDF*
OpenIpcPath=*\BaseNamedObjects*\EPDFEVTREGPIPE*
OpenPipePath=%Tmpl.eDocPrinter%\
OpenKeyPath=HKEY_CURRENT_USER\Software\ITEKSOFT\eDocPrinter\PDF\
OpenPipePath=%Temp%\ep*\
[Template_FinePrint]
Tmpl.Title=FinePrint (PDF)
Tmpl.Class=Print
Tmpl.Url=http://www.fineprint.com/products/fineprint/index.html
Tmpl.Scan=s
Tmpl.ScanKey=\REGISTRY\MACHINE\Software\FinePrint Software\FinePrint5
Tmpl.ScanKey=\REGISTRY\MACHINE\Software\FinePrint Software\FinePrint6
OpenIpcPath=*\BaseNamedObjects*\FP5*
OpenIpcPath=*\BaseNamedObjects*\FP6*
OpenPipePath=\Device\NamedPipe\FP5_Dispatcher_*
OpenPipePath=\Device\NamedPipe\FP6_Dispatcher_*
OpenWinClass=FP5_DispWndClass
OpenWinClass=FP6_DispWndClass
OpenKeyPath=\REGISTRY\MACHINE\Software\FinePrint Software\FinePrint5
OpenKeyPath=\REGISTRY\MACHINE\Software\FinePrint Software\FinePrint6
OpenFilePath=%Tmpl.FinePrint%\fp5.ini
OpenFilePath=%Tmpl.FinePrint%\fp6.ini
RecoverFolder=%Tmpl.FinePrint%
[Template_HP_UniversalPrintDriver]
Tmpl.Title=HP Universal Print Driver
Tmpl.Class=Print
Tmpl.Url=http://www.hp.com/
Tmpl.Scan=s
Tmpl.ScanKey=\REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{877A5D52-5F6F-4175-907D-A6AC4E8F1171}
OpenClsid={877A5D52-5F6F-4175-907D-A6AC4E8F1171}
#OpenPipePath=\Device\NamedPipe\wkssvc
[Template_NitroPDF5]
Tmpl.Title=Nitro PDF 5
Tmpl.Class=Print
Tmpl.Url=http://www.nitropdf.com/index.asp
Tmpl.Scan=w
OpenWinClass={FAF5BE9E-BAFF-47BF-BA47-1A4B15185066}
OpenWinClass={03576772-AD02-4630-BC5F-3648526FDF87}
OpenWinClass={AD744029-AC6A-4C0C-A597-D0B02CDB4DE4}
OpenPipePath=%Temp%\BCL Technologies
[Template_NitroPDF6]
Tmpl.Title=Nitro PDF 6/7
Tmpl.Class=Print
Tmpl.Scan=s
Tmpl.ScanService=NitroDriverReadSpool
Tmpl.ScanService=NitroDriverReadSpool2
OpenPipePath=\Device\Mailslot\nlsX86ccMailslot
OpenPipePath=\Device\Mailslot\nlsX86ccCtlSlot
OpenPipePath=\Device\NamedPipe\nitropdfdriverspool
OpenPipePath=\Device\NamedPipe\nitropdfreaderdriverspool
OpenPipePath=\Device\Mailslot\AstccMailslot*
OpenIpcPath=*\BaseNamedObjects*\Nitro PDF Professional*
[Template_SumatraPDF]
Tmpl.Title=#4323,SumatraPDF
Tmpl.Class=Print
ForceProcess=SumatraPDF.exe
[Template_SumatraPDF_Folder]
Tmpl.Title=#4338,SumatraPDF
Tmpl.Class=Print
OpenFilePath=%Local AppData%\SumatraPDF
[Template_Evernote]
Tmpl.Title=Evernote
Tmpl.Class=Print
Tmpl.Url=http://evernote.com/
Tmpl.Scan=i
OpenIpcPath=*\BaseNamedObjects*\Evernote*
OpenIpcPath=*\BaseNamedObjects*\ENClipperInstanceMutex
OpenIpcPath=*\BaseNamedObjects*\ENSyncServiceAuthMutex
OpenWinClass=TENTrayMainWindow
OpenWinClass=ENMainFrame
OpenWinClass=ENMainFrame3
OpenWinClass=HwndWrapper[Evernote.exe;*
OpenWinClass=$:EvernoteClipper.exe/IgnoreUIPI
LingerProcess=EvernoteClipper.exe
[Template_MetaProducts_Inquiry]
Tmpl.Title=MetaProducts Inquiry
Tmpl.Class=Print
Tmpl.Url=http://www.metaproducts.com/mp/Inquiry_Standard_Edition.htm
ProcessGroup=<InquiryPrograms>,iqls.exe,iqserv.exe,inquiry.exe,iexplore.exe
OpenFilePath=<InquiryPrograms>,%AppData%\MetaProducts\Inquiry\
OpenFilePath=<InquiryPrograms>,%Personal%\
LingerProcess=iqserv.exe
[Template_Pdf995]
Tmpl.Title=Pdf995
Tmpl.Class=Print
Tmpl.Url=http://www.pdf995.com/index.html
Tmpl.Scan=s
Tmpl.ScanKey=\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Print\Printers\PDF995
OpenPipePath=%Common AppData%\pdf995\
OpenPipePath=%AppData%\pdf995\
OpenPipePath=%Local AppData%\pdf995\
[Template_PretonSaver]
Tmpl.Title=PretonSaver
Tmpl.Class=Print
Tmpl.Url=http://www.preton.com/
Tmpl.Scan=s
Tmpl.ScanService=PretonClientService
OpenPipePath=\Device\NamedPipe\PT32_IpcSessionQueue*
[Template_SolidConverter]
Tmpl.Title=Solid Converter
Tmpl.Class=Print
Tmpl.Url=http://www.soliddocuments.com/features.htm?product=SolidConverterPDF
Tmpl.Scan=s
Tmpl.ScanService=SPDFCreatorReadSpool
OpenPipePath=\Device\NamedPipe\sdspool
OpenIpcPath=*\BaseNamedObjects*\*.spl*
OpenIpcPath=*\BaseNamedObjects*\Solid*
LingerProcess=SolidConverterPDFv8.exe
LingerProcess=SolidScanServiceX86.exe
ClosedFilePath=SolidConverterPDFV8.exe,*
[Template_UltraRecall]
Tmpl.Title=UltraRecall
Tmpl.Class=Print
Tmpl.Url=http://www.kinook.com/UltraRecall/
Tmpl.Scan=s
Tmpl.ScanProduct=Ultra Recall_is1
OpenWinClass=Afx:00400000:0
OpenWinClass=$:UltraRecall.exe/IgnoreUIPI
OpenIpcPath=*\BaseNamedObjects*\UltraRecall
#
# Security/Privacy
#
[Template_a2AntiMalware]
Tmpl.Title=Emsisoft A-Squared Anti-Malware
Tmpl.Class=Security
Tmpl.Url=http://www.emsisoft.com/en/software/free/
Tmpl.Scan=s
Tmpl.ScanService=a2AntiMalware
# version 5.0
OpenPipePath=\Device\NamedPipe\{A2IPC}a2_ipc
OpenIpcPath=*\BaseNamedObjects*\{A2IPCMUTEX}a2_ipc
# earlier versions
OpenIpcPath=*\BaseNamedObjects*\mc2SWDIJ*
OpenIpcPath=*\BaseNamedObjects*\Mutex*Process*API*
OpenIpcPath=*\BaseNamedObjects*\NamedBuffer*Process*API*
OpenIpcPath=*\BaseNamedObjects*\AutoUnhookMap*
OpenIpcPath=*\BaseNamedObjects*\mchLLEW2*
OpenIpcPath=*\BaseNamedObjects*\mchMixCache*
OpenIpcPath=*\BaseNamedObjects*\TestQueue*
OpenIpcPath=\RPC Control\mchIpcTestQueue
OpenIpcPath=$:a2service.exe
[Template_Anonymizer]
Tmpl.Title=Anonymizer Anonymous Surfing
Tmpl.Class=Security
Tmpl.Url=http://www.anonymizer.com/consumer/products/anonymous_surfing/
Tmpl.Scan=i
OpenIpcPath=*\BaseNamedObjects*\AnonFrmWrk*
OpenIpcPath=*\BaseNamedObjects*\AnonTCPMutex
[Template_Avast_Antivirus]
Tmpl.Title=avast! Antivirus
Tmpl.Class=Security
Tmpl.Url=http://www.avast.com
Tmpl.Scan=s
Tmpl.ScanService=avast! Antivirus
OpenWinClass=asw_av_tray_icon_wndclass
OpenIpcPath=*\BaseNamedObjects*\asw.script_blocking.conf_data*
OpenIpcPath=*\BaseNamedObjects*\aavmGlob.*
OpenIpcPath=*\BaseNamedObjects*\aavmSema.*
OpenIpcPath=*\BaseNamedObjects*\*aavmRq.map
OpenIpcPath=*\BaseNamedObjects*\*aavmSync.evt
OpenIpcPath=*\BaseNamedObjects*\*avscr*.map
ClosedFilePath=*\snxhk.dll
ClosedFilePath=*\snxhk64.dll
[Template_AVG_Anti_Virus]
Tmpl.Title=AVG Anti-Virus / LinkScanner
Tmpl.Class=Security
Tmpl.Url=http://www.avg.com
Tmpl.Scan=s
Tmpl.ScanService=AvgLdx86
Tmpl.ScanService=AvgMfx86
Tmpl.ScanService=avgwd
Tmpl.ScanService=avgsvc
ProcessGroup=<AVG_AV_1>,avgscana.exe,avgscanx.exe,avgcsrvx.exe,avgui.exe
ProcessGroup=<AVG_AV_2>,avgscana.exe,avgscanx.exe,avgcsrvx.exe,avgui.exe,firefox.exe,iexplore.exe
ProcessGroup=<AVG_AV_3>,avgscana.exe
OpenPipePath=<AVG_AV_1>,\Device\NamedPipe\*-*-*-*-*::*
OpenPipePath=<AVG_AV_1>,\Device\NamedPipe\AVG-CHJW-*
OpenPipePath=<AVG_AV_1>,\Device\NamedPipe\AvgScanPipeName*
OpenPipePath=<AVG_AV_1>,\Device\NamedPipe\AvgUIPipeName*
OpenPipePath=<AVG_AV_2>,\Device\NamedPipe\__hex8__-__hex4__-__hex4__-__hex4__-__hex12__
OpenIpcPath=<AVG_AV_2>,*\BaseNamedObjects*\bce5ad8b-264e-024b-81d6-f289aa672301*
OpenIpcPath=*\BaseNamedObjects*\__AVG_FW_*__
OpenIpcPath=*\BaseNamedObjects*\CE6383A0-EB13-428c-A97E-92FE645B06E3
OpenFilePath=<AVG_AV_3>,%AllUsersProfile%\AVG*\*
OpenPipePath=\Device\NamedPipe\avg-*
ClosedFilePath=*avg*snxhk*.dll
[Template_Avira_Antivirus]
Tmpl.Title=Avira Antivirus / Internet Security
Tmpl.Class=Security
Tmpl.Url=http://www.avira.com
Tmpl.Scan=s
Tmpl.ScanService=AntiVirService
OpenIpcPath=*\BaseNamedObjects*\AVSDA_KERNELOBJECT_*
OpenIpcPath=*\BaseNamedObjects*\WEBGUARD_KERNEL_OBJECT_*
OpenIpcPath=*\BaseNamedObjects*\AVMAILC_ISPOP3ACTIVE_*
OpenIpcPath=*\BaseNamedObjects*\AVMAILC_KERNELOBJECT_*
OpenIpcPath=*\BaseNamedObjects*\AVMAILC_KERNEL_OBJECT_*
OpenIpcPath=*\BaseNamedObjects*\KERNELOBJECTNAME_*
OpenIpcPath=*\BaseNamedObjects*\KERNELOBJECT_*
OpenIpcPath=*\BaseNamedObjects*\{506A71E2-D744-4717-8689-649A16CBBA0F}
[Template_BitDefenderInternetSecurity]
Tmpl.Title=BitDefender Internet Security
Tmpl.Class=Security
Tmpl.Url=http://www.bitdefender.com
Tmpl.Scan=s
Tmpl.ScanProduct=BitDefender
Tmpl.ScanService=vsserv
Tmpl.ScanService=ProductAgentService
OpenPipePath=\Device\NamedPipe\DEFAULT_BD_COMM_PIPE
ClosedFilePath=*BitDefender*atcuf*.dll
[Template_BitVise]
Tmpl.Title=Bitvise SSH Client
Tmpl.Class=Security
Tmpl.Url=http://www.bitvise.com/
Tmpl.Scan=s
Tmpl.ScanProduct=BvSshClient
OpenIpcPath=\Device\NamedPipe\TLINETLOCKPIPE
[Template_TrendMicroBrowserGuard]
Tmpl.Title=Trend Micro Browser Guard
Tmpl.Class=Security
Tmpl.Url=http://free.antivirus.com/browser-guard/
Tmpl.Scan=s
Tmpl.ScanProduct={D4ADDB2A-EE3C-41A7-88DF-99333DAE18E3}
OpenPipePath=\Device\NamedPipe\bgpipe
[Template_BullGuard]
Tmpl.Title=BullGuard Antivirus / Internet Security
Tmpl.Class=Security
Tmpl.Url=http://www.bullguard.com/
Tmpl.Scan=s
Tmpl.ScanProduct=BullGuard
OpenIpcPath=*\BaseNamedObjects*\BullGuard*
[Template_Bsecure]
Tmpl.Title=Bsecure CloudCare
