!This program cannot be run in DOS mode.
`.rdata
@.data
.ndata
s695,<B
QSSSPW
v#Vh.,@
Instu`
softuW
NulluN
D$8PSh
8NCRCu
> _?=t
Vj%SSS
PSWh<t@
G;=,<B
v&hxt@
D$ +D$
D$0+D$(P
PPPPPP
<v"Ph
uUh`v@
uZh`v@
Ed+EL;E
u$9Mls
)Mh)Mlf
u$9Mls
)Mh)Mlf
u$9Mls
)Mh)Mlf
Ed+EL;E
]4;Mhr
E89E0}r
u$9Uls
+)Uh)Ul3
Ed+EL;E
)Mh)Mlf
u$9Mls
)Mh)Mlf
verifying installer: %d%%
... %d%%
Installer integrity check has failed. Common causes include
incomplete download and damaged media. Contact the
installer's author to obtain a new copy.
More information at:
http://nsis.sf.net/NSIS_Error
Error launching installer
SeShutdownPrivilege
NSIS Error
SETUPAPI
USERENV
UXTHEME
Error writing temporary file. Make sure your temp folder is valid.
%u.%u%s%s
RichEdit
RichEdit20A
RichEd32
RichEd20
.DEFAULT\Control Panel\International
Control Panel\Desktop\ResourceLocale
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
VERSION
SHGetFolderPathA
SHFOLDER
SHAutoComplete
SHLWAPI
SHELL32
InitiateShutdownA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegDeleteKeyExA
ADVAPI32
GetUserDefaultUILanguage
MoveFileExA
GetDiskFreeSpaceExA
SetDefaultDllDirectories
KERNEL32
[Rename]
Software\Microsoft\Windows\CurrentVersion
\Microsoft\Internet Explorer\Quick Launch
*?|<>/":
%s%s.dll
MulDiv
DeleteFileA
FindFirstFileA
FindNextFileA
FindClose
SetFilePointer
ReadFile
WriteFile
GetPrivateProfileStringA
WritePrivateProfileStringA
MultiByteToWideChar
FreeLibrary
GetProcAddress
LoadLibraryExA
GetModuleHandleA
GlobalFree
GetExitCodeProcess
WaitForSingleObject
GlobalAlloc
ExpandEnvironmentStringsA
lstrcmpA
lstrcmpiA
CloseHandle
SetFileTime
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
GetTickCount
GetFileSize
GetModuleFileNameA
GetCurrentProcess
CopyFileA
ExitProcess
GetWindowsDirectoryA
GetTempPathA
GetCommandLineA
GetVersion
SetErrorMode
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
CreateFileA
GetTempFileNameA
lstrlenA
lstrcatA
LoadLibraryA
GetSystemDirectoryA
RemoveDirectoryA
KERNEL32.dll
EndPaint
DrawTextA
FillRect
GetClientRect
BeginPaint
DefWindowProcA
SendMessageA
InvalidateRect
EnableWindow
LoadImageA
SetWindowLongA
GetDlgItem
IsWindow
FindWindowExA
SendMessageTimeoutA
wsprintfA
ShowWindow
SetForegroundWindow
PostQuitMessage
SetWindowTextA
SetTimer
CreateDialogParamA
DestroyWindow
ExitWindowsEx
CharNextA
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
ScreenToClient
GetMessagePos
CallWindowProcA
IsWindowVisible
LoadBitmapA
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
TrackPopupMenu
GetWindowRect
AppendMenuA
CreatePopupMenu
GetSystemMetrics
EndDialog
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
DialogBoxParamA
GetClassInfoA
CreateWindowExA
SystemParametersInfoA
RegisterClassA
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
DispatchMessageA
PeekMessageA
USER32.dll
SelectObject
SetTextColor
SetBkMode
CreateFontIndirectA
CreateBrushIndirect
DeleteObject
GetDeviceCaps
SetBkColor
GDI32.dll
SHFileOperationA
ShellExecuteA
SHGetFileInfoA
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetSpecialFolderLocation
SHELL32.dll
RegDeleteKeyA
RegCloseKey
RegEnumKeyA
RegOpenKeyExA
RegEnumValueA
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
SetFileSecurityA
ADVAPI32.dll
ImageList_Destroy
ImageList_AddMasked
ImageList_Create
COMCTL32.dll
CoCreateInstance
OleUninitialize
OleInitialize
CoTaskMemFree
ole32.dll
%A!#<D%/SD#8_F$:aM#;fS$<i]%>lf%=jp%;fy&8a
%;fx$=ip$>le#;hZ$9bQ%6\I$*JF#
$K%@kq%W
.=$J}G&4W
&&?iG)
(#3UQ(
""<:)
$7_w$:eZ$0RG$
!&=fc)
&8^l%&DI#
:%(FD#=o[ S
2$9dF)
,#Ex5
'#@n5
"!(F_
-myZ#XkI
BRCHYC&cxH6u}eF
*)ABO@
&H}(%$LJ"
3&8WV#
?&;zc#
!$5ZdG
&19Y
O"4I2(
%/D,'
+$1O<"TiP#gwd!x
q#\n\"A_E)
; If a previous statment was active then restore it
Colors <?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity version="1.0.0.0" processorArchitecture="X86" name="Nullsoft.NSIS.exehead" type="win32"/><description>Nullsoft Install System v04-Aug-2015.cvs</description><dependency><dependentAssembly><assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="X86" publicKeyToken="6595b64144ccf1df" language="*" /></dependentAssembly></dependency><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="requireAdministrator" uiAccess="false"/></requestedPrivileges></security></trustInfo><compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"><application><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/><supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/></application></compatibility></assembly>
NullsoftInst.*
3mQ`/
o&}BK.-
^kun;P%
U-LyhY
zyRQznuE
cHrX_:
F!(T(%A
bV=t_7d0
[/,vH!
