Kaspersky Anti Targeted Attack Platform

Managing user-defined Sandbox rules

Users with the Senior security officer and Administrator roles can create rules for scanning files and URLs in their user environments. If no rules are added, objects are not sent for scanning.

You can create, edit, delete, enable, or disable rules. File scanning rules can also be imported and exported.

To send objects for scanning in preset images, you do not need to create rules. By default, Kaspersky Anti Targeted Attack Platform sends objects that need to be scanned for scanning.

In distributed solution mode, you must create rules for scanning files in custom environments on each PCN and SCN server from which you want to send files for scanning.

Users with the Security auditor role can view the list of rules. Users with the Security officer role cannot view this section.

Page top
[Topic 246747]

Viewing the table of user-defined Sandbox rules

To view the table of user-defined Sandbox rules:

  1. In the window of the application web interface, select the Custom rules section, Sandbox subsection.
  2. Open the Files or URLs tab.

The table of user-defined Sandbox rules for file or URL scanning is displayed.

The table of user-defined rules for file scanning contains the following information:

  • Created is the rule creation time.
  • Virtual machine is the name of the virtual machine to which files are sent for scanning.
  • Mask is the mask of files sent for scanning.
  • Mask exclusion is the mask of files that are excluded from scanning.
  • File category are categories of files sent for scanning.
  • State is the state of the rule. It can have the values Enabled and Disabled.

The table of user-defined URL scanning rules contains the following information:

  • Created is the rule creation time.
  • Virtual machine is the name of the virtual machine to which files are sent for scanning.
  • State is the state of the rule. It can have the values Enabled and Disabled.

Page top

[Topic 246748]

Configuring the Sandbox rule table display

You can show or hide columns and change the order of columns in the table.

To configure the table display:

  1. In the window of the application web interface, select the Custom rules section, Sandbox subsection.
  2. Open the Files or URLs tab.

    The table of user-defined Sandbox rules for file or URL scanning is displayed.

  3. In the heading part of the table, click APT_icon_customize_table.

    This opens the Customize table window.

  4. If you want to show a column in the table, select the check box next to the name of the parameter that you want displayed in the table.

    If you want to hide a parameter in the table, clear the check box.

    At least one check box must be selected.

  5. If you want to change the order of columns in the table, move the mouse cursor to the row with the relevant parameter, click APT_icon_customize_columnes_order and move the row to its new place.
  6. If you want to restore default table display settings, click Default.
  7. Click Apply.

The rule table display is configured.

Page top
[Topic 246765]

Filtering and searching Sandbox rules

To filter or search for Sandbox rules by required criteria:

  1. In the window of the application web interface, select the Custom rules section, Sandbox subsection.
  2. Open the Files or URLs tab.
  3. Depending on the filtering criterion, do the following:
    • By creation time
      1. Click the Created link to open the filter settings window.
      2. Select one of the following options:
        • Any time if you want the table to display rules created at any time.
        • Last hour if you want the application to display the rules that were created during the last hour in the table.
        • Last day if you want the application to display the rules that were created during the last day in the table.
        • Custom range if you want the application to display the rules that were created during the period you specify in the table.
      3. If you selected Custom range, select the start and end dates for the period and click Apply.
    • By virtual machine name
      1. Click Virtual machine to open the filtering settings window.
      2. Enter one or more characters of the virtual machine name.
      3. Click Apply.

The table displays only rules that match the specified criteria.

You can use multiple filters at the same time.

See also

Viewing the table of user-defined Sandbox rules

Configuring the Sandbox rule table display

Clearing a Sandbox rule filter

Viewing the information of a user-defined Sandbox rule

Creating a user-defined Sandbox rule for scanning files

Creating a user-defined Sandbox rule for URL scanning

Copying a user-defined Sandbox rule

Importing user-defined Sandbox rules for file scanning

Editing a user-defined Sandbox rule

Enabling or disabling user-disabling Sandbox rules

Exporting user-defined Sandbox rules for file scanning

Deleting user-defined Sandbox rules

List of extensions for file categories

Page top
[Topic 249422]

Clearing a Sandbox rule filter

To clear the Sandbox rule filter for one or more filtering criteria:

  1. In the window of the application web interface, select the Custom rules section, Sandbox subsection.
  2. Open the Files or URLs tab.
  3. Click Delete to the right of that column heading of the rule table for which you want to clear filtering criteria.

    If you want to clear multiple filter conditions, take steps to clear each filter condition individually.

