Static | ZeroBOX

PE Compile Time

2011-09-26 22:21:38

PE Imphash

be41bf7b8cc010b614bd36bbca606973

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x0000728c 0x00007400 6.49970859063
.rdata 0x00009000 0x00002b6e 0x00002c00 4.49793253515
.data 0x0000c000 0x00072b9c 0x00000200 1.80494062846
.ndata 0x0007f000 0x00081000 0x00000000 0.0
.rsrc 0x00100000 0x0000ed6a 0x0000ee00 7.59812911891
.reloc 0x0010f000 0x00000fd6 0x00001000 7.89340177287

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x0010df14 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x0010df14 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x0010df14 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x0010df14 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x0010df14 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_DIALOG 0x0010e598 0x00000060 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_DIALOG 0x0010e598 0x00000060 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_DIALOG 0x0010e598 0x00000060 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_GROUP_ICON 0x0010e5f8 0x0000004c LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_VERSION 0x0010e644 0x00000450 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x0010ea94 0x000002d6 LANG_ENGLISH SUBLANG_ENGLISH_US XML 1.0 document, ASCII text, with very long lines, with no line terminators

Imports

Library KERNEL32.dll:
0x409060 SetFileTime
0x409064 CompareFileTime
0x409068 SearchPathW
0x40906c GetShortPathNameW
0x409070 GetFullPathNameW
0x409074 MoveFileW
0x40907c GetFileAttributesW
0x409080 GetLastError
0x409084 CreateDirectoryW
0x409088 SetFileAttributesW
0x40908c Sleep
0x409090 GetTickCount
0x409094 GetFileSize
0x409098 GetModuleFileNameW
0x40909c GetCurrentProcess
0x4090a0 CopyFileW
0x4090a4 ExitProcess
0x4090ac GetTempPathW
0x4090b0 GetCommandLineW
0x4090b4 SetErrorMode
0x4090b8 lstrcpynA
0x4090bc CloseHandle
0x4090c0 lstrcpynW
0x4090c4 GetDiskFreeSpaceW
0x4090c8 GlobalUnlock
0x4090cc GlobalLock
0x4090d0 CreateThread
0x4090d4 LoadLibraryW
0x4090d8 CreateProcessW
0x4090dc lstrcmpiA
0x4090e0 CreateFileW
0x4090e4 GetTempFileNameW
0x4090e8 lstrcatW
0x4090ec GetProcAddress
0x4090f0 LoadLibraryA
0x4090f4 GetModuleHandleA
0x4090f8 OpenProcess
0x4090fc lstrcpyW
0x409100 GetVersionExW
0x409104 GetSystemDirectoryW
0x409108 GetVersion
0x40910c lstrcpyA
0x409110 RemoveDirectoryW
0x409114 lstrcmpA
0x409118 lstrcmpiW
0x40911c lstrcmpW
0x409124 GlobalAlloc
0x409128 WaitForSingleObject
0x40912c GetExitCodeProcess
0x409130 GlobalFree
0x409134 GetModuleHandleW
0x409138 LoadLibraryExW
0x40913c FreeLibrary
0x409148 WideCharToMultiByte
0x40914c lstrlenA
0x409150 MulDiv
0x409154 WriteFile
0x409158 ReadFile
0x40915c MultiByteToWideChar
0x409160 SetFilePointer
0x409164 FindClose
0x409168 FindNextFileW
0x40916c FindFirstFileW
0x409170 DeleteFileW
0x409174 lstrlenW
Library USER32.dll:
0x409198 GetAsyncKeyState
0x40919c IsDlgButtonChecked
0x4091a0 ScreenToClient
0x4091a4 GetMessagePos
0x4091a8 CallWindowProcW
0x4091ac IsWindowVisible
0x4091b0 LoadBitmapW
0x4091b4 CloseClipboard
0x4091b8 SetClipboardData
0x4091bc EmptyClipboard
0x4091c0 OpenClipboard
0x4091c4 TrackPopupMenu
0x4091c8 GetWindowRect
0x4091cc AppendMenuW
0x4091d0 CreatePopupMenu
0x4091d4 GetSystemMetrics
0x4091d8 EndDialog
0x4091dc EnableMenuItem
0x4091e0 GetSystemMenu
0x4091e4 SetClassLongW
0x4091e8 IsWindowEnabled
0x4091ec SetWindowPos
0x4091f0 DialogBoxParamW
0x4091f4 CheckDlgButton
0x4091f8 CreateWindowExW
0x409200 RegisterClassW
0x409204 SetDlgItemTextW
0x409208 GetDlgItemTextW
0x40920c MessageBoxIndirectW
0x409210 CharNextA
0x409214 CharUpperW
0x409218 CharPrevW
0x40921c wvsprintfW
0x409220 DispatchMessageW
0x409224 PeekMessageW
0x409228 wsprintfA
0x40922c DestroyWindow
0x409230 CreateDialogParamW
0x409234 SetTimer
0x409238 SetWindowTextW
0x40923c PostQuitMessage
0x409240 SetForegroundWindow
0x409244 ShowWindow
0x409248 wsprintfW
0x40924c SendMessageTimeoutW
0x409250 LoadCursorW
0x409254 SetCursor
0x409258 GetWindowLongW
0x40925c GetSysColor
0x409260 CharNextW
0x409264 GetClassInfoW
0x409268 ExitWindowsEx
0x40926c IsWindow
0x409270 GetDlgItem
0x409274 SetWindowLongW
0x409278 LoadImageW
0x40927c GetDC
0x409280 EnableWindow
0x409284 InvalidateRect
0x409288 SendMessageW
0x40928c DefWindowProcW
0x409290 BeginPaint
0x409294 GetClientRect
0x409298 FillRect
0x40929c DrawTextW
0x4092a0 EndPaint
0x4092a4 FindWindowExW
Library GDI32.dll:
0x40903c SetBkColor
0x409040 GetDeviceCaps
0x409044 DeleteObject
0x409048 CreateBrushIndirect
0x40904c CreateFontIndirectW
0x409050 SetBkMode
0x409054 SetTextColor
0x409058 SelectObject
Library SHELL32.dll:
0x40917c SHBrowseForFolderW
0x409184 SHGetFileInfoW
0x409188 ShellExecuteW
0x40918c SHFileOperationW
Library ADVAPI32.dll:
0x409000 RegEnumKeyW
0x409004 RegOpenKeyExW
0x409008 RegCloseKey
0x40900c RegDeleteKeyW
0x409010 RegDeleteValueW
0x409014 RegCreateKeyExW
0x409018 RegSetValueExW
0x40901c RegQueryValueExW
0x409020 RegEnumValueW
Library COMCTL32.dll:
0x409028 ImageList_AddMasked
0x40902c ImageList_Destroy
0x409030 None
0x409034 ImageList_Create
Library ole32.dll:
0x4092bc CoTaskMemFree
0x4092c0 OleInitialize
0x4092c4 OleUninitialize
0x4092c8 CoCreateInstance
Library VERSION.dll:
0x4092b0 GetFileVersionInfoW
0x4092b4 VerQueryValueW

!This program cannot be run in DOS mode.
