Thanks for this great piece of software. I am a security researcher and I have been using your product for a number of years for researching/reversing/analyzing malware. I have a swarm of 12 automated honey pots which spider around the net collecting viri/trojan/rootkit. Your sandbox is running on all of the servers.
![Smile :)](images/smilies/icon_smile.gif)
Anyway I have some suggestions for you to consider:
1.) I would like to be able to block specific ntoskrnl and win32k system calls. It would be great if I could add something like this into the INI:
Block_SysCall 0x121b, 0xbf, 0x184
2.) Some of my honey pots are running a custom 'Windows Embedded' based on the XP kernel. It would be great if SandBoxie patched KiUserExceptionDispatcher and verified the exception chain. This would be analogous to the Microsoft SEHOP implementation in >= Vista operating systems.
I have a few more ideas but most of them can be accomplished with your SBIE DLL API.
Thanks for listening.
![Smile :)](images/smilies/icon_smile.gif)
-MessageBoxA