Should I block it?

No, this file is 100% safe to run.

VersionsAdditional versions

4.06 40.00%
4.06 40.00%
4.04 20.00%

Relationships


PE structurePE file structure

Show functions
Import table
kernel32.dll
OpenFileMappingW, MapViewOfFile, GetWindowsDirectoryW, HeapDestroy, QueueUserWorkItem, GetTempPathW, WriteFile, CreateFileA, CreateFileMappingW, SizeofResource, ReadFile, EnumResourceNamesW, LoadLibraryExW, GetVersionExW, FormatMessageW, SetLocaleInfoW, SetLocaleInfoA, PostQueuedCompletionStatus, GetLongPathNameW, GetFullPathNameW, GetProcessId, OpenMutexW, CreateMutexW, ReleaseMutex, WinExec, TerminateProcess, CreateProcessA, SetThreadPriority, ResumeThread, GetExitCodeProcess, OpenEventW, HeapFree, GetProcessHeap, HeapAlloc, VirtualAlloc, CreateThread, WaitForMultipleObjects, GetConsoleWindow, AllocConsole, SetConsoleTitleA, GetConsoleTitleA, GetConsoleTitleW, SetConsoleTitleW, GetStartupInfoW, FindResourceW, FindResourceA, LoadResource, LockResource, GetThreadTimes, MapViewOfFileEx, UnmapViewOfFile, GlobalFree, OpenThread, GlobalAddAtomW, GlobalSize, GlobalAlloc, GlobalLock, GlobalUnlock, GetCurrentThreadId, WideCharToMultiByte, GetSystemInfo, OpenProcess, Sleep, InitializeCriticalSection, MoveFileWithProgressW, ReplaceFileW, MoveFileExW, TryEnterCriticalSection, CreateFileW, DeleteFileW, GetCurrentThread, QueueUserAPC, GetEnvironmentStringsW, GetEnvironmentVariableW, GetSystemWindowsDirectoryW, GetFileAttributesW, CreateDirectoryW, SetEvent, InterlockedExchange, InterlockedCompareExchange, GetTickCount, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, TlsGetValue, TlsSetValue, TlsAlloc, VirtualFree, GetCurrentProcessId, VirtualProtect, GetCommandLineW, GetModuleFileNameW, SetEnvironmentVariableW, ExitProcess, CreateProcessW, WaitForSingleObject, LocalAlloc, LocalFree, GetSystemTimeAsFileTime, FreeLibrary, InterlockedDecrement, LoadLibraryW, ExpandEnvironmentStringsW, RaiseException, OutputDebugStringW, GetModuleHandleW, CreateEventW, CloseHandle, InterlockedIncrement, GetCurrentProcess, GetProcAddress, SetLastError, GetLastError, HeapCreate
ntdll.dll
NtOpenProcess, NtSetInformationJobObject, NtAssignProcessToJobObject, NtCreateJobObject, NtDuplicateObject, NtUnmapViewOfSection, NtMapViewOfSection, _strlwr, RtlUnwind, NtQuerySecurityObject, NtSetSecurityObject, NtSetInformationToken, NtAdjustPrivilegesToken, RtlConvertSidToUnicodeString, RtlCreateAcl, RtlAddAccessAllowedAceEx, RtlCreateSecurityDescriptor, RtlSetDaclSecurityDescriptor, RtlSetSaclSecurityDescriptor, sprintf, _vsnprintf, RtlNtStatusToDosError, NtQueryVirtualMemory, iswctype, NtYieldExecution, LdrLoadDll, LdrUnloadDll, LdrQueryImageFileExecutionOptions, NtLoadDriver, tolower, LdrQueryProcessModuleInformation, NtDeleteKey, NtEnumerateValueKey, NtQueryMultipleValueKey, NtNotifyChangeKey, NtNotifyChangeMultipleKeys, NtSaveKey, NtLoadKey, NtSetInformationKey, NtDeleteValueKey, NtQueryKey, NtCreatePort, NtSecureConnectPort, NtImpersonateClientOfPort, NtCreateEvent, NtOpenEvent, NtCreateMutant, NtOpenMutant, NtCreateSemaphore, NtOpenSemaphore, NtCreateSection, NtOpenSection, NtImpersonateAnonymousToken, NtImpersonateThread, NtOpenThreadToken, NtDuplicateToken, NtQueryInformationToken, NtOpenProcessToken, NtOpenThread, NtQueryInformationThread, RtlUnicodeStringToAnsiString, wcstoul, strchr, strncmp, RtlInitString, RtlAnsiStringToUnicodeString, RtlFreeUnicodeString, NtQueryInformationProcess, NtSetInformationThread, NtQueryAttributesFile, NtQueryFullAttributesFile, NtQueryInformationFile, NtSetInformationFile, NtCreateNamedPipeFile, NtCreateMailslotFile, NtFsControlFile, RtlGetFullPathName_U, RtlGetCurrentDirectory_U, RtlSetCurrentDirectory_U, NtQueryVolumeInformationFile, wcscmp, NtQuerySystemInformation, NtDeleteFile, NtReadFile, NtWriteFile, NtDeviceIoControlFile, NtCreateFile, NtOpenSymbolicLinkObject, NtQuerySymbolicLinkObject, NtOpenDirectoryObject, NtSetInformationProcess, NtQueryObject, _wtoi, NtOpenFile, NtQueryDirectoryFile, RtlCompareUnicodeString, wcsncpy, wcsrchr, wcstol, _wcslwr, NtEnumerateKey, wcsstr, LdrGetProcedureAddress, NtOpenKey, NtCreateKey, NtSetValueKey, wcsncmp, _wcsicmp, wcscat, wcschr, swprintf, _itow, memmove, NtQueryValueKey, towlower, wcslen, wcscpy, NtRequestWaitReplyPort, NtClose, RtlInitUnicodeString, NtConnectPort, NtRegisterThreadTerminatePort, strstr, _wcsnicmp
