241:
234:"Detailed Analysis - Troj/Tapaoux-AD - Viruses and Spyware - Advanced Network Threat Protection | ATP from Targeted Malware Attacks and Persistent Threats | sophos.com - Threat Center"
377:
314:
857:
877:
2022:
209:
are quickly stolen before attackers erase their tools in hopes of not getting caught in order to keep the high level victims from resetting all of the passwords for their accounts.
463:
433:
543:
1029:
569:
847:
504:
791:
216:
published new research about
Inexsmar, another version of the DarkHotel malware, which was used to target political figures instead of business targets.
233:
373:
262:
178:
Targets are aimed primarily at executives in investments and development, government agencies, defense industries, electronic manufacturers and
837:
606:
961:
291:
1375:
842:
1509:
1491:
992:
770:
536:
1515:
1041:
1002:
637:
816:
1575:
1521:
1096:
987:
455:
923:
760:
662:
425:
982:
755:
351:
862:
574:
564:
529:
328:
1736:
1126:
913:
852:
811:
709:
1231:
966:
729:
159:. Zetter (2014) explains that the group, dubbed DarkHotel or Tapaoux, has also been actively infecting users through
1920:
1261:
1116:
908:
801:
745:
126:
79:
1401:
1370:
997:
1539:
1106:
1024:
930:
903:
496:
1695:
1359:
832:
765:
611:
151:
to hotel servers, attackers are able to target specific users who are guests at luxury hotels primarily in
1569:
1425:
1256:
918:
1710:
1545:
1329:
693:
206:
137:
266:
1473:
1354:
1066:
775:
724:
719:
1972:
1844:
872:
688:
172:
133:
1982:
1977:
1874:
1503:
1266:
1192:
882:
683:
485:"DarkHotel- a spy campaign in Luxury hotels". IT Var News. Techplus Media Pvt. Ltd. 28 Nov 2014.
287:
1987:
1869:
1839:
1443:
1299:
657:
621:
322:
2017:
2012:
1915:
1767:
1690:
1339:
1276:
1151:
600:
1925:
1900:
1864:
1792:
1705:
1700:
1344:
1136:
1046:
750:
1664:
1659:
1349:
1334:
1324:
1319:
1251:
1226:
1221:
1216:
1161:
616:
160:
148:
103:
58:
144:
of real certificates, to convince victims that prompted software downloads are valid.
2006:
1787:
1246:
1205:
1201:
1197:
179:
156:
122:
1731:
1685:
1485:
1449:
1304:
1294:
1187:
1182:
1177:
1051:
867:
796:
399:
164:
400:"DarkHotel: A Sophisticated New Hacking Attack Targets High-Profile Hotel Guests"
343:
132:
The attacks are specifically targeted at senior company executives, using forged
1967:
1957:
1905:
1813:
1757:
1669:
1618:
1479:
1309:
1036:
667:
213:
168:
1910:
1895:
1823:
1613:
1563:
1467:
1419:
1395:
1383:
1241:
1166:
1156:
1146:
1131:
1091:
1016:
647:
201:
Once attackers are in the victim's computer(s), sensitive information such as
141:
1941:
1818:
1782:
1644:
1461:
1211:
1141:
1081:
642:
202:
44:
374:""DarkHotel" uses bogus crypto certificates to snare Wi-Fi-connected execs"
1849:
1777:
1762:
1581:
1557:
1431:
1413:
1314:
1236:
1071:
1056:
956:
935:
714:
17:
1879:
1752:
1715:
1649:
1628:
1598:
1551:
1533:
1455:
1389:
1171:
1086:
1076:
1061:
521:
110:
106:
113:-spreading campaign that appears to be selectively attacking business
1962:
1854:
1808:
1623:
1437:
1407:
1286:
1271:
1101:
940:
652:
191:
51:
426:"Darkhotel APT Uses Hacking Team Exploit to Target Specific Systems"
1587:
1527:
1497:
806:
195:
187:
183:
114:
1859:
1654:
898:
317:. The Inquirer. Archived from the original on November 10, 2014.