`.rdata
@.data
.ndata
@.reloc
PWSVh@
v#VhL2@
Instu`
softuW
NulluN
SUVWj 3
D$8PUhd
D$,9-l
[j0Xjxf
D$$+D$
D$4+D$,P
PPPPPP
\u!f9O
v%Phd
QSUVWh
UUVh fF
U@9UTv
ED;uTv
MP+ML3
JN#uH;t
SHGetFolderPathW
SHFOLDER
SHAutoComplete
SHLWAPI
GetUserDefaultUILanguage
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegDeleteKeyExW
ADVAPI32
MoveFileExW
GetDiskFreeSpaceExW
KERNEL32
[Rename]
Module32NextW
Module32FirstW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
Kernel32.DLL
GetModuleBaseNameW
EnumProcessModules
EnumProcesses
PSAPI.DLL
MulDiv
DeleteFileW
FindFirstFileW
FindNextFileW
FindClose
SetFilePointer
MultiByteToWideChar
ReadFile
WriteFile
lstrlenA
WideCharToMultiByte
GetPrivateProfileStringW
WritePrivateProfileStringW
FreeLibrary
LoadLibraryExW
GetModuleHandleW
GlobalFree
GetExitCodeProcess
WaitForSingleObject
GlobalAlloc
ExpandEnvironmentStringsW
lstrcmpW
lstrcmpiW
CloseHandle
SetFileTime
CompareFileTime
SearchPathW
GetShortPathNameW
GetFullPathNameW
MoveFileW
SetCurrentDirectoryW
GetFileAttributesW
GetLastError
CreateDirectoryW
SetFileAttributesW
GetTickCount
GetFileSize
GetModuleFileNameW
GetCurrentProcess
CopyFileW
ExitProcess
GetWindowsDirectoryW
GetTempPathW
GetCommandLineW
SetErrorMode
lstrcpynA
lstrlenW
lstrcpynW
GetDiskFreeSpaceW
GlobalUnlock
GlobalLock
CreateThread
LoadLibraryW
CreateProcessW
lstrcmpiA
CreateFileW
GetTempFileNameW
lstrcatW
GetProcAddress
LoadLibraryA
GetModuleHandleA
OpenProcess
lstrcpyW
GetVersionExW
GetSystemDirectoryW
GetVersion
lstrcpyA
RemoveDirectoryW
lstrcmpA
KERNEL32.dll
EndPaint
DrawTextW
FillRect
GetClientRect
BeginPaint
DefWindowProcW
SendMessageW
InvalidateRect
EnableWindow
LoadImageW
SetWindowLongW
GetDlgItem
IsWindow
FindWindowExW
SendMessageTimeoutW
wsprintfW
ShowWindow
SetForegroundWindow
PostQuitMessage
SetWindowTextW
SetTimer
CreateDialogParamW
DestroyWindow
ExitWindowsEx
CharNextW
GetSysColor
GetWindowLongW
SetCursor
LoadCursorW
CheckDlgButton
GetAsyncKeyState
IsDlgButtonChecked
ScreenToClient
GetMessagePos
CallWindowProcW
IsWindowVisible
LoadBitmapW
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
TrackPopupMenu
GetWindowRect
AppendMenuW
CreatePopupMenu
GetSystemMetrics
EndDialog
EnableMenuItem
GetSystemMenu
SetClassLongW
IsWindowEnabled
SetWindowPos
DialogBoxParamW
GetClassInfoW
CreateWindowExW
SystemParametersInfoW
RegisterClassW
SetDlgItemTextW
GetDlgItemTextW
MessageBoxIndirectW
CharNextA
CharUpperW
CharPrevW
wvsprintfW
DispatchMessageW
PeekMessageW
wsprintfA
USER32.dll
SelectObject
SetTextColor
SetBkMode
CreateFontIndirectW
CreateBrushIndirect
DeleteObject
GetDeviceCaps
SetBkColor
GDI32.dll
SHFileOperationW
ShellExecuteW
SHGetFileInfoW
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetSpecialFolderLocation
SHELL32.dll
RegDeleteKeyW
RegCloseKey
RegEnumKeyW
RegOpenKeyExW
RegEnumValueW
RegQueryValueExW
RegSetValueExW
RegCreateKeyExW
RegDeleteValueW
ADVAPI32.dll
ImageList_Destroy
ImageList_AddMasked
ImageList_Create
COMCTL32.dll
CoCreateInstance
OleUninitialize
OleInitialize
CoTaskMemFree
ole32.dll
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
VERSION.dll
|IDATx^
*IIINf
Dcl0~3
VY%RPn
:Wom~_
222-#3
l'F'w#
tB=7ek
hSV/DJ
P@QEd-g
Sn6U^Z)
Xc3f$
g3\{?q
6`,)dhqq
4~<m>V
>9E\qB
mM]R4;
A]5T}x
qQ5jX4
k8N X
9g6uKF
2Xa1eXH
l0&H&6
jKm{.Vk
F\|<1@g
QXF<,0
D P;Id
d?!<+9Y#
^Uq'_}e
sM5V,i
$g\!Qv
?Xg\@O
Qld(J
c`9]@n
QTXdJH
)_c.u1
~>@H:
<v AM{~
=o cSg
:v4[Km
`uOW">
4h4#88
Tz/34,
EKJO*"_#?i
IDATx^
Ldee#-%
+))Auu
/_F~a>rs
566*VN`
2TZZZp
^Q^HI,
+BbbP__
L{%%ew
JHPjjkY
Z6l@;-
wP5q"ZX
;~"AxMQ^
(Y",U3
`2wJB,.9u
*d'_FEI
/.V&yG
Hy bKr
/Ki?cc8
T~Ip5
!"F3d}R
`G2k&A{
e1c&,I
A^0d0C
~-jfvN
g)$g<}&N
###kqqq
111;aaau
ii`~|{
 (ffgz{{|
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity version="1.0.0.0" processorArchitecture="X86" name="Nullsoft.NSIS.exehead" type="win32"/><description>Nullsoft Install System v2.46.3-Unicode</description><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="asInvoker" uiAccess="false"/></requestedPrivileges></security></trustInfo><compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"><application><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/><supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/></application></compatibility></assembly>
0.0;0I0]0j0
111;1D1Z1a1y1
4#464G4g4~4
5+5;5I5W5i5x5
6>6J6[6z6
797C7I7Y7|7
8,888J8e8y8
979D9L9w9
9::T:e:
;!;2;A;T;
;+<P<w<
?-?I?\?o?w?
