AG¹«Ë¾ÍþвÇ鱨Ô±¨£¨2020Äê3Ô£©
2020-04-08
Ò»¡¢Îó²îÌ¬ÊÆ
2020Äê03ÔÂAG¹«Ë¾¿Æ¼¼Çå¾²Îó²î¿â¹²ÊÕ¼215Îó²î, ÆäÖиßΣÎó²î96¸ö£¬Î¢Èí¸ßΣÎó²î27¸ö¡£

* Êý¾ÝȪԴ£ºAG¹«Ë¾¿Æ¼¼ÍþвÇ鱨ÖÐÐÄ£¬±¾±íÊý¾Ý×èÖ¹µ½2020.03.30
×¢£ºAG¹«Ë¾¿Æ¼¼Îó²î¿â°üÀ¨Ó¦ÓóÌÐòÎó²î¡¢Çå¾²²úÆ·Îó²î¡¢²Ù×÷ϵͳÎó²î¡¢Êý¾Ý¿âÎó²î¡¢ÍøÂç×°±¸Îó²îµÈ£»
¶þ¡¢ÍþвÊÂÎñ
- APT41ʹÓöà¸öÎó²îÌᳫȫÇòÈëÇÖÔ˶¯
¡¾±êÇ©¡¿APT41
¡¾Õë¶ÔÐÐÒµ¡¿½ðÈÚ¡¢Õþ¸®¡¢Ò½ÁÆ¡¢ÔËÊä¡¢¹ú·À¡¢ÖÆÔìÒµ¡¢·ÇÓªÀû×éÖ¯¡¢Ê¯ÓͺÍ×ÔÈ»Æø¡¢ÔËÓªÉÌ¡¢¸ßУºÍ¿ÆÑлú¹¹¡¢ÐÞ½¨¡¢Ã½Ìå
¡¾Ê±¼ä¡¿2020-03-25
¡¾¼ò½é¡¿½üÆÚAPT41×éÖ¯ÊÔͼʹÓÃCitrix NetScaler/ADC¡¢Cisco·ÓÉÆ÷ºÍZoho ManageEngine Desktop Central×°±¸ÖеÄ©Õë¶ÔÈ«Çò¶à¸öÐÐÒµÌᳫÈëÇÖÔ˶¯¡£Õë¶ÔµÄ¹ú¼Ò°üÀ¨¼ÓÄô󡢰ĴóÀûÑÇ¡¢·¨¹ú¡¢·ÒÀ¼¡¢ÈðÊ¿¡¢Òâ´óÀû¡¢ÈÕ±¾¡¢ÐÂ¼ÓÆÂ¡¢Ó¢¹úºÍÃÀ¹úµÈ£¬ÊÜÓ°ÏìµÄÐÐÒµ°üÀ¨½ðÈÚ¡¢Õþ¸®¡¢ÔËÓªÉÌ¡¢ÖÆÔìÒµ¡¢Ò½ÁÆ¡¢¸ß¿Æ¼¼¡¢ÔËÊäÒµ¡¢¸ßУºÍ¿ÆÑлú¹¹µÈ¡£
¡¾¹ØÁªµÄ¹¥»÷×éÖ¯¡¿APT41ÊÇÒ»¸öÓëÖйúÓйصÄÍþв×éÖ¯£¬ÖÁÉÙ´Ó2012Äê»îÔ¾ÖÁ½ñ£¬Ö÷ÒªÓªÒµ°üÀ¨¹ú¼ÒÔÞÖúµÄÍøÂçÌØ¹¤Ô˶¯ÒÔ¼°³öÓÚ¾¼ÃÄîÍ·µÄÈëÇÖÔ˶¯£¬¸Ã×éÖ¯¹¥»÷Ó°Ïì¶à¸öÐÐÒµ£¬°üÀ¨Ò½ÁƱ£½¡¡¢µçÐÅ¡¢½ðÈڿƼ¼¡¢Ó°Ï·ºÍýÌå¡¢ÐéÄâÇ®±ÒÐÐÒµµÈ¡£
¡¾¹ØÁªµÄ¹¥»÷¹¤¾ß¡¿Cobalt StrikeÊÇÒ»¸öÉÌÒµ»¯ÉøÍ¸²âÊÔ¹¤¾ß£¬¿ÉÓÃshell»á¼ûÊÜѬȾµÄϵͳ¡£
¡¾²Î¿¼Á´½Ó¡¿https://www.fireeye.com/blog/threat-research/2020/03/apt41-initiates-global-intrusion-campaign-using-multiple-exploits.html