315:"Darkhotel malware is targeting travelling execs via hotel WiFi"
152:
118:
525:
838:
344:"DarkHotel hackers targets company bosses in hotel rooms"
456:"'DarkHotel' Hacks Target Business Travelers: Report"
1950:
1934:
1888:
1832:
1801:
1745:
1724:
1678:
1637:
1606:
1597:
1368:
1285:
1115:
1015:
975:
949:
891:
825:
784:
738:
702:
676:
630:
593:
586:
288:"The Darkhotel APT: A Story of Unusual Hospitality"
85:
75:
67:
37:
32:
878:Russian interference in the 2016 U.S. elections
2023:South Korean advanced persistent threat groups
537:
8:
848:Democratic National Committee cyber attacks
167:since 2007 and using those attacks to load
1603:
792:Office of Personnel Management data breach
590:
544:
530:
522:
182:makers. Many victims have been located in
497:"Inexsmar: An unusual DarkHotel campaign"
225:
320:
294:from the original on November 10, 2014
117:visitors through the hotel's in-house
29:
436:from the original on 9 September 2017
290:. Kaspersky Labs. November 10, 2014.
7:
843:Commission on Elections data breach
466:from the original on 12 March 2016
25:
1003:Jeff Bezos phone hacking incident
1576:Microarchitectural Data Sampling
812:Ukrainian Power Grid Cyberattack
720:Cyberterrorism attack of June 25
313:Carly Page (November 10, 2014).
175:tools onto infected endpoints.
121:network. It is characterized by
924:2017 Ukraine ransomware attacks
761:2014 JPMorgan Chase data breach
507:from the original on 2021-05-25
380:from the original on 2016-12-23
354:from the original on 2021-08-15
244:from the original on 2021-08-17
756:2014 celebrity nude photo leak
1:
993:Bulgarian revenue agency hack
771:Russian hacker password theft
1127:Bangladesh Black Hat Hackers
603:(publication of 2009 events)
27:Spyware and malware spreader
988:Baltimore ransomware attack
2039:
1262:Tailored Access Operations
909:WannaCry ransomware attack
802:Ashley Madison data breach
746:Anthem medical data breach
663:PlayStation network outage
127:advanced persistent threat
998:WhatsApp snooping scandal
863:Indian Bank data breaches
557:
372:Dan Goodin (2014-11-10).
342:Leo Kelion (2014-11-11).
327:: CS1 maint: unfit URL (
1540:Speculative Store Bypass
1107:Ukrainian Cyber Alliance
904:2017 Macron e-mail leaks
914:Westminster data breach
833:Bangladesh Bank robbery
776:2014 Yahoo! data breach
766:2014 Sony Pictures hack
725:2013 Yahoo! data breach
710:South Korea cyberattack
612:Operation Olympic Games
607:Australian cyberattacks
43:Trojan:Win32/Tapaoux. (
1257:Syrian Electronic Army
967:SingHealth data breach
730:Singapore cyberattacks
668:RSA SecurID compromise
1546:Lazy FP state restore
1330:Kristoffer von Hassel
983:Sri Lanka cyberattack
853:Vietnam Airport Hacks
694:Operation High Roller
207:intellectual property
165:Peer-to-Peer networks
1492:Silent Bob is Silent
552:Hacking in the 2010s
462:. 10 November 2014.
140:the underlying weak
134:digital certificates
1426:SS7 vulnerabilities
962:Atlanta cyberattack
931:Equifax data breach
689:Stratfor email leak
638:Canadian government
617:Operation ShadowNet
173:reverse engineering
1875:Petya and NotPetya
1504:ROCA vulnerability
1267:The Shadow Brokers
1193:Iranian Cyber Army
1119:persistent threats
919:Petya and NotPetya
883:2016 Bitfinex hack
858:DCCC cyber attacks
817:SWIFT banking hack
2000:
1999:
1996:
1995:
1988:ZeroAccess botnet
1300:Mustafa Al-Bassam
1067:New World Hackers
1030:associated events
1011:
1010:
807:VTech data breach
658:Operation AntiSec
622:Operation Payback
581:
580:
93:
92:
50:Troj/Tapaoux-AD (
16:(Redirected from
2030:
1604:
1277:Yemen Cyber Army
601:Operation Aurora
591:
560:
559:
546:
539:
532:
523:
516:
515:
513:
512:
501:Bitdefender Labs
493:
487:
486:
482:
476:
475:
473:
471:
452:
446:
445:
443:
441:
424:Kovacs, Eduard.
421:
415:
414:
412:
410:
395:
389:
388:
386:
385:
376:. Ars Technica.