020T0y0
1#101>1J1P1U1[1f1l1
2'2B2d2v2
4/4o4t4y4
4a5r5z5
7.7q7v7
8!808D8X8
9+9L9Z9
:-;[;c;l;
?1?<?X?t?
1 1$1(1,1014181<1@1D1H1L1P1T1X1\1`1d1h1l1p1t1x1|1
2 2$2(2,2024282<2@2D2H2l2
3"3*303I3O3r3x3
4!4'4+4G4Z4`4k4q4v4
6!6.636B6G6r6
727C7r7y7
99%92999?9K9Y9
:":.:C:H:`:f:}:
:;$;/;7;C;J;Q;Y;g;q;v;
;2<C<n<~<
=+=5=M=^=d=
>%>:>F>i>
?;?L?X?^?d?j?
0>0J0Y0b0k0}0
1.1=1G1S1
1"262M2Y2x2
3$3M3_3u3
3/4q4~4
455:5\5
5=6B6O6k6v6
8"8T8a8
809S9[9a9h9
:%:*:0:6:<:J:V:\:i:p:v:
>\>d>t>
?'?,?S?_?
0&0h0v0}0
1=1I1f1u1}1
1D2N2T2Z2h2p2v2
3+353[3c3j3
4)494?4K4U4i4
505Q5e5l5
66+666?6K6S6Y6d6
667@7X7j7
8/8;8L8R8X8k8u8
9%9+939>9D9`9y9
:#:::L:j:q:|:
;#;';-;2;8;P;_;
< <D<v<
==%=+=B=
>+?M?t?
D0M0S0_0
0 1,121>1L1S1[1c1j1
22,292D2K2
31383C3N3U3k3w3
5)565L5~5
7 7'737V7a7l7s7
8@8Q8Y8
919F9S9
:+:@:u:
; ;8;A;U;k;p;u;{;
<P<e<y<
=)=0=H=P=Z=n=
>*>5>P>a>
>$?4?9?L?
2Q2n2x2
8)8/878?8G8B:s:
2 2$2(2,2024282<2@2D2H2|2
0 0$0(0`0d0h0l0p0t0x0|0
NullsoftInstXk
|2>n'/c
(SC#%G{
IP)kviRR
cl[INhn
9x}~5~
xcjFK<
kR>w\#
1*4#I$
Ww,k{}
up)c;I
:<B gW
"MkCA
\fvHip
$.vF^H
f|\y(=
R|/%Z5
)"q[s9
Tk@A=n
R&yPVq
c.i_cP
5#S=>;
PeT<Sa
L2KLp/o
!)#o^B
fw|NJZ
6G*p],q
Q1xO(;
<Gdn,8
d5f"n%F`
L)|M|,
knx:)|
JIRe6^
~7Ttt`
XCVXO[
wk5}d
t#3Y66
RX=.j+
NQ0=zN
A#0/qX
R`4cqKk;
'&EwcD
+8dsf}e
hc`@Irc
Sz)sah
i$/x2K
fZ,/;*
A41fgh
v"0vgQ
[j$u:T
X'une
e+?lux
E^}j{o$
4Wt<B
8;)%h|f
QUjDF|
G5TVNp
AU3!EA06
7E_o5X
0Ng2,!zA
d6qw^}
FwY5$4aR
z.?BW+B
F`},@n
-ej[tVg
Wk~agl
~.8L.U
p8w#+j
"V/lMO
~wR%4G
ZkeQuz
}R07"`E
;:0|xs
*MW*{s.I
Az`3&]B
Y&V-),)
]H`Lt)
n4[H`_
Q7bXjh
sQ+2Dp
"IGKme
\jOexs
iuxu@%N
P50qw<
V::s
7,8;4G}
km{f&SjX
.1%\lt7_
B5W[O6
`8>qRl
S5=QJ
\0Jx[2k;
]#j3R
j/X(sQ
k^AE<F<L$7kK
c!<&q~y
bRqskJ!]|
BAu/(t
MN(kwWr
./6*235s
eE)KelC
]`BpARA
wYj6K_
v)JY0
]gr&KL
!;)'{a<
v6a>je
n[tlrd
gF9ay^
l~J<sc
uS&mRC
:Sd::vf0
wE\}X5
wCZ,,v
{2Zt.E
gUH'>09L
XpY|8N
x>+mD@f^?
<9b$D0e
|3GPGS
nEN(ch
G7'kcU-Z
mI@nl(W
XVx^\Xd
yP,^{w
9 Fm~\
mFUTaU
SNR^#e
MZ(D<J
c+8CJ>
]PR15L
3Q.#1p
)z^r^N};
)#B.T|2
G<d=rz
|0FN7\
OyCeo.
[;leBU
BP#z)q8
ohCGSEk
z="kZ
QXEd*U|N
]~0c'p
Y;4h~Y
:@CMv*
}y$?3]]Co
Vz{8BN
nYr@5r
0W)39RQ0Dc
mtq2n"
*2-p`]L
Uq06>;
7""5oAc
nN+J >J
/rK-y[
HN^#)f
VH8d6|!