fo&?~0u
ClQGcA
3H.{p~
h)\1+~n
P`sX]I
Z-e}ma*
K42w>+
5O)g_:
VcJnI7
K ;S}u
/iHU<
R)%odr
N VbmC
OjJAT6
l@dV,R
Q!bKzH
0|If6S
bRIp\#
/`Iq@,'
IgmbKx
t'>u1]
>}z]Do
B8eH],
*~kHy54
mC26`6
AZZ(F/
5nv?u
.};>T>Dhf
9z|Ce$
6^e{4&^7
f\"v
k|/&:|(
[Dqks94K
#F]2_c3
ovKd]o#
;o{97Lk
ut4YGdD{
9Qd25<
sZ:M[r
Z4ROz1
~o$mB$y
"y{8~f
nhKYLm
maB!CTaH
^h(-[{S
NO0ep[
. 9O")
R>[uYp
jl!BjW
H&Ul'tY
l%h5Ak
t$a4G\xi
hOpBG_
D_]K~l
BhCB@j
Gtb4\7<
!s"R-(
fOM<<q
i!)#=;
I61<U{|
L$YF$a
{SQUH*zcv
NX'6WJE\pT
sVX]gc
$T#*W;
P9=0Hq
[?+CuBY*
Sn#&d[
5x9NH>
4dT=D.
*S\\Y=
ZlJyh+
a.0A4.
[tA.9!
Naw*'=
*~kHy54
>L"p,L
2xs~6;LNL,
0a&H#3"
]&1/\O
9BlRoH
tf@.C
x?/WVr
W5yUt7w
F4Y8~4h[
k/a)}^(
mETyQC>
/tEF!~
{4h=Er
*`o"j'
ITsW|3!
1._[1O
*`eWf3
@<UgTI
bbnFW;&]
0!$ERk
D]<?m2rFp
b=RwW9
z-L[{0
<Z\/Ia~
UJyF >
gDTy`oj
YRE~jX
O??(z$
zG1Vto
y7&:>
t>:T4j
'y(r**
5c\tGeTz0
P)#cW.
d7a*'`
Tko;nG
'#{X0S
{"-mKg]>
jF'6l8
PZ{4n0
pY\RsrcyQ
lb's!7?
j2^$zN
8=(GV[
,S9'hd
qvq8=>
,l&]oN
o3?.qcs$
kBs.8q
a7 G$HU
ZIeC84.
O@4x!"
twn6-B
p"5OW00
}-@V&6
M<{lm0
(&in=N
v_1ioe
E'!RnbM
CWu]k>
>C'a@\
LH8MI8
%cPvJP
]'L/lA
=UYC".
4]yn~n
[7UTJC
\>R&:~
AsnN6fP
fV>q[z
c*1@lb
xDb/3&
r'FWni
F=:VlqVS
iBJ<BK
g_AEG$
_5lyR}
3K-c*)
h;@UGa
HS="eK
h1x/jZ
!dEvOr
5x^~*g
23OoA?
:rekMV
}(d9v+`
;Q>o8{
R"0:[kC
0MUGBn
8J(_,ZZ
9;bn#\
D5wJcQ
i,O4=*
G'=Grb
"*6]<w
d 7PQ
Yme+OW
p]>]LQ
2}15 p
AGdRc8*
{n5~]:
J9sc."1
}}gGlql
ATx:v#gU
>W!Y9s
dusLf
93sA.&
tG_L(p
_*4r.K
`_k8WA
dykVFF>
me0 Qr
Ms}_h<
)=3=F
FK>x6/
:uQ8gF
+L J+3
iGh$7>r*n
vmwS?0
?"B~.)D
GEU /b
XBj,vFgF
)^|*xm
U>.3g;
Eai/JyM
CZi*n+
9DhSpd
PVq!22
W-50n;X=@H
`etvi-
b<uqaS
^5}L45A
Gn>)FK
Fk3tGq
}COSV(L
mcL-CF
,/*|P{
V`c<~.v;
>]7vPN
wc4wBw
2YFrD
UO!D\
hv_k_R
Le,&>
[o'3F7
fTBbz6iE!
