网路犯罪案例Cyber crime Reconnaissance Case_第1页
网路犯罪案例Cyber crime Reconnaissance Case_第2页
网路犯罪案例Cyber crime Reconnaissance Case_第3页
网路犯罪案例Cyber crime Reconnaissance Case_第4页
网路犯罪案例Cyber crime Reconnaissance Case_第5页
已阅读5页,还剩22页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

網路犯罪案例

Cybercrime

ReconnaissanceCase

DecisionGroup/CEO張侃CasperKanChang1網際網路犯罪主要可分為二大類

InternetcrimeisdividedintotwomajorcategoriesNetworkPacketReconstruction可還原網路封包AnalysisNon-ReconstructionPacket不可還的原網路封包以網路作為犯罪之客體TraditionalcrimesconductedthroughtheInternet.Ex:Creditcardfraud,Identitytheft,childpornography,indecentchat-roombehavior,software&mediapiracy利用網路傳遞色情資訊,從事賭博行為,侵害著作權或商標權,販賣違禁物品以網路作為犯罪之場所AnycriminalactsdealingwithcomputersandnetworksEx:ReleaseofViruses&Worms,Invasionofprivacy,Cyber-spying,Hacking&Cyberwarfare散播病毐影響他人正常使用電腦網路,或取得、刪除或變更他人的電腦資料或紀錄2常見網路詐騙犯罪型態及手法1

CommonInternetfraudbehaviorpatternsandpractices1行為態樣Behavior-state-like具體手法Specificpractices

A.網路購物詐欺OnlineShoppingFraud歹徒在網路上刊出非常低廉的商品誘使民眾匯款,再以劣品充數,交易完成後即避不見面。GangsterspublishedontheInternetatverylowtransferofgoodstotrickpeopleintothem,andthenchargethenumberofbads,aftercompletionofthetransactionwouldnotevenmeet.B.網路交友詐欺InternetFriend-ShipFraud女性歹徒利用網路聊天室認識多名男性網友,假冒身份如偽稱某知名大學研究生、課餘兼職拍攝廣告等,並將電視廣告模特兒照片寄給對方,最後假藉理由向男性網友借錢,款項到手後不知去向。FemalecriminalsusetheInternetchatroomoddmennetizens,fakeidentity,saidawell-knownuniversitiessuchasthepseudo-graduatestudents,after-schoolpart-timeshootingadvertising,fashionpicturesandtelevisioncommercialstosendeachother,finallyborrowedmoneyundertheguiseofreasontomen,Afterthehandthemoneydisappeared.3

常見網路詐騙犯罪型態及手法2

CommonInternetfraudbehaviorpatternsandpractices2行為態樣Behavior-state-like具體手法Specificpractices

C.網路虛設行號詐欺Dummycorporatefraud於網路上虛設高科技公司,以低價販賣高科技新產品,並在網站上展示MP3隨身聽等產品,該公司及網站俟收到網友所寄購買產品之款項後,公司便人去樓空,網站亦隨之關閉。Fictitioushigh-techcompaniesontheweb,tolow-costsaleofhigh-technewproducts,AnditsWebsitetodisplayproductssuchasMP3players,thecompanyandWebsiteUseruponreceiptofpaymentbytheSendtopurchaseproducts,thecompanywillbeempty,thewebsitehasalsocomeclose.D.網路假貨騙售詐欺Fraudulentsaleoffakecheat不法之徒常在網站、跳蚤市場上張貼販賣便宜的電腦燒錄器、行動電話等二手貨或大補帖等物品,且通常以貨到收款方式交易,被害人收到的物品常是有瑕疵或不堪使用的貨品或空白或已損壞的光碟片。Criminalsoftenonthesite,postedonafleamarketsellingcheapcomputerburner,Mobilephonesandothersecond-handgoods,orpiratedsoftwareandotheritems,andusuallytobepaidgoodstransactions,Ofgoodsreceivedbythevictimisoftendefectiveorunusablegoodsorblankordamageddiscs.4