\a$90+
D}I.O1+MG
T'-q>D
dX*D3r
9AZIhgR^
tf'xLFCs
<Sm~ph
p}P={X
SC;iI%
$."kl()
rczFeQ
x[zv~X+
lakaMc
Lhmep_
sD<QW>
Pw}X^j4
@`vEy?n
:wKV^
Nfk~E8
0LSyX8
ZZh?J0f
F%4^Rue
?o~w}r
~o* b$
c}{n8_
U@8a@"
@++'f
'm'cpC
3ZVGNC
WQZ)i[?
i>%~&Wr=^
I^c[{h
>E'+#q
B\1m/<V~
I>be[d0
Q/ T)
k#E$ND
t\zYgU
w2G8n
`P;ktc
hhtSE:
vu0JRg\
tynp!,`AR
C$3|90GX
[QrzO|
D|d3+*
q4\B9_k
|ra,l0
-?HIk}
)KT59>N
331PcM
5N |/s
g= ~zR
RFsln!F#
Hn9K^g|Q
{nkL":_
81C?;H
ED=G2kJT
q5o'W3
3$yJd}
?xVGq8
((^{FP]
qrZV'V*D
du`1g:
utICB[mC
@%mvy_m
Q|Bw#KL
1>V#
19Lhf5
B2L_ujJF
[eYPk^V
2Q`/C:
{C7QJ
1U!D\,
A|q6zY
g\BS9Qu?
W}~~\CF
m7o=ls
o)w)0*
"_YY8Y]
%GoA ^
SxQb'c:
/qh?w|
=V%<5l
=%~V|yp9
zjUPTX
sZ_qXu
NA2}NcE
T*]!sH1
6ict7j
QDFG+8
n=!ytK
1%'bd:
Msy\n'
p!Vse;
~!\p6J
@<uytm
EFUANe
'K`xb-$
%fO#>E
CMtAn
4G+T%j
/6n~)3
2Alnwp5
vtdW?Q
{2b\^Q
t#>9h}
*<^=)24
kL=*}_
svl*U]
Xkz4%Y4
Dzp:wQ
RuThjkQ S@&
yqXR\d
OIt@;9s
O@bd|W
0q]cC9
S{LYR`
|$FXMUl
x1t#V)
qm:sl:n
fyg!,)
kk#UXU
?/,P0(
2,J!=c<<
xd&PPr
3!=dpe
c]r {L
UbqLf^
=;A#,T
#=JEpQyf
/Bb_T/
_'Nqp@f
65~}-jf
Y7a802
JHj/=<
BLD(,CFTw
prd:pGd2:/F
4>Z!3f
A.Ia9'
. wRc(
pI<74G=>/
&Hd9]}
),f`C{_
^ Njvp
\.'zkHU
8Cfy&*
%Mzvgg
gzQ$| IMv2
Neju}jD$
jWp}%]
Ahrb6W
UgB$ !
MP2[reb
D\%P|j
#IZWnP
N=945HL
("rL]CB
i*.nrK
A:eEob
_mIIr:
f5]\4'
H}AU3!EA06M
XOg;Mm
"lECeB
61ax.]M
w2.gh&
Hhx;<^;n
eYZP3|RV
Q;jI)
*+m1`th
3WvVXL
q{n9/[6q6n
f)Y'>X
6m_w(!
%kILl[
P8C>jH
u2M~t2
nFWww
Bje@q{n}PS
[2!KQE7J!='7
aQ;?@Hr
'%AB>5
7f;D>?C
N&sz3
MD#G5W
c@aPDm
0"-1y?\;
P-Kz/F
K|Ug`g4
k7BX'WW"<
*3[!3e
':m3l
4CiYZlc
sw}@lw
wD6R6F^
$H@^|y
l5=W|N
R6=t3!M;(
=]SJa"
mfW623~
SZp3Bt
TE2H8B
kfOyNl(
m%_E)D
//U?j!
\Ha[E1
?[CY{/
{WC@FeKD
Ya9`JF)
Rj8'5f
qV2oVfj
MpRJV,
O^P4H^
vqkHKs~2
O^R~~#c
V,|n,;$
j._Q-S
h3c{0m
&cs`L(
+/KyUa|
K+,glS<
-'yo(II
#y;$J_
W.~0o$
H3xyO^u
Z]ZOGH
=UeZA7
Fzpbzfy=
eRQA]
JpBhI,}
)v8*b"
\S"`AQD
NIMg#k
%Flh5.D
w-?B%Zd&
k3nlXi8
PF[ElQ
/67W2z
QNcn^q
[]"z*G
)9e~')
Fl-Y1(7
4vt'AC
rCz-z\
u<X158Sp
yREsX
);vp4)U
)1Ks^?U
VNqJ^u
jDo U2
U>g^',B
5^nFE^
Hw{$*
of}X1c
{~ATiV
Xg:RdZ
TD+j"0
{iP:,b
ITT{9
EA2{V
oPzyRI'y7A5
_o0b rDC
gLLiJvj
<P,>8r
YKIKLP
-9Hz>Ta
GJs[4b
TT$Oy?[
#ic{a*
{^c2)
]3P1Xt
A}tTL;(
D".W\6
l)|JQ!
~kASk_
\wG($
bNlrv
E,ecZ
}4gbQXi\_
sEE_Fz
&NzvmhFH
|m{D;+?
@ke No]K
^8#H q
_x{4Qi
{8KsRB
7PB~z!
A0HR;W
HS3otc
54)71a
W_(>I>
2{4!M}m
uC?Ut4
DnaR@%y
Nhu^sf
jW}P`)
T27`9,:b
)c"HJ\dH
p}f^qx
DxNQlX[
DC0Ao?3
g)>4)w
1w|uKD
}au"\9
#e8V<,
Y|`GF}
F.9r/8&
b5Y-yx
*i@"So
4C;y]3
/zWUUfgJ95,
'Ka-_x
|Wutle
2!gU9y
:7`?$
Ckz@uQ<
"y(sqAAO
v].WR)
}?a*_
O>KSUV
u_m0hS
UAK)EZ
w^D[h
|`k[*"
-:o'2>a
TH:f7!,
bmNW>l?7i
MiS9]AB{
0))1)-
hov(z^
YW/yZe
g=,,BK
~qjuIn
nx7fKh
>zCq?
3#:PgCA
@r|Y)$x
UN/@e%c
#^)'FS@1
GDJNEqm
64'z8{-f
~eMCZ}k
lDup?c8
*UGrZ
+<W$c#
[y?j>Z
%g7{_O
Sm/'_iP
SN2@/c
XhOUHd
pqQuH0
(LmLEC
_q,Y@{
K3+)RFq4Y
|ap,4&
--L^>K
(ib\9\
pQ%{_](
,*sAs:
/FS~8HS
75I@?h7
np{S|[
?b!.9b;-L
Wy2*=:
VU/-$_
*]9Iw!
