f6f8e7fe35251fbaa921d07ace3f06d53d27a270377578961226858ae23865dc

Summary

Architecture IMAGE_FILE_MACHINE_AMD64
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2017-Oct-23 21:30:53
Detected languages English - United States
Debug artifacts C:\devel\projects\bink\build\bink2w64.pdb
CompanyName RAD Game Tools, Inc.
FileDescription RAD Video Tools
FileVersion 2.7d/1.300d
LegalCopyright Copyright (C) 1994-2017, RAD Game Tools, Inc.
LegalTrademarks Bink and Smacker are trademarks of RAD Game Tools, Inc.
ProductName Bink and Smacker
ProductVersion 2.7d/1.300d
Comments Thank you for using RAD Game Tools!

Plugin Output

Info Interesting strings found in the binary: Contains domain names:
  • cacerts.digicert.com
  • crl3.digicert.com
  • crl4.digicert.com
  • digicert.com
  • http://cacerts.digicert.com
  • http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
  • http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
  • http://crl3.digicert.com
  • http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
  • http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
  • http://crl4.digicert.com
  • http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
  • http://ocsp.digicert.com0
  • http://ocsp.digicert.com0X
  • http://ocsp.digicert.com0\
  • http://www.digicert.com
  • http://www.digicert.com/CPS0
  • www.digicert.com
Suspicious The PE is possibly packed. Unusual section name found: .l1
Section .l1 is both writable and executable.
Info The PE contains common functions which appear in legitimate applications. [!] The program may be hiding some of its imports:
  • GetProcAddress
  • LoadLibraryA
Suspicious The file contains overlay data. 5632 bytes of data starting at offset 0x5f5f0.
The overlay data has an entropy of 7.71333 and is possibly compressed or encrypted.
Safe VirusTotal score: 0/70 (Scanned on 2026-05-07 07:00:07) All the AVs think this file is safe.

Hashes

MD5 01017d458d3c36f04f29d9e0fd3cb33d
SHA1 3e3beb1c3e36b050b2e5550727b6014cf283d99d
SHA256 f6f8e7fe35251fbaa921d07ace3f06d53d27a270377578961226858ae23865dc
SHA3 8a34257e100910e069193a9164d176359214718228627b1a953d8e2d45f25c22
SSDeep 6144:ohB2mTqq47b5Ny3ZgEq2MbM56GXa7N70Jy91hDCQxl8tQTGeHwb15VY1XH+Rt:ohBoyuEq7oJO1hDXhTV0VY5H+Rt
Imports Hash b33d68137cda409f7e363b859c629177

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0xf0

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_AMD64
NumberofSections 7
TimeDateStamp 2017-Oct-23 21:30:53
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xf0
Characteristics IMAGE_FILE_DLL
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE

Image Optional Header

Magic PE32+
LinkerVersion 9.0
SizeOfCode 0x3fa00
SizeOfInitializedData 0x37a00
SizeOfUninitializedData 0
AddressOfEntryPoint 0x0000000000037F68 (Section: .text)
BaseOfCode 0x1000
ImageBase 0x180000000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 5.2
ImageVersion 0.0
SubsystemVersion 5.2
Win32VersionValue 0
SizeOfImage 0x7d000
SizeOfHeaders 0x400
Checksum 0x6aaf5
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 52dcc5bf0502fd225f6ababae693f29d
SHA1 dee5da87aeb5821fa9371328a51a0730b5998188
SHA256 9210e3cce12764848784a1d6153aa0b4dd8fad3810ea5dc8148b84bc95d69f93
SHA3 cf2da4c7b379fff154c9a81ad7dc7699b0f94be8536d04d99d641da0527b7157
VirtualSize 0x3f9de
VirtualAddress 0x1000
SizeOfRawData 0x3fa00
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.48789

