Author Topic: Help getting Opera browser running in Avast Sandbox  (Read 3776 times)

0 Members and 1 Guest are viewing this topic.

Francisw19

  • Guest
Help getting Opera browser running in Avast Sandbox
« on: March 30, 2013, 03:58:41 AM »
Hello,

I have Avast! Pro Anti-Virus installed (version 8.0.1483) and I am having trouble getting Opera 12.14 to run in the Avast Sandbox.  Under settings, I go to the "Browser Integration" and beside Opera, I check "Run This Browser Sandboxed".

Now when I start Opera, I get the following message:

"Opera has failed to access or upgrade your profile.  This may have occurred because your computer has insufficient resources available or because some files are locked by other applications.  You may have to restart your computer before Opera will start again."

If I go back in to the settings and uncheck "Run This Browser Sandboxed", then Opera starts just fine as usual.  It looks like the Avast Sandbox is blocking access to something Opera needs to start running.  However, I don't know how to troubleshoot this.  Can anyone please point me in the right direction?

Thanks in advance. :)

----

Edit: I just added the report file to see if this helps.

Quote
[General information]
  * file name: C:\Program Files (x86)\Opera\opera.exe
  * file length: 879456 bytes
  * SHA256 hash: 346a87484281163677b41005fb2187cce215e66bc3023bed5810276e9c043d92
  * sandbox folder: \??\Volume{3ae08f59-3338-4965-931a-602237d13e08}\avast! sandbox\S-1-5-21-4247692304-1552584773-3354329327-1000\r33\opera.exe_{721ae437-98ba-11e2-a415-c86000c96981}
  * date: 29/03/2013, 20:56:35.618
  * os: build 7601 (sp1)
  * runtime: 80.9s

[Process information]
  * load module: C:\Windows\System32\System32\ntdll.dll (Pid: 2036)
  * load module: C:\Windows\System32\SysWOW64\ntdll.dll (Pid: 2036)
  * load module: C:\Windows\System32\wow64.dll (Pid: 2036)
  * load module: C:\Windows\System32\wow64win.dll (Pid: 2036)
  * load module: C:\Windows\System32\wow64cpu.dll (Pid: 2036)
  * load module: C:\Windows\System32\kernel32.dll (Pid: 2036)
  * load module: C:\Windows\SysWOW64\kernel32.dll (Pid: 2036)
  * load module: C:\Windows\System32\kernel32.dll (Pid: 2036)
  * load module: C:\Windows\System32\user32.dll (Pid: 2036)
  * load module: C:\Program Files\AVAST Software\Avast\snxhk.dll (Pid: 2036)
  * load module: C:\Windows\SysWOW64\kernel32.dll (Pid: 2036)
  * load module: C:\Windows\SysWOW64\KernelBase.dll (Pid: 2036)
  * load module: C:\Windows\SysWOW64\psapi.dll (Pid: 2036)
  * load module: C:\Windows\SysWOW64\wintrust.dll (Pid: 2036)
  * load module: C:\Windows\SysWOW64\msvcrt.dll (Pid: 2036)
  * load module: C:\Windows\SysWOW64\crypt32.dll (Pid: 2036)
  * load module: C:\Windows\SysWOW64\msasn1.dll (Pid: 2036)
  * load module: C:\Windows\SysWOW64\rpcrt4.dll (Pid: 2036)
  * load module: C:\Windows\SysWOW64\sspicli.dll (Pid: 2036)
  * load module: C:\Windows\SysWOW64\cryptbase.dll (Pid: 2036)
  * load module: C:\Windows\SysWOW64\sechost.dll (Pid: 2036)
  * load module: C:\Windows\SysWOW64\user32.dll (Pid: 2036)
  * load module: C:\Windows\SysWOW64\gdi32.dll (Pid: 2036)
  * load module: C:\Windows\SysWOW64\lpk.dll (Pid: 2036)
  * load module: C:\Windows\SysWOW64\usp10.dll (Pid: 2036)
  * load module: C:\Windows\SysWOW64\advapi32.dll (Pid: 2036)
  * load module: C:\Windows\SysWOW64\shell32.dll (Pid: 2036)
  * load module: C:\Windows\SysWOW64\shlwapi.dll (Pid: 2036)
  * load module: C:\Windows\SysWOW64\ole32.dll (Pid: 2036)
  * load module: C:\Windows\SysWOW64\imm32.dll (Pid: 2036)
  * load module: C:\Windows\SysWOW64\msctf.dll (Pid: 2036)
  * load module: C:\Windows\SysWOW64\uxtheme.dll (Pid: 2036)
  * load module: C:\Program Files (x86)\Dexpot\hooxpot.dll (Pid: 2036)
  * load module: C:\Windows\SysWOW64\HsSrv.dll (Pid: 2036)
  * load module: C:\Windows\SysWOW64\winmm.dll (Pid: 2036)
  * load module: C:\Windows\SysWOW64\dsound.dll (Pid: 2036)
  * load module: C:\Windows\SysWOW64\powrprof.dll (Pid: 2036)
  * load module: C:\Windows\SysWOW64\setupapi.dll (Pid: 2036)
  * load module: C:\Windows\SysWOW64\cfgmgr32.dll (Pid: 2036)
  * load module: C:\Windows\SysWOW64\oleaut32.dll (Pid: 2036)
  * load module: C:\Windows\SysWOW64\devobj.dll (Pid: 2036)
  * load module: C:\Windows\SysWOW64\version.dll (Pid: 2036)
  * load module: C:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll (Pid: 2036)
  * load module: C:\Windows\SysWOW64\dwmapi.dll (Pid: 2036)
  * load module: C:\Program Files (x86)\Opera\opera.dll (Pid: 2036)
  * load module: C:\Windows\SysWOW64\oleacc.dll (Pid: 2036)
  * load module: C:\Windows\SysWOW64\msimg32.dll (Pid: 2036)
  * load module: C:\Windows\SysWOW64\secur32.dll (Pid: 2036)
  * load module: C:\Windows\SysWOW64\rasapi32.dll (Pid: 2036)
  * load module: C:\Windows\SysWOW64\rasman.dll (Pid: 2036)
  * load module: C:\Windows\SysWOW64\ws2_32.dll (Pid: 2036)
  * load module: C:\Windows\SysWOW64\nsi.dll (Pid: 2036)
  * load module: C:\Windows\SysWOW64\wsock32.dll (Pid: 2036)
  * load module: C:\Windows\SysWOW64\comdlg32.dll (Pid: 2036)
  * load module: C:\Windows\SysWOW64\IPHLPAPI.DLL (Pid: 2036)
  * load module: C:\Windows\SysWOW64\winnsi.dll (Pid: 2036)
  * load module: C:\Windows\SysWOW64\shell32.dll (Pid: 2036)
  * load module: C:\Windows\SysWOW64\ole32.dll (Pid: 2036)