GUk.`E
X:;CH!2
=/af4!Z
x,v14G
,b9$f<z
zRmOVb
(7?C5g`u
!yUa6H
=_,rfC3
/Q&HgM
E,h,hT
pfx|Qge
|W~GFa
_rFaC$T
B_$u{zy
ur}h9+
V`N1d{
<Bc]SW
RC\#=:y9\g
V&OC2qi
SbB+B\
K=Eo^A
whV'2t3
H|SZ37
m<odI'_x%
Wi_AbW
bM{$>4
&8m:NC
d1Y\ .
LQf+_*+
nk5uI7
e>a&2s
NqZ%[
%XGKm:T
G=Kijm
;`>nR=I
:atAWtC
V:tkU
2LSf(3
nPFNXO
| 8De`Cm
_LPtu<
m!Wx*t
cy*P1M>'_
zWF<#
d|Q'9F
I{?F[{*~J
J2a!wa
8lQbQJ
RbXJ}O+h$I}C
gBDo2Y
I3Ca :
%Z5n}`=
C+?OY?
B#L2b*
sFHl\F
,HJ86x
Q3,jyY
dso5Ln[uEk
63uu6|
}O;Kn@2
JwGvwdwG
sBv'dwb
/ ($,"*&.!
704261
f@'`00
sq8Jc}
@ZY-a"
uK!};1
y3w:9^
u>acWGW
}#|.T
9nlx|$
SQ-QqI`
e5;=6By
;fw3{[Hn
ZXbOR5
KLJ+FT?
s@'cERG
`yf{ha}
_vjG\e
#>bJ>rH
BS\eq5
/xqAW
iBGzOS
\tQtA)
f5vm*L
81@"?pFa
bc("7m
gDA-~_
+2ltR2
hrFV>e`
4i:]ox
8,n4,-
x~leC\
<x1uyn
PSTJLv
zss!~w
+pqeU4
uQXV8,
7aR=aG
l`(s!
nT|BWA
u$S7Cf^|
l,~t4Z
^edw!F
}&FOPLU
c6 WM-
F/yYIS\
\/Oj!+
Pt}8:{
4?fTs
g'BqN!7
d5~)m!
|X^xR<
Yjh,5P<*
1i8vSmN
Q~3zpVD
)soWP:
0:4s#Y37
f|xe66
]:jV6G
.akC<n
R'n-Tf
RW\TTt
3!+xVb
X>1O^Oe"
b}h^{
y8T&x{?%
')-WR\8)Pe+0
F6`BW=%P
KgX*YM
!RMI.!`
ZXgvuF
Y<~pjz
Sa\+&\Z
3wE3OH
f/ry6<
r]i2Ze4zrKE;
F'Hv7yKGE
k X-^&O;
|{MF=N
$l!lDk$
%meCE9
d0+k+N
[Dq[};
\P,~!(
8:,l^enU2
[6C=`<
b[uJS2`
pv/KfI
FAX6U0
sbkWtW
w[w'u4
oW[8*,
I}xKUL6
=Ywf_3w]
+I|i>`
>Mp)75@
}3>,f|
y20Yw4O
ACQ="Vy
Fva7)g
8Fhr&%
<qY=K<
K0JYJ_
cn,/=2
OtzpS
[n`|ws
2w_}+w
GaG:>^
\;8S@k
[No6'[J(B
A*OP1LE
s7?W~NT
/S[8j'?
=#2vGY#
Z(c& f
^/5=Bz
s$Fq$0
P&Z))O
pww7]t
'*zHm2
}WIKMi
ykW]{cdl
h(5|$6<n
x`Htc)
uR.^97x
da}h$k
r3(Wr|1Z
<IUFHj
7!%U?
ZiDgD$
0DXjaL
erdckY
Emk&"
O[m-SJ
5Wn8ukl
gf8Z/r
I]CyL&
NB,h?i
^dtHn;
&iGY_i
4zDKRj
lgL>a
rQ^!zrtI
gPpij0
%O{kz]C
e>!~QD
6Znd]z
I="y/A9
kXG$TH&G+
V?HX8ZEa
dO~Os"k
w[r$9p
5XQxRp
V=Xe\z#
B\^dol
u8?_DK#
9w*v3Z
WIW1j/1
Z_-B#ON
3`j2dN
DsrJJ9
=R\[I!
nE<f2}b
$0&2rB
AtN>4_
(Z pTz
$#SIPg
4;%FF9
Qgc>6Hwo8
c`=jH4
pR2gXS"]3k
~J,`wx
8K|+P
q{S8>J
iCxL.\
bx~|Y]<]
'sE7a;
<[lH9;,
1bckvu
dUIWP9
U=yXEq~
%*71f]8
R\qsH|
VO'Okx
3E?@J6~
?v||oj
^i$mhd
*,esQN
n&,kkd"
'jyM"@m{
/;Ux.m
eXj*{lY
%oZv)E)
S:cdP$
~fb5Bc
cBU\P"
(2D(9a
2kkmT>
Nfxh[!b
Cf3^m'?
li"dD}
~jQkNu{`4
LN%=f!
'^X7@H:
Lv.i'&M
'H7(BVjJ
ZTdTtR
lFOvE*
zvW8^#i
^PXJ`5
Zl*&^
RoFy7V
h0R^J)
LmNhb5
*PA^EP4
P5|_Dk"
)V-kCfN
MG)p~zdj
xJ7xaQ
&`gqc?
rF$_Pq}
[ERqs
nAia~A
zxIa%1
II)!;-
rT32~+
\m^n8<
8[S{7=c
OCE}YO
Nxnj_Y
n#m]y
nC?s\1
9*eioF
mOHD'oU
EtI#6@
ki)YN~m
0w~\q:N
>o8~opC)
w.Y`.I
q{*f9;W
>./[??
j`#_!x
;D7Qf?N
3~;~oD
sV.TeI!
vV_Ep&kG
OC{'YR
1kxCia
)OsC(Z
vii\cXo=
fdik1l
]&uPeK
FM:#Y.
p!e}?Vk46
}\gO|z
K@'|3]p
np=:)U<Ndt
:{po:d
K1>{N1
FN[p?m
YzTTG3*]u
+cdlD+H
7">pqT,
YH6MB>
/Z@4fu
{Oszq<h
n=.y3X{IO
[:&R,4I
Y<)n.7N
!;zmlD
-T]p,a
d<SQA$
WD4CB9
8z[y+Ltrv
*Wku%U>
N~GR4o
5)}c*d
$?/:[f}
I[bJU
8syga
GF,\qS
4ZWPh"#.
