ISDone.dll

Description: библиотека для распаковки arc, 7z, rar, pcf, srep архивов в InnoSetup

Authors: ProFrager

Version: 0.6.0.2

Architecture: 32-bit

Operating System: Windows

SHA256: c652b4b564b3c85c399155cbb45c6fb5

File Size: 380.0 KB

Uploaded At: March 4, 2026, 7:37 p.m.

Views: 13

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess

Exported Functions

  • ISDoneStop (Ordinal: 1, Address: 0xfb7c)
  • ISDoneInit (Ordinal: 2, Address: 0xf438)
  • wrapcallback (Ordinal: 3, Address: 0x1e62c)
  • ResumeProc (Ordinal: 4, Address: 0x1f248)
  • SuspendProc (Ordinal: 5, Address: 0x1f214)
  • ChangeLanguage (Ordinal: 6, Address: 0x1957c)
  • ShowChangeDiskWindow (Ordinal: 7, Address: 0x16e1c)
  • ISExec (Ordinal: 8, Address: 0x1ed64)
  • ISFindFree (Ordinal: 9, Address: 0x1ed18)
  • ISGetName (Ordinal: 10, Address: 0x1ecd4)
  • ISPickFilename (Ordinal: 11, Address: 0x1eb28)
  • ISFindFiles (Ordinal: 12, Address: 0x1e9bc)
  • Exec2 (Ordinal: 13, Address: 0x1e884)
  • FileSearchInit (Ordinal: 14, Address: 0xf424)
  • PrecompInit (Ordinal: 15, Address: 0x125e0)
  • SrepInit (Ordinal: 16, Address: 0x1242c)
  • ISbinkExtract (Ordinal: 17, Address: 0x1df14)
  • ISPackZIP (Ordinal: 18, Address: 0x1d4c8)
  • ISxDeltaExtract (Ordinal: 19, Address: 0x1cefc)
  • IS7zipExtract (Ordinal: 20, Address: 0x1c028)
  • ISArcExtract (Ordinal: 21, Address: 0x1b138)

