230:
223:"Detailed Analysis - Troj/Tapaoux-AD - Viruses and Spyware - Advanced Network Threat Protection | ATP from Targeted Malware Attacks and Persistent Threats | sophos.com - Threat Center"
366:
303:
846:
866:
2011:
198:
are quickly stolen before attackers erase their tools in hopes of not getting caught in order to keep the high level victims from resetting all of the passwords for their accounts.
452:
422:
532:
1018:
558:
836:
493:
780:
205:
published new research about
Inexsmar, another version of the DarkHotel malware, which was used to target political figures instead of business targets.
222:
362:
251:
167:
Targets are aimed primarily at executives in investments and development, government agencies, defense industries, electronic manufacturers and
826:
595:
950:
280:
1364:
831:
1498:
1480:
981:
759:
525:
1504:
1030:
991:
626:
805:
1564:
1510:
1085:
976:
444:
912:
749:
651:
414:
971:
744:
340:
851:
563:
553:
518:
317:
1725:
1115:
902:
841:
800:
698:
1220:
955:
718:
148:. Zetter (2014) explains that the group, dubbed DarkHotel or Tapaoux, has also been actively infecting users through
1909:
1250:
1105:
897:
790:
734:
115:
68:
1390:
1359:
986:
1528:
1095:
1013:
919:
892:
485:
1684:
1348:
821:
754:
600:
140:
to hotel servers, attackers are able to target specific users who are guests at luxury hotels primarily in
1558:
1414:
1245:
907:
1699:
1534:
1318:
682:
195:
126:
255:
1462:
1343:
1055:
764:
713:
708:
1961:
1833:
861:
677:
161:
122:
1971:
1966:
1863:
1492:
1255:
1181:
871:
672:
474:"DarkHotel- a spy campaign in Luxury hotels". IT Var News. Techplus Media Pvt. Ltd. 28 Nov 2014.
276:
1976:
1858:
1828:
1432:
1288:
646:
610:
311:
2006:
2001:
1904:
1756:
1679:
1328:
1265:
1140:
589:
1914:
1889:
1853:
1781:
1694:
1689:
1333:
1125:
1035:
739:
1653:
1648:
1338:
1323:
1313:
1308:
1240:
1215:
1210:
1205:
1150:
605:
149:
137:
92:
47:
133:
of real certificates, to convince victims that prompted software downloads are valid.
1995:
1776:
1235:
1194:
1190:
1186:
168:
145:
111:
1720:
1674:
1474:
1438:
1293:
1283:
1176:
1171:
1166:
1040:
856:
785:
388:
153:
389:"DarkHotel: A Sophisticated New Hacking Attack Targets High-Profile Hotel Guests"
332:
121:
The attacks are specifically targeted at senior company executives, using forged
1956:
1946:
1894:
1802:
1746:
1658:
1607:
1468:
1298:
1025:
656:
202:
157:
1899:
1884:
1812:
1602:
1552:
1456:
1408:
1384:
1372:
1230:
1155:
1145:
1135:
1120:
1080:
1005:
636:
190:
Once attackers are in the victim's computer(s), sensitive information such as
130:
1930:
1807:
1771:
1633:
1450:
1200:
1130:
1070:
631:
191:
33:
363:""DarkHotel" uses bogus crypto certificates to snare Wi-Fi-connected execs"
1838:
1766:
1751:
1570:
1546:
1420:
1402:
1303:
1225:
1060:
1045:
945:
924:
703:
1868:
1741:
1704:
1638:
1617:
1587:
1540:
1522:
1444:
1378:
1160:
1075:
1065:
1050:
510:
99:
95:
102:-spreading campaign that appears to be selectively attacking business
1951:
1843:
1797:
1612:
1426:
1396:
1275:
1260:
1090:
929:
641:
180:
40:
415:"Darkhotel APT Uses Hacking Team Exploit to Target Specific Systems"
1576:
1516:
1486:
795:
184:
176:
172:
103:
1848:
1643:
887:
306:. The Inquirer. Archived from the original on November 10, 2014.