M'*Zu,
+P[ag>T
<HWMJ:
icMi?Z
ACL"wQ4m
v*-a7Z
oHNR"-A
9YFLsj
>O%,h#
Rl:wK[
$:Cb>A
hxoZpD
VVTF)zD
THE%ZB&
$H! B0X
Z^N% 7B
5:q)( 6
q1j0[s
jn@A.R:*
kbd9d!
,Rv0<0I
8;&DkL
M1Z_Mu
4@=^av-t'
jF*dRR
f!G6T4
d7b+uvD
ym,-$G
X`(1g#7
l\O=~H
`mv;lV
MM3vr4
ZG^0#j
2x?KY6$e6
!)7cJN
S5!ZhAo
%@ipO~
~^L=ST4o-
C+;@g)e
"\}]@*
[}3?X@u
R<1-;~"
_PTeNHSE8
u~(TO2Tu<
MK;BE8
@xKx!P)
n 'W2h:ZoQ
EuJu)>Tws2
'#Lq_~
tb}:0p0VY
doFJb>
A~0+{E!z?
/\~P(Ul
agH@ac
JOS0^(
`HP'Cc
}a"m_"m^
l%v%M4
>1#GQ1
hzjbM,
F =XM5
1Xct|
:C2O,r
]OG3;)
:IY+Fz
YO|{_Z
(4M.BR
pt~@G=
WE${wu5
;a]L~b
mL-kpt
Qjk4JS
,Me=8|Xi
5G/ %M
f&2C*xA
9qkrttR
IrJd^^>M
!D`(8mfuCDz
ZKrU4s
Ch+h*'.
j)?w&Z
HGqFc|(
[W110-
iC}]a;
*iE\O&j
J:;]SR
6mhh+*
VQQ|ZX1
1|.\1_
9EP^8.
h47e38
RR^z>3L
Da(2 ~
lTJFd
i3Toc!
@5~TeMH]
t9M{EJ
lk:D]/
o3h6h*j
ivkvdHgv
\tl\k[
rJTDTD
WvE97jjb
exe."LK
(Z2|YE
AM2}K:$
<3G6p,
~0_=\|B
>HG3gx
n1sp,\
4>C4(o
A\:t8#
$-rI,/
?#rIxj8k
+aYgA#_
2m6:_d
Sw=?mm^
=z>L|o
&%=n;p
cyVz0$
poLwoLK
:f9\?\
\)HSkSs
<"w`qM
z{&zRLuk\
*CUO6+
kQm=~-
h;g*aW~
3<(kxH
!u{a-G
"~q*i(
Z6d9 NY
Qe1P)$
lF3&{`
*>:r/kX"
_dbO.&
Kj5;t;
>K;s)4T
LnA.,`q
h:ovS1
[9JUmK$
M:s#z2t
<(m2J+
$D$o2h
O6*m%UeK
(uzs6j`x0
GO67bv
2Ata}+
b~T<1
i0#TR!oN
-Q##%!
Ve7{2I
;Mfsh2]r?
u+5EgQ
b"f.Wj
P#aJ=[
7s23",F?
e>HmFL
g`LA52
hjuoH&
PB74}b&cjqK
?\x&[<S
;:uS`<J
RZ*jQtAl
TkJ9PM
gDl.|
5i/zZ
A($:NM
.Mbj9I
^k}t#\6
?a(PxI
.`oA*1
ZAIO<d
6TRm8t
^#.Z%q
uK8xdeU
xP|}|u2
T`@i_,fS
gC%rDd
[giqh?
G+|[lCLb
ruPM,m
Iw!^N5^
ht0+Cu
QBxJK_
o25Y,qP|
(R(J^be
?E7|9l
L jC<5
,gXMc0
=P,{`"
^dU+xk
e&*|y@
*;s+O/
M0nSk7
UwGHf[
f59:|F
2>_m&*
F5{>a4T]A8(6
v(7QCj
BJafP7#
nZ)p)r
lqy*lm;
W/[\}?
%Ob:{W,l
+[$Z!K
)&&S?\
yC:3T8
lc9[6g
V;7]jj
?W2LFC
bzIpOz
xF~9 S
mDp40@{
_WmGnb
!<|s<<
BuF?)i
C<?B~[
o7N+3v
-@SV5b
Y\UheK
r\tvS6
U)jtJxW
Ne~W!/58
RtzECY_
[;R[iH]
th8GrF3O
4ti-<_i
#[AMYXOh
]Xl8{tgD
S7[B0+!
GnH1-Y
i($&5v]BcY
u`O\h,&
!4l4Fc
PMO(ld
C`R1!0
9"\R=Oi-
r<Q[9O
=]Gzz2
1m<p3Y<
45^IQJ
n O`#f;
K@[|5f
irU9[]
F#'$w
]n"x}:
E8(NIE
4n#isJ?c
"1`r[U
H6Fg(K
':dF_(
lc' 3c
ykmI#Fv<E
%Wk}#I!e
w=y?Ycc
6v;T?)
hb1t'q
6tBJU~
4[g6ugp
/u1 azrp
0Vq15*
@7f<E3_}
x7YR94
$KD(Gt
jF-dA'pK
2TQ(pGn
GC#O}\b
[~ lVe
?e.z%'H
Jj, D?
7Jo`F(
*a .Q
nFF/XO
'8(Zd>
l,0Q>/
,eEA^h
OrZ^c"G
A!N.iA
!\D~t
=eq+5.
x$2(kn
l}l}qB
)C:{{S
>[C#zS
-e%&aH9
)(uVO
:[ajz
oOEfq=
MQ:!{{
tB7_*u
2II71l
adf!)Hi,1
/ u4`xJS
n`*p#`
~$mV_
+iq.eo
a_})Q7
hJXW_]-W
}YTX'v
LVlX D
(3Eg,r9
Inm4p3IU
IriY27_
Tp5f2;
lTuFwa
PY[mr9
5bfYbk
SZ9%bdW
%0uyyhBl
:wNcyN
{ymLf/
pMF%[Q"X
Yp?,NTy
roY2>y
]~ux0m
WP"=4(
AaY[^a]
<4=Vf&0N'
VIp*W;
g<DIK
/)?'d|
R;~l6W
/#(r3E
RjZ<.x
1J[\kS
v0geulE
X}WIhp
NG6pV]
B&(c'G*
Xke=^
7"pPih
8D}ci<
b;@dk=!
