Skip to main content
If any Webroot developer/engineer is interested in assisting me in developing a Sandboxie template to allow WSA filtering/identity shield/password vault to operate in sandboxed browsers please send me a PM. We will be building something like what is below, a sample of the Kaspersky template.

 

[Template_Kaspersky]

Tmpl.Title=Kaspersky Anti-Virus/Internet Security

Tmpl.Class=Security

Tmpl.Url=http://www.kaspersky.com/kaspersky_internet_security

Tmpl.Scan=s

Tmpl.ScanService=klim5

Tmpl.ScanService=klim6

OpenIpcPath=RPC ControlPRRemote:*

OpenIpcPath=*BaseNamedObjects*PRCustomProps*

OpenIpcPath=*BaseNamedObjects*PREvent*

OpenIpcPath=*BaseNamedObjects*PRObjects*

OpenIpcPath=*BaseNamedObjects*KLObj_mt_KLSCRIPTCHECKER_PR_*

OpenIpcPath=*BaseNamedObjects*__hex30-90__

OpenPipePath=DeviceNamedPipesa_hlp_srv

LingerProcess=klwtblfs.exe

# following setting comes from value DataRoot of the following key

# HKEY_LOCAL_MACHINESOFTWAREWow6432NodeKasperskyLabprotectedAVP9environment

OpenPipePath=%Tmpl.KasperskyDataRoot%~PR*.dat



[Template_Kaspersky_Pure_Password_Manager]

Tmpl.Title=Kaspersky Pure Password Manager

Tmpl.Class=Security

Tmpl.Url=http://www.kaspersky.com/kaspersky_internet_security

Tmpl.Scan=s

Tmpl.ScanProduct={1A59064A-12A9-469F-99F6-04BF118DBCFF}

# settings from Sticky Password template

OpenIpcPath=*BaseNamedObjects*Mutex*Process*API*

OpenIpcPath=*BaseNamedObjects*NamedBuffer*Process*API*

OpenIpcPath=*BaseNamedObjects*AutoUnhookMap*

OpenIpcPath=*BaseNamedObjects*mchLLEW2*

OpenIpcPath=*BaseNamedObjects*mchMixCache*

OpenIpcPath=*BaseNamedObjects*PCActivityHookInfo:*

OpenIpcPath=*BaseNamedObjects*spAutofillInfo:*

OpenIpcPath=*BaseNamedObjects*spCaptionButtonInfo:*

OpenIpcPath=*BaseNamedObjects*TtsMappedObject_Tts*

OpenIpcPath=*BaseNamedObjects*{CEA68AE7-EF0E-4AD5-9BAF-38DB1A30EF56-*

OpenIpcPath=*BaseNamedObjects*spPasswordAssistantClosedEvent:*

OpenWinClass=$:stpass.exe

NoRenameWinClass=Internet Explorer_Server

# settings specific to Kaspersky Pure

OpenIpcPath=*BaseNamedObjects*kpmPasswordAssistantClosedEvent:*

OpenIpcPath=*BaseNamedObjects*kpmAutofillInfo:*
Below is the template for LastPass.

 

[Template_LastPass]

Tmpl.Title=LastPass

Tmpl.Class=Security

Tmpl.Url=https://lastpass.com/

Tmpl.Scan=s

Tmpl.ScanKey=REGISTRYMACHINESOFTWAREClasseslpgetr

Tmpl.ScanFile=%{A520A1A4-1780-4FF6-BD18-167343C5AF16}%LastPass

OpenFilePath=<Template_LastPass>,%USERPROFILE%*LastPass*

ProcessGroup=<Template_LastPass>,iexplore.exe,firefox.exe,opera.exe,chrome.exe
Shameless bump 🙂
Hello!

I am checking on this for you as well. I know development is under a bit of a crunch right now but I am asking if this is something that is possible with WSA, amount of resources to acomplish if possible, and ETA...

 

Thank you sir!

Reply