304:"Darkhotel malware is targeting travelling execs via hotel WiFi"
141:
107:
514:
827:
333:"DarkHotel hackers targets company bosses in hotel rooms"
445:"'DarkHotel' Hacks Target Business Travelers: Report"
1939:
1923:
1877:
1821:
1790:
1734:
1713:
1667:
1626:
1595:
1586:
1357:
1274:
1104:
1004:
964:
938:
880:
814:
773:
727:
691:
665:
619:
582:
575:
277:"The Darkhotel APT: A Story of Unusual Hospitality"
74:
64:
56:
26:
21:
867:Russian interference in the 2016 U.S. elections
2012:South Korean advanced persistent threat groups
526:
8:
837:Democratic National Committee cyber attacks
156:since 2007 and using those attacks to load
1592:
781:Office of Personnel Management data breach
579:
533:
519:
511:
171:makers. Many victims have been located in
486:"Inexsmar: An unusual DarkHotel campaign"
214:
309:
283:from the original on November 10, 2014
106:visitors through the hotel's in-house
18:
425:from the original on 9 September 2017
279:. Kaspersky Labs. November 10, 2014.
7:
832:Commission on Elections data breach
455:from the original on 12 March 2016
14:
992:Jeff Bezos phone hacking incident
1565:Microarchitectural Data Sampling
801:Ukrainian Power Grid Cyberattack
709:Cyberterrorism attack of June 25
302:Carly Page (November 10, 2014).
164:tools onto infected endpoints.
110:network. It is characterized by
913:2017 Ukraine ransomware attacks
750:2014 JPMorgan Chase data breach
496:from the original on 2021-05-25
369:from the original on 2016-12-23
343:from the original on 2021-08-15
233:from the original on 2021-08-17
745:2014 celebrity nude photo leak
1:
982:Bulgarian revenue agency hack
760:Russian hacker password theft
1116:Bangladesh Black Hat Hackers
592:(publication of 2009 events)
16:Spyware and malware spreader
977:Baltimore ransomware attack
2028:
1251:Tailored Access Operations
898:WannaCry ransomware attack
791:Ashley Madison data breach
735:Anthem medical data breach
652:PlayStation network outage
116:advanced persistent threat
987:WhatsApp snooping scandal
852:Indian Bank data breaches
546:
361:Dan Goodin (2014-11-10).
331:Leo Kelion (2014-11-11).
316:: CS1 maint: unfit URL (
1529:Speculative Store Bypass
1096:Ukrainian Cyber Alliance
893:2017 Macron e-mail leaks
903:Westminster data breach
822:Bangladesh Bank robbery
765:2014 Yahoo! data breach
755:2014 Sony Pictures hack
714:2013 Yahoo! data breach
699:South Korea cyberattack
601:Operation Olympic Games
596:Australian cyberattacks
32:Trojan:Win32/Tapaoux. (
1246:Syrian Electronic Army
956:SingHealth data breach
719:Singapore cyberattacks
657:RSA SecurID compromise
1535:Lazy FP state restore
1319:Kristoffer von Hassel
972:Sri Lanka cyberattack
842:Vietnam Airport Hacks
683:Operation High Roller
196:intellectual property
154:Peer-to-Peer networks
1481:Silent Bob is Silent
541:Hacking in the 2010s
451:. 10 November 2014.
129:the underlying weak
123:digital certificates
1415:SS7 vulnerabilities
951:Atlanta cyberattack
920:Equifax data breach
678:Stratfor email leak
627:Canadian government
606:Operation ShadowNet
162:reverse engineering
1864:Petya and NotPetya
1493:ROCA vulnerability
1256:The Shadow Brokers
1182:Iranian Cyber Army
1108:persistent threats
908:Petya and NotPetya
872:2016 Bitfinex hack
847:DCCC cyber attacks
806:SWIFT banking hack
1989:
1988:
1985:
1984:
1977:ZeroAccess botnet
1289:Mustafa Al-Bassam
1056:New World Hackers
1019:associated events
1000:
999:
796:VTech data breach
647:Operation AntiSec
611:Operation Payback
570:
569:
82:
81:
39:Troj/Tapaoux-AD (
2019:
1593:
1266:Yemen Cyber Army
590:Operation Aurora
580:
549:
548:
535:
528:
521:
512:
505:
504:
502:
501:
490:Bitdefender Labs
482:
476:
475:
471:
465:
464:
462:
460:
441:
435:
434:
432:
430:
413:Kovacs, Eduard.
410:
404:
403:
401:
399:
384:
378:
377:
375:
374:
365:. Ars Technica.
