A new concept - Dark Hacktivism
______ _ _ _ _ _ _ _
| _ \ | | | | | | | | | | (_) (_)
| | | |__ _ _ __| | __ | |_| | __ _ ___| | _| |_ ___ ___ ___ _ __ ___
| | | / _` | '__| |/ / | _ |/ _` |/ __| |/ / __| \ \ / / / __| '_ ` _ \
| |/ / (_| | | | < | | | | (_| | (__| <| |_| |\ V /| \__ \ | | | | |
|___/ \__,_|_| |_|\_\ \_| |_/\__,_|\___|_|\_\\__|_| \_/ |_|___/_| |_| |_|
Dark Hacktivism represents the process of taking conventional hacktivism to the cyber-warfare level.
With one of the main cyber attacks coming along nicely it is time to start working on the concept. This release is being leaked to act as a general guideline for anyone out there that wishes to use this form of cyberattack. Knowledge should be free and experiences shared. Disclaimer: No harm was done to any system or person in the collection of this data. The same code of honor was used as before - "Information is everything."
General criteria:
Taking the conventional type of open hacktivism and creating an alternate version of it.
The three main types of actors: Ghosts, Shades and Shadows.
Ghosts: The frontline cyber-warriors specialized in big data extraction, big data analysis, vulnerability assessment on large scale cyber regions, malware infection, cyber-weapons mastery both towards common and custom tools, code-breaking, general cryptology.
Shades: In a similar fashion on how a shade is the shadow of an object or overall phenomenon, Shades are the observers of a cyberattack, non-implicit but complicit to the action itself. They are usually represented as the ally of the ghost but at the same time they can also be neutral on the motives behind an attack altogether despite being part of its sphere. Or they can have ulterior motives against the action taken or the person itself. Example: People hanging out with ghosts in a chat-room and giving away their input on the matter. They are part of what's going on as in they're aware of what's happening but have placed themselves in a state of limbo.
There can be different kinds of variations: A shade can be a ghost itself that has gone inactive or simply not taking part in someone else's cyberattack (an observer of someone's else cyberattack). A shade can be an infiltrator, usually from a federal agency, a federal agent, an informant or a paid troll. Private researchers as well as journalists can be included here too.
Shadows: The secondary cyber-warriors that shadow the ghosts in the same cyber-attack. In every single instance of a conventional attack related to hacktivism where 2-3 or more people are involved there will always be those that can't/don't keep up with the campaign, somewhat lagging behind but still helping. This may seem like a disadvantage but if done and used correctly it can be embodied as a great power. Both in conventional hacktivism and dark hacktivism they are the supporters of those that stand out the most, they help sustain or even enhance a cyber-attack by motivating the main people through their own actions. Example: The more people get involved within a certain attack and actively contribute the more meaningful the attack becomes. Humans tend to want their actions validated by one another, so in cases where the process may not be so clear viewed by society in general, that validation can help enforce the motive and reasoning behind them.
Shadows may or may not posses the following attributes: Advanced hacking capabilities, other various attacks such as Defacement, DoS, DDoS, Man in the middle, DNS hijacking, cross site scripting, spear phishing, general phishing, general cracking, social engineering, blackmail.
________________
Chapter 00 - Void (The introduction)
Seven chapters will be used to describe the current on-going cyber-attack and the roles it has. Once the first cyber-attack is completed more will be added. Most if not all of the transcripts will be used in this concept. From statistics, to general data to overall reasoning. The external usage of data should be somewhat moderated when doing the transcripts themselves, don't go into every single extraction but rather in general from the layout to the usual types of information found and so on. Follow the external data format used in the past - intro vuls - full data - general vuls.
The physical and psychological aspect of a long cyber campaign:
Sleep deprivation leads to incoherent behavior as well as distinct/different speech patterns. These changes go hand in hand with basic mistakes from twisted grammar to a dynamic aggressive personality both online and in real life. On and off periods much dependent on how much sleep you get. You should talk about more of these moods, their types and how to best handle them especially on long cyber campaigns. Taking notes of them is really important as it may help you prevent certain accidents.
For example: Panic attacks and general anxiety disorders. When we don't move for long periods of time we tend to build tension in our muscles, we also generate a lot of adrenaline especially in this line of work. This can have a lingering anxiety effect. The best way to tackle this is by regularly exercising, keeping yourself active on a daily basis and even playing as a form of stress release.
Another factor that comes in mind is related to our blood vessels. The most common tension is frequently presented in the neck. It can present itself as a block on our vessels. The same ones that pump blood all the way to your hands. There's another blockage that appears in this type of example where you will feel a slight pressure on your wrist. This is called the "carpal tunnel syndrome". It usually appears after you've kept your hands in the same position over long periods of time. It can get worse if not treated. It isn't a life threatening ordeal but it is crucial to mediate the problem before the pain becomes unbearable. This again is best done through physical exercises. Light aerobics are welcomed.
Depressions: They are very common among hackers. A lot of us incite this behavior all on our own by abusing drugs, through alcohol, tobacco, stress eating, to more abstract concepts such as worrying about poverty or being afraid of something or someone. A lot of the times these can be remediated but the real problems are the obstacles that we can't so easily remove from our lives. Like people.
Always remember to play the part of a normal human being. People are afraid of what they don't know or don't understand. Isolation is one of the last things you'd want to do. You grow distant from others and when that happens this barrier of mistrust reenacts instead. As much as we hear on tv or online about how being different is nothing to be ashamed of, in the real world this is the exact opposite. Never reveal your true self, never be different, always adapt to their behavior, always mimic their movements, train of thought, habits, everything they do and are. From the way everyone else dresses to what they like to do in their free time. Blend in and you won't suffer. Blend in and you won't become an outcast. Blend in and you won't be their enemy. Individuality in society is a myth that only a few can exercise but never do because of the consequences that come along with it.
Chapter 01 - Complicated Suicide
Chapter 02 - Genocide Party
Chapter 03 - Deaf Waltz
Chapter 04 - Zen Labyrinth
Chapter 05 - Nine Faces and Seven Masks
Chapter 06 - Scales of Vertigo
Chapter 07 - Supreme Kingdom
_________________
Chapter 01 - Complicated Suicide
Chapter 01 will be used to describe the downfall of not paying attention to your surroundings when prepping up and attacking a large group or entire region of targets.
In this situation we use the world governments as an example. How those from the top 1 mil. were comprised mostly of targets belonging to china and taiwan while the US, UK, AUS played a secondary role in adding up to the mistakes despite knowing about them in advance.
Even though a lot of breached websites were collected from various countries, the majority of them failed due to extreme negligence. By not taking into account current (last minute) changes in certain parts of cyberspace you can lose entire groups of targets from the very start. (i.e. the chinese ones using the charset, taiwan using firewalls etc.)
Then you have the old ones which are already known to be difficult in breaching. UK is an example. Hence why they were all ignored. (The british govs tend to all be connected to the same main network so even if they seem at first to be vulnerable your connection never goes through since it goes straight to a loop and to that main network that holds them all, or at least a large part of them. regional govs included.)
US ones can vary from network to network, they're dynamic so in some cases you breach them in other cases you can't. The underbelly to this example is that some networks have already applied the latest patches while others didn't. Oracle type of system is usually present. AUS is a similar country when it comes to their govs.
(The constant public hacking of govs has somewhat forced authorities to actually patch up some of these govs and made quite a lot of them more impervious to the usual type of attacks.)
Transcripts:
Patterns found in governmental domains -
The chinese ones from the top 1 million websites are predominant with a "gbk2312" charset. It prevents the user from brute forcing its way inside as it simply cuts the connection short right before retrieving the server layout.
The turkish govs on the other side despite being well protected may have various access-points if tried enough on the same target. It worked in some instances.
Taiwan has been installing firewalls and so far its protection is solid. It would be wiser to try finding a good vector of attack for that defense.
In general (the govs) the main access-points have been deleted and the system patched or fortified with firewalls.
Other bothersome charsets include: "dwgk" and "xxgk".
Overall the governments with still present access-points are vulnerable as far as their websites go, but they have decided to abandon web design and focus all their security on the server layout. Smart move, more cost effective.
Final note: Despite still breaching a significant number of govs, attacking them in general nowadays is a waste of time. They no longer hold any sensitive data for the most part. Aside from some large ones that still house accounts and private information on people, nothing else of value remains. Cyber government attacks can be conducted for comedic purposes from now on.
__________________________
Chapter 02 - Genocide Party
Chapter 2 represents the exact opposite of the first one. When you're so well prepared in advance and when you know your group or region of targets that everything goes smoothly and where almost all of them get breached all the while you're certain every single website is vulnerable to the basic attacks.
An example here is the education group. Edu websites are by far the most vulnerable type of networks on the internet. Time and time again whether they get breached and publicly exposed, they all still seem to preserve that level of vulnerability no matter what. There are various reasons behind this.
Even if a website/network would want to patch up and protect itself from future attacks, the ironical absence of education will continue to remain.
1. The modules themselves that are casually used by edu's throughout the net are the most vulnerable amongst all the modules. (not that they're unique but it's almost like they gathered the weakest ones and decided to use only those)
2. The constant expansion of these websites/networks will forever have a lingering aftereffect where some server somewhere will be vulnerable due to it being unpatched etc. which will not only let someone infiltrate it but it can be used to launch further attacks.
Transcripts:
Education websites are on average 9/10 vulnerable with the most basic types of attacks. They do vary in the way they respond to the attack but they can breached quite easily.
Besides the usual way of extracting data there is also the specific retrieval mechanism where you have to generally extract each database, then the tables and use a single one to get the columns out. Multi-threading doesn't seem to work on a few of them.
Other websites already had signs of being infiltrated as the logs for the tools used were still there. (pollen.uw.edu.pl is one example)
Some access-points, despite being different at their frontal modules indicating a different server was actually part of the same one. (academicaffairs.mnscu.edu and asa.qa.mnscu.edu) Even though it isn't unusual for this to happen in a network it is important that it is mentioned to prove its existence.
The infamous vulnerable RSS module has been de-throned by the next gen vulnerable module "apps". Good stuff.
The turkish "sayfa" edu module is an interesting one. It has some fairly decent protection but it can be breached.
It seems that the chinese have been patching their edu's as well with the same "gbk2312" charset.
The "sfs3" is spread across a large range of edu websites. This is one of the main examples on how we can use vulnerability foreshadowing to tell in advance if a website/network is vulnerable. This same "sfs3" module is found within the server layout. So it isn't a custom module. Another one like this is "drupal", usually for the western websites and "haber" and "duyuru" for the turkish targets. (these examples are part of Chapter 06 - Zen Labyrinth too)
Some Taiwan edu website have been firewalled as well. For example "dspcdc.ee.stust.edu.tw" was vulnerable enough to let me inside its network but it wouldn't let me dump anything. Another example like this is: "ee.ntou.edu.tw".
Another prime example of tied modules to the same server: "use.futa.edu.ng" and "spgs.futa.edu.ng" and "set.futa.edu.ng".
A unique interesting charset found on target "web1.hc.edu.tw" known as "x-x-big5".
More connection time-outs for the websites in Taiwan. Some of them coughed up the databases before the connection stopped so it's difficult to say it they have a firewall or if it's just a bad connection.
On average with only a few limited access-points picked at random for each target have yielded tremendous results. Most of the education websites from the top 1 million websites on the internet have been breached.
_______________________
Chapter 03 - Deaf Waltz
The soundless cyber attack.
If the introduction will include things such as how the resources were put together and which ones were needed and how they were installed etc. then Chapter 3 will contain how the cyber attacks were carried out and why they were done in this specific manner. Begin with the convenience factor, then move to the limited resources then to why certain commands were used and why other were not.
Examples: How you can tell when it's more convenient to use a keep-alive cmd, not just to fulfill it's natural purpose but WHEN to use it for a specific target aka by knowing in advance which type of target you're trying to breach.
Let's say that you knew in advance a specific target would spam flood your terminal as soon as you'd try to attack it. Then it wouldn't make much sense to add a keep-alive unless you wanted to freeze your entire box. The backlash it usually isn't that dire but when you have multiple connections open it tends to happen. So by knowing in advance that (for example some of the chinese gov targets) would flood you, you can make sure not to add it.
Knowing when to raise the level and risk factors for an even deeper type of analysis and when not to. Let's use the above example from the UK govs where you know that most if not all are connected to a main network. A deeper analysis would be useless and you'd just waste time.
Knowing when to recognize a stronger module and begin discarding it. At least partially while still testing it on newer targets from your list. Example: The "lib" / "libguides" from the edu. ("catalog" works too here) While some may be strong at initial attacks, other may not, so a prudent approach is needed to see if a large number can be found from the list while skipping through some. If the gamble pays off then it is more worthwhile to return and attack the rest. Either way the wasted time has been reduced by half or more.
Knowing when a certain connection has been cut off from your target by a third party. This third party is usually the person/people operating the said target. Some of the signs are most of the time clear. Example: you're already dumping data, especially from the columns and the connection is simply cut off. This happens all the time due to connection time-outs (poor connections) but if you restart the attack and see that it won't pick up where it left off at all (usually without the time-outs) then chances are that they took the server/network offline.
In some cases I've had the opportunity of getting back in. A lot of sysadmins they don't know how to fix a certain hole so what they do is just restart their computer and go right back online. Nothing changes. In other examples they simply close your connection, if you begin with a new one (aka a new ip) then you can start right from where you left off with the data extraction, even from the same point.
The reasoning behind using common tools instead of unique programs that leave specific fingerprints. Explain it in more detail. And why customized tools should NEVER be used for large scale attacks. Well, it isn't recommended for smaller ones either unless it's strictly for testing purposes. Specific exploits are ok but not the tools themselves as far as their interface goes. It leaves a unique fingerprint that can traced back to other targets that you've attacked and it can help the authorities build a stronger case against you.
____________________________
Chapter 04 - Zen Labyrinth
Describe the server layouts found in different cyber regions and domains. It would appear that there are specific patterns within similar groups of networks/websites. And interestingly enough they seem to be direct related to the vulnerability itself. If you can tie them officially together then maybe you can further expand on how to look for vulnerable targets.
Talk about how you can predict to some extent if a place is vulnerable from just the url alone. By adopting this new technique as well as how it could improve the probability.
There are multiple ways of experimenting this before being certain:
One of the ways is to reverse engineer the server layout without even knowing its content like it usually happens when a breach occurs. In plenty of examples the url encoding is a mirror towards the type of server programming and even its database/table names.
Another way which I'm still exploring is the "ghost url", an extension based url from within a main directory. This one is at its best a gamble.
Past experiments were done but due to a lack of targets it was hard to get sufficient statistics. This time around I've made preparations to put this idea to the test in the japanese cyber region. I've collected a few hundred targets that only have their directory url. They are basically the targets from the main branch that I haven't been able to find ID's attached to them at first glance so I've decided to use them this way.
By finishing the main branch of targets I can put together the vulnerable url's and make up a list of most encountered modules, id's and overall end url's. This list I can then attach to my second branch targets that have only their directory and test them this way. It was done before and it worked in some cases. Turns out that even though in a simple search the modules, id's and so on may not appear, it doesn't mean that they don't exist. Usually there are two reasons for that: 1) The search was faulty, not sufficient, etc. And 2) The url's have a different name for their encodings instead of the basic one. It means that when a web designer codes a website it can opt out of leaving the url's the same way as they programmed it (adopted modules have the same type of encodings, example: moodle etc.) and simply rename the urls as they see fit.
The vulnerability here is that even if the web developer changes the name of the urls, their encodings don't change, it's the exact same programming on the inside it's just that you can't see it on the outside. There is a sure way of finding out if a target may be vulnerable and that is usually by seeking out its main directory. A target may have multiple directories. This is where it becomes a gamble. Once the directory is found you need to add your own extension but which one do you use? By knowing in advance the usual extensions used in a particular cyber region/country can help tremendously especially if you have inside information on which of those exactly are usually vulnerable as well.
Zen Labyrinth is about the statistics found in entire cyber regions and how to best use those to your advantage in a large scale campaign or even a smaller more concise one.
_______________________________
Chapter 05 - Nine Faces and Seven Masks
The psychology of the human component and its overall features present alongside the designated cyberattack(s).
Sub-notes - How repetitive work can or has to be countered with a parallel one that is similar with it to some degree. It puts less strain on your mental capacity of both observing and acting. If let's say that the attack on a cyber region or even an attack in general is "observed" as repetitive then over time it can build up stress. Which means that another form of "acting" has to be introduced in order for the mind to be distracted from the original task and relieve somewhat that built up tension. Because the second task has such a crucial role in maintaining ones own health status it also needs to be denoted in some way. In this case it turns out that continuing the repetitiveness in the second form it helps balance things out. If the second form had a more chaotic nature then you wouldn't be able to focus as much and your stamina would run out faster.
Example: Music played multiple times over and over is more favorable than playing action packed video games on the side. (or any other sort of activity that strains too far from your line of sight aka your first task)
Sub-notes - Creating, hiding, sacrificing and maintaining identities over short or long periods of time. How people usually do it and how it should actually be done in this concept. (mention all of these topics in the final transcripts)
The Nine Faces and Seven Masks idea:
We go from the premises that every single person has an original identity. That's how you would normally think, however there is no original identity. The mentality of a person is often times changed to match its own personality. And personalities change on a regular basis. Everyone wears a different mask for a different situation. At home, school, work, various events, etc. Therefore we can't really conclude that one human is capable of containing a single identity for a short period of time, let alone their entire lives.
This is where the idea of "faces and masks" comes into play.
The purpose is to "create" your own unique identity and call it "the original". Now this is where you'll gather all the information that you'd like this specific form to receive. From speech patterns to philosophy, general train of thought, political ideologies, static opinions in specific scenarios and so on. This is how you end up creating your "original" identity. After this process is finished you'll have to hide it from prying eyes. Here is where the "Nine Faces and Seven Masks" begins.
The "Faces" represent your identities while the "Masks" represent your personalities. Because normally humans tend to have more masks than faces the way to truly remain hidden is by accumulating more identities instead of the latter.
The reason for that is best explained like this:
Nine Faces = Nine Identities
Seven Masks = Seven Personalities
Two of the faces are there as sacrificial pawns. The first line of defense if you will. The Faces have to always be first no matter of how high their number is as they are more believable than the Masks. If/Once that layer is peeled off by let's say an outsider, you go straight to the Masks. Using your personalities to confuse the person that you're in contact with is best used after the first layer of identities was stripped away. This is your chance of making your opponent doubt themselves and make them question their own realization.
Let's say that for example you have been using an identity and someone suspected you of being a liar/fraud. Then the most appropriate course of action would be to go into your personality folder and simply pick something out. Here will include of course "speech patterns", "general vocabulary", "different knowledge tree", "punctuation" etc. This process exists simply to reaffirm your original position of the identity that you chose and shake your adversary of their convictions.
This would be the easy/simple version. For the Nine Faces and Seven Masks it adds another spin to this story. Since there are Nine Faces and only Seven Masks, it means that at the first try you will have to remove/use in play two identities at the same time. But how?
This is about playing the "fool" scenario. Instead of using the example above with just one identity in play and one personality for each sequence, here you actually use two of them.