Imported DLLs & Functions

advapi32.dll
  • RegCloseKey (Address: 0x45f1fc)
  • RegOpenKeyExA (Address: 0x45f1f8)
  • RegQueryValueExA (Address: 0x45f1f4)
comctl32.dll
  • ImageList_Create (Address: 0x45f3c8)
  • ImageList_Destroy (Address: 0x45f3c4)
  • ImageList_GetIconSize (Address: 0x45f3bc)
  • ImageList_SetBkColor (Address: 0x45f3c0)
  • InitCommonControls (Address: 0x45f3cc)
gdi32.dll
  • CreateFontIndirectA (Address: 0x45f418)
  • CreateSolidBrush (Address: 0x45f30c)
  • DeleteObject (Address: 0x45f308)
  • GetStockObject (Address: 0x45f304)
  • SetBkColor (Address: 0x45f300)
  • SetBkMode (Address: 0x45f2fc)
  • SetBrushOrgEx (Address: 0x45f2f8)
  • SetTextColor (Address: 0x45f2f4)
kernel32.dll
  • CloseHandle (Address: 0x45f1e0)
  • CloseHandle (Address: 0x45f2ec)
  • CompareStringA (Address: 0x45f2e8)
  • CompareStringA (Address: 0x45f460)
  • CreateDirectoryA (Address: 0x45f45c)
  • CreateEventA (Address: 0x45f458)
  • CreateEventA (Address: 0x45f2e4)
  • CreateFileA (Address: 0x45f1dc)
  • CreateFileA (Address: 0x45f2e0)
  • CreateFileA (Address: 0x45f454)
  • CreateProcessA (Address: 0x45f450)
  • CreateProcessA (Address: 0x45f2dc)
  • CreateThread (Address: 0x45f1b0)
  • CreateThread (Address: 0x45f2d8)
  • DeleteCriticalSection (Address: 0x45f154)
  • DeleteFileA (Address: 0x45f2d4)
  • DeleteFileA (Address: 0x45f44c)
  • EnterCriticalSection (Address: 0x45f15c)
  • ExitProcess (Address: 0x45f1ac)
  • ExitThread (Address: 0x45f2d0)
  • FileTimeToLocalFileTime (Address: 0x45f2cc)
  • FileTimeToSystemTime (Address: 0x45f2c8)
  • FindClose (Address: 0x45f2c4)
  • FindFirstFileA (Address: 0x45f448)
  • FindNextFileA (Address: 0x45f444)
  • FreeLibrary (Address: 0x45f1a8)
  • FreeLibrary (Address: 0x45f2c0)
  • GetCommandLineA (Address: 0x45f1a4)
  • GetCurrentDirectoryA (Address: 0x45f1a0)
  • GetCurrentProcessId (Address: 0x45f2bc)
  • GetCurrentThreadId (Address: 0x45f178)
  • GetDateFormatA (Address: 0x45f440)
  • GetExitCodeProcess (Address: 0x45f2b8)
  • GetExitCodeThread (Address: 0x45f2b4)
  • GetFileAttributesA (Address: 0x45f43c)
  • GetFileSize (Address: 0x45f1d4)
  • GetFileSize (Address: 0x45f2b0)
  • GetFileType (Address: 0x45f1d8)
  • GetLastError (Address: 0x45f19c)
  • GetLastError (Address: 0x45f2ac)
  • GetLocaleInfoA (Address: 0x45f198)
  • GetModuleFileNameA (Address: 0x45f438)
  • GetModuleHandleA (Address: 0x45f2a8)
  • GetProcAddress (Address: 0x45f2a4)
  • GetStartupInfoA (Address: 0x45f194)
  • GetStdHandle (Address: 0x45f1d0)
  • GetThreadLocale (Address: 0x45f190)
  • GetTickCount (Address: 0x45f2a0)
  • GetTimeFormatA (Address: 0x45f434)
  • GetVersion (Address: 0x45f174)
  • InitializeCriticalSection (Address: 0x45f160)
  • InterlockedDecrement (Address: 0x45f17c)
  • InterlockedIncrement (Address: 0x45f180)
  • LeaveCriticalSection (Address: 0x45f158)
  • LoadLibraryA (Address: 0x45f29c)
  • LoadLibraryA (Address: 0x45f430)
  • LocalAlloc (Address: 0x45f170)
  • LocalAlloc (Address: 0x45f228)
  • LocalFree (Address: 0x45f16c)
  • LocalFree (Address: 0x45f224)
  • lstrcatA (Address: 0x45f238)
  • lstrcmpiA (Address: 0x45f420)
  • lstrcpyA (Address: 0x45f234)
  • lstrlenA (Address: 0x45f230)
  • MoveFileA (Address: 0x45f298)
  • MoveFileExA (Address: 0x45f42c)
  • MultiByteToWideChar (Address: 0x45f18c)
  • OpenProcess (Address: 0x45f294)
  • RaiseException (Address: 0x45f1cc)
  • ReadFile (Address: 0x45f1c8)
  • ReadFile (Address: 0x45f290)
  • ReadProcessMemory (Address: 0x45f28c)
  • RemoveDirectoryA (Address: 0x45f288)
  • RemoveDirectoryA (Address: 0x45f428)
  • ResumeThread (Address: 0x45f284)
  • RtlUnwind (Address: 0x45f1c4)
  • SetCurrentDirectoryA (Address: 0x45f188)
  • SetCurrentDirectoryA (Address: 0x45f280)
  • SetCurrentDirectoryA (Address: 0x45f424)
  • SetEndOfFile (Address: 0x45f1c0)