6 MAHX
+RByA[
@1Wyx1E
e\ZkLl
_rb]cMDBw
WqKRq~
Af{l1Yl
3zVU&;
U6f+O#S7
A`kzK4T
ho||`;bK
hWV@6w
)(s"44]
OzxHJ?Yf
L<KcUp8
HeZCG'
pz]wPAtlR(
UvMUi.
VeriSign, Inc.10
VeriSign Trust Network1;09
2Terms of use at https://www.verisign.com/rpa (c)101.0,
%VeriSign Class 3 Code Signing 2010 CA0
151222000000Z
190321235959Z0g1
California1
San Jose1
DownloadShield1
DownloadShield0
http://sf.symcb.com/sf.crl0f
https://d.symcb.com/cps0%
https://d.symcb.com/rpa0
http://sf.symcd.com0&
http://sf.symcb.com/sf.crt0
qJ5T}<g
U^i] zG
VeriSign, Inc.10
VeriSign Trust Network1:08
1(c) 2006 VeriSign, Inc. - For authorized use only1E0C
<VeriSign Class 3 Public Primary Certification Authority - G50
100208000000Z
200207235959Z0
VeriSign, Inc.10
VeriSign Trust Network1;09
2Terms of use at https://www.verisign.com/rpa (c)101.0,
%VeriSign Class 3 Code Signing 2010 CA0
https://www.verisign.com/cps0*
https://www.verisign.com/rpa0
[0Y0W0U
image/gif0!00
#http://logo.verisign.com/vslogo.gif04
#http://crl.verisign.com/pca3-g5.crl04
http://ocsp.verisign.com0
VeriSignMPKI-2-80
VeriSign, Inc.10
VeriSign Trust Network1;09
2Terms of use at https://www.verisign.com/rpa (c)101.0,
%VeriSign Class 3 Code Signing 2010 CA
YT"DNJ
SNws)(
Symantec Corporation10
Symantec Trust Network100.
'Symantec Class 3 SHA256 Code Signing CA0
151222000000Z
190321235959Z0g1
California1
San Jose1
DownloadShield1
DownloadShield0
CUTMU=
http://sv.symcb.com/sv.crl0f
https://d.symcb.com/cps0%
https://d.symcb.com/rpa0
http://sv.symcd.com0&
http://sv.symcb.com/sv.crt0
VeriSign, Inc.10
VeriSign Trust Network1:08
1(c) 2006 VeriSign, Inc. - For authorized use only1E0C
<VeriSign Class 3 Public Primary Certification Authority - G50
131210000000Z
231209235959Z0
Symantec Corporation10
Symantec Trust Network100.
'Symantec Class 3 SHA256 Code Signing CA0
+ojr\`
http://s2.symcb.com0
http://www.symauth.com/cps0(
http://www.symauth.com/rpa00
http://s1.symcb.com/pca3-g5.crl0
SymantecPKI-1-5670
Symantec Corporation10
Symantec Trust Network100.
'Symantec Class 3 SHA256 Code Signing CA
/Y&v1V?
Af$; lq
RkgYLr
20180328055459Z0
Symantec Corporation10
Symantec Trust Network110/
(Symantec SHA256 TimeStamping Signer - G3
VeriSign, Inc.10
VeriSign Trust Network1:08
1(c) 2008 VeriSign, Inc. - For authorized use only1806
/VeriSign Universal Root Certification Authority0
160112000000Z
310111235959Z0w1
Symantec Corporation10
Symantec Trust Network1(0&
Symantec SHA256 TimeStamping CA0
https://d.symcb.com/cps0%
https://d.symcb.com/rpa0.
http://s.symcd.com06
%http://s.symcb.com/universal-root.crl0
TimeStamp-2048-30
Symantec Corporation10
Symantec Trust Network1(0&
Symantec SHA256 TimeStamping CA0
171223000000Z
290322235959Z0
Symantec Corporation10
Symantec Trust Network110/
(Symantec SHA256 TimeStamping Signer - G30
?'J3Nm
https://d.symcb.com/cps0%
https://d.symcb.com/rpa0@
/http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
http://ts-ocsp.ws.symantec.com0;
/http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
TimeStamp-2048-60
U){9FN
Symantec Corporation10
Symantec Trust Network1(0&
Symantec SHA256 TimeStamping CA
180328055459Z0/
/1(0&0$0"
MS SHELL DLG
Decline
MS Shell Dlg
msctls_progress32
SysListView32
MS Shell Dlg
Please wait while Setup is loading...