One of them will act as your "original" identity, let's call it "fake original" while the second one is the "wrong" identity, let's call it "wrong original". By placing both of them on the board we let our adversary reach the conclusion on their own about which is which. The advantage here is tremendous since by sacrificing one "original" it will further enforce the notion that the second one must be the real identity. If this were a real example then we'd have names/accounts attached to each identity and used in a sequence.
If this process fails or is not strong enough then we simply have to go deeper into the personality branch where again we have two of them waiting for us. Here we have more options available. We could use both of them on a single identity to either enforce or denounce it. We could use one for each where they would try to protect themselves or sabotage on purpose. The variations should be used by taking into account the identity and personality of your adversary as well.
(Right now the algorithm is 9-2 = 7 identities, 7-2 = 5 personalities)
The Seven Faces and Five Masks
The same process follows here as well. If the first level fails, then we simply move on to the next.
The Five Faces and Three Masks
The action continues here too. Same principles apply.
The Three Faces and One Mask
How the last mask became your "the original" identity. It was there the entire time since you can't actually discard it. And how this time around we've decided to use identities to hide another one, the last, the original that we first created instead of relying on the personalities. This final "personality" will be the last card to play. If the opponents can see past it then it will reach the conclusion that this is "you". Even so, the ultimate plot twist is that there is no original identity to begin with since it's constantly changing, morphing, evolving. Still, the prize here is that this "original identity" would normally mean that it has been compromised then it's game over. You'll have to start all over. The reason why there are so few chances to switch sets of personalities and identities is because the more you have the more likely it is for your adversary to figure out that you've been playing them from the start and by the time you reach to the "your original" identity they will no longer believe that it is the "real" one. Basically your smoke screen gets exposed and the level of trust broken.
__________________________________
Chapter 06 - Scales of Vertigo
Tearing apart companies by attacking them through multiple points of origin.
In a normal cyber attack, one or more individuals would regularly try to focus their actions on what they can see and that is usually the website itself. They can go about this by either flooding that site with traffic until it crashes, spam flood their mail inbox with malware, try to inject into their servers and so on. However these are all representing of the more basic strategies employed by hackers to disrupt, profit or express their social views. But what if this wasn't the final evolution of hacking? What if outside of these normal hacks and the exaggerated ones in the media about taking down grids, tampering with water supplies or hijacking airplanes there were other ways to go about? A different route that had a similar depth to it but forged in a more realistic manner where anyone with an internet connection could be a part of.
This is where Scales of Vertigo comes in. Just as the name implies, it's meaning lies in multiple layers of security or in this case insecurity that a person can take advantage of outside the basic structural hacking norms that we see everyday. With each "scale" being part of a much larger force that could impact your target in ways far different than what normal attacks generally accomplish.
Let's use as a prime example a specific type of target and try to attach to it at least two scales of vertigo.
PRIME TARGET: Retail online store that home delivers + additional other functions
Retail stores are generally perfect targets for cyber criminals that want to make some quick cash. They tend to hold credit card information, personal details about their customers, different user accounts etc.
And yet the scope of this example is not to steal any data or rather not even to get inside the store itself but attack it by inputing data yourself. By contributing to its own mechanism. By obeying the rules in a way that actually bends them. In retrospect every single society, country, government, system, set of laws and rules is flawed by default. Everything has a weakness. If normal hacking is breaking things through that weakness then this is bending them instead.
Using the first scale - Scale of Ruin
Summary of target:
Using the example of an online retail store that is part of an international chain of stores that sell all kinds of products ranging from electronics to toys, basic household utilities and so on.
Their overall management settings are as follows:
You can buy products from their physical stores or their online ones. The online stores most of the time have more dynamic price cuts which encourages online shopping. Which means they have a lot of customers on a regular basic. They provide the transport of the goods to your location as well. This is done through a third party contractor. In order for someone to place their order you must first create an account on their website. This account usually holds private information about yourself such as your current address, email, full name, phone number, zip code (optional), city/province, and a few other details to help pinpoint your exact whereabouts.
The form of contact is done for the most part through your email account. Once you place your order you will receive a confirmation notice which will let you know that the shipment is on its way. The time of delivery is usually 24-48 hours. Usually they provide an address to contact them back if this wasn't the order that you placed. In this example we'll use that as well.
Preparing the attack:
With knowing just this much about our target can we truly launch an attack on it? Is this sufficient information to come up with a strategy that could undermine this specific company?
Scale of Ruin is the first wave of attack that is delivered after gathering all the basic information from your target. In this case from what we know the company in question is a retail store that houses all kinds of products with both low and high prices that also uses a third party to ship them to its customers. The way in which orders are placed is through an online account which you make on their website.
Right now we understand how our target works but more importantly we have managed to find out its points of origin. One of them is the online account. Another is the shipping party. And the last one is the low and high prices of the store alongside the email confirmations/reply. (Should be noted that this attack is best used when the company in question offers the at-home services and the paying cash on the spot, instead of just with a credit card online.)
The process should be visualized somewhat like this:
Prime target --> Point of origin 1 (the account) --> Get your credentials/account validated --> Point of origin 2 (placing your order/the shipment process) --> Confirming your order through your email --> Point of origin 3 (the email confirmation/reply if needed to further prove legitimacy)
Between placing your order and confirming it there should also be a careful evaluation of what you're purchasing in terms of products and their prices. Creating a more dynamic workflow would give off less suspicion to your order and to your overall account. You avoid giving off any red flags by making your placements more natural rather than obvious scams or hoaxes that will make your purchase stand out from the rest.
Army of needles - the way to wound and kill a giant is not through a single blow but through a thousand cuts.
You build up your army by infiltrating the target with as many accounts as possible. You make sure that they're all validated and confirmed to make legitimate purchases. And then you wait.
This process can and should take from weeks to months to plan out and prepare. Instead of registering thousands of accounts or even more in a couple of days, it should be done over a long period of time in order to avoid any suspicion. The main problem will be acquiring the email addresses. They should be from as many providers as possible. Freemails are an option. The second issue is with the IP addresses. These should be all from the country of where your target is and even further than that, the IPs should have the same city as far as their geo-location goes.
Online stores or rather websites in general log the traffic on their domains and use it to continue expanding their interests. By adapting to this process and blending in as much as possible it will make it even harder for your target to tell apart the fake accounts from their original ones. In severe cases this may prompt the company to shut down its website, thereby shutting down its online business. This would be more prudent of them since no matter what they do they will continue losing money.
Scale of Ruin is exactly what its name implies. The process of placing a company in a situation where no matter what they do they will lose money, customers and time. And the beauty of it is that this is only the first step in dismantling a company.
Scale of War - First Impact
We've taken our time to build the army of needles, everything is ready to go. Now we just need to pull the trigger and watch the whole thing unfold.
Dynamic purchases from the large number of accounts that have different ip's but within the same location. Preserving a steady rhythm by only using a fraction of them at the same time and continuing the pace over a long time, slowing bleeding out your target. Time, money, clients lost. Broken reputation. Tensions between the third party and the retail chain store. Third party eventually quitting or being fired. If a new one is hired, repeat the process. slowly but steady, always staying in the shadow of your target.
Drastic measures may be taken by the company in question such as taking down the website or hunting down fake accounts. However if the Scale of Ruin was done correctly then these things would be irrelevant. What were waiting for is the inevitable obvious move which will played out. The block on new registered users and the mass removal of inactive accounts that have never made a successful purchase before. A desperate move but we were expecting it. At this point the business is crippled. It is time to attack it even further.
As soon as we can see that they don't plan on shutting down their website to evaluate their situation we know that the most logical move would be the blockage and removal part. By anticipating this move we can use the army to attack their customer base on the website itself. Either by contacting them directly with disinformation "We've been hacked, all our information has been stolen. I'm gonna sue. How about you?" or if there's no direct connection between the customers the most obvious access point would be the comments section of the products. Mass spam every inch of the place with various statements from lawsuit threats to hacking allegations.
These first two scales should be enough as a first strike on one of your targets without even the need to hack anything just by simply using their user policies and regulations against themselves.
Scale of Bond - Blackmail
Deciding to incorporate a third scale to the attack. How and when it is appropriate.
When faced with such a predicament, corporations can be unpredictable as to what they will do. Some decide to call the authorities and report the attack in an attempt to not file for bankruptcy. Most don't. Most companies simply decide to handle the problem in-house which will prove a valuable opportunity to you. Figuring out when they do and don't is important. Some time should usually pass before making your move to see how they react. Normally you can tell if they have contacted the authorities as the knowledge gets leaked, especially when federal authorities take the case. The feds employ the help of the people/citizens including those that work for various agencies to help them with the case. Private investigators are usually brought in as well. It doesn't take long for chatter to appear in the public sector.
If this doesn't happen after some time has passed, then you may make your move. First contact them in joke, something along the lines of "hey, i hacked your website, contact me asap or ill keep wrecking things". If they take the bait then you can simply snowball that into a more serious relationship with them. If not, then start taking things more seriously while approaching them with proof that it really is you that is doing this. An advice would be to contact your targets on their private email addresses rather than their business ones.
Establish contact if you can whether through email, or maybe even through a phone if you're capable of using burner phones or a hijacked online telecom connection. Even an sms platform could do the trick in just sending them texts.
Whether you hacked their network or not is irrelevant. You just need to make them believe that you did. Inflict even more emotional trauma to the point where they feel they've lost complete control of the situation. Where they have no choice but to retreat, in this particular case to close up shop before the situation goes public and the damages become irreversible.
Summary for Scales of Vertigo:
This is merely one set of scales designed for a specific challenge. There are as many scales as there are targets. It is simply a matter of choosing when it is best to use any of them. Remember that when attacking a corporation with many business chains it would be best to simply target all of them at the same time. It expands on your success rate and helps you move further with your plan. You're no longer attacking a company, you're going after a multi-conglomerate.
Chapter 07 - Supreme Kingdom