Tmpl.Class=Security
Tmpl.Url=http://www.bsecure.com/
Tmpl.Scan=s
Tmpl.ScanService=Bsecure
Tmpl.ScanService=BsecureAV
Tmpl.ScanService=BsecureFilter
Tmpl.ScanService=BSecACFltr
OpenIpcPath=*\BaseNamedObjects*\Bsecure*
OpenIpcPath=*\BaseNamedObjects*\IsBsecureServiceRunning
[Template_CA_InternetSecuritySuite]
Tmpl.Title=CA Internet Security Suite
Tmpl.Class=Security
Tmpl.Url=http://shop.ca.com/ca/products/internetsecurity/internetsecurity_suite.asp
Tmpl.Scan=s
Tmpl.ScanService=CAISafe
OpenIpcPath=*\BaseNamedObjects*\820EEE67-B517-405d-A775-8BE1879BD279
OpenIpcPath=*\BaseNamedObjects*\0F727B36-E18C-47fa-B5A4-30C2B84E2EAA
OpenIpcPath=*\BaseNamedObjects*\672AF2F3-FCBE-4870-A103-E78DDCFC051C*
OpenIpcPath=*\BaseNamedObjects*\2212AC6F-01F9-4107-9DD6-C75DA65A7A1F*
OpenIpcPath=*\BaseNamedObjects*\CallingID.*
OpenIpcPath=*\BaseNamedObjects*\*UmxSbx_*
OpenClsid={1791C1B5-FFD0-4D4B-ABCD-7A7DF6EAA89C}
OpenClsid={5F36DC27-B076-4D0C-BD8C-7AEE14022193}
OpenClsid={E82070F7-4174-4F49-8DCF-C87F8DDF0BAA}
[Template_ChildControl2011]
Tmpl.Title=Salfeld.com Child Control 2011
Tmpl.Class=Security
Tmpl.Url=http://www.salfeld.com/software/parentalcontrol/index.html
Tmpl.Scan=s
Tmpl.ScanIpc=*\BaseNamedObjects*\ChicoTaskCaller*
OpenIpcPath=*\BaseNamedObjects*\AutoUnhookMap*
OpenIpcPath=*\BaseNamedObjects*\mchLLEW*
OpenIpcPath=*\BaseNamedObjects*\mchMixCache*
OpenIpcPath=*\BaseNamedObjects*\Mutex*Process*API*
OpenIpcPath=*\BaseNamedObjects*\NamedBuffer*Process*API*
OpenIpcPath=*\BaseNamedObjects*\ChicoTaskCaller*
OpenIpcPath=*\BaseNamedObjects*\IPCMyLogIpc*
OpenIpcPath=*\BaseNamedObjects*\IPCWebCheck*
OpenIpcPath=*\BaseNamedObjects*\Salfeld-*
OpenIpcPath=$:webtmr.exe
[Template_CovenantEyes]
Tmpl.Title=Covenant Eyes
Tmpl.Class=Security
Tmpl.Url=http://www.covenanteyes.com/
Tmpl.Scan=i
OpenIpcPath=*\BaseNamedObjects*\CE_*Obj
OpenWinClass=$:nmSvc.exe/IgnoreUIPI
[Template_ComodoInternetSecurity]
Tmpl.Title=Comodo Internet Security / Antivirus / Firewall
Tmpl.Class=Security
Tmp.Url=http://www.comodo.com/home/internet-security/free-internet-security.php
Tmpl.Scan=s
Tmpl.ScanService=cmdGuard
DelayLoadDll=guard32.dll
DelayLoadDll=guard64.dll
ClosedFilePath=*\Guard32.dll
ClosedFilePath=*\Guard64.dll
[Template_ComodoVerificationEngine]
Tmpl.Title=Comodo Verification Engine
Tmpl.Class=Security
Tmp.Url=http://www.vengine.com/
Tmpl.Scan=w
OpenWinClass=Comodo_TTB_Shadow_Class
OpenIpcPath=*\BaseNamedObjects*\Verification Engine Registry Mutex Object
OpenIpcPath=*\BaseNamedObjects*\EE855D62-517A-420e-ADEA-9813658B0442
OpenIpcPath=*\BaseNamedObjects*\ESigilTaskTrayLoadMutex
OpenIpcPath=*\BaseNamedObjects*\ESigilBho::ValidateOnEvent
OpenIpcPath=*\BaseNamedObjects*\ESigilBho::ValidateOffEvent
[Template_CyberPatrol]
Tmpl.Title=CyberPatrol
Tmpl.Class=Security
Tmp.Url=http://www.cyberpatrol.com/index.htm
Tmpl.Scan=s
Tmpl.ScanKey=\REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{6EE6F203-0E4B-4D35-AA06-2B6FBA833D14}
OpenClsid={09ECA3F9-F977-4FD1-84ED-68C89D435D75}
OpenClsid={24E83BB6-80E1-4A1D-BE63-82BF306F3CFA}
OpenClsid={280B4C50-B42E-47E1-8D8D-39F4CD41CDE3}
OpenClsid={37AFD09F-D0D0-47DF-91FE-67F952482929}
OpenClsid={3AA786BD-E3DB-472C-81E3-F38FF100B6BF}
OpenClsid={3D5B796D-8364-4D81-83CE-E5B32FF345AD}
OpenClsid={4C4D3C2E-A908-4F0B-90EB-0E736564CA96}
OpenClsid={4E386DFE-659D-4428-B9FC-B7B1865E8FCE}
OpenClsid={575E825A-91AB-485E-A450-351449256BEA}
OpenClsid={5D40EC06-89EC-447D-A5E1-EFEAF7FBD3B5}
OpenClsid={6164DE26-D577-4323-B588-F11105C6D30A}
OpenClsid={6792F97B-A3C1-4E89-A1C7-C7DFDA70DBE9}
OpenClsid={6DCE346B-1205-4D49-9E52-6670CF1844AB}
OpenClsid={7714CE7E-F32F-4739-9BCB-3CB442DFA724}
OpenClsid={7B5CCBA7-38B5-4B9C-A0EC-4E5ADFD7BA3A}
OpenClsid={7E9B677A-A155-4B12-A17B-9DBD4F359BCB}
OpenClsid={8ABBB2C6-FF5B-4B01-8250-673EC5155561}
OpenClsid={8C62E4AD-C390-48FD-8311-7C3E764EAD70}
OpenClsid={9B4B7F18-D1EA-43BC-93F4-EDF14E0AA703}
OpenClsid={A747A75D-D03D-48F9-9AC6-50D9B610FAC5}
OpenClsid={AA9AD697-20E3-4ECC-A746-0ABAD875C548}
OpenClsid={BB930754-5C0E-4708-B2AC-8567B9753ADE}
OpenClsid={C42F10D8-967A-4F5C-B78C-F0291C0F7FAA}
OpenClsid={D529E5B4-B49D-4D88-B04D-2FA598D76BEA}
OpenClsid={D57CF01D-10C8-46CA-B7AC-D6969D5433B8}
OpenClsid={DDC8AA23-8016-4E16-B567-8F9FBF153010}
OpenClsid={F51CD102-642B-4381-A549-CFEAF9E1EA53}
OpenClsid={FCAA2E8F-EA4E-44F6-97F5-4418E84073CA}
OpenIpcPath=*\BaseNamedObjects*\CYBERPATROLLLC_CYBERPATROL_*
OpenIpcPath=*\BaseNamedObjects*\CP_LSP_MEM_FILE_EVENT
OpenIpcPath=*\BaseNamedObjects*\CPLSP_CONTENT_MEM_MAPPED_FILE_*
[Template_DigitalPersona]
Tmpl.Title=Digital Persona Fingerprint Reader
Tmpl.Class=Security
Tmpl.Url=http://www.digitalpersona.com/index.php?id=dev_hdw_uareu_reader
Tmpl.Scan=iw
OpenIpcPath=*\BaseNamedObjects*\__DP_TRACE_MUTEX__
OpenIpcPath=*\BaseNamedObjects*\DP_OTS_IPC_MUTEX
OpenIpcPath=*\BaseNamedObjects*\U.are.U_VerifyCriptoprovider
OpenIpcPath=*\BaseNamedObjects*\DP_OTS_IPC_BUFFER
OpenIpcPath=*\BaseNamedObjects*\DP_OTS_LOOKUP_CACHE
OpenIpcPath=\RPC Control\DPHOST
OpenWinClass=DigitalPersona Pro Agent
OpenWinClass=DP_GlobalAvatarClass
[Template_DrWeb_SecuritySpace]
Tmpl.Title=Dr.Web Security Space
Tmpl.Class=Security
Tmpl.Url=http://products.drweb.com/win/security_space/?lng=en
Tmpl.Scan=s
Tmpl.ScanService=DrWebEngine
Tmpl.ScanService=DrWebAVService
OpenPipePath=\Device\SpiderG3
OpenPipePath=\Device\NamedPipe\Dr.Web
OpenPipePath=\??\SPIDER
OpenIpcPath=*\BaseNamedObjects*\DrWebOutlookRunningEvent
OpenWinClass=SpiderAgent GUI Class
[Template_EasyHideIp]
Tmpl.Title=Easy Hide IP
Tmpl.Class=Security
Tmpl.Url=http://www.easy-hide-ip.com/
Tmpl.Scan=s
Tmpl.ScanService=EasyRedirect
OpenIpcPath=*\BaseNamedObjects*\Redirector_event2
OpenClsid={E8B2A82A-2B16-4DBE-BCF0-70CB49FF5022}
[Template_FastAccessAnywhere]
Tmpl.Title=FastAccess Anywhere
Tmpl.Class=Security
Tmpl.Url=http://www.sensiblevision.com/en-us/fastaccessanywhere/overview.aspx
Tmpl.Scan=s
Tmpl.ScanIpc=*\BaseNamedObjects*\E84B01BF-FA91-48e4-A4B3-EECD7E4DB810
OpenIpcPath=*\BaseNamedObjects*\E84B01BF-FA91-48e4-A4B3-EECD7E4DB810
OpenIpcPath=\RPC Control\Callbacks*
OpenWinClass=FATrayAlert
[Template_FSecure]
Tmpl.Title=F-Secure Internet Protection
Tmpl.Class=Security
Tmpl.Url=http://www.f-secure.com/en_US/products/home-office/internet-security/index.html
Tmpl.Scan=s
Tmpl.ScanService=F-Secure Filter
Tmpl.ScanService=F-Secure Gatekeeper Handler Starter
Tmpl.ScanService=F-Secure Gatekeeper
OpenIpcPath=\RPC Control\__hex12__*.*.*.*.*.*.*.*
OpenIpcPath=\RPC Control\F-Secure ORSP V1
OpenIpcPath=*\BaseNamedObjects*\FSMB *
OpenIpcPath=*\BaseNamedObjects*\dxk390x-*
OpenIpcPath=*\BaseNamedObjects*\pipeserverhere*
OpenIpcPath=*\BaseNamedObjects*\pipeserversync*
OpenIpcPath=*\BaseNamedObjects*\pipeservertaken*
OpenPipePath=\Device\NamedPipe\__fs*__
OpenPipePath=\Device\NamedPipe\*.*.*.*.*.*.*.*.*.*
OpenPipePath=\Device\NamedPipe\rcn_*
LingerProcess=fsavaui.exe
# F-Secure 2012
OpenPipePath=\Device\NamedPipe\ccf_cuif*
OpenPipePath=\Device\NamedPipe\fsccfSettingsServer*
OpenPipePath=\Device\NamedPipe\CCFSettingsChangeNotif_*
OpenPipePath=\Device\NamedPipe\PipeServerTaken*
# F-Secure 2013
OpenIpcPath=*\BaseNamedObjects*\FsCcfLogging_*.log
OpenIpcPath=*\BaseNamedObjects*\PipeServerTaken*
OpenPipePath=\Device\NamedPipe\FS_CCF_NI_DAEMON*
# change line below to OpenPipePath=\Device\NamedPipe\%EXENAME%-%PID%
OpenPipePath=\Device\NamedPipe\*.exe-*
[Template_GDataInternetSecurity]
Tmpl.Title=G Data Anti-Virus/Internet Security
Tmpl.Class=Security
Tmpl.Url=http://www.gdata-software.com/home-security/
Tmpl.Scan=s
Tmpl.ScanService=GDScan
OpenClsid={1E0D02B2-989A-45FF-9318-F43CC56C515A}
[Template_HomeGuard]
Tmpl.Title=HomeGuard Activity Monitor
Tmpl.Class=Security
Tmpl.Url=http://veridium.net/
Tmpl.Scan=s
Tmpl.ScanService=HomeGuard AMC
OpenIpcPath=*\BaseNamedObjects*\*Ipc2Map*
OpenIpcPath=*\BaseNamedObjects*\*Ipc2Mutex*
OpenIpcPath=*\BaseNamedObjects*\mc2SWDIJ*
OpenIpcPath=*\BaseNamedObjects*\NamedBuffer*Process*API*
OpenIpcPath=*\BaseNamedObjects*\Mutex*Process*API*
OpenIpcPath=*\BaseNamedObjects*\AutoUnhookMap*
OpenIpcPath=*\BaseNamedObjects*\mchLLEW2*
OpenIpcPath=*\BaseNamedObjects*\mchMixCache*
OpenIpcPath=*\BaseNamedObjects*\*AnswerBuf*Event*
OpenIpcPath=*\BaseNamedObjects*\*AnswerBuf*Map*
OpenIpcPath=$:vglset.exe
[Template_IoloSystemMechanic]
Tmpl.Title=iolo System Mechanic
Tmpl.Class=Security
Tmpl.Url=http://www.iolo.com/system-mechanic/standard/
Tmpl.Scan=s
Tmpl.ScanService=ioloSystemService
OpenIpcPath=*\BaseNamedObjects*\AutoUnhookMap*
OpenIpcPath=*\BaseNamedObjects*\Mutex*mAH*Process*API*