358:
352:
351:
349:
348:
328:
322:
321:
315:
307:
299:
293:
292:
290:
288:
273:
267:
266:
264:
263:
254:. Archived from
252:"Trojan.Tapaoux"
248:
242:
241:
239:
238:
219:
91:) is a targeted
46:Trojan.Tapaoux (
19:
2027:
2026:
2022:
2021:
2020:
2018:
2017:
2016:
1992:
1991:
1990:
1981:
1935:
1919:
1873:
1817:
1786:
1730:
1709:
1663:
1622:
1582:
1362:
1360:vulnerabilities
1353:
1270:
1163:(confederation)
1126:Charming Kitten
1107:
1100:
1036:Goatse Security
996:
960:
934:
925:Deloitte breach
876:
862:Dyn cyberattack
810:
769:
740:Operation Tovar
723:
687:
661:
615:
576:Major incidents
571:
542:
539:
509:
508:
499:
497:
484:
483:
479:
473:
472:
468:
458:
456:
443:
442:
438:
428:
426:
412:
411:
407:
397:
395:
386:
385:
381:
372:
370:
360:
359:
355:
346:
344:
330:
329:
325:
308:
301:
300:
296:
286:
284:
275:
274:
270:
261:
259:
250:
249:
245:
236:
234:
221:
220:
216:
211:
125:, generated by
17:
12:
11:
5:
2025:
2023:
2015:
2014:
2009:
2004:
1994:
1993:
1987:
1986:
1983:
1982:
1980:
1979:
1974:
1969:
1964:
1959:
1954:
1949:
1943:
1941:
1937:
1936:
1934:
1933:
1927:
1925:
1921:
1920:
1918:
1917:
1912:
1907:
1902:
1897:
1892:
1887:
1881:
1879:
1875:
1874:
1872:
1871:
1866:
1861:
1856:
1851:
1846:
1841:
1836:
1831:
1825:
1823:
1819:
1818:
1816:
1815:
1810:
1805:
1800:
1794:
1792:
1788:
1787:
1785:
1784:
1779:
1774:
1769:
1764:
1759:
1754:
1749:
1747:Black Energy 3
1744:
1738:
1736:
1732:
1731:
1729:
1728:
1723:
1717:
1715:
1711:
1710:
1708:
1707:
1702:
1697:
1692:
1687:
1682:
1677:
1671:
1669:
1665:
1664:
1662:
1661:
1656:
1654:Metulji botnet
1651:
1646:
1641:
1636:
1630:
1628:
1624:
1623:
1621:
1620:
1615:
1610:
1608:Black Energy 2
1605:
1599:
1597:
1590:
1584:
1583:
1581:
1580:
1574:
1568:
1562:
1556:
1550:
1544:
1538:
1532:
1526:
1520:
1514:
1508:
1502:
1496:
1490:
1484:
1478:
1472:
1466:
1463:Broadcom Wi-Fi
1460:
1454:
1448:
1442:
1436:
1430:
1424:
1418:
1412:
1406:
1400:
1394:
1388:
1382:
1376:
1369:
1367:
1355:
1354:
1352:
1351:
1346:
1341:
1336:
1331:
1326:
1324:Junaid Hussain
1321:
1316:
1314:Jeremy Hammond
1311:
1309:Elliott Gunton
1306:
1301:
1296:
1291:
1286:
1280:
1278:
1272:
1271:
1269:
1268:
1263:
1258:
1253:
1248:
1243:
1241:Stealth Falcon
1238:
1233:
1228:
1223:
1218:
1216:PLA Unit 61486
1213:
1211:PLA Unit 61398
1208:
1206:Numbered Panda
1203:
1198:
1184:
1179:
1174:
1169:
1164:
1158:
1153:
1151:Equation Group
1148:
1143:
1138:
1133:
1128:
1123:
1118:
1112:
1110:
1102:
1101:
1099:
1098:
1093:
1088:
1083:
1078:
1073:
1068:
1063:
1058:
1053:
1048:
1043:
1038:
1033:
1028:
1023:
1022:
1021:
1010:
1008:
1002:
1001:
998:
997:
995:
994:
989:
984:
979:
974:
968:
966:
962:
961:
959:
958:
953:
948:
942:
940:
936:
935:
933:
932:
927:
922:
917:
916:
915:
905:
900:
895:
890:
884:
882:
878:
877:
875:
874:
869:
864:
859:
854:
849:
844:
839:
834:
829:
824:
818:
816:
812:
811:
809:
808:
803:
798:
793:
788:
783:
777:
775:
771:
770:
768:
767:
762:
757:
752:
747:
742:
737:
731:
729:
725:
724:
722:
721:
716:
711:
706:
701:
695:
693:
689:
688:
686:
685:
680:
675:
669:
667:
663:
662:
660:
659:
654:
649:
644:
642:HBGary Federal
639:
634:
629:
623:
621:
617:
616:
614:
613:
608:
603:
598:
593:
586:
584:
577:
573:
572:
568:
567:
561:
556:
547:
544:
543:
540:
538:
537:
530:
523:
515:
507:
506:
477:
466:
436:
405:
379:
353:
323:
294:
268:
243:
227:www.sophos.com
213:
212:
210:
207:
150:spear-phishing
138:malicious code
93:spear-phishing
80:
79:
76:
72:
71:
66:
62:
61:
58:
54:
53:
52:
51:
44:
37:
28:
27:Technical name
24:
23:
15:
13:
10:
9:
6:
4:
3:
2:
2024:
2013:
2010:
2008:
2005:
2003:
2000:
1999:
1997:
1978:
1975:
1973:
1970:
1968:
1965:
1963:
1960:
1958:
1955:
1953:
1950:
1948:
1945:
1944:
1942:
1938:
1932:
1929:
1928:
1926:
1922:
1916:
1913:
1911:
1908:
1906:
1903:
1901:
1898:
1896:
1893:
1891:
1888:
1886:
1883:
1882:
1880:
1876:
1870:
1867:
1865:
1862:
1860:
1857:
1855:
1852:
1850:
1847:
1845:
1842:
1840:
1837:
1835:
1832:
1830:
1827:
1826:
1824:
1820:
1814:
1811:
1809:
1806:
1804:
1801:
1799:
1796:
1795:
1793:
1789:
1783:
1780:
1778:
1777:Gameover ZeuS
1775:
1773:
1770:
1768:
1765:
1763:
1760:
1758:
1755:
1753:
1750:
1748:
1745:
1743:
1740:
1739:
1737:
1733:
1727:
1724:
1722:
1719:
1718:
1716:
1712:
1706:
1703:
1701:
1698:
1696:
1693:
1691:
1688:
1686:
1683:
1681:
1678:
1676:
1673:
1672:
1670:
1666:
1660:
1657:
1655:
1652:
1650:
1647:
1645:
1642:
1640:
1637:
1635:
1632:
1631:
1629:
1625:
1619:
1616:
1614:
1611:
1609:
1606:
1604:
1601:
1600:
1598:
1594:
1591:
1589:
1585:
1578:
1575:
1572:
1569:
1566:
1563:
1560:
1557:
1554:
1551:
1548:
1545:
1542:
1539:
1536:
1533:
1530:
1527:
1524:
1521:
1518:
1515:
1512:
1509:
1506:
1503:
1500:
1497:
1494:
1491:
1488:
1485:
1482:
1479:
1476:
1473:
1470:
1467:
1464:
1461:
1458:
1455:
1452:
1449:
1446:
1443:
1440:
1437:
1434:
1431:
1428:
1425:
1422:
1419:
1416:
1413:
1410:
1407:
1404:
1401:
1398:
1395:
1392:
1389:
1386:
1383:
1380:
1377:
1374:
1371:
1370:
1368:
1366:
1361:
1356:
1350:
1347:
1345:
1342:
1340:
1337:
1335:
1332:
1330:
1327:
1325:
1322:
1320:
1317:
1315:
1312:
1310:
1307:
1305:
1302:
1300:
1297:
1295:
1292:
1290:
1287:
1285:
1282:
1281:
1279:
1277:
1273:
1267:
1264:
1262:
1259:
1257:
1254:
1252:
1249:
1247:
1244:
1242:
1239:
1237:
1236:Rocket Kitten
1234:
1232:
1229:
1227:
1224:
1222:
1219:
1217:
1214:
1212:
1209:
1207:
1204:
1202:
1199:
1196:
1192:
1188:
1187:Lazarus Group
1185:
1183:
1180:
1178:
1175:
1173:
1170:
1168:
1165:
1162:
1159:
1157:
1154:
1152:
1149:
1147:
1144:
1142:
1139:
1137:
1134:
1132:
1129:
1127:
1124:
1122:
1119:
1117:
1114:
1113:
1111:
1109:
1103:
1097:
1094:
1092:
1089:
1087:
1084:
1082:
1079:
1077:
1074:
1072:
1069:
1067:
1064:
1062:
1059:
1057:
1054:
1052:
1049:
1047:
1044:
1042:
1039:
1037:
1034:
1032:
1029:
1027:
1024:
1020:
1017:
1016:
1015:
1012:
1011:
1009:
1007:
1003:
993:
990:
988:
985:
983:
980:
978:
975:
973:
970:
969:
967:
963:
957:
954:
952:
949:
947:
944:
943:
941:
937:
931:
930:Disqus breach
928:
926:
923:
921:
918:
914:
911:
910:
909:
906:
904:
901:
899:
896:
894:
891:
889:
886:
885:
883:
879:
873:
870:
868:
865:
863:
860:
858:
855:
853:
850:
848:
845:
843:
840:
838:
835:
833:
830:
828:
825:
823:
820:
819:
817:
813:
807:
804:
802:
799:
797:
794:
792:
789:
787:
784:
782:
779:
778:
776:
772:
766:
763:
761:
758:
756:
753:
751:
748:
746:
743:
741:
738:
736:
733:
732:
730:
726:
720:
717:
715:
712:
710:
707:
705:
704:Snapchat hack
702:
700:
697:
696:
694:
690:
684:
681:
679:
676:
674:
673:LinkedIn hack
671:
670:
668:
664:
658:
655:
653:
650:
648:
645:
643:
640:
638:
635:
633:
630:
628:
625:
624:
622:
618:
612:
609:
607:
604:
602:
599:
597:
594:
591:
588:
587:
585:
581:
578:
574:
566: →
565:
562:
560:
557:
555:
552:←
551:
550:
545:
536:
531:
529:
524:
522:
517:
516:
513:
495:
491:
487:
481:
478:
470:
467:
454:
450:
446:
440:
437:
424:
420:
419:Security Week
416:
409:
406:
394:
390:
387:Zetter, Kim.
383:
380:
368:
364:
357:
354:
342:
338:
334:
327:
324:
319:
313:
305:
298:
295:
282:
278:
272:
269:
258:on 2019-12-14
257:
253:
247:
244:
232:
228:
224:
218:
215:
208:
206:
204:
201:In July 2017
199:
197:
193:
188:
186:
182:
178:
174:
170:
169:energy policy
165:
163:
159:
155:
151:
147:
146:United States
143:
139:
134:
132:
128:
124:
119:
117:
113:
112:Kaspersky Lab
109:
105:
101:
97:
94:
90:
86:
77:
73:
70:
67:
63:
59:
55:
49:
45:
42:
38:
35:
31:
30:
29:
25:
20:
1761:
1721:CryptoLocker
1475:DoublePulsar
1294:Cyber Anakin
1284:Ryan Ackroyd
1177:Helix Kitten
1172:Hacking Team
1167:Guccifer 2.0
1041:Lizard Squad
857:Surkov leaks
786:Hacking Team
498:. Retrieved
489:
480:
469:
457:. Retrieved
448:
439:
427:. Retrieved
418:
408:
396:. Retrieved
392:
382:
371:. Retrieved
356:
345:. Retrieved
336:
326:
297:
287:November 10,
285:. Retrieved
271:
260:. Retrieved
256:the original
246:
235:. Retrieved
226:
217:
200:
189:
166:
135:
120:
88:
84:
83:
1957:NetTraveler
1895:LogicLocker
1803:Hidden Tear
1700:Red October
1559:Dragonblood
1469:EternalBlue
1433:Stagefright
1299:George Hotz
1276:Individuals
1026:CyberBerkut
203:Bitdefender
158:key logging
131:public keys
78:South Korea
1996:Categories
1900:Rensenware
1885:BrickerBot
1813:TeslaCrypt
1603:Bad Rabbit
1553:Foreshadow
1457:Cloudbleed
1409:Row hammer
1391:Shellshock
1385:Heartbleed
1373:Evercookie
1349:The Jester
1231:Red Apollo
1191:BlueNorOff
1161:GOSSIPGIRL
1156:Fancy Bear
1146:Elfin Team
1141:DarkMatter
1136:Dark Basin
