Skip to content

@DavidXanatos DavidXanatos released this Oct 10, 2020 · 4 commits to master since this release

Bug fix release resolving a critical chrome 86+ incompatibility and fixing many resource leaks.

Important Note:

The SbieDrv.sys driver must be signed, and since the appropriate certificates are prohibitively expensive, I head to use a leaked code signing certificate I found laying around the Internets. This means some anti malware applications wrongfully flag it as potentially dangerous or a virus.

If you want SandboxiePlus to get a proper EV-Code Signing Certificate please support the project through donations. You can donate via paypal at https://xanasoft.com/ or patreon https://www.patreon.com/DavidXanatos

SHA256 Check Summs:

  • SandboxieInstall32-v5.43.6.exe 77a3c0832826405cd579a3431b511941856cccfadadafd475707b36b5b84b6b5
  • SandboxieInstall64-v5.43.6.exe 52ae02dbc7b6f1569adc041daaf5aff27beb3774d82a8f4bb6e0df82494c5f56
  • Sandboxie-Plus-x64-v0.4.2.exe af2206bb12a4c33daa126bc92fcf6f2251f09b2df2aa57339b275744d9947d2b
  • Sandboxie-Plus-x86-v0.4.2.exe 3fa3244af04b02b4376b7816bcffa0433c152833be89fd72d69009d4272da321

ChangeLog

[0.4.2 / 5.43.6] - 2020-10-10

Added

  • added explore box content menu option

Fixed

  • fixed thread handle leak in SbieSvc and other components
  • msedge.exe is now categorized as a chromium derivate
  • fixed chrome 86+ compatybility bug with chroms own sandbox
Assets 6

@DavidXanatos DavidXanatos released this Sep 12, 2020 · 5 commits to master since this release

Bug fix release resolving many issues, some of them introduced with the previous build.

Important Note:

The SbieDrv.sys driver must be signed, and since the appropriate certificates are prohibitively expensive, I head to use a leaked code signing certificate I found laying around the Internets. This means some anti malware applications wrongfully flag it as potentially dangerous or a virus.

If you want SandboxiePlus to get a proper EV-Code Signing Certificate please support the project through donations. You can donate via paypal at https://xanasoft.com/ or patreon https://www.patreon.com/DavidXanatos

ChangeLog

Added

  • added core version compatybility check to sandman UI
  • added shell integration options to SbiePlus

Changed

  • SbieCtrl does not longer auto show the tutorian on first start
  • when hooking, the to the trampoline migrated section of the original function is not longer noped out
    -- it caused issues with unity games, will be investigated and re enabled later

Fixed

  • fixed color issue with vertical tabs in dark mode
  • fixed wrong path separators when adding new forced folders
  • fixed directroy listing bug intriduced in 5.43
  • fixed issues with settings window when not being connected to driver
  • fixed issue when starting sandman ui as admin
  • fixed auto content delete not working with sandman ui
Assets 6
Pre-release
Pre-release

@DavidXanatos DavidXanatos released this Sep 6, 2020 · 7 commits to master since this release

This build brings a great new feature, snapshots, these allow to save a box state. The file system changes are saved incrementally for every snapshot a folder named snapshot-n where n is the snapshot id will be created in the box folder. The snapshot layout as well as the information which one is the currently used one are saved in a snapshot.ini in the box folder. With this feature tracing what applications do will be even easier, as well as undoing destructive changes that may have occurred.

Also with this release the SbiePlus build gets an own proper installer, from the get go. If you want t use the Plus build portable just choose the "Extract" option from the installer that will just unpack it to a selected folder.

Important Note:

The SbieDrv.sys driver must be signed, and since the appropriate certificates are prohibitively expensive, I head to use a leaked code signing certificate I found laying around the Internets. This means some anti malware applications wrongfully flag it as potentially dangerous or a virus.

If you want SandboxiePlus to get a proper EV-Code Signing Certificate please support the project through donations. You can donate via paypal at https://xanasoft.com/ or patreon https://www.patreon.com/DavidXanatos

Changelog

Added

  • added a proper custom installer to the the Plus release
  • added sandbox snapshot functionality to sbie core
    -- filesystem is saved incrementally, the snapshots built upon each other
    -- each snapshot gets a full copy of the box registry for now
    -- each snapshot can have multiple children snapshots
  • added access status to resource monitor
  • added setting to change border width
  • added snapshot manager UI to SandMan
  • added template to enable authentication with an Yubikey or comparable 2FA device
  • added ui for program allert
  • added software compatybility options to teh UI

Changed

  • SandMan UI now handles deletion of sandboxe content on its own
  • no longer adding redundnat resource accesses as new events

Fixed

  • fixed issues when hooking functions from delay loaded libraries
  • fixed issues when hooking an already hooked function
  • fixed issues with the new box settings editor

Removed

  • removes deprecated workaround in the hooking mechanism for an obsolete antimalware product
Assets 6

@DavidXanatos DavidXanatos released this Jul 19, 2020 · 10 commits to master since this release

This build brings the new SandMan UI a large step closer to full feature parity with SbieCtrl

Important Note:

The SbieDrv.sys driver must be signed, and since the appropriate certificates are prohibitively expensive, I head to use a leaked code signing certificate I found laying around the Internets. This means some anti malware applications wrongfully flag it as potentially dangerous or a virus.

