sandboxie-plus / Sandboxie

Sandboxie Plus & Classic
https://Sandboxie-Plus.com
GNU General Public License v3.0
13.72k stars 1.53k forks source link

Failed to start Alibaba Dingtalk #4295

Open cxw620 opened 6 days ago

cxw620 commented 6 days ago

Describe what you noticed and did

Once "HideNetworkAdapterMAC=y" or "HideDiskSerialNumber=y", I cannot start the APP or it crashes immediately, and the other settings did not have the same effect.

How often did you encounter it so far?

No response

Expected behavior

Normally start the app

Affected program

Dingtalk

Download link

https://www.dingtalk.com/download#/

Where is the program located?

The program is installed only inside a sandbox (NOT in the real system anyway).

Did the program or any related process close unexpectedly?

Yes, it did, but no .dmp file has been created in the system.

Crash dump

No response

What version of Sandboxie are you running now?

Sandboxie-Plus Version 1.14.10

Is it a new installation of Sandboxie?

I have been using the same version for some time.

Is it a regression from previous versions?

No response

In which sandbox type you have this problem?

In a hardened sandbox with data protection (red sandbox icon).

Can you reproduce this problem on a new empty sandbox?

I can confirm it also on a new empty sandbox.

What is your Windows edition and version?

Windows 11 Pro Workstation 24H2

In which Windows account you have this problem?

A local account (Administrator).

Please mention any installed security software

Kaspersky Plus 21.18.5.438

Did you previously enable some security policy settings outside Sandboxie?

No response

Trace log

No response

Sandboxie.ini configuration

#
# Sandboxie configuration file
#

[GlobalSettings]
Template=Edge_Fix
Template=Kaspersky
Template=OfficeClickToRun
Template=OfficeLicensing
Template=WindowsLive
Template=WindowsRasMan
DefaultBox=DefaultBox
FileRootPath=D:\SandBoxieData\Sandbox\%USER%\%SANDBOX%
KeyRootPath=\REGISTRY\USER\Sandbox_%USER%_%SANDBOX%
IpcRootPath=\Sandbox\%USER%\%SANDBOX%\Session_%SESSION%
RamDiskSizeKb=2097152
NetworkEnableWFP=y
SandboxieLogon=y
MonitorStackTrace=n

[UserSettings_175602F0]
SbieCtrl_AutoStartAgent=SandMan.exe -autorun
SbieCtrl_EnableAutoStart=y
BoxGrouping=:BaiduPan,DefaultBox,Dingtalk

[BaiduPan]
Enabled=y
BlockNetworkFiles=y
RecoverFolder=%{374DE290-123F-4565-9164-39C4925E467B}%
RecoverFolder=%Personal%
RecoverFolder=%Desktop%
BorderColor=#0423ee,ttl,1
Template=OpenBluetooth
Template=SkipHook
Template=FileCopy
Template=qWave
Template=BlockPorts
Template=LingerPrograms
Template=AutoRecoverIgnore
Template=LessConfidentialBox
Template=BlockAccessWMI
Template=BlockDNS
ConfigLevel=10
UsePrivacyMode=y
UseSecurityMode=y
UseFileDeleteV2=y
UseRegDeleteV2=y
UseVolumeSerialNumbers=y
FakeAdminRights=y
CopyLimitKb=8192000
NotifyDirectDiskAccess=y
NeverRemove=y
BoxNameTitle=-
HideDiskSerialNumber=y
HideNetworkAdapterMAC=y
HideNonSystemProcesses=y
DnsTrace=y
OpenPipePath=C:\Users\Hantong\Downloads
OpenPipePath=D:\SandBoxieData\Public
OpenPipePath=F:\
OpenPipePath=E:\CryptoFiles
OpenPipePath=D:\ASUS_RE_TUF_GAMING_A14_HX370.swm
OpenPipePath=E:\Resource[SyncTarget]
NotifyNoCopy=y
NotifyBoxProtected=y
DropAdminRights=y
FileTrace=*
PipeTrace=*
KeyTrace=*
IpcTrace=*
GuiTrace=*
ClsidTrace=*
NetFwTrace=*
ApiTrace=y
ProtectHostImages=y
AllowBoxedJobs=y
NeverDelete=y
HideFirmwareInfo=y
NotifyProcessAccessDenied=y
RandomRegUID=y
OpenWinClass=#
NetworkUseProxy=*,Address=127.0.0.1;Port=10423;Auth=No;Bypass=

[DefaultBox]
Enabled=y
BlockNetworkFiles=y
RecoverFolder=%{374DE290-123F-4565-9164-39C4925E467B}%
RecoverFolder=%Personal%
RecoverFolder=%Desktop%
BorderColor=#00FFFF,ttl
Template=OpenBluetooth
Template=SkipHook
Template=FileCopy
Template=qWave
Template=BlockPorts
Template=LingerPrograms
Template=AutoRecoverIgnore
ConfigLevel=10

[Dingtalk]
Enabled=y
BlockNetworkFiles=y
RecoverFolder=%{374DE290-123F-4565-9164-39C4925E467B}%
RecoverFolder=%Personal%
RecoverFolder=%Desktop%
BorderColor=#0423ee,ttl,1
Template=OpenBluetooth
Template=SkipHook
Template=FileCopy
Template=qWave
Template=BlockPorts
Template=LingerPrograms
Template=AutoRecoverIgnore
Template=LessConfidentialBox
Template=BlockDNS
Template=BlockAccessWMI
ConfigLevel=10
UsePrivacyMode=y
UseSecurityMode=y
UseFileDeleteV2=y
UseRegDeleteV2=y
UseVolumeSerialNumbers=y
CopyLimitKb=8192000
NotifyDirectDiskAccess=y
BoxNameTitle=-
HideNonSystemProcesses=y
DnsTrace=y
OpenPipePath=C:\Users\Hantong\Downloads
OpenPipePath=D:\SandBoxieData\Public
OpenPipePath=F:\
OpenPipePath=E:\CryptoFiles
OpenPipePath=D:\ASUS_RE_TUF_GAMING_A14_HX370.swm
OpenPipePath=E:\Resource[SyncTarget]
NotifyNoCopy=y
NotifyBoxProtected=y
DropAdminRights=y
FileTrace=*
PipeTrace=*
KeyTrace=*
IpcTrace=*
GuiTrace=*
ClsidTrace=*
NetFwTrace=*
ApiTrace=y
ProtectHostImages=y
AllowBoxedJobs=y
NotifyProcessAccessDenied=y
OpenWinClass=#
NetworkUseProxy=*,Address=127.0.0.1;Port=10423;Auth=No;Bypass=
InjectDll=\addons\SbieHide\SbieHide.x86.dll
InjectDll64=\addons\SbieHide\SbieHide.x64.dll
DebugTrace=y
RandomRegUID=y
HideFirmwareInfo=y
bastik-1001 commented 6 days ago

Did it work with a previous version of Sandboxie with the same settings? If so, which version?

cxw620 commented 6 days ago

Did it work with a previous version of Sandboxie with the same settings? If so, which version?

v1.14.9 also tested and does't work, too.

bastik-1001 commented 5 days ago

This might be related to how HideNetworkAdapterMAC works. This will be investigated further.