OpenIpcPath=*\BaseNamedObjects*\NamedBuffer*mAH*Process*API*
OpenIpcPath=*\BaseNamedObjects*\NamedBuffer*mix*Process*API*
OpenIpcPath=*\BaseNamedObjects*\mchLLEW2*
OpenIpcPath=*\BaseNamedObjects*\mchMixCache*
OpenIpcPath=*\BaseNamedObjects*\mhicce*
[Template_Microsoft_EMET]
Tmpl.Title=Enhanced Mitigation Experience Toolkit (Microsoft EMET)
Tmpl.Class=Security
# old EMET homepage
# Tmpl.Url=http://www.microsoft.com/downloads/en/confirmation.aspx?FamilyID=c6f0a6ee-05ac-4eb6-acd0-362559fd2f04
Tmpl.Url=http://technet.microsoft.com/en-us/security/jj653751
Tmpl.Scan=s
Tmpl.ScanKey=\REGISTRY\MACHINE\SOFTWARE\Microsoft\EMET
OpenIpcPath=*\BaseNamedObjects*\emet_pid_*
OpenWinClass=$:EMET_notifier.exe/IgnoreUIPI
# EMET 4
OpenPipePath=\Device\Mailslot\EMET_Agent_*
OpenPipePath=\Device\Mailslot\EMET_Recipient_*
[Template_Kaspersky]
Tmpl.Title=Kaspersky Anti-Virus/Internet Security
Tmpl.Class=Security
Tmpl.Url=http://www.kaspersky.com/kaspersky_internet_security
Tmpl.Scan=s
Tmpl.ScanService=klim5
Tmpl.ScanService=klim6
OpenIpcPath=\RPC Control\PRRemote:*
OpenIpcPath=*\BaseNamedObjects*\PRCustomProps*
OpenIpcPath=*\BaseNamedObjects*\PREvent*
OpenIpcPath=*\BaseNamedObjects*\PRObjects*
OpenIpcPath=*\BaseNamedObjects*\KLObj_mt_KLSCRIPTCHECKER_PR_*
OpenIpcPath=*\BaseNamedObjects*\__hex30-90__
OpenPipePath=\Device\NamedPipe\sa_hlp_srv
LingerProcess=klwtblfs.exe
# following setting comes from value DataRoot of the following key
# HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\KasperskyLab\protected\AVP9\environment
OpenPipePath=%Tmpl.KasperskyDataRoot%\~PR*.dat
[Template_Kaspersky_Pure_Password_Manager]
Tmpl.Title=Kaspersky Pure Password Manager
Tmpl.Class=Security
Tmpl.Url=http://www.kaspersky.com/kaspersky_internet_security
Tmpl.Scan=s
Tmpl.ScanProduct={1A59064A-12A9-469F-99F6-04BF118DBCFF}
OpenIpcPath=*\BaseNamedObjects*\Mutex*Process*API*
OpenIpcPath=*\BaseNamedObjects*\NamedBuffer*Process*API*
OpenIpcPath=*\BaseNamedObjects*\AutoUnhookMap*
OpenIpcPath=*\BaseNamedObjects*\mchLLEW2*
OpenIpcPath=*\BaseNamedObjects*\mchMixCache*
OpenIpcPath=*\BaseNamedObjects*\TtsMappedObject_Tts*
# settings specific to Kaspersky Pure
OpenIpcPath=*\BaseNamedObjects*\kpmPasswordAssistantClosedEvent:*
OpenIpcPath=*\BaseNamedObjects*\kpmAutofillInfo:*
[Template_KeyScrambler]
Tmpl.Title=KeyScrambler
Tmpl.Class=Security
Tmpl.Url=http://www.qfxsoftware.com/
Tmpl.Scan=i
OpenIpcPath=\Device\KeyScrambler
OpenIpcPath=\RPC Control\KSControlEp.Default*
OpenIpcPath=*\BaseNamedObjects*\KeyScrambler*
OpenIpcPath=*\BaseNamedObjects*\KSEncryptionEvent*
OpenIpcPath=*\BaseNamedObjects*\KSProcEvent*
OpenIpcPath=*\BaseNamedObjects*\KSEncStatusEvent
OpenIpcPath=*\BaseNamedObjects*\KSSettingsEvent*
OpenPipePath=\Device\NamedPipe\KSTIPipe*
OpenPipePath=\Device\NamedPipe\KSSettingsPipe*
[Template_HideMyIp]
Tmpl.Title=Hide My IP
Tmpl.Class=Security
Tmpl.Url=http://www.hide-my-ip.com/
Tmpl.Scan=s
Tmpl.ScanService=HideMyIpSRV
OpenIpcPath=*\BaseNamedObjects*\Redirector_event
OpenClsid={B1A429DB-FB06-4645-B7C0-0CC405EAD3CD}
OpenClsid={6EEBC7FF-67DA-4B90-9251-C2C5696E4B48}
[Template_HitmanProAlert]
Tmpl.Title=Hitman Pro Alert
Tmpl.Class=Security
Tmpl.Url=https://www.hitmanpro.com/en-us/alert.aspx
Tmpl.Scan=s
Tmpl.ScanProduct=HitmanPro.Alert
Tmpl.ScanService=hmpalertsvc
OpenPipePath=\Device\NamedPipe\hmpalert
[Template_HmaProVpn]
Tmpl.Title=HMA! Pro VPN
Tmpl.Class=Security
Tmpl.Url=http://www.hidemyass.com/vpn/
Tmpl.Scan=s
Tmpl.ScanProduct=HMA! Pro VPN
OpenIpcPath=*\BaseNamedObjects*\{3A4BE5AC-E783-4939-A746-05920ACDE790}
OpenIpcPath=*\BaseNamedObjects*\{73B2E84B-B7D9-464d-8376-68D43DE31E1D}
[Template_LastPass]
Tmpl.Title=LastPass
Tmpl.Class=Security
Tmpl.Url=https://lastpass.com/
Tmpl.Scan=s
Tmpl.ScanKey=\REGISTRY\MACHINE\SOFTWARE\Classes\lpgetr
Tmpl.ScanFile=%{A520A1A4-1780-4FF6-BD18-167343C5AF16}%\LastPass
OpenFilePath=<Template_LastPass>,%UserProfile%\*\LastPass\*
ProcessGroup=<Template_LastPass>,iexplore.exe,firefox.exe,opera.exe,chrome.exe
[Template_McAfee_Guardian_Firewall]
Tmpl.Title=McAfee Guardian Firewall
Tmpl.Class=Security
Tmpl.Url=http://www.mcafee.com/us/index.html
Tmpl.Scan=i
OpenIpcPath=\RPC Control\McAfee_FW_RPC
[Template_Microsoft_Security_Essentials]
Tmpl.Title=Microsoft Security Essentials
Tmpl.Class=Security
Tmpl.Url=http://windows.microsoft.com/en-US/windows/products/security-essentials
Tmpl.Scan=s
Tmpl.ScanService=MsMpSvc
OpenWinClass=msseces_class
OpenWinClass=$:msseces.exe/IgnoreUIPI
IContextMenuClsid={09A47860-11B0-4DA5-AFA5-26D86198A780}
[Template_Mirekusoft_Install_Monitor]
Tmpl.Title=Mirekusoft Install Monitor
Tmpl.Class=Security
Tmpl.Url=http://www.mirekusoft.com/
Tmpl.Scan=s
Tmpl.ScanService=MSpyData
Tmpl.ScanService=MSpyMon
#Tmpl.ScanProduct={E4ED1ADE-60A6-4660-811E-6E4096EBCA36}
SkipHook=//start.exe,createproc,cocreate
ClosedFilePath=*\MSpyDll.dll
[Template_NetNanny]
Tmpl.Title=NetNanny
Tmpl.Class=Security
Tmpl.Url=http://www.netnanny.com/
Tmpl.Scan=s
Tmpl.ScanService=CwAltaService20
OpenPipePath=\Device\NamedPipe\CWIPCServer_ContentWatch*
OpenIpcPath=*\BaseNamedObjects*\*STRulesSTRules*
OpenIpcPath=*\BaseNamedObjects*\*SearchTree_*
OpenIpcPath=*\BaseNamedObjects*\Alta::*
OpenIpcPath=*\BaseNamedObjects*\SM::*
OpenIpcPath=*\BaseNamedObjects*\CW::*
OpenIpcPath=*\BaseNamedObjects*\CW_*
OpenIpcPath=*\BaseNamedObjects*\CP_SHARED_*
OpenIpcPath=*\BaseNamedObjects*\WORD_PARSER_*
OpenIpcPath=*\BaseNamedObjects*\CwAlta*
OpenFilePath=%AllUsersProfile%\*\ContentWatch\Internet Protection\*
OpenFilePath=%AppData%\ContentWatch\Internet Protection\*
# NetNanny 5
OpenIpcPath=*\BaseNamedObjects*\*/NETNANNY5/*
OpenClsid={056CDF58-CD7A-41D2-AF75-7CA1F44B84E9}
[Template_NOD32]
Tmpl.Title=ESET NOD32 Antivirus
Tmpl.Class=Security
Tmpl.Url=http://www.eset.com/
Tmpl.Scan=s
Tmpl.ScanService=eamon
Tmpl.ScanService=ehdrv
Tmpl.ScanService=ekrn
OpenIpcPath=*\BaseNamedObjects*\NOD32*
OpenIpcPath=*\BaseNamedObjects*\NODCOMM*
[Template_NormanSecuritySuite]
Tmpl.Title=Norman Security Suite with Parental Controls
Tmpl.Class=Security
Tmpl.Url=http://norman.com/Product/Home_Home_office/49887/en-us
Tmpl.Scan=s
Tmpl.ScanService=NPROSECSVC
OpenIpcPath=*\BaseNamedObjects*\SEM32_COM_MUTEX
OpenIpcPath=*\BaseNamedObjects*\SEM32_EVENT_*
OpenIpcPath=*\BaseNamedObjects*\SHAREMEM_*_MEM*
[Template_NortonInternetSecurity]
Tmpl.Title=Norton Internet Security / AntiVirus / Norton 360
Tmpl.Class=Security
Tmpl.Url=https://www.norton.com
Tmpl.Scan=s
Tmpl.ScanService=NortonSecurity
Tmpl.ScanService=NIS
Tmpl.ScanService=NAV
Tmpl.ScanService=N360
OpenIpcPath=\RPC Control\{__hex8__-__hex4__-__hex4__-__hex4__-__hex12__}
OpenIpcPath=*\BaseNamedObjects*\ccSetMgr_Running*
OpenIpcPath=*\BaseNamedObjects*\NewWCIDConfig*
OpenIpcPath=*\BaseNamedObjects*\LockWCIDConfig*
OpenIpcPath=*\BaseNamedObjects*\IDS_STORAGE_MUTEX
OpenIpcPath=*\BaseNamedObjects*\CGSCE
OpenIpcPath=*\BaseNamedObjects*\CSECE
OpenIpcPath=*\BaseNamedObjects*\CNDIE
[Template_NortonSafeWebLite]
Tmpl.Title=Norton Safe Web Lite
Tmpl.Class=Security
Tmpl.Url=http://safeweb.norton.com/lite
Tmpl.Scan=s
Tmpl.ScanService=NSL
ProcessGroup=<NortonSafeWeb>,firefox.exe,iexplore.exe
OpenIpcPath=<NortonSafeWeb>,\RPC Control\{__hex8__-__hex4__-__hex4__-__hex4__-__hex12__}
OpenIpcPath=<NortonSafeWeb>,*\BaseNamedObjects*\ccSetMgr_Running*
[Template_PandaCloudAntivirus]
Tmpl.Title=Panda Cloud Antivirus
Tmpl.Class=Security
Tmpl.Url=http://www.cloudantivirus.com/en/
Tmpl.Scan=s
Tmpl.ScanKey=\REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{39655A7E-1CCB-4BC7-8686-342A4581CA94}
OpenIpcPath=*\BaseNamedObjects*\76529309-F679-41df-8CAD-383D589867CF
OpenIpcPath=*\BaseNamedObjects*\psanmsrvcppal_*
OpenIpcPath=*\BaseNamedObjects*\_sbf_*panda2*
[Template_PandaInternetSecurity]
Tmpl.Title=Panda Internet Security
Tmpl.Class=Security
Tmpl.Url=http://www.pandasecurity.com/usa/homeusers/solutions/internet-security/
Tmpl.Scan=s
Tmpl.ScanService=Panda Software Controller
Tmpl.ScanService=pavboot
Tmpl.ScanService=PAVDRV
Tmpl.ScanService=PAVFNSVR
Tmpl.ScanService=PavProc
Tmpl.ScanService=PavPrSrv
Tmpl.ScanService=PAVSRV
OpenIpcPath=*\BaseNamedObjects*\*PAVPROT_*
OpenIpcPath=*\BaseNamedObjects*\PAVKRE_*
OpenIpcPath=*\BaseNamedObjects*\PAV_icl_proxy_evento_fin
OpenIpcPath=*\BaseNamedObjects*\pavwp_*
OpenIpcPath=*\BaseNamedObjects*\TPSRV_*
OpenIpcPath=*\BaseNamedObjects*\TP_MINIDUMPER_*
OpenIpcPath=*\BaseNamedObjects*\Mutex_Lect_Escri_Memoria_Compartida_*
OpenIpcPath=*\BaseNamedObjects*_ACTIVATION_SHARED_OBJECT_EVENT
