Technical Analysis Report on the LuBian Mining Pool Hacking and the Theft of a Huge Amount of Bitcoin | Bee Network
On December 29, 2020, LuBian mining pool suffered a major hacking attack, with a total of 127,272.06953176 Bitcoins (worth approximately $3.5 billion at the time, now worth $15 billion) stolen by the attackers. The holder of this huge amount of Bitcoins was Chen Zhi, chairman of the Prince Group of Cambodia. Following the attack, Chen Zhi and his Prince Group repeatedly posted messages on the blockchain in early 2021 and July 2022, appealing to the hackers to return the stolen Bitcoins and offering to pay a ransom, but received no response. Strangely, after being stolen, this huge amount of Bitcoin remained dormant in a Bitcoin wallet address controlled by the attackers for four years, almost untouched. This clearly does not conform to the typical behavior of hackers eager to cash out and pursue profits; it seems more like a precise operation orchestrated by a “nation-state hacking organization.” It wasn’t until June 2024 that the stolen Bitcoins were transferred to a new Bitcoin wallet address, where they remain untouched to this day.
On October 14, 2025, the U.S. Department of Justice announced criminal charges against Chen Zhi and seized 127,000 Bitcoins from Chen Zhi and his Prince Group. Evidence suggests that the massive amount of Bitcoins seized by the U.S. government from Chen Zhi and his Prince Group were stolen from the LuBian mining pool back in 2020 by hackers. In other words, the U.S. government may have already stolen 127,000 Bitcoins held by Chen Zhi through hacking techniques as early as 2020—a classic case of a state-sponsored “double-cross” attack orchestrated by a national hacking organization. This report, from a technical perspective, traces the origins of the incident, deeply analyzes the key technical details, focuses on the details of the theft, reconstructs the complete attack timeline, and assesses Bitcoin’s security mechanisms, hoping to provide valuable security insights for the کرپٹوcurrency industry and users.
I. Background of the EventLuBian mining pool, founded in early 2020, was a rapidly rising Bitcoin mining pool with primary operations in China and Iran. In December 2020, LuBian suffered a massive hack, resulting in the theft of over 90% of its Bitcoin holdings. The total stolen amount was 127,272.06953176 BTC, which closely matches the 127,271 BTC alleged in the US Department of Justice indictment.
LuBian mining pools operate on a model involving the centralized storage and distribution of mining rewards. The Bitcoin in the pool addresses is not stored on regulated centralized exchanges, but rather resides in non-custodial wallets. From a technical perspective, non-custodial wallets (also known as cold wallets or hardware wallets) are considered the ultimate safe haven for crypto assets. Unlike exchange accounts that can be frozen by a single decree, they are more like a private vault belonging solely to the holder, with the key (private key) held only by the holder.
As a cryptocurrency, Bitcoin’s on-chain addresses are used to identify the ownership and flow of Bitcoin assets. Controlling the private key of an on-chain address allows for complete control over the Bitcoin held there. According to reports from on-chain analysis agencies, the massive amount of Bitcoin held by Chen Zhi under US government control highly overlaps with the LuBian mining pool hack. On-chain data records show that on December 29, 2020 (Beijing time), LuBian’s core Bitcoin wallet address underwent an abnormal transfer, totaling 127,272.06953176 BTC, almost identical to the 127,271 BTC mentioned in the US Department of Justice indictment. This batch of stolen Bitcoin remained dormant until June 2024. Between June 22 and July 23, 2024 (Beijing time), this batch of stolen Bitcoin was transferred again to a new on-chain address and has remained untouched since. ARKHAM, a well-known US blockchain tracking platform, has marked these final addresses as being held by the US government. Currently, the US government has not disclosed in the indictment how it obtained the private key to Chen Zhi’s massive Bitcoin on-chain address.
