I phrased those previous points specifically to test the baseline understanding of OS trust models in this thread, and you took the bait exactly as expected.
By positing a 'theoretical' configuration of SAC and stating the obvious, that a modified DLL unknown to MS cloud will be blocked, I was stress-testing whether this discussion was actually accounting for the environmental reality of the attack vector, or just reciting Microsoft documentation.
You passed the architectural test, but you completely missed the environmental context. Yes, SAC blocks unknown DLLs. Yes, the initial .exe might be signed. But look at the vector we are analyzing: PiviGames. This is a game piracy infection chain. In the real world, what is the very first thing users do when they download a cracked game or keygen? They intentionally disable Smart App Control and Windows Defender because cracks are inherently flagged by UMCI.
The attackers don't care that MS cloud blocks unknown DLLs, because they rely on the social engineering of the piracy ecosystem to get the user to drop their own shields. I wanted to see if anyone here would bridge the gap between OS architecture and human behavior. Your advice to check the .exe properties remains dangerous precisely because it gives a false sense of security to users operating in degraded, self-compromised environments.