Fixer.dll
Description: The Watch Dogs Fixer
Authors: Copyright (C) 2023
Version: 1.0.0.1
Architecture: 64-bit
Operating System: Windows NT
SHA256: 29ab6dddd06b73fb0963c980ed51e5a3
File Size: 38.5 KB
Uploaded At: March 24, 2026, 4:12 p.m.
Views: 8
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory
Exported Functions
- DirectInput8Create (Ordinal: 1, Address: 0x2ab0)
Imported DLLs & Functions
api-ms-win-crt-heap-l1-1-0.dll
- _callnewh (Address: 0x1800071f8)
- free (Address: 0x1800071f0)
- malloc (Address: 0x180007200)
api-ms-win-crt-runtime-l1-1-0.dll
- _cexit (Address: 0x180007218)
- _configure_narrow_argv (Address: 0x180007238)
- _crt_atexit (Address: 0x180007250)
- _execute_onexit_table (Address: 0x180007210)
- _initialize_narrow_environment (Address: 0x180007230)
- _initialize_onexit_table (Address: 0x180007260)
- _initterm (Address: 0x180007248)
- _initterm_e (Address: 0x180007228)
- _invalid_parameter_noinfo_noreturn (Address: 0x180007258)
- _register_onexit_function (Address: 0x180007220)
- _seh_filter_dll (Address: 0x180007240)
KERNEL32.dll
- CloseHandle (Address: 0x180007080)
- CreateThread (Address: 0x1800070d8)
- CreateToolhelp32Snapshot (Address: 0x180007068)
- FlushInstructionCache (Address: 0x1800070a8)
- FormatMessageA (Address: 0x180007100)
- GetCurrentProcess (Address: 0x180007038)
- GetCurrentProcessId (Address: 0x1800070a0)
- GetCurrentThreadId (Address: 0x180007050)
- GetLastError (Address: 0x1800070f0)
- GetModuleHandleA (Address: 0x1800070d0)
- GetProcAddress (Address: 0x180007098)
- GetSystemDirectoryA (Address: 0x1800070c0)
- GetSystemInfo (Address: 0x180007010)
- GetSystemTimeAsFileTime (Address: 0x180007150)
- GetThreadContext (Address: 0x180007090)
- HeapAlloc (Address: 0x180007088)
- HeapCreate (Address: 0x180007020)
- HeapFree (Address: 0x180007030)
- HeapReAlloc (Address: 0x180007078)
- InitializeSListHead (Address: 0x180007158)
- IsDebuggerPresent (Address: 0x180007140)
- IsProcessorFeaturePresent (Address: 0x180007138)
- K32GetModuleInformation (Address: 0x1800070e0)
- LoadLibraryA (Address: 0x1800070c8)
- LocalFree (Address: 0x1800070f8)
- OpenThread (Address: 0x1800070b8)
- QueryPerformanceCounter (Address: 0x180007148)
- ReadProcessMemory (Address: 0x1800070e8)
- ResumeThread (Address: 0x180007060)
- RtlCaptureContext (Address: 0x180007160)
- RtlLookupFunctionEntry (Address: 0x180007110)
- RtlVirtualUnwind (Address: 0x180007118)
- SetThreadContext (Address: 0x1800070b0)
- SetUnhandledExceptionFilter (Address: 0x180007128)
- Sleep (Address: 0x180007070)
- SuspendThread (Address: 0x180007058)
- TerminateProcess (Address: 0x180007130)
- Thread32First (Address: 0x180007048)
- Thread32Next (Address: 0x180007040)
- UnhandledExceptionFilter (Address: 0x180007120)
- VirtualAlloc (Address: 0x180007008)
- VirtualFree (Address: 0x180007000)
- VirtualProtect (Address: 0x180007028)
- VirtualQuery (Address: 0x180007018)
- WriteProcessMemory (Address: 0x180007108)
MSVCP140.dll
- ?_Xlength_error@std@@YAXPEBD@Z (Address: 0x180007170)
USER32.dll
- GetWindowInfo (Address: 0x180007180)
VCRUNTIME140_1.dll
- __CxxFrameHandler4 (Address: 0x1800071e0)
VCRUNTIME140.dll
- __C_specific_handler (Address: 0x180007190)
- __std_exception_copy (Address: 0x1800071b8)
- __std_exception_destroy (Address: 0x1800071c0)
- __std_type_info_destroy_list (Address: 0x1800071a8)
- _CxxThrowException (Address: 0x1800071c8)
- memcmp (Address: 0x1800071a0)
- memcpy (Address: 0x180007198)
- memmove (Address: 0x1800071d0)
- memset (Address: 0x1800071b0)