HKLM and HKU contain all registry data. HKCR, HKCU and HKCC are just links.
Code: Select all
Root Key Equivalent
HKCR HKCU\Software\Classes + HKLM\SOFTWARE\Classes
HKCU HKU\SID
HKCC HKLM\SYSTEM\CurrentControlSet\Hardware Profiles\Current
![Wink :wink:](images/smilies/icon_wink.gif)
Code: Select all
Root Key Equivalent
HKCR HKCU\Software\Classes + HKLM\SOFTWARE\Classes
HKCU HKU\SID
HKCC HKLM\SYSTEM\CurrentControlSet\Hardware Profiles\Current
I see that when I run List Registry Links unsandboxed...Buster wrote:Well, I found that if you modify something in HKEY_USERS\S-1-5-18 the change will appear under HKEY_USERS\.DEFAULT......
Code: Select all
c:\files\listregistrylinks>ListRegistryLinks.exe hku
"hku\S-1-5-21-25130506-776034094-9161161-1001\Software\Classes" -> "HKU\S-1-5-21
-25130506-776034094-9161161-1001_Classes"
"hku\Sandbox_Nick_DefaultBox\user\current\software\classes" -> "HKU\Sandbox_Nick
_DefaultBox\user\current_classes"
"hku\S-1-5-18" -> "HKU\.Default"
c:\files\listregistrylinks>
During the 1.06 betas, Buster explained the issue this way: log_api.dll intercepts GetModuleHandle requests for SbieDll.dll and returns "nothing found". This is desirable when running sandboxed malware that tries to detect Sandboxie. Unfortunately, it breaks forced programs. It's best to have a dedicated sandbox for use with BSA and set another sandbox to manage your forced programs.hotmog wrote:Any idea what's causing this, and how it can be resolved?
Just tried it - I rather like that! Surprisingly, it still runs in "stealth" mode even though only the Defaultbox is opened, which doesn't now have the InjectDll command.Buster wrote:Note for the people interested in hiding Sandboxie:
Read BSA.PDF to know how to hide Sandboxie. It´s not necessary you run BSA to hide Sandboxie. It´s only necessary you inject LOG_API.DLL and run the driver to hide processes.
The driver to hide processes takes care of the "more visible" components of Sandboxie: Sbiesvc.exe, SbieCtrl.exe, SandboxieDComLaunch.exe and SandboxieRpcSs.exe.hotmog wrote:Hi Buster
I have already created a sandbox specifically for BSA, which has the InjectDll command for LOG_API.DLL. That command has been removed from the Defaultbox, and I no longer have an issue with IE. That is why I am surprised that the Sandboxie processes still remain hidden when only the Defaultbox is opened (after rebooting & rerunning HideDriverGUI.exe).
I don't understand the significance of the inject dll stage. I had a look at your link, but I'm no C++ programmer either, so I'm afraid I'm none the wiser.
Users browsing this forum: No registered users and 1 guest