Figure 1: Timeline of Key Activities
II. Attack Link AnalysisAs is well known, random numbers are the cornerstone of cryptographic security in the world of blockchain. Bitcoin uses asymmetric encryption technology; the Bitcoin private key is a 256-bit binary random number, theoretically requiring 2^256 attempts to crack, which is nearly impossible. However, if this 256-bit binary private key is not completely randomly generated—for example, if 224 bits follow a predictable pattern, leaving only 32 bits randomly generated—its private key strength is greatly reduced, and it can be brute-forced in just 2^32 (approximately 4.29 billion) attempts. For instance, in September 2022, the UK cryptocurrency market maker Wintermute suffered a $160 million theft due to a similar pseudo-random number vulnerability.
In August 2023, the international security research team MilkSad first announced the discovery of a pseudo-random number generator (PRNG) vulnerability in a third-party key generation tool and successfully applied for a CVE number (CVE-2023-39910). In their research report, the team mentioned that the LuBian Bitcoin mining pool had a similar vulnerability, and among the LuBian Bitcoin mining pool addresses that had been compromised, they disclosed included all 25 Bitcoin addresses mentioned in the US Department of Justice indictment.
Figure 2: List of 25 Bitcoin wallet addresses in the U.S. Department of Justice indictment
As a non-custodial Bitcoin mining pool, LuBian’s Bitcoin wallet addresses rely on a custom private key generation algorithm to manage funds. Instead of using the recommended 256-bit binary random number standard, this algorithm uses a 32-bit binary random number, which has a fatal flaw: it relies solely on a “pseudo-random number generator”—MersenneTwister (MT19937-32)—as a seed, either a timestamp or a weak input. A pseudo-random number generator (PRNG) is equivalent to the randomness of a 4-byte integer, which can be efficiently exhaustively searched in modern computing. Mathematically, the probability of cracking it is 1/2^32. For example, assuming an attack script tests 10^6 keys per second, the cracking time would be approximately 4200 seconds (about 1.17 hours). In practice, optimization tools such as Hashcat or custom scripts can further accelerate this process. Attackers exploited this vulnerability to steal a large amount of Bitcoin from the LuBian Bitcoin mining pool.
Figure 3: Comparison Table of LuBian Mining Pool’s Defects Compared with Industry Safety Standards
Through technical tracing, the complete timeline and related details of the LuBian mining pool hack are as follows:
1. Attack and Theft Phase: December 29, 2020 (Beijing Time)Incident: Hackers exploited a vulnerability in the private key generation of Bitcoin wallet addresses on the LuBian mining pool to brute-force over 5,000 weakly randomized wallet addresses (wallet type: P2WPKH-nested-in-P2SH, prefix 3). Within approximately two hours, about 127,272.06953176 BTC (worth approximately $3.5 billion at the time) was drained from these wallet addresses, leaving less than 200 BTC. All suspicious transactions shared the same transaction fees, indicating the attack was executed by an automated bulk transfer script.
Sender: LuBian mining pool weak random Bitcoin wallet address group (controlled by the LuBian mining farm operating entity, belonging to Chen Zhi’s Prince Group);
Recipient: A group of Bitcoin wallet addresses controlled by the attacker (undisclosed addresses);
Transfer path: Weak wallet address group → Attacker’s wallet address group;
Correlation analysis: The total amount stolen was 127,272.06953176 BTC, which is basically consistent with the 127,271 BTC mentioned in the US Department of Justice indictment.
2. Dormant Phase: December 30, 2020 to June 22, 2024 (Beijing Time)Event: This batch of Bitcoins was stolen in 2020 through a pseudo-random number vulnerability and remained dormant in a Bitcoin wallet address controlled by the attacker for as long as four years. Less than one ten-thousandth of the dust transactions may have been used for testing.
Correlation analysis: This batch of Bitcoins remained almost untouched until it was fully taken over by the US government on June 22, 2024. This is clearly inconsistent with the nature of ordinary hackers who are eager to cash out and pursue profits. It is more like a precise operation orchestrated by a state-owned hacking organization.