_LA^:4
!"5p>u
e@~m*U
:Z:%IS
R>GT[1
qQ%(w@Q
Fdpv2NB
9v%TcP
q`6(w'
`aYg-pT
b[ENYY3Y`g#
!A:imi
4CcV{p
Ew<7>7
,_g[t|
!HNBNd
Z^|kV
>YI#`_=
V:|"A^e
Jv",fC
^22YE2
Ka{KK`
dV@5kx
0mfVe
TI:5.p
>T[DFh:r7
-d_-S:)
`GIy^i!
%9)Qh|<U3
1.Jbr*0
_GMs<v
v=?e:]"_
]+bCJ)
n{\a;&|o
B{yBMk5
!pU1hw
RqVlD_
Jv.+l
0gQo}O2
X9vVbmN
|D#%Yco
tf2*|3V;
Q/BN[D
|O3fUr}/
(McJr0
?=u&(Z
BkiDI{q
BWm/<2
L9[ts:w
|#Ph8z
qkH6_/
@GC?"
}t+AjT
rF3xcy
y=sWqE
579gS~
|jCW;&
#%86(3
+A,k<lI
A @:HT<.
:(^w0l
\(Y xh
Ib:,.]
4P@-]ik
$!0yX[
Q~}F1Y
~9*k}6
"MEZ+I
FcS3gI
aRrDCE|w
z-VLh
Cn?GdD
MK&?)V\c
_]eW@`,
NFqT$U9
v7LH0Z8(
\~<~xQ
mow;b5
NvZG~5
5V xBt0A
mIgR1Rc
I2* l
\gGq(Er
f$zonZ5
H&%A")
_39?rsx.
z 0>mgG
o{}b~[
~L7(3O
~fi@T12bN
H}).~&
Rz~dGJ
U}5^tCK
/p@xHu
IuD>:=
suMF/a
ZIki~!H
ZfN=qi
09c[y1
Y>B-"""
%_>$dk
o+R;++
xF@!67
+KG'CAn
]{`'ccj'
Z3,*VGa
LV4KdCYeL
\fTYUN
PETqUJ
|kdhY^
,"")IN#iZ
GH[GUP
>r(hcF
{wn8wi
I`(i`(ydQ
]`(}a(
DigiCert Inc1
www.digicert.com1!0
DigiCert Trusted Root G40
210429000000Z
360428235959Z0i1
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA10
[K]taM?
SA|X=G
http://ocsp.digicert.com0A
5http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
2http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
jj@0HK4
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA10
240924000000Z
270924235959Z0
Delaware1
Private Organization1
51288621
California1
San Francisco1
Discord Inc.1
Discord Inc.0
http://www.digicert.com/CPS0
Mhttp://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Mhttp://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
http://ocsp.digicert.com0\
Phttp://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
C{n&[Ui
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1
ahzZ0?
20241216190601Z
DigiCert, Inc.1;09
2DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA0
240926000000Z
351125235959Z0B1
DigiCert1 0
DigiCert Timestamp 20240
ymIXa+
z9XxGT
Ihttp://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
http://ocsp.digicert.com0X
Lhttp://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
MzE @t
(f*^[0
DigiCert Inc1
www.digicert.com1!0
DigiCert Trusted Root G40
220323000000Z
370322235959Z0c1
DigiCert, Inc.1;09
2DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA0
http://ocsp.digicert.com0A
5http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
2http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
DigiCert Inc1
www.digicert.com1$0"
DigiCert Assured ID Root CA0
220801000000Z
311109235959Z0b1
DigiCert Inc1
www.digicert.com1!0
DigiCert Trusted Root G40
]J<0"0i3
v=Y]Bv
http://ocsp.digicert.com0C
7http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
4http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
~qj#k"
DigiCert, Inc.1;09
2DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA
241216190601Z0+
/1(0&0$0"
7"O7].
DigiCert Inc1
www.digicert.com1!0
DigiCert Trusted Root G40
210429000000Z
360428235959Z0i1
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA10
[K]taM?
SA|X=G
http://ocsp.digicert.com0A
5http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
2http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
jj@0HK4
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA10
240924000000Z
270924235959Z0
Delaware1
Private Organization1
51288621
California1
San Francisco1
Discord Inc.1
Discord Inc.0
http://www.digicert.com/CPS0
Mhttp://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Mhttp://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
http://ocsp.digicert.com0\
Phttp://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
C{n&[Ui
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1
ahzZ0?
20241216190601Z
DigiCert, Inc.1;09
2DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA0
240926000000Z
351125235959Z0B1
DigiCert1 0
DigiCert Timestamp 20240
ymIXa+
z9XxGT
Ihttp://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
http://ocsp.digicert.com0X
Lhttp://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
MzE @t
(f*^[0
DigiCert Inc1
www.digicert.com1!0
DigiCert Trusted Root G40
220323000000Z
370322235959Z0c1
DigiCert, Inc.1;09
2DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA0
http://ocsp.digicert.com0A
5http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
2http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
DigiCert Inc1
www.digicert.com1$0"
DigiCert Assured ID Root CA0
220801000000Z
311109235959Z0b1
DigiCert Inc1
www.digicert.com1!0
DigiCert Trusted Root G40
]J<0"0i3
v=Y]Bv
http://ocsp.digicert.com0C
7http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
4http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
~qj#k"
DigiCert, Inc.1;09
2DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA
241216190601Z0+
/1(0&0$0"
7"O7].