Export table
_SbieApi_ActivateLicense@8
_SbieApi_CallOne@8
_SbieApi_CallTwo@12
_SbieApi_CallZero@4
_SbieApi_CheckInternetAccess@12
_SbieApi_DisableForceProcess@8
_SbieApi_EnumBoxes@8
_SbieApi_EnumBoxesEx@12
_SbieApi_EnumProcessEx@16
_SbieApi_GetFileName@12
_SbieApi_GetHomePath@16
_SbieApi_GetUnmountHive@4
_SbieApi_GetVersion@4
_SbieApi_GetWork@12
_SbieApi_HookTramp@8
_SbieApi_IsBoxEnabled@4
_SbieApi_MonitorControl@8
_SbieApi_MonitorGet@8
_SbieApi_MonitorPut@8
_SbieApi_OpenProcess@8
_SbieApi_QueryBoxPath@28
_SbieApi_QueryConf@20
_SbieApi_QueryConfBool@12
_SbieApi_QueryLicense@8
_SbieApi_QueryPathList@16
_SbieApi_QueryProcess@20
_SbieApi_QueryProcessEx@24
_SbieApi_QueryProcessEx2@28
_SbieApi_QueryProcessInfo@8
_SbieApi_QueryProcessPath@28
_SbieApi_ReloadConf@4
_SbieApi_SessionLeader@8
_SbieApi_SetUserName@8
_SbieApi_vLogEx@16
_SbieDll_AssocQueryCommand@4
_SbieDll_AssocQueryProgram@4
_SbieDll_CallServer@4
_SbieDll_ComCreateProxy@16
_SbieDll_ComCreateStub@16
_SbieDll_DeviceChange@8
_SbieDll_DisableElevationHook@0
_SbieDll_ExpandAndRunProgram@4
_SbieDll_FormatMessage@8
_SbieDll_FormatMessage0@4
_SbieDll_FormatMessage1@8
_SbieDll_FormatMessage2@12
_SbieDll_FreeMem@4
_SbieDll_GetDrivePath@4
_SbieDll_GetHandlePath@12
_SbieDll_GetLanguage@4
_SbieDll_GetServiceRegistryValue@12
_SbieDll_GetStartError@0
_SbieDll_GetTokenElevationType@0
_SbieDll_GetUserPathEx@4
_SbieDll_Hook@12
_SbieDll_InitPStore@0
_SbieDll_IsBoxedService@4
_SbieDll_IsDirectory@4
_SbieDll_IsOpenClsid@12
_SbieDll_IsOpenCOM@0
_SbieDll_KillAll@8
_SbieDll_KillOne@4
_SbieDll_PortName@0
_SbieDll_QueueCreate@8
_SbieDll_QueueGetReq@24
_SbieDll_QueueGetRpl@16
_SbieDll_QueuePutReq@20
_SbieDll_QueuePutRpl@16
_SbieDll_RegisterDllCallback@4
_SbieDll_RunFromHome@16
_SbieDll_RunSandboxed@24
_SbieDll_StartBoxedService@8
_SbieDll_StartCOM@4
_SbieDll_StartSbieSvc@4
_SbieDll_TranslateNtToDosPath@4
_SbieDll_UpdateConf@20
SbieApi_ActivateLicense
SbieApi_CallOne
SbieApi_CallTwo
SbieApi_CallZero
SbieApi_CheckInternetAccess
SbieApi_DisableForceProcess
SbieApi_EnumBoxes
SbieApi_EnumProcessEx
SbieApi_GetFileName
SbieApi_GetHomePath
SbieApi_GetUnmountHive
SbieApi_GetVersion
SbieApi_GetWork
SbieApi_HookTramp
SbieApi_IsBoxEnabled
SbieApi_Log
SbieApi_LogEx
SbieApi_MonitorControl
SbieApi_MonitorGet
SbieApi_MonitorPut
SbieApi_OpenProcess
SbieApi_QueryBoxPath
SbieApi_QueryConf
SbieApi_QueryConfBool
SbieApi_QueryLicense
SbieApi_QueryPathList
SbieApi_QueryProcess
SbieApi_QueryProcessEx
SbieApi_QueryProcessInfo
SbieApi_QueryProcessPath
SbieApi_ReloadConf
SbieApi_SessionLeader
SbieApi_SetUserName
SbieDll_AssocQueryCommand
SbieDll_AssocQueryProgram
SbieDll_CallServer
SbieDll_ComCreateProxy
SbieDll_ComCreateStub
SbieDll_DeviceChange
SbieDll_DisableElevationHook
SbieDll_ExpandAndRunProgram
SbieDll_FormatMessage
SbieDll_FormatMessage0
SbieDll_FormatMessage1
SbieDll_FormatMessage2
SbieDll_FreeMem
SbieDll_GetDrivePath
SbieDll_GetHandlePath
SbieDll_GetLanguage
SbieDll_GetServiceRegistryValue
SbieDll_GetStartError
SbieDll_GetTokenElevationType
SbieDll_GetUserPathEx
SbieDll_Hook
SbieDll_InitPStore
SbieDll_IsBoxedService
SbieDll_IsDirectory
SbieDll_IsOpenClsid
SbieDll_IsOpenCOM
SbieDll_KillAll
SbieDll_KillOne
SbieDll_PortName
SbieDll_QueueCreate
SbieDll_QueueGetReq
SbieDll_QueueGetRpl
SbieDll_QueuePutReq
SbieDll_QueuePutRpl
SbieDll_RegisterDllCallback
SbieDll_RunFromHome
SbieDll_RunSandboxed
SbieDll_StartBoxedService
SbieDll_StartCOM
SbieDll_StartSbieSvc
SbieDll_TranslateNtToDosPath
SbieDll_UpdateConf

