(3) Then it created the usp10.dll in many locations.
(4) ci72.png showed many usp10.dll in the list.
3.Problem:
If I run any application(trusted) beside the usp10.dll, the application will load the usp10.dll.
(CIS did not sandbox the trusted applications which load the usp10.dll.)
Then, the application executes a malware (comodo popups sandbox alerts)
2013-02-26 11:40:38 C:\DOCUME~1\Roger\LOCALS~1\Temp\09d6340.tmp Sandboxed As Partially Limited
2013-02-26 11:40:50 C:\Documents and Settings\Roger\Local Settings\Temp\Jn2SEVH1.pif Create Process, Block File C:\Documents and Settings\Roger\Local Settings\Temp\TuxYwz569.exe
OK that’;s what I thought, R. Confirms that the new COM restrictions (except perhaps trusted DLL preference) are not in place yet, which is what my testing has indicated
I found same malware in “style-chart.com” (different malware “topbohum.co.kr”)
Some Comodo user’s Windows was brocken by this malware.
My friend used Avast+Comodo Firewall. But his Windows OS was brocken too. ;D ;D