This chapter focuses on mapping out your own weaknesses all the while keeping tabs on your enemies as well. Being aware of your faults will help you better strengthen your own defense, whether it is physical, emotional or technical. Regardless of the section if it is done properly it will be a great morale boost. This part will also instinctively want you to observe your targets as well.
Geopolitics, economics, history, general details on the country of origin that your target belongs to. These all come into play when you launch an attack. To best understand them is to know in advance how the world works. In a civilized society, a country, one that is "advanced" enough to sustain its own economy and strong to repel its enemies, has always the exact same layout structure. In every major industry there lies a force that exerts its power on the entire nation. Back in the day this was conducted with the help of only one giant corporation at the top but things have changed and monopolies are technically banned in this day and age. Instead in its place are now always 5-6 multi-conglomerates that control the scene. Whether were talking about the weapons sector, energy, telecommunications, banking, transportation, anything really.
Is it a good or bad thing? Does it really matter? The point of interest is not in lashing out and protesting this in a chaotic manner. The point is in understanding what role they have exactly and why we decided to shape our society this way. This example is an easy one since the mini-monopolies were put in place instead of thousands of smaller corporations with a slight less capital so that some "stability" could be preserved. It is much easier to control a handful of them than a thousand. And the reason why a monopoly is no longer present is so that "continuity" can be maintained and each corporate entity can keep each other in check. It's why there are at least two main political party's in these nations too. Same principles.
A country's history is also detrimental to your research. There's an old saying that goes: "Wise men learn from history while fools from experience". History has a way of repeating itself. By knowing both the past vulnerabilities alongside its habits when dealing with these backlashes could be quite useful in an actual attack.
Economics - it has a spot of interest here too. By digging out some information on your target's financial aspects it may impact on how you lay out your plan of attack and when to best strike or how.
Geopolitical characteristic are by far the most influential from this list. If you can obtain the list of your target's competitors/enemies you could apply even more psychological pressure or it may give you an edge to your direct attack power.
_____________________________________
Dark Hacktivism doesn't focus so much on the technical hacking part as it does on its human factor. If normal hacktivism is observed as a frontal assault to denial of service, deface or leaks then this version is more about using the system to your own advantage instead of just protesting.
Despite amassing and accessing large amounts of data like billions of accounts to trillions of record sets from numerous targets throughout the internet the goal is not in the leaking of the information itself by selecting the interesting data and discarding the non-interesting one, but rather it lies in devouring everything that comes in your path and ultimately processing that information in understanding how cyber regions, countries and even continents exist and operate on the internet.
By figuring out this vital piece of information you become one step closer towards comprehending and bringing into existence a form of attack like no other, one that is capable of systematically dismantling various types of dynasties along with the crushing of empires.
--- Dark Hacktivism Part 1 END ---
________________________________________________________________
Master list for the leaks so far: (Reminder: If you want to help get them patch then please report the vulnerabilities)
1000knigi.mon.gov.mk - M1: http://dpaste.com/2X4DE5K M2: http://ixmr.kpaste.net/b872164eff M3: http://hastebin.com/geyavowama.1c M4: https://dpaste.de/RPG4
austlang.aiatsis.gov.au - M1: http://dpaste.com/3K0JSH6 M2: http://ixmr.kpaste.net/180a M3: http://hastebin.com/inorukinep.md M4: https://dpaste.de/uij2
blr.dole.gov.ph - M1: http://dpaste.com/2KZ5VDM M2: http://ixmr.kpaste.net/cdc38 M3: http://hastebin.com/vacifufiwe.1c M4: https://dpaste.de/o9g4
blr.gov.ph - M1: http://dpaste.com/3PGDASZ M2: http://ixmr.kpaste.net/e9f2da M3: http://hastebin.com/etoleguyoy.1c M4: https://dpaste.de/wma3
ecc.isc.gov.ir - M1: http://dpaste.com/0SMNQTW M2: http://ixmr.kpaste.net/f847 M3: http://hastebin.com/utivohijuw.1c M4: https://dpaste.de/DQkF
gcjs.xyxx.shenyang.gov.cn - M1: http://dpaste.com/1SQRBGF M2: http://ixmr.kpaste.net/7d8e M3: http://hastebin.com/gukowoquxa.tex M4: https://dpaste.de/0w2E
geozagrozenia.pgi.gov.pl - M1: http://dpaste.com/1ZPZTXD M2: http://ixmr.kpaste.net/b49 M3: http://hastebin.com/jijezevopi.sm M4: https://dpaste.de/hLZd#L5
health.fiu.edu - M1: http://dpaste.com/2KJA81B M2: http://ixmr.kpaste.net/b0d21 M3: http://hastebin.com/lekodawofu.1c M4: https://dpaste.de/kmVc
incois.gov.in - M1: http://dpaste.com/0H9828C M2: http://ixmr.kpaste.net/7cba1ce M3: http://hastebin.com/limujekiwu.1c M4: https://dpaste.de/zJ2L
lm-scm2014.itu.edu.tr - M1: http://dpaste.com/2S4AWCH M2: http://ixmr.kpaste.net/1fb M3: http://hastebin.com/sicuyileli.1c M4: https://dpaste.de/1PCo
lomza.so.gov.pl - M1: http://dpaste.com/0D5V3ZX M2: http://ixmr.kpaste.net/5f144a4 M3: http://hastebin.com/laqohayabe.mel M4: https://dpaste.de/Y7sq
ma3.upc.edu - M1: http://dpaste.com/3R9YBD0 M2: http://ixmr.kpaste.net/2281c M3: http://hastebin.com/apofemexoh.1c M4: https://dpaste.de/K2N2
math.ncku.edu.tw - M1: http://dpaste.com/1PXA3HS M2: http://ixmr.kpaste.net/149fa8ded7 M3: http://hastebin.com/mixulomuni.1c M4: https://dpaste.de/0m17
mdsn.wmw.wuxi.gov.cn - M1: http://dpaste.com/2BBM8PA M2: http://ixmr.kpaste.net/2b24e8adf M3: http://hastebin.com/donakokaba.1c M4: https://dpaste.de/azF7
medsci.udel.edu - M1: http://dpaste.com/1BJF5MF M2: http://ixmr.kpaste.net/b4898350 M3: http://hastebin.com/sumohotovi.pl M4: https://dpaste.de/hcHF
mobile.lib.ncku.edu.tw - M1: http://dpaste.com/1A8QQSZ M2: http://ixmr.kpaste.net/edee75 M3: http://hastebin.com/abagusomim.1c M4: https://dpaste.de/59PP
mode.lanl.gov - M1: http://dpaste.com/2BGFR3S M2: http://ixmr.kpaste.net/652bc460 M3: http://hastebin.com/dovotaxavo.1c M4: https://dpaste.de/x6Bk
mof.gov.np - M1: http://dpaste.com/0Z7PMBJ M2: http://ixmr.kpaste.net/f7bd2fa26 M3: http://hastebin.com/oqimabudeh.1c M4: https://dpaste.de/EDry
ncts.ncku.edu.tw - M1: http://dpaste.com/3AWRNT8 M2: http://ixmr.kpaste.net/8c8d6d2373 M3: http://hastebin.com/vegesebibi.1c M4: https://dpaste.de/ee27
pia.gov.ph - M1: http://dpaste.com/2CMMYS8 M2: http://ixmr.kpaste.net/8eb3f490c M3: http://hastebin.com/keyiwiteqa.sm M4: https://dpaste.de/xvtC
pz.gov.ua - M1: http://dpaste.com/2YZH2B0 M2: http://ixmr.kpaste.net/731fa68d4e M3: http://hastebin.com/giveyovuhi.1c M4: https://dpaste.de/75UK
radyo.itu.edu.tr - M1: http://dpaste.com/08JV74T M2: http://ixmr.kpaste.net/019a655aa M3: http://hastebin.com/vukaluleka.1c M4: https://dpaste.de/sB85
scorec.rpi.edu - M1: http://dpaste.com/1KNCNT8 M2: http://ixmr.kpaste.net/28cde4c5bf M3: http://hastebin.com/nejolovixa.1c M4: https://dpaste.de/xLFO
search.tphcc.gov.tw - M1: http://dpaste.com/0FX9QH9 M2: http://ixmr.kpaste.net/b15a M3: http://hastebin.com/qarebisaki.lua M4: https://dpaste.de/9P6E
sovhttdl.angiang.gov.cn - M1: http://dpaste.com/1MPP9T1 M2: http://ixmr.kpaste.net/12741c M3: http://hastebin.com/azitejoqif.tex M4: https://dpaste.de/iXzE
supremecourt.gov.bd - M1: http://dpaste.com/0FEPB9G M2: http://ixmr.kpaste.net/101a M3: http://hastebin.com/gibajaqiqa.1c M4: https://dpaste.de/zPBX
sz.dinghai.gov.cn - M1: http://dpaste.com/2RRZ1R2 M2: http://ixmr.kpaste.net/0cb47 M3: http://hastebin.com/yowuhawoca.1c M4: https://dpaste.de/kwdp
tangedco.gov.in - M1: http://dpaste.com/29DGQMG M2: http://ixmr.kpaste.net/8f0d2 M3: http://hastebin.com/amorefayef.1c M4: https://dpaste.de/LYru
tnaf.tnc.gov.tw - M1: http://dpaste.com/3WCF4KX M2: http://ixmr.kpaste.net/ce85e9 M3: http://hastebin.com/ajocejesek.avrasm M4: https://dpaste.de/dT4N
ufo.fskn.gov.ru - M1: http://dpaste.com/0V7JM1P M2: http://ixmr.kpaste.net/205491d M3: http://hastebin.com/ukizemoheh.sm M4: https://dpaste.de/0Lw3
academicaffairs.mnscu.edu - M1: https://www.notehub.org/2015/6/28/yo M2: http://dpaste.com/1N9VY5P M3: http://ixmr.kpaste.net/9d815d2 M4: http://hastebin.com/gexamovica.php
acg.edu - M1: http://dpaste.com/1N3XZAG M2: http://ixmr.kpaste.net/eff M3:
http://text.cf/view/1a7796d3 M4: http://hastebin.com/esogepumax.1c
actserver1.cbl.umces.edu - M1: http://dpaste.com/0MAM1WD M2: http://ixmr.kpaste.net/cfb290e83c M3: http://text.cf/view/b9fb6f3a M4: http://hastebin.com/yuwetuveha.1c
admission.bradley.edu - M1: http://dpaste.com/1BJE1EA M2: http://ixmr.kpaste.net/208d2e0c9 M3: http://text.cf/view/c8b9d3cf M4: http://hastebin.com/isuwixugiw.pl
admission1.ug.edu.gh - M1: http://dpaste.com/3ZS366B M2: http://ixmr.kpaste.net/47edbf8f21 M3: http://text.cf/view/6359214f M4: http://hastebin.com/uvuhicohez.1c
admissions.upesh.edu.pk - M1: http://dpaste.com/19HDE97 M2: http://ixmr.kpaste.net/0805f M3: http://text.cf/view/38c012c6 M4: http://hastebin.com/xegidiroze.1c
aee.odu.edu - M1: http://dpaste.com/0N666F8 M2: http://ixmr.kpaste.net/c052d2bc5 M3: http://text.cf/view/f3246a2e M4: http://hastebin.com/ubahuvitos.1c
ajodl.oum.edu.my - M1: http://dpaste.com/1X7TWAB M2: http://ixmr.kpaste.net/00a5d69 M3: http://text.cf/view/a3146f3d M4: http://hastebin.com/exicohamok.1c
alumni.abu.edu.ng - M1: http://dpaste.com/13KB26V M2: http://ixmr.kpaste.net/0c0d8f4f M3: http://hastebin.com/ovaparewad.1c M4: https://dpaste.de/FGbU
alumni.cgi.rice.edu - M1: http://dpaste.com/30KS6FV M2: http://ixmr.kpaste.net/ee671 M3: http://hastebin.com/imokixanif.1c M4: https://dpaste.de/gH2S
amp.edu.pl - M1: http://dpaste.com/24GPAH8 M2: http://ixmr.kpaste.net/f7331a7355 M3: http://hastebin.com/ujifehixok.mel M4: https://dpaste.de/f32U
andhrauniversity.edu.in - M1: http://dpaste.com/0MRZ6B2 M2: http://ixmr.kpaste.net/bfebf18fc M3: http://hastebin.com/metinejaru.dos M4: https://dpaste.de/DwRv
apl01.esap.edu.co - M1: http://dpaste.com/1WJBFSA M2: http://ixmr.kpaste.net/82c0 M3: http://hastebin.com/cikibunimo.dos M4: https://dpaste.de/jRiY
apps.exploratorium.edu - M1: http://dpaste.com/18KWNFR M2: http://ixmr.kpaste.net/187c234a9f M3: http://hastebin.com/obuqazopun.dos M4: https://dpaste.de/5gDM
apps.ucab.edu.ve - M1: http://dpaste.com/092S9XN M2: http://ixmr.kpaste.net/e19 M3: http://hastebin.com/niqusatica.tex M4: https://dpaste.de/S1x8
apss.polyu.edu.hk - M1: http://dpaste.com/1597Q94 M2: http://ixmr.kpaste.net/d89fc M3: http://hastebin.com/unohuzakeq.avrasm M4: https://dpaste.de/rw6V
art.umbc.edu - M1: http://dpaste.com/2W1NRX4 M2: http://ixmr.kpaste.net/e18755 M3: http://hastebin.com/uqeyubesij.1c M4: https://dpaste.de/RnAu
artsky.sdau.edu.cn - M1: http://dpaste.com/33PR9NE M2: http://ixmr.kpaste.net/e9ec5 M3: http://hastebin.com/zoxosaquvu.1c M4: https://dpaste.de/4ueC
asa.qa.mnscu.edu - M1: http://dpaste.com/1N1G65N M2: http://ixmr.kpaste.net/ceca9 M3: http://hastebin.com/fafonegupo.1c M4: https://dpaste.de/nttH
asn.csus.edu - M1: http://dpaste.com/27WJZ1K M2: http://ixmr.kpaste.net/54dd M3: http://hastebin.com/ivonifigev.1c M4: https://dpaste.de/eu1R
astro.ncu.edu.tw - M1: http://dpaste.com/2KYE5TW M2: http://ixmr.kpaste.net/d33f M3: http://hastebin.com/filoruxige.tex M4: https://dpaste.de/67CG
au.cug.edu.cn - M1: http://dpaste.com/2CGNW3B M2: http://ixmr.kpaste.net/d7e6 M3: http://hastebin.com/akazivubum.1c M4: https://dpaste.de/vgnE
auk.edu.kw - M1: http://dpaste.com/0ZWS485 M2: http://ixmr.kpaste.net/86e67d M3: http://hastebin.com/oceziruboh.1c M4: https://dpaste.de/nh6v
bbs.usst.edu.cn - M1: http://dpaste.com/2KTQ557 M2: http://ixmr.kpaste.net/255d7 M3: http://hastebin.com/epovohatuy.1c M4: https://dpaste.de/VPMS
bdigital.uncu.edu.ar - M1: http://dpaste.com/01N80E7 M2: http://ixmr.kpaste.net/421e8f8 M3: http://hastebin.com/duyiguxiki.tex M4: https://dpaste.de/BbSq
boulderps.wa.edu.au - M1: http://dpaste.com/18BTHM0 M2: http://ixmr.kpaste.net/5e7b654a M3: http://hastebin.com/afigesahij.1c M4: https://dpaste.de/c5MV
bscc.edu - M1: http://dpaste.com/2RFMJQZ M2: http://ixmr.kpaste.net/782d M3: http://hastebin.com/rogejogihe.1c M4: https://dpaste.de/60YY
bzu.edu.pk - M1: http://dpaste.com/1FT9Y8F M2: http://ixmr.kpaste.net/40919e M3: http://hastebin.com/ulopinecex.1c M4: https://dpaste.de/q0J9
caf.ctu.edu.vn - M1: http://dpaste.com/2BG024J M2: http://ixmr.kpaste.net/b7c0 M3: http://hastebin.com/ilavebiloz.1c M4: https://dpaste.de/dygs
caim2014.unne.edu.ar - M1: http://dpaste.com/112QZ2J M2: http://ixmr.kpaste.net/a84a091ae5 M3: http://hastebin.com/ususulasap.1c M4: https://dpaste.de/dcRV
calendar.hpu.edu - M1: http://dpaste.com/10PYFT0 M2: http://ixmr.kpaste.net/6330a M3: http://hastebin.com/wipenoboyo.1c M4: https://dpaste.de/0v52
callutheran.edu - M1: http://dpaste.com/1P9TF8R M2: http://ixmr.kpaste.net/0f33a9d M3: http://hastebin.com/oxavaxubav.1c M4: https://dpaste.de/XAnK
car.clemson.edu - M1: http://dpaste.com/12XDA94 M2: http://ixmr.kpaste.net/416bd53 M3: http://hastebin.com/ogiyawanoy.1c M4: https://dpaste.de/DL7q
cbt.fcyt.umss.edu.bo - M1: http://dpaste.com/2S4WW6H M2: http://ixmr.kpaste.net/465ab47 M3: http://hastebin.com/ewafemehah.1c M4: https://dpaste.de/2CcA
cchs.tyc.edu.tw - M1: http://dpaste.com/171Z710 M2: http://ixmr.kpaste.net/4a6ec M3: http://hastebin.com/omebavaguz.1c M4: https://dpaste.de/J3ve
ccjh.hcc.edu.tw - M1: http://dpaste.com/1NR0GYV M2: http://ixmr.kpaste.net/9dd M3: http://hastebin.com/fotolagoxa.1c M4: https://dpaste.de/3euG
cecytebcs.edu.mx - M1: http://dpaste.com/38S7BBV M2: http://ixmr.kpaste.net/d2f7651 M3: http://hastebin.com/mafemoriza.1c M4: https://dpaste.de/y6ac
central-estudante.cesuca.edu.br - M1: http://dpaste.com/00BSPFM M2: http://ixmr.kpaste.net/5b7dd4441 M3: http://hastebin.com/ukececiwuk.1c M4: https://dpaste.de/Xohj
cerien.upc.edu - M1: http://dpaste.com/3GMGCHN M2: http://ixmr.kpaste.net/ede1c0f10 M3: http://hastebin.com/tucaloyiyi.1c M4: https://dpaste.de/mymE
