1179:
567:
The cybercrime landscape has shifted from individuals developing their own tools to a market where crimeware, tools and services for illegal online activities, can be easily acquired in online marketplaces. These crimeware markets are expected to expand, especially targeting mobile devices.
697:
Crimeware can have a significant economic impact due to loss of sensitive and proprietary information and associated financial losses. One survey estimates that in 2005 organizations lost in excess of $ 30 million due to the theft of proprietary information. The
677:. These social-engineered threats often arrive disguised as a valid e-mail message and include specific company information and sender addresses. The malicious e-mails use social engineering to manipulate users to open the attachment and execute the payload.
555:
or technical stealth in order to access a computer user's financial and retail accounts for the purpose of taking funds from those accounts or completing unauthorized transactions on behalf of the cyberthief. Alternatively, crimeware may steal
702:
of financial or confidential information from corporate networks often places the organizations in violation of government and industry-imposed regulatory requirements that attempt to ensure that financial, personal and confidential.
943:
1031:
1041:
720:
232:
896:
1073:
572:
877:
741:
1855:
1006:
512:
575:
in
February 2005 in an Anti-Phishing Working Group response to the FDIC article "Putting an End to Account-Hijacking Identity Theft".
1617:
731:
1707:
552:
1594:
939:
583:
Criminals use a variety of techniques to steal confidential data through crimeware, including through the following methods:
342:
1625:
1066:
736:
36:
1972:
1663:
1557:
820:
1353:
1860:
1607:
53:
1687:
505:
1926:
1420:
1059:
445:
242:
125:
115:
960:
Sood, Aditya (2013). "Crimeware-as-a-service—A survey of commoditized crimeware in the underground market".
152:
140:
1612:
1533:
1333:
681:
631:
Enable remote access into applications, allowing criminals to break into networks for malicious purposes.
227:
595:—login and password information for online bank accounts, for example—and report them back to the thief.
1946:
1589:
1547:
1203:
654:
Crimeware threats can be installed on victims' computers through multiple delivery vectors, including:
464:
202:
2003:
1814:
1450:
1168:
1015:
685:
658:
498:
247:
628:
Hijack a user session at a financial institution and drain the account without the user's knowledge.
1748:
1738:
1435:
1313:
1208:
423:
382:
352:
302:
1824:
1523:
1475:
1138:
162:
1875:
1702:
726:
417:
1809:
1656:
1564:
1298:
667:
vulnerability to steal passwords and monitor user input on webmail and online commerce sites.
1003:
1982:
1977:
1936:
1865:
1723:
1584:
1496:
1445:
1390:
1258:
1231:
1213:
1111:
1082:
435:
377:
297:
1178:
8:
2008:
1931:
1368:
1143:
1101:
412:
237:
147:
1916:
1753:
1733:
1552:
1480:
1385:
882:
774:
758:
715:
1941:
1895:
1804:
1600:
1358:
1293:
1243:
1190:
1148:
1096:
816:
663:
588:
407:
370:
337:
1956:
1921:
1649:
1569:
1509:
1273:
1263:
1158:
1021:
969:
769:
763:
670:
561:
387:
88:
836:
Gad, Mamoud (2014). "Crimeware
Marketplaces and Their Facilitating Technologies".
564:
as many malicious code threats seek to pilfer valuable, confidential information.