The selected filters are cleared.

The table displays only rules that match the specified criteria.

See also

Managing user-defined Sandbox rules

Viewing the table of user-defined Sandbox rules

Configuring the Sandbox rule table display

Filtering and searching Sandbox rules

Viewing the information of a user-defined Sandbox rule

Creating a user-defined Sandbox rule for scanning files

Creating a user-defined Sandbox rule for URL scanning

Copying a user-defined Sandbox rule

Importing user-defined Sandbox rules for file scanning

Editing a user-defined Sandbox rule

Enabling or disabling user-disabling Sandbox rules

Exporting user-defined Sandbox rules for file scanning

Deleting user-defined Sandbox rules

List of extensions for file categories

Page top
[Topic 249429]

Viewing the information of a user-defined Sandbox rule

To view the information of a user-defined Sandbox rule:

  1. In the window of the application web interface, select the Custom rules section, Sandbox subsection.
  2. Open the Files or URLs tab.
  3. Select the rule for which you want to view information.

This opens a window containing information about the rule.

The window with information about the user-defined file scanning rule contains the following information:

  • State is the state of the prevention rule.
  • Virtual machine is the virtual machine on which files are scanned in accordance with this rule.
  • Mask is the mask of files sent for scanning.
  • Mask exclusion is the mask of files that are excluded from scanning.
  • File category are categories of files that are sent for scanning.
  • File size is the size of the files being scanned.

The window with information about the user-defined URL scanning rule contains the following information:

  • Virtual machine is the virtual machine on which URLs are scanned.
  • State is the state of the prevention rule.

See also

Viewing the table of user-defined Sandbox rules

Configuring the Sandbox rule table display

Filtering and searching Sandbox rules

Clearing a Sandbox rule filter

Creating a user-defined Sandbox rule for scanning files

Creating a user-defined Sandbox rule for URL scanning

Copying a user-defined Sandbox rule

Importing user-defined Sandbox rules for file scanning

Editing a user-defined Sandbox rule

Enabling or disabling user-disabling Sandbox rules

Exporting user-defined Sandbox rules for file scanning

Deleting user-defined Sandbox rules

List of extensions for file categories

Page top
[Topic 249430]

Creating a user-defined Sandbox rule for scanning files

To add a user-defined Sandbox rule for file scanning:

  1. In the window of the application web interface, select the Custom rules section, Sandbox subsection.
  2. Open the Files tab.
  3. Click Add.
  4. Select Create rule.

    This opens the rule creation window.

  5. Configure the following settings:
    1. State is the state of the prevention rule. Select the check box if you want to enable the rule.
    2. Virtual machine is the virtual machine on which files will be scanned in accordance with this rule.

      Only virtual machines with custom operating system images can be selected. These virtual machines must belong to the set of operating systems selected on the Central Node.

    3. Specify at least one of following values: mask or category of a file. If you fill in all the fields, the rule is triggered for files that match the category and size conditions or mask and size conditions, and are not exclusions.
      • Mask is the mask of files that you want to send for scanning. You can specify multiple values.

        To specify a mask, you can use the * and ? wildcard characters. Other wildcard characters are not supported.

      • Mask exclusion is the mask of files that must be excluded from scanning. You can specify multiple values.

        To specify an exclusion mask, you can use the * and ? wildcard characters. Other wildcard characters are not supported.

      • File category are categories of files that you want to send for scanning. You can specify multiple categories.

        You can view the full list of extensions for each category in the List of extensions for file categories section.

      • File size is the size of the files being scanned.
      • If you want to set multiple ranges, click Add file size.
  6. Click Add.

The rule is created.

If you want to send an archive for scanning, you must take into account the special considerations involved in scanning archives.

Archives are scanned as follows:

  1. Kaspersky Anti Targeted Attack Platform unpacks the archive.
  2. Files from the archive that match the rule are sent for scanning.

Files with the MSI extension are scanned in the same way as archives.

Page top
[Topic 246749]

Creating a user-defined Sandbox rule for URL scanning

To add a user-defined Sandbox rule for URL scanning:

  1. In the window of the application web interface, select the Custom rules section, Sandbox subsection.
  2. Open the URLs tab.
  3. Click Add.
  4. Select Create rule.

    This opens the rule creation window.

  5. Configure the following settings:
    1. Virtual machine is the virtual machine on which URLs will be scanned.

      Only virtual machines with custom operating system images can be selected. These virtual machines must belong to the set of operating systems selected on the Central Node.

