!This program cannot be run in DOS mode.
`.rsrc
HjX(4
XjX(4
v4.0.30319
#Strings
IMAGE_FILE_MACHINE_R10000
IMAGE_FILE_MACHINE_R3000
IMAGE_FILE_MACHINE_R4000
__StaticArrayInitTypeSize=21
Reserved1
Method1
TlsBitmapBits1
ProcessImageFileNameWin32
ImageOptionalHeader32
ReadInt32
ToInt32
IMAGE_FILE_MACHINE_WCEMIPSV2
Dictionary`2
Reserved2
Method2
TlsBitmapBits2
IMAGE_FILE_MACHINE_AM33
95C4C49E2753118F8EE18FF838363166B7519EEEF70F3C80B529324F832473B3
IMAGE_FILE_MACHINE_SH3
BIND_OPTS3
Method3
IMAGE_FILE_MACHINE_ALPHA64
IMAGE_FILE_MACHINE_IA64
IMAGE_FILE_MACHINE_AMD64
IMAGE_FILE_MACHINE_ARM64
IMAGE_FILE_MACHINE_AXP64
IsWOW64
isWoW64
ImageOptionalHeader64
ToInt64
IMAGE_FILE_MACHINE_SH4
Method4
9281DE55062A6AEBAEB9831490568B24C305C52821FA36A4103E6638C82FDE45
IMAGE_FILE_MACHINE_SH5
Method5
__StaticArrayInitTypeSize=16
IMAGE_FILE_MACHINE_MIPS16
IMAGE_FILE_MACHINE_MIPSFPU16
ReadInt16
IMAGE_FILE_MACHINE_I386
Method6
<Module>
<PrivateImplementationDetails>
CLSCTX_ENABLE_AAA
CLSCTX_DISABLE_AAA
IMAGE_FILE_MACHINE_ALPHA
NameRVA
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
MasqueradePEB
IMAGE_FILE_MACHINE_THUMB
BypassUAC
IMAGE_FILE_MACHINE_EBC
IMAGE_NT_OPTIONAL_HDR32_MAGIC
IMAGE_NT_OPTIONAL_HDR64_MAGIC
IMAGE_ROM_OPTIONAL_HDR_MAGIC
CLSCTX_INPROC
IMAGE_FILE_MACHINE_POWERPC
PAGE_EXECUTE_READ
PAGE_GRAPHICS_EXECUTE_READ
CLSCTX_ENABLE_CODE_DOWNLOAD
CLSCTX_NO_CODE_DOWNLOAD
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
PAGE_ENCLAVE_UNVALIDATED
PAGE_TARGETS_INVALID
InterfaceID
IMAGE_DLLCHARACTERISTICS_NO_BIND
PAGE_GUARD
IMAGE_FILE_MACHINE_SH3E
IMAGE_FILE_MACHINE_CEE
MEM_FREE
IMAGE_FILE_EXECUTABLE_IMAGE
PAGE_NOCACHE
PAGE_GRAPHICS_NOCACHE
PAGE_WRITECOMBINE
IMAGE_FILE_32BIT_MACHINE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_MACHINE_TRICORE
IMAGE_DLL_CHARACTERISTICS_DYNAMIC_BASE
MEM_RELEASE
S_FALSE
PAGE_TARGETS_NO_UPDATE
MEM_ROTATE
PAGE_READWRITE
PAGE_EXECUTE_READWRITE
PAGE_GRAPHICS_EXECUTE_READWRITE
PAGE_GRAPHICS_READWRITE
PAGE_EXECUTE
PAGE_GRAPHICS_EXECUTE
IMAGE_SUBSYSTEM_NATIVE
MEM_RESERVE
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_MACHINE_CEF
IMAGE_SUBSYSTEM_XBOX_CODE_CATALOG
CLSCTX_NO_FAILURE_LOG
E_INVALIDARG
MEM_WRITE_WATCH
IMAGE_DLLCHARACTERISTICS_NO_SEH
processH
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SUBSYSTEM_OS2_CUI
IMAGE_SUBSYSTEM_WINDOWS_CUI
IMAGE_SUBSYSTEM_POSIX_CUI
IMAGE_SUBSYSTEM_WINDOWS_CE_GUI
IMAGE_SUBSYSTEM_WINDOWS_GUI
MEM_DIFFERENT_IMAGE_BASE_OK
PAGE_ENCLAVE_MASK
MEM_PHYSICAL
CLSCTX_NO_CUSTOM_MARSHAL
CLSCTX_ALL
IMAGE_FILE_DLL
PAGE_ENCLAVE_THREAD_CONTROL
ProcessUserModeIOPL
IMAGE_FILE_SYSTEM
IMAGE_FILE_AGGRESIVE_WS_TRIM
IMAGE_SUBSYSTEM_EFI_ROM
IMAGE_FILE_MACHINE_ARM
IMAGE_LIBRARY_THREAD_TERM
IMAGE_LIBRARY_PROCESS_TERM
IMAGE_SUBSYSTEM_EFI_APPLICATION
IMAGE_SUBSYSTEM_WINDOWS_BOOT_APPLICATION
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
MEM_TOP_DOWN
IMAGE_FILE_MACHINE_UNKNOWN
IMAGE_SUBSYSTEM_UNKNOWN