cerpch.unifei.edu.br - M1: http://dpaste.com/01WDT3C M2: http://ixmr.kpaste.net/8a5a M3: http://hastebin.com/zalatadagi.1c M4: https://dpaste.de/K10c
cgi.iit.edu - M1: http://dpaste.com/0B7QAV3 M2: http://ixmr.kpaste.net/a97d M3: http://hastebin.com/demimafako.1c M4: https://dpaste.de/6M9Y
chaffey.edu - M1: http://dpaste.com/36KRRYE M2: http://ixmr.kpaste.net/dbd470 M3: http://hastebin.com/eyakoqesow.php M4: https://dpaste.de/NJP1
chfie.agh.edu.pl - M1: http://dpaste.com/15SYW4D M2: http://ixmr.kpaste.net/917e0c M3: http://hastebin.com/rolacihapi.1c M4: https://dpaste.de/AjHJ
chip.uconn.edu - M1: http://dpaste.com/1PG583Q M2: http://ixmr.kpaste.net/461866b M3: http://hastebin.com/ihitosuxes.1c M4: https://dpaste.de/db20
ciae.asia.edu.tw - M1: http://dpaste.com/32WDMBJ M2: http://ixmr.kpaste.net/a438 M3: http://hastebin.com/yalufebafe.md M4: https://dpaste.de/N9D9
cinjweb.umdnj.edu - M1: http://dpaste.com/1TCS4HC M2: http://ixmr.kpaste.net/f81feb7 M3: http://hastebin.com/anayemiguw.1c M4: https://dpaste.de/Ao6O
cjlu.edu.cn - M1: http://dpaste.com/1KTWQMA M2: http://ixmr.kpaste.net/43da8d6f76 M3: http://hastebin.com/muyeqijulo.1c M4: https://dpaste.de/ebPm
clarkson.edu - M1: http://dpaste.com/1J0TZBQ M2: http://ixmr.kpaste.net/e75c8cd2c M3: http://hastebin.com/cudakuyico.avrasm M4: https://dpaste.de/Xpx3
clemson.edu - M1: http://dpaste.com/2ZVC2GQ M2: http://ixmr.kpaste.net/e7172 M3: http://hastebin.com/idabiseman.1c M4: https://dpaste.de/NSJB
cmms.agh.edu.pl - M1: http://dpaste.com/2DPFBVJ M2: http://ixmr.kpaste.net/9567bd M3: http://hastebin.com/fudutepoti.tex M4: https://dpaste.de/zCq0
cms.delmar.edu - M1: http://dpaste.com/00SZRC0 M2: http://ixmr.kpaste.net/aa87c2b59 M3: http://hastebin.com/hihedimizu.1c M4: https://dpaste.de/YDa0
cndr.hit.edu.cn - M1: http://dpaste.com/3MYQ7H8 M2: http://ixmr.kpaste.net/a92f M3: http://hastebin.com/erobovuzum.1c M4: https://dpaste.de/iiov
control.unet.edu.ve - M1: http://dpaste.com/0NBFD41 M2: http://ixmr.kpaste.net/a6b8d1a6 M3: http://hastebin.com/famokojofi.1c M4: https://dpaste.de/swm7
crs.cuhk.edu.hk - M1: http://dpaste.com/12FN8JE M2: http://ixmr.kpaste.net/3c987a M3: http://hastebin.com/atozuzicuh.1c M4: https://dpaste.de/Tsix
cs.rmit.edu.au - M1: http://dpaste.com/0W4QTW0 M2: http://ixmr.kpaste.net/674b M3: http://hastebin.com/pawoquxile.1c M4: https://dpaste.de/gnnX
csrc.if.uj.edu.pl - M1: http://dpaste.com/13NBFT5 M2: http://ixmr.kpaste.net/9f6 M3: http://hastebin.com/werotecipo.1c M4: https://dpaste.de/NCAJ
ctep.npust.edu.tw - M1: http://dpaste.com/2D4TCQ7 M2: http://ixmr.kpaste.net/837557a4 M3: http://hastebin.com/fekelaquka.1c M4: https://dpaste.de/pDGJ
db.lib.uidaho.edu - M1: http://dpaste.com/0BN06MQ M2: http://ixmr.kpaste.net/b49221 M3: http://hastebin.com/ifirutozuj.vhdl M4: https://dpaste.de/9XVP
dct.nctu.edu.tw - M1: http://dpaste.com/2JJ9WPS M2: http://ixmr.kpaste.net/61bb5e5b M3: http://hastebin.com/azevodujon.1c M4: https://dpaste.de/3SpO
dec.ufcg.edu.br - M1: http://dpaste.com/02SM7D1 M2: http://ixmr.kpaste.net/465e0ca38 M3: http://hastebin.com/eruyoxumoz.sm M4: https://dpaste.de/v6BD
design.anadolu.edu.tr - M1: http://dpaste.com/0FT498W M2: http://ixmr.kpaste.net/2b M3: http://hastebin.com/isewocegup.1c M4: https://dpaste.de/qQB4
dqxy.lzjtu.edu.cn - M1: http://dpaste.com/2S2FQ04 M2: http://ixmr.kpaste.net/f4a M3: http://hastebin.com/ejebixonoz.1c M4: https://dpaste.de/k13V
drury.edu - M1: http://dpaste.com/2DT4WX6 M2: http://ixmr.kpaste.net/d918e077a M3: http://hastebin.com/gehoyocelu.parser3 M4: https://dpaste.de/oRS5
dsa.ntue.edu.tw - M1: http://dpaste.com/0ABC26D M2: http://ixmr.kpaste.net/08d M3: http://hastebin.com/werufulabo.1c M4: https://dpaste.de/2rNx
dsdj.gallaudet.edu - M1: http://dpaste.com/2Y4818Z M2: http://ixmr.kpaste.net/70d145 M3: http://hastebin.com/ucagonuriq.xml M4: https://dpaste.de/2XFB
eba7.cct.ufcg.edu.br - M1: http://dpaste.com/02232RP M2: http://ixmr.kpaste.net/beefed5 M3: http://hastebin.com/orucihigev.1c M4: https://dpaste.de/2NJo
ece.uprm.edu - M1: http://dpaste.com/2DG7EVG M2: http://ixmr.kpaste.net/4629d0 M3: http://hastebin.com/ewexapelep.1c M4: https://dpaste.de/Oudg
ecs.csus.edu - M1: http://dpaste.com/1J2N85K M2: http://ixmr.kpaste.net/155e0e M3: http://hastebin.com/ecujelohod.pl M4: https://dpaste.de/LhAC
eku.edu - M1: http://dpaste.com/278B7KJ M2: http://ixmr.kpaste.net/20125d84a1 M3: http://hastebin.com/fawazizeko.1c M4: https://dpaste.de/dqpB
ema.comm.nccu.edu.tw - M1: http://dpaste.com/223KDWZ M2: http://ixmr.kpaste.net/b300f7 M3: http://hastebin.com/ofibamadul.1c M4: https://dpaste.de/LkBB
engl.polyu.edu.hk - M1: http://dpaste.com/2EWWS4B M2: http://ixmr.kpaste.net/4cfa8841 M3: http://hastebin.com/toviyinoje.1c M4: https://dpaste.de/uUBk
vtsh.tc.edu.tw - M1: http://dpaste.com/27J9PRH M2: http://ixmr.kpaste.net/516bb3 M3: http://hastebin.com/kemikociko.1c M4: https://dpaste.de/oCYz
whsh.tc.edu.tw - M1: http://dpaste.com/1CDSBZE M2: http://ixmr.kpaste.net/9b9658e M3: http://hastebin.com/ayejibadux.1c M4: https://dpaste.de/LjjG
english.cmu.edu.tw - M1: http://dpaste.com/2AXDB8R M2: http://ixmr.kpaste.net/cd5c023f M3: http://hastebin.com/isiwocaved.1c M4: https://dpaste.de/rQ4k
english.cumtb.edu.cn - M1: http://dpaste.com/2FWB20F M2: http://lxmr.kpaste.net/ae9 M3: http://hastebin.com/folaxexobe.1c M4: https://dpaste.de/11dZ
epic.cuir.uwm.edu - M1: http://dpaste.com/05N7RDE M2: http://lxmr.kpaste.net/afc949 M3: http://hastebin.com/duvoviyuse.mel M4: https://dpaste.de/kM9o
epis.upt.edu.pe - M1: http://dpaste.com/2HESV11 M2: http://lxmr.kpaste.net/b8beb8c2dd M3: http://hastebin.com/boniholixa.1c M4: https://dpaste.de/tncJ
etc.cmu.edu.cn - M1: http://dpaste.com/3JPMFW6 M2: http://lxmr.kpaste.net/12df6dc2d M3: http://hastebin.com/hefuveruma.1c M4: https://dpaste.de/5wr3
events.internet2.edu - M1: http://dpaste.com/1K4ZSS5 M2: http://lxmr.kpaste.net/e155c M3: http://hastebin.com/oyoconuzem.1c M4: https://dpaste.de/jDyM
facdef.unt.edu.ar - M1: http://dpaste.com/024ETXB M2: http://lxmr.kpaste.net/1bc3b1 M3: http://hastebin.com/kopazorawu.tex M4: https://dpaste.de/uE11
faosuccessclass.abtech.edu - M1: http://dpaste.com/2EQ4Q7R M2: http://lxmr.kpaste.net/55f4f M3: http://hastebin.com/obunafijox.1c M4: https://dpaste.de/urqc
fcejs.unsl.edu.ar - M1: http://dpaste.com/37Z94TE M2: http://lxmr.kpaste.net/d99c2 M3: http://hastebin.com/ogaqahelom.tex M4: https://dpaste.de/jVFz
fet-training.mmu.edu.my - M1: http://dpaste.com/1BCE4Q2 M2: http://lxmr.kpaste.net/55167fc3 M3: http://hastebin.com/isudasovix.1c M4: https://dpaste.de/kS44
finaid.columbusstate.edu - M1: http://dpaste.com/1W8WSZQ M2: http://lxmr.kpaste.net/46c M3: http://hastebin.com/idiberapeg.php M4: https://dpaste.de/c6XJ
fisica.uns.edu.ar - M1: http://dpaste.com/1PQQZ8K M2: http://lxmr.kpaste.net/4b331 M3: http://hastebin.com/hiwutacodo.xml M4: https://dpaste.de/dRei
fpc.upc.edu - M1: http://dpaste.com/33F7PZV M2: http://lxmr.kpaste.net/a60d80e5ab M3: http://hastebin.com/icecopezoh.1c M4: https://dpaste.de/L2AS
fs.fju.edu.tw - M1: http://dpaste.com/1JNAD1E M2: http://lxmr.kpaste.net/4d2083ae M3: http://hastebin.com/qiqozelato.1c M4: https://dpaste.de/8ri5
fsciences.ul.edu.lb - M1: http://dpaste.com/3TV9TZZ M2: http://lxmr.kpaste.net/5b M3: http://hastebin.com/otesigoquf.1c M4: https://dpaste.de/iXcQ
futa.edu.ng - M1: http://dpaste.com/3W2XKCY M2: http://lxmr.kpaste.net/3349496f1 M3: http://hastebin.com/azuluvawul.1c M4: https://dpaste.de/KVqw
fuzzyss.yildiz.edu.tr - M1: http://dpaste.com/1B2DHMC M2: http://lxmr.kpaste.net/0b8e M3: http://hastebin.com/licawedovi.1c M4: https://dpaste.de/Bpty
gain.mercer.edu - M1: http://dpaste.com/0H403DB M2: http://ixmr.kpaste.net/74f M3: http://hastebin.com/ejalilezur.1c M4: https://dpaste.de/74re
galeria.uc.edu.ve - M1: http://dpaste.com/3MZ1B7T M2: http://ixmr.kpaste.net/11a M3: http://hastebin.com/ucunalowut.1c M4: https://dpaste.de/2sfS
ganymede.phys.subr.edu - M1: http://dpaste.com/0E15B93 M2: http://ixmr.kpaste.net/e15acd95 M3: http://hastebin.com/lisirolebe.1c M4: https://dpaste.de/gzzr
geodados.pg.utfpr.edu.br - M1: http://dpaste.com/3Q1MT80 M2: http://ixmr.kpaste.net/e56 M3: http://hastebin.com/hiqugabepu.1c M4: https://dpaste.de/mOkS
geografiayturismo.uns.edu.ar - M1: http://dpaste.com/3BJC00B M2: http://ixmr.kpaste.net/10ff0193 M3: http://hastebin.com/ojigupofef.1c M4: https://dpaste.de/pXQY
gis.metu.edu.tr - M1: http://dpaste.com/38MV90M M2: http://ixmr.kpaste.net/6c3310af M3: http://hastebin.com/eyoticidac.mel M4: https://dpaste.de/aD8k
globaleducation.fdu.edu - M1: http://dpaste.com/04R88X2 M2: http://ixmr.kpaste.net/ae384a452 M3: http://hastebin.com/suxoxesuno.1c M4: https://dpaste.de/un90
gnu.bnj.edu.cn - M1: http://dpaste.com/2N73SPT M2: http://ixmr.kpaste.net/f53 M3: http://hastebin.com/banopawaso.1c M4: https://dpaste.de/W8YM
gpde.smumn.edu - M1: http://dpaste.com/16EAK0T M2: http://ixmr.kpaste.net/f9fb0e M3: http://hastebin.com/olefomubod.pl M4: https://dpaste.de/DYV9
greenhouse.lab.uaf.edu - M1: http://dpaste.com/1X0XKTW M2: http://ixmr.kpaste.net/55d3be M3: http://hastebin.com/tiroyuyogu.1c M4: https://dpaste.de/Qi7h
greenvillemed.sc.edu - M1: http://dpaste.com/3Z15WPE M2: http://ixmr.kpaste.net/c91c76ec0 M3: http://hastebin.com/aqunekerum.1c M4: https://dpaste.de/kp3Q
gyjdi.jmu.edu.cn - M1: http://dpaste.com/07M4T1S M2: http://ixmr.kpaste.net/cbdf8d7 M3: http://hastebin.com/pasefigaja.1c M4: https://dpaste.de/xtsO
herb.valdosta.edu - M1: http://dpaste.com/0Z0GJ59 M2: http://ixmr.kpaste.net/956da9a3b M3: http://hastebin.com/apofisafur.1c M4: https://dpaste.de/T3pU
hr.nau.edu - M1: http://dpaste.com/32FPBPV M2: http://ixmr.kpaste.net/2ed6a8070 M3: http://hastebin.com/moyetuhanu.1c M4: https://dpaste.de/F1sw
hrdc.unilag.edu.ng - M1: http://dpaste.com/2JWYXQ8 M2: http://ixmr.kpaste.net/a1421 M3: http://hastebin.com/mupogojaje.1c M4: https://dpaste.de/zSYP
hu.edu.pk - M1: http://dpaste.com/2QPKPRF M2: http://ixmr.kpaste.net/6403c89436 M3: http://hastebin.com/owixonimex.1c M4: https://dpaste.de/dcRi
ibms.sinica.edu.tw - M1: http://dpaste.com/26EFHK1 M2: http://ixmr.kpaste.net/683217e0ba M3: http://hastebin.com/iciteqexun.1c M4: https://dpaste.de/GV9k
icao.nau.edu.ua - M1: http://dpaste.com/0GCW0P1 M2: http://ixmr.kpaste.net/644a5c67 M3: http://hastebin.com/ulujisekav.1c M4: https://dpaste.de/K01P
ics.upesh.edu.pk - M1: http://dpaste.com/1ZMGABA M2: http://ixmr.kpaste.net/0eecb4ab1 M3: http://hastebin.com/olavahafen.1c M4: https://dpaste.de/8aPs
idc.hust.edu.cn - M1: http://dpaste.com/1K866P6 M2: http://ixmr.kpaste.net/a1091d8 M3: http://hastebin.com/cuquheyiwa.1c M4: https://dpaste.de/ooZT
ie.hust.edu.tw - M1: http://dpaste.com/0KQ49KW M2: http://ixmr.kpaste.net/7bc8fe578 M3: http://hastebin.com/oquqinonug.avrasm M4: https://dpaste.de/HD85
ie.mgt.ncu.edu.tw - M1: http://dpaste.com/1GM3SS4 M2: http://ixmr.kpaste.net/9db20 M3: http://hastebin.com/abesiruwoc.1c M4: https://dpaste.de/8ssg
iem.yuntech.edu.tw - M1: http://dpaste.com/2GABJQV M2: http://ixmr.kpaste.net/464fe2f M3: http://hastebin.com/axuxevadud.1c M4: https://dpaste.de/N00n
ifp.ur.edu.pl - M1: http://dpaste.com/24CMFCY M2: http://ixmr.kpaste.net/c9eee M3: http://hastebin.com/jakiwuheqi.1c M4: https://dpaste.de/Yyow
ihd.umkc.edu - M1: http://dpaste.com/17BSEFX M2: http://ixmr.kpaste.net/2dda53 M3: http://hastebin.com/hakuhodaza.vhdl M4: https://dpaste.de/YRef
iiete.unl.edu.ar - M1: http://dpaste.com/18C9CCR M2: http://ixmr.kpaste.net/013a M3: http://hastebin.com/xuzihupana.1c M4: https://dpaste.de/ouFM
imics.nccu.edu.tw - M1: http://dpaste.com/10G7GNJ M2: http://ixmr.kpaste.net/777a8c6b5 M3: http://hastebin.com/lobavicudi.1c M4: https://dpaste.de/LAcW
imu.edu.in - M1: http://dpaste.com/322CZZZ M2: http://ixmr.kpaste.net/762fb4377 M3: http://hastebin.com/xutopinotu.1c M4: https://dpaste.de/rMOP
info.ujn.edu.cn - M1: http://dpaste.com/1J9WBHJ M2: http://ixmr.kpaste.net/771d2b9a M3: http://hastebin.com/yaherihilo.1c M4: https://dpaste.de/zfkB
ing.unp.edu.ar - M1: http://dpaste.com/3A3A6WX M2: http://ixmr.kpaste.net/bf46d3a0 M3: http://hastebin.com/xiwuyizofa.1c M4: https://dpaste.de/KHAs
inteachershands.education.ecu.edu.au - M1: http://dpaste.com/234EQQF M2: http://ixmr.kpaste.net/cfabbaef M3: http://hastebin.com/xuyiwuwuko.avrasm M4: https://dpaste.de/WTDj
intrel.lnu.edu.ua - M1: http://dpaste.com/0VS9JDT M2: http://ixmr.kpaste.net/6d3eb32663 M3: http://hastebin.com/asoqolecix.tex M4: https://dpaste.de/QOTu
ipodp.lnu.edu.ua - M1: http://dpaste.com/1739WGF M2: http://ixmr.kpaste.net/2eb92 M3: http://hastebin.com/uxixiyacez.1c M4: https://dpaste.de/D36y
istatistik.gediz.edu.tr - M1: http://dpaste.com/2SFVXP2 M2: http://ixmr.kpaste.net/95f7f04 M3: http://hastebin.com/agesesicin.1c M4: https://dpaste.de/Zw0v
itfmoe.istanbul.edu.tr - M1: http://dpaste.com/07WE90W M2: http://ixmr.kpaste.net/b8076cd0 M3: http://hastebin.com/witobafisa.1c M4: https://dpaste.de/f1dw
its.pdx.edu - M1: http://dpaste.com/19K5SD0 M2: http://ixmr.kpaste.net/385d M3: http://hastebin.com/retulineje.vhdl M4: https://dpaste.de/Zs11
jgu.edu.in - M1: http://dpaste.com/08P9CWS M2: http://ixmr.kpaste.net/708bbe M3: http://hastebin.com/bifapeguco.1c M4: https://dpaste.de/VRZG
jnvu.edu.in - M1: http://dpaste.com/26ZCN23 M2: http://ixmr.kpaste.net/0f24ac8f1 M3: http://hastebin.com/tudenovore.1c M4: https://dpaste.de/AQcQ
jobs.grc.calpoly.edu - M1: http://dpaste.com/0Z33ZZ1 M2: http://ixmr.kpaste.net/0533eb M3: http://hastebin.com/qudaqemifu.1c M4: https://dpaste.de/kQXF
jswm.yangtzeu.edu.cn - M1: http://dpaste.com/2JYV4HR M2: http://ixmr.kpaste.net/bd0b00 M3: http://hastebin.com/udazoqiquj.1c M4: https://dpaste.de/zhHg
jxjy.bfa.edu.cn - M1: http://dpaste.com/17E9R5B M2: http://ixmr.kpaste.net/17f M3: http://hastebin.com/itesoxetel.1c M4: https://dpaste.de/BQWi
kdu.edu.ua - M1: http://dpaste.com/354FF68 M2: http://ixmr.kpaste.net/f838 M3: http://hastebin.com/qiyagibaji.1c M4: https://dpaste.de/cz4W
kjyysk.zufe.edu.cn - M1: http://dpaste.com/32W300K M2: http://ixmr.kpaste.net/6e008fc90 M3: http://hastebin.com/etuvakagec.1c M4: https://dpaste.de/R2Qu
kkrrit2014.ire.pw.edu.pl - M1: http://dpaste.com/39HT3GG M2: http://ixmr.kpaste.net/33c0bdbd M3: http://hastebin.com/ibajayumuz.1c M4: https://dpaste.de/voEF
kpaprzycka.swps.edu.pl - M1: http://dpaste.com/333TNXD M2: http://ixmr.kpaste.net/52b909cd4 M3: http://hastebin.com/zegogokere.1c M4: https://dpaste.de/YXuz