    2. State is the state of the prevention rule. Select the check box if you want to enable the rule.
  6. Click Add.

The rule is created.

Page top
[Topic 246755]

Copying a user-defined Sandbox rule

To copy a user-defined Sandbox rule:

  1. In the window of the application web interface, select the Custom rules section, Sandbox subsection.
  2. Open the Files or URLs tab.
  3. Select the relevant rule.
  4. In the rule window, click Duplicate.

The rule is copied with all settings. You can change the values of settings if necessary.

Page top
[Topic 249198]

Importing user-defined Sandbox rules for file scanning

To import user-defined Sandbox rules for file scanning:

  1. In the window of the application web interface, select the Custom rules section, Sandbox subsection.
  2. Open the Files tab.
  3. Click Add.
  4. Select Import rules.
  5. This opens the file upload window.
  6. Select the file that you want to import.
  7. Click Open.

The file is imported.

Page top
[Topic 246750]

Editing a user-defined Sandbox rule

To edit a user-defined Sandbox rule:

  1. In the window of the application web interface, select the Custom rules section, Sandbox subsection.
  2. Open the Files or URLs tab.

    The table of user-defined Sandbox rules for file or URL scanning is displayed.

  3. Select a rule.

This opens the rule editing window.

You can edit the following fields:

  • In the user-defined Sandbox rules for scanning files:
    • State is the state of the prevention rule. Select the check box if you want to enable the rule.
    • Virtual machine is the virtual machine on which files will be scanned in accordance with this rule.

      Only virtual machines with custom operating system images can be selected. These virtual machines must belong to the set of operating systems selected on the Central Node.

    • Specify at least one of following values: mask or category of a file. If you fill in all the fields, the rule is triggered for files that match the category and size conditions or mask and size conditions, and are not exclusions.
      • Mask is the mask of files that you want to send for scanning. You can specify multiple values.

        To specify a mask, you can use the * and ? wildcard characters. Other wildcard characters are not supported.

      • Mask exclusion is the mask of files that must be excluded from scanning. You can specify multiple values.

        To specify an exclusion mask, you can use the * and ? wildcard characters. Other wildcard characters are not supported.

      • File category are categories of files that you want to send for scanning. You can specify multiple categories.

        You can view the full list of extensions for each category in the List of extensions for file categories section.

      • File size is the size of the files being scanned.

        If you want to set multiple ranges, click Add file size.

  • In the user-defined Sandbox rules for scanning URLs:
    • Virtual machine is the virtual machine on which URLs will be scanned.

      Only virtual machines with custom operating system images can be selected. These virtual machines must belong to the set of operating systems selected on the Central Node.

    • State is the state of the prevention rule. Select the check box if you want to enable the rule.
Page top
[Topic 246770]

Enabling or disabling user-disabling Sandbox rules

To enable or disable a Sandbox rule:

  1. In the window of the application web interface, select the Custom rules section, Sandbox subsection.
  2. Open the Files or URLs tab.

    The table of user-defined Sandbox rules for file or URL scanning is displayed.

  3. In the row with the relevant rule, select or clear the check box in the State column.

The rule is enabled or disabled.

To enable or disable the use of all or multiple Sandbox rules:

  1. In the window of the application web interface, select the Custom rules section, Sandbox subsection.
  2. Open the Files or URLs tab.

    The table of user-defined Sandbox rules for file or URL scanning is displayed.

  3. Select the check boxes on the left of the rules whose use you want to enable or disable.

    You can select all rules by selecting the check box in the row containing the headers of columns.

    A control panel appears in the lower part of the window.

  4. Click Enable or Disable to enable or disable selected rules.

Selected rules are enabled or disabled.

Page top
[Topic 246776]

Exporting user-defined Sandbox rules for file scanning

To export user-defined Sandbox rules for object scanning:

  1. In the window of the application web interface, select the Custom rules section, Sandbox subsection.
  2. Open the Files tab.
  3. Click Export.

The rules file is saved to your local computer. The file is downloaded in the JSON format.

Page top
[Topic 246777]

Deleting user-defined Sandbox rules

Users with the Senior security officer role can delete one or more user-defined Sandbox rules, or all rules at the same time.

To delete a user-defined Sandbox rule:

  1. In the window of the application web interface, select the Custom rules section, Sandbox subsection.
  2. Open the Files or URLs tab.

    The table of user-defined Sandbox rules for file or URL scanning is displayed.

  3. Select the rule that you want to delete.

    This opens a window containing information about the rule.

