Process Hacker Discussion Forum
Windows Registry Editor Version 5.00
;Copyright 2017 tomcat https://wj32.org/processhacker/forums/index.php
;This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License version 3.
;This program is distributed WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
;See <http://www.gnu.org/licenses/> for more details.
[-HKEY_CLASSES_ROOT\exefile\shell\FWc]
[HKEY_CLASSES_ROOT\exefile\shell\FWc]
"MUIVerb"="Set Firewall Rules"
"Icon"="imageres.dll,102"
"subcommands"=""
[HKEY_CLASSES_ROOT\exefile\shell\FWc\shell]
[HKEY_CLASSES_ROOT\exefile\shell\FWc\shell\01]
"MUIVerb"="Allow Outbound"
"Icon"="imageres.dll,101"
"CommandFlags"=dword:00000040
[HKEY_CLASSES_ROOT\exefile\shell\FWc\shell\01\command]
@="cmd /q /c echo CreateObject(\"Shell.Application\").ShellExecute \"cmd\", \"/q /c chcp 1251 & netsh advfirewall firewall add rule name=\"\"%1\"\" dir=out action=allow program=\"\"%1\"\" enable=yes | msg * \", \"\", \"runas\" > %%temp%%\\ev.vbs & cscript %%temp%%\\ev.vbs & del %%temp%%\\ev.vbs"
[HKEY_CLASSES_ROOT\exefile\shell\FWc\shell\02]
"Icon"="imageres.dll,100"
"MUIVerb"="Block Outbound"
[HKEY_CLASSES_ROOT\exefile\shell\FWc\shell\02\command]
@="cmd /q /c echo CreateObject(\"Shell.Application\").ShellExecute \"cmd\", \"/q /c chcp 1251 & netsh advfirewall firewall add rule name=\"\"%1\"\" dir=out action=block program=\"\"%1\"\" enable=yes | msg * \", \"\", \"runas\" > %%temp%%\\ev.vbs & cscript %%temp%%\\ev.vbs & del %%temp%%\\ev.vbs"
[HKEY_CLASSES_ROOT\exefile\shell\FWc\shell\03]
"MUIVerb"="Allow Outbound Port 80-443"
"Icon"="imageres.dll,101"
"CommandFlags"=dword:00000040
[HKEY_CLASSES_ROOT\exefile\shell\FWc\shell\03\command]
@="cmd /q /c echo CreateObject(\"Shell.Application\").ShellExecute \"cmd\", \"/q /c chcp 1251 & netsh advfirewall firewall add rule name=\"\"%1\"\" dir=out action=allow program=\"\"%1\"\" enable=yes protocol=6 profile=private,public remoteport=80,443 | msg * \", \"\", \"runas\" > %%temp%%\\ev.vbs & cscript %%temp%%\\ev.vbs & del %%temp%%\\ev.vbs"
[HKEY_CLASSES_ROOT\exefile\shell\FWc\shell\04]
"MUIVerb"="Allow Outbound UDP"
"Icon"="imageres.dll,101"
"CommandFlags"=dword:00000040
[HKEY_CLASSES_ROOT\exefile\shell\FWc\shell\04\command]
@="cmd /q /c echo CreateObject(\"Shell.Application\").ShellExecute \"cmd\", \"/q /c chcp 1251 & netsh advfirewall firewall add rule name=\"\"%1\"\" dir=out action=allow program=\"\"%1\"\" enable=yes protocol=17 profile=private,public remoteport=53 remoteip=192.168.1.1 | msg * \", \"\", \"runas\" > %%temp%%\\ev.vbs & cscript %%temp%%\\ev.vbs & del %%temp%%\\ev.vbs"
[HKEY_CLASSES_ROOT\exefile\shell\FWc\shell\05]
"MUIVerb"="Show Adv.Firewall Console"
"Icon"="imageres.dll,109"
[HKEY_CLASSES_ROOT\exefile\shell\FWc\shell\05\command]
@="mmc.exe wf.msc"
Hey, tomcat, Why did you set your own copyright on this .reg file? You didn't wrote it.tomcat wrote: ↑04 Dec 2017 14:12What you protect so much that you need three firewalls at the same time??
Windows built in Firewall is very good and enough to block all inbound and control the all outbound connection.
