Slightly modified version of SandboxEscaper's ALPC-TaskSched-LPE exploit.
The following changes are added:
-
logging to C:\Users\Public\Documents\alpc.log - for easier debugging
-
payload DLL is loaded from C:\Users\Public\Documents\elev.dll, not from resources - allows for easier changing of payload, without the need to rebuild or manipulate DLL's resources