Just another UAC bypass using auto-elevated COM object Virtual Factory for DiagCpl (12C21EA7-2EB8-4B55-9249-AC243DA8C666). This COM object can be used to create instance of DiagnosticProfile (D0B7E02C-E1A3-11DC-81FF-001185AE5E76) COM object which exposes SaveDirectoryAsCab method that can be used to move arbitrary file in system32 directory. This PoC copy user specified dll to C:\Windows\System32\wow64log.dll and trigger MicrosoftEdgeUpdate service by creating instance of Microsoft Edge Update Legacy On Demand COM object (A6B716CB-028B-404D-B72C-50E153DD68DA) which run in SYSTEM context and will load wow64log.dll (more info here).
This PoC is inspired by this awesome research from @zcgonvh