[Changes to filesystem]
  * none

[Dropped files]
  * none

[Changes to registry]
  * none

[Changes to Object Manager]
  *   opens event  : \Sessions\1\BaseNamedObjects\HookSwitchHookEnabledEvent
  * creates mutex  : \Sessions\1\BaseNamedObjects\Local\DirectSound DllMain mutex (0x000007F4)
  * creates section: \Sessions\1\BaseNamedObjects\Opera_2036_0
  *   opens mutex  : \Sessions\1\BaseNamedObjects\OperaProcessesListGuard

[Network services]
  * none

[Other information]
  * NtWriteVirtualMemory: attempt to modify other process address space (pid: 0x7f4, pname: "opera.exe", bufferLen: 8, buffer: "0000180000000000")
  * NtWriteVirtualMemory: attempt to modify other process address space (pid: 0x7f4, pname: "opera.exe", bufferLen: 8, buffer: "0000240000000000")
  * NtWriteVirtualMemory: attempt to modify other process address space (pid: 0x7f4, pname: "opera.exe", bufferLen: 8, buffer: "0000260000000000")
  * CoCreateInstanceEx: CLSID {00480048-0000-0000-60cc-2c10a0f8ffff}, name: Memory Mapped Cache Mgr, flags: 0x1
  * NtWriteVirtualMemory: attempt to modify other process address space (pid: 0x7f4, pname: "opera.exe", bufferLen: 8, buffer: "0000250000000000")
« Last Edit: March 30, 2013, 04:01:57 AM by Francisw19 »

Francisw19

  • Guest
Re: Help getting Opera browser running in Avast Sandbox
« Reply #1 on: March 30, 2013, 05:25:30 PM »
I just wanted to post an update.  I got this working now!

To allow the browser to start, go to Tools -> Sandbox -> Settings.  Go to Privacy.  Under the "User-Defined Locations" set "C:\User\<User Name>\AppData\Roaming\Opera\*" to Allowed.

With that, the browser runs just fine! I hope this helps anyone having the same issue. :D