Description: After a copy of the desired access token is made,the only thing that is to be done is to exchange the original value of the Token field with the address of the new token.The process will have the same access rights as the victim.
To Search:
File list (Check if you may need any files):
Access token stealing on Windows.txt