dccb023b4e5ab166c9d4a243f89cfff763883e9324c167e88195437231415349 7z.exe 46061cdfb09beff1ea582100fea612ed17a719fac3ffd6f6d60bcd6590b4ff19 actionlint.exe 749840a640909a3c0e14e7241e08529ca13789c801d60581b5073f76a377d898 age.exe dead8343a96855b5343d9f1fa7144a7ce463005a0fce5b8bebaf720bc376b327 algernon.exe 44dd87501aa7af490a94d28d33f0511f491d75b35f987a35ac4671e73b5b3c7e alist.exe 113d83c12b8230ec5fa3de422a60e99dfe25a82d2edf8e2d490e201780e13c5c anew-rs.exe 402e2dbadad280d9737d17f89d441d34fd6ee54b06871007babd4987e726ef1d anew.exe f6510c7f5a710b2f3921d4628b73c3a92eeec9f965d8c613534056c489558281 arch.exe 2d42eec434d0426eed49faab9a2aafb2402d5952f2e03feb7f79ff0253649462 b3sum.exe c26fd88b667d89edf657ef48517eb346a93204738e4eab4bd4cd01524cc8a185 base32.exe 761caf474c6da4766addbb0d31a44e36a76ff318b9eb759744d872068e3d3bd6 base64.exe 5ff327d7e1fc2a218c7c7acb5085021ec0604fe2cff9a1cb485414e93ecc055a basename.exe cc101fef4ea421199efc778774ca17b92d7ad82b8c89993e31c56a8529d52959 basenc.exe 6e5ce8c594228883b2d0c70999eef487bd25a0ca0fd1f2efdf34c87b2b6e3a93 bat.exe 60fd9ea8490799048e42afda6c90369f3352ee89d75aa94b759f72f8e55ecdfe batcat.exe 47c017bab2e5c82e24271077e78edb8be87e0dce609a447a222f2a614e2075f9 bin2video.exe e3689d56f06ec0fb2b494a3e288bed13857adf37e8ec31f1450202efb7f31b7e botsay.exe 0db25f4da65a25279156b20886a7b883c91010217f0cf392e7c30735ced856f0 brook.exe f774c01adc7d8b7ae3c868510aa7cb7ac33904aaa95ea5507c8a71db3d8bf910 brook_windows_amd64.exe 869b2f1d5fdca1c76cf4a2c2ea637f09c4bc0438465333b522d1250f17fa61de brutespray.exe b7d1d63b3b7d368a34566af8b41c8ebe08d1be94998fb49947e6379fd546499a busybox-unicode.exe 2437c884f1903f35242547bde632f676e53928bc5f6c6afc70d9fcdd269be133 busybox.exe a344d4906e719aeeebb38f1198e06b3f943d63c41267eeb45110456284fc543f cat.exe 24c90370061e1aedb90a405ba0c0f762dbd4babf7393e9afebb3a59eab0f12db certstream.exe 831bfba38bf0cdae39cc6c5249a700b7e6387aef6987ee52b783dcf3df8e4a6f cfspeed.exe 5358baaebf7c0a5d775578d95089d2d8754f0df6a09252e8d5f3fa51e3b586ea cfspeedtest.exe 5add617a1ea71ed2507e631bdc86a0b306115845da22f748491b9fcc4732e439 cheat.exe 4df37495c404dba8025b71a18d0c58509368e3d45eba9bc8096cba2b161fc459 cksum.exe fba8c5fbd90233d40b6dba8856d63826131a1a91229915db3294e14b5c295815 cloudflared.exe a869757a156e24302c56786f2227dbd75a8e590dcde7a5185b7faca8098e975d comm.exe 80928c1f76f7eff78fffb20615410389cf80cad27a37573606f02922ec676149 coreutils-rs.exe