  • SetEndOfFile (Address: 0x45f27c)
  • SetErrorMode (Address: 0x45f278)
  • SetEvent (Address: 0x45f274)
  • SetFilePointer (Address: 0x45f1bc)
  • SetFilePointer (Address: 0x45f270)
  • SetThreadPriority (Address: 0x45f26c)
  • Sleep (Address: 0x45f268)
  • SuspendThread (Address: 0x45f264)
  • SystemTimeToFileTime (Address: 0x45f260)
  • TerminateProcess (Address: 0x45f25c)
  • TerminateThread (Address: 0x45f258)
  • TlsAlloc (Address: 0x45f220)
  • TlsFree (Address: 0x45f21c)
  • TlsGetValue (Address: 0x45f218)
  • TlsSetValue (Address: 0x45f214)
  • UnhandledExceptionFilter (Address: 0x45f1b8)
  • VirtualAlloc (Address: 0x45f168)
  • VirtualAlloc (Address: 0x45f254)
  • VirtualFree (Address: 0x45f164)
  • VirtualFree (Address: 0x45f250)
  • VirtualProtect (Address: 0x45f24c)
  • WaitForSingleObject (Address: 0x45f248)
  • WideCharToMultiByte (Address: 0x45f184)
  • WideCharToMultiByte (Address: 0x45f244)
  • WriteFile (Address: 0x45f1b4)
  • WriteFile (Address: 0x45f240)
  • WritePrivateProfileStringA (Address: 0x45f23c)
ntdll.dll
  • NtQueryInformationFile (Address: 0x45f468)
  • NtQuerySystemInformation (Address: 0x45f46c)
oleaut32.dll
  • SysAllocString (Address: 0x45f474)
  • SysAllocStringLen (Address: 0x45f20c)
  • SysFreeString (Address: 0x45f204)
  • SysReAllocStringLen (Address: 0x45f208)
shell32.dll
  • SHGetDataFromIDListA (Address: 0x45f494)
  • SHGetDesktopFolder (Address: 0x45f490)
  • SHGetFileInfoA (Address: 0x45f47c)
  • SHGetMalloc (Address: 0x45f48c)
  • SHGetPathFromIDListA (Address: 0x45f488)
  • SHGetSpecialFolderLocation (Address: 0x45f484)
user32.dll
  • CallWindowProcA (Address: 0x45f410)
  • CharLowerBuffA (Address: 0x45f3b4)
  • ClientToScreen (Address: 0x45f3b0)
  • CopyImage (Address: 0x45f3ac)
  • CreateWindowExA (Address: 0x45f40c)
  • DefWindowProcA (Address: 0x45f408)
  • DestroyIcon (Address: 0x45f3a8)
  • DestroyWindow (Address: 0x45f3a4)
  • DispatchMessageA (Address: 0x45f3a0)
  • DispatchMessageA (Address: 0x45f404)
  • DrawFocusRect (Address: 0x45f39c)
  • DrawTextA (Address: 0x45f400)
  • EnableMenuItem (Address: 0x45f398)
  • EnableWindow (Address: 0x45f394)
  • FillRect (Address: 0x45f390)
  • GetClassInfoA (Address: 0x45f3fc)
  • GetClientRect (Address: 0x45f38c)
  • GetCursor (Address: 0x45f388)
  • GetCursorPos (Address: 0x45f384)
  • GetFocus (Address: 0x45f380)
  • GetKeyboardType (Address: 0x45f1e8)
  • GetKeyState (Address: 0x45f37c)
  • GetSysColor (Address: 0x45f378)
  • GetSystemMenu (Address: 0x45f374)
  • GetSystemMetrics (Address: 0x45f370)
  • GetWindowLongA (Address: 0x45f3f8)
  • GetWindowRect (Address: 0x45f36c)
  • GetWindowTextA (Address: 0x45f3f4)
  • GetWindowTextLengthA (Address: 0x45f3f0)
  • InvalidateRect (Address: 0x45f368)
  • IsWindow (Address: 0x45f364)
  • IsWindowEnabled (Address: 0x45f360)
  • LoadCursorA (Address: 0x45f3ec)
  • LoadIconA (Address: 0x45f3e8)
  • MessageBoxA (Address: 0x45f35c)
  • MessageBoxA (Address: 0x45f1ec)
  • MessageBoxW (Address: 0x45f358)
  • OemToCharA (Address: 0x45f354)
  • OffsetRect (Address: 0x45f350)
  • PeekMessageA (Address: 0x45f34c)
  • PeekMessageA (Address: 0x45f3e4)
  • PostMessageA (Address: 0x45f3e0)
  • PostMessageA (Address: 0x45f348)
  • PostQuitMessage (Address: 0x45f344)
  • RegisterClassA (Address: 0x45f3dc)
  • ScreenToClient (Address: 0x45f340)
  • SendMessageA (Address: 0x45f33c)
  • SendMessageA (Address: 0x45f3d8)
  • SetCursor (Address: 0x45f338)
  • SetFocus (Address: 0x45f334)
  • SetForegroundWindow (Address: 0x45f330)
  • SetParent (Address: 0x45f32c)
  • SetWindowLongA (Address: 0x45f3d4)
  • SetWindowPos (Address: 0x45f328)
  • SetWindowTextW (Address: 0x45f324)
  • ShowWindow (Address: 0x45f320)
  • TranslateMessage (Address: 0x45f31c)
  • ValidateRect (Address: 0x45f318)
  • WaitMessage (Address: 0x45f314)