Hello,
I have Avast! Pro Anti-Virus installed (version 8.0.1483) and I am having trouble getting Opera 12.14 to run in the Avast Sandbox. Under settings, I go to the “Browser Integration” and beside Opera, I check “Run This Browser Sandboxed”.
Now when I start Opera, I get the following message:
“Opera has failed to access or upgrade your profile. This may have occurred because your computer has insufficient resources available or because some files are locked by other applications. You may have to restart your computer before Opera will start again.”
If I go back in to the settings and uncheck “Run This Browser Sandboxed”, then Opera starts just fine as usual. It looks like the Avast Sandbox is blocking access to something Opera needs to start running. However, I don’t know how to troubleshoot this. Can anyone please point me in the right direction?
Thanks in advance.
Edit: I just added the report file to see if this helps.
[General information] * file name: C:\Program Files (x86)\Opera\opera.exe * file length: 879456 bytes * SHA256 hash: 346a87484281163677b41005fb2187cce215e66bc3023bed5810276e9c043d92 * sandbox folder: \??\Volume{3ae08f59-3338-4965-931a-602237d13e08}\avast! sandbox\S-1-5-21-4247692304-1552584773-3354329327-1000\r33\opera.exe_{721ae437-98ba-11e2-a415-c86000c96981} * date: 29/03/2013, 20:56:35.618 * os: build 7601 (sp1) * runtime: 80.9s[Process information]
- load module: C:\Windows\System32\System32\ntdll.dll (Pid: 2036)
- load module: C:\Windows\System32\SysWOW64\ntdll.dll (Pid: 2036)
- load module: C:\Windows\System32\wow64.dll (Pid: 2036)
- load module: C:\Windows\System32\wow64win.dll (Pid: 2036)
- load module: C:\Windows\System32\wow64cpu.dll (Pid: 2036)
- load module: C:\Windows\System32\kernel32.dll (Pid: 2036)
- load module: C:\Windows\SysWOW64\kernel32.dll (Pid: 2036)
- load module: C:\Windows\System32\kernel32.dll (Pid: 2036)
- load module: C:\Windows\System32\user32.dll (Pid: 2036)
- load module: C:\Program Files\AVAST Software\Avast\snxhk.dll (Pid: 2036)
- load module: C:\Windows\SysWOW64\kernel32.dll (Pid: 2036)
- load module: C:\Windows\SysWOW64\KernelBase.dll (Pid: 2036)
- load module: C:\Windows\SysWOW64\psapi.dll (Pid: 2036)
- load module: C:\Windows\SysWOW64\wintrust.dll (Pid: 2036)
- load module: C:\Windows\SysWOW64\msvcrt.dll (Pid: 2036)
- load module: C:\Windows\SysWOW64\crypt32.dll (Pid: 2036)
- load module: C:\Windows\SysWOW64\msasn1.dll (Pid: 2036)
- load module: C:\Windows\SysWOW64\rpcrt4.dll (Pid: 2036)
- load module: C:\Windows\SysWOW64\sspicli.dll (Pid: 2036)
- load module: C:\Windows\SysWOW64\cryptbase.dll (Pid: 2036)
- load module: C:\Windows\SysWOW64\sechost.dll (Pid: 2036)
- load module: C:\Windows\SysWOW64\user32.dll (Pid: 2036)
- load module: C:\Windows\SysWOW64\gdi32.dll (Pid: 2036)
- load module: C:\Windows\SysWOW64\lpk.dll (Pid: 2036)
- load module: C:\Windows\SysWOW64\usp10.dll (Pid: 2036)
- load module: C:\Windows\SysWOW64\advapi32.dll (Pid: 2036)
- load module: C:\Windows\SysWOW64\shell32.dll (Pid: 2036)
