How to use : ============ 1.fill with target Process ID 2.fill with start address (Virtual Address) of code that you want to fix it. if you fill it with ZERO, UIF will fill it automatically. 3.fill with End address (Virtual Address) of code that
This tool is designed to rebuild imports for protected/packed Win32 executables. It reconstructs a new Image Import Descr iptor (IID), Import Array Table (IAT) and all ASCII module and function names. It can also inject into your output executable,