krmangalam.edu.in - M1: http://dpaste.com/328V84X M2: http://ixmr.kpaste.net/4bca73 M3: http://hastebin.com/nireyorahe.1c M4: https://dpaste.de/k9Yf
laniertech.edu - M1: http://dpaste.com/112GJ74 M2: http://ixmr.kpaste.net/c3281d5c M3: http://hastebin.com/ugitorecex.xml M4: https://dpaste.de/tipX
lcd.efn.unc.edu.ar - M1: http://dpaste.com/01PFC2A M2: http://ixmr.kpaste.net/7dc97a8 M3: http://hastebin.com/awavuyaroc.1c M4: https://dpaste.de/Fb4B
lcd.efn.uncor.edu - M1: http://dpaste.com/1SPP1MM M2: http://ixmr.kpaste.net/9145b69c3 M3: http://hastebin.com/dajilibako.1c M4: https://dpaste.de/2R52
lib.pondiuni.edu.in - M1: http://dpaste.com/05EZ8CF M2: http://ixmr.kpaste.net/1068b211 M3: http://hastebin.com/imasimaxiz.1c M4: https://dpaste.de/1P0d
library.iit.edu - M1: http://dpaste.com/3Y2PE63 M2: http://ixmr.kpaste.net/a23241e M3: http://hastebin.com/ninoyogege.1c M4: https://dpaste.de/HgvG
library.iub.edu.pk - M1: http://dpaste.com/2Z60BK4 M2: http://ixmr.kpaste.net/0d5ee6689 M3: http://hastebin.com/vukusofehu.1c M4: https://dpaste.de/sPOH
library.moody.edu - M1: http://dpaste.com/3TJ338K M2: http://ixmr.kpaste.net/cc7825 M3: http://hastebin.com/xotoxarite.1c M4: https://dpaste.de/FSNQ
libweb.vassar.edu - M1: http://dpaste.com/0EVA3D1 M2: http://ixmr.kpaste.net/928aa6 M3: http://hastebin.com/pejociyuso.1c M4: https://dpaste.de/UODX
lixue.swjtu.edu.cn - M1: http://dpaste.com/2TEWRHS M2: http://ixmr.kpaste.net/46187f4 M3: http://hastebin.com/nifukujupa.1c M4: https://dpaste.de/pL4g
lntgw.lnu.edu.cn - M1: http://dpaste.com/0GP0H6T M2: http://ixmr.kpaste.net/8f03 M3: http://hastebin.com/omuqegocas.1c M4: https://dpaste.de/rkya
lsawarchives.lib.lehigh.edu - M1: http://dpaste.com/2G0QSQ2 M2: http://ixmr.kpaste.net/3dc2 M3: http://hastebin.com/xehimimate.1c M4: https://dpaste.de/Rk3y
ltgy.nwnu.edu.cn - M1: http://dpaste.com/36P3JT2 M2: http://ixmr.kpaste.net/c266f4ca9 M3: http://hastebin.com/beluquwojo.1c M4: https://dpaste.de/qm7D
.newinti.edu.my - M1: http://dpaste.com/11D77H1 M2: http://ixmr.kpaste.net/5aed2c M3: http://hastebin.com/yojufewehi.1c M4: https://dpaste.de/CYFK
masscom.cu.edu.eg - M1: http://dpaste.com/1K2RN1P M2: http://ixmr.kpaste.net/9079d3cb M3: http://hastebin.com/fofesixeke.1c M4: https://dpaste.de/u12V
math.umb.edu - M1: http://dpaste.com/00VY1HG M2: http://ixmr.kpaste.net/2cd M3: http://hastebin.com/niwiwureja.1c M4: https://dpaste.de/xzMR
math.uww.edu - M1: http://dpaste.com/39M6SWJ M2: http://ixmr.kpaste.net/22d1e2 M3: http://hastebin.com/amequvoqis.1c M4: https://dpaste.de/ayNE
mathinfo.montclair.edu - M1: http://dpaste.com/1CWG418 M2: http://ixmr.kpaste.net/795c M3: http://hastebin.com/pixozobuxe.1c M4: https://dpaste.de/sp7y
mcc.edu - M1: http://dpaste.com/0KNZZJZ M2: http://ixmr.kpaste.net/2479b3 M3: http://hastebin.com/fufapafese.1c M4: https://dpaste.de/TrSE
mccneb.edu - M1: http://dpaste.com/3KGDETE M2: http://ixmr.kpaste.net/8f2fa M3: http://hastebin.com/tihakeyixi.avrasm M4: https://dpaste.de/Oou8
media.fit.edu - M1: http://dpaste.com/0PKNET7 M2: http://ixmr.kpaste.net/61abbf4 M3: http://hastebin.com/yayanoxiga.1c M4: https://dpaste.de/PmpJ
media.uah.edu - M1: http://dpaste.com/19M1JTY M2: http://ixmr.kpaste.net/91d5d8a M3: http://hastebin.com/qequgawoli.1c M4: https://dpaste.de/P0i6
membr.uwm.edu - M1: http://dpaste.com/10HJQG7 M2: http://ixmr.kpaste.net/59a4298 M3: http://hastebin.com/dimuwitapu.1c M4: https://dpaste.de/0WeW
meyerhoff.goucher.edu - M1: http://dpaste.com/0QS20JS M2: http://ixmr.kpaste.net/f3c549eaeb M3: http://hastebin.com/jilabiwasu.avrasm M4: https://dpaste.de/FvwT
mgt.ncu.edu.tw - M1: http://dpaste.com/3BCRRE3 M2: http://ixmr.kpaste.net/f69c9c M3: http://hastebin.com/qajalixixe.1c M4: https://dpaste.de/3P6f
modularte.gazi.edu.tr - M1: http://dpaste.com/2G0H9QX M2: http://ixmr.kpaste.net/08c M3: http://hastebin.com/uqusuvibep.1c M4: https://dpaste.de/ObVn
music.cp.utfpr.edu.br - M1: http://dpaste.com/31WA28K M2: http://ixmr.kpaste.net/fd7db5 M3: http://hastebin.com/qawafuciqi.1c M4: https://dpaste.de/bjWd
music.uindy.edu - M1: http://dpaste.com/0EPCBAF M2: http://ixmr.kpaste.net/87bb73 M3: http://hastebin.com/esadonakew.1c M4: https://dpaste.de/CQc2
mytraining.utsa.edu - M1: http://dpaste.com/1DW82NG M2: http://ixmr.kpaste.net/4ca M3: http://hastebin.com/sacuzejige.1c M4: https://dpaste.de/Du4F
nceg.upesh.edu.pk - M1: http://dpaste.com/3KN7KDF M2: http://ixmr.kpaste.net/15b M3: http://hastebin.com/gulamahara.1c M4: https://dpaste.de/cK0E
nchuaec.nchu.edu.tw - M1: http://dpaste.com/1VY4M95 M2: http://ixmr.kpaste.net/7c1185be M3: http://hastebin.com/gidafekare.1c M4: https://dpaste.de/52jP
news.xauat.edu.cn - M1: http://dpaste.com/22QGJFZ M2: http://ixmr.kpaste.net/eb760d M3: http://hastebin.com/irimiduwuq.1c M4: https://dpaste.de/BC7m
notify.hkuspace.edu.cn - M1: http://dpaste.com/34XBFR1 M2: http://ixmr.kpaste.net/928a40539 M3: http://hastebin.com/isubabacaf.1c M4: https://dpaste.de/Y9Yb
nowinylekarskie.ump.edu.pl - M1: http://dpaste.com/2S25NPK M2: http://ixmr.kpaste.net/e4ae2 M3: http://hastebin.com/vituyapomo.1c M4: https://dpaste.de/Nh0s
nyaa.edu - M1: http://dpaste.com/3W80NSM M2: http://ixmr.kpaste.net/f5b45 M3: http://hastebin.com/muxorimewu.1c M4: https://dpaste.de/O1Xj
oga.ncu.edu.tw - M1: http://dpaste.com/084FPEG M2: http://ixmr.kpaste.net/6f14375 M3: http://hastebin.com/aliwuturon.1c M4: https://dpaste.de/yboq
oiip.uprm.edu - M1: http://dpaste.com/0N4BN35 M2: http://ixmr.kpaste.net/f41bc4f M3: http://hastebin.com/ukekubajut.1c M4: https://dpaste.de/EpHZ
parasit.amp.edu.pl - M1: http://dpaste.com/1XHPW9S M2: http://ixmr.kpaste.net/ca9e883 M3: http://hastebin.com/ekarelaxom.tex M4: https://dpaste.de/UD8r
pcw.ag.uidaho.edu - M1: http://dpaste.com/1TCXKF8 M2: http://ixmr.kpaste.net/94b3 M3: http://hastebin.com/zuzikociri.1c M4: https://dpaste.de/7CYW
pgschool.lautech.edu.ng - M1: http://dpaste.com/3PEPHWQ M2: http://ixmr.kpaste.net/a7b M3: http://hastebin.com/uceremorel.1c M4: https://dpaste.de/4q3s
pharmacy.isu.edu - M1: http://dpaste.com/2GVXCGY M2: http://ixmr.kpaste.net/f32b8 M3: http://hastebin.com/puqudovijo.1c M4: https://dpaste.de/fdug
photo.unlv.edu - M1: http://dpaste.com/27E5NN0 M2: http://ixmr.kpaste.net/f220f45 M3: http://hastebin.com/ropojiriti.hs M4: https://dpaste.de/RK0V
php.uesiglo21.edu.ar - M1: http://dpaste.com/0230Y29 M2: http://ixmr.kpaste.net/b06af8 M3: http://hastebin.com/mucaruxomu.1c M4: https://dpaste.de/4cqa
phps.ylc.edu.tw - M1: http://dpaste.com/27WBPD1 M2: http://ixmr.kpaste.net/150ba4b M3: http://hastebin.com/sosivijeda.sm M4: https://dpaste.de/pRLY
piz.san.edu.pl - M1: http://dpaste.com/1BMWAJ8 M2: http://ixmr.kpaste.net/6d0c7d M3: http://hastebin.com/komidajigi.1c M4: https://dpaste.de/rKFa
pong.uwstout.edu - M1: http://dpaste.com/06B26JH M2: http://ixmr.kpaste.net/25316120a M3: http://hastebin.com/bofawezana.1c M4: https://dpaste.de/QWiT
postgrado.unet.edu.ve - M1: http://dpaste.com/34HQ0Y4 M2: http://ixmr.kpaste.net/0d724c0f42 M3: http://hastebin.com/epolifiloc.1c M4: https://dpaste.de/Uxg4
proyectosacad.itescam.edu.mx - M1: http://dpaste.com/0PNMV0H M2: http://ixmr.kpaste.net/c41fb M3: http://hastebin.com/dukidoqata.1c M4: https://dpaste.de/f5MS
prpg.ufpb.br - M1: http://dpaste.com/2A08RPD M2: http://ixmr.kpaste.net/82429110f M3: http://hastebin.com/oveyetexiw.1c M4: https://dpaste.de/eVy7
psy.fgu.edu.tw - M1: http://dpaste.com/115823R M2: http://ixmr.kpaste.net/9a1f M3: http://hastebin.com/jiyawudame.1c M4: https://dpaste.de/JpNb
pwsztar.edu.pl - M1: http://dpaste.com/1X9WEES M2: http://ixmr.kpaste.net/d2c3d M3: http://hastebin.com/suweyitena.1c M4: https://dpaste.de/FqKF
qec.upesh.edu.pk - M1: http://dpaste.com/296SKWY M2: http://ixmr.kpaste.net/2bb46cf0e M3: http://hastebin.com/tujekiqale.1c M4: https://dpaste.de/eTS5
radio.stu.edu.cn - M1: http://dpaste.com/1NXTPV3 M2: http://ixmr.kpaste.net/fa8202e4 M3: http://hastebin.com/puxafaquqo.1c M4: https://dpaste.de/xYyn
ramjascollege.edu - M1: http://dpaste.com/234AAY6 M2: http://ixmr.kpaste.net/b33512 M3: http://hastebin.com/ozevegumin.1c M4: https://dpaste.de/32yB
rena.edu.ve - M1: http://dpaste.com/38HQ89M M2: http://ixmr.kpaste.net/3c7287 M3: http://hastebin.com/sodicadoge.pl M4: https://dpaste.de/rGz8
research.ncc.metu.edu.tr - M1: http://dpaste.com/3ZY4R4X M2: http://ixmr.kpaste.net/dc9ec6a M3: http://hastebin.com/inegewehac.sm M4: https://dpaste.de/BCXw
rm.dyu.edu.tw - M1: http://dpaste.com/3R393GP M2: http://ixmr.kpaste.net/1867cb5e M3: http://hastebin.com/urenacibec.1c M4: https://dpaste.de/SRPG
saleszar.salesionas.edu - M1: http://dpaste.com/2HNBSMG M2: http://ixmr.kpaste.net/9bc71534 M3: http://hastebin.com/ohojedemix.1c M4: https://dpaste.de/n8cm
sandman.scripps.edu - M1: http://dpaste.com/0SV32H3 M2: http://ixmr.kpaste.net/3c963 M3: http://hastebin.com/izuparepox.1c M4: https://dpaste.de/P4Ju
sct.emu.tr - M1: http://dpaste.com/0AKA173 M2: http://ixmr.kpaste.net/6fca5 M3: http://hastebin.com/ninilubitu.1c M4: https://dpaste.de/evX5
sctcps.hc.edu.tw - M1: http://dpaste.com/3R5TK8F M2: http://ixmr.kpaste.net/dd642c6ae8 M3: http://hastebin.com/etitaxifuq.tex M4: https://dpaste.de/fUmJ
search.plu.edu - M1: http://dpaste.com/0QVXZ7T M2: http://ixmr.kpaste.net/a58dd6 M3: http://hastebin.com/jomutekebu.1c M4: https://dpaste.de/T7B3
sec.ncu.edu.tw - M1: http://dpaste.com/0DCWXXV M2: http://ixmr.kpaste.net/55d07 M3: http://hastebin.com/rodaxalovu.1c M4: https://dpaste.de/viSt
secure.ntsg.umt.edu - M1: http://dpaste.com/00WP35W M2: http://ixmr.kpaste.net/3a0e29b M3: http://hastebin.com/umetoxazeq.1c M4: https://dpaste.de/RQKJ
seer.upc.edu - M1: http://dpaste.com/32ZVXEZ M2: http://ixmr.kpaste.net/abb1b7 M3: http://hastebin.com/epomadelox.tex M4: https://dpaste.de/NEfr
senate.universityofcalifornia.edu - M1: http://dpaste.com/0064B5T M2: http://ixmr.kpaste.net/73f M3: http://hastebin.com/owuqiviziy.mel M4: https://dpaste.de/85oi
server34.pratt.edu - M1: http://dpaste.com/2M3NV6D M2: http://ixmr.kpaste.net/faa2df M3: http://hastebin.com/solegulowu.1c M4: https://dpaste.de/ecX1
sibul.unanleon.edu.ni - M1: http://dpaste.com/0A7WWVB M2: http://ixmr.kpaste.net/f7a M3:
http://hastebin.com/yomezidopa.tex M4: https://dpaste.de/2SWj
sites.und.edu - M1: http://dpaste.com/2XQCR79 M2: http://ixmr.kpaste.net/bde8f9fa M3: http://hastebin.com/isovuludig.1c M4: https://dpaste.de/LSR4
sjauam.amu.edu.pl - M1: http://dpaste.com/37AVDHT M2: http://ixmr.kpaste.net/91b9a85 M3: http://hastebin.com/miheleruyo.1c M4: https://dpaste.de/owvt
smartgeo.mines.edu - M1: http://dpaste.com/1CWPGFN M2: http://ixmr.kpaste.net/4a02c40c M3: http://hastebin.com/todehasibe.1c M4: https://dpaste.de/3PcK
smast.umassd.edu - M1: http://dpaste.com/0THDES6 M2: http://ixmr.kpaste.net/63a2ed62 M3: http://hastebin.com/ugabemomof.1c M4: https://dpaste.de/JfRJ
soj.sysu.edu.cn - M1: http://dpaste.com/12VKKWX M2: http://ixmr.kpaste.net/eb61f0a M3: http://hastebin.com/unaxafaqec.1c M4: https://dpaste.de/pdhf
spe.ntue.edu.tw - M1: http://dpaste.com/2THFSKZ M2: http://ixmr.kpaste.net/c3a M3: http://hastebin.com/axagajuveh.1c M4: https://dpaste.de/SnWp
staff.uob.edu.bh - M1: http://dpaste.com/0K3JG4C M2: http://ixmr.kpaste.net/ae9efb949 M3: http://hastebin.com/amihibaqac.avrasm M4: https://dpaste.de/UJic
strathmore.edu - M1: http://dpaste.com/0X6X27P M2: http://ixmr.kpaste.net/b1c894 M3: http://hastebin.com/ucujafasem.1c M4: https://dpaste.de/5g3f
student.bard.edu - M1: http://dpaste.com/2TTRDEQ M2: http://ixmr.kpaste.net/1480cc9a M3: http://hastebin.com/iboqirinun.1c M4: https://dpaste.de/BYZq
stumail.wcccd.edu - M1: http://dpaste.com/322E1MY M2: http://ixmr.kpaste.net/19bd4f M3: http://hastebin.com/dorigufiqu.avrasm M4: https://dpaste.de/BC4r
svtdummy.hkct.edu.hk - M1: http://dpaste.com/1MGR219 M2: http://ixmr.kpaste.net/a2438452 M3: http://hastebin.com/qucecuyonu.pl M4: https://dpaste.de/fQTH
taos.asiaa.sinica.edu.tw - M1: http://dpaste.com/2FY03E5 M2: http://ixmr.kpaste.net/a7803 M3: http://hastebin.com/ovokepifin.sm M4: https://dpaste.de/jk7K
teca.cecierj.edu.br - M1: http://dpaste.com/3RX1Y20 M2: http://ixmr.kpaste.net/7068d125 M3: http://hastebin.com/aqupoxaviz.1c M4: https://dpaste.de/p4b0
tede.unicuritiba.edu.br - M1: http://dpaste.com/1TKJGMY M2: http://ixmr.kpaste.net/0d41 M3: http://hastebin.com/ojovuzanag.1c M4: https://dpaste.de/2hNv
tico.scuegypt.edu.eg - M1: http://dpaste.com/0A8FS5N M2: http://ixmr.kpaste.net/7b1e5e552f M3: http://hastebin.com/fazufotugu.1c M4: https://dpaste.de/WxD8
tsu.edu.tw - M1: http://dpaste.com/32HHY2H M2: http://ixmr.kpaste.net/ec70c M3: http://hastebin.com/owenocokep.1c M4: https://dpaste.de/ioqd
ucsur.edu.pe - M1: http://dpaste.com/2VMGKCA M2: http://ixmr.kpaste.net/4dd M3: http://hastebin.com/fuxupazesa.1c M4: https://dpaste.de/axmZ
uishe.groups.pdx.edu - M1: http://dpaste.com/1KM3SKM M2: http://ixmr.kpaste.net/e21797ac5 M3: http://hastebin.com/cixoyizowa.1c M4: https://dpaste.de/Ve63
umdc.tuf.edu.pk - M1: http://dpaste.com/2WK2Y3A M2: http://ixmr.kpaste.net/0e06ed0 M3: http://hastebin.com/odigorigay.1c M4: https://dpaste.de/puTM
uni.edu - M1: http://dpaste.com/0H8RZEX M2: http://ixmr.kpaste.net/57fc0150 M3: http://hastebin.com/ilebohufih.tex M4: https://dpaste.de/xinY
unical.edu.ng - M1: http://dpaste.com/08TKQJ5 M2: http://ixmr.kpaste.net/6a2d M3: http://hastebin.com/izihesiceq.1c M4: https://dpaste.de/rKZJ
univdep.edu.mx - M1: http://dpaste.com/17536VA M2: http://ixmr.kpaste.net/2e8e3 M3: http://hastebin.com/mevanupeje.1c M4: https://dpaste.de/UGBk
unne.edu.ar - M1: http://dpaste.com/0ZBH04J M2: http://ixmr.kpaste.net/a5a35057 M3: http://hastebin.com/sodedafiro.1c M4: https://dpaste.de/pEh3
unr.edu.ar - M1: http://dpaste.com/3BTZ73D M2: http://ixmr.kpaste.net/88ae6f035f M3: http://hastebin.com/kojiriwaxi.1c M4: https://dpaste.de/htTd
uwm.edu.pl - M1 http://dpaste.com/0XZK4PG M2: http://ixmr.kpaste.net/f3cf M3: http://hastebin.com/asemiyasah.1c M4: https://dpaste.de/SjgY
victor.phils.uj.edu.pl - M1: http://dpaste.com/199DNEK M2: http://ixmr.kpaste.net/b861d M3: http://hastebin.com/iyasodemah.1c M4: https://dpaste.de/pNNU
virtual.ucab.edu.ve - M1: http://dpaste.com/0CA82EA M2: http://ixmr.kpaste.net/a1c501 M3: http://hastebin.com/ravazagaza.tex M4: https://dpaste.de/pj3a
vquiz.xjau.edu.cn - M1: http://dpaste.com/0PHK4A0 M2: http://ixmr.kpaste.net/ec487f25fd M3: http://hastebin.com/jonutogeju.sm M4: https://dpaste.de/yoGs
