Upload 17 files
Browse filesas found here https://raw.githubusercontent.com/aptnotes/data/master/APTnotes.json
- 2006.clean.txt +278 -0
- 2008.clean.txt +0 -0
- 2009.clean.txt +0 -0
- 2010.clean.txt +0 -0
- 2011.clean.txt +0 -0
- 2012.clean.txt +0 -0
- 2013.clean.txt +0 -0
- 2014.clean.txt +0 -0
- 2015.clean.txt +0 -0
- 2016.clean.txt +0 -0
- 2017.clean.txt +0 -0
- 2018.clean.txt +0 -0
- 2019.clean.txt +0 -0
- 2020.clean.txt +0 -0
- 2021.clean.txt +0 -0
- 2022.clean.txt +0 -0
- 2023.clean.txt +0 -0
2006.clean.txt
ADDED
@@ -0,0 +1,278 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
"Wicked Rose" and the NCPH Hacking Group
|
2 |
+
by Ken Dunham & Jim Melnick
|
3 |
+
Zero-day attacks, where an attack occurs before public knowledge of a vulnerability is known, is
|
4 |
+
a growing cause of concern for security professionals in the 21st century. An unprecedented
|
5 |
+
number of zero-day attacks took place in 2006, largely involving Microsoft Office Files. Ken
|
6 |
+
Dunham, Director of the Rapid Response Team, and Jim Melnick, Director of Threat Operations,
|
7 |
+
led the VeriSign iDefense intelligence team to track down Chinese hackers for hire out of China,
|
8 |
+
responsible for many of the attacks in 2006. Wicked Rose is the ring-leader of the NCPH
|
9 |
+
hacking group and this is the story of their maturation into significant global threat by 2006.
|
10 |
+
Introduction to N.C.P.H.
|
11 |
+
N.C.P.H. (Network Crack Program Hacker) has about ten members or associates. Four core
|
12 |
+
members exist as of 2006:
|
13 |
+
(Wicked) Rose
|
14 |
+
KuNgBiM
|
15 |
+
Rodag
|
16 |
+
Charles
|
17 |
+
There are also some six other associates within NCPH and two other positions (possibly unfilled
|
18 |
+
positions) whose purpose is unclear. However,
|
19 |
+
Rose
|
20 |
+
or
|
21 |
+
Wicked Rose
|
22 |
+
seems to be the
|
23 |
+
primary leader. Membership rules, recruiting goals and standards are unknown. However, some
|
24 |
+
members appear to be current or former students of Sichuan University of Science and
|
25 |
+
Engineering.1
|
26 |
+
The group is responsible for development and deployment of exploit codes related vulnerabilities
|
27 |
+
in Microsoft Word Malformed OLE Structure Code Execution and Microsoft Excel Malformed
|
28 |
+
BIFF Structure Code Execution.
|
29 |
+
Public Knowledge of a Zero-Day Word Exploit
|
30 |
+
The story of NCPH zero-day attacks begins publicly on May 18, 2006. On this day the Internet
|
31 |
+
Storm Center reports a new possible zero-day attack. iDefense worked closely with SANS and
|
32 |
+
other organizations to analyze the threat landscape as it related to exploitation of this
|
33 |
+
vulnerability. Within the next 36 hours, iDefense gained access to multiple codes and extracted a
|
34 |
+
new rootkit called GinWui. Independent research proved the following:
|
35 |
+
Exploitation targeted a new vulnerability that allowed attackers to successfully exploit
|
36 |
+
computers running fully patched versions of Microsoft Word 2002 and others.
|
37 |
+
Exploitation dated to May 12, 2006 and involved at least six unique hostile exploit files.
|
38 |
+
iDefense confirmed that attacks targeted two organizations, one in the United States and
|
39 |
+
one in Japan.
|
40 |
+
Chinese-authored rootkits GinWui.A and GinWui.B exist in several attacks. iDefense
|
41 |
+
identified the rootkits' source and authors as Chinese actor "Wicked Rose" and others
|
42 |
+
profiled later in this report.
|
43 |
+
www.suse.edu.cn & http://www.study-in-china.org/school/Sichuan/suse/
|
44 |
+
Successful installation of the rootkit requires Administrator or Debugger rights. Initial
|
45 |
+
exploitation, however, does not require Administrator rights.
|
46 |
+
iDefense identified unique malicious code attacks pointing to nease.net and authored
|
47 |
+
several Snort signatures for this traffic. iDefense continues to monitor other domains
|
48 |
+
related to the attack.
