A signed and RequireAdministrator executable from a temporary folder?

I showed my executable as administrator:

<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"> 

    <!-- Disable Windows Vista UAC compatability heuristics -->
    <trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
        <security>
            <requestedPrivileges>
                <requestedExecutionLevel level="requireAdministrator" uiAccess="false"/>
            </requestedPrivileges>
        </security>
    </trustInfo> 
</assembly>

And then I signed it with a digital signature.

But then, when I launched the executable, I noticed something strange: the name of the executable in the Consent dialog box changed from PingWarning.exeto pinxxxx.tmp; as if a temporary copy was made and it starts:

alt text

I dug up Process Montior to find out if anyone creates a * .tmp file when I run my executable, and there is:

alt text

svchost Windows ""; .

: link text

, :

alt text


, , , requireAdministrator.

?


:

, , Uninformed.org 🕗:

, uiaccess, appinfo! RAiLaunchAdminProcess - . ( ) AppInfo! AiCheckSecureApplicationDirectory. , , appinfo! AiLaunchProcess . , - "" , ( , , ) "" .

- (, ) , "" .

- , uiaccess. uiAccess="false" . , :

.


:

MSDN:

SendSAS

uiAccess, true, Authenticode , . , . :

  • **\ **
  • **\windows\system32 **

, , , uiAccess, ; , uiAccess.

+5
1

, , NSIS InnoSetup ( , 1gb + % windir%\temp, permission.exe)

NSIS . , - @MS, -, UAC, . , , - :

Windows , , , ,

+2

All Articles