If you are not new to rootkits, then you are probably not new to privilege escalation exploits. This is often accomplished by exploiting a vulnerability in an administrative-level routine and using that permission level to perform some operation. Actual installation exploits are beyond the scope of this book, but an internet check (Google) using “exploit vulnerability privilege escalation (Microsoft OR Windows)” should get you on the right track.