How effective - or ineffective - would it be to use SRP execution blocking with an admin account? Let's say you have a computer set up with only C:\Windows and C:\Program Files executable. Someone has compromised an application on that system, and is now forcing said application to run arbitrary code. There's nothing to keep them from getting a list of executable directories and doing a chdir() (or equivalent) into one, right? So this is probably not secure against a human intruder. But what about malware? How many malware droppers out there are capable of seeking out an executable directory and installing from there? If the answer is "not many", then I wonder if SRP as admin could be useful as a stopgap measure of sorts - something to use as an adjunct to other methods, in case of zero-day exploits or such. Does this make sense, or is the idea worthless in practice?