Install and run programs in a virtual sandbox environment

Sandboxie (32-bit)

Sandboxie (32-bit)

  -  2.3 MB  -  Open Source
  • Latest Version

    Sandboxie Classic 5.70.9 (32-bit) LATEST

  • Review by

    Daniel Leblanc

  • Operating System

    Windows 7 / Windows 8 / Windows 10 / Windows 11

  • User Rating

    Click to vote
  • Author / Product

    David Xanatos / External Link

  • Filename

    Sandboxie-Classic-x86-v5.70.9.exe

Sandboxie 32bit runs your programs in an isolated space which prevents them from making permanent changes to other programs and data in your computer.

It offers secure web browsing by running your Web browser under the protection of Sandboxie Classic means that all malicious software downloaded by the web browser is trapped in the sandbox and can be discarded trivially.

It has enhanced privacy where browsing history, cookies, and cached temporary files collected while Web browsing stay in the app and don't leak into Windows. It prevents wear-and-tear in Windows by installing software into an isolated sandbox.

Since the Open Sourcing sandboxie is being released in two flavors the classical build with a MFC based UI and as plus build that incorporates new features and an entirely new Q’t based UI. All newly added features target the plus branch but often can be utilized in the classical edition by manually editing the sandboxie.ini file.

Benefits of the Isolated Sandbox Classic:

Secure Web Browsing
Running your Web navigator under the protection of Sandboxie means that all malicious software downloaded by the browser is trapped in the tool and can be discarded trivially.

Enhanced Privacy
Browsing history, cookies, and cached temporary files collected while internet browsing stay in the program and don't leak into Windows.

Secure E-mail
Viruses and other malicious software that might be hiding in your email can't break out of the app and can't infect your real system.

Windows Stays Lean
Prevent wear-and-tear in Windows by installing software into an isolated sandbox.

How to Use
  • Launch Sandboxie Control from the Start menu.
  • Right-click on "DefaultBox" and select "Run Program".
  • Choose a program to run in the sandboxed environment.
  • Use the sandboxed application as usual.
  • Close the application when done to remove changes.
  • Empty the sandbox to delete all stored data.
  • Adjust settings in Sandboxie Control for customization.
  • Run browsers in Sandboxie to prevent malware infections.
  • Use separate sandboxes for different applications.
System Requirements
  • Windows 7, 8, 10, or 11 (32-bit)
  • 1 GHz processor or faster
  • 1 GB RAM (2 GB recommended)
  • 100 MB free disk space
  • Internet connection for installation
PROS
  • Enhances security against malware
  • Prevents unwanted system changes
  • Supports multiple sandboxes
  • Lightweight and low resource usage
  • Works with most Windows apps
CONS
  • Limited functionality in free version
  • Some apps may not work properly
  • Requires manual sandbox cleanup
  • Occasional compatibility issues
Note: Sandboxie is now open source. Sophos has released the Sandboxie source code to the GitHub community.

Also Available: Sandboxie (64-bit)

  • Sandboxie Classic 5.70.9 (32-bit) Screenshots

    The images below have been resized. Click on them to view the screenshots in full size.

    Sandboxie Classic 5.70.9 (32-bit) Screenshot 1
  • Sandboxie Classic 5.70.9 (32-bit) Screenshot 2
  • Sandboxie Classic 5.70.9 (32-bit) Screenshot 3
  • Sandboxie Classic 5.70.9 (32-bit) Screenshot 4

What's new in this version:

Added:
- added duplicate sandbox with content from UI #4542
- added new insecure debug option 'OpenAllSysCalls=y'
- added template for WindowGrid
- added new certificate type DEVELOPER; it deactivates the user mode component verification, but can only be used in node-locked form
- Note: all current and future holders of Contributor or Eternal/Huge certificates are eligible to receive a free Dev Key; please request by email if required
- added mechanism to update only Templates.ini

Changed:
- when no proxy for a given IP type is configured, the connections fail
- this change prevents IP leakage when running dual stack IPv4 and IPv6, but having only one proxy type configured
- INI editor is no longer reset when saving
- DisableWinNtHook can now be changed without a driver reload
- disabled update checks when no internet connectivity is detected

Fixed:
- fixed the encoding issue with the bullet character in the box delete/remove confirmation dialog #4591
- fixed changing the box settings/type causes some template settings in the box to be duplicated #4595
- added warning when attempting to put a sandbox is in the root of a partition #4582
- fixed bug when uninstalling #4540
- fixed Golang Cmd.Run() doesn't return when running in Sandboxie #4538
- fixed a generic handle duplication issue which may help many other applications to
- improved when Sandboxie.ini is huge, the response speed gets worse #4573
- fixed Sandboxie freezes/crashes in certain installations #4537
- when SandMan hangs and gets terminated, it will ask on next start if to disable update scanning for software compatibility checks
- fixed issue with hook monitor display
- fixed issue with INI section editing, esc no longer closes the window
- fixed hooking issues introduced in Firefox 137 Nightly and later #4522
- fixed issue with insecure debug option 'OriginalToken=y'
- fixed box group name accidentally entered carriage return character #4608
- fixed paths selected from the path selection drop-down menu in the New Box Wizard return a "not a valid path" error #4611
- FIXED SECURITY ISSUE ID-25 new method of exploiting HostInjectDll mechanism for local privilege escalation