Anecdotal, but it seems like Comodo's signatures are working well. I noticed a scheduled scan detected "TrojWare.JS.Agent.PD@300743807" in Chrome cache. I uploaded extracted .js from stream to VT and Comodo is the only one detecting it-
https://www.virustotal.com/en/file/...e7ddafb104c3ba077ca6fbfe/analysis/1430055611/
Shortly before scheduled scan, I had some weird bitcoin pop-up window (I think the first pop-up I have seen in years) and I'm fairly certain it is related to that. I will upload the javascript from the cache stream file to malware section, maybe its unrelated FP, but the timing seems right. Its kind of concerning this couldn't be blocked in real-time, but I guess that is lack of web shield. I'm not sure what the .js did, but is it an example of something that auto-sandbox, HIPS, etc. can't block? I guess real-time AV is not considering cache files or has some issue with streams b/c archived?
Hopefully this did nothing beyond cache...