There's a little help for creating a quick Windows Firewall rule.FirewallRules.zipCode: Select allWindows Registry Editor Version 5.00 ;Copyright 2017 tomcat https://wj32.org/processhacker/forums/index.php ;This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License version 3. ;This program is distributed WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. ;See <http://www.gnu.org/licenses/> for more details. [-HKEY_CLASSES_ROOT\exefile\shell\FWc] [HKEY_CLASSES_ROOT\exefile\shell\FWc] "MUIVerb"="Set Firewall Rules" "Icon"="imageres.dll,102" "subcommands"="" [HKEY_CLASSES_ROOT\exefile\shell\FWc\shell] [HKEY_CLASSES_ROOT\exefile\shell\FWc\shell\01] "MUIVerb"="Allow Outbound" "Icon"="imageres.dll,101" "CommandFlags"=dword:00000040 [HKEY_CLASSES_ROOT\exefile\shell\FWc\shell\01\command] @="cmd /q /c echo CreateObject(\"Shell.Application\").ShellExecute \"cmd\", \"/q /c chcp 1251 & netsh advfirewall firewall add rule name=\"\"%1\"\" dir=out action=allow program=\"\"%1\"\" enable=yes | msg * \", \"\", \"runas\" > %%temp%%\\ev.vbs & cscript %%temp%%\\ev.vbs & del %%temp%%\\ev.vbs" [HKEY_CLASSES_ROOT\exefile\shell\FWc\shell\02] "Icon"="imageres.dll,100" "MUIVerb"="Block Outbound" [HKEY_CLASSES_ROOT\exefile\shell\FWc\shell\02\command] @="cmd /q /c echo CreateObject(\"Shell.Application\").ShellExecute \"cmd\", \"/q /c chcp 1251 & netsh advfirewall firewall add rule name=\"\"%1\"\" dir=out action=block program=\"\"%1\"\" enable=yes | msg * \", \"\", \"runas\" > %%temp%%\\ev.vbs & cscript %%temp%%\\ev.vbs & del %%temp%%\\ev.vbs" [HKEY_CLASSES_ROOT\exefile\shell\FWc\shell\03] "MUIVerb"="Allow Outbound Port 80-443" "Icon"="imageres.dll,101" "CommandFlags"=dword:00000040 [HKEY_CLASSES_ROOT\exefile\shell\FWc\shell\03\command] @="cmd /q /c echo CreateObject(\"Shell.Application\").ShellExecute \"cmd\", \"/q /c chcp 1251 & netsh advfirewall firewall add rule name=\"\"%1\"\" dir=out action=allow program=\"\"%1\"\" enable=yes protocol=6 profile=private,public remoteport=80,443 | msg * \", \"\", \"runas\" > %%temp%%\\ev.vbs & cscript %%temp%%\\ev.vbs & del %%temp%%\\ev.vbs" [HKEY_CLASSES_ROOT\exefile\shell\FWc\shell\04] "MUIVerb"="Allow Outbound UDP" "Icon"="imageres.dll,101" "CommandFlags"=dword:00000040 [HKEY_CLASSES_ROOT\exefile\shell\FWc\shell\04\command] @="cmd /q /c echo CreateObject(\"Shell.Application\").ShellExecute \"cmd\", \"/q /c chcp 1251 & netsh advfirewall firewall add rule name=\"\"%1\"\" dir=out action=allow program=\"\"%1\"\" enable=yes protocol=17 profile=private,public remoteport=53 remoteip=192.168.1.1 | msg * \", \"\", \"runas\" > %%temp%%\\ev.vbs & cscript %%temp%%\\ev.vbs & del %%temp%%\\ev.vbs" [HKEY_CLASSES_ROOT\exefile\shell\FWc\shell\05] "MUIVerb"="Show Adv.Firewall Console" "Icon"="imageres.dll,109" [HKEY_CLASSES_ROOT\exefile\shell\FWc\shell\05\command] @="mmc.exe wf.msc"
Merge FirewallRules.reg file and do right mouse click on the *.exe you want to control, and select rule from the context menu.
Capture.JPG
Actually, you can already get all the plugins-extra compiled courtesy of viksoftru with many thanks by downloading the file Process_Hacker-bin.7z from post #27 of this thread at:kajma wrote: ↑06 Feb 2018 14:18Could you compile and share the followed plugins?
MemoryExtPlugin
PerfMonPlugin
Thanks