  4. Click Delete.

    This opens the action confirmation window.

  5. Click Yes.

The rule is deleted.

To delete all or multiple user-defined Sandbox rules:

  1. In the window of the application web interface, select the Custom rules section, Sandbox subsection.
  2. Open the Files or URLs tab.

    The table of user-defined Sandbox rules for file or URL scanning is displayed.

  3. Select the check boxes on the left of the rules that you want to delete.

    You can select all rules by selecting the check box in the row containing the headers of columns.

    A control panel appears in the lower part of the window.

  4. Click Delete.

    This opens the action confirmation window.

  5. Click Yes.

The selected rules will be deleted.

Page top
[Topic 246751]

List of extensions for file categories

Extensions for file categories are listed in the table below.

Extensions for file categories

Category

Extensions

1C

.epf, .ert, .erf, .cf, .dt, .deb, .bsl, .os, .ertx, .xls, .xml, .html, .txt, .cfu, .rptdesign, .xdt, .xslt, .wsdl

Adobe Flash Player

.swf, .fla, .flv, .f4v, .f4p, .f4a, .f4b, .mxml, .as, .asc, .ascs, .asv, .fxp, .fxpl, .xfl, .swc, .cfx, .spl, .dcr, .dir, .dxr, .aam, .swz

Java

.jar, .class, .war, .ear, .jad, .jnlp, .ser, .jsp, .jspx, .properties, .policy

Html

.html, .htm, .shtml, .xhtml, .xml, .svg, .mathml, .rss, .atom, .json, .mht, .mhtml, .webarchive

Network packet

.pcap, .pcapng, .cap, .netcap, .etl, .erf, .pkts, .pkt, .tcpdump, .snoop, .ngc, .dump, .cat, .smb, .vpcap, .dmp, .shb, .npl, .nfcapd, .wcap, .arpd, .pc, .tr1, .tr2, .trace

SAP

.abap, .adt, .bak, .cct, .cdp, .cpf, .dsc, .erd, .glo, .grc, .lis, .log, .lsa, .msg, .olap, .pgm, .prd, .sap, .sd, .se, .so, .spf, .tpz, .trc, .trex, .ttx, .wri, .xlf

XML

.xml, .xsl, .xslt, .rdf, .rss, .opf, .svg, .wsdl, .xhtml, .xjb, .xmi, .xpl, .xsl-fo, .xquery, .xsd, .dtd, .xht, .atom, .mathml, .mml, .plist, .xul, .fodt, .fo, .mxf, .xspf, .gpx, .unity, .ac, .ad, .aw, .ccxml, .csd, .dms, .epub, .fxml, .glb, .glTF, .glTF-Binary, .gml, .iif, .imdi, .jelly, .kml, .mrc, .msh, .mshxml, .mtl, .nib, .nws, .nzb, .osdx, .owl, .pbix, .plistxml, .ptx, .qti, .rdfxml, .rl, .rng, .ros, .rpj, .scml, .scxml, .shex, .sketch, .soap, .srdf, .srx

Archive

.snb, .apk, .mht, .crx, .dd, .r01, .mpkg, .pup, .tbz, .ace, .arj, .bin, .cab, .cbr, .deb, .exe, .gzip, .one, .pak, .pkg, .ppt, .rpm, .sh, .sib, .sis, .sisx, .sit, .sitx, .spl, .tar-gz, .xar, .zipx, .zip, .rar, .7z, .tar, .gz, .bz2, .xz, .tgz, .tbz2, .txz, .z, .jar, .war, .ear, .iso, .img

Audio

.a52, .adt, .dct, .dss, .dvf, .iklax, .ivs, .rm, .rmvb, .8svx, .amb, .avr, .cdda, .cvs, .cvsd, .cvu, .dts, .dvms, .fap, .fssd, .gsrt, .hcom, .htk, .ima, .ircam, .maud, .nist, .paf, .prc, .pvf, .sd2, .smp, .snd, .sndr, .sndt, .sou, .sph, .spx, .tta, .txw, .vms, .voc, .vox, .w64, .wv, .wve, .ac3, .aob, .asf, .aud, .bin, .bwg, .cdr, .gpx, .ics, .m, .m3u, .mod, .mpp, .msc, .msv, .mts, .nkc, .ps, .sdf, .sib, .sln, .spl, .srt, .temp, .vb, .wave, .wm, .wpd, .xsb, .xwb, .mpc, .aac, .flac, .m4a, .mmf, .mp3, .ogg, .wav, .wma, .mid, .amr, .ape, .au, .caf, .gsm, .oma, .qcp, .vqf, .ra, .aif, .mp2, .m4p, .awb, .m4r, .ram, .asx, .mpga, .aiff, .koz, .m4b, .kar, .iff, .midi, .3ga, .opus, .aup, .xspf, .aifc, .rta, .cda, .m3u8, .mpa, .aa, .aax, .oga, .nfa, .adpcm, .cdo, .flp, .aimppl, .4mp, .mui