|
49 |
+
The original attack upon a large DoD entity within the USA began on May 12, 2006. Targets of
|
50 |
+
the attacker were apparently "Googled" by the attacker. Three variations of a Microsoft Word
|
51 |
+
zero-day attack are involved in the attack. A few dozen attack files are first distributed to less
|
52 |
+
than a dozen targets to identify which version works within the organization.
|
53 |
+
Once attackers identify the vulnerable version of Microsoft Word used within the organization
|
54 |
+
close to 200 messages sent out to multiple targets within the organization within 24 hours. This
|
55 |
+
second wave of attack is distributed as "Planning document 5-16-2006.doc". This code is
|
56 |
+
improved beyond the first variant sent out earlier to identify the vulnerable version of Word
|
57 |
+
within the targeted network.
|
58 |
+
A third attack commences on May 17, 2006. During this period, the Internet Storm Center and
|
59 |
+
others get involved and the case becomes public. In the end, iDefense identified six unique
|
60 |
+
samples, of which three are more prevalent than other variants.
|
61 |
+
The GinWui Backdoor Rootkit Payload
|
62 |
+
Zero day attacks commenced in May 2006 attempted to install a GinWui backdoor Trojan horse
|
63 |
+
and Windows rootkit. A DLL file called winguis.dll and several SYS files install themselves
|
64 |
+
when a computer is successfully attacked through an exploit. Two versions of the GinWui
|
65 |
+
rootkit are installed during several attacks in May and June 2006.
|
66 |
+
NCHP 5.0 Screenshot (GinWui Rootkit)
|
67 |
+
Wicked Rose is the author of the GinWui malicious code. His code and support posts related to
|
68 |
+
GinWui distributions exist on the Chinese NCPH and Evil Octal forums. Wicked Rose
|
69 |
+
associates with WHG and others on this form. WHT hosted version "3.0beta.3" of the "NCPH
|
70 |
+
remote control" rootkit code on May 2, 2006. This distribution of GinWui was largely unknown
|
71 |
+
and undetected by anti-virus companies at the time of release.
|
72 |
+
Versions of GinWui used in targeted attacks of May and June 2006 are private versions, not
|
73 |
+
released to the public. This proves that Wicked Rose either constructed the zero day attacks or
|
74 |
+
sold private code to users that performed the attack.
|
75 |
+
Wicked Rose later documents additional updates to his rootkit code, version .50, at
|
76 |
+
http://rodag.blogbus.com/index.html. By this time Wicked Rose was performing full-time
|
77 |
+
development of this malicious code as a hacker for hire.
|
78 |
+
June 21, 2007
|
79 |
+
Continued US Targeted Attacks
|
80 |
+
Just over a month later, following initial GinWui based targeted attacks, another Microsoft Word
|
81 |
+
exploit occurs on June 21, 2006. A spoofed e-mail is sent to a target containing a hostile
|
82 |
+
Microsoft Word document. Analysis of the attack reveals that it's likely a test file used to
|
83 |
+
identify what version of Word may be running within the targeted organization, rather than a
|
84 |
+
refined targeted attack upon a known version of Microsoft Word. Chinese text within the Word
|
85 |
+
document reveal Chinese characters discussing a systematic evaluation of offsets for Microsoft
|
86 |
+
Word exploitation:
|
87 |
+
RipGof attacks reveal a Chinese string related to systematic testing of offsets for exploitation.
|
88 |
+
Backtracking Targeted Attacks: RipGof
|
89 |
+
In June 2006 another targeted attack emerges, but it's not GinWui this time but a new code,
|
90 |
+
RipGof.B. The attack attempts to exploit MS06-027 to install RipGof.B, a Trojan horse. This is
|
91 |
+
the same exploit code used in the former Zero-Day attacks linked to Wicked Rose and the NCPH
|
92 |
+
hacking group. The exploit code is still private at this time, proving that the author of both
|
93 |
+
GinWui and RipGof attacks are the same individual or group or affiliated through underground
|
94 |
+
criminal operations.
|
95 |
+
RipGof.B is an improvement of the former exploit used in GinWui attacks. RipGof.B attacks
|
96 |
+
included improvements to shellcode that attempts to fork to different locations based upon the
|
97 |
+
address value of the stack to exploit multiple versions of Microsoft Word. Once installed,
|
98 |
+
RipGof.B attempts to connect to enjoy.irdet.com and enjoy.bmwsee.com over TCP port 80. It
|
99 |
+
runs as a rootkit and backdoor Trojan horse and phones home to a Chinese server with stolen
|
100 |
+
data.