¡¾·À»¤²½·¥¡¿AG¹«Ë¾ÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÌáÈ¡10ÌõIOC£¬ÆäÖаüÀ¨1¸öIP¡¢4¸öÑù±¾ºÍ5¸öÎó²î£»APT41×éÖ¯Ïà¹ØÊÂÎñ2¼þ£¬¸Ã¹¥»÷×éÖ¯ÓÐ27¸ö¹ØÁªÑù±¾ºÍ26¹ØÁªÓòÃû£»AG¹«Ë¾Ç徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£
- Kwampirs¶ñÒâÈí¼þÕë¶Ô¹©Ó¦Á´ÌṩÉÌ
¡¾±êÇ©¡¿Kwampirs¡¢Orangeworm
¡¾Õë¶ÔÐÐÒµ¡¿Èí¼þ¹©Ó¦Á´
¡¾Ê±¼ä¡¿2020-03-25
¡¾¼ò½é¡¿½üÆÚÈí¼þ¹©Ó¦Á´ÌṩÉ̳ÉΪKwampirs¶ñÒâÈí¼þµÄ¹¥»÷Ä¿µÄ£¬¹¥»÷Ô˶¯ÖÐÿ¸öKwampirsÑù±¾¶¼´øÓÐ200¸öURLµÄÓ²±àÂëÁÐ±í£¬²¢½«ÊµÑ鰴˳Ðò»á¼û½«µÚÒ»¸öÔ˶¯URL×÷ΪC2·þÎñÆ÷¡£Kwampirs¶ñÒâÈí¼þÊÇOrangewormºÚ¿Í×éÖ¯µÄ¶¨ÖƺóÃųÌÐò£¬Ôø±»¸Ã×éÖ¯ÓÃÓÚÕë¶ÔÅ·ÖÞ¡¢ÑÇÖÞºÍÃÀ¹úµÄÒ½ÁƱ£½¡ÀàÆóÒµ¡£¡¾¹ØÁªµÄ¹¥»÷×éÖ¯¡¿OrangewormÊÇÒ»¸öÍþв×éÖ¯£¬Ö÷ÒªÕë¶ÔÃÀ¹úºÍÅ·ÖÞ¡¢ÑÇÖ޵Ĺú¼Ò£¬Ó°ÏìµÄÐÐÒµ°üÀ¨Ò½ÁƱ£½¡¡¢ÖÆÔìÒµ¡¢Å©Òµ¡¢ÐÅÏ¢ÊÖÒÕºÍÔËÊäÒµ¡£
¡¾²Î¿¼Á´½Ó¡¿https://blog.reversinglabs.com/blog/unpacking-kwampirs-rat
¡¾·À»¤²½·¥¡¿AG¹«Ë¾ÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÓÐ719ÌõÏà¹ØIOC¡£Orangeworm×éÖ¯Ïà¹ØÊÂÎñ2¼þ£¬¸Ã¹¥»÷×éÖ¯ÓÐ751¸ö¹ØÁªÑù±¾ºÍ10¸ö¹ØÁªIP£»AG¹«Ë¾Ç徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£
- APT27ʹÓùÚ×´²¡¶¾Ö÷ÌâÓʼþÈö²¥PlugX
¡¾±êÇ©¡¿Nanocore RAT¡¢Parallax RAT¡¢Emotet
¡¾Ê±¼ä¡¿2020-03-19