SbieDll.dll

Sandboxie by SANDBOXIE L.T.D (Signed)

Remove SbieDll.dll
Version:   4.06
MD5:   397ca5b91d5ec5277189d5ff1ab1b1e2
SHA1:   9147528923dc70b010dc9232f9f61f253a3fd5a7

Overview

sbiedll.dll is loaded as dynamic link library that runs in the context of a process. This is typically installed with the program Sandboxie 4.06 (64-bit) published by SANDBOXIE L.T.D. The file is digitally signed by SANDBOXIE L.T.D which was issued by the GlobalSign nv-sa certificate authority (CA).

DetailsDetails

File name:sbiedll.dll
Publisher:Sandboxie Holdings, LLC
Product name:Sandboxie
Description:Sandboxie User Mode DLL
Typical file path:C:\Program Files\sandboxie\sbiedll.dll
File version:4.06
Size:452.2 KB (463,048 bytes)
Build date:10/16/2013 7:07 AM
Certificate
Issued to:SANDBOXIE L.T.D
Authority (CA):GlobalSign nv-sa
Effective date:Wednesday, December 5, 2012
Expiration date:Saturday, March 7, 2015
Digital DNA
File packed:No
.NET CLR:No
More details

ResourcesPrograms

The following program will install this file
SANDBOXIE L.T.D
8% remove
Sandboxie runs your programs in an isolated space which prevents them from making permanent changes to other programs and data in your computer. Running your Web browser under the protection of Sandboxie means that all malicious software downloaded by the browser is trapped in the sandbox and can be discarded trivially. Browsing history, cookies, and cached temporary files collected while Web browsing stay in the sandbox and don't leak...

Windows OS versionsDistribution by Windows OS

OS versiondistribution
Windows 7 Home Premium 80.00%
Microsoft Windows XP 20.00%

Distribution by countryDistribution by country

United States installs about 80.00% of Sandboxie.

OEM distributionDistribution by PC manufacturer

PC Manufacturerdistribution
Hewlett-Packard 50.00%
ASUS 33.33%
GIGABYTE 16.67%
Should I remove It? Clean your PC of unwanted adware, toolbars and bloatware.

Download it for FREE