常見網路詐騙犯罪型態及手法3

CommonInternetfraudbehaviorpatternsandpractices3行為態樣Behavior-state-like具體手法Specificpractices

E.網路銀行轉帳詐欺

Internetbanktransferfraud歹徒在報紙刊登廣告或散發傳單,宣稱可幫助民眾貸款、加盟、購買法拍物等,要求被害人先行至其指定銀行開戶,存入相當之權利金或保證金,並設定電話語音約定轉帳帳戶(網路銀行服務及語音查詢帳戶餘額),然後歹徒再要求被害人提供語音查詢餘額密碼及身分證件、地址等相關資料以便確認,利用電話語音轉帳功能(網路電子交易)將被害人之存款轉帳領走。Advertisingordistributingleaflets,claimingtohelppeopleloans,torequirethevictimpriortotheirdesignatedbankaccounts,rightstopaymentordepositaconsiderablemargin,theInternetelectronictransactionswillbethevictimofdeposittransfersledaway.F.網路信用卡詐欺Internetcreditcardfraud利用信用卡公司在網路上登載檢測偽卡程式,輸入一組正確信用卡卡號,程式卡產生數千至數萬個信用卡卡號,歹徒再利用所產生之卡號非法上網購物消費。TheuseofcreditcardcompaniespostedontheInternettestWeikaprogram,enteracreditcardnumbercorrectly,theprogramgeneratedseveralthousandtotensofthousandsofcardcreditcardnumbers,criminalsre-usecardnumbersgeneratedbytheillegalonlineshoppingandspending.5

常見網路詐騙犯罪型態及手法4

CommonInternetfraudbehaviorpatternsandpractices4行為態樣Behavior-state-like具體手法Specificpractices

G.冒牌銀行網路詐欺CounterfeitInternetbankingfraud拷貝網路銀行網站的網頁,假冒該銀行之名提供「儲蓄存款」、功能,讓使用者誤上冒牌的網路銀行,洩漏個人身份證件或銀行帳號及密碼等重要資料,再進行盜領。CopiesofInternetBankingsite'spages,counterfeitingthenameofthebanktoprovidesavingsfeature,allowinguserstoerroronthefakeInternetbanking,resultinginleakageofpersonalidentitydocumentsorbankaccountnumbersandpasswordsandotherimportantinformation,afurthertypeofcrime.H.網路金光黨詐欺InternetConmanfraud網路上以「大家來賺錢,這是真的,不是騙人的」標題,在討論群組張貼郵遞名單信件,信中列有五人姓名及地址,指示網友寄給名單上五人各一百元。OntheInternetfor"everyonetomakemoney,thisistrue,isnotdeceptive,"thetitleinthediscussiongroupmailinglistpostingtheletter,theletterlistedthenamesandaddressesoffivepersons,instructionssenttothelistofUserandoneeachinfivepeoplehundreddollars.6

常見網路詐騙犯罪型態及手法5

CommonInternetfraudbehaviorpatternsandpractices5行為態樣Behavior-state-like具體手法Specificpractices

I.信用卡詐欺CreditCardFraud被害人利用信用卡在電腦網路上購物消費,致信用卡卡號遭到網路駭客入侵攔截,繼而被冒用盜刷。Victimsusingtheircreditcardsonyourcomputeronlineshoppingandspending,creditcardnumberhasbeencausedbyinternethackerstointerceptandthenbeingfalselyfraudulent.

J.金融卡匯款方式詐欺歹徒利用網路,以超低價價格販售賣相良好之商品,要求以金融卡轉帳方式購買,,按照其指示操作後,轉帳成功的金額往往數十倍於原來之費用。CriminalsusetheInternettoultra-lowpricestosellmerchandisewillsellwelltorequiretransferofthefinancialcardsarepurchased,inaccordancewithitsinstructions,afterthesuccessfultransferpaymentsareoftendozensoftimesintheoriginalexpenses.7網路購物詐欺手法及案例1-1