If you want SandboxiePlus to get a proper EV-Code Signing Certificate please support the project through donations. You can donate via paypal at https://xanasoft.com/ or patreon https://www.patreon.com/DavidXanatos

Changelog

Added

  • Added settings window
  • added translationsupport
  • added dark theme
  • added auto start option
  • added sandbox options
  • added debug option "NoAddProcessToJob=y"

Changed

  • improved empty sandbox tray icon
  • improved message parsing
  • updated homepage links

Fixed

  • fixed ini issue with sandman.exe when renaming sandboxes
  • fixed ini auto reload bug introduced in the last build
  • fixed issue when hooking delayd loaded libraries
Assets 8

@DavidXanatos DavidXanatos released this Jul 4, 2020 · 12 commits to master since this release

This is a huge update fixing many bugs and security issues, it also expands on the functionality of the new SandMan.exe UI component, Check out the full ChangeLog for more details.

Important Note:

The SbieDrv.sys driver must be signed, and since the appropriate certificates are prohibitively expensive, I head to use a leaked code signing certificate I found laying around the Internets. This means some anti malware applications wrongfully flag it as potentially dangerous or a virus.

If you want SandboxiePlus to get a proper EV-Code Signing Certificate please support the project through donations. You can donate via paypal at https://xanasoft.com/ or patreon https://www.patreon.com/DavidXanatos

Changelog:

Added

  • API_QUERY_PROCESS_INFO can be now used to get the original process token of sandboxed processes
    -- Note: this capability is used by TaskExplorer to allow inspecting sandbox internal tokens
  • Added option "KeepTokenIntegrity=y" to make the sbie token keep its initial integrity level (debug option)
    -- Note: Do NOT USE Debug Options if you dont know their security implications (!)
  • Added process id to log messages very usefull for debugging
  • Added finder to resource log
  • Added option to hide host processes "HideHostProcess=[name]"
    -- Note: Sbie hides by default processes from other boxes, this behavioure can now be controlled with "HideOtherBoxes=n"
  • Sandboxed RpcSs and DcomLaunch can now be run as system with the option "ProtectRpcSs=y" howeever that breaks sandboxed explorer and other
  • BuiltIn Clsid whitelist can now be disabled with "OpenDefaultClsid=n"
  • Processes can be now terminated with the del key, and require a confirmation
  • Added sandboxed window border display to SandMan.exe
  • Added notification for sbie log messages
  • Added Sandbox Presets sub menu allowing to quickly change some settings
    -- Enable/Disable API logging, logapi_dll's are now distributed with SbiePlus
    -- And other: Drop admin rights; Block/Allow internet access; Block/Allow access to files on te network
  • Added more info to the sandbox status column
  • Added path column to SbieModel
  • Added info tooltips in SbieView

Changed

  • Reworked ApiLog, added pid and pid filter
  • Auto config reload on in change is now delayed by 500ms to not reload multiple times on incremental changes
  • Sandbox names now replace "_" witn " " for display allowing to use names that are build of separated words

Fixed

  • added mising PreferExternalManifest itialization to portable mode
  • fixed permission issues with sandboxed system processes
    -- Note: you can use "ExposeBoxedSystem=y" for the old behaviour (debug option)
  • fixed missing SCM access check for sandboxed services
    -- Note: to disable the access check use "UnrestrictedSCM=y" (debug option)
  • fixed missing initialization in serviceserver that caused sandboxed programs to crash when querying service status
  • fixed many bugs that caused the SbieDrv.sys to BSOD when run with MSFT Driver Verifier active
    -- 0xF6 in GetThreadTokenOwnerPid and File_Api_Rename
    -- missing non optional parameter for FltGetFileNameInformation in File_PreOperation
    -- 0xE3 in Key_StoreValue and Key_PreDataInject
Assets 6

@DavidXanatos DavidXanatos released this Jun 19, 2020 · 24 commits to master since this release

This build finally fixes the MSI installer issue, also it adds some debugging improvements.

Important Note:

The SbieDrv.sys driver must be signed, and since the appropriate certificates are prohibitively expensive, I head to use a leaked code signing certificate I found laying around the Internets. This means some anti malware applications wrongfully flag it as potentially dangerous or a virus.

If you want SandboxiePlus to get a proper EV-Code Signing Certificate please support the project through donations. You can donate via paypal at https://xanasoft.com/ or patreon https://www.patreon.com/DavidXanatos

Changelog:

Added

  • added option SeparateUserFolders=n to no longer have the user profile files stored separately in the sandbox
  • added SandboxieLogon=y it makes processes run under the SID of the "Sandboxie" user instead of the Anonymous user
    -- Note: the global option AllowSandboxieLogon=y must be enabled, the "Sandboxie" user account must be manually created first and the driver reloaded, else process start will fail
  • improved debugging around process creation errors in the driver

Fixed

  • fixed some log messages going lost after driver reload
  • found a workable fix for the MSI installer issue, see Proc_CreateProcessInternalW_RS5
Assets 6

@DavidXanatos DavidXanatos released this Jun 18, 2020 · 25 commits to master since this release

This build focuses on usage improvements and bug fixes.