.rdata

MD5 e9ba5f5044be420968988b05ba452edd
SHA1 d0449179eda8dc506bd580037d1f7c982c5de330
SHA256 6ba45566d877bdbfd60907147acdbf8a08e411772f3336dc3cb05e83cc7b3525
SHA3 6bbd00fd25ca420991404c3999239ba5dd1c332f3ca225cf44081bf6c1e681c6
VirtualSize 0xa952
VirtualAddress 0x41000
SizeOfRawData 0xaa00
PointerToRawData 0x3fe00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 6.20029

.data

MD5 952403870c6ed87505fa4af334bfee3c
SHA1 23b806983fea4e0a3ebc5bc5785c8e2ced5e1109
SHA256 d99d8a7703c08ace00be6be1cf8e93f157216ca8a8bcdfe00ecc1d24023ffd4d
SHA3 ff9e7ccf65e036fd467f927bbc84195ccda0be63ab4d43907d1b81e07d9bd87a
VirtualSize 0x254c8
VirtualAddress 0x4c000
SizeOfRawData 0xac00
PointerToRawData 0x4a800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 7.30239

.pdata

MD5 f0716082e7d7ac1dee702508459a49c5
SHA1 f6d6238a7b56993eee21b84c71cd7934f76c9aec
SHA256 eaa6b9e3b23099c5586f22b9a824acd23cd1e1d4a8fd85c88e8f1f0dcd6bb579
SHA3 f68c33b7068399a8b18a73100908d56e250b362044bd5ccf00c18b2803b24c10
VirtualSize 0x2274
VirtualAddress 0x72000
SizeOfRawData 0x2400
PointerToRawData 0x55400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.32558

.rsrc

MD5 266b7a1018fd97e57ef0b491fbd7f6d9
SHA1 942baec003f1f0f50fdcedee8cdefdd1a21d8471
SHA256 0d102d3a6a12435d70add8b0dcd54fd3f379c0286126b5ffbc3c387fc9f83b03
SHA3 22c07119b8de50863f11ac04d19e199f0c326a9a5dd6647066f09323b0cd0dda
VirtualSize 0x4c20
VirtualAddress 0x75000
SizeOfRawData 0x4e00
PointerToRawData 0x57800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 5.40602

.reloc

MD5 60d929d2d59c8ac6bccd189d7bce142a
SHA1 bab5c8e019e12b1ef84880ae8faa7e84193e1474
SHA256 72158da2c58cdf2e1d78108894e2b4fbdc2e934bb5cb56ca208b50ddf3891e65
SHA3 cf6d8b4584850ad7851b3be474e1a582146e80aaac35d7698dccf194fb1e21a3
VirtualSize 0x6ea
VirtualAddress 0x7a000
SizeOfRawData 0x800
PointerToRawData 0x5c600
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 1.55339

.l1

MD5 46384b29006961ae16522e85b7b81e60
SHA1 a87ef01cc8c78f8bb1bc4796a70f9b11a249aaba
SHA256 c0f78ed1b915b2307748e58ff8904f76ff74697cbb0f4316fe1045965ce02c6a
SHA3 597867313d669a3d9e5632254b38b0e9a5940247887ebcb65099d620f6ccb5f6
VirtualSize 0x1600
VirtualAddress 0x7b000
SizeOfRawData 0x1600
PointerToRawData 0x5ce00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 3.6964