logging set to %d
settings logging to %d
created uninstaller: %d, "%s"
WriteReg: error creating key "%s\%s"
WriteReg: error writing into "%s\%s" "%s"
WriteRegBin: "%s\%s" "%s"="%s"
WriteRegDWORD: "%s\%s" "%s"="0x%08x"
WriteRegExpandStr: "%s\%s" "%s"="%s"
WriteRegStr: "%s\%s" "%s"="%s"
DeleteRegKey: "%s\%s"
DeleteRegValue: "%s\%s" "%s"
WriteINIStr: wrote [%s] %s=%s in %s
CopyFiles "%s"->"%s"
CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d
Error registering DLL: Could not initialize OLE
Error registering DLL: Could not load %s
Error registering DLL: %s not found in %s
GetTTFFontName(%s) returned %s
GetTTFVersionString(%s) returned %s
Exec: failed createprocess ("%s")
Exec: success ("%s")
Exec: command="%s"
ExecShell: success ("%s": file:"%s" params:"%s")
ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d
HideWindow
Pop: stack empty
Exch: stack < %d elements
RMDir: "%s"
MessageBox: %d,"%s"
Delete: "%s"
File: wrote %d to "%s"
File: error, user cancel
File: skipped: "%s" (overwriteflag=%d)
File: error, user abort
File: error, user retry
File: error creating "%s"
File: overwriteflag=%d, allowskipfilesflag=%d, name="%s"
Rename failed: %s
Rename on reboot: %s
Rename: %s
IfFileExists: file "%s" does not exist, jumping %d
IfFileExists: file "%s" exists, jumping %d
CreateDirectory: "%s" created
CreateDirectory: can't create "%s" - a file already exists
CreateDirectory: can't create "%s" (err=%d)
CreateDirectory: "%s" (%d)
SetFileAttributes failed.
SetFileAttributes: "%s":%08X
BringToFront
Sleep(%d)
detailprint: %s
Call: %d
Aborting: "%s"
Jump: %d
verifying installer: %d%%
... %d%%
Installer integrity check has failed. Common causes include
incomplete download and damaged media. Contact the
installer's author to obtain a new copy.
More information at:
http://nsis.sf.net/NSIS_Error
Error launching installer
SeShutdownPrivilege
~nsu.tmp
NSIS Error
Error writing temporary file. Make sure your temp folder is valid.
install.log
%u.%u%s%s
Skipping section: "%s"
Section: "%s"
New install of "%s" to "%s"
RichEdit
RichEdit20A
RichEd32
RichEd20
.DEFAULT\Control Panel\International
Control Panel\Desktop\ResourceLocale
Software\Microsoft\Windows\CurrentVersion
\Microsoft\Internet Explorer\Quick Launch
*?|<>/":
invalid registry key
HKEY_DYN_DATA
HKEY_CURRENT_CONFIG
HKEY_PERFORMANCE_DATA
HKEY_USERS
HKEY_LOCAL_MACHINE
HKEY_CURRENT_USER
HKEY_CLASSES_ROOT
%02x%c
Unknown
RMDir: RemoveDirectory failed("%s")
RMDir: RemoveDirectory on Reboot("%s")
RMDir: RemoveDirectory("%s")
RMDir: RemoveDirectory invalid input("%s")
Delete: DeleteFile failed("%s")
Delete: DeleteFile on Reboot("%s")
Delete: DeleteFile("%s")
%s: failed opening file "%s"
GetTTFNameString
Version
#+3;CScs
MS Shell Dlg
MS Shell Dlg
msctls_progress32
SysListView32
MS Shell Dlg
VS_VERSION_INFO
StringFileInfo
040904b0
CompanyName
Google LLC
FileDescription
Google Chrome
FileVersion
132.0.6834.84
InternalName
chrome_exe
LegalCopyright
Copyright 2025 Google LLC. All rights reserved.
OriginalFilename
chrome.exe
ProductName
Google Chrome
ProductVersion
132.0.6834.84
CompanyShortName
Google
ProductShortName
Chrome
LastChange
c1a6c2d428b5b484febdecda9475aba38de5a502-refs/branch-heads/6834@{#3391}
Official Build
VarFileInfo
Translation
Antivirus Signature
Lionic Trojan.Win32.AutoIt.4!c
Elastic malicious (high confidence)
ClamAV Clean
CMC Clean
CAT-QuickHeal Clean
Skyhigh Clean
ALYac Clean
Cylance Unsafe
Zillya Clean
Sangfor Clean
CrowdStrike win/malicious_confidence_100% (W)
Alibaba Trojan:Win32/Runner.acc2a874
K7GW Trojan ( 005be4d31 )
K7AntiVirus Trojan ( 005be4d31 )
huorong Trojan/BAT.Agent.cv
Baidu Clean
VirIT Clean
Paloalto Clean
Symantec Trojan.Gen.MBT
tehtris Clean
ESET-NOD32 Clean
APEX Clean
Avast Clean
Cynet Clean
Kaspersky HEUR:Trojan.Win32.Autoit.gen
BitDefender Trojan.GenericKD.75593447
NANO-Antivirus Clean
ViRobot Clean
MicroWorld-eScan Trojan.GenericKD.75593447
Tencent Win32.Trojan.FalseSign.Iajl
Sophos Mal/Generic-S
F-Secure Trojan.TR/AutoIt.aousf
DrWeb Trojan.Inject5.15294
VIPRE Clean
TrendMicro Clean
McAfeeD ti!5D07AD572A6A
Trapmine Clean
CTX exe.trojan.autoit
Emsisoft Trojan.GenericKD.75593447 (B)
Ikarus Trojan.NSIS.Runner
FireEye Trojan.GenericKD.75593447
Jiangmin Clean
Webroot Clean
Varist W32/ABTrojan.IVQG-0483
Avira TR/AutoIt.aousf
Fortinet W32/PossibleThreat
Antiy-AVL Clean
Kingsoft Win32.Trojan.Autoit.gen
Gridinsoft Clean
Xcitium Clean
Arcabit Trojan.Generic.D48176E7
SUPERAntiSpyware Clean
Microsoft Trojan:Win32/Wacatac.B!ml
Google Detected
AhnLab-V3 Clean
Acronis Clean
McAfee Artemis!C3D89E95BFB6
TACHYON Clean
VBA32 Clean
Malwarebytes Clean
Panda Clean
Zoner Clean
TrendMicro-HouseCall Clean
Rising Clean
Yandex Clean
SentinelOne Clean
MaxSecure Clean
GData Win32.Trojan.Agent.LYISJ9
AVG Clean
DeepInstinct MALICIOUS
alibabacloud Trojan:Win/Sonbokli.A9uj
No IRMA results available.