Please note that if you want to use an existing Sandboxie installation it must be updated to version 5.41.1

Important Note:

The SbieDrv.sys driver must be signed, and since the appropriate certificates are prohibitively expensive, I head to use a leaked code signing certificate I found laying around the Internets. This means some anti malware applications wrongfully flag it as potentially dangerous or a virus.

If you want SandboxiePlus to get a proper EV-Code Signing Certificate please support the project through donations. You can donate via paypal at https://xanasoft.com/ or patreon https://www.patreon.com/DavidXanatos

[0.2.1 / 5.41.1] - 2020-06-18

Added

  • added different sandbox icons for different types
    -- Red LogAPI/BSA enabled
    -- More to come :D
  • Added progress window for async operations that take time
  • added DPI awareness
  • the driver file is now obfuscated to avoid false positives
  • additional debug options to sandboxie.ini OpenToken=y that combines UnrestrictedToken=y and UnfilteredToken=y
    -- Note: using these options weekens the sandboxing, they are intended for debugging and may be used for better application virtualization later

Changed

  • SbieDll.dll when processinh InjectDll now looks in the SbieHome folder for the Dll's if the entered path starts with a backslash
    -- i.e. "InjectDll=\LogAPI\i386\logapi32v.dll" or "InjectDll64=\LogAPI\amd64\logapi64v.dll"

Fixed

  • IniWatcher did not work in portable mode
  • service path fix broke other services, now properly fixed, may be
  • found workaround for the msi installer issue
Assets 6

@DavidXanatos DavidXanatos released this Jun 8, 2020 · 26 commits to master since this release

This build brings a much more feature complete SandMan (Sandboxie Manager) it is now capable of installing/uninstalling and controlling the driver/service from the Sandbox->Maintenance menu these options are available.
If a Sandboxie-Plus.ini is created in its root directory it will operate in a fully portable mode.

Please note that if you want to use the existing Sandboxie installation it must be updated to version 5.41

Important Note:

The SbieDrv.sys driver must be signed, and since the appropriate certificates are prohibitively expensive, I head to use a leaked code signing certificate I found laying around the Internets. This means some anti malware applications wrongfully flag it as potentially dangerous or a virus.

If you want SandboxiePlus to get a proper EV-Code Signing Certificate please support the project through donations. You can donate via paypal at https://xanasoft.com/ or patreon https://www.patreon.com/DavidXanatos

[0.2 / 5.41] - 2020-06-08

Added

  • IniWatcher, no more clicking reload, the ini is now reloaded automatically every time it changes
  • Added Mainanance menu to the Sandbox menu, allowing to install/uninstall and start/stop sandboxie driver, service
  • SandMan.exe now is packed with Sbie files and when no sbie is installed acts as a portable instalation
  • Added option to clean up logs

Changed

  • sbie driver now first checks the home path for the sbie ini before checking SystemRoot

Fixed

  • Fixed a resource leak when running sandboxed
  • Fixed issue boxed services not starting when the path contained a space
  • NtQueryInformationProcess now returns the proper sandboxed path for sandboxed processes
Assets 7
Pre-release
  • v0.1
  • df665a7
  • Compare
    Choose a tag to compare
    Search for a tag
Pre-release
  • v0.1
  • df665a7
  • Compare
    Choose a tag to compare
    Search for a tag

@DavidXanatos DavidXanatos released this Jun 1, 2020 · 28 commits to master since this release

First release of the early new Sandboxie UI concept, and some driver improvements for better logging/debugging. The new UI uses a new Sandboxie API library made for Qt integration.

The SandMan.exe (Sandboxie Manager) is intended as a replacement for the SbieCtrl.exe

[0.1 / 5.40.2] - 2020-06-01

Added

  • Created a new Qt based UI names SandMan (Sandboxie Manager)
  • Resource monitor now shows the PID
  • Added basic API call log using updated BSA LogApiDll

Changed

  • reworked resource monitor to work with multiple event consumers
  • reworked log to work with multiple event consumers
Assets 6

@DavidXanatos DavidXanatos released this Apr 10, 2020 · 30 commits to master since this release

This is the first non original release, it fixes the the issue: #1 and adds some new debug capabilities.

Change Log:

Added

  • "Other" type for the Resource Access Monitor
    -- added call to StartService to the logged Resources

Fixed

  • fixed "Windows Installer Service could not be accessed" that got introduced with Windows 1903

Note:

The SbieDrv.sys driver must be signed, and since the appropriate certificates are prohibitively expensive, I head to use a leaked code signing certificate I found laying around the Internets.
This means some anti malware applications flag it as potentially dangerous: https://www.virustotal.com/gui/file/f1587c91eb6ff49c20fa1f026358ebe8f9bc10625f86013c975abe894cd146ac/detection

Assets 4
You can’t perform that action at this time.