f3861c7158c96d956b7cea132d004cf6a17a5ac6da63d5c5f012b86a4003e496 coreutils.exe 7419bdc0ec65700fbddf55d5533462aa394e8255b2f7b39da34b97e0a349f202 cp.exe ceafecbec7cfe50ea0ce31cb47d3538baa773695c9f692f948bb391c395817e5 croc.exe 9ed9b568df9f592b2a1b03b0334b60e99d3835490e9688878aa09b42e3bc143a csplit.exe 160499fba907f1ff53ab540b7952bc71034fd6005ab89f8ac7fe68eeab904fd4 curl.exe b5bd8142e253a7ca9b443d4f7af2bbf531d92838026dcef5731e0d45ec6d31b6 cut.exe 47d02a95885b1dbccc7ddb9799bd744e55e62e98de253983f9bdfa46a04a0495 cutlines.exe 96b6dab89694f88f37e1beb6732a8fec42f9807bf125045ca8b9b6d639732eee date.exe 1e92cb0009bab8e258466b96f9f0c38e31b5db0938ceb58456fd48a01eb626bc dbbench.exe 161fb3cb2d28f2cd2bd97d84c373c13b1487293976ae1e91120686261512b7a9 dd.exe 200ea189afc123f69a255dc7446bab86987394e9d9286b271adbb9c1fcc9de7e ddns-go.exe 357824a9aeaaccd610b1a829c0a18889857f7290b6706b354251d8a455efa6c9 deprun.exe f85d79617a51394182dc752bcc24d02492be98d5c9ee883da998eacdf7367091 df.exe aac03db7c94c6f8c52129740e772ac6f0b178a7a0239f4eddf9f7e93330d7ab8 dir.exe 6b8c2b5c86ef9ed2898b377b4f51e7fb62565d77fd9d6a449e4e9899a3083c96 dircolors.exe c8bbe2d3eb81ab1735c630443906ca394942fff7e1073e703f7c6a8ff847f651 dirname.exe b715441eec752b4d249ed0a55889eb02391165405190e3d5c089262957f43270 du.exe 399f8756c9e678c9602b91fada39fbcae93c70bd47dbd5e2b66237f5fb44dbc9 dua.exe 3af61883974cd4b8f90f60dbce0363e79be3b3b0ce601457fac9759b9c4d3f72 dufs.exe 1cd5c1820de9f0a251e163b54c774aee8cd6d4338a371ec586c74d605e1c861c dust.exe 3847f6b721a6690e582f131695a22ab23ee9992ea2a41d8fa5e46a18d8728826 echo.exe bc3211f0c9d1241fccd84179fe35d21bff3c93efa8794e98351b1cd1380b98aa eget.exe d966259f11c87a53f4d61bb2e3b89a2ad560e28235ef9ae341969e4c5f524da5 ein.exe 3fbf1bc481b5619631a4149fbe988bbfeb1671e59bd58f6d95d3ff1db856e322 env.exe 5c3be3af47f9ba3de710dbe30fde23c9f5087f10f86b7fc0eee6ee8cdcb2ec0d err.exe c3440a275c5d3937268307dcac098872a31d4fd8167a6f1bd7945a0b660b7aec expand.exe feee48f4bcf8275c8c1b73e66eba4ec35cf5d60830bb4a4f30e04470002e8daa expr.exe c9589bc67e99862db366b45fbf15df6b1d8888c509ec76dcb47fccea0af1c410 factor.exe e4139db515bd0a69120319e63299d5dce063f482f983d8d800c22c0ca2e0cf35 false.exe 11e231f2815d2b37d8d3fa2d02c2438590a2ff0c555546cf28f89bf7ab6072b4 fastfetch.exe ca4fe795c67726907b1fead2a9ec28aa045a91b656a55c11116fc46ed0cac6f1 ffmpeg.exe 2e95fbf259a4fe6d917967b073e16989251b95b1b46c410db2a6bf1cfef9f26c ffplay.exe