|
101 |
+
RipGof malicious code does not exist as a distribution in the underground, leading investigators
|
102 |
+
to look into the original RipGof.A malicious code. Over a year prior to the 2006 targeted attacks
|
103 |
+
RipGof.A emerges in the wild. RipGof.A attempted to exploit the Jet Engine Database exploit in
|
104 |
+
March 2005. This proves attempted exploitation and installation of code through RipGof for a
|
105 |
+
year prior to more sophisticated codes and attacks.
|
106 |
+
In summary, RipGof and GinWui attacks both use the same private exploit code against
|
107 |
+
Microsoft Word and both install rootkit based codes to steal and send information back to
|
108 |
+
Chinese sources. This circumstantial evidence reveals that Wicked Rose and the NCPH group
|
109 |
+
likely began their exploitation efforts at least a year and a half to two years prior to sophisticated
|
110 |
+
attacks that commenced in 2006. Once the group found a vulnerability within Microsoft Word
|
111 |
+
they were able to improve upon it and their targeted attack techniques to distribute multiple
|
112 |
+
targeted attacks and malicious codes for criminal gain as hackers for hire.
|
113 |
+
Timeline of Events
|
114 |
+
Wicked Rose and the NCPH hacking group are implicated in multiple Office based attacks over
|
115 |
+
a two year period. An attack in 2006 used RipGof.B in the attack. RipGof.A first emerged a
|
116 |
+
year earlier using an exploit that is relatively unsophisticated. Over the next year the Evil
|
117 |
+
Security Team, also out of China, creates the Dasher worm and uses the PcShares Trojan in an
|
118 |
+
attack. Wicked Rose gives a recommendation on the Trojan the day it is updated in the spring of
|
119 |
+
2006, showing a close affiliation between Wicked Rose and the Evil Security Team actors.
|
120 |
+
Multiple attacks that take place in May and June and later 2006 are related to privately held
|
121 |
+
exploit code for both Microsoft Word and Excel, proven to be developed by Wicked Rose. A
|
122 |
+
timeline of proven associated events related to Wicked Rose attacks is below:
|
123 |
+
April 22, 2005 - RipGof.A JetEngine DB Attack
|
124 |
+
Dec. 19, 2005
|
125 |
+
Dasher worm and PcShare Trojan attack by Evil Security Team
|
126 |
+
April 27, 2006 Update to windowsupdates.net attack site
|
127 |
+
April 30, 2006 - Wicked Rose Drops out of School
|
128 |
+
May 2, 2006
|
129 |
+
3.0beta3 NCPH remote control (GinWui) public release
|
130 |
+
May 12, 2006 - Initial probing and GinWui.A exploitation attempts against US target
|
131 |
+
May 15, 2006 - PcShare Trojan update recommended by Wicked Rose on day of new release
|
132 |
+
May 16, 2006 - Update to windowsupdates.net attack site
|
133 |
+
May 16, 2006 - Multiple GinWui.A attacks against US target
|
134 |
+
May 18, 2006 - SANS reports zero-day attack
|
135 |
+
May 19, 2006 Update to windowsupdates.net attack site
|
136 |
+
May 20, 2006 - GinWui.B Attack
|
137 |
+
May 20, 2006 - WZT Kicked out of NCPH
|
138 |
+
May 29, 2006 - GinWui.C Attack
|
139 |
+
June 1, 2006 Update to windowsupdates.net attack site
|
140 |
+
June 9, 2006
|
141 |
+
Mdropper.F Attack
|
142 |
+
June 14, 2006
|
143 |
+
Daserf.A Attack
|
144 |
+
June 15, 2006
|
145 |
+
Mdropper.G Attack
|
146 |
+
June 15, 2006
|
147 |
+
Booli.A Trojan Attack
|
148 |
+
June 16, 2006 - Flux.E Attack
|
149 |
+
June 18, 2006 - RipGof.B Attack
|
150 |
+
June 23, 2006
|
151 |
+
PPDropper.A
|
152 |
+
June 23, 2006
|
153 |
+
Booli.B Trojan attack
|
154 |
+
June 25, 2006 - GinWui.D Attack
|
155 |
+
June 26, 2006 - GinWui.E Attack
|
156 |
+
Sept. 27, 2006
|
157 |
+
PPDropper.F Attack
|
158 |
+
Sept. 30, 2006
|
159 |
+
GinWui.G Attack
|
160 |
+
Oct. 9, 2006
|
161 |
+
Wicked Rose reports pay increase; likely in September
|
162 |
+
A Pictorial Introduction to Wicked Rose and NCPH
|
163 |
+
Just who are Wicked Rose and the NCPH hacker group? As it turns out, a collection of college
|
164 |
+
students in China who likely room with one another and regularly support their hacking interests.
