Note that UAC popups are also generated by modified shell32.dll, when you copy/move some files.
It is difficult to hack them because dll files can be dynamically loaded/unloaded into the memory while exe files are loaded into the memory just once. Also dll files can be shared among several processes.
I tried to redirect copy/move operations so that the modified resources of shell32.dll are still being used and the operations use the unmodified copy of shell32.dll to solve the UAC popups, by modifiying the registry. Unfortunately I failed
I should have modified more registry keys.
Currently I am not working on this project. =Kishan-Bagaria adopted this memory patch method to his program and he is still active. If you need to get some help, you may ask him.