ba21a486e5006328e7eecf68201a32b4d0d45f6c815ccbc2359f53951da2a497 ffprobe.exe 4592c41ba5db6432154e5739b57ee216192f119865d97ee50807582c0ff5c084 find-rs.exe 97b72a0d8599ca7dd276191b069a3998aaeb1393377a5311c326a0e04041f7af find.exe 62159136160754c762e89063349da147bf1ee109b86bbf8878eee1ce10c4f164 flashfetch.exe e7f94d8f4879d5370a64202f7e5f76128fddc6f30dbe2324ab0203203d603a09 fmt.exe 7eddd9f549bc38e55cfb2128ca0b6d1ab902c7a5c167991ca2b7bef01efbb086 fold.exe f1179d3f69dce174c295ca2f58f03d4822d678505ef8f4e1350e96b72438f04a gdu.exe b3a4a575da227fcbc395785547d675722e6b9a6f4c66cf06e1086c204faf3ea1 geodns.exe 0de0ad66e84978d00af799deaa80f0dcc61bce06fa27043b17303bd06139dafc geoping.exe 27508e284b7473bbb3d6d0376de7976a813bf06345ce395098446fff4e2bce62 gix.exe a198a3e7900e2437b96853a7fb20c0065d4a438538a353fdf5cd84d9d00a94b9 hashsum.exe 6215143d0455df133e8655838bb05a5d597e3328abfc751639297108944f7869 hcloud.exe d11b30655a7b44d0b18a24f707d0a0fec8c331be09f4395e90ac09ccf799db35 head.exe 42cf5c66efbabdcc17c9f335b4ca0be427822030e9159c4fe4da9af6acbcd395 hostname.exe f109e70d4549b25e19ab6d69c409b8626ee8c8a526e611e79d5dd103ff57076a hyperfine.exe 40982579854cb384114a4abff1b5b3cf172a4e2fba4baf9cd73d5dac57cdf2cf inscope.exe 05a7dd2b3730dba33d6c769ab875764797674ee8445ae6441783eb2f04b51787 iperf3.exe f7d343030f5ab8089fbdf44bd815c2ad7256210b23e3db8b0a6a18471f6940b9 join.exe 310bfa08977e7f109a7fee439083a870d4d945f2ccf7881cf7f0ba9ce67aece1 jq.exe ef4bacc1ae8c12fe0a1254ed82db3c3596fac3c20d2b6ebd31101e3177fd21b7 jwt-cracker.exe e0266ea0deaa8bde43bb123433142d834a3d7384d7c3af8a7fc382446478fd50 legba.exe ba7225ab833494d0ded3e59a1a34397c7db9e085be86f46e249c01f2bf0bc060 link.exe 333f4162be027326c9cc5c470e3b9c6baf6e3820e5c26dd47f49de841688d50a ln.exe 8104255471dc4f45640c7e9a349850ad93cb92f0fcc6382cea3f3c1c63b288f7 localxpose.exe 79f81bfa37f0b059b3fb32044617a54ac6118056ff3c22033b718a6705732fd8 loclx.exe 4d60a0d17109bffebe9ce686f9b38aa9e88dbe55152dfbd0eb6ce07a7f2920f4 logstation.exe 121a011e1e0aaa89d75beabada5502d6a8f5203b4c20254b2a4b8d8e129e4327 ls.exe 4df5e188fac3b983db5bc63dee8d35ed35b811e8fa691c7bf140ef628b3772f6 micro.exe 33063d192ffc8f30dbb921650e2c597df272fdd119d005da56b63e3e63bbc795 miniooni-windows-amd64.exe 0484bd8dfe8d343bea450d8bce314c7b451aba1f8136fcc39a2318e384444e28 miniooni.exe 2fac631c0b6c10edb0135d5d862021699eac68c07e15fb0ecee1a9c8ea1a5c32 miniserve.exe 7ffeb10395cc4191fdd227d14534d670764eadc61470badb5062913fa3dc982d