OpenIpcPath=*\BaseNamedObjects*_IPC_COMMAND
OpenIpcPath=*\BaseNamedObjects*_IPC_COMMAND_ANSWER
OpenIpcPath=*\BaseNamedObjects*_IPC_CONTROL
OpenIpcPath=*\BaseNamedObjects*_IPC_CONTROL_MUTEX
OpenIpcPath=*\BaseNamedObjects*_IPC_IS_OPEN
OpenIpcPath=*\BaseNamedObjects*_IPC_MUTEX
OpenIpcPath=*\BaseNamedObjects*_IPC_NEW_MESSAGE
OpenIpcPath=*\BaseNamedObjects*_RULES_CHANGE_SHARED_OBJECT_EVENT
[Template_PasswordDoor]
Tmpl.Title=Password Door
Tmpl.Class=Security
Tmpl.Url=http://toplang.com/passworddoor.htm
Tmpl.Scan=s
Tmpl.ScanProduct=Password Door
OpenPipePath=\Device\NamedPipe\PasswordDoor*
[Template_PC_Tools_Security]
Tmpl.Title=PC Tools Security
Tmpl.Class=Security
Tmpl.Url=http://www.pctools.com/
Tmpl.Scan=s
Tmpl.ScanService=ThreatFire
OpenIpcPath=\RPC Control\mchIpcThreatfireApiHook
OpenIpcPath=*\BaseNamedObjects*\ThreatfireApiHookAnswerBuf*
OpenIpcPath=*\BaseNamedObjects*\Mutex*mAH*Process*API*
OpenIpcPath=*\BaseNamedObjects*\NamedBuffer*mAH*Process*API*
OpenIpcPath=*\BaseNamedObjects*\NamedBuffer*mix*Process*API*
OpenIpcPath=*\BaseNamedObjects*\Ipc2Cnt*
OpenIpcPath=*\BaseNamedObjects*\mchMixCache*
OpenIpcPath=*\BaseNamedObjects*\mchLLEW2*
OpenIpcPath=*\BaseNamedObjects*\AutoUnhookMap*
OpenIpcPath=*\BaseNamedObjects*\{1E57CBD2-232C-4f17-867C-7F9B4052D89C}
OpenIpcPath=*\BaseNamedObjects*\{CB98E8A0-6E8B-4a24-9953-41D8F2FED3FC}
OpenIpcPath=*\BaseNamedObjects*\{0C84A7BB-7D57-4b00-A418-1448159824DA}
DelayLoadDll=TfWah.dll
[Template_PGP]
Tmpl.Title=PGP (Pretty Good Privacy)
Tmpl.Class=Security
Tmpl.Url=http://www.pgp.com/products/desktop_home/index.html
Tmpl.Scan=i
OpenIpcPath=*\BaseNamedObjects*\PGPhkSharedMemory
OpenIpcPath=*\BaseNamedObjects*\PGPocTrayInstSem
OpenIpcPath=*\BaseNamedObjects*\PGPocTrayListenSem
OpenIpcPath=*\BaseNamedObjects*\PGPtray_Hidden_Window
OpenIpcPath=*\BaseNamedObjects*\PGPlsp Debug Print Mutex
OpenPipePath=\Device\NamedPipe\pgpserv
OpenPipePath=\Device\NamedPipe\pgpsdkserv
[Template_Proxifier]
Tmpl.Title=Proxifier
Tmpl.Class=Security
Tmpl.Url=http://www.proxifier.com/
Tmpl.Scan=w
OpenWinClass=Proxifier32Cls
OpenWinClass=$:proxifier.exe/IgnoreUIPI
OpenIpcPath=*\BaseNamedObjects*\Proxifier*
OpenPipePath=\Device\NamedPipe\proxifier
DllSkipHook=ws2_32.dll
[Template_ProxyCap]
Tmpl.Title=ProxyCap
Tmpl.Class=Security
Tmpl.Url=http://www.proxycap.com/
Tmpl.Scan=s
Tmpl.ScanService=pcapsvc
OpenIpcPath=*\BaseNamedObjects*\proxycap_*_event*
OpenPipePath=\Device\NamedPipe\proxycap_s_pipe
[Template_ReHIPS]
Tmpl.Title=ReHIPS
Tmpl.Class=Security
Tmpl.Url=https://rehips.com/
Tmpl.Scan=s
Tmpl.ScanService=ReHIPSService
DenyHostAccess=HIPSAgent64.exe,y
[Template_RoboForm]
Tmpl.Title=RoboForm
Tmpl.Class=Security
Tmpl.Url=http://www.roboform.com/
Tmpl.Scan=i
OpenFilePath=%Tmpl.RoboForm%
OpenFilePath=%Tmpl.RoboForm%\*
OpenIpcPath=*\BaseNamedObjects*\{45DB34C3-955C-11D3-ABEF-444553540000}*
OpenPipePath=\Device\NamedPipe\{9A04C483-2EDC-40CE-B4F9-D9809ADA75E1}
# ProcessGroup=<StartRunAccess>,identities.exe
OpenWinClass=RfWatcher333233
[Template_SafeEyes]
Tmpl.Title=Safe Eyes
Tmpl.Class=Security
Tmpl.Url=http://www.internetsafety.com/safe-eyes-parental-control-software.php
Tmpl.Scan=s
Tmpl.ScanWinClass=SE_LSP_MsgSink
OpenWinClass=ICA_Class
[Template_SafeCentral]
Tmpl.Title=SafeCentral
Tmpl.Class=Security
Tmpl.Url=http://www.safecentral.com/index.html
Tmpl.Scan=s
Tmpl.ScanService=AuthPluginServer
OpenPipePath=\Device\NamedPipe\*AuthPluginServer_Pipe
OpenPipePath=\Device\NamedPipe\*WebAdvisor_IpcPipe
OpenIpcPath=*\BaseNamedObjects*\LauncherServer*
OpenIpcPath=*\BaseNamedObjects*\CREATEPROCESS_RESPONCE_EVENT
[Template_SafeNet]
Tmpl.Title=SafeNet Authentication
Tmpl.Class=Security
Tmpl.Url=http://www.safenet-inc.com/products/data-protection/multi-factor-authentication/
Tmpl.Scan=s
Tmpl.ScanIpc=*\BaseNamedObjects*\DatakeyTokenServerReadyEvent
OpenIpcPath=*\BaseNamedObjects*\Datakey*
[Template_SiteAdvisor]
Tmpl.Title=McAfee SiteAdvisor
Tmpl.Class=Security
Tmpl.Url=http://www.siteadvisor.com/
Tmpl.Scan=s
Tmpl.ScanService=McAfee SiteAdvisor Service
# -- second version: run SiteAdvisor in sandbox
StartService=McAfee SiteAdvisor Service
LingerProcess=McSACore.exe
LingerProcess=McSvHost.exe
# -- first version: talk to SiteAdvisor outside sandbox
# Tmpl.Scan=s
# Tmpl.ScanKey=\REGISTRY\MACHINE\Software\Classes\Clsid\{5A90F5EE-16B8-4C2A-81B3-FD5329BA477C}
# OpenClsid={5A90F5EE-16B8-4C2A-81B3-FD5329BA477C}
# OpenClsid={5A90F5EE-16B8-4C2A-81B3-FD5329BA4780}
# OpenIpcPath=*\BaseNamedObjects*\McSACore_*
# OpenWinClass=ATL:1009CD70
# OpenWinClass=ATL:1009DDD8
[Template_Super_Socks5Cap]
Tmpl.Title=Super Socks5Cap / Super Network Tunnel / Ssh Tunnel Easy (LSP + Tunnel All)
Tmpl.Class=Security
Tmpl.Url=http://www.networktunnel.net/
# Super Network Tunnel
OpenIpcPath=*\BaseNamedObjects*\*tunnelapi*
OpenIpcPath=*\RPC Control\*tunnelapi*
OpenIpcPath=*\BaseNamedObjects*\*NetworkTunnel*
OpenIpcPath=*\RPC Control\*NetworkTunnel*
OpenIpcPath=$:TunnelClient.exe
OpenIpcPath=$:TunnelClient_Portable.exe
# Super Socks5cap
OpenIpcPath=*\RPC Control\*networkdll*
OpenIpcPath=*\BaseNamedObjects*\*networkdll*
OpenIpcPath=*\BaseNamedObjects*\*SuperSocks5Cap*
OpenIpcPath=*\RPC Control\*SuperSocks5Cap*
OpenIpcPath=$:SuperSocks5Cap.exe
# Ssh Tunnel Easy
OpenIpcPath=*\BaseNamedObjects\*SshTunnelEasy*
OpenIpcPath=*\RPC Control\*SshTunnelEasy*
OpenIpcPath=$:SshTunnelEasy.exe
Tmpl.Scan=w
OpenWinClass=TSetupSocksForm
[Template_VipreAntiVirus]
Tmpl.Title=Vipre Antivirus
Tmpl.Class=Security
Tmpl.Url=http://www.vipreantivirus.com/Software/VIPRE-Antivirus/
Tmpl.Scan=s
Tmpl.ScanService=SBAMSvc
OpenIpcPath=*\BaseNamedObjects*\SBAM*
OpenIpcPath=*\BaseNamedObjects*\OEAPI*
[Template_WindowsDefender]
Tmpl.Title=Windows Defender
Tmpl.Class=Security
Tmpl.Url=http://www.microsoft.com/windows/products/winfamily/defender/default.mspx
Tmpl.Scan=i
OpenIpcPath=\RPC Control\MsMp-*
[Template_ZoneAlarmSecuritySuite]
Tmpl.Title=ZoneAlarm Internet Security Toolbar
Tmpl.Class=Security
Tmpl.Url=http://www.zonealarm.com/security/en-us/zonealarm-computer-security-suite.htm
Tmpl.Scan=s
Tmpl.ScanService=IswSvc
OpenPipePath=\Device\NamedPipe\IswSvc
OpenPipePath=\Device\NamedPipe\IswSessionMin*
OpenIpcPath=*\BaseNamedObjects*\ISW_WIEC_*
OpenIpcPath=*\BaseNamedObjects*\ISWUL_*
OpenIpcPath=*\BaseNamedObjects*\_ISWINTERNAL_*
OpenIpcPath=*\BaseNamedObjects*\IswSessionMinShared*
OpenIpcPath=*\BaseNamedObjects*\ISWDMP_*
#
# Desktop Utilities
#
[Template_4tTrayMinimizer]
Tmpl.Title=4t Tray Minimizer
Tmpl.Class=Desktop
Tmpl.Url=http://www.4t-niagara.com/tray.html
Tmpl.Scan=i
OpenIpcPath=*\BaseNamedObjects*\ShellEh*.dll
OpenWinClass=*UtilWindow
[Template_7zipShellEx]
Tmpl.Title=7-Zip Shell Extension
Tmpl.Class=Desktop
Tmpl.Url=http://www.7-zip.org/
Tmpl.Scan=s
Tmpl.ScanKey=\REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}
OpenIpcPath=*\BaseNamedObjects*\7zCompressMapping*
OpenIpcPath=*\BaseNamedObjects*\7zMap*
[Template_ActiveCaptions]
Tmpl.Title=Active Captions
Tmpl.Class=Desktop
Tmpl.Url=http://www.shelltoys.com/minimize_tray/index.html
Tmpl.Scan=w
OpenWinClass=ActiveCaptions
[Template_ASUS_CapsHook]
Tmpl.Title=ASUS CapsHook
Tmpl.Class=Desktop
Tmpl.Url=http://support.asus.com/Download.aspx?SLanguage=en&m=Eee+PC+1015PX&p=20&s=1
Tmpl.Scan=s
Tmpl.ScanProduct={4B5092B6-F231-4D18-83BC-2618B729CA45}
OpenWinClass=$:CapsHook.exe/IgnoreUIPI
[Template_AcerGridVista]
Tmpl.Title=Acer GridVista
Tmpl.Class=Desktop
Tmpl.Scan=w
OpenWinClass=DritekScreenSplitterMainWindowClass
OpenIpcPath=*\BaseNamedObjects*\Dritek-WindowMessageHooker-FileMappingStamp
[Template_ActualWindowManager]
Tmpl.Title=Actual Tools Actual Window Manager
Tmpl.Class=Desktop
Tmpl.Url=http://www.actualtools.com/
OpenIpcPath=*\BaseNamedObjects*\*_ServiceMapping
OpenIpcPath=*\BaseNamedObjects*\*_ParamStrings_*
OpenIpcPath=*\BaseNamedObjects*\MMF{*}
OpenIpcPath=*\BaseNamedObjects*\ActualTools*
OpenWinClass=*_MessengerServerWindow
Tmpl.Scan=s
Tmpl.ScanIpc=*\BaseNamedObjects*\ActualTools_*
[Template_AdFender]
Tmpl.Title=AdFender
Tmpl.Class=Desktop
Tmpl.Url=http://www.adfender.com/
OpenIpcPath=*\BaseNamedObjects*\AdFenderActive_*
OpenIpcPath=*\BaseNamedObjects*\AdFenderDisabled_*
Tmpl.Scan=s
Tmpl.ScanProduct=AdFender
[Template_AdGuard]
Tmpl.Title=AdGuard (Browser Assistant)
Tmpl.Class=Desktop
Tmpl.Url=https://www.adguard.com/
Tmpl.Scan=s
Tmpl.ScanService=Adguard Service
NormalFilePath=%ProgramData%\Adguard\HostManifests\
OpenFilePath=Adguard.BrowserExtensionHost.exe,\Device\NamedPipe\????????-????-????-????-????????????