Video

.drc, .f4a, .f4b, .f4p, .gifv, .mng, .mp2, .mpe, .mpv, .nsv, .roq, .svi, .3gp2, .3gpp2, .asx, .bin, .dat, .drv, .gtp, .moov, .spl, .stl, .vcd, .vid, .wm, .yuv, .hevc, .m2v, .mjpeg, .wtv, .avi, .mpeg, .m4v, .mov, .mp4, .wmv, .mpg, .swf, .3gp, .3g2, .mkv, .ogv, .webm, .asf, .ts, .mxf, .rm, .thp, .mts, .rmvb, .f4v, .mod, .vob, .h264, .flv, .3gpp, .divx, .qt, .amv, .dvsd, .m2ts, .ifo, .mswmm, .srt, .cpi, .wlmp, .vpj, .ced, .vep, .veg, .264, .dav, .pds, .dir, .arf, .mepx, .xesc, .bik, .nfv, .tvs, .imoviemobile, .rcproject, .esp3, .vproj, .aep, .camproj, .camrec, .cmproj, .cmrec, .modd, .mproj, .osp, .trec, .g64, .vro, .braw, .mse, .pz

Document

.sxi, .odg, .svg, .vsd, .eps, .cwk, .wp, .ott, .asp, .cdd, .cpp, .dotm, .gpx, .indd, .kdc, .kml, .mdb, .mdf, .mso, .one, .pkg, .pl, .pot, .potm, .potx, .ppsm, .ps, .sdf, .sgml, .sldm, .xar, .xlt, .xltm, .xltx, .pdf, .txt, .doc, .odt, .xps, .chm, .rtf, .sxw, .docx, .wpd, .wps, .docm, .hwp, .pub, .xml, .log, .oxps, .vnt, .dot, .pages, .m3u, .dotx, .shs, .msg, .odm, .pmd, .vmg, .eml, .tex, .wp5, .csk, .fdxt, .adoc, .afpub, .tcr, .acsm, .opf, .mbp, .apnx, .cbt, .vbk, .kfx, .lrf, .snb, .odp, .ppt, .pptx, .pps, .ppsx, .pptm, .key, .flipchart, .epub, .mobi, .azw, .azw3, .fb2, .djvu, .cbz, .cbr, .ibooks, .lit, .pdb, .prc, .tr2, .tr3, .ods, .xls, .xlsx, .csv, .wks, .xlsm, .xlsb, .xlr, .wk3, .numbers

Image

.dib, .pdf, .mrw, .icns, .wdp, .fig, .epsf, .cur, .erf, .fts, .heif, .jfif, .jpe, .jps, .mng, .pam, .pbm, .pes, .pfm, .picon, .pnm, .ppm, .ras, .rw2, .sgi, .x3f, .xbm, .xpm, .xwd, .art, .arw, .bmp, .cr2, .crw, .dcm, .dds, .djvu, .dng, .exr, .fpx, .gif, .ico, .jpg, .jp2, .jpeg, .nef, .orf, .pcd, .pcx, .pef, .pgm, .pict, .png, .psd, .raf, .sfw, .tga, .tiff, .wbmp, .xcf, .yuv, .kdc, .pct, .sr2, .tif, .hdr, .webp, .nrw, .plist, .ithmb, .thm, .pspimage, .mac, .heic, .rwl, .flif, .avif, .raw, .pictclipping, .jxr, .emf, .eps, .svg, .wpg, .ai, .svgz, .wmf, .odg, .cdr, .vsd, .std, .pd, .emz, .mix, .otg, .cvs, .gvdesign

Android executable file

.apk, .aab, .dex, .so, .jar, .aar, .class, .obb, .odex, .vdex, .vmx, .vmem, .img

Windows executable file

.cgi, .ds, .air, .cpp, .gadget, .hta, .jar, .msu, .paf.exe, .pwz, .thm, .vbs, .exe, .msi, .bat, .cmd, .com, .pif, .scr, .vb, .vbe, .js, .jse, .ws, .wsf, .wsh, .ps1, .psm1, .psd1, .ps1xml, .psc1, .scf, .lnk