mkdir.exe 672ffafb5518f1ae94985a86d45e877ce6e344318cf531547137da3db91e7456 mktemp.exe 4eef3858b9cd77dfa924122765cf95f399ce9452f8df6d69e1a973fb99e8f1a2 monolith.exe 5e120e3176f478126c65b203b924ba9f794a80e082dde02ed94eae101d9e0298 more.exe 9f813a4e82abc15cf3ec7e2d7a695b088d9c29a686ae305e8145764386bd7213 mv.exe fdf4e7c70b20853748716042b8b825300842317da9d0aa98ce689e432a1e1d32 ngrok.exe 49f1bf2e2a49f5364cb6282a656949d9d3683bbb7b3754fbe1d2439cf0a20186 nl.exe a31a30fc680070f40225f22c2b1ce8c74877f3c0fafa5440a31a738b28ce4be6 nproc.exe 2889cb4d340b1d7c5638eb2595822385f9ebfbaa68ed51e6326cf565b8a215aa numfmt.exe dad1f35ae91528269ee1564579858da99cebc67985e9edd60bf384d7785ec9cb od.exe 350eb1249740366b00b909b810353c26a2fe90f236326ace9dfdc1d8a20a2c82 ooniprobe-windows-amd64.exe b975b3cc5b268ecfac8204e0c9b11060906dd4c515964741e5fdf1c1731f6187 ooniprobe.exe 420d9e0a91f2070ae394fbab90b52fdd65628efeef7098ebb098d7f4848138f1 pandoc.exe 7d8df99a880e8d62088c5a2b8cc000ebc38bf7269737d3c53afb6a1d3d4ff4cd paste.exe 4213916be2aa2fab42ed6f3958210334907e79a00cb04c736eef0259eb3e4fc0 pdfcpu.exe 6fd11688658b023abf68f293e469660b0a01a8255924d8d9340bd124013abdbc pdfdetach.exe 29def2d1e55481d59af0a4c3f53caaf4000fc73645d7786aa61696268a1d0dfe pdffonts.exe f53b0f24cd0327c3a73c9be19d3f42fcccae2b90eaf463074323c32fae5e385f pdfimages.exe 264ab525e1ad3da615fff428f3a3b749c566c0767c5e45e91bc30b944b4dc5ef pdfinfo.exe e30e8ab347e10039286fb9dc7e30691d4afe0640e1f58d7e2b07a628585b42e5 pdftopng.exe a8634eda80056ad6828fe9fefec92850fbbf88a8a0b83a64c9f311663023d5f9 pdftoppm.exe aefedae2b4483adc3fd5e40d105faa600c0ee071067f20860c58a96c586c0935 pdftops.exe a08de6f9d9ff04c7de731348b30550204b4470d110e320d4bbb19b208dc4a649 pdftotext.exe d06415ce0bc63cd1eb1c3014bb797f9ceb1039f16f514dc55490d2aa32ae1e5b pgrok.exe 4ea36a1af98f77108fff48c19409cb5fb0b54b34f338b5874116f57862dddbf8 pgrokd.exe f00ff8511b9a7bc404cf5bbf3c93efb4babd6b116ef12fc5588c9bdc8fefd3cd picocrypt-gui.exe c2331c9253e5b2c2f68a14efaf37bffb5d7654978651608428d89eff14f467f1 pingmole.exe 3c6d17b847985db74e622f3cf2d39f67a09cc23930c75c913591ad7bc09507a8 pingtunnel.exe 22de9b321fd2351ecfa4d78cdf9387dea7b45b1c303b881a235c1f16dcf0b52a pr.exe acde7e356548b03ff9bd9b669683a678220880dfa83097335db4abbc1c9a525c printenv.exe 8c7da275957b8ce6a9fac2c47c14e3ac776f316f5fec875d8c3ca13f30150b4e printf.exe 0783ab09459de0e77fb9b4acdf28e2ecaee8b2c7dd3907e8587d5cf702b5ceea ptx.exe 