Hi,
thank you for your work!
The exploit does not elevate privileges on Windows build 19042.746
I tried to inject into explorer.exe for the last step and that does work for spawning the cmd, also all the steps before the injection do work. Injecting into winlogon.exe did not work as the privileges are not sufficient I guess.
But once the cmd got spawned it has the context of the executing user and not system.
What could be done to debug this or add functionality for Windows build 19042.746 ?
Many thanks