1121:Bureau 121
1081:Teamp0ison
1006:Hacktivism
637:DNSChanger
500:2021-10-22
373:2017-06-14
347:2021-10-22
262:2021-10-22
237:2021-10-22
209:References
136:Uploading
1931:VPNFilter
1808:Rombertik
1772:FinFisher
1762:DarkHotel
1726:DarkSeoul
1634:Coreflood
1499:BlueBorne
1451:Dirty COW
1365:disclosed
1363:publicly
1201:NSO Group
1131:Cozy Bear
1071:PayPal 14
1014:Anonymous
888:SHAttered
632:DigiNotar
192:passwords
127:factoring
89:Darkhotel
85:DarkHotel
34:Microsoft
22:DarkHotel
1972:Titanium
1915:XafeCopy
1910:WannaCry
1839:KeRanger
1767:Duqu 2.0
1752:Carbanak
1571:BlueKeep
1547:SigSpoof
1505:Meltdown
1421:WinShock
1403:Rootpipe
1304:Guccifer
1226:Pranknet
1221:PLATINUM
1195:AndAriel
1106:Advanced
1061:NullCrew
1046:LulzRaft
946:Trustico
559:Timeline
494:Archived
453:Archived
449:NBC News
423:Archived
367:Archived
341:Archived
337:BBC News
312:cite web
281:Archived
231:Archived
144:and the
48:Symantec
2007:Malware
2002:Spyware
1869:X-Agent
1859:Pegasus
1742:Brambul
1705:Shamoon
1649:Kelihos
1639:Alureon
1618:Stuxnet
1588:Malware
1541:TLBleed
1523:Exactis
1511:Spectre
1445:Badlock
1379:iSeeYou
1344:Topiary
1076:RedHack
1066:OurMine
1051:LulzSec
459:12 June
429:12 June
100:malware
96:spyware
60:Tapaoux
1952:Joanap
1905:Triton
1844:Necurs
1834:Jigsaw
1829:Hitler
1798:Dridex
1757:Careto
1680:Dexter
1613:SpyEye
1579:(2019)
1573:(2019)
1567:(2019)
1561:(2019)
1555:(2018)
1549:(2018)
1543:(2018)
1537:(2018)
1531:(2018)
1525:(2018)
1519:(2018)
1513:(2018)
1507:(2018)
1501:(2017)
1495:(2017)
1489:(2017)
1483:(2017)
1477:(2017)
1471:(2017)
1465:(2017)
1459:(2017)
1453:(2016)
1447:(2016)
1441:(2016)
1435:(2015)
1429:(2015)
1427:JASBUG
1423:(2014)
1417:(2014)
1411:(2014)
1405:(2014)
1399:(2014)
1397:POODLE
1393:(2014)
1387:(2014)
1381:(2013)
1375:(2010)
1358:Major
1339:Track2
1261:xDedic
1091:UGNazi
398:6 June
181:Russia
114:as an
75:Origin
41:Sophos
1967:Tinba
1854:Mirai
1782:Regin
1695:Mahdi
1690:Flame
1675:Carna
1659:Stars
1577:Kr00k
1517:EFAIL
1487:KRACK
1439:DROWN
564:2020s
554:2000s
393:Wired
185:Japan
177:China
173:Korea
104:hotel
57:Alias
1962:R2D2
1947:Grum
1940:2019
1924:2018
1890:Kirk
1878:2017
1849:MEMZ
1822:2016
1791:2015
1735:2014
1714:2013
1668:2012
1644:Duqu
1627:2011
1596:2010
1334:Sabu
1086:TDO
1031:GNAA
965:2019
939:2018
881:2017
815:2016
774:2015
728:2014
692:2013
666:2012
620:2011
583:2010
461:2017
431:2017
400:2017
318:link
289:2014
194:and
183:and
160:and
152:and
142:Asia
108:WiFi
98:and
87:(or
65:Type
1685:FBI
1329:MLT
1193:) (
187:.
69:APT
1998::
492:.
488:.
447:.
421:.
417:.
391:.
339:.
335:.
314:}}
310:{{
229:.
225:.
179:,
175:,
118:.
1197:)
1189:(
534:e
527:t
520:v
503:.
463:.
433:.
402:.
376:.
350:.
320:)
291:.
265:.
240:.
50:)
43:)
36:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.