MEM_RESET_UNDO
IMAGE_FILE_BYTES_REVERSED_LO
PAGE_REVERT_TO_FILE_MAP
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
IMAGE_FILE_MACHINE_POWERPCFP
IMAGE_FILE_MACHINE_SH3DSP
IMAGE_FILE_MACHINE_M32R
MEM_REPLACE_PLACEHOLDER
MEM_PRESERVE_PLACEHOLDER
MEM_RESERVE_PLACEHOLDER
CLSCTX_INPROC_HANDLER
IMAGE_DLLCHARACTERISTICS_APPCONTAINER
IMAGE_SUBSYSTEM_EFI_BOOT_SERVICE_DRIVER
IMAGE_SUBSYSTEM_EFI_RUNTIME_DRIVER
IMAGE_DLLCHARACTERISTICS_WDM_DRIVER
CLSCTX_INPROC_SERVER
CLSCTX_REMOTE_SERVER
CLSCTX_LOCAL_SERVER
CLSCTX_SERVER
MEM_4MB_PAGES
MEM_LARGE_PAGES
MEM_64K_PAGES
MEM_COALESCE_PLACEHOLDERS
PAGE_NOACCESS
PAGE_GRAPHICS_NOACCESS
IMAGE_SUBSYSTEM_NATIVE_WINDOWS
IMAGE_DLL_CHARACTERISTICS_NX_COMPAT
MEM_RESET
PAGE_ENCLAVE_DECOMMIT
MEM_DECOMMIT
MEM_COMMIT
IMAGE_LIBRARY_THREAD_INIT
IMAGE_LIBRARY_PROCESS_INIT
HRESULT
PAGE_GRAPHICS_COHERENT
IMAGE_FILE_MACHINE_ARMNT
PAGE_ENCLAVE_SS_REST
IMAGE_FILE_MACHINE_TARGET_HOST
MEM_UNMAP_WITH_TRANSIENT_BOOST
PAGE_ENCLAVE_SS_FIRST
CLSCTX_FROM_DEFAULT_CONTEXT
IMAGE_FILE_MACHINE_MIPSFPU
IMAGE_SUBSYSTEM_XBOX
CLSCTX
PAGE_READONLY
PAGE_GRAPHICS_READONLY
IMAGE_FILE_UP_SYSTEM_ONLY
PAGE_WRITECOPY
PAGE_EXECUTE_WRITECOPY
E_OUTOFMEMORY
IMAGE_DLL_CHARACTERISTICS_FORCE_INTEGRITY
value__
e_res1a
e_res2a
SizeOfInitializedData
SizeOfUninitializedData
AnsiCodePageData
OemCodePageData
UnicodeCaseTableData
BaseOfData
SubSystemData
PebLdrData
ReadOnlyStaticServerData
e_res1b
e_res2b
GetPeb
mscorlib
e_res1c
e_res2c
ShellExec
e_magic
System.Collections.Generic
e_lfarlc
e_crlc
e_minalloc
e_maxalloc
PreparePebProc
CurrentProc
e_res1d
e_res2d
OSPlatformId
InheritedFromUniqueProcessId
BeingDebugged
ProcessTokenVirtualizationEnabled
ProcessLUIDDeviceMapsEnabled
IsImageDynamicallyRelocated
Reserved
Initialized
e_oemid
<Name>k__BackingField
<Ordinal>k__BackingField
<RelativeAddress>k__BackingField
<FullAddress>k__BackingField
HeapDeCommitTotalFreeThreshold
HeapDeCommitFreeBlockThreshold
method
e_res2e
InheritedAddressSpace
BaseOfCode
SizeOfCode
ProcessAffinityUpdateMode
grfMode
ProcessMemoryAllocationMode
ProcessDefaultHardErrorMode
get_Unicode
LaunchElevatedCOMObjectUnsafe
SizeOfImage
ProcessCookie
EndInvoke
BeginInvoke
locale
TLSTable
ResourceTable
GdiSharedHandleTable
CertificateTable
LoadConfigTable
KernelCallbackTable
PointerToSymbolTable
BaseRelocationTable
ExceptionTable
ImportTable
ExportTable
GetEnvironmentVariable
IDisposable
procHandle
RuntimeFieldHandle
RuntimeTypeHandle
GetTypeFromHandle
SsHandle
ProcessHandle
ProcessDebugObjectHandle
get_Name
set_Name
ProcessImageFileName
moduleName
BaseDllName
FullDllName
functionName
pszName
ProcessCycleTime
Machine
dwTickCountDeadline
FastPebLockRoutine
FastPebUnlockRoutine
MagicType
ComInterfaceType
ValueType
SubSystemType
MemoryAllocationType
PageAccessType
GetType
Architecture
PtrToStructure
OrdinalBase
DllBase
ReadOnlySharedMemoryBase
Dispose
PrepareDelegate
MulticastDelegate