3. Resumption Trial Phase: Early 2021, July 4th and 26th, 2022 (Beijing Time)Event: After the Bitcoins were stolen, during its dormant period, in early 2021, the LuBian mining pool sent over 1,500 messages (costing approximately 1.4 BTC in fees) via the BitcoinOP_RETURN function, embedding them in the blockchain data area, pleading with the hackers to return the funds. Example message: “Please return our funds, we’ll pay a reward.” On July 4th and 26th, 2022, the LuBian mining pool again sent messages via the BitcoinOP_RETURN function, example message: “MSG from LB. To the white hat who is saving our asset, you can contact through 1228BTC@gmail.com to discuss the return of the asset and your reward.”
Sender: Lubian weakly random Bitcoin wallet address (controlled by the Lubian mining farm operating entity, belonging to Chen Zhi’s Prince Group);
Recipient: A group of Bitcoin wallet addresses controlled by the attacker;
Transfer path: weak wallet address group → attacker’s wallet address group; small transactions embed OP_RETURN;
Correlation analysis: After the theft, these messages were confirmed to be multiple attempts by LuBian mining pool, as the sender, to contact a “third-party hacker” to request the return of assets and discuss ransom matters.
4. Activation and Transfer Phase: June 22 to July 23, 2024 (Beijing Time)Incident: Bitcoins from a group of dormant Bitcoin wallet addresses controlled by attackers were activated and transferred to a final Bitcoin wallet address. This final wallet address was identified as being held by the US government by ARKHAM, a well-known US blockchain tracking platform.
Sender: A group of Bitcoin wallet addresses controlled by the attacker;
Recipient: Newly integrated final wallet address group (not publicly disclosed, but confirmed to be a wallet address group controlled by the US government);
Transfer path: Bitcoin wallet address group controlled by attackers → wallet address group controlled by the US government;
Correlation analysis: This batch of stolen Bitcoins remained largely untouched for four years before finally being taken over by the US government.
5. Notice of Seizure: October 14, 2025 (US local time)Event: The U.S. Department of Justice issued a statement announcing charges against Chen Zhi and “confiscating” 127,000 بٹ کوائنs in his possession.
Meanwhile, through the blockchain’s public mechanism, all Bitcoin transaction records are publicly traceable. Based on this, this report traces the source of the massive amount of Bitcoin stolen from the LuBian weakly random Bitcoin wallet address (controlled by the LuBian mining operation entity, possibly belonging to Chen Zhi’s Prince Group). The total number of stolen Bitcoins is 127,272.06953176, originating from: approximately 17,800 Bitcoins from independent “mining,” approximately 2,300 Bitcoins from mining pool wages, and 107,100 Bitcoins from exchanges and other channels. Preliminary results suggest a discrepancy with the US Department of Justice indictment’s claim that all Bitcoins originated from illicit income.
III. Detailed Analysis of Vulnerability Technologies1. Generating a Bitcoin wallet address private key:
The core vulnerability in the LuBian mining pool lies in its private key generator, which employs a flaw similar to the “MilkSad” defect found in LibbitcoinExplorer. Specifically, the system uses the MersenneTwister (MT19937-32) pseudo-random number generator, initialized with only a 32-bit seed, resulting in an effective entropy of only 32 bits. This PRNG is non-cryptographic, easily predictable, and easily reverse-engineered. An attacker can generate a corresponding private key by enumerating all possible 32-bit seeds (0 to 2^32-1) and checking if it matches the public key hash of a known wallet address.
In the Bitcoin ecosystem, the private key generation process is typically: random seed → SHA-256 hash → ECDSA private key.
The LuBian mining pool’s underlying library may be based on custom code or open-source libraries (such as Libbitcoin), but it neglects entropy security. Similar to the MilkSad vulnerability, the LibbitcoinExplorer’s “bxseed” command also uses the MT19937-32 random number generator, relying solely on timestamps or weak inputs as seeds, making the private key vulnerable to brute-force attacks. In the LuBian attack, over 5,000 wallets were affected, indicating that the vulnerability is systemic and likely stems from code reuse during bulk wallet generation.