369:
363:
362:
360:
359:
339:
333:
332:
326:
318:
310:
304:
303:
301:
299:
284:
278:
277:
275:
274:
265:. Archived from
263:"Trojan.Tapaoux"
259:
253:
252:
250:
249:
230:
102:) is a targeted
57:Trojan.Tapaoux (
30:
21:
2038:
2037:
2033:
2032:
2031:
2029:
2028:
2027:
2003:
2002:
2001:
1992:
1946:
1930:
1884:
1828:
1797:
1741:
1720:
1674:
1633:
1593:
1373:
1371:vulnerabilities
1364:
1281:
1174:(confederation)
1137:Charming Kitten
1118:
1111:
1047:Goatse Security
1007:
971:
945:
936:Deloitte breach
887:
873:Dyn cyberattack
821:
780:
751:Operation Tovar
734:
698:
672:
626:
587:Major incidents
582:
553:
550:
520:
519:
510:
508:
495:
494:
490:
484:
483:
479:
469:
467:
454:
453:
449:
439:
437:
423:
422:
418:
408:
406:
397:
396:
392:
383:
381:
371:
370:
366:
357:
355:
341:
340:
336:
319:
312:
311:
307:
297:
295:
286:
285:
281:
272:
270:
261:
260:
256:
247:
245:
232:
231:
227:
222:
136:, generated by
28:
23:
22:
15:
12:
11:
5:
2036:
2034:
2026:
2025:
2020:
2015:
2005:
2004:
1998:
1997:
1994:
1993:
1991:
1990:
1985:
1980:
1975:
1970:
1965:
1960:
1954:
1952:
1948:
1947:
1945:
1944:
1938:
1936:
1932:
1931:
1929:
1928:
1923:
1918:
1913:
1908:
1903:
1898:
1892:
1890:
1886:
1885:
1883:
1882:
1877:
1872:
1867:
1862:
1857:
1852:
1847:
1842:
1836:
1834:
1830:
1829:
1827:
1826:
1821:
1816:
1811:
1805:
1803:
1799:
1798:
1796:
1795:
1790:
1785:
1780:
1775:
1770:
1765:
1760:
1758:Black Energy 3
1755:
1749:
1747:
1743:
1742:
1740:
1739:
1734:
1728:
1726:
1722:
1721:
1719:
1718:
1713:
1708:
1703:
1698:
1693:
1688:
1682:
1680:
1676:
1675:
1673:
1672:
1667:
1665:Metulji botnet
1662:
1657:
1652:
1647:
1641:
1639:
1635:
1634:
1632:
1631:
1626:
1621:
1619:Black Energy 2
1616:
1610:
1608:
1601:
1595:
1594:
1592:
1591:
1585:
1579:
1573:
1567:
1561:
1555:
1549:
1543:
1537:
1531:
1525:
1519:
1513:
1507:
1501:
1495:
1489:
1483:
1477:
1474:Broadcom Wi-Fi
1471:
1465:
1459:
1453:
1447:
1441:
1435:
1429:
1423:
1417:
1411:
1405:
1399:
1393:
1387:
1380:
1378:
1366:
1365:
1363:
1362:
1357:
1352:
1347:
1342:
1337:
1335:Junaid Hussain
1332:
1327:
1325:Jeremy Hammond
1322:
1320:Elliott Gunton
1317:
1312:
1307:
1302:
1297:
1291:
1289:
1283:
1282:
1280:
1279:
1274:
1269:
1264:
1259:
1254:
1252:Stealth Falcon
1249:
1244:
1239:
1234:
1229:
1227:PLA Unit 61486
1224:
1222:PLA Unit 61398
1219:
1217:Numbered Panda
1214:
1209:
1195:
1190:
1185:
1180:
1175:
1169:
1164:
1162:Equation Group
1159:
1154:
1149:
1144:
1139:
1134:
1129:
1123:
1121:
1113:
1112:
1110:
1109:
1104:
1099:
1094:
1089:
1084:
1079:
1074:
1069:
1064:
1059:
1054:
1049:
1044:
1039:
1034:
1033:
1032:
1021:
1019:
1013:
1012:
1009:
1008:
1006:
1005:
1000:
995:
990:
985:
979:
977:
973:
972:
970:
969:
964:
959:
953:
951:
947:
946:
944:
943:
938:
933:
928:
927:
926:
916:
911:
906:
901:
895:
893:
889:
888:
886:
885:
880:
875:
870:
865:
860:
855:
850:
845:
840:
835:
829:
827:
823:
822:
820:
819:
814:
809:
804:
799:
794:
788:
786:
782:
781:
779:
778:
773:
768:
763:
758:
753:
748:
742:
740:
736:
735:
733:
732:
727:
722:
717:
712:
706:
704:
700:
699:
697:
696:
691:
686:
680:
678:
674:
673:
671:
670:
665:
660:
655:
653:HBGary Federal
650:
645:
640:
634:
632:
628:
627:
625:
624:
619:
614:
609:
604:
597:
595:
588:
584:
583:
579:
578:
572:
567:
558:
555:
554:
551:
549:
548:
541:
534:
526:
518:
517:
488:
477:
447:
416:
390:
364:
334:
305:
279:
254:
238:www.sophos.com
224:
223:
221:
218:
161:spear-phishing
149:malicious code
104:spear-phishing
91:
90:
87:
83:
82:
77:
73:
72:
69:
65:
64:
63:
62:
55:
48:
39:
38:Technical name
35:
34:
26:
24:
14:
13:
10:
9:
6:
4:
3:
2:
2035:
2024:
2021:
2019:
2016:
2014:
2011:
2010:
2008:
1989:
1986:
1984:
1981:
1979:
1976:
1974:
1971:
1969:
1966:
1964:
1961:
1959:
1956:
1955:
1953:
1949:
1943:
1940:
1939:
1937:
1933:
1927:
1924:
1922:
1919:
1917:
1914:
1912:
1909:
1907:
1904:
1902:
1899:
1897:
1894:
1893:
1891:
1887:
1881:
1878:
1876:
1873:
1871:
1868:
1866:
1863:
1861:
1858:
1856:
1853:
1851:
1848:
1846:
1843:
1841:
1838:
1837:
1835:
1831:
1825:
1822:
1820:
1817:
1815:
1812:
1810:
1807:
1806:
1804:
1800:
1794:
1791:
1789:
1788:Gameover ZeuS
1786:
1784:
1781:
1779:
1776:
1774:
1771:
1769:
1766:
1764:
1761:
1759:
1756:
1754:
1751:
1750:
1748:
1744:
1738:
1735:
1733:
1730:
1729:
1727:
1723:
1717:
1714:
1712:
1709:
1707:
1704:
1702:
1699:
1697:
1694:
1692:
1689:
1687:
1684:
1683:
1681:
1677:
1671:
1668:
1666:
1663:
1661:
1658:
1656:
1653:
1651:
1648:
1646:
1643:
1642:
1640:
1636:
1630:
1627:
1625:
1622:
1620:
1617:
1615:
1612:
1611:
1609:
1605:
1602:
1600:
1596:
1589:
1586:
1583:
1580:
1577:
1574:
1571:
1568:
1565:
1562:
1559:
1556:
1553:
1550:
1547:
1544:
1541:
1538:
1535:
1532:
1529:
1526:
1523:
1520:
1517:
1514:
1511:
1508:
1505:
1502:
1499:
1496:
1493:
1490:
1487:
1484:
1481:
1478:
1475:
1472:
1469:
1466:
1463:
1460:
1457:
1454:
1451:
1448:
1445:
1442:
1439:
1436:
1433:
1430:
1427:
1424:
1421:
1418:
1415:
1412:
1409:
1406:
1403:
1400:
1397:
1394:
1391:
1388:
1385:
1382:
1381:
1379:
1377:
1372:
1367:
1361:
1358:
1356:
1353:
1351:
1348:
1346:
1343:
1341:
1338:
1336:
1333:
1331:
1328:
1326:
1323:
1321:
1318:
1316:
1313:
1311:
1308:
1306:
1303:
1301:
1298:
1296:
1293:
1292:
1290:
1288:
1284:
1278:
1275:
1273:
1270:
1268:
1265:
1263:
1260:
1258:
1255:
1253:
1250:
1248:
1247:Rocket Kitten
1245:
1243:
1240:
1238:
1235:
1233:
1230:
1228:
1225:
1223:
1220:
1218:
1215:
1213:
1210:
1207:
1203:
1199:
1198:Lazarus Group
1196:
1194:
1191:
1189:
1186:
1184:
1181:
1179:
1176:
1173:
1170:
1168:
1165:
1163:
1160:
1158:
1155:
1153:
1150:
1148:
1145:
1143:
1140:
1138:
1135:
1133:
1130:
1128:
1125:
1124:
1122:
1120:
1114:
1108:
1105:
1103:
1100:
1098:
1095:
1093:
1090:
1088:
1085:
1083:
1080:
1078:
1075:
1073:
1070:
1068:
1065:
1063:
1060:
1058:
1055:
1053:
1050:
1048:
1045:
1043:
1040:
1038:
1035:
1031:
1028:
1027:
1026:
1023:
1022:
1020:
1018:
1014:
1004:
1001:
999:
996:
994:
991:
989:
986:
984:
981:
980:
978:
974:
968:
965:
963:
960:
958:
955:
954:
952:
948:
942:
941:Disqus breach
939:
937:
934:
932:
929:
925:
922:
921:
920:
917:
915:
912:
910:
907:
905:
902:
900:
897:
896:
894:
890:
884:
881:
879:
876:
874:
871:
869:
866:
864:
861:
859:
856:
854:
851:
849:
846:
844:
841:
839:
836:
834:
831:
830:
828:
824:
818:
815:
813:
810:
808:
805:
803:
800:
798:
795:
793:
790:
789:
787:
783:
777:
774:
772:
769:
767:
764:
762:
759:
757:
754:
752:
749:
747:
744:
743:
741:
737:
731:
728:
726:
723:
721:
718:
716:
715:Snapchat hack
713:
711:
708:
707:
705:
701:
695:
692:
690:
687:
685:
684:LinkedIn hack
682:
681:
679:
675:
669:
666:
664:
661:
659:
656:
654:
651:
649:
646:
644:
641:
639:
636:
635:
633:
629:
623:
620:
618:
615:
613:
610:
608:
605:
602:
599:
598:
596:
592:
589:
585:
577: →
576:
573:
571:
568:
566:
563:←
562:
561:
556:
547:
542:
540:
535:
533:
528:
527:
524:
506:
502:
498:
492:
489:
481:
478:
465:
461:
457:
451:
448:
435:
431:
430:Security Week
427:
420:
417:
405:
401:
398:Zetter, Kim.
394:
391:
379:
375:
368:
365:
353:
349:
345:
338:
335:
330:
324:
316:
309:
306:
293:
289:
283:
280:
269:on 2019-12-14
268:
264:
258:
255:
243:
239:
235:
229:
226:
219:
217:
215:
212:In July 2017
210:
208:
204:
199:
197:
193:
189:
185:
181:
180:energy policy
176:
174:
170:
166:
162:
158:
157:United States
154:
150:
145:
143:
139:
135:
130:
128:
124:
123:Kaspersky Lab
120:
116:
112:
108:
105:
101:
97:
88:
84:
81:
78:
74:
70:
66:
60:
56:
53:
49:
46:
42:
41:
40:
36:
31:
19:
1772:
1732:CryptoLocker
1486:DoublePulsar
1305:Cyber Anakin
1295:Ryan Ackroyd
1188:Helix Kitten
1183:Hacking Team
1178:Guccifer 2.0
1052:Lizard Squad
868:Surkov leaks
797:Hacking Team
509:. Retrieved
500:
491:
480:
468:. Retrieved
459:
450:
438:. Retrieved
429:
419:
407:. Retrieved
403:
393:
382:. Retrieved
367:
356:. Retrieved
347:
337:
308:
298:November 10,
296:. Retrieved
282:
271:. Retrieved
267:the original
257:
246:. Retrieved
237:
228:
211:
200:
177:
146:
131:
99:
95:
94:
1968:NetTraveler
1906:LogicLocker
1814:Hidden Tear
1711:Red October
1570:Dragonblood
1480:EternalBlue
1444:Stagefright
1310:George Hotz
1287:Individuals
1037:CyberBerkut
214:Bitdefender
169:key logging
142:public keys
89:South Korea
2007:Categories
1911:Rensenware
1896:BrickerBot
1824:TeslaCrypt
1614:Bad Rabbit
1564:Foreshadow
1468:Cloudbleed
1420:Row hammer
1402:Shellshock
1396:Heartbleed
1384:Evercookie
1360:The Jester
1242:Red Apollo
1202:BlueNorOff
1172:GOSSIPGIRL
1167:Fancy Bear
1157:Elfin Team
1152:DarkMatter
1147:Dark Basin