CompilerGeneratedAttribute
GuidAttribute
UnverifiableCodeAttribute
DebuggableAttribute
ComVisibleAttribute
AssemblyTitleAttribute
InterfaceTypeAttribute
AssemblyTrademarkAttribute
TargetFrameworkAttribute
AssemblyFileVersionAttribute
SecurityPermissionAttribute
AssemblyConfigurationAttribute
AssemblyDescriptionAttribute
UnmanagedFunctionPointerAttribute
FlagsAttribute
CompilationRelaxationsAttribute
AssemblyProductAttribute
AssemblyCopyrightAttribute
AssemblyCompanyAttribute
RuntimeCompatibilityAttribute
Win32VersionValue
SizeOfStackReserve
SizeOfHeapReserve
HeapSegmentReserve
BypassUAC.exe
get_Size
RegionSize
bufferSize
ProcessLdtSize
e_res2f
SizeOf
e_res2g
ProcessHandleTracing
Encoding
DelegatesHandling
System.Runtime.Versioning
ProcessImageFileMapping
SourceString
McfInitUnicodeString
RtlInitUnicodeString
rtlInitUnicodeString
DestinationString
ToString
ImageBaseLong
e_res2h
Launch
ProcessWorkingSetWatch
filePath
get_Length
MaximumLength
ProcessInformationLength
ReturnLength
e_res2i
PtrToStringUni
StringToHGlobalUni
PtrToStringAnsi
e_res2j
AsyncCallback
ProcessInstrumentationCallback
callback
FastPebLock
LoaderLock
ImageProcessAffinityMask
AllocHGlobal
FreeHGlobal
Marshal
Special
get_Ordinal
set_Ordinal
Informational
Program
get_Item
ImageSubSystem
Subsystem
CheckSum
e_csum
ProcessAccessToken
written
MajorImageVersion
MinorImageVersion
MajorOperatingSystemVersion
MinorOperatingSystemVersion
MajorSubsystemVersion
MinorSubsystemVersion
MajorLinkerVersion
MinorLinkerVersion
OSMajorVersion
ImageSubSystemMajorVersion
OSMinorVersion
ImageSubSystemMinorVersion
ProcessThreadStackAllocation
ProcessWow64Information
ProcessWx86Information
ProcessBasicInformation
ProcessForegroundInformation
ProcessImageInformation
ProcessSessionInformation
ProcessGroupInformation
ProcessTlsInformation
ProcessInformation
ProcessLdtInformation
ProcessWindowInformation
ProcessBreakOnTermination
SecurityAction
RtlLeaveCriticalSection
rtlLeaveCriticalSection
lpCriticalSection
RtlEnterCriticalSection
rtlEnterCriticalSection
System.Reflection
OldAccessProtection
NewAccessProtection
ExportedFunction
op_Addition
CallingConvention
GetObjectForIUnknown
pServerInfo
e_oeminfo
e_ovno
ProcessDeviceMap
ProcessHeap
ReadOnlySharedMemoryHeap
TlsBitmap
e_cblp
TimeDateStamp
ProcessEnableAlignmentFaultFixup
e_cparhdr
OSBuildNumber
ImageFileHeader
CLRRuntimeHeader
SizeOfOptionalHeader
ImageDosHeader
buffer
LargeInteger
PebFucker
IsAppContainer
ProcessStarterHelper
GetDelegateForFunctionPointer
TlsExpansionCounter
Resolver
ToLower
.cctor
DelayImportDescriptor
GlobalPtr
StructureToPtr
UIntPtr
uniStr
DllCharacteristics
System.Diagnostics
System.Runtime.InteropServices
System.Runtime.CompilerServices
DebuggingModes
ImageUsesLargePages
NumberOfNames
AddressOfNames
ProcessTimes
GetPebAddres
SubSystemType4Bytes
GetBytes
NumberOfRvaAndSizes
PebFlags
ProcessExecuteFlags
grfFlags
ProcessDebugFlags
dwTrackFlags