2. Simulated attack process:(1) Identify the target wallet address (by monitoring LuBian mining pool activity on-chain);
(2) Enumerate 32-bit seeds: forseedin0to4294967295;
(3) Generate private key: private_key=SHA256(seed);
(4) Derived public key and address: Calculated using the ECDSASECP256k1 curve;
(5) Matching: If the derived address matches the target, the transaction is signed using the private key to steal funds;
Compared to similar vulnerabilities: This vulnerability is similar to the 32-bit entropy flaw in TrustWallet, which led to the large-scale cracking of Bitcoin wallet addresses; the “MilkSad” vulnerability in LibbitcoinExplorer also exposed private keys due to low entropy. These cases all stem from legacy issues in early codebases that did not adopt the BIP-39 standard (12-24 word seed phrases, providing high entropy). LuBian mining pool may have used a custom algorithm designed to simplify management but neglected security.
Defense deficiencies: LuBian mining pool did not implement multisignature (multisig), hardware wallets, or hierarchical deterministic wallets (HDwallets), all of which could improve security. On-chain data shows that the attack covered multiple wallets, indicating a systemic vulnerability rather than a single point of failure.
3. On-chain evidence and recovery attempts:OP_RETURN messages: LuBian mining pool sent over 1,500 messages via Bitcoin’s OP_RETURN feature, costing 1.4 BTC, pleading with attackers to return funds. These messages are embedded in the blockchain, proving they represent the actions of the true owner and are not forged. Example messages include “Please return funds” or similar requests, distributed across multiple transactions.
4. Attack Correlation Analysis:The U.S. Department of Justice, in its criminal indictment against Chen Zhi dated October 14, 2025 (case number 1:25-cr-00416), listed 25 Bitcoin wallet addresses holding approximately 127,271 BTC, worth approximately $15 billion, which have been seized. Through blockchain analysis and review of official documents, these addresses are highly correlated with the LuBian mining pool attack.
Direct Connection: Blockchain analysis reveals that 25 addresses listed in the U.S. Department of Justice indictment are the final holding addresses of the Bitcoin stolen during the 2020 LuBian mining pool attack. An Elliptic report indicates that this Bitcoin was “stolen” from LuBian’s mining operations in 2020. Arkham Intelligence confirms that the funds seized by the U.S. Department of Justice are directly related to the LuBian mining pool theft.
Evidence in the indictment: Although the U.S. Department of Justice indictment does not directly name “LuBianhack,” it mentions that the funds originated from “theft attacks on Bitcoin mining operations in Iran and China,” which is consistent with the on-chain analysis by Elliptic and Arkham Intelligence.
Related to the attack: Judging from the attack methods, LuBian mining pool’s huge amount of Bitcoin was stolen in a technical attack in 2020 and remained dormant for four years. During this period, less than one ten-thousandth of it was traded. Until it was fully taken over by the US government in 2024, it remained almost untouched. This is inconsistent with the nature of hackers who are eager to cash out and pursue profits. It is more like a precise operation orchestrated by a state-owned hacking organization. Analysts believe that the US government may have already taken control of this batch of Bitcoin in December 2020.
IV. Impacts and RecommendationsThe LuBian mining pool was hacked in 2020, which had a far-reaching impact, leading to the pool’s actual dissolution and losses equivalent to more than 90% of its total assets at the time. The stolen Bitcoin is now worth $15 billion, highlighting the risks of amplified price volatility.
