Hi. I was trying to practice some malware removal today by running malware samples inside a VM (Virtualbox) on an XP Pro guest OS (no antivirus, etc. installed). Anyway, after trying several strains of conficker, vundo/virtumonde, and virut, I can't seem to infect the VM! I mean, I know the software is running (some executables did say "not a valid win32 application", but the others didn't), because I can observe the rootkit portion of the malware hiding the executable after being run. BUT, process explorer, autoruns, etc. are not showing anything! I have ran like 6 different rootkit scanning tools, and I can find NOTHING, which leads me to believe the malware is sensing the presence of a VM and either terminating or just not working the way it should. And I think I'm being very thorough, checking and verifying all loaded drivers, svchost processes, etc. Is there any way around this? I mean, should I just switch virtualization platforms from virtualbox to VMware or something else? Is there any way around this? I don't want to start infecting real machines, because it takes way longer to restore them to default than it does reverting to a snapshot on a VM. Help a noob out here.