Imports

USER32.dll GetWindowLongPtrA
GetTopWindow
GetWindowLongA
GetDesktopWindow
GetActiveWindow
GetWindowThreadProcessId
GetWindow
MessageBoxA
KERNEL32.dll GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
GetSystemTimeAsFileTime
RtlUnwindEx
GetWindowsDirectoryA
GetSystemDirectoryA
GetModuleFileNameA
SetErrorMode
Sleep
GetProcAddress
LoadLibraryA
GetSystemInfo
GetModuleHandleA
GetCurrentProcessId
OutputDebugStringA
QueryPerformanceCounter
GetTickCount
GetEnvironmentVariableA
QueryPerformanceFrequency
CreateFileA
SetFilePointer
ReadFile
CloseHandle
RemoveVectoredExceptionHandler
WaitForSingleObject
GetCurrentThread
InitializeCriticalSection
LeaveCriticalSection
CreateSemaphoreA
SetThreadPriority
ReleaseSemaphore
RaiseException
GetLastError
EnterCriticalSection
AddVectoredExceptionHandler
GetThreadPriority
CreateMutexA
DeleteCriticalSection
GetCurrentThreadId
ReleaseMutex
ResumeThread
CreateThread
HeapAlloc
HeapFree
HeapCreate
HeapSize
InitializeCriticalSectionAndSpinCount
WriteFile
HeapReAlloc
HeapDestroy
GetLocaleInfoA
FlsSetValue
GetCommandLineA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
EncodePointer
DecodePointer
FlsGetValue
FlsFree
SetLastError
FlsAlloc
GetModuleHandleW
ExitProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapSetInformation
ole32.dll CoCreateInstance
CoInitializeEx
WINMM.dll timeBeginPeriod
timeEndPeriod
timeGetTime
waveOutWrite
waveOutPause
waveOutRestart
waveOutReset
waveOutSetVolume
waveOutUnprepareHeader
waveOutOpen
waveOutPrepareHeader
waveOutClose
1911.dll Initialize