The LuBian mining pool incident exposed systemic risks in random number generation within cryptocurrency toolchains. To prevent similar vulnerabilities, the blockchain industry should use cryptographically secure pseudo-random number generators (CSPRNGs); implement multi-layered defenses, including multisignature (multisig), cold storage, and regular auditing; and avoid custom private key generation algorithms. Mining pools need to integrate real-time on-chain monitoring and abnormal transfer alert systems. For ordinary users, protection should avoid using unverified key generation modules from open-source communities. This incident also reminds us that even with high blockchain transparency, weak security foundations can still lead to catastrophic consequences. It also highlights the importance of cybersecurity in the future development of the digital economy and digital currencies.
یہ مضمون انٹرنیٹ سے لیا گیا ہے: Technical Analysis Report on the LuBian Mining Pool Hacking and the Theft of a Huge Amount of BitcoinRecommended Articles Related: The public beta is online. How to participate in the Lighter Season 2 points plan? Author | Asher ( @Asher_0210 ) On October 2nd, Perp DEX Lighter announced the official launch of its Ethereum L2-based mainnet in a post on the X platform. After eight months of private beta testing, the platform is now fully open to the public. The first quarter’s points program has concluded, and the second quarter is about to begin, running until the end of 2025. Users are now free to join, without an invitation code or a deposit limit. However, the referral program remains in place, offering rewards such as points to inviters. It is worth mentioning that Lighter founder and CEO Vladimir Novakovski clarified on X that the second season points activity is planned to end before the end of the year, not December 31st. Lighter founder: The second… # تجزیہ# بٹ کوائن# کرپٹو# defi# ایکسچینج# مارکیٹ# ٹول© 版权声明صف 上一篇 With a public offering of 1.39 billion, challenging BASE and OP, can MegaETH break through the new Layer 2 landscape? 下一篇 Balancer vulnerability incident: A major test for DeFi 相关文章 فنانسنگ ایکسپریس آف دی ویک | 14 پروجیکٹوں نے سرمایہ کاری حاصل کی، جس کی کل مالیاتی رقم تقریباً ظاہر کی گئی۔ 