OpenIpcPath=Adguard.BrowserExtensionHost.exe,*\BaseNamedObjects*\Adguard*
OpenIpcPath=Adguard.BrowserExtensionHost.exe,*\BaseNamedObjects*\net.pipe:?bmV0LnBpcGU6Ly8rL0FER1VBUkRBUElFTkRQT0lOVC8=
[Template_ArumSwitcher]
Tmpl.Title=Arum Switcher
Tmpl.Class=Desktop
Tmpl.Url=http://www.arumswitcher.com/
OpenIpcPath=*\BaseNamedObjects*\Arum_Switcher_Hook*
[Template_Asutype]
Tmpl.Title=Asutype
Tmpl.Class=Desktop
Tmpl.Url=http://www.asutype.com/index.html
Tmpl.Scan=w
OpenIpcPath=*\BaseNamedObjects*\fa00000*
OpenWinClass=*asutype
[Template_AutoSizer]
Tmpl.Title=AutoSizer
Tmpl.Class=Desktop
Tmpl.Url=http://www.southbaypc.com/autosizer/
Tmpl.Scan=i
OpenIpcPath=*\BaseNamedObjects*\AutoSizer123
OpenWinClass=SysListView32
[Template_Babylon]
Tmpl.Title=Babylon
Tmpl.Class=Desktop
Tmpl.Url=http://www.babylon.com/
Tmpl.Scan=w
OpenPipePath=\device\namedpipe\babypipe
[Template_BingToolbar]
Tmpl.Title=Bing Search Toolbar
Tmpl.Class=Desktop
Tmpl.Url=http://www.discoverbing.com/toolbar/
Tmpl.Scan=i
OpenIpcPath=*\BaseNamedObjects*\ChannelReady_ac620ca9-6743-44d7-b861-e1d5ad76dd2c
OpenPipePath=\Device\NamedPipe\msn\toolbar*
[Template_Bins_Windows7Taskbar]
Tmpl.Title=Bins for Windows 7 Taskbar
Tmpl.Class=Desktop
Tmpl.Url=http://www.1upindustries.com/bins/
Tmpl.Scan=s
Tmpl.ScanProduct=Bins
ClosedFilePath=*\TaskbarDockAppIntegration32.dll
ClosedFilePath=*\TaskbarDockAppIntegration64.dll
[Template_BookmarkBuddy]
Tmpl.Title=Bookmark Buddy
Tmpl.Class=Desktop
Tmpl.Url=http://www.bookmarkbuddy.net/
Tmpl.Scan=w
OpenWinClass=BMKBUDDY
[Template_Chameleon_Window_Manager]
Tmpl.Title=Chameleon Window Manager
Tmpl.Class=Desktop
Tmpl.Url=http://www.chameleon-managers.com/window-manager/
Tmpl.Scan=s
Tmpl.ScanProduct=Chameleon Window Manager
OpenIpcPath=*\BaseNamedObjects*\{System-*-*-*-*-*}
OpenIpcPath=*\BaseNamedObjects*\chameleon*
[Template_DialogMate2]
Tmpl.Title=Dialog Mate 2
Tmpl.Class=Desktop
Tmpl.Url=http://dm2.sourceforge.net/
Tmpl.Scan=iw
OpenIpcPath=*\BaseNamedObjects*\DM2_SharedMem
OpenIpcPath=*\BaseNamedObjects*\DM2_RollWindow_SharedMem
OpenWinClass=DM2 Server class
[Template_DragonNaturallySpeaking]
Tmpl.Title=Dragon NaturallySpeaking
Tmpl.Class=Desktop
Tmpl.Url=http://www.nuance.com/naturallyspeaking/products/default.asp
Tmpl.Scan=i
OpenIpcPath=*\BaseNamedObjects*\Dragon NaturallySpeaking*
[Template_FeedDemon]
Tmpl.Title=FeedDemon
Tmpl.Class=Desktop
Tmpl.Url=http://www.feeddemon.com/
Tmpl.Scan=s
Tmpl.ScanProduct=FeedDemon_is1
OpenPipePath=FeedDemon.exe,*\FeedDemon\v1\*
OpenIpcPath=FeedDemon.exe,*\BaseNamedObjects*\FeedDemonMutex
OpenWinClass=FeedDemon.exe,*
[Template_FileEx]
Tmpl.Title=File-Ex 3
Tmpl.Class=Desktop
Tmpl.Url=http://www.cottonwoodsw.com/fx3summ.html
Tmpl.Scan=s
Tmpl.ScanProduct=File-Ex v3.*
OpenWinClass=$:FileEx.exe/IgnoreUIPI
[Template_GoogleToolbarIE]
Tmpl.Title=Google Toolbar for Internet Explorer
Tmpl.Class=Desktop
Tmpl.Url=http://toolbar.google.com/
OpenIpcPath=*\BaseNamedObjects*\{40635BCA-4026-4CE3-9741-C8DC476E6268}
OpenIpcPath=*\BaseNamedObjects*\{B7F1F778-8315-4EB2-AC1E-5AFCAA603271}
OpenIpcPath=*\BaseNamedObjects*\{DEBFCCE1-B446-4992-9C9E-CA1CB548C718}
OpenIpcPath=*\BaseNamedObjects*\*{E709AE98-F4E6-40DE-BE47-CFBA9B4605C0}
OpenWinClass={A7E495BF-9589-4A6E-8479-DDA2D8D3C05F}
OpenWinClass=$:GoogleToolbarNotifier.exe/IgnoreUIPI
OpenClsid={FBA44040-BD27-4A09-ACC8-C08B7C723DCD}
LingerProcess=GoogleToolbarUser.exe
LingerProcess=GoogleToolbarUser_32.exe
Tmpl.Scan=s
Tmpl.ScanProduct={18455581-E099-4BA8-BC6B-F34B2F06600C}
[Template_Intel_HD_Graphics]
Tmpl.Title=Intel HD Graphics Driver
Tmpl.Class=Desktop
OpenIpcPath=\RPC Control\{27B4FD7B-035B-4853-938E-CC13FE3724D4}
OpenIpcPath=*\BaseNamedObjects*\{3BFDD3D2-761C-4206-990C-3CC0643CF73A}
OpenIpcPath=*\BaseNamedObjects*\?
Tmpl.Scan=s
Tmpl.ScanIpc=\RPC Control\{27B4FD7B-035B-4853-938E-CC13FE3724D4}
[Template_IntelliTypePro]
Tmpl.Title=IntelliType Pro
Tmpl.Class=Desktop
Tmpl.Url=http://www.microsoft.com/hardware/download/download.aspx?category=MK
OpenWinClass=TInstanceManager
[Template_Folder_Size]
Tmpl.Title=Folder Size
Tmpl.Url=http://foldersize.sourceforge.net/
Tmpl.Class=Desktop
Tmpl.Scan=s
Tmpl.ScanService=FolderSize
OpenPipePath=\Device\NamedPipe\FolderSize
OpenIpcPath=*\BaseNamedObjects*\FolderSizeShellUpdateMutex
[Template_JetStart]
Tmpl.Title=JetStart
Tmpl.Class=Desktop
Tmpl.Url=http://www.codesector.com/jetstart.php
Tmpl.Scan=w
OpenWinClass=MetaLauncher
OpenIpcPath=*\BaseNamedObjects*\MetaLauncherMapObject*
[Template_gMote]
Tmpl.Title=gMote
Tmpl.Class=Desktop
Tmpl.Url=http://www.handform.net/gmote.php
Tmpl.Scan=w
OpenWinClass=TGestureConfigForm
[Template_GoogleJapaneseIME]
Tmpl.Title=Google Japanese Input Method (IME)
Tmpl.Class=Desktop
Tmpl.Url=http://www.google.com/intl/ja/ime/
Tmpl.Scan=s
Tmpl.ScanService=GoogleIMEJaCacheService
OpenPipePath=\Device\NamedPipe\googlejapaneseinput.*
LingerProcess=GoogleIMEJaTool.exe
LingerProcess=GoogleIMEJaRenderer.exe
[Template_KeyboardNinja]
Tmpl.Title=Keyboard Ninja
Tmpl.Class=Desktop
Tmpl.Url=http://www.intelife.net/ninja/
Tmpl.Scan=i
OpenIpcPath=*\BaseNamedObjects*\KEYBOARD_NINJA_2
OpenWinClass=$:ninja.exe/IgnoreUIPI
[Template_Lingoes]
Tmpl.Title=Lingoes Translator
Tmpl.Class=Desktop
Tmpl.Url=http://www.lingoes.net/
Tmpl.Scan=i
OpenIpcPath=*\BaseNamedObjects*\OpenText_ZWFilter_GlobaData*
OpenIpcPath=*\BaseNamedObjects*\OpenText_GrabText_GlobaData*
OpenIpcPath=*\BaseNamedObjects*\OpenText_GrabText_Mutex*
OpenWinClass=$:lingoes.exe/IgnoreUIPI
[Template_Linkman]
Tmpl.Title=Linkman
Tmpl.Class=Desktop
Tmpl.Url=http://www.outertech.com/index.php?_charisma_page=product&id=5
Tmpl.Scan=i
OpenIpcPath=*\BaseNamedObjects*\Linkman*
OpenWinClass=TLinkmanF
OpenWinClass=opera.exe,op*
OpenWinClass=opera.exe,DDEMLAnsiClient
[Template_LinkStash]
Tmpl.Title=LinkStash
Tmpl.Class=Desktop
Tmpl.Url=http://www.xrayz.co.uk/
Tmpl.Scan=w
OpenWinClass=LinkStash
OpenWinClass=LinkStashMonitor
OpenWinClass=$:lnkstash.exe/IgnoreUIPI
[Template_Listary]
Tmpl.Title=Listary
Tmpl.Class=Desktop
Tmpl.Url=https://www.listary.com/
Tmpl.Scan=s
Tmpl.ScanProduct=Listary_is1
OpenWinClass=ListaryToolbarCls
OpenWinClass=$:listary.exe/IgnoreUIPI
# v5
OpenIpcPath=*\BaseNamedObjects*\Listary_MainSharedMemory
# v6
OpenIpcPath=*\BaseNamedObjects*\ListaryX_MainSharedMemory
[Template_Logitech_G15_Keyboard]
Tmpl.Title=Logitech Keyboard LCD Display
Tmpl.Class=Desktop
Tmpl.Url=https://support.logi.com/hc/en-us/articles/360024851053--Downloads-G15-Gaming-Keyboard
# This scan is unreliable and it should be disabled by default
#Tmpl.Scan=s
#Tmpl.ScanProduct=Logitech Gaming Software
OpenPipePath=\Device\NamedPipe\LGLCDPIPE-*
[Template_LogitechProcessMonitor]
Tmpl.Title=Logitech Process Monitor Service
Tmpl.Class=Desktop
Tmpl.Scan=s
Tmpl.ScanService=LVPrcSrv
DelayLoadDll=LVPrcInj.dll
[Template_LogitechSetPoint]
Tmpl.Title=Logitech SetPoint Mouse
Tmpl.Class=Desktop
Tmpl.Url=https://www.logitech.com/en-us/articles/11650
Tmpl.Scan=s
Tmpl.ScanKey=\REGISTRY\MACHINE\SOFTWARE\Logitech\SetPoint
NoRenameWinClass=Internet Explorer_Server
[Template_LogitechScrollApp]
Tmpl.Title=Logitech Scroll App
Tmpl.Class=Desktop
Tmpl.Url=https://www.softpedia.com/get/Tweak/System-Tweak/Scroll-App.shtml
Tmpl.Scan=w
OpenWinClass=LogiSmoothScrlBckGrndWnd
NoRenameWinClass=IEFrame
OpenIpcPath=*\BaseNamedObjects*\LogiSmoothWheelInUse
[Template_MacroExpress]
Tmpl.Title=Macro Express
Tmpl.Class=Desktop
Tmpl.Url=http://www.macroexpress.com
Tmpl.Scan=i
OpenIpcPath=*\BaseNamedObjects*\ME98aveR
OpenIpcPath=*\BaseNamedObjects*\MEBA3KGR
OpenIpcPath=*\BaseNamedObjects*\me4hml
OpenIpcPath=*\BaseNamedObjects*\me4hsd
OpenIpcPath=*\BaseNamedObjects*\me4mmm
OpenIpcPath=*\BaseNamedObjects*\me4msd
OpenIpcPath=*\BaseNamedObjects*\me4pml
OpenIpcPath=*\BaseNamedObjects*\me4esd
OpenWinClass=TMainWin
[Template_ManyCam]
Tmpl.Title=ManyCam
Tmpl.Class=Desktop
Tmpl.Url=http://www.manycam.com/
Tmpl.Scan=i
OpenIpcPath=*\BaseNamedObjects*\ManyCam_FileMapping*
[Template_Microsoft_MSMQ]
Tmpl.Title=Microsoft Message Queuing (MSMQ)
Tmpl.Class=Desktop
Tmpl.Url=http://msdn.microsoft.com/en-us/library/windows/desktop/ms711472%28v=vs.85%29.aspx
Tmpl.Scan=i
OpenIpcPath=\RPC Control\QMsvc$*
[Template_NTrig_DuoSense]
Tmpl.Title=N-Trig DuoSense
Tmpl.Class=Desktop
Tmpl.Url=http://www.n-trig.com/Content.aspx?Page=DualModeTechnology
Tmpl.Scan=w
OpenIpcPath=*\BaseNamedObjects*\ntrignativegesturesmutex
OpenWinClass=NtrigSessionClient
[Template_nVidia_nView]
Tmpl.Title=nVidia nView
Tmpl.Class=Desktop
Tmpl.Url=http://www.nvidia.com/object/nview_display_us.html
Tmpl.Scan=i
OpenIpcPath=*\BaseNamedObjects*\nView Shared *
OpenIpcPath=*\BaseNamedObjects*\nView * Event
[Template_nVidia_Stereoscopic3D]
Tmpl.Title=nVidia Stereoscopic 3D Driver
Tmpl.Class=Desktop
Tmpl.Url=http://www.nvidia.com/object/3d-vision-main.html
Tmpl.Scan=s
Tmpl.ScanService=Stereo Service
OpenPipePath=\Device\NamedPipe\stereosvrpipe
[Template_ObjectDock]
Tmpl.Title=ObjectDock
Tmpl.Class=Desktop
Tmpl.Url=http://www.stardock.com/products/objectdock/
Tmpl.Scan=w
OpenWinClass=ObjectDockServer
[Template_OfficeLicensing]
Tmpl.Title=Windows and Office Licensing Services
Tmpl.Class=Desktop
Tmpl.Url=http://office.microsoft.com
Tmpl.Scan=s
Tmpl.ScanService=osppsvc
# Office 2010
OpenIpcPath=\RPC Control\OSPPCTransportEndpoint-*
# Office 2013
Tmpl.ScanService=sppsvc
OpenIpcPath=\RPC Control\SPPCTransportEndpoint-*
# piggyback a fix for Excel
UseDragDropHack=excel.exe,n
[Template_OfficeClickToRun]
Tmpl.Title=Microsoft Office Click-to-Run
Tmpl.Class=Desktop
Tmpl.Url=http://office.microsoft.com
Tmpl.Scan=s
Tmpl.ScanService=ClickToRunSvc
HostInjectDll=\SboxHostDll.dll
HostInjectDll64=\SboxHostDll.dll