Delayed Imports

BinkAllocateFrameBuffers

Ordinal 1
Address 0x51c0

BinkClose

Ordinal 2
Address 0x8d30

BinkCloseTrack

Ordinal 3
Address 0xa190

BinkControlBackgroundIO

Ordinal 4
Address 0xa570

BinkCopyToBuffer

Ordinal 5
Address 0x7850

BinkCopyToBufferRect

Ordinal 6
Address 0x78a0

BinkDoFrame

Ordinal 7
Address 0x8630

BinkDoFrameAsync

Ordinal 8
Address 0xeb60

BinkDoFrameAsyncMulti

Ordinal 9
Address 0xe780

BinkDoFrameAsyncWait

Ordinal 10
Address 0xeba0

BinkDoFramePlane

Ordinal 11
Address 0x8550

BinkFreeGlobals

Ordinal 12
Address 0x8c60

BinkGetError

Ordinal 13
Address 0x4b10

BinkGetFrameBuffersInfo

Ordinal 14
Address 0x4e90

BinkGetGPUDataBuffersInfo

Ordinal 15
Address 0x5070

BinkGetKeyFrame

Ordinal 16
Address 0x8870

BinkGetPlatformInfo

Ordinal 17
Address 0x9020

BinkGetRealtime

Ordinal 18
Address 0x9600

BinkGetRects

Ordinal 19
Address 0x97c0

BinkGetSummary

Ordinal 20
Address 0x93f0

BinkGetTrackData

Ordinal 21
Address 0xa1d0

BinkGetTrackID

Ordinal 22
Address 0x9eb0

BinkGetTrackMaxSize

Ordinal 23
Address 0x9e90

BinkGetTrackType

Ordinal 24
Address 0x9e70

BinkGoto

Ordinal 25
Address 0x8980

BinkLogoAddress

Ordinal 26
Address 0xf630

BinkNextFrame

Ordinal 27
Address 0x86d0

BinkOpen

Ordinal 28
Address 0x7660

BinkOpenDirectSound

Ordinal 29
Address 0xc110

BinkOpenMiles

Ordinal 30
Address 0xcab0

BinkOpenTrack

Ordinal 31
Address 0x9ed0

BinkOpenWaveOut

Ordinal 32
Address 0xafd0

BinkOpenWithOptions

Ordinal 33
Address 0x7700

BinkOpenXAudio2

Ordinal 34
Address 0xf640

BinkOpenXAudio27

Ordinal 35
Address 0x2abc0

BinkOpenXAudio28

Ordinal 36
Address 0x2b3b0

BinkPause

Ordinal 37
Address 0x9260

BinkRegisterFrameBuffers

Ordinal 38
Address 0x5000

BinkRegisterGPUDataBuffers

Ordinal 39
Address 0x5020

BinkRequestStopAsyncThread

Ordinal 40
Address 0xe380

BinkRequestStopAsyncThreadsMulti

Ordinal 41
Address 0xe390

BinkService

Ordinal 42
Address 0x97f0

BinkSetError

Ordinal 43
Address 0x4ad0

BinkSetFileOffset

Ordinal 44
Address 0x4b30

BinkSetFrameRate

Ordinal 45
Address 0x4b20

BinkSetIO

Ordinal 46
Address 0x4b50

BinkSetIOSize

Ordinal 47
Address 0x4b40

BinkSetMemory

Ordinal 48
Address 0xa540

BinkSetOSFileCallbacks

Ordinal 49
Address 0xd090

BinkSetPan

Ordinal 50
Address 0x9dd0

BinkSetSimulate

Ordinal 51
Address 0x4b60

BinkSetSoundOnOff

Ordinal 52
Address 0xa390

BinkSetSoundSystem

Ordinal 53
Address 0x4350

BinkSetSoundSystem2

Ordinal 54
Address 0x4400

BinkSetSoundTrack

Ordinal 55
Address 0x4b70

BinkSetSpeakerVolumes

Ordinal 56
Address 0x98e0

BinkSetVideoOnOff

Ordinal 57
Address 0xa380

BinkSetVolume

Ordinal 58
Address 0x9840

BinkSetWillLoop

Ordinal 59
Address 0xa550

BinkShouldSkip

Ordinal 60
Address 0x8680

BinkStartAsyncThread

Ordinal 61
Address 0xe370

BinkUtilCPUs

Ordinal 62
Address 0xf7f0

BinkUtilFree

Ordinal 63
Address 0xa5c0

BinkUtilMalloc

Ordinal 64
Address 0xa5b0

BinkUtilMutexCreate

Ordinal 65
Address 0xf810

BinkUtilMutexDestroy

Ordinal 66
Address 0xf820

BinkUtilMutexLock

Ordinal 67
Address 0xf880

BinkUtilMutexLockTimeOut

Ordinal 68
Address 0xf8a0

BinkUtilMutexUnlock

Ordinal 69
Address 0xf890

BinkWait

Ordinal 70
Address 0x90e0

BinkWaitStopAsyncThread

Ordinal 71
Address 0xe490

BinkWaitStopAsyncThreadsMulti

Ordinal 72
Address 0xe4a0

RADTimerRead

Ordinal 73
Address 0xced0

1

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x2e8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.45319
MD5 224788054b9f9e08a23e994ca9a2ea64
SHA1 55fccd736dab0ba5ef76de347424cde93896c2b3
SHA256 89f0b649400bf3ee0139a4d49e756c417673043b2dd3406d1d5fc47d3dd019a3
SHA3 5da30dd23496fe1d9d7c13f14d8f9db41cb65fa214c27a4263f338dbe38f7b85

2

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x128
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.87921
MD5 af5690f4a9a59ab0ff543531e3c46d93
SHA1 ba23344c0a6840de37703c3cd58541f4e93f0df3
SHA256 514a4e7a082bcb6baf808493539c3ce04efdf365cef52af98caa2c524bfcecfe
SHA3 7d6d1b6daad287f07e159ef8fe1ebfb193d314472ffa5db486c2c6a80b32facc

3

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0xea8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.547
MD5 dda2662346cf4db128435d587a948071
SHA1 837470dd088a5cc3ea960d4c17d536ade09ece7a
SHA256 35249900143e28433b80ff85cb1c041c1135fbb95feb90e8b7e19f6914b1f6b4
SHA3 03753c25153d8aa30b801477e9b79bdf2b6a645a98c71df50191f3d1e07a490a

4

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x8a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.43362
MD5 b34fc3928fa775c2defbaaca84936c2c
SHA1 cc7b238e16d3c74d31735525875e501fddae3816
SHA256 dbf15a5b11758af41056065dc2b42a39b59c308cfd8ea5ea68685ad6b56cc26c
SHA3 efe1f55c29b30952120edaf9ad762bc4b26e024276b647c28d7bd2c4368b1a7a