vtp152.brambling.cdu.edu.au - M1: http://dpaste.com/148Y3XS M2: http://ixmr.kpaste.net/7831d19 M3: http://hastebin.com/timufomuje.1c M4: https://dpaste.de/2VN8
web.lins.fju.edu.tw - M1: http://dpaste.com/3MPJBDS M2: http://ixmr.kpaste.net/e75350e27 M3: http://hastebin.com/yasahunero.1c M4: https://dpaste.de/R8Xx
webapps.sci.monash.edu - M1: http://dpaste.com/1QW3D4B M2: http://ixmr.kpaste.net/a85d5f M3: http://hastebin.com/quyubanifo.pl M4: https://dpaste.de/eXMQ
webfmn.unsl.edu.ar - M1: http://dpaste.com/2ERZJZR M2: http://ixmr.kpaste.net/ed56a M3: http://hastebin.com/aceqidaniv.1c M4: https://dpaste.de/hhBg
webtools.allegheny.edu - M1: http://dpaste.com/3WD2ZPD M2: http://ixmr.kpaste.net/db7c698a M3: http://hastebin.com/hufolidija.md M4: https://dpaste.de/gRKH
westga.edu - M1: http://dpaste.com/3Y4Q1F3 M2: http://ixmr.kpaste.net/9d772 M3: http://hastebin.com/uruzadaber.1c M4: https://dpaste.de/QaO4
wildbird.loxa.edu.tw - M1: http://dpaste.com/1T1JSR6 M2: http://ixmr.kpaste.net/76acd46 M3: http://hastebin.com/ajezemevec.1c M4: https://dpaste.de/LVMT
wsapps.webster.edu - M1: http://dpaste.com/0A9ES8A M2: http://ixmr.kpaste.net/cb1d1de M3: http://hastebin.com/jonuvepawa.1c M4: https://dpaste.de/558G
wsc.hxu.edu.cn - M1: http://dpaste.com/32G92A3 M2: http://ixmr.kpaste.net/bc633818 M3: http://hastebin.com/orahugogut.1c M4: https://dpaste.de/gFNs
scuec.edu.cn - M1: http://dpaste.com/2SPED5B M2: http://ixmr.kpaste.net/5375a8b M3: http://hastebin.com/ozixureciq.1c M4: https://dpaste.de/wRmE
wittenberg.edu - M1: http://dpaste.com/048Z0A5 M2: http://ixmr.kpaste.net/d5ce6c M3: http://hastebin.com/asakalitix.1c M4: https://dpaste.de/LkFG
ycps.hc.edu.tw - M1: http://dpaste.com/1DYS5XQ M2: http://ixmr.kpaste.net/9c8bc M3: http://hastebin.com/vogasonowa.1c M4: https://dpaste.de/giH6
accessanalytic.com.au - M1: http://dpaste.com/38DVTGZ M2: http://ixmr.kpaste.net/6e6000d4 M3: http://hastebin.com/uxapogemoc.1c M4: https://dpaste.de/ZdHX
aoq.org.au - M1: http://dpaste.com/2PTF0ZB M2: http://ixmr.kpaste.net/e9df63 M3: http://hastebin.com/zufuruvera.1c M4: https://dpaste.de/aAxJ
apps.repco.com.au - M1: http://dpaste.com/1R6VZQC M2: http://ixmr.kpaste.net/caf7 M3: http://hastebin.com/iyatefuvef.1c M4: https://dpaste.de/7WR8
aupassportphoto.com.au - M1: http://dpaste.com/09192VF M2: http://ixmr.kpaste.net/b58016d M3: http://hastebin.com/fecunetalo.1c M4: https://dpaste.de/y9OD
bikenut.com.au - M1: http://dpaste.com/3RM6T7G M2: http://ixmr.kpaste.net/348364dbd M3: http://hastebin.com/fucijasozo.1c M4: https://dpaste.de/pNkr
bypass.net - M1: http://dpaste.com/0CMQE5Q M2: http://ixmr.kpaste.net/2daa39a M3: http://hastebin.com/gowevuziye.xml M4: https://dpaste.de/oOry
careerfaqs.com.au - M1: http://dpaste.com/3AB0GVZ M2: http://ixmr.kpaste.net/88c782 M3: http://hastebin.com/ijedokezek.1c M4: https://dpaste.de/Stf5
customers.ilisys.com.au - M1: http://dpaste.com/17HY8MW M2: http://ixmr.kpaste.net/5ff M3: http://hastebin.com/balepehihi.md M4: https://dpaste.de/8C2w
d2419686.i168.quadrahosting.com.au - M1: http://dpaste.com/3G09EZ2 M2: http://ixmr.kpaste.net/31d66 M3: http://hastebin.com/ogisicufeh.dos M4: https://dpaste.de/6YDc
doggish.com.au - M1: http://dpaste.com/3EF3ESJ M2: http://ixmr.kpaste.net/714e M3: http://hastebin.com/ezoqakiwox.1c M4: https://dpaste.de/yrhp
energywindowfashions.com.au - M1: http://dpaste.com/155EQ71 M2: http://ixmr.kpaste.net/007e15ba57 M3: http://hastebin.com/abohalizes.1c M4: https://dpaste.de/v5vj
farmstock.com.au - M1: http://dpaste.com/1BPDBRA M2: http://ixmr.kpaste.net/d91673b20e M3: http://hastebin.com/diluhixuti.1c M4: https://dpaste.de/YwHe
gallery.mtv.com.au - M1: http://dpaste.com/38W030F M2: http://ixmr.kpaste.net/eae M3: http://hastebin.com/ipanivowiw.1c M4: https://dpaste.de/qjDw
harrispartners.com.au - M1: http://dpaste.com/22V5CBM M2: http://ixmr.kpaste.net/68cf1d52 M3: http://hastebin.com/ogiduwirur.1c M4: https://dpaste.de/1axR
ironedge.com.au - M1: http://dpaste.com/3XREARC M2: http://ixmr.kpaste.net/52e2c6020b M3: http://hastebin.com/aqeqadusox.1c M4: https://dpaste.de/G6H2
j-spec.com.au - M1: http://dpaste.com/0QSVPRK M2: http://ixmr.kpaste.net/d15 M3: http://hastebin.com/sejiziroru.1c M4: https://dpaste.de/T2nK
jamit.com.au - M1: http://dpaste.com/3KJ2H0R M2: http://ixmr.kpaste.net/162ae28 M3: http://hastebin.com/saxucadoqu.1c M4: https://dpaste.de/Lf2h
local.com.au - M1: http://dpaste.com/29M06JS M2: http://ixmr.kpaste.net/2f1 M3: http://hastebin.com/apunoyocup.1c M4: https://dpaste.de/3Oau
m.rawsonhomes.net.au - M1: http://dpaste.com/3ZK21ZZ M2: http://ixmr.kpaste.net/3dc7 M3: http://hastebin.com/ohapayizog.xml M4: https://dpaste.de/bff0
mail-petlink.com.au - M1: http://dpaste.com/3R35G9Z M2: http://ixmr.kpaste.net/46fcb4f4 M3: http://hastebin.com/oluyoxiyuf.pl M4: https://dpaste.de/zxDE
malibupools.com.au - M1: http://dpaste.com/3DBMMV4 M2: http://ixmr.kpaste.net/279bbe3d M3: http://hastebin.com/suqayewiye.1c M4: https://dpaste.de/rERK
melbourneexchange.com.au - M1: http://dpaste.com/3FZY6Q5 M2: http://ixmr.kpaste.net/f8b0eb M3: http://hastebin.com/osudilehoy.1c M4: https://dpaste.de/ijQA
melbourneplaygrounds.com.au - M1: http://dpaste.com/3YJX409 M2: http://ixmr.kpaste.net/1ffac11a M3: http://hastebin.com/xirehugofe.1c M4: https://dpaste.de/xssv
naturecare.com.au - M1: http://dpaste.com/0CKHHFV M2: http://ixmr.kpaste.net/d8bcf8 M3: http://hastebin.com/niyofitadu.1c M4: https://dpaste.de/qh7d
out-there.biz.tmp.anchor.net.au - M1: http://dpaste.com/2R5HJWF M2: http://ixmr.kpaste.net/b21cb0f3f8 M3: http://hastebin.com/bubaliyefa.1c M4: https://dpaste.de/rzMk
plentysingles.com.au - M1: http://dpaste.com/3C1FT08 M2: http://ixmr.kpaste.net/21e7e0525 M3: http://hastebin.com/ekewatepeb.dos M4: https://dpaste.de/5xi0
relocating.com.au - M1: http://dpaste.com/1FGAHB4 M2: http://ixmr.kpaste.net/f511 M3: http://hastebin.com/umodohofaj.1c M4: https://dpaste.de/iJZR
rhodesbeckett.com.au - M1: http://dpaste.com/3X5Q4GR M2: http://ixmr.kpaste.net/17a47ec87c M3: http://hastebin.com/uwubesifew.1c M4: https://dpaste.de/Ewwt
rugsamillion.com.au - M1: http://dpaste.com/29C0J3Z M2: http://ixmr.kpaste.net/9b82 M3: http://hastebin.com/cijecuwipa.1c M4: https://dpaste.de/h94K
sclqld.org.au - M1: http://dpaste.com/0998XRD M2: http://ixmr.kpaste.net/c0faaf M3: http://hastebin.com/cogadozozu.1c M4: https://dpaste.de/LQYp
shop.mja.com.au - M1: http://dpaste.com/1BBXWRY M2: http://ixmr.kpaste.net/90f M3: http://hastebin.com/uxobihucif.1c M4: https://dpaste.de/2nfd
tipsandform.com.au - M1: http://dpaste.com/1AAXZHW M2: http://ixmr.kpaste.net/0a10f41321 M3: http://hastebin.com/ezuxuhupuk.1c M4: https://dpaste.de/qvQC
veredirectory.com.au - M1: http://dpaste.com/3C5DJ8C M2: http://ixmr.kpaste.net/33b3221287 M3: http://hastebin.com/fovewokila.1c M4: https://dpaste.de/f7Cz
webapps.anl.com.au - M1: http://dpaste.com/2GE5SVM M2: http://ixmr.kpaste.net/34f3c209 M3: http://hastebin.com/foruhefutu.1c M4: https://dpaste.de/BKLj
greenpeace.org.au - M1: http://dpaste.com/1JA872F M2: http://ixmr.kpaste.net/7aa M3: http://hastebin.com/jedahepiwu.1c M4: https://dpaste.de/nfzO
3bmeteo.com - M1: http://dpaste.com/1W631AJ M2: http://ixmr.kpaste.net/605d6f6 M3: http://hastebin.com/xazugusaqo.1c M4: https://dpaste.de/9gNz
100bestbuy.info - M1: http://dpaste.com/2GP8FG7 M2: http://ixmr.kpaste.net/b732ffd6 M3: http://hastebin.com/ogokuqohiz.1c M4: https://dpaste.de/XsyS
ala.online.sh.cn - M1: http://dpaste.com/076NHH4 M2: http://ixmr.kpaste.net/81aa79b M3: http://hastebin.com/bakorusago.1c M4: https://dpaste.de/LC1Y
annuaire-metiers.cadres.apec.fr - M1: http://dpaste.com/1C90VPR M2: http://ixmr.kpaste.net/8c986743a M3: http://hastebin.com/xaqewiroco.tex M4: https://dpaste.de/iWmm
annuaires.sudouest.com - M1: http://dpaste.com/2WYYV9D M2: http://ixmr.kpaste.net/e65a7 M3: http://hastebin.com/topiquqebe.md M4: https://dpaste.de/ZDNe
apps.emol.com - M1: http://dpaste.com/0A276FF M2: http://ixmr.kpaste.net/7bbd9 M3: http://hastebin.com/eqenunocav.1c M4: https://dpaste.de/GBb3
ari.nus.edu.sg - M1: http://dpaste.com/30X1RRY M2: http://ixmr.kpaste.net/6bb M3: http://hastebin.com/ufaxoreciz.1c M4: https://dpaste.de/wSD6
ariannaonline.huffingtonpost.com - M1: http://dpaste.com/0HNNA19 M2: http://ixmr.kpaste.net/353f6a1 M3: http://hastebin.com/owiziruroz.1c M4: https://dpaste.de/wTMF
artfairs.ilsole24ore.com - M1: http://dpaste.com/0Q1YHX6 M2: http://ixmr.kpaste.net/5ad4 M3: http://hastebin.com/sefaxasifu.1c M4: https://dpaste.de/hjsy
autos.m.oregonlive.com - M1: http://dpaste.com/27PHQA2 M2: http://ixmr.kpaste.net/c57f7efe8 M3: http://hastebin.com/opuduwimip.1c M4: https://dpaste.de/u5p1
aviseprop.powweb.com - M1: http://dpaste.com/0SWW3CM M2: http://ixmr.kpaste.net/3ebe1039d M3: http://hastebin.com/enadogihul.1c M4: https://dpaste.de/JQtT
bestforexpartners.com - M1: http://dpaste.com/0HES3TX M2: http://ixmr.kpaste.net/719d2 M3: http://hastebin.com/aqirenucug.1c M4: https://dpaste.de/ffUi
bgequipment.powweb.com - M1: http://dpaste.com/0E47WXC M2: http://ixmr.kpaste.net/356f M3: http://hastebin.com/payebuwimi.1c M4: https://dpaste.de/G8sa
bigrock.it - M1: http://dpaste.com/1G4KBRW M2: http://ixmr.kpaste.net/0400d8336 M3: http://hastebin.com/ecogotabeg.1c M4: https://dpaste.de/uDsJ
bizmet.smhi.se - M1: http://dpaste.com/147XV7P M2: http://ixmr.kpaste.net/a1d7b06e04 M3: http://hastebin.com/duyaqoweme.tex M4: https://dpaste.de/Xgvw
bluvista.arcor.de - M1: http://dpaste.com/0DDD9RP M2: http://ixmr.kpaste.net/98d0e6 M3: http://hastebin.com/zunoboyowo.1c M4: https://dpaste.de/Gqpc
bme.miami.edu - M1: http://dpaste.com/30YQDJ8 M2: http://ixmr.kpaste.net/05101435d M3: http://hastebin.com/wesusiwuju.1c M4: https://dpaste.de/3KxU
business.abidjan.net - M1: http://dpaste.com/3FFF2TK M2: http://ixmr.kpaste.net/0c9a7fa7 M3: http://hastebin.com/epibaleven.1c M4: https://dpaste.de/DH8u
cae.miami.edu - M1: http://dpaste.com/34KES82 M2: http://ixmr.kpaste.net/9af1 M3: http://hastebin.com/nipudavoda.1c M4: https://dpaste.de/fvbH
calendar.zoznam.sk - M1: http://dpaste.com/13FGCTD M2: http://ixmr.kpaste.net/f5210 M3: http://hastebin.com/opepoyukec.1c M4: https://dpaste.de/ROoS
cdli.ucla.edu - M1: http://dpaste.com/0S828MP M2: http://ixmr.kpaste.net/708ce488 M3: http://hastebin.com/felisubucu.1c M4: https://dpaste.de/gEGb
ced.cele.unam.mx - M1: http://dpaste.com/0140AD7 M2: http://ixmr.kpaste.net/3b3810bba3 M3: http://hastebin.com/ibecimobaw.1c M4: https://dpaste.de/TiMo
ceo.umich.edu - M1: http://dpaste.com/0NS8TQ6 M2: http://ixmr.kpaste.net/3c933cb M3: http://hastebin.com/eqajavuqab.md M4: https://dpaste.de/cxO6
chinapost.com.tw - M1: http://dpaste.com/1S46FYV M2: http://ixmr.kpaste.net/d87026148 M3: http://hastebin.com/porerebesa.1c M4: https://dpaste.de/V0aL
clickpoint.com - M1: http://dpaste.com/2Z3F5PP M2: http://ixmr.kpaste.net/f589 M3: http://hastebin.com/ugaqefomor.1c M4: https://dpaste.de/SF53
contests.urbanoutfitters.com - M1: http://dpaste.com/2EP8N9F M2: http://ixmr.kpaste.net/37995ccfa M3: http://hastebin.com/sewofevihi.pl M4: https://dpaste.de/nDSo
cpquiz.pracuj.pl - M1: http://dpaste.com/3ECF3BR M2: http://ixmr.kpaste.net/b82614 M3: http://hastebin.com/odefefamuz.tex M4: https://dpaste.de/fKeg
decorateacookie.bhg.com - M1: http://dpaste.com/3AZJFMP M2: http://ixmr.kpaste.net/329c M3: http://hastebin.com/ihoyifodax.1c M4: https://dpaste.de/a3ia
diariodemorelos.com - M1: http://dpaste.com/18K1FQJ M2: http://ixmr.kpaste.net/18295c692 M3: http://hastebin.com/vizixokabo.1c M4: https://dpaste.de/4PTw
dknavi.lolipop.jp - M1: http://dpaste.com/22W6BHX M2: http://ixmr.kpaste.net/99c7744 M3: http://hastebin.com/bewipapuzi.1c M4: https://dpaste.de/vBcX
doglifedesign.xsrv.jp - M1: http://dpaste.com/0KAA8FB M2: http://ixmr.kpaste.net/7c4b85 M3: http://hastebin.com/tamemacipo.1c M4: https://dpaste.de/imnQ
downloadhelper.net - M1: http://dpaste.com/1HXS00S M2: http://ixmr.kpaste.net/2016bd00 M3: http://hastebin.com/ezizigamid.pl M4: https://dpaste.de/eUdd
education.state.nj.us - M1: http://dpaste.com/3TG12GD M2: http://ixmr.kpaste.net/62cbf M3: http://hastebin.com/ivigumidiz.1c M4: https://dpaste.de/O1pA
eeweb.ee.ucla.edu - M1: http://dpaste.com/38F4FRG M2: http://ixmr.kpaste.net/2593c5a8c0 M3: http://hastebin.com/azixijaqet.mel M4: https://dpaste.de/X4Fd
esalq.usp.br - M1: http://dpaste.com/2FFW5TN M2: http://ixmr.kpaste.net/57d24e17 M3: http://hastebin.com/gogoquganu.1c M4: https://dpaste.de/0siL
espectador.com - M1: http://dpaste.com/2BK8RK5 M2: http://ixmr.kpaste.net/991a8b M3: http://hastebin.com/hoviyocabu.1c M4: https://dpaste.de/3F5iS
europedates.com - M1: http://dpaste.com/3B5GF5Y M2: http://ixmr.kpaste.net/0ebe2 M3: http://hastebin.com/timefajuxi.1c M4: https://dpaste.de/vZeR
everydayhealthdk.dk - M1: http://dpaste.com/2MBB3BC M2: http://ixmr.kpaste.net/d7cc1 M3: http://hastebin.com/pazirowaqu.1c M4: https://dpaste.de/cTAv
fedspending.org - M1: http://dpaste.com/3EZ4YYH M2: http://ixmr.kpaste.net/69c748ead M3: http://hastebin.com/xopocecexu.mel M4: https://dpaste.de/t5NW
fidelitygroup.com - M1: http://dpaste.com/1HFRW6J M2: http://ixmr.kpaste.net/335c78cc M3: http://hastebin.com/inuwazoyep.dos M4: https://dpaste.de/p4YZ
forexover.com - M1: http://dpaste.com/2661KMV M2: http://ixmr.kpaste.net/be8d53bf M3: http://hastebin.com/vudiyacahu.1c M4: https://dpaste.de/ne1H
games.taaza.com - M1: http://dpaste.com/0XF2Q3A M2: http://ixmr.kpaste.net/c5df3ce15 M3: http://hastebin.com/eyahixejag.md M4: https://dpaste.de/dSDu
gamestorrents.com - M1: http://dpaste.com/1MH4R6Q M2: http://ixmr.kpaste.net/52cb M3: http://hastebin.com/aqupijepap.1c M4: https://dpaste.de/0jyq
geekxgirls.com - M1: http://dpaste.com/1TD28ZX M2: http://ixmr.kpaste.net/10d9c M3: http://hastebin.com/sukekololo.1c M4: https://dpaste.de/AEry
gl.ntu.edu.tw - M1: http://dpaste.com/0ZW95AM M2: http://ixmr.kpaste.net/e3bfa M3: http://hastebin.com/xuzijikewa.sm M4: https://dpaste.de/msKu
gov.oregonlive.com - M1: http://dpaste.com/320NSEP M2: http://ixmr.kpaste.net/cc6618c64c M3: http://hastebin.com/xitijuzegu.1c M4: https://dpaste.de/Rwok
gpevent.pracuj.pl - M1: http://dpaste.com/3XD12V6 M2: http://ixmr.kpaste.net/3ba0 M3: http://hastebin.com/ihahatatuw.1c M4: https://dpaste.de/J2MS
gtbank.com - M1: http://dpaste.com/0K8S6B2 M2: http://ixmr.kpaste.net/fa8a7a33c M3: http://hastebin.com/fitokivome.1c M4: https://dpaste.de/MMyO
