I showed my executable as administrator:
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges>
<requestedExecutionLevel level="requireAdministrator" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
And then I signed it with a digital signature.
But then, when I launched the executable, I noticed something strange: the name of the executable in the Consent dialog box changed from PingWarning.exeto pinxxxx.tmp; as if a temporary copy was made and it starts:

I dug up Process Montior to find out if anyone creates a * .tmp file when I run my executable, and there is:

svchost Windows ""; .
:

, :

, , , requireAdministrator.
?
:
, , Uninformed.org 🕗:
, uiaccess, appinfo! RAiLaunchAdminProcess - . ( ) AppInfo! AiCheckSecureApplicationDirectory. , , appinfo! AiLaunchProcess . , - "" , ( , , ) "" .
- (, ) , "" .
- , uiaccess. uiAccess="false" . , :
.
:
MSDN:
SendSAS
uiAccess, true, Authenticode , . , . :
- **\ **
- **\windows\system32 **
, , , uiAccess, ; , uiAccess.