1951:
1890:
1794:
1460:
1440:
1338:
1163:
1153:
1010:
947:
557:
167:
58:
27:
973:
1911:
1885:
1692:
1630:
1528:
1378:
1328:
1303:
1268:
1248:
1128:
1116:
790:
592:
560:
or sensitive corporate information. Crimeware represents a growing problem in
548:
533:
476:
307:
260:
190:
71:
48:
1997:
1870:
1789:
1697:
1540:
1501:
1470:
1465:
1318:
1308:
1278:
312:
207:
104:
1728:
1574:
1430:
1133:
400:
267:
220:
75:
855:
1880:
1799:
1514:
1348:
1323:
1288:
1123:
611:
607:
599:
470:
357:
94:
1839:
1819:
1784:
1579:
1395:
1343:
1226:
1106:
1051:
642:
634:
327:
322:
99:
606:
controlled by the thief even when the user types the website's proper
1829:
1455:
1410:
1405:
1221:
661:
in Web applications. The
Bankash.G Trojan, for example, exploited an
622:
347:
177:
82:
43:
1415:
1373:
1236:
897:"Pharming explained: How attackers use fake websites to steal data"
780:
615:
603:
441:
172:
120:
1834:
1743:
1672:
1641:
1425:
1400:
1363:
785:
753:
638:
540:
529:
429:
317:
292:
285:
157:
1774:
1769:
1283:
1198:
637:
all data on a computer and require the user to pay a ransom to
544:
483:
332:
272:
110:
1042:"Crimeware gets worse - How to avoid being robbed by your PC"
699:
16:
Class of malware designed specifically to automate cybercrime
962:
International
Journal of Critical Infrastructure Protection
674:
858:. Federal Deposit Insurance Corporation. 5 January 2004
810:
856:"Putting an End to Account-Hijacking Identity Theft"
721:
Health
Insurance Portability and Accountability Act
1032:"Cyber Crooks Target Public & Private Schools"
940:Protecting Corporate Assets from E-mail Crimeware
813:Crimeware: Understanding New Attacks and Defenses
1995:
1657:
1067:
506:
1022:"Real-Time Hackers Foil Two-Factor Security"
742:Payment Card Industry Data Security Standard
1664:
1650:
1074:
1060:
918:
916:
513:
499:
1618:Security information and event management
811:Jakobsson, M; Ramzan, Z. (6 April 2008).
732:Family Educational Rights and Privacy Act
1081:
1004:Symantec Internet Security Threat Report
878:Cyberthieves Silently Copy Your Password
1018:(Archived: August 8, 2002, at 22:18:34)
988:Computer Crime and Security Survey 2005
913:
894:
838:Technology innovation management review
793:, Perhaps the best known banking trojan
1996:
1708:Timeline of computer viruses and worms
1645:
1595:Host-based intrusion detection system
1055:
959:
848:
1626:Runtime application self-protection
835:
804:
649:
233:forensics-focused operating systems
13:
1671:
1177:
737:California Senate Bill 1386 (2002)
532:designed specifically to automate
14:
2020:
1973:Computer and network surveillance
1558:Security-focused operating system
997:
923:Symantec Internet Security Report
711:US laws and regulations include:
571:The term crimeware was coined by
1354:Insecure direct object reference
706:
1608:Information security management
815:. Addison-Wesley Professional.
54:Hacking of consumer electronics
1688:Comparison of computer viruses
980:
953:
932:
888:
870:
829:
1:
1927:Data loss prevention software
797:
547:) is designed to perpetrate
539:Crimeware (as distinct from
153:Chaos Communication Congress
7:
1613:Information risk management
1534:Multi-factor authentication
1090:Related security categories
1016:Computer Security Institute
974:10.1016/j.ijcip.2013.01.002
895:Swinhoe, Dan (2020-04-23).
747:
692:
578:
10:
2025:
1947:Intrusion detection system
1590:Intrusion detection system
1548:Computer security software
1204:Advanced persistent threat