5

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x25a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.3384
MD5 cf79ab97333dfa246cee35c4d7254d25
SHA1 9bc4616df66f194ff973582f61a57319e836c5b0
SHA256 af07251ba27414946e01441262444c7443561a21a22b6c1fc2f3cd542ad0d8de
SHA3 317be6ad03df3f6fd7a8a15bcc8c0f47cf2cae79dbb19c3217a25a55626f40e6

6

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x468
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.64299
MD5 233b33f66a00ea5bc01dea92a94d8787
SHA1 dc835ada02bd18201fc1c01206a9285ea58387c2
SHA256 c53fc98a37dcc77ee8ca8c427d0964f048f96d1842cb08312ae69bae4524f019
SHA3 89c5580917729ccd7c0787a63c0d46f66afa32c8782e8e91bc00a879062698b6

3 (#2)

Type RT_STRING
Language English - United States
Codepage UNKNOWN
Size 0x8e
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.02662
MD5 38361bf0eef197315ad1af6143b2c4d6
SHA1 652a1abc1f995665071c34746527d09dc71670df
SHA256 a604ac9fbdcd13a2b70b5d8045380181c44d5ed0e15e713345c080956097dc5c
SHA3 d6516e29949277fdfdb89f63b6f4166ea9ff96c44cc61aacfac2bb1ae4d2dcd2

101

Type RT_GROUP_ICON
Language English - United States
Codepage UNKNOWN
Size 0x5a
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.83326
Detected Filetype Icon file
MD5 5bf7ee62a4e56abe86703f85267ad6d2
SHA1 377a1f8d2973daf573cc88c90c3e71667831f734
SHA256 e35441f95c8c9b1eb36e993d9f4b786cbab6859033930a84e8a4fa9c3a2fe52b
SHA3 87b4a55b5c21dcc7160683bdf9447043ca7a82b8e2e2f2942afcc2bf90eed71a

1 (#2)

Type RT_VERSION
Language English - United States
Codepage UNKNOWN
Size 0x3a0
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.50726
MD5 7c4052ac1d9d098ae04717153ba80d73
SHA1 07a33e23807520622bb80ef1a57963d2203f2236
SHA256 97b6b101f304153cee4211fa8743ca326986a542cfcc4c46c5a868260361fa36
SHA3 497793cb36d41379fc06625a9e3cf6ee7dda6b3933c010a012e5f38468646faf

String Table contents

1.300d
Copyright (C) 1994-2017, RAD Game Tools, Inc.
2.7d

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 2.7.3.0
ProductVersion 2.7.3.0
FileFlags (EMPTY)
FileOs (EMPTY)
FileType VFT_APP
Language English - United States
CompanyName RAD Game Tools, Inc.
FileDescription RAD Video Tools
FileVersion (#2) 2.7d/1.300d
LegalCopyright Copyright (C) 1994-2017, RAD Game Tools, Inc.
LegalTrademarks Bink and Smacker are trademarks of RAD Game Tools, Inc.
ProductName Bink and Smacker
ProductVersion (#2) 2.7d/1.300d
Comments Thank you for using RAD Game Tools!
Resource LangID English - United States

IMAGE_DEBUG_TYPE_CODEVIEW

Characteristics 0
TimeDateStamp 2017-Oct-23 21:30:53
Version 0.0
SizeofData 66
AddressOfRawData 0x478b8
PointerToRawData 0x466b8
Referenced File C:\devel\projects\bink\build\bink2w64.pdb

TLS Callbacks

Load Configuration

RICH Header

XOR Key 0x3fc55b84
Unmarked objects 0
C++ objects (VS2008 SP1 build 30729) 27
C objects (VS2008 SP1 build 30729) 78
Imports (VS2008 SP1 build 30729) 9
Total imports 123
ASM objects (VS2008 SP1 build 30729) 10
137 (VS2008 SP1 build 30729) 37
Linker (VS2008 build 21022) 1
Exports (VS2008 SP1 build 30729) 1
Resource objects (VS2008 SP1 build 30729) 1

Errors

[*] Warning: The WIN_CERTIFICATE appears to be invalid.
Leave a comment

No comments yet.