- load module: C:\Windows\SysWOW64\shlwapi.dll (Pid: 2036)
- load module: C:\Windows\SysWOW64\ole32.dll (Pid: 2036)
- load module: C:\Windows\SysWOW64\imm32.dll (Pid: 2036)
- load module: C:\Windows\SysWOW64\msctf.dll (Pid: 2036)
- load module: C:\Windows\SysWOW64\uxtheme.dll (Pid: 2036)
- load module: C:\Program Files (x86)\Dexpot\hooxpot.dll (Pid: 2036)
- load module: C:\Windows\SysWOW64\HsSrv.dll (Pid: 2036)
- load module: C:\Windows\SysWOW64\winmm.dll (Pid: 2036)
- load module: C:\Windows\SysWOW64\dsound.dll (Pid: 2036)
- load module: C:\Windows\SysWOW64\powrprof.dll (Pid: 2036)
- load module: C:\Windows\SysWOW64\setupapi.dll (Pid: 2036)
- load module: C:\Windows\SysWOW64\cfgmgr32.dll (Pid: 2036)
- load module: C:\Windows\SysWOW64\oleaut32.dll (Pid: 2036)
- load module: C:\Windows\SysWOW64\devobj.dll (Pid: 2036)
- load module: C:\Windows\SysWOW64\version.dll (Pid: 2036)
- load module: C:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll (Pid: 2036)
- load module: C:\Windows\SysWOW64\dwmapi.dll (Pid: 2036)
- load module: C:\Program Files (x86)\Opera\opera.dll (Pid: 2036)
- load module: C:\Windows\SysWOW64\oleacc.dll (Pid: 2036)
- load module: C:\Windows\SysWOW64\msimg32.dll (Pid: 2036)
- load module: C:\Windows\SysWOW64\secur32.dll (Pid: 2036)
- load module: C:\Windows\SysWOW64\rasapi32.dll (Pid: 2036)
- load module: C:\Windows\SysWOW64\rasman.dll (Pid: 2036)
- load module: C:\Windows\SysWOW64\ws2_32.dll (Pid: 2036)
- load module: C:\Windows\SysWOW64\nsi.dll (Pid: 2036)
- load module: C:\Windows\SysWOW64\wsock32.dll (Pid: 2036)
- load module: C:\Windows\SysWOW64\comdlg32.dll (Pid: 2036)
- load module: C:\Windows\SysWOW64\IPHLPAPI.DLL (Pid: 2036)
- load module: C:\Windows\SysWOW64\winnsi.dll (Pid: 2036)
- load module: C:\Windows\SysWOW64\shell32.dll (Pid: 2036)
- load module: C:\Windows\SysWOW64\ole32.dll (Pid: 2036)
[Changes to filesystem]
- none
[Dropped files]
- none
[Changes to registry]
- none
[Changes to Object Manager]
- opens event : \Sessions\1\BaseNamedObjects\HookSwitchHookEnabledEvent
- creates mutex : \Sessions\1\BaseNamedObjects\Local\DirectSound DllMain mutex (0x000007F4)
- creates section: \Sessions\1\BaseNamedObjects\Opera_2036_0
- opens mutex : \Sessions\1\BaseNamedObjects\OperaProcessesListGuard
[Network services]
- none
[Other information]
- NtWriteVirtualMemory: attempt to modify other process address space (pid: 0x7f4, pname: “opera.exe”, bufferLen: 8, buffer: “0000180000000000”)
- NtWriteVirtualMemory: attempt to modify other process address space (pid: 0x7f4, pname: “opera.exe”, bufferLen: 8, buffer: “0000240000000000”)
- NtWriteVirtualMemory: attempt to modify other process address space (pid: 0x7f4, pname: “opera.exe”, bufferLen: 8, buffer: “0000260000000000”)
- CoCreateInstanceEx: CLSID {00480048-0000-0000-60cc-2c10a0f8ffff}, name: Memory Mapped Cache Mgr, flags: 0x1
- NtWriteVirtualMemory: attempt to modify other process address space (pid: 0x7f4, pname: “opera.exe”, bufferLen: 8, buffer: “0000250000000000”)