¡¾¼ò½é¡¿½üÆÚʹÓô¹ÂÚÓʼþÈö²¥PlugXµÄ¹¥»÷Ô˶¯±»·¢Ã÷£¬Ô˶¯ÒÔÐÂÐ͹Ú×´²¡¶¾ÎªÖ÷Ì⣬Óʼþ¸½¼þÊÇαÔìµÄPDFÎļþ£¬¾ßÓÐÒþ²ØµÄÀ©Õ¹ÃûºÍPDFͼ±ê£¬µ«ÏÖʵÊÇ.InkÎļþ£¬ÓÃÀ´·Ö·¢ºÍÖ´ÐжñÒâ¸ºÔØ£¬¸ÃÎļþÊÇPlugXºóÃÅ×°ÖóÌÐò£¬¿ÉÍøÂçÊܺ¦ÕßPCÃû³Æ¡¢Óû§Ãû¡¢IPλÖõÈÐÅÏ¢£¬²¢·¢¸øµ½Ö¸¶¨C2·þÎñÆ÷¡£´Ë´Î¶ñÒâ¹¥»÷Ô˶¯ÒÉËÆÓɹ¥»÷×éÖ¯APT27Ìᳫ¡£
¡¾¹ØÁªµÄ¹¥»÷×éÖ¯¡¿APT27£¬Ò²±»³ÆÎªThreat Group-3390¡¢BRONZE UNIONºÍEmissary PandaµÈ£¬ÊÇÒ»¸öÖÁÉÙ×Ô2010ÄêÒÔÀ´Ò»Ö±»îÔ¾µÄÍþв×éÖ¯£¬Õë¶Ôº½¿Õº½Ìì¡¢Õþ¸®¡¢¹ú·À¡¢ÊÖÒÕ¡¢ÄÜÔ´ºÍÖÆÔìÒµ¡£AG¹«Ë¾ÍþвÖÐÐĹØÓÚAPT27×éÖ¯ÓÐ4¼þ¹ØÁªÊÂÎñ£¬Ïà¹ØÁªIP27¸ö¡¢Ïà¹ØÁªÓòÃû16¸ö¡¢Ïà¹ØÁªÎļþ60¸ö¡£
¡¾¹ØÁªµÄ¹¥»÷¹¤¾ß¡¿PlugXÊÇʹÓÃÄ£¿é»¯²å¼þµÄÔ¶³Ì»á¼û¹¤¾ß£¨RAT£©£¬¾ßÓÐÎļþÉÏ´«¡¢ÏÂÔØºÍÐ޸ģ¬ÈÕÖ¾¼Í¼¡¢ÍøÂçÉãÏñÍ·¿ØÖƺÍÔ¶³ÌÔËÐÐShell»á¼ûµÈ¹¦Ð§¡£
¡¾²Î¿¼Á´½Ó¡¿https://marcoramilli.com/2020/03/19/is-apt27-abusing-covid-19-to-attack-people/
¡¾·À»¤²½·¥¡¿AG¹«Ë¾ÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÌáÈ¡µ½6ÌõÏà¹ØIOC¡£AG¹«Ë¾Ç徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£
- Operation Poisoned NewsÕë¶ÔÏã¸ÛiOSÓû§
¡¾±êÇ©¡¿lightSpy
¡¾Ê±¼ä¡¿2020-03-24
¡¾¼ò½é¡¿×î½ü·¢Ã÷µÄË®¿Ó¹¥»÷Õë¶ÔÏã¸ÛµÄiOSÓû§£¬¸ÃÔ˶¯Ê¹ÓÃÔÚ¶à¸öÂÛ̳ÉÏÐû²¼Á´½Ó£¬ÕâЩÁ´½ÓÊÇÖÖÖÖÐÂÎű¨µÀ£¬½«Óû§Ö¸µ¼µ½ÐÂÎÅÕ¾µãʱ£¬»¹Ê¹ÓÃÒþ²ØµÄiframe¡¢¼ÓÔØºÍÖ´ÐжñÒâ´úÂ룬¸Ã¶ñÒâ´úÂë°üÀ¨Õë¶ÔiOS 12.1ºÍ12.2Öб£´æµÄÎó²îµÄ¹¥»÷£¬Ê¹ÓÃÕâЩ°æ±¾iOS×°±¸µÄÓû§µ¥»÷¶ñÒâÁ´½Ó½«ÏÂÔØÒ»¸öеÄiOS¶ñÒâÈí¼þ±äÌålightSpy¡£lightSpyÊÇÒ»¸öÄ£¿é»¯ºóÃÅ£¬¹¥»÷Õß¿ÉÔ¶³ÌÖ´ÐÐshellÏÂÁî¡¢²Ù×÷ÊÜÓ°ÏìÉè±¹ØÁ¬ÄÎļþ²¢¼à¿ØÓû§Êý¾Ý£¬ÆäÖаüÀ¨ÅþÁ¬WiFiÀúÊ·¼Í¼¡¢ÁªÂçÈË¡¢GPS¶¨Î»¡¢Ó²¼þÐÅÏ¢¡¢iOSÔ¿³×´®¡¢Àúʷͨ»°¼Í¼¡¢SafariºÍChromeä¯ÀÀÆ÷ÀúÊ·¼Í¼¡¢¶ÌÐŵȡ£