8dd8874671a99aa9336c9038a351d9b0e1a5c9409bc3dfbc712b1f6d34ae890c pwd.exe 3b0f592133b87b607af7c22056992d2654d85e5ca90a9d00e10be572e5c1265c quotes-escaper.exe acc79212859015aa1fe6b3e9922e28e83c1f0afdf3ebf981677da35d3930af7f readlink.exe 482d9223bfd43b3a60733197ad62a798f115ad2d0c6cdef794a0f47db346ee78 realpath.exe 339ecbe9a152f58cfcf3ccb872caa3ac9d87d0f8544202128f7f8af60110eb32 rg.exe c210954ebc3693399a885dbe09e7321918aec63ffebadb4392ac40c1341e96e8 rm.exe b947e2294a78bc5ef907e691900544c0c5576f81a2f02d82449492de52ad8901 rmdir.exe aa16dae31e3013f0f7c84934d87da8ed2eba4e1558c4b1f564c2cd9d64d6aca7 scp.exe 2479a564c5d5b972f0684a2a6da107afda4dd4f25287b6700af50f69ff9c2178 seq.exe 64ed8ac5aca20acf71af8768e7ba6ae6d8f2715902609b0151db4592fa2b6560 sftp-server.exe 31cbd02a2c0cf336c424f188976c157afa4feaa53a69803b353130343d66c771 shell2http.exe 748f0995d4e5827afe6e0e12a11e9407f7cb924ec3c5b3b39c47897c21d7b1a5 shred.exe a67e326dfdb1bf49f261fc41d7c3013a3278cf65a0d3145d8f8dc92ab23f2523 shuf.exe ecf7839cf2f714d7b14b64affe01c616f9bca723ac87b9a3745c467cfa87dc2f sing-box.exe 0408b70d016549fd3dfc1f782d226129e13549745f9f03e37705934df3ec05f1 sish.exe 542674fb973ca21fe36e44730076ed282ba252cedccee861757bca8fbb1b99f2 sleep.exe fd1dff597c562a8e9ea72ef3688d3dab74449df25e6a8f55e47060b150ee4f00 smartdns-rs.exe 8b845d96cb5fdac936677faf4da00dea69a03baf923d6ba5fc76a81a65bdd3f8 smartdns.exe 6b1536528b502cb96b5d369d02fc2cfaba05ec35ac75391863517ce16ef32a4b sort.exe 1b872e9e0284c2429385e068330a1a211655662e70d5484387739751c21bb3eb split.exe fe7ef9e4292b496191d3055eab4ac037d0e03cfc213d928f199d95983e666cfd ssh-add.exe a69fa59e0386e1aac9579d058e4086df4bff5a6cdd2a37da238e094d5a895645 ssh-agent.exe 6927caaf3b1f106cd6501533f7458c637f5fd6cb14febe408c2813116573b27b ssh-keygen.exe 4ed587b5d274a5052d7869d3090ccd8ca7fa0a564bdc3338695d8d9ac8d7d79e ssh-keyscan.exe 6012fe4ee476b901aeeeb2a68644319ce8d12ceb1f63b4596fce5ae1f873d697 ssh-pkcs11-helper.exe d1c278ee14bf5ce056203270038dbdab86b7257c0fed50f13b48e34df14f9273 ssh-shellhost.exe 3c71658dc6e46aa6fc4530b2199363f137f44d375f9ce8227551452155cec277 ssh-sk-helper.exe c290ede859b135014ac0deb75c915edada330ececce9aafe14ec78ece818d4e0 ssh.exe c8a39a6430e42970f6e2f6774c4a78da50a28fff6a3ea9f3d234cdc064cbaeaf sshd.exe e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 stP1kAlM e6a022b9ef21475f9de10e55a3edeed295508905d306ebd25b67b60ed9783b0e step.exe e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 