OnlineShoppingFraud8網路購物詐欺手法及案例1-2

OnlineShoppingFraud假借東森購物免付費顯示電話、雅虎奇摩購物等方式通知民眾,稱原承辦人誤將退款設為分期扣款或被害人先前交易錯誤,誤將退款設為分期扣款等將使權利受損,即向民眾要求需至提款機操作變更,解除分期付款扣款;俟民眾受騙上當後,再以「金融監督管理委員會」名義表示帳戶已遭歹徒利用洗錢,需匯「金融平安帳戶」,以免遭凍結帳戶,誘騙被害人將存款解除,改存入前述詐騙之「金融平安帳戶」。Swindle,saidEasternShoppingandYahooAuctionsPaymentErrorInformationtothepublic,claimingarefundoftheoriginalcontractorsmistakenlysettheprevioustradinginstallmentdeductionsorvictimerror,mistakearefundwillsetphasessuchastherighttochargedamaged,ittellsthepeopletotheATMwasrequiredtooperatechanges,liftinghirecharge;assoonasthepublicdeceivedagainafterthe"FinancialSupervisoryCommission,"saidtheaccounthasbeencriminaltousethenameofmoneylaundering,mustsink"financialsecurityaccount"toavoidbeingthefreezingofaccounts,luredvictimsofthedepositremoved,changedintotheaforementionedfraudof"financialsecurityaccounts."9B.網路詐欺案例1-1

InternetfraudCase一名馬來西亞籍的華裔賴姓女子,涉嫌與奈及利亞籍男友利用網路詐騙台灣女子。刑事局國際科與馬國警方合作,日前逮捕賴姓女子並追緝共犯AMalaysianwomanofChineseoriginMs.LaiinconnectionwithaNigerianboyfriend,usedtheInternettodefraudTaiwanesewomanCIBInternationalCouncilofScientificCooperationwithMalaysiaarrestedbythepoliceandlookingforanaccompliceMs.Lai10B.網路詐欺案例1-2

InternetfraudCase台北縣警方今年5月間接獲一名女子檢舉,指稱一名在英國倫敦工作的網友,聲稱寄送內有英鎊現金的包裹要給她,因未申報而遭馬國海關查扣,需付稅金後始得放行,請求女子將錢匯至馬國海關處。這名女子不疑有他,連續匯款兩次共計2358美元,但遲未收到包裹,始知受騙。TaipeiCountypolicereceivedanindirectMaythisyear,awomanaccused,AllegedthataworkofnetizensinLondon,claimingthattherearepoundsincashtosendparcelstogiveher,WhowerefailingtodeclaretheMalaysianCustomsandExciseDepartmentseized,payataxbeforeitmaybereleasedupontherequestwomanwillremitmoneytotheMalaysianCustomsandExciseDepartment.Thewomandidnotsuspectedhim,atotalof2358U.S.dollarstwoconsecutiveremittances,buthasnotreceivedthelatestpackage,Foundoutdeceived.11網路性侵案件!

Networkofsexualassaultcases!

07年網路性侵案件:一天1.5件。12-18歲少年占六成多。2021年06月10日蘋果日報台灣台北市Networkofsexualassaultcasesin2007:Dailyaverage1.5case.12-18year-oldsaccountedformorethan60%.

