Fixer.dll

Description: The Watch Dogs Fixer

Authors: Copyright (C) 2023

Version: 1.0.0.1

Architecture: 64-bit

Operating System: Windows NT

SHA256: 29ab6dddd06b73fb0963c980ed51e5a3

File Size: 38.5 KB

Uploaded At: March 24, 2026, 4:12 p.m.

Views: 8

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory

Exported Functions

  • DirectInput8Create (Ordinal: 1, Address: 0x2ab0)

Imported DLLs & Functions

api-ms-win-crt-heap-l1-1-0.dll
  • _callnewh (Address: 0x1800071f8)
  • free (Address: 0x1800071f0)
  • malloc (Address: 0x180007200)
api-ms-win-crt-runtime-l1-1-0.dll
  • _cexit (Address: 0x180007218)
  • _configure_narrow_argv (Address: 0x180007238)
  • _crt_atexit (Address: 0x180007250)
  • _execute_onexit_table (Address: 0x180007210)
  • _initialize_narrow_environment (Address: 0x180007230)
  • _initialize_onexit_table (Address: 0x180007260)
  • _initterm (Address: 0x180007248)
  • _initterm_e (Address: 0x180007228)
  • _invalid_parameter_noinfo_noreturn (Address: 0x180007258)
  • _register_onexit_function (Address: 0x180007220)
  • _seh_filter_dll (Address: 0x180007240)
KERNEL32.dll
  • CloseHandle (Address: 0x180007080)
  • CreateThread (Address: 0x1800070d8)
  • CreateToolhelp32Snapshot (Address: 0x180007068)
  • FlushInstructionCache (Address: 0x1800070a8)
  • FormatMessageA (Address: 0x180007100)
  • GetCurrentProcess (Address: 0x180007038)
  • GetCurrentProcessId (Address: 0x1800070a0)
  • GetCurrentThreadId (Address: 0x180007050)
  • GetLastError (Address: 0x1800070f0)
  • GetModuleHandleA (Address: 0x1800070d0)
  • GetProcAddress (Address: 0x180007098)
  • GetSystemDirectoryA (Address: 0x1800070c0)
  • GetSystemInfo (Address: 0x180007010)
  • GetSystemTimeAsFileTime (Address: 0x180007150)
  • GetThreadContext (Address: 0x180007090)
  • HeapAlloc (Address: 0x180007088)
  • HeapCreate (Address: 0x180007020)
  • HeapFree (Address: 0x180007030)
  • HeapReAlloc (Address: 0x180007078)
  • InitializeSListHead (Address: 0x180007158)
  • IsDebuggerPresent (Address: 0x180007140)
  • IsProcessorFeaturePresent (Address: 0x180007138)
  • K32GetModuleInformation (Address: 0x1800070e0)
  • LoadLibraryA (Address: 0x1800070c8)
  • LocalFree (Address: 0x1800070f8)
  • OpenThread (Address: 0x1800070b8)
  • QueryPerformanceCounter (Address: 0x180007148)
  • ReadProcessMemory (Address: 0x1800070e8)
  • ResumeThread (Address: 0x180007060)
  • RtlCaptureContext (Address: 0x180007160)
  • RtlLookupFunctionEntry (Address: 0x180007110)
  • RtlVirtualUnwind (Address: 0x180007118)
  • SetThreadContext (Address: 0x1800070b0)
  • SetUnhandledExceptionFilter (Address: 0x180007128)
  • Sleep (Address: 0x180007070)
  • SuspendThread (Address: 0x180007058)
  • TerminateProcess (Address: 0x180007130)
  • Thread32First (Address: 0x180007048)
  • Thread32Next (Address: 0x180007040)
  • UnhandledExceptionFilter (Address: 0x180007120)
  • VirtualAlloc (Address: 0x180007008)
  • VirtualFree (Address: 0x180007000)
  • VirtualProtect (Address: 0x180007028)
  • VirtualQuery (Address: 0x180007018)
  • WriteProcessMemory (Address: 0x180007108)
MSVCP140.dll
  • ?_Xlength_error@std@@YAXPEBD@Z (Address: 0x180007170)
USER32.dll
  • GetWindowInfo (Address: 0x180007180)
VCRUNTIME140_1.dll
  • __CxxFrameHandler4 (Address: 0x1800071e0)
VCRUNTIME140.dll
  • __C_specific_handler (Address: 0x180007190)
  • __std_exception_copy (Address: 0x1800071b8)
  • __std_exception_destroy (Address: 0x1800071c0)
  • __std_type_info_destroy_list (Address: 0x1800071a8)
  • _CxxThrowException (Address: 0x1800071c8)
  • memcmp (Address: 0x1800071a0)
  • memcpy (Address: 0x180007198)
  • memmove (Address: 0x1800071d0)
  • memset (Address: 0x1800071b0)