1132:Bureau 121
1092:Teamp0ison
1017:Hacktivism
648:DNSChanger
511:2021-10-22
384:2017-06-14
358:2021-10-22
273:2021-10-22
248:2021-10-22
220:References
147:Uploading
1942:VPNFilter
1819:Rombertik
1783:FinFisher
1773:DarkHotel
1737:DarkSeoul
1645:Coreflood
1510:BlueBorne
1462:Dirty COW
1376:disclosed
1374:publicly
1212:NSO Group
1142:Cozy Bear
1082:PayPal 14
1025:Anonymous
899:SHAttered
643:DigiNotar
203:passwords
138:factoring
100:Darkhotel
96:DarkHotel
45:Microsoft
33:DarkHotel
1983:Titanium
1926:XafeCopy
1921:WannaCry
1850:KeRanger
1778:Duqu 2.0
1763:Carbanak
1582:BlueKeep
1558:SigSpoof
1516:Meltdown
1432:WinShock
1414:Rootpipe
1315:Guccifer
1237:Pranknet
1232:PLATINUM
1206:AndAriel
1117:Advanced
1072:NullCrew
1057:LulzRaft
957:Trustico
570:Timeline
505:Archived
464:Archived
460:NBC News
434:Archived
378:Archived
352:Archived
348:BBC News
323:cite web
292:Archived
242:Archived
155:and the
59:Symantec
18:Inexsmar
2018:Malware
2013:Spyware
1880:X-Agent
1870:Pegasus
1753:Brambul
1716:Shamoon
1660:Kelihos
1650:Alureon
1629:Stuxnet
1599:Malware
1552:TLBleed
1534:Exactis
1522:Spectre
1456:Badlock
1390:iSeeYou
1355:Topiary
1087:RedHack
1077:OurMine
1062:LulzSec
470:12 June
440:12 June
111:malware
107:spyware
71:Tapaoux
1963:Joanap
1916:Triton
1855:Necurs
1845:Jigsaw
1840:Hitler
1809:Dridex
1768:Careto
1691:Dexter
1624:SpyEye
1590:(2019)
1584:(2019)
1578:(2019)
1572:(2019)
1566:(2018)
1560:(2018)
1554:(2018)
1548:(2018)
1542:(2018)
1536:(2018)
1530:(2018)
1524:(2018)
1518:(2018)
1512:(2017)
1506:(2017)
1500:(2017)
1494:(2017)
1488:(2017)
1482:(2017)
1476:(2017)
1470:(2017)
1464:(2016)
1458:(2016)
1452:(2016)
1446:(2015)
1440:(2015)
1438:JASBUG
1434:(2014)
1428:(2014)
1422:(2014)
1416:(2014)
1410:(2014)
1408:POODLE
1404:(2014)
1398:(2014)
1392:(2013)
1386:(2010)
1369:Major
1350:Track2
1272:xDedic
1102:UGNazi
409:6 June
192:Russia
125:as an
86:Origin
52:Sophos
1978:Tinba
1865:Mirai
1793:Regin
1706:Mahdi
1701:Flame
1686:Carna
1670:Stars
1588:Kr00k
1528:EFAIL
1498:KRACK
1450:DROWN
575:2020s
565:2000s
404:Wired
196:Japan
188:China
184:Korea
115:hotel
68:Alias
1973:R2D2
1958:Grum
1951:2019
1935:2018
1901:Kirk
1889:2017
1860:MEMZ
1833:2016
1802:2015
1746:2014
1725:2013
1679:2012
1655:Duqu
1638:2011
1607:2010
1345:Sabu
1097:TDO
1042:GNAA
976:2019
950:2018
892:2017
826:2016
785:2015
739:2014
703:2013
677:2012
631:2011
594:2010
472:2017
442:2017
411:2017
329:link
300:2014
205:and
194:and
171:and
163:and
153:Asia
119:WiFi
109:and
98:(or
76:Type
1696:FBI
1340:MLT
1204:) (
198:.
80:APT
2009::
503:.
499:.
458:.
432:.
428:.
402:.
350:.
346:.
325:}}
321:{{
240:.
236:.
190:,
186:,
129:.
1208:)
1200:(
545:e
538:t
531:v
514:.
474:.
444:.
413:.
387:.
361:.
331:)
302:.
276:.
251:.
61:)
54:)
47:)
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.