In mid October I reported (twice) on the Beta Bug sub-forum a sandbox issue which sadly has continued in this build.
1). The sandbox was enabled.
2). A malicious file was constructed that when run would take a listing of all other files that exist in a specific directory (the Downloads directory for this test file) and delete them all.
3). When the parent malware is run it was isolated in the sandbox, but would spawn a payload daughter into (Virtual) temp. The payload would run as indicated above- all files in the original directory would be inventoried and deleted.
Note that this process is stopped by the Comodo 7 sandbox as well as Sandboxie and the Qihoo on-demand sandbox. As this file can be easily re-coded to delete files in other directories, it should no longer be ignored as inconsequential.