guiadecompras.ideal.es - M1: http://dpaste.com/1R6G1BH M2: http://ixmr.kpaste.net/228d9a1 M3: http://hastebin.com/yoyotageni.tex M4: https://dpaste.de/EzyQ
horo.teenee.com - M1: http://dpaste.com/39P3JAR M2: http://ixmr.kpaste.net/1df25c M3: http://hastebin.com/sizubaxehi.1c M4: https://dpaste.de/nPLbK
hungama.org - M1: http://dpaste.com/1D60T47 M2: http://ixmr.kpaste.net/052113f M3: http://hastebin.com/ekigelewaf.1c M4: https://dpaste.de/secD
hyatt.jobs - M1: http://dpaste.com/1QXAJTG M2: http://ixmr.kpaste.net/638d8a M3: http://hastebin.com/ihitolocux.1c M4: https://dpaste.de/7Tcs
instakl.com - M1: http://dpaste.com/0295SFT M2: http://ixmr.kpaste.net/9d0e9440 M3: http://hastebin.com/zibomihaga.bash M4: https://dpaste.de/ytmU
interactive.sun-sentinel.com - M1: http://dpaste.com/138H5K4 M2: http://ixmr.kpaste.net/9a1552 M3: http://hastebin.com/pegovuwoli.mel M4: https://dpaste.de/gt6G
ispmap.co.nz - M1: http://dpaste.com/2NPQ68F M2: http://ixmr.kpaste.net/0d664f92f M3: http://hastebin.com/guqegiqebe.1c M4: https://dpaste.de/AwOm
kanda.com - M1: http://dpaste.com/16179H7 M2: http://ixmr.kpaste.net/e0dfcde M3: http://hastebin.com/levosurihi.1c M4: https://dpaste.de/DKWH
kiosco.net - M1: http://dpaste.com/1AJVZTG M2: http://ixmr.kpaste.net/e682ae6a29 M3: http://hastebin.com/ucotimomoq.1c M4: https://dpaste.de/E3cD
kir016848.kir.jp - M1: http://dpaste.com/2RG3FTR M2: http://ixmr.kpaste.net/9b3c4c M3: http://hastebin.com/owoqakodel.tex M4: https://dpaste.de/W1My
kir521942.kir.jp - M1: http://dpaste.com/1ZWN01V M2: http://ixmr.kpaste.net/ac4c67a M3: http://hastebin.com/cavesajila.1c M4: https://dpaste.de/hMh3
kmoddl.library.cornell.edu - M1: http://dpaste.com/3VJD22Z M2: http://ixmr.kpaste.net/2ff4 M3: http://hastebin.com/ubexosusay.1c M4: https://dpaste.de/6E9L
cooking.akairan.com - M1: http://dpaste.com/3J74ZDG M2: http://ixmr.kpaste.net/64f980e M3: http://hastebin.com/fotisiwowa.1c M4: https://dpaste.de/HdmB
ks389734.kimsufi.com - M1: http://dpaste.com/0JCYYBV M2: http://ixmr.kpaste.net/dbda4c9e M3: http://hastebin.com/cecipesado.1c M4: https://dpaste.de/0uTC
m.coneco.net - M1: http://dpaste.com/21PQA73 M2: http://ixmr.kpaste.net/e3843d3c8 M3: http://hastebin.com/zirebimuto.avrasm M4: https://dpaste.de/r87d
mardinus.home.pl - M1: http://dpaste.com/0HHHS83 M2: http://ixmr.kpaste.net/7b4f143d M3: http://hastebin.com/kojomegaja.1c M4: https://dpaste.de/U0JH
mazzini-immobiliare.it - M1: http://dpaste.com/3SWWKJ1 M2: http://ixmr.kpaste.net/b38 M3: http://hastebin.com/gupitumaja.sm M4: https://dpaste.de/28Cz
medsophia.heteml.jp - M1: http://dpaste.com/1RTGJ2D M2: http://ixmr.kpaste.net/dae1 M3: http://hastebin.com/zakisihiza.1c M4: https://dpaste.de/7KfS
mi.qianlong.com - M1: http://dpaste.com/09M0ASQ M2: http://ixmr.kpaste.net/a75c M3: http://hastebin.com/umequsolox.1c M4: https://dpaste.de/b7Mx
michiganchannel.umich.edu - M1: http://dpaste.com/0TM8PKV M2: http://ixmr.kpaste.net/7b2fa21fc M3: http://hastebin.com/efahujasok.1c M4: https://dpaste.de/4zkZ
mmabookings.com - M1: http://dpaste.com/2139ZZJ M2: http://ixmr.kpaste.net/cc3 M3: http://hastebin.com/ruqabecefu.1c M4: https://dpaste.de/vvVf
mobile.kapook.com - M1: http://dpaste.com/06Q1SEQ M2: http://ixmr.kpaste.net/20229ae M3: http://hastebin.com/yidukoyejo.1c M4: https://dpaste.de/tAsk
stocksea.17ok.com - M1: http://dpaste.com/1XKCB7H M2: http://ixmr.kpaste.net/8fc7f24e43 M3: http://hastebin.com/durupepono.1c M4: https://dpaste.de/4YD8
movil.informador.com.mx - M1: http://dpaste.com/3AX8Q21 M2: http://ixmr.kpaste.net/a82 M3: http://hastebin.com/izofoyazif.1c M4: https://dpaste.de/CGUu
mp3hungama.com - M1: http://dpaste.com/1NXXA09 M2: http://ixmr.kpaste.net/e684e21a M3: http://hastebin.com/bubamewoyu.1c M4: https://dpaste.de/zvfV
mt.mathrubhumi.com - M1: http://dpaste.com/2Q8MGS2 M2: http://ixmr.kpaste.net/f80 M3: http://hastebin.com/exofulifil.parser3 M4: https://dpaste.de/xtsE
mwcc.nsw.edu.au - M1: http://dpaste.com/36M0SX2 M2: http://ixmr.kpaste.net/4533e M3: http://hastebin.com/qemizuvoye.sm M4: https://dpaste.de/aLi2
mycookbook.all4women.co.za - M1: http://dpaste.com/12HKWBW M2: http://ixmr.kpaste.net/2341da7b M3: http://hastebin.com/efapiwuzam.1c M4: https://dpaste.de/HtBU
mypornmotion.com - M1: http://dpaste.com/2S645XE M2: http://ixmr.kpaste.net/a7cbc4f M3: http://hastebin.com/giwoxiheka.1c M4: https://dpaste.de/UoSs
naufrages.radio-canada.ca - M1: http://dpaste.com/0AY56H0 M2: http://ixmr.kpaste.net/881e M3: http://hastebin.com/awojafusiz.avrasm M4: https://dpaste.de/epQo
notimex.com.mx - M1: http://dpaste.com/3K6WE7B M2: http://ixmr.kpaste.net/c84 M3: http://hastebin.com/bibezucoko.tex M4: https://dpaste.de/WjK8
nrk.no - M1: http://dpaste.com/0PEJHJB M2: http://ixmr.kpaste.net/ac33 M3: http://hastebin.com/jemoqerega.1c M4: https://dpaste.de/SMTY
onyks.wroclaw.pl - M1: http://dpaste.com/1AR8SFK M2: http://ixmr.kpaste.net/e287e1a1 M3: http://hastebin.com/piritugatu.1c M4: https://dpaste.de/A1Ti
outlook.umd.edu - M1: http://dpaste.com/08H80DT M2: http://ixmr.kpaste.net/74491ad495 M3: http://hastebin.com/davudokula.1c M4: https://dpaste.de/k8E1
paratrixa.skai.gr - M1: http://dpaste.com/3ZFBSHH M2: http://ixmr.kpaste.net/a1e1ba8b5 M3: http://hastebin.com/ixokeruyis.pl M4: https://dpaste.de/58eh
paris.onvasortir.com - M1: http://dpaste.com/1TCGT2F M2: http://ixmr.kpaste.net/e23 M3: http://hastebin.com/ababudujom.1c M4: https://dpaste.de/NMZw
photocontest.smithsonianmag.com - M1: http://dpaste.com/147V6JC M2: http://ixmr.kpaste.net/605f64d8 M3: http://hastebin.com/qawejiyapa.1c M4: https://dpaste.de/ri9Q
picturinghistory.gc.cuny.edu - M1: http://dpaste.com/3D0QGEP M2: http://ixmr.kpaste.net/9dc M3: http://hastebin.com/ukumilatac.1c M4: https://dpaste.de/yJXf
playsport.cc - M1: http://dpaste.com/1P44V87 M2: http://ixmr.kpaste.net/c0f9 M3: http://hastebin.com/owafuwujuz.1c M4: https://dpaste.de/fpZV
pluscolorn.sub.jp - M1: http://dpaste.com/32F9176 M2: http://ixmr.kpaste.net/cb56f205f2 M3: http://hastebin.com/yudisozoqi.avrasm M4: https://dpaste.de/o2cW
qassimy.com - M1: http://dpaste.com/1TNVY6Z M2: http://ixmr.kpaste.net/656c2 M3: http://hastebin.com/dovuvuzace.1c M4: https://dpaste.de/diM5
qck.com - M1: http://dpaste.com/0ZJX46K M2: http://ixmr.kpaste.net/581b7 M3: http://hastebin.com/bihasurolu.1c M4: https://dpaste.de/4xxo
r.ashampoo.com - M1: http://dpaste.com/2XEV9MA M2: http://ixmr.kpaste.net/2d55471 M3: http://hastebin.com/egagaloxes.1c M4: https://dpaste.de/KaEG
raidfotograficosierranevada.ideal.es - M1: http://dpaste.com/3QBBK27 M2: http://ixmr.kpaste.net/3503bc M3: http://hastebin.com/poqakogase.1c M4: https://dpaste.de/oBgw
rtve.es - M1: http://dpaste.com/3SE4NZ6 M2: http://ixmr.kpaste.net/860ae0 M3: http://hastebin.com/usikosuzep.1c M4: https://dpaste.de/siVS
s5.egyup.com - M1: http://dpaste.com/3WNKFJ7 M2: http://ixmr.kpaste.net/5cacce697 M3: http://hastebin.com/denujanozo.tex M4: https://dpaste.de/9O1K
sa.bollywoodhungama.com - M1: http://dpaste.com/0X0JEGR M2: http://ixmr.kpaste.net/d19660c6 M3: http://hastebin.com/siruxemeza.tex M4: https://dpaste.de/mthp
saaid.net - M1: http://dpaste.com/2YTVHHN M2: http://ixmr.kpaste.net/eddf9e4 M3: http://hastebin.com/alirodejaq.xml M4: https://dpaste.de/uOma
sca.isr.umich.edu - M1: http://dpaste.com/2ZVZPX1 M2: http://ixmr.kpaste.net/601c7ea M3: http://hastebin.com/sarebicapa.1c M4: https://dpaste.de/h9ks
science.tamu.edu - M1: http://dpaste.com/2P4Y9X5 M2: http://ixmr.kpaste.net/664d4 M3: http://hastebin.com/cihihuhoze.1c M4: https://dpaste.de/z1H5
scores.newsday.com - M1: http://dpaste.com/356RVAC M2: http://ixmr.kpaste.net/8db5a2ce M3: http://hastebin.com/fijexelexe.1c M4: https://dpaste.de/gqUx
scriptures.byu.edu - M1: http://dpaste.com/2QBXKVW M2: http://ixmr.kpaste.net/727b7d619 M3: http://hastebin.com/ronafelaye.1c M4: https://dpaste.de/AfD1
sharecare.ru - M1: http://dpaste.com/2SP7QHZ M2: http://ixmr.kpaste.net/bc9f8a M3: http://hastebin.com/apexuporuj.1c M4: https://dpaste.de/2Zux
shejis.com - M1: http://dpaste.com/16RYZTQ M2: http://ixmr.kpaste.net/26f90d M3: http://hastebin.com/ebekirelex.1c M4: https://dpaste.de/PxJf
simpack.solavei.com - M1: http://dpaste.com/1XFF1HQ M2: http://ixmr.kpaste.net/e82db7 M3: http://hastebin.com/unodavuliq.1c M4: https://dpaste.de/7mPk
smolka-berlin.de - M1: http://dpaste.com/02K9VF7 M2: http://ixmr.kpaste.net/86f361 M3: http://hastebin.com/oqebajaluy.tex M4: https://dpaste.de/hhfG
socialblade.com - M1: http://dpaste.com/3PJ8SD3 M2: http://ixmr.kpaste.net/e790fa0e M3: http://hastebin.com/equvesiyuf.1c M4: https://dpaste.de/dWe0
south.du.ac.in - M1: http://dpaste.com/1J1ZZWM M2: http://ixmr.kpaste.net/47bc7 M3: http://hastebin.com/ayafobivim.pl M4: https://dpaste.de/oYEm
sp.ideal.es - M1: http://dpaste.com/1SFAWK4 M2: http://ixmr.kpaste.net/ece9491 M3: http://hastebin.com/eququbofis.1c M4: https://dpaste.de/HEXi
travel.spectator.sme.sk - M1: http://dpaste.com/3VR9BK1 M2: http://ixmr.kpaste.net/f5f47 M3: http://hastebin.com/cufesoheho.1c M4: https://dpaste.de/C3Cc
sports.abidjan.net - M1: http://dpaste.com/1GV0DP9 M2: http://ixmr.kpaste.net/94444f22 M3: http://hastebin.com/ralalofiwe.1c M4: https://dpaste.de/278a
stad.com - M1: http://dpaste.com/30HNQ7B M2: http://ixmr.kpaste.net/94a7939 M3: http://hastebin.com/cijagutiru.1c M4: https://dpaste.de/nP9R
sumai.city.osaka.jp - M1: http://dpaste.com/0JSDTHK M2: http://ixmr.kpaste.net/d91c91a333 M3: http://hastebin.com/agevolufuf.sm M4: https://dpaste.de/dqNn
syndication.britannica.com - M1: http://dpaste.com/2X3J9K3 M2: http://ixmr.kpaste.net/afa6491 M3: http://hastebin.com/ebuzuwezuy.1c M4: https://dpaste.de/pp3v
tai2.ntu.edu.tw - M1: http://dpaste.com/3NFH8NV M2: http://ixmr.kpaste.net/68bc M3: http://hastebin.com/lekituzogo.1c M4: https://dpaste.de/uRbM
teluguone.com - M1: http://dpaste.com/18J01Q5 M2: http://ixmr.kpaste.net/e5c4 M3: http://hastebin.com/ayuguzudey.1c M4: https://dpaste.de/f94Q
templates.entheosweb.com - M1: http://dpaste.com/1ABBQNN M2: http://ixmr.kpaste.net/c0936b399c M3: http://hastebin.com/ovezegozet.avrasm M4: https://dpaste.de/P0xN
temple.dinamalar.com - M1: http://dpaste.com/2GBSC38 M2: http://ixmr.kpaste.net/605cc7 M3: http://hastebin.com/inuviququv.avrasm M4: https://dpaste.de/O2f3
tiempo.infonews.com - M1: http://dpaste.com/3BVQ3V5 M2: http://ixmr.kpaste.net/c6de90483 M3: http://hastebin.com/dakarodami.1c M4: https://dpaste.de/YhS9
totalping.com - M1: http://dpaste.com/0AWZ6H1 M2: http://ixmr.kpaste.net/1ef84 M3: http://hastebin.com/oviwulerah.1c M4: https://dpaste.de/izSr
cards.tut.by - M1: http://dpaste.com/3P2Y8XQ M2: http://ixmr.kpaste.net/bb94c8a M3: http://hastebin.com/usebateriy.vhdl M4: https://dpaste.de/ddOX
txy.net.cn - M1: http://dpaste.com/3118EJ5 M2: http://lxmr.kpaste.net/b41c11e2c M3: http://hastebin.com/nofiwonavo.tex M4: https://dpaste.de/nLLq
uchv.princeton.edu - M1: http://dpaste.com/0AH5B4B M2: http://lxmr.kpaste.net/360a9d692 M3: http://hastebin.com/aborececuz.1c M4: https://dpaste.de/LObB
umtrn.sph.umich.edu - M1: http://dpaste.com/14HYVSE M2: http://lxmr.kpaste.net/f40bb97 M3: http://hastebin.com/beruyefuco.1c M4: https://dpaste.de/o5kR
upbulk.com - M1: http://dpaste.com/1E04EBR M2: http://lxmr.kpaste.net/9b0 M3: http://hastebin.com/lokelepuzo.1c M4: https://dpaste.de/FQ9N
usc.edu - M1: http://dpaste.com/05X4AZN M2: http://lxmr.kpaste.net/ffb37 M3: http://hastebin.com/ayutipegof.tex M4: https://dpaste.de/3Gkk
usda-mideurope.com - M1: http://dpaste.com/1Z1SCDA M2: http://lxmr.kpaste.net/84b944 M3: http://hastebin.com/suxuvucowu.1c M4: https://dpaste.de/MHeD
vagalume.org.br - M1: http://dpaste.com/3NCGM7A M2: http://lxmr.kpaste.net/283fd8e13d M3: http://hastebin.com/yuwomepeti.avrasm M4: https://dpaste.de/Unrq
videarn.com - M1: http://dpaste.com/21W5YM7 M2: http://lxmr.kpaste.net/9238cbc M3: http://hastebin.com/nogewimiga.1c M4: https://dpaste.de/GhgM
vision.ee.ethz.ch - M1: http://dpaste.com/2VQRQ1G M2: http://lxmr.kpaste.net/2b1 M3: http://hastebin.com/kehigeqiwi.1c M4: https://dpaste.de/03pG
web-app.usc.edu - M1: http://dpaste.com/333H0RC M2: http://lxmr.kpaste.net/46ac8d9 M3:http://hastebin.com/dizeyexuvo.1c M4: https://dpaste.de/FQ9U
web1.sportowefakty.pl - M1: http://dpaste.com/3F9Y9S0 M2: http://lxmr.kpaste.net/c81cf6787 M3: http://hastebin.com/kaxepawace.tex M4: https://dpaste.de/YfUF
wehikene.ipower.com - M1: http://dpaste.com/05BV6MZ M2: http://lxmr.kpaste.net/d314c4e309 M3: http://hastebin.com/magebusepe.1c M4: https://dpaste.de/jZwO
wn.arabseed.com - M1: http://dpaste.com/0M52K41 M2: http://lxmr.kpaste.net/f1355d M3: http://hastebin.com/icocojomuf.1c M4: https://dpaste.de/yBRu
worldventures.com - M1: http://dpaste.com/123KXBZ M2: http://lxmr.kpaste.net/1469c12a6 M3: http://hastebin.com/zutepafadi.1c M4: https://dpaste.de/ojP3
yeahthat.nexcess.net - M1: http://dpaste.com/25EHQJZ M2: http://lxmr.kpaste.net/f82327 M3: http://hastebin.com/acuvuzapaw.dos M4: https://dpaste.de/mbLB
yepi.com - M1: http://dpaste.com/2TYMSHZ M2: http://lxmr.kpaste.net/d8f M3: http://hastebin.com/aqokeqiqet.1c M4: https://dpaste.de/XCC2
yt.linekong.com - M1: http://dpaste.com/3GAVYGG M2: http://lxmr.kpaste.net/064e M3: http://hastebin.com/umoqeveway.1c M4: https://dpaste.de/jAkx
album.wef.co.kr - M1: http://dpaste.com/1TF7T6M M2: http://ixmr.kpaste.net/d1e M3: http://hastebin.com/baqenekega.tex M4: https://dpaste.de/qYDb
cuzzle.co.kr - M1: http://dpaste.com/1X7ZHJ9 M2: http://ixmr.kpaste.net/e1833b M3: http://hastebin.com/teqeximive.md M4: https://dpaste.de/U7pH
dilab.uos.ac.kr - M1: http://dpaste.com/0SP2GCF M2: http://ixmr.kpaste.net/4a31 M3: http://hastebin.com/ubiwazetuj.1c M4: https://dpaste.de/GYkG
gift.postech.ac.kr - M1: http://dpaste.com/30TRNTA M2: http://ixmr.kpaste.net/0a8 M3: http://hastebin.com/olekekibul.1c M4: https://dpaste.de/u8ud
nurs.knu.ac.kr - M1: http://dpaste.com/17KJ06M M2: http://ixmr.kpaste.net/d16735876 M3: http://hastebin.com/roviqudedo.1c M4: https://dpaste.de/LH99
openmic.co.kr - M1: http://dpaste.com/3AGAMFK M2: http://ixmr.kpaste.net/b683a58 M3: http://hastebin.com/suqobuhezo.dos M4: https://dpaste.de/myQ6
pmi.postech.ac.kr - M1: http://dpaste.com/3AVNTRB M2: http://ixmr.kpaste.net/01bc3cc M3: http://hastebin.com/exadubumeb.1c M4: https://dpaste.de/WwgE
psy.korea.ac.kr - M1: http://dpaste.com/3VK9FAY M2: http://ixmr.kpaste.net/c88 M3: http://hastebin.com/riqocevuqa.pl M4: https://dpaste.de/7dNj