June10,2021AppleDailyTaipeiTaiwan12禽獸不如

Istrulypatheticandinferiortoanimals

台北市兩名一瘦一胖的嫌犯,去年七月起,涉嫌在網路上約女網友開轟趴,等女網友赴約後將對方帶到汽車旅館,誘騙對方進浴室洗澡,再要求發生性關係,女網友不願配合,即遭掌摑強姦得逞,警方昨逮捕兩嫌,發現受害多達十多人。Taipeitwosuspectsathinonefat,beginJuly2021,SuspectedontheInternettoinviteFemalenetfriendtoparticipateinparty,FemalenetfriendtomeetthiswomanaftertheotherintotheMotel,Tricktheotherintothebathroomtakingabath,andthenrequireasexualrelationship,Thevictimisunwillingtocooperate,thatis,tosucceedbyslappingrape,thepoliceyesterdayarrestedtwosuspectedandfoundthatasmanyasadozenpeopleinjured.被害人不甘受辱向警方報案,警方根據網路位址清查,並前往汽車旅館調閱車號,昨循線逮捕兩嫌。警方追查發現,兩嫌去年七月開始犯案,每次都由葉嫌以「小豬」、「出來玩」等暱稱,在奇摩即時通及豆豆聊天室等網站向女網友搭訕,葉嫌坦承犯案十多起、周嫌則供稱五、六起,警方正追查其他共犯。Humiliationofvictimsunwillingtoreporttothepolice,thepoliceinventoryofnetworkaddressandwenttothemotelaccesstonumber,yesterdayarrestedtwosuspectedthroughtheline.Thepolicetracedthetwobegantocommitcrimestoo2021JulyforeachpigbyYetootocomeouttoplayothernickname,theyahoomessangeandPeaschatroomsandotherwebsitestoNvwangYoustrikeup,leavesfrommorethan10suspectedoffenderadmits,Zhousaidthesuspectareforfiveorsix,thepolicearetracingtheotheraccomplices.13駭客蘇柏榕替黑幫盜資料

HackerSuPo-jungworkfortheunderworldtostealdata

中時電子報/蔡旻岳/台北報導2007/09/22ChinaTimes/Taipei/ChoiMin-Yue刑事局科技犯罪防制中心查出,在網路上暱稱「odin」的林姓高二生、以及暱稱「cb」的蘇柏榕兩人,係以學術網路為骨幹,將跳板主機隱藏於台灣學術網路內,並利用木馬程式、網站漏洞侵入各大知名網站非法取得資料後,存放在國外網站主機,用以規避追查。其中xx電信公司用戶帳戶及密碼有兩百四十多萬筆遭竊,局部網站則連程式都被搬走。CIBCrimePreventionCenterforScienceandTechnologyhavefoundthattheInternetnickname"odin"Lin,high-schoolsophomore,andthenickname"cb"twoSuPo-jung,anacademicdepartmentasthebackbonenetworkwillbeaspringboardforhosthiddeninTaiwanAcademicNetworkinside,andtheuseofTrojanhorseprograms,Websitevulnerabilitieswell-knownWebsiteillegallyobtainedlargeintrusiveinformation,storedinaforeignwebsitehost,tocircumventthetracing.Xxtelecomcompaniesinwhichtheuseraccountandpasswordwithmorethan2.4millionpensstolen,somewebsiteshaveeventheprogramsareremoved.HackerSuPo-jung

14網路理財廣告詐貸銀行案-1

Internetadvertisingbankloanfraudcase

高雄市刑警大隊2021年5月接獲多家銀行報案,指稱遭人持偽造文件向銀行申辦信用貸款,造成銀行遭詐貸的鉅額損失。案經該大隊15分隊深入調查發現,以洪○○、方○○等人共同基於牟取不法利益之犯意聯絡及行為分擔所籌組之詐欺集團,用國內入口網站之免費網路空間張貼或貼紙廣告刊載『理財達人專辦信用貸款』、『小額信用貸款』訊息等方式,招攬急需資金週轉之人頭客戶,由該集團成員偽變造財稅、薪資等證明文件,美化貸款人之財力,並教唆指導人頭客戶持偽造文件向銀行申辦信用貸款,使金融機構陷於錯誤而核准貸款,該集團則向人頭客戶收取高額手續費牟取暴利15網路理財廣告詐貸銀行案-2

Internetadvertisingbankloanfraudcase

16網際網路犯罪偵察要領

CyberCrimeInvestigationEssentials組成專案小組Anadhocgroup依案情內容申請技術支援 Fortechnicalsupportinaccordancewiththecontentsofthecase取得報案詳細資料 Toobtaindetailedinformationonreported17網際網路犯罪情資蒐集