HostInjectDllARM64=\SboxHostDll.dll
HostInjectProcess=OfficeClicktoRun.exe|ClickToRunSvc
OpenIpcPath=\RPC Control\C2RClientAPI_Server_System*
OpenIpcPath=\RPC Control\ClickToRun_Pipeline*
OpenIpcPath=\RPC Control\AppV-ISV-*
BoxNameTitle=EXCEL.EXE,-
BoxNameTitle=MSACCESS.EXE,-
BoxNameTitle=MSPUB.EXE,-
BoxNameTitle=ONENOTE.EXE,-
BoxNameTitle=OUTLOOK.EXE,-
BoxNameTitle=POWERPNT.EXE,-
BoxNameTitle=WINWORD.EXE,-
[Template_QQ]
Tmpl.Title=Tencent QQ
Tmpl.Class=Desktop
Tmpl.Url=https://im.qq.com/pcqq
Tmpl.Scan=s
Tmpl.ScanProduct={052CFB79-9D62-42E3-8A15-DE66C2C97C3E}
NoRenameWinClass=QQ.exe,*
[Template_RadeonPro]
Tmpl.Title=RadeonPro
Tmpl.Class=Desktop
Tmpl.Url=http://radeonpro.info/
Tmpl.Scan=s
Tmpl.ScanService=RadeonPro Support Service
OpenIpcPath=*\BaseNamedObjects*\_rppmdata
OpenIpcPath=*\BaseNamedObjects*\__rpapicf
OpenIpcPath=*\BaseNamedObjects*\__rpssd
[Template_RBTray]
Tmpl.Title=RBTray
Tmpl.Class=Desktop
Tmpl.Url=http://rbtray.sourceforge.net/
Tmpl.Scan=w
OpenWinClass=RBTrayHook
[Template_RemoteDesktop]
Tmpl.Title=Remote Desktop
Tmpl.Class=Desktop
Tmpl.Scan=i
OpenIpcPath=*\BaseNamedObjects*\RDPSound*
[Template_RoboType3]
Tmpl.Title=RoboType 3 (PC Magazine Downloads)
Tmpl.Class=Desktop
Tmpl.Url=http://www.pcmag.com/article2/0,2817,427378,00.asp
Tmpl.Scan=s
Tmpl.ScanKey=\REGISTRY\MACHINE\SOFTWARE\Classes\RoboType.document
OpenWinClass=Afx:400000:b:10003:*
OpenWinClass=Afx:400000:b:10011:*
[Template_RocketDock]
Tmpl.Title=RocketDock
Tmpl.Class=Desktop
Tmpl.Url=http://rocketdock.com/
Tmpl.Scan=iw
OpenIpcPath=*\BaseNamedObjects*\FdMe
OpenWinClass=ROCKETDOCK
[Template_RTSS]
Tmpl.Title=Rivatuner Statistics Server
Tmpl.Class=Desktop
Tmpl.Url=https://www.guru3d.com/files-details/rtss-rivatuner-statistics-server-download.html
Tmpl.Scan=s
Tmpl.ScanProduct=RTSS
OpenPipePath=\Device\NamedPipe\rtss_frametime
OpenIpcPath=*\BaseNamedObjects*\RTSSSharedMemoryV2
[Template_ShortKeys]
Tmpl.Title=ShortKeys (Lite)
Tmpl.Class=Desktop
Tmpl.Url=http://www.shortkeys.com
Tmpl.Scan=i
OpenIpcPath=*\BaseNamedObjects*\sh02hasd
OpenIpcPath=*\BaseNamedObjects*\sh03hasd
OpenIpcPath=*\BaseNamedObjects*\sh02mpas
OpenIpcPath=*\BaseNamedObjects*\sh03mpas
OpenWinClass=TMainWin
[Template_SnagIt]
Tmpl.Title=TechSmith SnagIt
Tmpl.Class=Desktop
Tmpl.Url=http://www.techsmith.com/
Tmpl.Scan=i
OpenIpcPath=*\BaseNamedObjects*\SnagPriv*
OpenPipePath=\Device\NamedPipe\SnagPriv.*
[Template_SrsAudioSandbox]
Tmpl.Title=SRS Audio Sandbox
Tmpl.Class=Desktop
Tmpl.Url=http://www.srslabs.com/store/audioproducts.asp
OpenIpcPath=*\BaseNamedObjects*\AudioEngineDuplicateHandleApiPort*
[Template_StrokeIt]
Tmpl.Title=StrokeIt
Tmpl.Class=Desktop
Tmpl.Url=http://www.tcbmi.com/strokeit/
Tmpl.Scan=w
OpenWinClass=StrokeIt
OpenWinClass=StrokeIt/IgnoreUIPI
OpenWinClass=#
[Template_SynapticsTouchPad]
Tmpl.Title=Synaptics TouchPad
Tmpl.Class=Desktop
Tmpl.Url=http://www.synaptics.com/support/drivers
Tmpl.Scan=s
Tmpl.ScanKey=\REGISTRY\MACHINE\SOFTWARE\Synaptics\SynTP
NoRenameWinClass=MozillaWindowClass
[Template_SystemAudioStream]
Tmpl.Title=System Audio Stream
Tmpl.Class=Desktop
Tmpl.Scan=i
OpenIpcPath=*\BaseNamedObjects*\System_Audio_Stream_*
[Template_TIM]
Tmpl.Title=Tencent TIM
Tmpl.Class=Desktop
Tmpl.Url=https://office.qq.com/
Tmpl.Scan=s
Tmpl.ScanProduct=TIM
NoRenameWinClass=TIM.exe,*
[Template_TypingAssistant]
Tmpl.Title=Typing Assistance
Tmpl.Class=Desktop
Tmpl.Url=http://www.sumitsoft.com/
Tmpl.Scan=i
OpenIpcPath=*\BaseNamedObjects*\Typing Assistant (*)
OpenWinClass=$:Typing Assistant (English).exe/IgnoreUIPI
OpenWinClass=$:Typing Assistant (French).exe/IgnoreUIPI
OpenWinClass=$:Typing Assistant (German).exe/IgnoreUIPI
OpenWinClass=$:Typing Assistant (Hungarian).exe/IgnoreUIPI
OpenWinClass=$:Typing Assistant (Italian).exe/IgnoreUIPI
OpenWinClass=$:Typing Assistant (Portuguese).exe/IgnoreUIPI
OpenWinClass=$:Typing Assistant (Spanish).exe/IgnoreUIPI
[Template_TwoPilots_SpeedTyping]
Tmpl.Title=Two Pilots Speed Typing
Tmpl.Class=Desktop
Tmpl.Url=http://www.colorpilot.com/speed-typing.html
Tmpl.Scan=w
OpenWinClass=TYPEPILOTMAINWND
[Template_UltraMon]
Tmpl.Title=UltraMon
Tmpl.Class=Desktop
Tmpl.Url=http://www.realtimesoft.com/de/ultramon/
Tmpl.Scan=w
OpenWinClass=UltraMon App
OpenWinClass=UltraMonWndExtMsg
[Template_WacomTablet]
Tmpl.Title=Wacom Tablet
Tmpl.Class=Desktop
Tmpl.Url=http://www.wacom.com/customercare/drivers.aspx
OpenIpcPath=*\BaseNamedObjects*\Wacom*WintabConnection*
OpenIpcPath=$:Tablet.exe
Tmpl.Scan=i
[Template_WindowsRasMan]
Tmpl.Title=Windows Remote Access Connection Manager (dial-up/VPN)
Tmpl.Class=Desktop
Tmpl.Scan=i
OpenIpcPath=\RPC Control\RasManLrpc
[Template_VirtuaWin]
Tmpl.Title=VirtuaWin
Tmpl.Class=Desktop
Tmpl.Url=http://virtuawin.sourceforge.net/
Tmpl.Scan=w
OpenWinClass=VirtuaWinMainClass
NoAutoExitExplorer=y
[Template_Volumouse]
Tmpl.Title=NirSoft Volumouse
Tmpl.Class=Desktop
Tmpl.Url=http://www.nirsoft.net/utils/volumouse.html
Tmpl.Scan=w
OpenWinClass=NirSoft_VolumouseMsg*
[Template_Weasel]
Tmpl.Title=Weasel (Rime)
Tmpl.Class=Desktop
Tmpl.Scan=s
Tmpl.ScanKey=\REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A3F4CDED-B1E9-41EE-9CA6-7B4D0DE6CB0A}
OpenPipePath=\Device\NamedPipe\%user%\WeaselNamedPipe
ReadFilePath=%LocalAppData%\Microsoft\Windows\Fonts
[Template_WindowsLive]
Tmpl.Title=Windows Live
Tmpl.Class=Desktop
Tmpl.Url=http://www.live.com
Tmpl.Scan=s
Tmpl.ScanService=wlidsvc
OpenIpcPath=\RPC Control\LiveIdSvc
ClosedFilePath=%SystemRoot%\System32\IDStore.dll
ClosedFilePath=%SystemRoot%\System32\wlidprov.dll
ClosedKeyPath=\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\NetworkServiceTriggers\Triggers\bc90d167-9470-4139-a9ba-be0bbbf5b74d\CC105610-DA03-467E-BC73-5B9E2937458D
[Template_WindowBlinds]
Tmpl.Title=WindowBlinds
Tmpl.Class=Desktop
Tmpl.Url=http://www.stardock.com/products/windowblinds/
Tmpl.Scan=s
Tmpl.ScanKey=\REGISTRY\MACHINE\Software\Stardock\WindowBlinds
OpenPipePath=\Device\NamedPipe\WBServer*
OpenIpcPath=*\BaseNamedObjects*\WB_WAIT
[Template_ZoomText]
Tmpl.Title=ZoomText
Tmpl.Class=Desktop
Tmpl.Url=http://www.synapseadaptive.com/aisquared/zoomtext_9/zoomtext_9_home_page.htm
Tmpl.Scan=i
OpenIpcPath=*\BaseNamedObjects*\AH_XMSAA_*
OpenIpcPath=*\BaseNamedObjects*\ZSMEscapeKeyEvent
OpenIpcPath=*\BaseNamedObjects*\Ai2_HOOKDATA_FILEMAP*
OpenIpcPath=*\BaseNamedObjects*\ZoomTextRunning*
OpenWinClass=ZT9MainWindow
#
# Media Players
#
[Template_VLC_Force]
Tmpl.Title=#4323,VLC
Tmpl.Class=MediaPlayer
ForceProcess=vlc.exe
[Template_VLC_DirectAccess_Profile]
Tmpl.Title=#4338,VLC
Tmpl.Class=MediaPlayer
OpenFilePath=vlc.exe,%AppData%\vlc\*
[Template_VLC_DirectAccess_Photos]
Tmpl.Title=#4395,VLC
Tmpl.Class=MediaPlayer
OpenFilePath=vlc.exe,%UserProfile%\Pictures\*
[Template_MPC-HC_Force]
Tmpl.Title=#4323,MPC-HC
Tmpl.Class=MediaPlayer
ForceProcess=mpc-hc64.exe
ForceProcess=mpc-hc.exe
[Template_MPC-HC_DirectAccess_Profile]
Tmpl.Title=#4338,MPC-HC
Tmpl.Class=MediaPlayer
OpenFilePath=mpc-hc64.exe,%AppData%\MPC-HC\*
OpenFilePath=mpc-hc.exe,%AppData%\MPC-HC\*
[Template_MPC-HC_DirectAccess_Photos]
Tmpl.Title=#4395,MPC-HC
Tmpl.Class=MediaPlayer
OpenFilePath=mpc-hc64.exe,%UserProfile%\Pictures\*
OpenFilePath=mpc-hc.exe,%UserProfile%\Pictures\*
[Template_MPC-BE_Force]
Tmpl.Title=#4323,MPC-BE
Tmpl.Class=MediaPlayer
ForceProcess=mpc-be64.exe
ForceProcess=mpc-be.exe
NoRenameWinClass=MPC-BE
[Template_MPC-BE_DirectAccess_Profile]
Tmpl.Title=#4338,MPC-BE
Tmpl.Class=MediaPlayer
OpenFilePath=mpc-be64.exe,%AppData%\MPC-BE\*
OpenFilePath=mpc-be.exe,%AppData%\MPC-BE\*
[Template_MPC-BE_DirectAccess_Photos]
Tmpl.Title=#4395,MPC-BE
Tmpl.Class=MediaPlayer
OpenFilePath=mpc-be64.exe,%UserProfile%\Pictures\*
OpenFilePath=mpc-be.exe,%UserProfile%\Pictures\*
[Template_PotPlayer_Force]
Tmpl.Title=#4323,PotPlayer
Tmpl.Class=MediaPlayer
ForceProcess=PotPlayerMini64.exe
ForceProcess=PotPlayerMini.exe
[Template_PotPlayer_DirectAccess_Profile]
Tmpl.Title=#4338,PotPlayer
Tmpl.Class=MediaPlayer
OpenFilePath=PotPlayerMini64.exe,%AppData%\PotPlayerMini64
OpenFilePath=PotPlayerMini.exe,%AppData%\PotPlayerMini
[Template_SMPlayer_Force]
Tmpl.Title=#4323,SMPlayer
Tmpl.Class=MediaPlayer
ForceProcess=smplayer.exe
[Template_SMPlayer_DirectAccess_Profile]
Tmpl.Title=#4338,SMPlayer
Tmpl.Class=MediaPlayer
OpenFilePath=smplayer.exe,%AppData%\mpv\*
[Template_SMPlayer_DirectAccess_Photos]
Tmpl.Title=#4395,SMPlayer
Tmpl.Class=MediaPlayer
OpenFilePath=smplayer.exe,%UserProfile%\Pictures\smplayer_screenshots
OpenFilePath=smplayer.exe,%UserProfile%\Pictures\smplayer_screenshots
[Template_KMPlayer_Force]
Tmpl.Title=#4323,KMPlayer
Tmpl.Class=MediaPlayer
ForceProcess=KMPlayer64.exe
ForceProcess=KMPlayer.exe
[Template_KMPlayer_DirectAccess_Profile]
Tmpl.Title=#4338,KMPlayer
Tmpl.Class=MediaPlayer
OpenFilePath=KMPlayer64.exe,%AppData%\KMP
OpenFilePath=KMPlayer.exe,%AppData%\KMP
[Template_Clementine_Force]
Tmpl.Title=#4323,Clementine
Tmpl.Class=MediaPlayer
ForceProcess=clementine.exe
[Template_Clementine_DirectAccess_Profile]
Tmpl.Title=#4338,Clementine
Tmpl.Class=MediaPlayer
OpenFilePath=clementine.exe,%UserProfile%\current\.config\Clementine\*
[Template_Clementine_DirectAccess_Music]
Tmpl.Title=#4398,Clementine
Tmpl.Class=MediaPlayer
OpenFilePath=clementine.exe,%UserProfile%\Music\*
[Template_Strawberry_Force]
Tmpl.Title=#4323,Strawberry Music Player
Tmpl.Class=MediaPlayer
ForceProcess=strawberry.exe
[Template_Strawberry_DirectAccess_Profile]
Tmpl.Title=#4338,Strawberry Music Player
Tmpl.Class=MediaPlayer
OpenFilePath=strawberry.exe,%Local AppData%\Strawberry
[Template_Strawberry_DirectAccess_Music]
Tmpl.Title=#4398,Strawberry Music Player
Tmpl.Class=MediaPlayer