¡¾¹ØÁªµÄ¹¥»÷¹¤¾ß¡¿launchctlÊÇÓÃÓÚ¼ÓÔØ»òÐ¶ÔØÊØ»¤³ÌÐò/ÊðÀíµÄ¹¤¾ß¡£
¡¾²Î¿¼Á´½Ó¡¿https://blog.trendmicro.com/trendlabs-security-intelligence/operation-poisoned-news-hong-kong-users-targeted-with-mobile-malware-via-local-news-links/
¡¾·À»¤²½·¥¡¿
AG¹«Ë¾ÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÌáÈ¡36ÌõÏà¹ØIOC£¬ÆäÖаüÀ¨17¸öÑù±¾¡¢2¸öIP¡¢12¸öÓòÃûºÍ5¸öÎó²î¡£AG¹«Ë¾Ç徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£
- MoleratsÏòÕþ¸®ºÍµçÐÅ×éÖ¯ÌṩºóÃÅ
¡¾±êÇ©¡¿Molerats¡¢SPARK
¡¾Õë¶ÔÐÐÒµ¡¿Õþ¸®¡¢ÔËÓªÉÌ
¡¾Ê±¼ä¡¿2020-03-03
¡¾¼ò½é¡¿½üÆÚMoleratsÍþв×é֯ʹÓÃÓã²æÊ½ÍøÂç´¹ÂÚ¹¥»÷ÏòÕþ¸®¡¢µçÐÅ×éÖ¯ÌṩSparkºóÃÅ£¬¸ÃºóÃÅ¿ÉÈù¥»÷ÕßÔÚÊÜѬȾϵͳÉÏ·¿ªÓ¦ÓóÌÐò²¢Ö´ÐÐÏÂÁî¡£¸ÃºóÃÅ×îÔçÓÚ2019Äê1Ô·ºÆð£¬ÒÔºóÒ»Ö±»îÔ¾¡£AG¹«Ë¾ÍþвÇ鱨ÖÐÐĹØÓÚMolerats×éÖ¯¹Ø×¢×îÔç¿ÉÒÔ×·Ëݵ½2013Ä꣬¹ØÓÚÏà¹ØMolerats×éÖ¯Ïà¹ØÊÂÎñ±£´æ13¼þ£¬ÆäÖÐ2013ÄêºÍ2015Äê¸÷1¼þ¡¢2016Äê2¼þ¡¢2017Äê3¼þ¡¢2019ÄêºÍ½ñÄê¸÷3¼þ£¬¿ÉÒÔ¿´³ö¸Ã×éÖ¯´¦ÓÚºã¾ÃÒ»Á¬»îÔ¾µÄ״̬¡£
¡¾¹ØÁªµÄ¹¥»÷×éÖ¯¡¿Molerats£¬Ò²±»³ÆÎªGaza cybergang¡¢Moonlight¡¢Extreme Jackal¡¢Gaza Hackers Team¡¢Moonlight¡¢Extreme Jackal¡¢Operation Molerats£¬ÊÇÒ»¸ö³öÓÚÕþÖÎÄîÍ·µÄÍþв×éÖ¯£¬×Ô2012ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬¸Ã×éÖ¯µÄÊܺ¦ÕßÖ÷ÒªÔÚÖж«¡¢Å·ÖÞºÍÃÀ¹ú¡£
