Sandboxie 5.49.0 / 0.7.2 Plus

March 5, 2021 - Software
Sandboxie 5.49.0 / 0.7.2 Plus

Sandboxie is a proprietary sandbox based isolation program for Windows operating systems. It creates a sandbox-like isolated operating environment.

There you can run or install all applications without permanently modifying the local or mapped drive. An isolated virtual environment allows to control testing of untrusted programs and web surfing.

Sandboxie runs your programs in an isolated space. It prevents them from making permanent changes to other programs and data in your computer.

When you run a program on your computer, data flows from the hard disk to the program via read operations. The data is then processed and displayed, and finally flows back from the progam to the hard disk via write operations.

Sandboxie changes the rules such that write operations do not make it back to your hard disk.

  • Intercept changes to both your files and registry settings, making it virtually impossible for any software to reach outside the sandbox.
  • Traps cached browser items into the sandbox as a by-product of normal operation. So when you throw away the sandbox, all the history records and other side-effects of your browsing disappear as well.

Benefits of the Isolated Sandbox:

  • Secure Web Browsing. If you run Web browser under the protection of Sandboxie, all malicious software downloaded by the browser is trapped in the sandbox and can be discarded trivially.
  • Enhanced Privacy. Browsing history, cookies, and cached temporary files collected while Web browsing stay in the sandbox and don’t leak into Windows.
  • Secure E-mail. Viruses and other malicious software that might be hiding in your email can’t break out of the sandbox and can’t infect your real system.
  • Windows Stays Lean. Prevent wear-and-tear in Windows by installing software into an isolated sandbox.

Supported Operating Systems: Windows XP – Windows 10 (32-bit, 64-bit).

Translations: English, Albanian, Chinese (Simplified and Traditional), Czech, Finnish, French, German, Italian, Japanese, Korean, Polish, Portuguese (Brasil), Russian and Turkish.



  • sandboxed indicator for tray icons, the tooltip now contains [#] if enabled
  • the trace log buffer can now be adjusted with “TraceBufferPages=2560”
    — the value denotes the count of 4k large pages to be used, here for a total of 10 MB
  • new functionality to the list finder


  • improved RPC debugging
  • improved IPC handling around RpcMgmtSetComTimeout, “RpcMgmtSetComTimeout=n” is now the default behavioure
    — required exceptions have been hard coded for specific calling dll’s
  • the LogApi dll is now using Sbies tracing facility to logg events instead of an own pipe server


  • FIXED SECURITY ISSUE: elevated sandboxed processes could access volumes/disks for reading (thanks hg421)
  • fixed crash issue around SetCurrentProcessExplicitAppUserModelID observed with GoogleUpdate.exe
  • fixed issue with resource monitor sort by timestamp
  • FIXED SECURITY ISSUE: a race condition in the driver allowed to obtain a elevated rights handle to a process (thanks typpos)
  • FIXED SECURITY ISSUE: “\RPC Control\samss lpc” is now filtered by the driver (thanks hg421)
    — this allowed elevated processes to change passwords, delete users and alike, to disable filtering use “OpenSamEndpoint=y”
  • FIXED SECURITY ISSUE: “\Device\DeviceApi\CMApi” is now filtered by the driver (thanks hg421)
    — this allowed elevated processes to change hardware configuration, to disable filtering use “OpenDevCMApi=y”

Remark: Just incase you don’t know what is this program. It allow you to run extra application that run in sandbox. Separated application to load without touching your computer. It is paid program but now free.



Changes in Sandboxie 5.49.0:


  • added option to alter reported Windows version “OverrideOsBuild=7601” for Windows 7 SP1
  • the trace log can now be structured like a tree with processes as root items and threads as branches


  • SandboxieCrypto now always migrates the CatRoot2 files in order to prevent locking of real files
  • greatly improved trace log performance
  • MSI Server can now run with the “FakeAdminRights=y” and “DropAdminRights=y” options
    — special service allowance for the MSI Server can be disabled with “MsiInstallerExemptions=n”
  • changed SCM access check behaviour; non elevated users can now start services with a user token
    — elevation is now only required to start services with a system token
  • reworked the trace log mechanism to be more verbose
  • reworked RPC mechanism to be more flexible





Leave a Reply