If you want proper exploit protection, run chrome in sandbox, because of fileless exploits, if you are concerned about them.
COMODO HIPS, if you have it enabled, does trigger a prompt when a trusted app tries to execute another process. But it will not monitor the actions of a trusted process, such as chrome. So it might see the exploit as Chrome, and not block its actions.
Furthermore, HIPS allows system processes to execute another (trusted) process without triggering a prompt -- although the actions of that second process will trigger a prompt.
In short, the default HIPS settings will not provide full exploit protection.
Another option: You can set up COMODO HIPS to alert for any vulnerable processes that you might be concerned about, such as the two cmd.exe processes, for instance. Just mark that process as "unknown", and make an "ignore" rule for it in sandbox. (You only need to make the ignore rule if you are in proactive config).
This way, you will get a HIPS alert every time the process executes, because it is "unknown", and you can then whitelist the command line strings you need, when you get the prompt for it.
A third option: you can make "block" rules in autosandbox for processes such as powershell, wscript, etc. These rules support wildcards, such as C:\*\powershell*.exe