625:cached on a user's system.
465:2600: The Hacker Quarterly
203:List of computer criminals
1965:
1904:
1848:
1815:Privacy-invasive software
1762:
1716:
1680:
1489:
1189:
1175:
1169:Digital rights management
1089:
946:January 21, 2012, at the
1314:Denial-of-service attack
1209:Arbitrary code execution
777:, A small banking trojan
587:Surreptitiously install
383:Cloud computing security
1825:Rogue security software
1524:Computer access control
1476:Rogue security software
1139:Electromagnetic warfare
766:, A PHP-based crimeware
163:Hackers on Planet Earth
1861:Classic Mac OS viruses
1703:List of computer worms
1570:Obfuscation (software)
1299:Browser Helper Objects
1183:
727:Gramm-Leach-Bliley Act
688:on servers and clients
418:Homebrew Computer Club
1565:Data-centric security
1446:Remote access trojans
1181:
1048:, September 26, 2009)
1038:, September 14, 2009)
1028:, September 18, 2009)
1983:Operation: Bot Roast
1497:Application security
1391:Privilege escalation
1259:Cross-site scripting
1112:Cybersex trafficking
1083:Information security
436:Masters of Deception
378:Application security
1932:Defensive computing
1849:By operating system
1144:Information warfare
1102:Automotive security
929:, March 2006, p. 71
604:counterfeit website
413:Chaos Computer Club
148:Black Hat Briefings
22:Part of a series on
1917:Antivirus software
1763:Malware for profit
1734:Man-in-the-browser
1681:Infectious malware
1553:Antivirus software
1421:Social engineering
1386:Polymorphic engine
1339:Fraudulent dialers
1244:Hardware backdoors
1184:
1009:2006-11-15 at the
950:Avinti, Inc., p.1,
883:The New York Times
775:Tiny Banker Trojan
759:Metasploit Project
716:Sarbanes-Oxley Act
598:Redirect a user's
553:social engineering
243:Social engineering
1991:
1990:
1942:Internet security
1896:HyperCard viruses
1805:Keystroke logging
1795:Fraudulent dialer
1739:Man-in-the-middle
1639:
1638:
1601:Anomaly detection
1506:Secure by default
1359:Keystroke loggers
1294:Drive-by download
1182:vectorial version
1149:Internet security
1097:Computer security
1026:Technology Review
664:Internet Explorer
589:keystroke loggers
523:
522:
371:Computer security
338:Keystroke logging
2016:
2004:Types of malware
1957:Network security
1922:Browser security
1666:
1659:
1652:
1643:
1642:
1510:Secure by design
1441:Hardware Trojans
1274:History sniffing
1264:Cross-site leaks
1159:Network security
1076:
1069:
1062:
1053:
1052:
991:
984:
978:
977:
957:
951:
936:
930:
920:
911:
910:
908:
907:
892:
886:
874:
868:
867:
865:
863:
852:
846:
845:
833:
827:
826:
808:
770:Targeted attacks
764:MPack (software)
671:Targeted attacks
650:Delivery vectors
614:, also known as
562:network security
515:
508:
501:
388:Network security
89:Hacker Manifesto
28:Computer hacking
19:
18:
2024:
2023:
2019:
2018:
2017:
2015:
2014:
2013:
1994:
1993:
1992:
1987:
1966:Countermeasures
1961:
1952:Mobile security
1900:
1891:Palm OS viruses
1856:Android malware
1844:
1758:
1754:Zombie computer
1712:
1676:
1670:
1640:
1635:
1485:
1185:
1173:
1164:Copy protection
1154:Mobile security
1085:
1080:
1036:Washington Post
1011:Wayback Machine
1000:
995:
994:
985:
981:
958:
954:
948:Wayback Machine
937:
933:
921:
914:
905:
903:
893:
889:
875:
871:
861:
859:
854:
853:
849:
834:
830:
823:
809:
805:
800:
750:
709:
695:
686:vulnerabilities
659:Vulnerabilities
652:
581:
519:
490:
489:
459:
451:
450:
403:
393:
392:
373:
363:
362:
288:
278:
277:
263:
253:
252:
223:
213:
212:
193:
183:
182:
168:Security BSides
143:
133:
132:
78:
64:
63:
59:List of hackers
39:
17:
12:
11:
5:
2022:
2012:
2011:
2006:
1989:
1988:
1986:
1985:
1980:
1975:
1969:
1967:
1963:
1962:
1960:
1959:
1954:
1949:
1944:
1939:
1934:
1929:
1924:
1919:
1914:
1912:Anti-keylogger
1908:
1906:
1902:
1901:
1899:
1898:
1893:
1888:
1886:Mobile malware
1883:
1878:
1873:
1868:
1863:
1858:
1852:
1850:
1846:
1845:
1843:
1842:
1837:
1832:
1827:
1822:
1817:
1812:
1807:
1802:
1797:
1792:
1787:
1782:
1777:
1772:
1766:
1764:
1760:
1759:
1757:
1756:
1751:
1746:
1741:
1736:
1731:
1726:
1720:
1718:
1714:
1713:
1711:
1710:
1705:
1700:
1695:
1693:Computer virus
1690:
1684:
1682:
1678:
1677:
1669:
1668:
1661:
1654:
1646:
1637:
1636:
1634:
1633:
1631:Site isolation
1628:
1623:
1622:
1621:
1615:
1605:
1604:
1603:
1598:
1587:
1582:
1577:
1572:
1567:
1562:
1561:
1560:
1555:
1545:
1544:
1543:
1538:
1537:
1536:
1529:Authentication
1521:
1520:
1519:
1518:
1517:
1507:
1504:
1493:
1491:
1487:
1486:
1484:
1483:
1478:
1473:
1468:
1463:
1458:
1453:
1448:
1443:
1438:
1433:
1428:
1423:
1418:
1413:
1408:
1403:
1398:
1393:
1388:
1383:
1382:
1381:
1371:
1366:
1361:
1356:
1351:
1346:
1341:
1336:
1331:
1329:Email spoofing
1326:
1321:
1316:
1311:
1306:
1301:
1296:
1291:
1286:
1281:
1276:
1271:
1269:DOM clobbering
1266:
1261:
1256:
1251:
1249:Code injection
1246:
1241:
1240:
1239:
1234:
1229:
1224:
1216:
1211:
1206:
1201:
1195:
1193:
1187:
1186:
1176:
1174:
1172:
1171:
1166:
1161:
1156:
1151:
1146:
1141:
1136:
1131:
1129:Cyberterrorism
1126:
1121:
1120:
1119:
1117:Computer fraud
1114:
1104:
1099:
1093:
1091:
1087:
1086:
1079:
1078:
1071:
1064:
1056:
1050:
1049:
1039:
1029:
1019:
1013:
999:
998:External links
996:
993:
992:
979:
952:
931:
912:
887:
869:
847:
828:
821:
802:
801:
799:
796:
795:
794:
791:Zeus (malware)
788:
783:
778:
772:
767:
761:
756:
749:
746:
745:
744:
739:
734:
729:
724:
718:
708:
705:
694:
691:
690:
689:
678:
668:
651:
648:
647:
646:
632:
629:
626:
619:
596:
593:sensitive data
580:
577:
549:identity theft
528:is a class of
521:
520:
518:
517:
510:
503:
495:
492:
491:
488:
487:
480:
477:Nuts and Volts
473:
468:
460:
457:
456:
453:
452:
449:
448:
439:
433:
427:
424:Legion of Doom
421:
415:
410:
404:
399:
398:
395:
394:
391:
390:
385:
380:
374:
369:
368:
365:
364:
361:
360:
355:
350:
345:
340:
335:
330:
325:
320:
315:
310:
305:
300:
295:
289:
284:
283:
280:
279:
276:
275:
270:
264:
261:Practice sites
259:
258:
255:
254:
251:
250:
245:
240:
235:
230:
224:
219:
218:
215:
214:
211:
210:
205:
200:
194:
191:Computer crime
189:
188:
185:
184:
181:
180:
175:
170:
165:
160:
155:
150:
144:
139:
138:
135:
134:
131:
130:
129:
128:
123:
118:
107:
102:
97:
92:
85:
79:
72:Hacker culture
70:
69:
66:
65:
62:
61:
56:
51:
49:Cryptovirology
46:
40:
35:
34:
31:
30:
24:
23:
15:
9:
6:
4:
3:
2:
2021:
2010:
2007:
2005:
2002:
2001:
1999:
1984:
1981:
1979:
1976:
1974:
1971:
1970:
1968:
1964:
1958:
1955:
1953:
1950:
1948:
1945:
1943:
1940:
1938:
1935:
1933:
1930:
1928:
1925:
1923:
1920:
1918:
1915:
1913:
1910:
1909:
1907:
1903:
1897:
1894:
1892:
1889:
1887:
1884:
1882:
1879:
1877:
1876:MacOS malware
1874:
1872:
1871:Linux malware
1869:
1867:
1864:
1862:
1859:
1857:
1854:
1853:
1851:
1847:
1841:
1838:
1836:
1833:
1831:
1828:
1826:
1823:
1821:
1818:
1816:
1813:
1811:
1808:
1806:
1803:
1801:
1798:
1796:
1793:
1791:
1790:Form grabbing
1788:
1786:
1783:
1781:
1778:
1776:
1773:
1771:
1768:
1767:
1765:
1761:
1755:
1752:
1750:
1747:
1745:
1742:
1740:
1737:
1735:
1732:
1730:
1727:
1725:
1722:
1721:
1719:
1715:
1709:
1706:
1704:
1701:
1699:
1698:Computer worm
1696:
1694:
1691:
1689:
1686:
1685:
1683:
1679:
1674:
1667:
1662:
1660:
1655:
1653:
1648:
1647:
1644:
1632:
1629:
1627:
1624:
1619:
1616:
1614:
1611:
1610:
1609:
1606:
1602:
1599:
1596:
1593:
1592:
1591:
1588:
1586:
1583:
1581:
1578:
1576:
1573:
1571:
1568:
1566:
1563:
1559:
1556:
1554:
1551:
1550:
1549:
1546:
1542:
1541:Authorization
1539:
1535:
1532:
1531:
1530:
1527:
1526:
1525:
1522:
1516:
1513:
1512:
1511:
1508:
1505:
1503:
1502:Secure coding
1500:
1499:
1498:
1495:
1494:
1492:
1488:
1482:
1479:
1477:
1474:
1472:
1471:SQL injection
1469:
1467:
1464:
1462:
1459:
1457:
1454:
1452:
1451:Vulnerability
1449:
1447:
1444:
1442:
1439:
1437:
1436:Trojan horses
1434:
1432:
1431:Software bugs
1429:
1427:
1424:
1422:
1419:
1417:
1414:
1412:
1409:
1407:
1404:
1402:
1399:
1397:
1394:
1392:
1389:
1387:
1384:
1380:
1377:
1376:
1375:
1372:
1370:
1367:
1365:
1362:
1360:
1357:
1355:
1352:
1350:
1347:
1345:
1342:
1340:
1337:
1335:
1332:
1330:
1327:
1325:
1322:
1320:
1319:Eavesdropping
1317:
1315:
1312:
1310:
1309:Data scraping
1307:
1305:
1302:
1300:
1297:
1295:
1292:
1290:
1287:
1285:
1282:
1280:
1279:Cryptojacking
1277:
1275:
1272:
1270:
1267:
1265:
1262:
1260:
1257:
1255:
1252:
1250:
1247:
1245:
1242:
1238:
1235:
1233:
1230:
1228:
1225:
1223:
1220:
1219:
1217:
1215:
1212:
1210:
1207:
1205:
1202:
1200:
1197:
1196:
1194:
1192:
1188:
1180:
1170:
1167:
1165:
1162:
1160:
1157:
1155:
1152:
1150:
1147:
1145:
1142:
1140:
1137:
1135:
1132:
1130:
1127:
1125:
1122:
1118:
1115:
1113:
1110:
1109:
1108:
1105:
1103:
1100:
1098:
1095:
1094:
1092:
1088:
1084:
1077:
1072:
1070:
1065:
1063:
1058:
1057:
1054:
1047:
1046:Computerworld
1043:
1040:
1037:
1033:
1030:
1027:
1023:
1020:
1017:
1014:
1012:
1008:
1005:
1002:
1001:
989:
983:
975:
971:
967:
963:
956:
949:
945:
941:
935:
928:
924:
919:
917:
902:
898:
891:
885:
884:
879:
873:
857:
851:
843:
839:
832:
824:
822:0-321-50195-0
818:
814:
807:
803:
792:
789:
787:
784:
782:
779:
776:
773:
771:
768:
765:
762:
760:
757:
755:
752:
751:
743:
740:
738:
735:
733:
730:
728:
725:
722:
719:
717:
714:
713:
712:
707:United States
704:
701:
687:
684:that exploit
683:
679:
676:
672:
669:
666:
665:
660:
657:
656:
655:
644:
640:
636:
633:
630:
627:
624:
620:
617:
613:
609:
605:
601:
597:
594:
590:
586:
585:
584:
576:
574:
569:
565:
563:
559:
554:
550:
546:
542:
537:
535:
531:
527:
516:
511:
509:
504:
502:
497:
496:
494:
493:
486:
485:
481:
479:
478:
474:
472:
469:
467:
466:
462:
461:
455:
454:
447:
443:
440:
437:
434:
431:
428:
425:
422:
419:
416:
414:
411:
409:
406:
405:
402:
397:
396:
389:
386:
384:
381:
379:
376:
375:
372:
367:
366:
359:
356:
354:
351:
349:
346:
344:
341:
339:
336:
334:
331:
329:
326:
324:
321:
319:
316:
314:
311:
309:
306:
304:
301:
299:
296:
294:
291:
290:
287:
282:
281:
274:
271:
269:
266:
265:
262:
257:
256:
249:
248:Vulnerability
246:
244:
241:
239:
236:
234:
231:
229:
226:
225:
222:
221:Hacking tools
217:
216:
209:
208:Script kiddie
206:
204:
201:
199:
196:
195:
192:
187:
186:
179:
176:
174:
171:
169:
166:
164:
161:
159:
156:
154:
151:
149:
146:
145:
142:
137:
136:
127:
124:
122:
119:
117:
114:
113:
112:
108:
106:
105:Maker culture
103:
101:
98:
96:
93:
91:
90:
86:
84:
81:
80:
77:
73:
68:
67:
60:
57:
55:
52:
50:
47:
45:
42:
41:
38:
33:
32:
29:
26:
25:
21:
20:
1779:
1749:Trojan horse
1729:Clickjacking
1575:Data masking
1253:
1134:Cyberwarfare
1045:
1035:
1025:
987:
982:
968:(1): 28–38.