Cybercriminalintelligencecollection收集電腦稽核紀錄:IP,帳號,時間等客戶登錄資料:帳號使用人,姓名,地址,電話等犯罪事實Collectionofcomputerauditrecords:Log,IP,Useraccount,timeCustomerLogininformation:AccountnameandaddressoftelephoneusersCorpusdelicti18網際網路犯罪證據蒐集

Cybercrime,gatheringofevidence由被害人及嫌犯電腦上取得資料,Log,檔案,紀錄...等由業者提供的資料及紀錄...等網路監聽由被害人提供網路封包還原Bythevictimsandsuspectstoobtaininformationonthecomputer,Log,files,records,etc....Informationprovidedbytheindustry,andrecordsandsoon...InterceptionFromthevictimstorestorethenetworkpacket19網際網路犯罪鑑識工具種類

CybercrimeforensicstoolsWired,HTTPS/SSLandVOIPWireless“Catch-it-as-you-can”forensicssystems

封包側錄還原鑑識設備Off-Linepacketreconstructionsoftware“Stop,lookandlisten”Forensicssoftware離線封包鑑識還原軟體Forensicstools鑑識軟體20鑑識工具使用ForensicsToolUse數位證據的鑑識與採集無法透過人類的視覺直接辨識出來,如果沒有適當的工具或軟體也是無法解析,運用適當的工具或軟體採集與辨識數位證據,也是偵辦電腦網路犯罪案件必備的條件Kam-digitalintellectualandcollectionofevidencecannotbehumansthroughdirectidentifiedintellectualvisionoutoffuture,withouttherighttoolsorsoftwareareunabletoresolve,usingtherighttoolsorsoftwareacquisitionandidentifiedintellectualdigitalevidence,butalsodiligentinInternetHighwaynecessaryconditionsforcriminalcasesForensicstools鑑識軟體由被害人及嫌犯電腦上取得資料,Log,檔案,紀錄...等Collectionofcomputerauditrecords:Log,IP,Useraccount,time……etc21網路鑑識工具使用CyberForensicsToolUseWired,HTTPS/SSLandVOIPWireless“Catch-it-as-you-can”forensicssystems

封包側錄還原鑑識設備網路監聽InternetInterception還原已錄製完成網路封包Reconstruction,ThecompletionofnetworkpacketshavebeenrecordedOff-Linepacketreconstructionsoftware“Stop,lookandlisten”Forensicssoftware離線封包鑑識還原軟體22網路封包鑑識分析分類

NetworkpacketforensicsanalysiscategoriesAnalysisNon-ReconstructionPacket不可還的原網路封包Viruses&Worms,Hacking&Trojans......病毐駭客木馬程式……NetworkPacketReconstruction可還原網路封包Email,WebMail,IM,FTP,P2P,VoIP,VideoStreaming,HTTP,OnlineGames,Telnet電子郵件,網頁郵件,FTP,P2P,VoIP,影音串流,網頁瀏覽,線上遊戲,,Telnet1.2.23提供全系列網路鑑識產品

CompleteSolutionsforCyberForensicsWiredpacketreconstruction.Wireless(802.11a/b/g/n)packetreconstruction.HTTPS/SSLinterceptor..VOIPpacketreconstruction.Off-linepacketreconstructionsoftwareNetworkpacketforensicsanalysistraining24網際網路封包鑑識分析教育訓練課程

NetworkPacketForensicsAnalysisTrainingTheknowledgeofnetworkpacketanalysisisimportantforForensicsInvestigatorandLawfulEnforcementOfficertocarryouttheirdailyduty.NetworkPacketForensicsAnalysisTraining(NPFAT)providesusefulandsufficientknowledgerequiredtoanalysenetworkpackets.TraineewillbeabletoidentifydifferentpackettypesaccordingtodifferentInternetProtocolssuchaspacketscontainingaspecificEmail(POP3,SMTPandIMAP),WebMail(YahooMail,Gmail,Hotmail),InstantMessaging(WindowsLiveMessenger,Yahoo,ICQetc.),FTP,Telnet,HTTPandVOIP.Forensicsinvestigationisalsoscienceandart.網際網路封包鑑識分析教育訓練課程〔NPFAT〕提供所需知識來分析網際網路封包。令學員將能夠識別不同類型的網路封包根據不同的Internet協議,如電子郵件〔POP3,SMTP和IMAP〕,網路郵件〔雅虎郵件,Gmail,Hotmail等〕,即時通〔如WindowsLiveMessenger,雅虎,ICQ等〕,FTP,遠程登錄,網頁瀏覽和VOIP。鑑識取證調查還技術兼具科學和藝術素養之訓練課程。PhillipARusso