OpenFilePath=strawberry.exe,%UserProfile%\Music\*
#
# Torrent Clients
#
[Template_qBittorrent_Force]
Tmpl.Title=#4323,qBittorrent
Tmpl.Class=TorrentClient
ForceProcess=qBittorrent.exe
[Template_qBittorrent_DirectAccess_Profile]
Tmpl.Title=#4338,qBittorrent
Tmpl.Class=TorrentClient
OpenFilePath=qBittorrent.exe,%Local AppData%\qBittorrent
OpenFilePath=qBittorrent.exe,%AppData%\qBittorrent
[Template_Transmission_Force]
Tmpl.Title=#4323,Transmission
Tmpl.Class=TorrentClient
ForceProcess=transmission-qt.exe
[Template_Transmission_DirectAccess_Profile]
Tmpl.Title=#4338,Transmission
Tmpl.Class=TorrentClient
OpenFilePath=transmission-qt.exe,%Local AppData%\transmission
[Template_BiglyBT_Force]
Tmpl.Title=#4323,BiglyBT
Tmpl.Class=TorrentClient
ForceProcess=BiglyBT.exe
[Template_BiglyBT_DirectAccess_Profile]
Tmpl.Title=#4338,BiglyBT
Tmpl.Class=TorrentClient
OpenFilePath=BiglyBT.exe,%AppData%\BiglyBT
[Template_Popcorn-Time_Force]
Tmpl.Title=#4323,Popcorn Time (popcorntime.app)
Tmpl.Class=TorrentClient
ForceProcess=Popcorn-Time.exe
[Template_Popcorn-Time_DirectAccess_Profile]
Tmpl.Title=#4338,Popcorn Time (popcorntime.app)
Tmpl.Class=TorrentClient
OpenFilePath=Popcorn-Time.exe,%Local AppData%\popcorn-time
[Template_PicoTorrent_Force]
Tmpl.Title=#4323,Pico Torrent
Tmpl.Class=TorrentClient
ForceProcess=PicoTorrent.exe
ForceRestart=PicoTorrent.exe
#
# Download Managers
#
[Template_FreeDownloadManager]
Tmpl.Title=Free Download Manager
Tmpl.Class=Download
Tmpl.Url=http://www.freedownloadmanager.org/
RpcMgmtSetComTimeout=fdm.exe,y
[Template_SothinkWebVideoDownloader]
Tmpl.Title=Sothink Web Video Downloader Stand-alone
Tmpl.Class=Download
Tmpl.Url=http://www.sothinkmedia.com/web-video-downloader/
Tmpl.Scan=w
OpenWinClass=WVD_Class
OpenIpcPath=$:VideoDownloader.exe
[Template_OrbitDownloader]
Tmpl.Title=Orbit Downloader
Tmpl.Class=Download
Tmpl.Url=http://www.orbitdownloader.com
Tmpl.Scan=w
OpenIpcPath=*\BaseNamedObjects*\GRABPRO_WEBSITEMUTEX_*
OpenIpcPath=*\BaseNamedObjects*\orbitcth_ipc*
OpenIpcPath=*\BaseNamedObjects*\orbitdm_app*
OpenIpcPath=*\BaseNamedObjects*\ORBTPROS_APP
OpenWinClass=ORBTPROS_APP
OpenWinClass=orbitdm_app
[Template_Replay_Music]
Tmpl.Title=Applian Replay Music
Tmpl.Class=Download
Tmpl.Url=http://www.applian.com/replay-music/index.php
Tmpl.Scan=i
OpenIpcPath=*\BaseNamedObjects*\{034DBD6D-6784-4CB3-97D8-749947D01F70}
OpenIpcPath=*\BaseNamedObjects*\{3EA1EB13-8045-44FC-AD59-B4F05478B400}
OpenIpcPath=*\BaseNamedObjects*\{6560EAD3-F709-4B66-B90B-EA2D2C85AE30}
OpenIpcPath=*\BaseNamedObjects*\{F22F2429-009C-4B5D-959F-519B59E25170}
[Template_Replay_Media_Catcher]
Tmpl.Title=Applian Replay Media Catcher
Tmpl.Class=Download
Tmpl.Url=http://www.applian.com/download-videos/
Tmpl.Scan=i
OpenIpcPath=*\BaseNamedObjects*\{F22F2429-009C-4B5D-959F-519B59E25176}
OpenIpcPath=*\BaseNamedObjects*\{6560EAD3-F709-4B66-B90B-EA2D2C85AE3B}
OpenIpcPath=*\BaseNamedObjects*\{3EA1EB13-8045-44FC-AD59-B4F05478B40D}
OpenIpcPath=*\BaseNamedObjects*\{034DBD6D-6784-4CB3-97D8-749947D01F72}
#
# Other
#
[Template_ScreenReader]
Tmpl.Title=#4305,JAWS, NVDA, Window-Eyes, System Access
Tmpl.Class=Misc
# Tmpl.Scan=i
Tmpl.Hide=y
OpenIpcPath=\RPC Control\epmapper
OpenIpcPath=\RPC Control\OLE*
OpenIpcPath=\RPC Control\LRPC*
OpenIpcPath=*\BaseNamedObjects*\JAWS*
OpenIpcPath=*\BaseNamedObjects*\JFW*
OpenIpcPath=*\BaseNamedObjects*\GWM*
OpenIpcPath=*\BaseNamedObjects*\GWSync*
OpenIpcPath=*\BaseNamedObjects*\GWSync*
OpenIpcPath=*\BaseNamedObjects*\FS_CACHED_MSAA_DATA_MUTEX
OpenIpcPath=*\BaseNamedObjects*\FS_FSDOM_LOADER_MUTEX
OpenIpcPath=*\BaseNamedObjects*\SharedFSDomLoaderData*
OpenIpcPath=\RPC Control\nvdaHelperRemote_*
OpenIpcPath=*\BaseNamedObjects*\Serotek-*
OpenWinClass=*
# [Template_PlugPlayService]
# Tmpl.Title=#3938
# Tmpl.Class=Misc
# OpenIpcPath=\RPC Control\plugplay
# OpenIpcPath=\RPC Control\ntsvcs
[Template_TaskbarJumpList]
Tmpl.Title=#4294
Tmpl.Class=Misc
OpenPipePath=%Recent%\AutomaticDestinations\*
OpenPipePath=%Recent%\CustomDestinations\*
[Template_ActivIdentity]
Tmpl.Title=ActivIdentity (CAC)
Tmpl.Url=https://www.hidglobal.com/identity-management
Tmpl.Class=Security
Tmpl.Scan=s
Tmpl.ScanKey=\REGISTRY\MACHINE\SOFTWARE\ActivCard
OpenClsid={5E248397-8614-4EC5-8926-BD242DC9830A}
OpenClsid={30E5C61A-E359-498B-B833-1FB56CCDDCE2}
OpenClsid={884E2007-217D-11DA-B2A4-000E7BBB2B09}
OpenClsid={8BF9A910-A8FF-457F-999F-A5CA10B4A885}
OpenIpcPath=\RPC Control\LSMApi
OpenIpcPath=\RPC Control\samss lpc
OpenIpcPath=*\BaseNamedObjects*\Microsoft Smart Card Resource Manager*
[Template_Yubikey]
Tmpl.Title=Yubikey Authentication
Tmpl.Class=Security
OpenIpcPath=\RPC Control\keysvc
[Template_SymantecEP]
Tmpl.Title=Symantec Endpoint Protection
Tmpl.Class=Security
Tmpl.Scan=s
Tmpl.Url=http://www.broadcom.com/
Tmpl.ScanProduct={AB2C803C-5D82-4D6A-AC6A-5A7357D8B2F9}
NormalFilePath=*\sysfer.dll
[Template_Chrome_KB5027231_fix]
Tmpl.Title=Chromium fix for Windows 11 with KB5027231
Tmpl.Class=WebBrowser
#Tmpl.Scan=u
#Tmpl.ScanUpd=KB5027231
Tmpl.ScanScript=if(system.version().major != 11) return false; return system.checkUpdates("KB5027231");
ClosedKeyPath=<Template_Chromes>,HKEY_CURRENT_USER\Software\Microsoft\Windows\Shell\Associations\UrlAssociations\http\UserChoice
ClosedKeyPath=<Template_Chromes>,HKEY_CURRENT_USER\Software\Microsoft\Windows\Shell\Associations\UrlAssociations\https\UserChoice
ProcessGroup=<Template_Chromes>,chrome.exe
#
# Default settings
#
[Template_AutoRecoverIgnore]
Tmpl.Title=#4291
Tmpl.Class=Misc
AutoRecoverIgnore=.part
AutoRecoverIgnore=.jc!
AutoRecoverIgnore=.leechget
AutoRecoverIgnore=.dlm
AutoRecoverIgnore=.tmp
AutoRecoverIgnore=.download
AutoRecoverIgnore=.dtapart
AutoRecoverIgnore=.crdownload
AutoRecoverIgnore=.crx
AutoRecoverIgnore=.ob!
AutoRecoverIgnore=.partial
AutoRecoverIgnore=.!ut
AutoRecoverIgnore=.lnk
AutoRecoverIgnore=desktop.ini
AutoRecoverIgnore=.opdownload
[Template_LingerPrograms]
Tmpl.Title=#4292
Tmpl.Class=Misc
LingerProcess=mscorsvw.exe
LingerProcess=AcroRd32.exe
LingerProcess=Adobe_Updater.exe
LingerProcess=JUSched.exe
LingerProcess=SynCor.exe
LingerProcess=GoogleUpdate.exe
LingerProcess=GoogleToolbarNotifier.exe
LingerProcess=RunDll32.exe
LingerProcess=RealSched.exe
LingerProcess=wisptis.exe
LingerProcess=CS5ServiceManager.exe
LingerProcess=AcrobatInfo.exe
LingerProcess=IeLowUtil.exe
LingerProcess=DllHost.exe
LingerProcess=SplWow64.exe
LingerProcess=nacl.exe
LingerProcess=nacl64.exe
LingerProcess=pdf24.exe
LingerProcess=RuntimeBroker.exe
LingerProcess=ssh-agent.exe
# Vivaldi Updater
LingerProcess=update_notifier.exe
# Firefox telemetry process
LingerProcess=pingsender.exe
# Chrome telemetry process
LingerProcess=software_reporter_tool.exe
# Opera background processes
LingerProcess=opera_crashreporter.exe
LingerProcess=opera_autoupdate.exe
[Template_BlockPorts]
Tmpl.Title=#4293
Tmpl.Class=Misc
#BlockPort=137,138,139,445
NetworkAccess=*,Block;Port=137,138,139,445
[Template_BlockDNS]
Tmpl.Title=Block DNS
Tmpl.Class=Misc
NetworkAccess=*,Block;Port=53;Protocol=UDP
[Template_BlockTelemetry]
Tmpl.Title=#4307
Tmpl.Class=Misc
# Block Firefox telemetry process
ClosedFilePath=pingsender.exe
# Block Chrome telemetry process
ClosedFilePath=software_reporter_tool.exe
# Block Opera telemetry process
ClosedFilePath=opera_crashreporter.exe
[Template_qWave]
Tmpl.Title=#3459
Tmpl.Class=Misc
OpenPipePath=\Device\QWAVEdrv
[Template_SkipHook]
Tmpl.Title=#3460
Tmpl.Class=Misc
SkipHook=DragonSaga.exe,ntqsi,enumwin,findwin
SkipHook=BatmanAC.exe,enumwin,findwin
SkipHook=PotPlayer64.exe,cocreate
SkipHook=PotPlayerMini64.exe,cocreate
SkipHook=mpc-hc64.exe,cocreate
[Template_FileCopy]
Tmpl.Title=#4295
Tmpl.Class=Misc
DontCopy=*.url
CopyEmpty=*\microsoft\windows\explorer\thumbcache_*
CopyEmpty=*\microsoft\windows\explorer\iconcache_*
# firefox
CopyAlways=*\places.sqlite
CopyAlways=*\xul.mfl
# windows installer etc
CopyAlways=*\qmgr0.dat
CopyAlways=*\qmgr1.dat
CopyAlways=*\infcache.1
CopyAlways=*\cbs.log
# internet explorer 10 web cache
CopyAlways=*\webcachev*.dat
# Media Players
DontCopy=*.aac
DontCopy=*.ac3
DontCopy=*.aiff
DontCopy=*.ape
DontCopy=*.asf
DontCopy=*.avi
DontCopy=*.f4v
DontCopy=*.flac
DontCopy=*.flv
DontCopy=*.m4a
DontCopy=*.m4v
DontCopy=*.mid
DontCopy=*.mka
DontCopy=*.mkv
DontCopy=*.mov
DontCopy=*.mp3
DontCopy=*.mp4
DontCopy=*.mpeg
DontCopy=*.mpg
DontCopy=*.oga
DontCopy=*.ogg
DontCopy=*.ogv
DontCopy=*.opus
DontCopy=*.ra
DontCopy=*.rm
DontCopy=*.rmvb
#DontCopy=*.ts
DontCopy=*.vob
DontCopy=*.wav
DontCopy=*.webm
DontCopy=*.wma
DontCopy=*.wmv
[Template_RpcPortBindings]
Tmpl.Title=#4296
Tmpl.Class=Misc
#Tmpl.Scan=s
#Tmpl.ScanService=RpcSs
#Tmpl.ScanService=RpcEptMapper
#Tmpl.ScanService=DcomLaunch
# hardcoded options:
#RpcPortBinding=*,{906B0CE0-C70B-1067-B317-00DD010662DA},IpcPort="samss lpc"
#RpcPortBinding=winspool.drv,'ncalrpc:[,Security=Impersonation Dynamic False]',Resolve=PrintSpooler
#RpcPortBindingSvc=Spooler,PrintSpooler
# AppInfo
RpcPortBinding=kernel32.dll,'0497b57d-2e66-424f-a0c6-157cd5d41700@ncalrpc:',Resolve=AppInfo,TimeOut=y
RpcPortBindingIfId=AppInfo,{0497b57d-2e66-424f-a0c6-157cd5d41700}
#RpcPortBindingSvc=AppInfo,appinfo
# AppInfo for Store Apps
RpcPortBinding=apisethost.appexecutionalias.dll,'0497b57d-2e66-424f-a0c6-157cd5d41700@ncalrpc:',Resolve=AppInfo,TimeOut=n
# RpcMgmtSetComTimeout presets
#UseRpcMgmtSetComTimeout=AppXDeploymentClient.dll,y
UseRpcMgmtSetComTimeout=WINNSI.DLL,n
# windows proxy auto discovery
#Tmpl.ScanService=WinHttpAutoProxySvc
RpcPortBinding=WinHttp.dll,'ncalrpc:',Resolve=WPAD,TimeOut=y
RpcPortBindingSvc=WPAD,WinHttpAutoProxySvc
# windows 10 game port
#Tmpl.ScanService=???