|
165 |
+
In-depth research implicates Wicked Rose as the ring-leader of the group, responsible for
|
166 |
+
managing hacker for hire relationships and paying group members for their work as hackers.
|
167 |
+
During the time of targeted attacks in 2006 their income increased significantly, to full-time
|
168 |
+
wages for part time hacking. Wicked Rose, leader of the group, is pictured below:
|
169 |
+
(MeiGui HeiKe)
|
170 |
+
Rose Hacker
|
171 |
+
QQ number is 5372453 www.mghacker.com
|
172 |
+
Wicked Rose maintains a personal site at www.mghacker.com.
|
173 |
+
Wicked Rose's Website: www.mghacker.com
|
174 |
+
Rose is an approximate 20-year-old (2006) student at the Sichuan University of Science &
|
175 |
+
Engineering. In the spring of 2006 Wicked Rose claims to have dropped out of school for full
|
176 |
+
time hacking opportunities. Specifically, on April 30, 2006 his blog entry claims he did not
|
177 |
+
register for his university exam. He performed significant updates to his rootkit code from
|
178 |
+
March through June 2006. He later returned to school by September 2006.
|
179 |
+
Wicked Rose claims responsibility on his blog for targeted e-mail based attacks containing
|
180 |
+
Microsoft Word and CHM exploits from the spring of 2006.
|
181 |
+
Other NCPH-member websites include: http://rodag.blogbus.com,
|
182 |
+
http://www.cppblog.com/charles and http://kungbim.blogbus.com. The main NCPH website is
|
183 |
+
www.ncph.net:
|
184 |
+
NCPH Studio website www.ncph.net
|
185 |
+
Registration information for ncph.net reveals a Chinese registrant:
|
186 |
+
Registrant Contact: ncph studio ([email protected]) si chuan li gong xue yuan
|
187 |
+
zigong, Sichuan, cn 643000 P: +86.13154663992 F: +86.13154663992
|
188 |
+
The main location of the NCPH group is in Zigong, Sichuan Province, in south-central China.
|
189 |
+
Zigong, Sichuan Province, in south-central China
|
190 |
+
The NCPH group (NCPH Studio) in Zigong, China, is shown here:
|
191 |
+
NCPH hackers at work in the
|
192 |
+
ncph studio
|
193 |
+
Left to right:
|
194 |
+
Wicked Rose,
|
195 |
+
KuNgBiM, Charles and Rodag
|
196 |
+
Additional photos featuring Wicked Rose and NCPH hackers are below, captured from their
|
197 |
+
various websites and blog entries in 2006. Chinese translation for each photo are below:
|
198 |
+
"Wicked Rose"
|
199 |
+
From an ancient Chinese poem,
|
200 |
+
expressing the devotion of his heart for
|
201 |
+
hacking.
|
202 |
+
"After you choose the technology you
|
203 |
+
love, you have to research every system
|
204 |
+
and code everyday!"
|
205 |
+
Charles: "Silence belongs to our
|
206 |
+
world..."
|
207 |
+
Charles
|
208 |
+
"Charles always laughs so brightly when
|
209 |
+
searching for program problems!"
|
210 |
+
KuNgBiM
|
211 |
+
"Only we can feel this kind of happy..."
|
212 |
+
Ronag
|
213 |
+
"Behind every successful design, he
|
214 |
+
always has a slight smile
|
215 |
+
Wicked Rose and NCPH hacking photos
|
216 |
+
WHG (
|
217 |
+
WHG is not a core member of NCPH but a close affiliate of Wicked Rose. WHG appears to be
|
218 |
+
central to development of the NCPH rootkit, aka GinWui. WHG is credited by Wicked Rose as
|
219 |
+
one of the authors of this malicious code. WHG is an experienced malicious code author with
|
220 |
+
the following contact information:
|
221 |
+
E-mail address:
|
222 |
+
QQ Number:
|
223 |
+
Website:
|
224 |
+
Real Name:
|
225 |
+
Location:
|
226 | |
227 |
+
312016
|
228 |
+
http://cnasm.com
|
229 |
+
May be "Zhao Jibing",
|
230 |
+
Believed to be employed in the Sichuan province of China.