¡¾²Î¿¼Á´½Ó¡¿https://unit42.paloaltonetworks.com/molerats-delivers-spark-backdoor/
¡¾·À»¤²½·¥¡¿AG¹«Ë¾ÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÌáÈ¡101ÌõIOC£¬ÆäÖаüÀ¨14¸öÓòÃû¡¢1¸öIPºÍ86¸öÑù±¾¡£AG¹«Ë¾Ç徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£
- APT36ʹÓùÚ×´²¡¶¾³±Á÷Èö²¥Crimson
¡¾±êÇ©¡¿APT36¡¢Crimson
¡¾Ê±¼ä¡¿2020-03-15
¡¾¼ò½é¡¿×ÔÖØÐ¹ڲ¡¶¾ÔÚÈ«ÇòÐÔ¹æÄ£ÄÚ±¬·¢ÒÔÀ´£¬Õþ¸®ºÍÎÀÉúÏà¹Ø²¿·ÖµÄÖ¸µ¼ÐÅÏ¢³ÉΪÈËÃǹØ×¢µÄ½¹µã¡£½üÆÚAPT36Íþв×éÖ¯ÕýÔÚʹÓùÚ×´²¡¶¾Ïà¹Ø¿µ½¡×ÉѯÎĵµ×÷ΪÓÕ¶üÀ´Èö²¥Ô¶³ÌÖÎÀíľÂíCrimson£¬¹¥»÷Ô˶¯ÖÐAPT36ʹÓÃÓã²æÊ½ÍøÂç´¹ÂÚµç×ÓÓʼþ£¬¸½¼þÊÇαװ³ÉÓ¡¶ÈÕþ¸®¹Ù·½Ðû²¼µÄйڲ¡¶¾¿µ½¡Ö¸µ¼Îĵµ£¬ÓÕµ¼Óû§µã»÷¶ñÒâÁ´½ÓÏÂÔØCrimson¡£CrimsonľÂí¿É´ÓÊܺ¦Õßä¯ÀÀÆ÷ÖÐÇÔÈ¡Êý¾Ý¡¢Éó²éÕýÔÚÔËÐеÄÀú³ÌÇý¶¯Æ÷ºÍĿ¼¡¢Ê¹ÓÃ×Ô½ç˵TCPÐÒé¾ÙÐÐC£¦CͨѶ¡¢ÍøÂçÓйطÀ²¡¶¾Èí¼þÐÅÏ¢ºÍ²¶»ñ½ØÍ¼¡£
¡¾¹ØÁªµÄ¹¥»÷×éÖ¯¡¿APT36£¬Ò²±»³ÆÎªTransparent Tribe¡¢ProjectM¡¢Mythic LeopardºÍTEMP.Lapis£¬ÊÇÒ»¸öÖÁÉÙ´Ó2016Äê»îÔ¾ÖÁ½ñµÄ°Í»ù˹̹Íþв×éÖ¯£¬Ö÷ÒªÕë¶ÔÓ¡¶ÈÕþ¸®¡¢¹ú·À²¿ºÍʹ¹Ý¡£
¡¾²Î¿¼Á´½Ó¡¿https://blog.malwarebytes.com/threat-analysis/2020/03/apt36-jumps-on-the-coronavirus-bandwagon-delivers-crimson-rat/