smed.kangwon.ac.kr - M1: http://dpaste.com/1PJCABZ M2: http://ixmr.kpaste.net/70f M3: http://hastebin.com/irofanisaf.1c M4: https://dpaste.de/w1iH
trans.cgimall.co.kr - M1: http://dpaste.com/0RD43H6 M2: http://ixmr.kpaste.net/c0 M3: http://hastebin.com/quxaqakaxa.sm M4: https://dpaste.de/fPjh
xnanox.ipdisk.co.kr - M1: http://dpaste.com/0X86BFP M2: http://ixmr.kpaste.net/287f M3: http://hastebin.com/qojidugaqa.1c M4: https://dpaste.de/P539
yorinara.co.kr - M1: http://dpaste.com/2Y1JT6G M2: http://ixmr.kpaste.net/1f9f8 M3: http://hastebin.com/oxizoseqiq.1c M4: https://dpaste.de/ySZ8
38years.ru.ac.th - M1: http://dpaste.com/3BFA3KQ M2: http://ixmr.kpaste.net/7d99b42 M3: http://hastebin.com/sikatirage.1c M4: https://dpaste.de/4Jye
2014icr.tsu.ac.th - M1: http://dpaste.com/237RT2E M2: http://ixmr.kpaste.net/ebca7 M3: http://hastebin.com/wehoyeyovi.1c M4: https://dpaste.de/8RxW
acr.ac.th - M1: http://dpaste.com/158WDVM M2: http://ixmr.kpaste.net/d19fa M3: http://hastebin.com/yumirotayi.1c M4: https://dpaste.de/TFoM
arch.chula.ac.th - M1: http://dpaste.com/1SF3RZJ M2: http://ixmr.kpaste.net/cafe891 M3: http://hastebin.com/tepewozizi.1c M4: https://dpaste.de/3wDO
b2s.co.th - M1: http://dpaste.com/1C5JHHS M2: http://ixmr.kpaste.net/4d460273 M3: http://hastebin.com/waneyalexe.1c M4: https://dpaste.de/eT6O
bizidea.co.th - M1: http://dpaste.com/296VG20 M2: http://ixmr.kpaste.net/5c93a M3: http://hastebin.com/fusepotefu.1c M4: https://dpaste.de/yKtH
buiaoonline.bu.ac.th - M1: http://dpaste.com/2C853JX M2: http://ixmr.kpaste.net/3e93c3c27b M3: http://hastebin.com/newemivepa.1c M4: https://dpaste.de/OLcH
centralworld.co.th - M1: http://dpaste.com/151VAJH M2: http://ixmr.kpaste.net/1a2 M3: http://hastebin.com/sitapuguli.1c M4: https://dpaste.de/OdqW
chandra.ac.th - M1: http://dpaste.com/0YP4Q71 M2: http://ixmr.kpaste.net/eb M3: http://hastebin.com/torafovase.mel M4: https://dpaste.de/BQkt
chuosenko.co.th - M1: http://dpaste.com/3BWRD93 M2: http://ixmr.kpaste.net/f144d7c85a M3: http://hastebin.com/irafefubef.1c M4: https://dpaste.de/LAV4
com.pea.co.th - M1: http://dpaste.com/3PWYVVK M2: http://ixmr.kpaste.net/3d7898340 M3: http://hastebin.com/isejavokoh.1c M4: https://dpaste.de/58jG
corporate.bigc.co.th - M1: http://dpaste.com/28RKE8J M2: http://ixmr.kpaste.net/c5dd1d90 M3: http://hastebin.com/adohilonaj.1c M4: https://dpaste.de/kFhM
culture.pkru.ac.th - M1: http://dpaste.com/3H1RAZ4 M2: http://ixmr.kpaste.net/0a1 M3: http://hastebin.com/fuxiriribu.1c M4: https://dpaste.de/bKgi
eba.econ.chula.ac.th - M1: http://dpaste.com/1CNRD5A M2: http://ixmr.kpaste.net/293c576b M3: http://hastebin.com/nuneqejufo.1c M4: https://dpaste.de/F2y4
en.mahidol.ac.th - M1: http://dpaste.com/13V5K0W M2: http://ixmr.kpaste.net/cff M3: http://hastebin.com/kuyulabogi.1c M4: https://dpaste.de/g1N6
eng.mut.ac.th - M1: http://dpaste.com/1AB5Y2H M2: http://ixmr.kpaste.net/d323 M3: http://hastebin.com/icayagewej.1c M4: https://dpaste.de/HnrZ
etesting.mju.ac.th - M1: http://dpaste.com/12Y292D M2: http://ixmr.kpaste.net/b09b M3: http://hastebin.com/lafifafuba.avrasm M4: https://dpaste.de/Wn3M
etheses.rmutl.ac.th - M1: http://dpaste.com/0G8NNY4 M2: http://ixmr.kpaste.net/6f0d M3: http://hastebin.com/uyoweyecan.1c M4: https://dpaste.de/fYgE
eu.lib.kmutt.ac.th - M1: http://dpaste.com/2WC7JYS M2: http://ixmr.kpaste.net/aabe8b M3: http://hastebin.com/begaqapafe.1c M4: https://dpaste.de/Bj3T
forest.ku.ac.th - M1: http://dpaste.com/3M2GWSY M2: http://ixmr.kpaste.net/a91a7c M3: http://hastebin.com/ifabogirec.1c M4: https://dpaste.de/E4Pg
futurepark.co.th - M1: http://dpaste.com/1VH3AY8 M2: http://ixmr.kpaste.net/6fc87e460 M3: http://hastebin.com/uharoyezip.1c M4: https://dpaste.de/UmZk
golferonline.co.th - M1: http://dpaste.com/2QH2N1H M2: http://ixmr.kpaste.net/6441d4ece0 M3: http://hastebin.com/amuyiyocaq.1c M4: https://dpaste.de/OF4J
grad.vu.ac.th - M1: http://dpaste.com/22NQT2V M2: http://ixmr.kpaste.net/8b7b3a M3: http://hastebin.com/dosotulogo.1c M4: https://dpaste.de/sDec
grandu.co.th - M1: http://dpaste.com/1NF66C8 M2: http://ixmr.kpaste.net/2006160c M3: http://hastebin.com/cuvucibaze.1c M4: https://dpaste.de/6DXr
gspa.nida.ac.th - M1: http://dpaste.com/3GR812T M2: http://ixmr.kpaste.net/d7e21b M3: http://hastebin.com/urubuhowes.1c M4: https://dpaste.de/u0WZ
gth.co.th - M1: http://dpaste.com/0PA1MWD M2: http://ixmr.kpaste.net/4f84e6b4a M3: http://hastebin.com/icogeheluy.1c M4: https://dpaste.de/pmDF
hotline.vru.ac.th - M1: http://dpaste.com/20FHZTZ M2: http://ixmr.kpaste.net/2ac2 M3: http://hastebin.com/ujiroxuveg.1c M4: https://dpaste.de/hCjP
husoc.su.ac.th - M1: http://dpaste.com/1Y9394B M2: http://ixmr.kpaste.net/c269985 M3: http://hastebin.com/yubekapido.sm M4: https://dpaste.de/nUaK
irt.bu.ac.th - M1: http://dpaste.com/3F359G8 M2: http://ixmr.kpaste.net/77e7fea3b M3: http://hastebin.com/efatecemof.1c M4: https://dpaste.de/Vo0E
itc.pkru.ac.th - M1: http://dpaste.com/05S83EQ M2: http://ixmr.kpaste.net/45d543bc M3: http://hastebin.com/xavuyifudu.1c M4: https://dpaste.de/sadH
kaset.skru.ac.th - M1: http://dpaste.com/12VE72N M2: http://ixmr.kpaste.net/fb7 M3: http://hastebin.com/oridozoven.1c M4: https://dpaste.de/P7uM
kmitl.ac.th - M1: http://dpaste.com/2S96DHM M2: http://ixmr.kpaste.net/1e05a M3: http://hastebin.com/jesekufipu.1c M4: https://dpaste.de/9BGA
ku-online.ku.ac.th - M1: http://dpaste.com/0JWHZYP M2: http://ixmr.kpaste.net/0d4ba23b M3: http://hastebin.com/awaganofij.1c M4: https://dpaste.de/WCU0
la-orutis.dusit.ac.th - M1: http://dpaste.com/2WMKYD4 M2: http://ixmr.kpaste.net/0404e M3: http://hastebin.com/horinohore.tex M4: https://dpaste.de/41Xs
lc.mju.ac.th - M1: http://dpaste.com/2749PZE M2: http://ixmr.kpaste.net/ee871b60f M3: http://hastebin.com/wodeqavame.1c M4: https://dpaste.de/5TBO
libarts.mju.ac.th - M1: http://dpaste.com/1T12W72 M2: http://ixmr.kpaste.net/6489b8 M3: http://hastebin.com/ovehiketiq.1c M4: https://dpaste.de/9Cmm
library.bsru.ac.th - M1: http://dpaste.com/1BRJ1QM M2: http://ixmr.kpaste.net/eaeee7d6 M3: http://hastebin.com/soxepogoso.1c M4: https://dpaste.de/BQyj
lss.sakru.ac.th - M1: http://dpaste.com/1Y3NSH6 M2: http://ixmr.kpaste.net/fa9dce M3: http://hastebin.com/zisutenivo.xml M4: https://dpaste.de/vKBo
mcdelivery.mcthai.co.th - M1: http://dpaste.com/16TKNNG M2: http://ixmr.kpaste.net/c716 M3: http://hastebin.com/ajozetadod.1c M4: https://dpaste.de/JAbU
md.chula.ac.th - M1: http://dpaste.com/0WGRXMR M2: http://ixmr.kpaste.net/dc6cedfb0 M3: http://hastebin.com/sojiluziwi.1c M4: https://dpaste.de/0OHQ
mgt.skru.ac.th - M1: http://dpaste.com/2S47W60 M2: http://ixmr.kpaste.net/d69f334 M3: http://hastebin.com/vopoyuqube.1c M4: https://dpaste.de/a7oq
mistine.co.th - M1: http://dpaste.com/1J9M52Q M2: http://ixmr.kpaste.net/4222a95b M3: http://hastebin.com/eropegerin.1c M4: https://dpaste.de/ckQr
mollogisticscoth.nineweb.co.th - M1: http://dpaste.com/1NMJMG5 M2: http://ixmr.kpaste.net/a2d5008 M3: http://hastebin.com/osuyacuhih.md M4: https://dpaste.de/n7GS
muk.ubu.ac.th - M1: http://dpaste.com/1A5JVV0 M2: http://ixmr.kpaste.net/b29c M3: http://hastebin.com/keyifitilo.1c M4: https://dpaste.de/bYbs
music.mahidol.ac.th - M1: http://dpaste.com/3NBT8KE M2: http://ixmr.kpaste.net/b916d06839 M3: http://hastebin.com/xibuqodowu.1c M4: https://dpaste.de/4HvX
nbs.nkc.kku.ac.th - M1: http://dpaste.com/3W6900T M2: http://ixmr.kpaste.net/4b2acb659 M3: http://hastebin.com/feyiroqiza.tex M4: https://dpaste.de/iJxx
nca.co.th - M1: http://dpaste.com/0A1CETD M2: http://ixmr.kpaste.net/56d7 M3: http://hastebin.com/irewapexom.1c M4: https://dpaste.de/kpsQ
neodeco.co.th - M1: http://dpaste.com/3R978TQ M2: http://ixmr.kpaste.net/ed591a0 M3: http://hastebin.com/akujugejen.1c M4: https://dpaste.de/45Yf
netdesgin.ac.th - M1: http://dpaste.com/1YVP2WZ M2: http://ixmr.kpaste.net/2c0940d M3: http://hastebin.com/sexenoqipu.pl M4: https://dpaste.de/Afy8
nstru.ac.th - M1: http://dpaste.com/0A0XSK5 M2: http://ixmr.kpaste.net/c0c144a5 M3: http://hastebin.com/egiriyogob.md M4: https://dpaste.de/TYMC
orsa.mahidol.ac.th - M1: http://dpaste.com/021V3SZ M2: http://ixmr.kpaste.net/942d8a104 M3: http://hastebin.com/uwozoqoseh.1c M4: https://dpaste.de/YsVR
pd.co.th - M1: http://dpaste.com/2V1ZFW6 M2: http://ixmr.kpaste.net/ab5e446f87 M3: http://hastebin.com/ogoqedozam.1c M4: https://dpaste.de/bJTg
ped.edu.ku.ac.th - M1: http://dpaste.com/2VE936Q M2: http://ixmr.kpaste.net/c59b81c8 M3: http://hastebin.com/uremiwofav.1c M4: https://dpaste.de/oVMn
pemc.sut.ac.th - M1: http://dpaste.com/3M2T9Z6 M2: http://ixmr.kpaste.net/237cf6e5 M3: http://hastebin.com/rayeneboki.1c M4: https://dpaste.de/EDK8
pf.co.th - M1: http://dpaste.com/19TGGZV M2: http://ixmr.kpaste.net/81f42f M3: http://hastebin.com/zuqiwebeta.1c M4: https://dpaste.de/RCyy
pharm.buu.ac.th - M1: http://dpaste.com/34GJ8N9 M2: http://ixmr.kpaste.net/3a902 M3: http://hastebin.com/nenegibike.1c M4: https://dpaste.de/DVW4
pharmacy.mahidol.ac.th - M1: http://dpaste.com/2PAK9A2 M2: http://ixmr.kpaste.net/39da M3: http://hastebin.com/zubemicife.lua M4: https://dpaste.de/vWeV
phnumis.health.nu.ac.th - M1: http://dpaste.com/3NY8NZG M2: http://ixmr.kpaste.net/ebd M3: http://hastebin.com/netojogoqi.1c M4: https://dpaste.de/j87m
plan.lpru.ac.th - M1: http://dpaste.com/2VDZE98 M2: http://ixmr.kpaste.net/c0fedfcbdf M3: http://hastebin.com/esozereyir.1c M4: https://dpaste.de/yrQ9
plananddev.bu.ac.th - M1: http://dpaste.com/2HE8821 M2: http://ixmr.kpaste.net/fa62837e33 M3: http://hastebin.com/ozaqosages.1c M4: https://dpaste.de/NPO4
ppc.chula.ac.th - M1: http://dpaste.com/1CBHR3G M2: http://ixmr.kpaste.net/ba32695 M3: http://hastebin.com/zapukekufu.1c M4: https://dpaste.de/kE9u
sathit.pkru.ac.th - M1: http://dpaste.com/25381ZB M2: http://ixmr.kpaste.net/d6e7a67f4 M3: http://hastebin.com/dagoreneca.1c M4: https://dpaste.de/FC5P
psru.ac.th - M1: http://dpaste.com/3F9B9WQ M2: http://ixmr.kpaste.net/bec M3: http://hastebin.com/godaxeyoso.1c M4: https://dpaste.de/ynJR
publications.swu.ac.th - M1: http://dpaste.com/0HK3TCE M2: http://ixmr.kpaste.net/0aba1761d M3: http://hastebin.com/zobapodecu.sm M4: https://dpaste.de/WP5T
rac.ac.th - M1: http://dpaste.com/33DS6GQ M2: http://ixmr.kpaste.net/2af283320 M3: http://hastebin.com/zatexejaka.1c M4: https://dpaste.de/5KgN
research.dusit.ac.th - M1: http://dpaste.com/00S020S M2: http://ixmr.kpaste.net/ef502 M3: http://hastebin.com/rihamaqiqe.1c M4: https://dpaste.de/Gshu
rspg.dusit.ac.th - M1: http://dpaste.com/3A9RNQD M2: http://ixmr.kpaste.net/855fad9921 M3: http://hastebin.com/ujopukulaf.1c M4: https://dpaste.de/dXdg
rsu.ac.th - M1: http://dpaste.com/0DPDGCC M2: http://ixmr.kpaste.net/3f8e65b4 M3: http://hastebin.com/kojopikiru.1c M4: https://dpaste.de/WBxH
rural.chula.ac.th - M1: http://dpaste.com/0RCXWS1 M2: http://ixmr.kpaste.net/49b8786 M3: http://hastebin.com/xopaxemoxo.1c M4: https://dpaste.de/0XMT
saf.paru.ac.th - M1: http://dpaste.com/1EBAJ1V M2: http://ixmr.kpaste.net/b6c449 M3: http://hastebin.com/ipafadaciq.1c M4: https://dpaste.de/CZBH
sci.skru.ac.th - M1: http://dpaste.com/0MYPE6Z M2: http://ixmr.kpaste.net/cb2855 M3: http://hastebin.com/kihalinomo.1c M4: https://dpaste.de/3wTu
sci.ubu.ac.th - M1: http://dpaste.com/09BCFQD M2: http://ixmr.kpaste.net/5a65df4 M3: http://hastebin.com/ukejikajun.1c M4: https://dpaste.de/nNHN
scjubu.sci.ubu.ac.th - M1: http://dpaste.com/25YY339 M2: http://ixmr.kpaste.net/40ac24d28 M3: http://hastebin.com/hogoyubepe.1c M4: https://dpaste.de/Hur6
[ siit.tu.ac.th - M1: http://dpaste.com/3JZD92J M2: http://ixmr.kpaste.net/9e38c8cb56 M3: http://hastebin.com/ozeyoqexir.1c M4: https://dpaste.de/W2oW ]
siit.tu.ac.th - M1: http://dpaste.com/1ZBJ8XK M2: http://ixmr.kpaste.net/ecda714ca M3: http://hastebin.com/tujigedeye.1c M4: https://dpaste.de/21fM
sru.agro.ku.ac.th - M1: http://dpaste.com/1TFHWSM M2: http://ixmr.kpaste.net/81c250 M3: http://hastebin.com/baruriqegu.1c M4: https://dpaste.de/pB3a
station.asiaplus.co.th - M1: http://dpaste.com/1GGXXGJ M2: http://ixmr.kpaste.net/0170e0f5c M3: http://hastebin.com/ewisuneveg.1c M4: https://dpaste.de/3aY7
swis.act.ac.th - M1: http://dpaste.com/28HRE3G M2: http://ixmr.kpaste.net/4dcaf5 M3: http://hastebin.com/rapayowaho.1c M4: https://dpaste.de/jSTL
ubusac.ubu.ac.th - M1: http://dpaste.com/0G7EVYR M2: http://ixmr.kpaste.net/d33d3 M3: http://hastebin.com/opamoqepip.1c M4: https://dpaste.de/xiyU
vesakday.mcu.ac.th - M1: http://dpaste.com/3SAS4P0 M2: http://ixmr.kpaste.net/c50fe M3: http://hastebin.com/oyamagekom.1c M4: https://dpaste.de/C7QA
vistra.co.th - M1: http://dpaste.com/0VY6F0T M2: http://ixmr.kpaste.net/ac332f80 M3: http://hastebin.com/uvogibodub.1c M4: https://dpaste.de/8Tbj
webstat.sci.ubu.ac.th - M1: http://dpaste.com/1XT4V43 M2: http://ixmr.kpaste.net/3887ab86 M3: http://hastebin.com/luyunoxoja.1c M4: https://dpaste.de/wNq8
worrajak.rmutl.ac.th - M1: http://dpaste.com/0FX8M7E M2: http://ixmr.kpaste.net/5278b M3: http://hastebin.com/uwutowivox.1c M4: https://dpaste.de/UmSy
air21.com.ph - M1: http://dpaste.com/3AJZ42K M2: http://ixmr.kpaste.net/fa86b1f43 M3: http://hastebin.com/ucogagodox.1c M4: https://dpaste.de/G1Ds
smartparenting.com.ph - M1: http://dpaste.com/078A2PR M2: http://ixmr.kpaste.net/847e746a M3: http://hastebin.com/acocoxuduy.1c M4: https://dpaste.de/9Ezo
anycar.vn - M1: http://dpaste.com/024A4MA M2: http://ixmr.kpaste.net/23532d3 M3: http://hastebin.com/ixamenukah.1c M4: https://dpaste.de/CHLz
dichvu.haloshop.vn - M1: http://dpaste.com/3QS50GS M2: http://ixmr.kpaste.net/7f066e9f M3: http://hastebin.com/foqigakuve.1c M4: https://dpaste.de/Mf9m
dulichvn.org.vn - M1: http://dpaste.com/0XPMBWM M2: http://ixmr.kpaste.net/3989fbc M3: http://hastebin.com/tuziquzuqe.tex M4: https://dpaste.de/LnJk
ngoisaophancam.petrotimes.vn - M1: http://dpaste.com/33VMND3 M2: http://ixmr.kpaste.net/526868e8e M3: http://hastebin.com/citoqesuni.1c M4: https://dpaste.de/CKeX
raovat24h.com.vn - M1: http://dpaste.com/2SYW187 M2: http://ixmr.kpaste.net/b13 M3: http://hastebin.com/gayecejazi.sm M4: https://dpaste.de/uF3L
sieuthicomputer.com.vn - M1: http://dpaste.com/12ES5C1 M2: http://ixmr.kpaste.net/63dc707b01 M3: http://hastebin.com/zudohepiko.sm M4: https://dpaste.de/9y8J
vbsp.com.vn - M1: http://dpaste.com/3B75V7X M2: http://ixmr.kpaste.net/e57546e8e M3: http://hastebin.com/besekavovu.1c M4: https://dpaste.de/ugk9