2011-08-28 18:16:53 C:\Documents and Settings\Roger\桌面\virus\clickme\readme.exe Sandboxed As Partially Limited
2011-08-28 18:16:58 C:\Documents and Settings\Roger\桌面\virus\clickme\readme.exe Modify File C:\Documents and Settings\Roger\Local Settings\Temp\gcfscqcqfprfsmnc.exe
2011-08-28 18:17:03 C:\DOCUME~1\Roger\LOCALS~1\Temp\gcfscqcqfprfsmnc.exe Sandboxed As Partially Limited
2011-08-28 18:17:03 C:\Documents and Settings\Roger\Local Settings\Temp\gcfscqcqfprfsmnc.exe Modify Key HKLM\SYSTEM\ControlSet001\Services\Micorsoft Windows Service
I would like to know if the malware is active in ram? I ask because have left-over that won’t do any damage. Did the malware start after you restarted?
malware also uses commando like svchost.exe in order to achieve it’s goal, which means that commandos such as svchost.exe are used in malicious way but the aren’t malicious themselves.
when you see that something is flagged as Modify key it means that the program tries to modify the certain key but fails
2011-08-31 01:14:57 C:\Documents and Settings\Roger\桌面\virus\clickme\contacts1.exe Sandboxed As Partially Limited
2011-08-31 01:15:06 C:\Documents and Settings\Roger\桌面\virus\clickme\contacts1.exe Modify File C:\Documents and Settings\Roger\Local Settings\Temp\gcfscqcqfprfsmnc.exe
2011-08-31 01:15:08 C:\DOCUME~1\Roger\LOCALS~1\Temp\gcfscqcqfprfsmnc.exe Sandboxed As Partially Limited
2011-08-31 01:15:16 C:\Documents and Settings\Roger\Local Settings\Temp\gcfscqcqfprfsmnc.exe Modify Key HKLM\SYSTEM\ControlSet001\Services\Micorsoft Windows Service
I double clicked on the autoruns.exe, then checked the registry values
From “Introduction to the sandbox” in the forum;
Automatic sandboxing does not virtualise software Files and registry keys created by the software are NOT stored in a separate place on your hard disk. (Instead, to protect system integrity, the sandboxed program is prevented from writing to protected folders, pre-existing files, and registry keys…
So those startup directory and resgistry keys should not be changed in the first instant.
By the way, I think a256886572008 already show very clearly in his first post that where is the bypass. The question is whether it can be duplicated by Comodo.
So you can not sandbox anything if you don’t allow virtual changes because you will get error messages, if after restart the changes remain, is a fail, if after restart the computer is clean comodo sandbox is doing it’s job
What are you talking about? It is written in Comodo’s Sandbox and D+ Help forum that Automatic sandboxing does not virtualise software Files and registry keys created by the software