Sandboxie-Plus v1.8.4

Discussion in 'Sandboxie (SBIE Open Source) Plus & Classic' started by DavidXanatos, Apr 8, 2023.

  1. soccerfan

    soccerfan Registered Member

    Joined:
    Oct 15, 2007
    Posts:
    585
    Yes, it was a chrome based browser. Also happened with LibreWolf (ff based) (but not with an older ff based mypal).

    Applied. Thank you :thumb:
     
  2. soccerfan

    soccerfan Registered Member

    Joined:
    Oct 15, 2007
    Posts:
    585
    Another question: In the blue box, the "Save As" gui (attachment, post #24)
    shows just the filename (Sandboxie-Plus-x86-v18.4) but no extension (.exe).
    Is this by design or a quirk of the access restrictions?
     
  3. busy

    busy Registered Member

    Joined:
    Apr 10, 2006
    Posts:
    507
    Yes, it is.

    Code:
    NormalKeyPath=HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced

    Code:
    #
    # Access rules for privacy enhanced boxes
    #
    
    [TemplatePModPaths]
    WriteKeyPath=\REGISTRY\USER\*
    #
    NormalFilePath=%SystemRoot%\*
    NormalFilePath=%SbieHome%\*
    NormalFilePath=%ProgramFiles%\*
    NormalFilePath=%ProgramFiles% (x86)\*
     
    Last edited: Apr 13, 2023
  4. soccerfan

    soccerfan Registered Member

    Joined:
    Oct 15, 2007
    Posts:
    585
    Thank you again :) I'm out of questions (until the next time :D)
     
  5. soccerfan

    soccerfan Registered Member

    Joined:
    Oct 15, 2007
    Posts:
    585
  6. busy

    busy Registered Member

    Joined:
    Apr 10, 2006
    Posts:
    507
    What output does it give when you run from the command line?

    Code:
    powershell -exec bypass -nop -File "xxx.ps1" -bin "yyy\systeminformer-3.0.6522-setup.exe"
     
  7. soccerfan

    soccerfan Registered Member

    Joined:
    Oct 15, 2007
    Posts:
    585
    Here is the output:
    powershell_sbie.png
    Sigc heckFile.ps1, Sigcheck64.exe are in D:\SbiePlus (my sbie portable folder)
    The systeminformer exe file is in D:\Download
    My SigcheckFile.ps1
    Code:
    param ($bin)
    $sigcheck="D:\SbiePlus\sigcheck64.exe" -vt -vs -accepteula $bin
    if(-not ($sigcheck -like "*   0/*")){
        Write-Output $sigcheck
        exit 1
    }
    exit 0
    
     
  8. busy

    busy Registered Member

    Joined:
    Apr 10, 2006
    Posts:
    507
    Try this:

    Code:
    param ($bin)
    $sigcheck = & "D:\SbiePlus\sigcheck64.exe" -vt -vs -accepteula "$bin"
    if (-not ($sigcheck -match "VT.detection:.*0\/[^0].*")) {
        Write-Output $sigcheck
        exit 1
    }
    exit 0
     
  9. soccerfan

    soccerfan Registered Member

    Joined:
    Oct 15, 2007
    Posts:
    585
    Your .ps1 file, used directly in sandboxie, gives this:
    SigCheckFileNew.png
    This makes perfect sense and should be as expected, no? :)
     
  10. busy

    busy Registered Member

    Joined:
    Apr 10, 2006
    Posts:
    507
    Yes, it shows the Sigcheck output.
     
  11. soccerfan

    soccerfan Registered Member

    Joined:
    Oct 15, 2007
    Posts:
    585
    Thank you :thumb:
     
  12. busy

    busy Registered Member

    Joined:
    Apr 10, 2006
    Posts:
    507
    By the way, if you don't want unknown files to be uploaded to Virustotal, change the -vs parameter to -v.

    example:
    Code:
    param ($bin)
    $sigcheck = & "D:\SbiePlus\sigcheck64.exe" -vt -v -accepteula "$bin"
    if (-not ($sigcheck -match "VT.detection:.*0\/[^0].*")) {
        Write-Output $sigcheck
        exit 1
    }
    exit 0
     
  13. soccerfan

    soccerfan Registered Member

    Joined:
    Oct 15, 2007
    Posts:
    585
    Thank you. While recovering a ublock setting file the other day, the message showed "na"
    for detection and submitted the file to vt (for analysis). I guess the parameter -v avoids that.
    Edit: Confirmed! Message now shows "VT detection: Unknown" and offers to save file :D
     
    Last edited: Apr 21, 2023
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.