6086cf14eb90bc67ca4fc62b 28,037 Weekly Funding Update | 12 Projects Received Funding, Total Funding Amount: $145 Million (July 28-August 3)Recommended A 6086cf14eb90bc67ca4fc62b 24,006 1 The Strange and Orthodox Ways of “Trump Family Stablecoin” USD1: Institutional Investment and Meme Liquidity Pool 6086cf14eb90bc67ca4fc62b 228,401 216 Global Asset Rotation: Why Liquidity Drives Cryptocurrency Cycles (Part 1) 6086cf14eb90bc67ca4fc62b 17,464 1 Huobi Growth Academy | Crypto Market Macro Research Report: The signal of the alt season has emerged, and institutional 6086cf14eb90bc67ca4fc62b 29,489 1 PENGU performs a 10-fold miracle, and the fat penguin becomes the biggest winner of encrypted IP? 6086cf14eb90bc67ca4fc62b 22,543 1 کوئی تبصرہ نہیں آپ کو ایک تبصرہ چھوڑنے کے لیے لاگ ان ہونا چاہیے! فوری طور پر لاگ ان کریں۔ کوئی تبصرہ نہیں... Bee.com دنیا کا سب سے بڑا Web3 پورٹل شراکت دار سکے کارپ بائننس CoinMarketCap سکے گیکو سکے لائیو آرمر Bee Network APP ڈاؤن لوڈ کریں اور web3 کا سفر شروع کریں۔ سفید کاغذ کردار عمومی سوالات © 2021–2026۔ جملہ حقوق محفوظ ہیں۔. رازداری کی پالیسی | سروس کی شرائط Bee Network APP ڈاؤن لوڈ کریں۔ اور ویب 3 کا سفر شروع کریں۔ دنیا کا سب سے بڑا Web3 پورٹل شراکت دار CoinCarp Binance CoinMarketCap CoinGecko Coinlive Armors سفید کاغذ کردار عمومی سوالات © 2021–2026۔ جملہ حقوق محفوظ ہیں۔. رازداری کی پالیسی | سروس کی شرائط تلاش کریں۔ تلاش کریں۔InSiteآنچینسماجیخبریں 热门推荐: ایئر ڈراپ ہنٹرز ڈیٹا تجزیہ کرپٹو مشہور شخصیات ٹریپ ڈیٹیکٹر اردو English 繁體中文 简体中文 日本語 Tiếng Việt العربية 한국어 Bahasa Indonesia हिन्दी Русский اردو智能索引记录
-
2026-03-01 06:00:20
教育培训
成功
标题:绿萝600字作文
简介:导读:作文简介,今天下午第一节课,我一走进教室就发现讲台上多了一盆绿萝,教室里原来没有绿萝啊?她又是从哪“走”来的呢 如
-
2026-02-28 11:14:42
综合导航
成功
标题:Landyachtz Hollowtech Stratus Blue Super Flex Longboard Deck – CCS
简介:Deck Width:
-
2026-03-01 05:53:56
图片素材
成功
标题:五年级写景作文1000字 五年级1000字写景作文大全-作文网
简介:作文网优秀五年级写景1000字作文大全,包含五年级写景1000字作文素材,五年级写景1000字作文题目、美文范文,作文网
-
2026-02-28 21:53:39
综合导航
成功
标题:(必备)四年级春天的作文
简介:无论是身处学校还是步入社会,大家总少不了接触作文吧,通过作文可以把我们那些零零散散的思想,聚集在一块。作文的注意事项有许
-
2026-03-01 05:31:34
综合导航
成功
标题:KickStart Quick Start Guide テクトロニクス
简介:KickStart Quick Start Guide
-
2026-03-01 06:03:40
图片素材
成功
标题:意义的作文20字 描写意义的作文 关于意义的作文-作文网
简介:作文网精选关于意义的20字作文,包含意义的作文素材,关于意义的作文题目,以意义为话题的20字作文大全,作文网原创名师点评
-
2026-03-01 09:46:55
综合导航
成功
标题:Thomas Ngijol : 3 bonnes raisons de foncer voir son spectacle
简介:La rédaction de Be est allée voir le spectacle de Thomas Ngi
-
2026-02-28 21:50:44
游戏娱乐
成功
标题:EA官方中文网
简介:我们的存在就是为了通过游戏来启发世界。Electronic Arts 是名列前茅的主机、PC 和手游的游戏发行商。
-
2026-03-01 09:51:52
图片素材
成功
标题:月季的作文150字 描写月季的作文 关于月季的作文-作文网
简介:作文网精选关于月季的150字作文,包含月季的作文素材,关于月季的作文题目,以月季为话题的150字作文大全,作文网原创名师
-
2026-03-01 11:38:01
图片素材
成功
标题:麦格的作文50字 描写麦格的作文 关于麦格的作文-作文网
简介:作文网精选关于麦格的50字作文,包含麦格的作文素材,关于麦格的作文题目,以麦格为话题的50字作文大全,作文网原创名师点评
-
2026-03-01 03:22:11
综合导航
成功
标题:Hardrock Hotel Shezhen — CL3