Ing.GustavoPresman

FrankieChanKokLiang25實績ReferencesiteinTaiwanCriminalInvestigationBureauTheInvestigationBureauoftheMinistryofJustice國家安全局NationalSecurityBureau國防部MinistryofNationalDefense,R.O.C憲兵司令部MilitaryPolice,R.O.C海岸巡防署CoastGuardAdministration國防大學NationalDefenseUniversity中央警察大學CentralPoliceUniversity26owDLS#)5cksjqyGNV$07fmuCJRY(3biqxFNU$+7emtBIQY*3aipxEMU!+6eltAIPX*2ahpwELT#-6dlsAHPW&29howDLS#)5dkszHOW%18govDKSZ)4cjrzGOV%08fnvCKRZ(4bjqyGNV$07fmuBJRY(3biqxFNU$+7emtBIQY*3aipxEMT!+6eltAIPX*2ahpwELT#-ovDKSZ)5ckrzGOV%18gnvCKRZ(4cjryGNV$07fnuCJRY(3bjqyFNU$+7emuBJQY*3aipxFMU!+6eltBIQX*2ahpwEMT!-6dlsAHPX&29howDLS#-5dkszHOW&19govDKSZ)5ckrzGOV%08gnvCKRZ(4cjryGNV$07fnuCJRY(3biqyFNU$+7emuBJQY*3aipxFMDLT#-5dkszHOW&19govDKS#)5ckrzGOV%18gnvCKRZ(4cjryGNV$08fnuCJRY(3bjqyFNU$+7emuBJQY*3aiqxFMU!+6eltBIQX*2ahpwEMT!-6dlsAHPX&29howDLT#-5dkszHOW&19govDKSZ)5ckrzGOV%18gnvCKRZ(4cjryGNV$07fnuCJRY(3bjqyFNU$+7emMT!-6dltAIPX&29hpwELT#-5dksAHPW&19govDLS#)5ckrzHOW%18gnvCKSZ)4cjryGNV%08fnuCJRZ(4bjqyFNU$07fmuBJQY*3biqxFMU!+6emtBIQX*2aipxEMT!-6dltAIPX&29howELT#-5dksAHPW&19govDLS#)5ckrzGOW%18gnvCKSZ)4cjryGNFMU!+7emtBIQX*2aipxEMT!-6eltAIPX&29hpwELT#-5dksAHPW&19gowDLS#)5ckrzHOW%18gnvCKSZ)4cjryGOV%08fnuCJRZ(4bjqyFNU$07fmuBJQY*3biqxFMU!+7emtBIQX*2aipxEMT!-6dltAIPX&29hpwELT#-5dksAHPW&19zGOV%08fnvCKRZ(4bjqyGNV$07fmuBJRY(3biqxFNU$+7emtBIQY*3aipxEMT!+6eltAIPX*2ahpwELT#-6dlsAHPW&19howDLS#)5dkszHOW%18govDKSZ)4cjrzGOV%08fnuCKRZ(4bjqyGNV$07fmuBJRY(3biqxFMU$+7emtlsAHPW&29howDLS#)5dkszHOW%19govDKSZ)4ckrzGOV%08fnvCKRZ(4bjqyGNV$07fmuCJRY(3biqxFNU$+7emtBIQY*3aipxEMU!+6eltAIPX*2ahpwELT#-6dlsAHPW&29howDLS#)5dkszHOW%18govDKSZ)4cjrzGOV%U$+7emtBJQY*3aipxEMU!+6eltAIQX*2ahpwELT!-6dlsAHPW&29howDLS#-5dkszHOW%19govDKSZ)4ckrzGOV%08fnvCKRZ(4bjryGNV$07fmuCJRY(3biqxFNU$+7emtBJQY*3aipxEMU!