The problem is that most of the malware runs in user mode (as normal or administrator user). Sandbox based on virtualization, running the Windows API calls and system calls in user mode. System calls or function capturing the interactions between a program and its environment (for example, when files are read, registry keys are written and generates network traffic). But generally, the sandbox can not locate everything that happens between the system calls so some malware can go in this out - of - control zone substantially by evading the sandbox.