简介:Rock and Roll are the two playful and distinctive elements t
-
2026-03-01 04:57:31
教育培训
成功
标题:伤心的作文300字3篇(热门)
简介:在日常的学习、工作、生活中,大家都不可避免地要接触到作文吧,作文是从内部言语向外部言语的过渡,即从经过压缩的简要的、自己
-
2026-02-28 11:12:55
综合导航
成功
标题:Verisign Earnings beat expectations for the third quarter of 2019
简介:Verisign ended the third quarter of 2019 with 157.4 million
-
2026-02-28 21:24:50
综合导航
成功
标题:DIY Sticker Book Free On Yad.com: Paper Doll Diary
简介:Create your ideal room settings in the DIY crafts game onlin
-
2026-02-28 22:12:06
图片素材
成功
标题:愉快的作文1500字 描写愉快的作文 关于愉快的作文-作文网
简介:作文网精选关于愉快的1500字作文,包含愉快的作文素材,关于愉快的作文题目,以愉快为话题的1500字作文大全,作文网原创
-
2026-02-28 21:53:24
综合导航
成功
标题:Isobel Fraser W1M
简介:Isobel Fraser is an associate investment manager at W1M, foc
-
2026-02-28 22:11:31
教育培训
成功
标题:【推荐】初中生活作文集锦7篇
简介:在学习、工作、生活中,大家都不可避免地会接触到作文吧,借助作文人们可以实现文化交流的目的。相信写作文是一个让许多人都头痛
-
2026-03-01 05:42:06
实用工具
成功
标题:(实用)梦想的英语作文
简介:在平平淡淡的日常中,大家总免不了要接触或使用作文吧,作文根据写作时限的不同可以分为限时作文和非限时作文。那么,怎么去写作
-
2026-03-01 12:03:42
综合导航
成功
标题:Sac à dos : la tendance cool de l'hiver à shopper
简介:Une petite touche régressive et une bonne dose de cool... on
-
2026-03-01 03:09:53
综合导航
成功
标题:童眸映爱情,运势隐其中。_一世迷命理网
简介:在古老的相术中,人们相信眼睛是心灵的窗户,能够透露出一个人的内心世界和未来的运势。而今天,我们将探讨一种独特的相术观点—
-
2026-02-27 20:47:28
综合导航
成功
标题:What is an SSH Tunnel & SSH Tunneling?
简介:SSH tunneling is a method of transporting arbitrary networki
-
2026-02-28 22:01:01
综合导航
成功
标题:Monster Energy Supercross - The Official Videogame 4 - PlayStation Universe
简介:Stay up to date with the latest Monster Energy Supercross -
-
2026-03-01 00:03:17
教育培训
成功
标题:实用的难忘的一件事二年级作文
简介:在平平淡淡的学习、工作、生活中,大家对作文都不陌生吧,作文根据写作时限的不同可以分为限时作文和非限时作文。一篇什么样的作
-
2026-02-28 21:23:16
教育培训
成功
标题:二年级作文300字[合集3篇]
简介:在日常的学习、工作、生活中,大家都不可避免地要接触到作文吧,作文是人们以书面形式表情达意的言语活动。你所见过的作文是什么
-
2026-02-28 21:32:20
教育培训
成功
标题:实用的暑假里的事小学作文四篇
简介:在平时的学习、工作或生活中,大家对作文都再熟悉不过了吧,根据写作命题的特点,作文可以分为命题作文和非命题作文。你写作文时
-
2026-03-01 09:28:47
教育培训
成功
标题:自己作文500字精品10篇
简介:在日常生活或是工作学习中,大家都尝试过写作文吧,写作文是培养人们的观察力、联想力、想象力、思考力和记忆力的重要手段。那么
-
2026-03-01 03:09:22
综合导航
成功
标题:小学写景作文常用(6篇)
简介:在日常学习、工作和生活中,大家都写过作文吧,作文是一种言语活动,具有高度的综合性和创造性。你知道作文怎样写才规范吗?下面
-
2026-03-01 03:33:31
综合导航
成功
标题:人族鎮守使-第二百二十四章 斬殺神王的方法(求月票)最新章節-台灣小說網
简介:台灣小說網整理人族鎮守使全集無彈窗在線閱讀,當前章節:第二百二十四章 斬殺神王的方法(求月票)
-
2026-03-01 06:00:43
综合导航
成功
标题:Nina Bauner — 8AKP Counselling and Psychotherapy, Cambridge
简介:Clinical Psychologists work to improve mental wellbeing and
-
2026-03-01 05:07:23
综合导航
成功
标题:Bloomberg’s SBF Documentary Just Dropped and It Could Have Been So Good Bee Network
简介:Bloomberg just dropped a documentary on Sam Bankman-Fried an