+6eltAIPX*2ahpwW&19govDKS#)5ckrzGOW%18gnvCKRZ)4cjryGNV$08fnuCJRY(3bjqyFNU$+7fmuBJQY*3aiqxFMU!+6eltBIQX*2ahpxEMT!-6dlsAIPX&29howDLT#-5dkszHPW&19govDKS#)5ckrzGOV%18gnvCKRZ(4cjryGNV$U!+6emtBIQX*2ahpxEMT!-6dltAIPX&29howELT#-5dkszHPW&19govDLS#)5ckrzGOW%18gnvCKRZ)4cjryGNV$08fnuCJRY(4bjqyFNU$+7fmuBJQY*3aiqxFMU!+6emtBIQX*2ahpxEMT!-6dlsAIPX&29howELT#-5vDKSZ)4cjryGOV%08fnuCKRZ(4bjqyFNV$07fmuBJQY(3biqxFMU$+7emtBIQX*3aipxEMT!-6eltAIPX&2ahbiqxFMU!+6emtBIQX*2ahpxEMT!-6dlsAIPX&29howELT#-5dkszHPW&19govDKS#)5ckrzGOW%18gnvCKRZ)4cjryGNV$08fnuCJRY(4bjqyFNU$+7fmuBJQY*3aibjryGNV$07fnuCJRY(3biqyFNU$+7emtBJQY*3aipxEMU!+6eltAIQX*2ahpwELT!-6dlsAHPW&29howDLS#-5dkszHOW%19govDKSZ)4ckrzGOV%08fnvC&29howDLS#)5dkszHOW%18govDKSZ)4ckrzGOV%08fnvCKRZ(4bjqyGNV$07fmuCJRY(3biqxFNU$+7emtBIQY*3aipxEMU!+6eltAIPX*2ah9govFMU!+7emtBIQX*2aipxEMT!-6eltAIPX&29hpwELT#-5dksAHPW&19gowDLS#)5ckrzHOW%18gnvCKSZ)4cjryGOV%08fnuCJRZQX*3aipxEOV%18gnvCKRZ(4cjryGNV$08fnuCJRY(3bjqyFNU$+7emuBJQY*3aiqxFMU!+6eltBIQX*2ahpwEMT!-6dlsAIPX&29hHOW%18gnvDKltAIPX*2ahpwELT#-6dlsAHPW&29howDLS#)5dkszHOW%18govDKSZ)4ckrzGOVbjqyFNU$+7fmuBJQY*3aiqxFMU!+6eltBIQX*4cjrzGOV%08fnvCKRZ(4bjqyGNV$07fmuBJRY(3biqxFMU$+7e6dlsAHPW&29howDLS#)5dkszHOW%19govDKSZ)4ckrzGOV*2aipxEMT!-6dltAIPX&29hpwELT#-5dksAHPW&1908fnuCJRZ(4bjqyFNV$07fmuBJQY(3biqxFMU!+7emtBIQX*3aipzGOV%18gnvCKRZ(4cjryGNV$07fFMU!+7emtBIQX*2aipxEMT!-6eltAIPX&29hpwELT#-5dksAHPW&19govDLS#)5-6dlsAIPX&29howDLT#-5dkszHOW&19govDKS#)5ckrzGOV%18gnvCKRZ(4cjryGNV$08fnuCJRY(3bjqyFNUOV%08fnvCKRZ(4bjqyGNV$07fmuCJRY(3biqxFNU$+7emtBIQY*3aipxEMU!+6eltAIPX*2ahpwELT#-6dlsAtBIQX*3aipxEMT!-6eltAIPX&29hpwELT#-5dksAHPW&19gowDLS#)5ckrzHOW%18gnvCKSZ)4cjryGOV%0sAHPW&19govDLS#)5ckrzHOW

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论