¡¾·À»¤²½·¥¡¿AG¹«Ë¾ÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÌáÈ¡µ½7ÌõÏà¹ØIOC£¬ÆäÖаüÀ¨4¸öÑù±¾ºÍ2¸öIPºÍ1¸öÎó²î£»¹ØÓÚAPT36×éÖ¯Ïà¹ØÊÂÎñ±£´æ3¼þ£¬Ïà¹ØÁªÑù±¾6¸ö¡¢Ïà¹ØÁªIP2¸ö¡£AG¹«Ë¾Ç徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£
- Õë¶ÔÎÚ×ȱð¿Ë˹̹µÄ¶¨Ïò¹¥»÷Ô˶¯
¡¾±êÇ©¡¿Quasar¡¢Droid-Watcher¡¢ Sandcat
¡¾Ê±¼ä¡¿2020-03-12
¡¾¼ò½é¡¿½üÆÚ¹¥»÷ÕßʹÓÃÍøÂç´¹ÂÚ¹¥»÷Õë¶ÔÎÚ×ȱð¿Ë˹̹ÊÂÇéµÄ¼ÇÕߺͼ¤½ø·Ö×ӵĹ¥»÷Ô˶¯±»·¢Ã÷£¬¹¥»÷Ô˶¯Ê¹ÓøüÆÕ±éµÄ»ù´¡¼Ü¹¹ÒÔ¼°ÐµÄWindowsºÍAndroidÌØ¹¤Èí¼þ¶Ô²î±ðµÄÓû§ÊµÑé¹¥»÷¡£¹¥»÷Õß½«Ìع¤Èí¼þ±äÖÖαװ³ÉÕýµ±µÄAdobe Flash Player×°ÖóÌÐòºÍTelegram Desktop×°ÖóÌÐò£¬Ò»µ©±»Ñ¬È¾£¬¹¥»÷ÕßʹÓõÄÌØ¹¤Èí¼þ¹¤¾ß°ü¿ÉÒԼͼËùÓа´¼ü¡¢Ã¿¸ô¼¸ÃëÖÓÒ»´Î×ÀÃæ½ØÍ¼ÒÔ¼°ÇÔÈ¡ÃÜÂëºÍcookie£»Õë¶ÔAndroidʹÓÃDroid-Watcher¿ªÔ´AndroidÌØ¹¤Èí¼þ£¬Äܹ»ÌáÈ¡Êܺ¦Õß×°±¸ÐÅÏ¢¡¢¼à¿ØÌ¸ÌìÓ¦ÓóÌÐò¡¢¼à¿Øµç»°ºÍ¶ÌÐÅ¡¢Â¼ÖÆÀ´×ÔÊÖ»úÂó¿Ë·çºÍÉãÏñ»úµÄÒôƵºÍÊÓÆµ¡¢»ñÈ¡ä¯ÀÀÆ÷ÀúÊ·¼Í¼ºÍ×°±¸µØµãλÖõȡ£´Ë´Î¹¥»÷Ô˶¯ÒÉËÆÓëSandcatÍþв×éÖ¯Óйء£
¡¾¹ØÁªµÄ¹¥»÷×éÖ¯¡¿SandCatÊÇÒ»¸öÍþв×éÖ¯£¬¹éÊôÓÚÎÚ×ȱð¿Ë˹̹¹ú¼ÒÇå¾²¾Ö¡£
¡¾²Î¿¼Á´½Ó¡¿https://www.amnesty.org/en/latest/research/2020/03/targeted-surveillance-attacks-in-uzbekistan-an-old-threat-with-new-techniques/
¡¾·À»¤²½·¥¡¿AG¹«Ë¾ÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÌáÈ¡12ÌõIOC£¬ÆäÖаüÀ¨9¸öÓòÃûºÍ3¸öÑù±¾£»AG¹«Ë¾Ç徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£

AG¹«Ë¾ÔÆ