NtGlobalFlags
LoaderFlags
InLoadOrderLinks
InInitializationOrderLinks
InMemoryOrderLinks
AddressOfNameOrdinals
NumberOfSymbols
System.Security.Permissions
NumberOfSections
NumberOfFunctions
AddressOfFunctions
ReadImageFileExecOptions
pBindOptions
Commons
MaximumNumberOfHeaps
ProcessHeaps
SizeOfHeaders
SkipPatchingUser32Forwarders
ProcessIoPortHandlers
RuntimeHelpers
paramaters
ProcessParameters
ProcessVmCounters
ProcessIoCounters
NumberOfProcessors
ProcessInforationClass
MaxProcessInfoClass
ProcessPriorityClass
Success
IsPackagedProcess
IsProtectedProcess
IsLongPathAwareProcess
NtQueryInformationProcess
ProcessConsoleHostProcess
PebBaseAddress
ImageBaseAddress
GetModuleBaseAddress
get_RelativeAddress
set_RelativeAddress
VirtualAddress
get_FullAddress
set_FullAddress
GetExportAddress
lpDestAddress
EntryInProgress
ZeroBits
ProcessQuotaLimits
ProcessPooledUsageAndLimits
NtStatus
ExitStatus
Concat
rReturnedComObject
ReleaseComObject
CoGetObject
coGetObject
object
NumberOfBytesToProtect
cbStruct
IsProtectedProcessLight
op_Explicit
SizeOfStackCommit
SizeOfHeapCommit
HeapSegmentCommit
IAsyncResult
result
HighPartAsUInt
LowPartAsUInt
HighPartAsInt
LowPartAsInt
Mutant
FileAlignment
SectionAlignment
Environment
AddressOfEntryPoint
LoadCount
ProcessHandleCount
EnvironmentUpdateCount
QuadPart
HighPart
LowPart
ProcessDebugPort
ProcessExceptionPort
BoundImport
FreeList
InLoadOrderModuleList
InInitializationOrderModuleList
InMemoryOrderModuleList
GdiDCAttributeList
ProcessPriorityBoost
CriticalSectionTimeout
System.Text
dwClassContext
e_lfanew
ProcessWorkingSetWatchEx
TlsIndex
InitializeArray
NtAllocateVirtualMemory
NtWriteVirtualMemory
ntWriteVirtualMemory
NtProtectVirtualMemory
ntProtectVirtualMemory
ImageDataDirectory
ImageExportDirectory
directory
LdrDataTableEntry
ListEntry
op_Equality
op_Inequality
ProcessPagePriority
ProcessBasePriority
ProcessRaisePriority
System.Security
System.Security.Permissions.SecurityPermissionAttribute, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089
SkipVerification
WrapNonExceptionThrows
BypassUAC
Copyright
2022
$e4c1c122-d13e-4e64-bf0e-44ec87e10a25
1.0.0.0
.NETFramework,Version=v4.5
FrameworkDisplayName
.NET Framework 4.5
$6EDD6D74-C007-4E75-B76A-E5740995E24C
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
ntdll.dll
NtAllocateVirtualMemory
Elevation:Administrator!new:
3E5FC7F9-9A51-4367-9063-A120244FBEC7
6EDD6D74-C007-4E75-B76A-E5740995E24C
NtWriteVirtualMemory
NtProtectVirtualMemory
RtlInitUnicodeString
RtlEnterCriticalSection
RtlLeaveCriticalSection
ole32.dll
CoGetObject
winhlp32.exe
SystemRoot
\winhlp32.exe
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
Comments
CompanyName
FileDescription
BypassUAC
FileVersion
1.0.0.0
InternalName
BypassUAC.exe
LegalCopyright
Copyright
2022
LegalTrademarks
OriginalFilename
BypassUAC.exe
ProductName
BypassUAC
ProductVersion
1.0.0.0
Assembly Version
1.0.0.0