RpcPortBinding=resourcepolicyclient.dll,{00000000-0000-0000-0000-000000000000},Resolve=GamePort
RpcPortBindingIfId=GamePort,{88ABCBC3-34EA-76AE-8215-767520655A23}
# windows 11 NLA
RpcPortBinding=nlansp_c.dll,'ncalrpc:',Resolve=NetworkProfiles,TimeOut=y
RpcPortBindingIfId=NetworkProfiles,{3F787932-3452-4363-8651-6EA97BB373BB}
#RpcPortBindingSvc=NetworkProfiles,netprofm
[Template_NoUACProxy]
Tmpl.Title=#4306
Tmpl.Class=Misc
NoUACProxy=y
#UAC for compartment Mode Win10
RpcPortBinding=windows.storage.dll,'201ef99a-7fa0-444c-9399-19ba84f12a1a@ncalrpc:',Resolve=UAC,TimeOut=n
RpcPortBindingIfId=UAC,{201EF99A-7FA0-444C-9399-19BA84F12A1A}
#UAC for compartment Mode Win7
RpcPortBinding=SHELL32.dll,'201ef99a-7fa0-444c-9399-19ba84f12a1a@ncalrpc:',IpcPort=senssvc,TimeOut=n
#
# COM/RPC Presets
#
[Template_OpenCOM]
OpenIpcPath=*\BaseNamedObjects*\__ComCatalogCache__
OpenIpcPath=\RPC Control\epmapper
OpenIpcPath=\RPC Control\OLE*
OpenIpcPath=\RPC Control\LRPC*
[Template_BoxedCOM]
NormalIpcPath=*BaseNamedObjects*\__ComCatalogCache__
NormalIpcPath=*BaseNamedObjects*\ComPlusCOMRegTable
NormalIpcPath=*BaseNamedObjects*\RotHintTable
NormalIpcPath=*BaseNamedObjects*\{A3BD3259-3E4F-428a-84C8-F0463A9D3EB5}
NormalIpcPath=*BaseNamedObjects*\{A64C7F33-DA35-459b-96CA-63B51FB0CDB9}
NormalIpcPath=\RPC Control\actkernel
NormalIpcPath=\RPC Control\epmapper
NormalIpcPath=\RPC Control\OLE*
NormalIpcPath=\RPC Control\LRPC*
#
# Optional RPC Port Config
#
[Template_RpcPortBindingsExt]
Tmpl.Title=#4300
Tmpl.Class=Misc
# NSI
RpcPortBinding=WINNSI.DLL,'ncalrpc:[,Security=Impersonation Dynamic True]',Resolve=NSI,TimeOut=n
RpcPortBindingIfId=NSI,{7ea70bcf-48af-4f6a-8968-6a440754d5fa}
#RpcPortBindingSvc=NSI,nsi
[Template_OpenBluetooth]
Tmpl.Title=#4297
Tmpl.Class=Misc
#bluetooth
RpcPortBinding=BluetoothApis.dll,'ncalrpc:',Resolve=Bluetooth,TimeOut=y
RpcPortBindingIfId=Bluetooth,{2ACB9D68-B434-4B3E-B966-E06B4B3A84CB}
#RpcPortBindingSvc=Bluetooth,bthserv
[Template_OpenSmartCard]
Tmpl.Title=#4298
Tmpl.Class=Misc
#smartcard
RpcPortBinding=WinSCard.dll,{00000000-0000-0000-0000-000000000000},Resolve=SmartCard
RpcPortBindingIfId=SmartCard,{C6B5235A-E413-481D-9AC8-31681B1FAAF5}
[Template_SSDP]
Tmpl.Title=#4299
Tmpl.Class=Misc
#upnp
#Tmpl.ScanService=ssdpsrv
RpcPortBinding=SSDPAPI.dll,'ncalrpc:',Resolve=SSDP
RpcPortBindingIfId=SSDP,{4B112204-0E19-11D3-B42B-0000F81FEB9F}
#RpcPortBindingSvc=SSDP,ssdpsrv
[SysCallPresets]
#
# disabled hooks
#
DisableWinNtHook=MapViewOfSection
DisableWinNtHook=YieldExecution
# CallEnclave causes a BSOD when kernel stack protection is enabled
DisableWinNtHook=CreateEnclave
DisableWinNtHook=LoadEnclaveData
DisableWinNtHook=InitializeEnclave
DisableWinNtHook=CallEnclave
DisableWinNtHook=TerminateEnclave
# filtered system calls not allowed
#DisableWinNtHook=CreatePagingFile
#
# approved system calls for Security Hardened sandboxes
#
# system calls filtered by driver
ApproveWinNtSysCall=OpenFile
ApproveWinNtSysCall=CreateFile
ApproveWinNtSysCall=CreateMailslotFile
ApproveWinNtSysCall=CreateNamedPipeFile
ApproveWinNtSysCall=ConnectPort
ApproveWinNtSysCall=SecureConnectPort
ApproveWinNtSysCall=CreatePort
ApproveWinNtSysCall=AlpcConnectPort
ApproveWinNtSysCall=AlpcConnectPortEx
ApproveWinNtSysCall=AlpcCreatePort
ApproveWinNtSysCall=ImpersonateClientOfPort
ApproveWinNtSysCall=AlpcImpersonateClientOfPort
ApproveWinNtSysCall=RequestPort
ApproveWinNtSysCall=RequestWaitReplyPort
ApproveWinNtSysCall=AlpcSendWaitReceivePort
ApproveWinNtSysCall=OpenEvent
ApproveWinNtSysCall=CreateEvent
ApproveWinNtSysCall=OpenEventPair
ApproveWinNtSysCall=CreateEventPair
ApproveWinNtSysCall=OpenKeyedEvent
ApproveWinNtSysCall=CreateKeyedEvent
ApproveWinNtSysCall=OpenMutant
ApproveWinNtSysCall=CreateMutant
ApproveWinNtSysCall=OpenSemaphore
ApproveWinNtSysCall=CreateSemaphore
ApproveWinNtSysCall=OpenSection
ApproveWinNtSysCall=CreateSection
ApproveWinNtSysCall=CreateSectionEx
ApproveWinNtSysCall=OpenJobObject
ApproveWinNtSysCall=CreateJobObject
ApproveWinNtSysCall=CreateSymbolicLinkObject
ApproveWinNtSysCall=OpenSymbolicLinkObject
ApproveWinNtSysCall=CreateDirectoryObject
ApproveWinNtSysCall=CreateDirectoryObjectEx
ApproveWinNtSysCall=OpenDirectoryObject
ApproveWinNtSysCall=DuplicateObject
ApproveWinNtSysCall=GetNextProcess
ApproveWinNtSysCall=GetNextThread
ApproveWinNtSysCall=DeviceIoControlFile
#ApproveWinNtSysCall=FsControlFile
ApproveWinNtSysCall=QuerySystemInformation
ApproveWinNtSysCall=OpenProcessToken
ApproveWinNtSysCall=OpenProcessTokenEx
ApproveWinNtSysCall=OpenThreadToken
ApproveWinNtSysCall=OpenThreadTokenEx
ApproveWinNtSysCall=SetInformationProcess
ApproveWinNtSysCall=SetInformationThread
ApproveWinNtSysCall=ImpersonateAnonymousToken
ApproveWinNtSysCall=OpenProcess
ApproveWinNtSysCall=OpenThread
ApproveWinNtSysCall=AlpcOpenSenderProcess
ApproveWinNtSysCall=AlpcOpenSenderThread
# system calls allowed without filtering
ApproveWinNtSysCall=OpenKey
ApproveWinNtSysCall=OpenKeyEx
ApproveWinNtSysCall=CreateKey
#ApproveWinNtSysCall=DeleteKey
ApproveWinNtSysCall=SetValueKey
#ApproveWinNtSysCall=SaveKey
#ApproveWinNtSysCall=SaveKeyEx
ApproveWinNtSysCall=LoadKey
ApproveWinNtSysCall=LoadKey2
ApproveWinNtSysCall=LoadKey3
ApproveWinNtSysCall=LoadKeyEx
ApproveWinNtSysCall=SetInformationFile
ApproveWinNtSysCall=SetInformationKey
ApproveWinNtSysCall=SetInformationVirtualMemory
ApproveWinNtSysCall=SetInformationWorkerFactory
ApproveWinNtSysCall=SetInformationJobObject
#ApproveWinNtSysCall=SetInformationSymbolicLink
#ApproveWinNtSysCall=SetInformationToken
#ApproveWinNtSysCall=SetInformationObject
ApproveWinNtSysCall=RaiseHardError
ApproveWinNtSysCall=DeleteFile
ApproveWinNtSysCall=AlpcAcceptConnectPort
ApproveWinNtSysCall=AlpcCreateSecurityContext
ApproveWinNtSysCall=CreateLowBoxToken
ApproveWinNtSysCall=TraceControl
ApproveWinNtSysCall=NtTraceEvent
ApproveWinNtSysCall=CreatePrivateNamespace
ApproveWinNtSysCall=CreateTimer
ApproveWinNtSysCall=CreateTimer2
ApproveWinNtSysCall=OpenTimer
ApproveWinNtSysCall=CreateUserProcess
#ApproveWinNtSysCall=CreateThreadEx
ApproveWinNtSysCall=QueryAttributesFile
ApproveWinNtSysCall=QueryFullAttributesFile
# Windows Notification Facility
ApproveWinNtSysCall=SubscribeWnfStateChange
ApproveWinNtSysCall=UnsubscribeWnfStateChange
ApproveWinNtSysCall=QueryWnfStateData
# token stuff
ApproveWinNtSysCall=DuplicateToken
ApproveWinNtSysCall=FilterToken
ApproveWinNtSysCall=AdjustPrivilegesToken
ApproveWinNtSysCall=AccessCheck
ApproveWinNtSysCall=AccessCheckByType
# atom stuff
ApproveWinNtSysCall=AddAtom
ApproveWinNtSysCall=AddAtomEx
ApproveWinNtSysCall=FindAtom
ApproveWinNtSysCall=DeleteAtom
# allowed Win32 system calls
ApproveWin32SysCall=GdiDdDDI*
#
# Known Conflicts
#
[Template_KnownConflicts]
Tmpl.Entry=Folder Lock | Folder Lock
Tmpl.Entry=StrokeIt | StrokeIt
#Tmpl.Entry=AquaSnap 1.16.2 | {CF0C7CA1-9BDC-4660-9CF5-E44446D49725}
#Tmpl.Entry=avast! Antivirus | avast
#Tmpl.Entry=AVG Antivirus | AVG
#Tmpl.Entry=BitDefender Antivirus | BitDefender
#Tmpl.Entry=Blue Ridge Networks AppGuard 3.0.13.1 | {2C9B1E69-DD05-40F5-8378-056A117028F9}
#Tmpl.Entry=Comodo Antivirus | {4E9C1938-BDC8-4897-8368-9574F9AF83E3}
#Tmpl.Entry=Comodo GeekBuddy 4.19.131 | {266FA04F-F0FA-4F7A-AA1E-387A57F579F2}
#Tmpl.Entry=Dr. Web 9 | {937CFD3F-8BFB-4208-81CB-F5004CD7B000}
#Tmpl.Entry=Dr. Web Katana | {7599F709-61D5-44F1-996C-4DFEB1B855E0}
#Tmpl.Entry=iTunes | {FBEB98F8-64E4-4FA3-A15E-4A9F42FF962E}
#Tmpl.Entry=Kaspersky Total Security 16 | {77E7AE5C-181C-4CAF-ADBF-946F11C1CE26}
#Tmpl.Entry=Norton Security | NS
#Tmpl.Entry=Nuance Power PDF Advanced 1.0 | {BD71D245-1A8B-4FB3-83E4-74F77FB39267}
#Tmpl.Entry=Office 2016 Click-to-Run | {90160000-007E-0000-0000-0000000FF1CE}
#Tmpl.Entry=PC Tools Firewall Plus | PC Tools Firewall Plus
#
# Deprecated templates
#
[Template_Firefox_Addon_FoxNotes]
[Template_Firefox_Addon_SpeedDial]
[Template_Firefox_Addon_ScrapBook]
[Template_Neon_Force]
[Template_Neon_Bookmarks_DirectAccess]
[Template_Neon_History_DirectAccess]
[Template_Neon_Cookies_DirectAccess]
[Template_Neon_Passwords_DirectAccess]
[Template_Neon_Preferences_DirectAccess]
[Template_Neon_Profile_DirectAccess]
[Template_Neon_WallpaperAccess]
[Template_Maxthon2_Force]
[Template_Maxthon2_Favorites_DirectAccess]
[Template_Maxthon2_SharedAccount_DirectAccess]
[Template_Outlook_Express]
[Template_DefenseWall]
[Template_StickyPassword]
[Template_ActiveSync]
[Template_Windows2000Internat]
[Template_FreeDownloadManager]
[Template_WindowsFontCache]
[Template_Windows10CoreUI]
[Template_FireFix_for_Win7]
[Template_PlugPlayService]
[Template_IExplore_Credentials]
[Template_VirtualDesktopManager]
[Template_DeviceSecurity]
[Template_OnlineArmor]
[Template_VPNTunnel]
[Template_Edge_Win11Fix]
[Template_InternetDownloadManager]