1. What actually happened or you saw:
Many legitimate Windows Processes and Tools from Microsoft can be exploited to attack a system, because they accept command line parameters or can be exploited through Fileless Scripts.
2. What you wanted to happen or see:
I wanted Comodo to include most, or all vulnerable processes in this picture (Click to enlarge) in the Script Analysis List.
3. Why you think it is desirable:
Allows advanced users to further extend Comodo’s protection capabilities.
4. Any other information:
Credits to Malwaretips Forum member AtlBo for this extended process list image.
Another process that could be included is wmic.exe which is exploited by the Astaroth Fileless Malware.