965:
961:
955:
934:
926:
922:
904:. Retrieved
900:
890:
881:
872:
860:. Retrieved
850:
844:(11): 28–33.
841:
837:
831:
812:
806:
710:
696:
662:
653:
582:
573:David Jevans
570:
566:
558:confidential
538:
525:
524:
482:
475:
463:
458:Publications
303:Trojan horse
268:HackThisSite
197:
87:
1881:Macro virus
1866:iOS malware
1840:Web threats
1800:Infostealer
1717:Concealment
1515:Misuse case
1349:Infostealer
1324:Email fraud
1289:Data breach
1124:Cybergeddon
862:18 December
612:address bar
608:domain name
600:web browser
591:to collect
471:Hacker News
358:Infostealer
141:Conferences
95:Hackerspace
2009:Cybercrime
1998:Categories
1905:Protection
1820:Ransomware
1785:Fleeceware
1580:Encryption
1456:Web shells
1396:Ransomware
1344:Hacktivism
1107:Cybercrime
906:2020-12-05
901:CSO Online
798:References
643:ransomware
534:cybercrime
328:Logic bomb
323:Ransomware
100:Hacktivism
1830:Scareware
1780:Crimeware
1411:Shellcode
1406:Scareware
1254:Crimeware
1214:Backdoors
673:sent via
623:passwords
526:Crimeware
446:Blue team
438:(defunct)
432:(defunct)
426:(defunct)
420:(defunct)
408:Anonymous
348:Web shell
198:Crimeware
178:Summercon
126:White hat
116:Black hat
109:Types of
83:Hackathon
44:Phreaking
1978:Honeypot
1937:Firewall
1724:Backdoor
1585:Firewall
1490:Defenses
1416:Spamming
1401:Rootkits
1374:Phishing
1334:Exploits
1007:Archived
986:CSI/FBI
944:Archived
781:Phishing
748:See also
693:Concerns
682:exploits
616:pharming
579:Examples
551:through
442:Red team
298:Backdoor
173:ShmooCon
121:Grey hat
1835:Spyware
1744:Rootkit
1673:Malware
1426:Spyware
1369:Payload
1364:Malware
1304:Viruses
1284:Botnets
1191:Threats
925:, Vol.
786:Spyware
754:Malware
723:(HIPAA)
680:Remote
639:decrypt
635:Encrypt
610:in the
541:spyware
530:malware
430:LulzSec
318:Spyware
293:Rootkit
286:Malware
238:Payload
228:Exploit
158:DEF CON
111:hackers
37:History
1810:Malbot
1775:Botnet
1770:Adware
1675:topics
1620:(SIEM)
1597:(HIDS)
1481:Zombie
1218:Bombs
1199:Adware
990:, p.15
819:
621:Steal
545:adware
484:Phrack
401:Groups
333:Botnet
273:Zone-H
1466:Worms
1461:Wiper
1379:Voice
1227:Logic
700:theft
602:to a
308:Virus
76:ethic
1232:Time
1222:Fork
864:2023
817:ISBN
675:SMTP
641:it (
543:and
343:HIDS
313:Worm
74:and
1237:Zip
1044:, (
1034:, (
970:doi
880:",
353:RCE
2000::
964:.
942:"
927:IX
915:^
899:.
840:.
645:).
536:.
444:/
1665:e
1658:t
1651:v
1075:e
1068:t
1061:v
1024:(
976:.
972::
966:6
938:"
909:.
876:"
866:.
842:4
825:.
618:.
514:e
507:t
500:v
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.