stiG2Kb7 77a068e4d5c2a8be0fd6018d6d0bece285460221af0b633c9856f348d721b169 stunner.exe 355e86b8efa08b2af3a353d5d24b8508b53c585ae8678b29d8a227761b054f2c sum.exe ade926fd1fcb6ac5ac12c1ce6a9b5548cc1215b71c9ff7175638dff2fd11b842 sync.exe da153466c0ee00f0a99b9cd2ff57d950d6499c6cd890f1c1dd8ddc17c6eab1d0 tac.exe ab884c15fef0406848c759bd1ea29ef6f22b3804c4ad89b3354eed206eb47587 taierspeed-cli.exe b2753aaeb6f38f9daccb707de3744fac2f1d45b3ae7ed9591a239496a88dbd75 tail.exe 1b0a0c78ede7cb83613774d468b38d9f6d839043141be3499aac0667e31f00dd tee.exe 0c0f5b0ddfaec5e04f5e323cbb91a19b4ce43e2402d5d267a292f30fd1f6ef19 test.exe 2a84ceeb0fd2c6db070e41cef0f93cb4cc894ef19e4bdf37ffdcd0e9d1b62209 touch.exe b7122a0045cc41c721c19d6cb2193d863f519e90ea388d951939291d77f3d43f tr.exe bf8360ae712d0450b030383e631888ab010df5ac9d981584b1e4e5db0d66f7a7 true.exe 5df7cedf76ec2d61773d59aeb14443abed992c05a84386829f6ba78f89730c04 truncate.exe b3cb537014c84058c088d1af7138ad30048eefd947afd767518359ced783afe8 trurl.exe 3009b8e4086ac860e81a8e98d76d54f7ca4364fcd3e9068161f2a326a6c1adc0 tsort.exe 34533e7f54035b1117a4740a36e8b14d56faaa2c351c982f0d0ca50e50c09f85 tssh.exe a4905bed69791f9cbc4336d69cc1bb72282d89def6fb0c328767c85b4ecf1ba0 tusd.exe 795cdb806ea6ca327f44874750026d1aaa36cf1ac8a43d3c5cc2d7d3e3a644e7 uname.exe cf8ff4309cbe1df8a78758c1880ac34a19a51fdd8b12a06b13286c24dc26c258 unexpand.exe c7e7668706d63c726902e43e6ca88a02dac44f626135ab3ec926d0011bd4dac4 uniq.exe c0fc671a68e985b12129cc19eac026e593c5c6045367414004c3e8eb16a23266 unlink.exe 902e597a5eb89f345901280eb396394146b3937d4c84b880e8ee1300c901ec9b upx.exe 27cd196f493b3a98b9035bd4da51b44866adeb6578ff4cb679532abb382cb2f2 vdir.exe 9212cfbb5b8767434531d8e90482a7c832869df2d21755fe4766ffb46ce32ae7 wc.exe 5106def4c752ae1f08f597dca5d4f866a5631fdd384cb8bb62d936fa61291f67 wget2.exe 6458f95e03ac9708c6f989d2cb34bf138a893795aced9c95dac4fe2fa16af322 whoami.exe 8509f0bd4828c34b42b86dfbcee5a8f4f1cd832ae0f7e64a385b8bba40f9a295 wldd.exe 4b017c569cce6ddee5063dc6ea8af8d2a5d6a51fa98e8305e24527186fde85a8 xargs-rs.exe 0d64974da0b0abc3d01475462e8468ac16f6776c3eb9309ba6285432cdd58c92 xargs.exe bbb1c683ae42dbdfb1c37eea65487754c8974da3fa9a9af5ba2d77ab3bc7d15b yes.exe cb7be6553742a8afdd701c760bf86db4c487b083fe18658b70bf2fba242c64b7 yq.exe ca74e8419a613c2ab67f37975d3c739fcf134b879f792564e1535ee35bfb222a yt-dlp.exe 5ec8aeeee3a0d2eb4109391e8effcb145f0bb7da3031f870f9f62b919452b5bd zfind.exe