Executable file

.rc, .p, .d, .asc, .bas, .cbl, .vbp, .iwb, .pb, .yml, .pika, .s19, .xt, .suo, .fsproj, .pbj, .pbxuser, .pyw, .xq, .cd, .sb, .sb2, .ise, .kv, .cod, .nib, .pwn, .b, .hpp, .apa, .bet, .bluej, .erb, .fxc, .m4, .owl, .sma, .trx, .vc, .def, .xap, .o, .pas, .qpr, .resources, .vbproj, .vbx, .xib, .md, .ccc, .wwp, .ss, .asf, .asm, .asp, .cfm, .dot, .dtd, .fla, .ged, .gv, .icl, .jse, .lua, .m, .mb, .mdf, .mod, .msp, .obj, .pkg, .po, .pot, .pub, .rss, .sln, .so, .vbe, .vbs, .vc4, .vcproj, .vcxproj, .wsc, .xcodeproj, .xsd, .c, .class, .cpp, .cs, .css, .go, .h, .htaccess, .html, .java, .json, .kml, .sql, .swift, .vb, .yaml, .sh, .bat, .cmd, .ps1, .py, .pl, .rb, .js, .ts, .php, .jsp, .aspx, .cgi, .jar

Disk image

.img, .cue, .dsk, .vmdk, .vhd, .vhdx, .tc, .crypt, .dmgpart, .sparsebundle, .xva, .cif, .pqi, .udf, .fvd, .arc, .fcd, .gi, .giz, .ima, .udif, .vdi, .vim, .wim, .b5t, .b6t, .bin, .bwi, .bwt, .ccd, .cdi, .cdr, .dmg, .i00, .i01, .i02, .iso, .isz, .md0, .md1, .md2, .mdf, .mds, .nrg, .pdi, .po, .rom, .sub, .tib, .toast, .vc4, .vcd

Windows event log

.evt, .evtx, .log, .txt, .xml

Windows registry file

.reg, .dat, .pol, .hiv, .srd

Font

.bin, .ps, .sfd, .fnt, .afm, .ttf, .otf, .woff, .woff2, .eot, .svg, .dfont, .pfa, .pfb, .pfm, .fon, .suit, .bdf, .pcf, .snf, .ufo, .lib, .cff

Database file

.bup, .csv, .json, .xml, .myi, .sqlplan, .abs, .abx, .ac, .accdb, .accdc, .accde, .accdr, .accdt, .accdw, .accft, .adb, .ade, .adf, .adn, .adp, .alf, .anb, .approj, .aq, .ask, .bacpac, .bak, .btr, .caf, .cat, .cdb, .chck, .ckp, .cma, .cpd, .crypt, .dab, .dacpac, .dad, .daschema, .db, .db-journal, .db-shm, .db-wal, .db2, .db3, .dbc, .dbf, .dbs, .dbt, .dbv, .dbx, .dcb, .dct, .dcx, .ddl, .dlis, .dp1, .dqy, .dsk, .dsn, .dtsx, .dxl, .eco, .ecx, .edb, .epim, .erx, .exb, .fcd, .fdb, .fic, .frm, .ftb, .gdb, .grdb, .gwi, .hdb, .his, .ib, .ibd, .icdb, .idb, .ihx, .ipj, .itdb, .itw, .jet, .jtx, .kdb, .lgc, .lwx, .maf, .maq, .mar, .marshal, .mas, .mav, .maw, .mdb, .mdbhtml, .mdf, .mdn, .mdt, .mfd, .mpd, .mrg, .mud, .mwb, .myd, .ndf, .nnt, .ns2, .ns3, .ns4, .nsf, .nv2, .nwdb, .nyf, .odb, .odl, .oqy, .ora, .orx, .owc, .pan, .pdb, .pdm, .pnz, .pqa, .pvoc, .qry, .qvd, .rbf, .rctd, .realm, .rod, .rsd, .sbf, .scx, .sdb, .sdc, .sdf, .sis, .spq, .sql, .sqlite, .sqlite3, .sqlitedb, .te, .temx, .tmd, .tps, .trc, .trm, .tvdb, .udb, .udl, .vis, .vvv, .wdb, .wmdb, .wrk, .xdb, .xld, .xmlff

Page top

[Topic 249397]