Bypass UAC elevation on Windows 8 (build 9600) & above. Uses environment variable to execute privileged shell under svchost.exe via schtasks.exe through exploiting DiskCleanup elevated task. Opens the User SID registry and overwrites %WINDIR%. This is trinado's method of elavating UAC, it is now widely detected due to common use. This Visual Studio project will create static x86 & x64 binaries for assessment purposes.
These files are available under a Attribution-NonCommercial-NoDerivatives 4.0 International license.