|
231 |
+
WZT is a former member of the NCPH group who was kicked out during the time of zero-day
|
232 |
+
attacks in May 2006. WZT was removed on May 20, 2006. During this time period the zeroday attacks became publicly disclosed, increasing pressure upon the hacking group. It is feasible
|
233 |
+
that WZT may have offended the group in some way related to zero-day attack techniques, strife
|
234 |
+
over hacker for hire deals, or competition for hacker for hire deals.
|
235 |
+
WZT is a former coding expert within the NCPH group and many years experience in hacking.
|
236 |
+
He is responsible for creating multiple tools and regularly giving credit to the infamous Li0n
|
237 |
+
Chinese hacker (founder of Honker Union (HUC) Chinese group. WZT maintains a website at
|
238 |
+
tthacker.cublog.cn.
|
239 |
+
The Jiangsu Connection?
|
240 |
+
WHOIS registrant data for related domains used within attacks and hacker sites reveals a
|
241 |
+
connection with the Jiangsu province of China. One domain, windowsupdates.net, is used in
|
242 |
+
attacks and revolves to an IP address in the Sichuan province. Meanwhile, the registrant
|
243 |
+
"zhaofeng network" is reportedly based out of Jiangsu, not Sichuan. Some of the WHOIS
|
244 |
+
information clearly contains fraudulent information to presumably direct researchers away from
|
245 |
+
the true identity and location of the attacker responsible for registering the hostile domain. The
|
246 |
+
connection to the Jiangsu and Sichuan provinces remains unclear.
|
247 |
+
Concluding Comments
|
248 |
+
Prior to Wicked Rose and NCPH hacker for hire attacks in 2006, Chinese hackers are only
|
249 |
+
known for their patriotic hacking. This disturbing development reveals two critical threats: 1)
|
250 |
+
motives of Chinese hackers are changing 2) Chinese hackers are regularly associated with
|
251 |
+
sophisticated attacks as of 2006.
|
252 |
+
Wicked Rose implicates himself in his early blog entries and website posts in 2006 and prior.
|
253 |
+
An unknown company or entity reportedly paid Wicked Rose for hacking at the rate of 2,000
|
254 |
+
RMB a month, about $250 USD. At this time Wicked Rose gave 200 RMB to NCPH hackers
|
255 |
+
and kept the rest for himself. Once targeted attacks took place the payment increased five-fold to
|
256 |
+
5,000 RMB monthly with $1,000 a month going to NCPH hackers. This is a significant amount
|
257 |
+
of money in China, effectively paying hackers a full-time wage for part-time hacking.
|
258 |
+
Throughout the summer of 2006, while Wicked Rose was not in school, over 35 zero-day
|
259 |
+
attacks, proof-of-concept codes, and attacks against un-patched Microsoft Office vulnerabilities
|
260 |
+
are discovered in the wild. With Wicked Rose claiming responsibility for early attacks and the
|
261 |
+
lead author of both GinWui and the NCPH hacking group, there is little doubt left as to his
|
262 |
+
involvement in attacks to date.
|
263 |
+
By the end of 2006 attacks become increasingly sophisticated. In one instance a popular
|
264 |
+
PowerPoint file distributed during the Christmas holiday season for the last two years prior is
|
265 |
+
used within a socially engineered attack upon one individual within an energy sector US based
|
266 |
+
company. The PowerPoint file is modified to include an exploit that silently installs malicious
|
267 |
+
code. This same individual receives another e-mail containing a Microsoft Word exploit. In this
|
268 |
+
case only one individual within the company is targeted, and with just two messages socially
|
269 |
+
engineered for maximum success. This is a much more targeted and stealthy approach for
|
270 |
+
attacks compared to the earlier attacks performed by the group in the late spring of 2006.
|
271 |
+
NCPH continues to be a significant threat going forth for several reasons.
|
272 |
+
1. Attacks continue to take place in the wild and are very difficult to identify on a targeted
|
273 |
+
basis. Only the most sophisticated networks and system administrators are able to
|
274 |
+
properly protect and capture hostile targeted attack files before an attack takes place.
|
275 |
+
2. NCPH is a serious dedicated hacking group that is methodical and disciplined in their
|
276 |
+
development of new exploits and attacks.
|
277 |
+
3. NCPH is motivated by both the thrill and challenge of hacking and money as a motive.
|
278 |
+
4. Attacks by the group are highly targeted and stealthy, very difficult to detect and remove.
|
2008.clean.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
2009.clean.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
2010.clean.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
2011.clean.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
2012.clean.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
2013.clean.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
2014.clean.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
2015.clean.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
2016.clean.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
2017.clean.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
2018.clean.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
2019.clean.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
2020.clean.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
2021.clean.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
2022.clean.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
2023.clean.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|