ShimBad the Sailor, Part 3
嗯,用户让我用中文总结一下这篇文章的内容,控制在100个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头。直接写文章描述即可。 首先,我需要通读文章,抓住主要信息。文章主要讲的是Windows 11引入了新的Shim相关功能。Shim数据库新增了两个进程名称:SdbMergeTestEntry_Added_Exe_Item.exe和SdbMergeTestEntry_Added_Exe_Item_InboxApp.exe。当运行这些程序时,会显示特定的消息。 此外,Windows 11的二进制文件处理Shim时引用了一些文件夹路径,比如%windir%\apppatch\AcPluginDlls\Plugin及其子目录。这些路径下有测试用的AcPluginDlls插件,如AcPlugin_Test.dll和AcPlugin_Test2.dll。这些插件可能被用于持久性和隐蔽代码注入。 相关的系统库包括apphelp.dll、pcasvc.dll和appraiser.dll,但作者尚未详细研究它们的工作机制。 总结起来,文章介绍了Windows 11在Shim数据库方面的增强,新增了进程名称和插件路径,并提到了可能的安全应用。 接下来,我需要将这些信息浓缩到100字以内,并且直接描述内容。确保涵盖新增进程、插件路径、相关系统库以及潜在的安全用途。 </think> Windows 11引入了新的Shim功能,新增了两个特殊进程名称,并扩展了与插件相关的文件夹路径。这些更新可能为持久性和隐蔽代码注入提供了潜在机制。 2026-2-26 01:16:0 Author: www.hexacorn.com(查看原文) 阅读量:16 收藏

Windows 11 brings us a lot of new Shim-related goodies and it makes sense to cover at least some of them.

In the second part of this series I listed a number of process names that are treated in a special way by the existing shim database entries.

It turns out that the list of these process names has been extended by at least two:

  • SdbMergeTestEntry_Added_Exe_Item.exe
  • SdbMergeTestEntry_Added_Exe_Item_InboxApp.exe

In other words, when you run a program that is named like the two aforementioned entries, you will get these messages:

Additionally, Windows 11 binaries handling shims include references to a list of folders that may be of some interest:

  • %windir%\apppatch\AcPluginDlls\Plugin
  • %windir%\apppatch\AcPluginDlls\PluginWow
  • %windir%\apppatch\AcPluginDlls\PluginWowAMD64
  • %windir%\apppatch\AcPluginDlls\PluginWowARM
  • %windir%\apppatch\AcPluginDlls\PluginWowARM64
  • %windir%\apppatch\AcPluginDlls\PluginWowX86

The Windows 11 installations I saw so far include these test Ac plugins:

  • c:\WINDOWS\apppatch\AcPluginDlls\Plugin\AcPlugin_Test.dll
  • c:\WINDOWS\apppatch\AcPluginDlls\Plugin\AcPlugin_Test2.dll
  • c:\WINDOWS\apppatch\AcPluginDlls\PluginWowX86\AcPlugin_Test.dll
  • c:\WINDOWS\apppatch\AcPluginDlls\PluginWowX86\AcPlugin_Test2.dll

The code referencing these directories resides in a few system libraries:

  • apphelp.dll
  • pcasvc.dll
  • appraiser.dll

but I have not explored yet how they work. As of now, I assume this is a lesser-known Shim Database enhancement mechanism that could be potentially leveraged for persistence and stealth code injection…


文章来源: https://www.hexacorn.com/blog/2026/02/26/shimbad-the-sailor-part-3/
如有侵权请联系:admin#unsafe.sh