Command line overrriding through packaging options and API. New version also features managed files visibility and file selection priority which helps solving file name conflicts.
Embeddable application virtualization engine for Windows. Demo version is available on request.
We offer MoleBox integration service and custom development based on MoleBox virtualization technology. Learn more
MoleBox SDK Features
- Full control over the virtualization core initialization. MoleBox SDK may be loaded any time with a range of options. This allows delaying SDK initialization until the user makes certain actions, and controlling its functionality like enabling or disabling virtual registry, etc.
- Full control over packages loading/unloading time and order. Moleboxed packages can be loaded automatically or explicitly, from any location.
- Support for appended packages. MoleBox wrapper can append packages to an unpacked main executable. The resulting single executable file offers all benefits of standalone executable, but does not look like a packed application but, protecting the developer from inaccurate detections from malware scanners.
- Support for custom package formats. Developers may use their own package creators to achieve better data secutiry or better compression ratio.
Virtual file system and environment features
- Creating and managing application-specific virtual environment. This virtual environment may contain external files, registry entries, environment variables, and may be loaded and unloaded package by package from the host application anytime. The host application will think that all elements of the environment are physically installed and can access them with usual functions.
- No modifications to the host device file system and environment. Virtual packages are used wihtout extracting files, creating temporary files, changes to registry or environment variables on the host device.
- Encapsulating additional executable files, DLLs, ActiveX and .NET components, various runtimes. Integrated binaries are used by the host application without extracting on the disk or registration. Such binaries may be hidden from 3rd party applications and unauthorized user access.
- Using applications and components without conflicts. Due to virtual environment isolation, you may use different versions of applications and components on the same host device without compatibility issues.
- Protecting packed binary and data files from unauthorized access. Integrated files are hidden and cannot be viewed, analized, used or modified by end-user or 3rd party software.
- Protection from false AV alerts. The main executable is not packed and won't get much attention from malware scanners. Other binaries are hidden and would be invisible for static anlyzis methods.