• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Windows 10’s Browser Forensic Analysis for Tracing P2P Networks’Anonymous Attacks

    2022-08-24 12:56:28SaimaKauserTauqeerSafdarMalikMohdHilmiHasanEmeliaAkashahAkhirandSyedMuhammadHusnainKazmi
    Computers Materials&Continua 2022年7期

    Saima Kauser, Tauqeer Safdar Malik,*, Mohd Hilmi Hasan, Emelia Akashah P.Akhirand Syed Muhammad Husnain Kazmi

    1Air University, Department of Computer Science, Multan, 60000, Pakistan

    2Centre for Research in Data Science, Department of Computer and Information Sciences,Universiti Teknologi PETRONAS, Seri Iskandar, Perak, 32610, Malaysia

    3IAR Systems, M?rsta, Stockholm, Station Gatan 23, 19542, Sweden

    Abstract: A web browser is the most basic tool for accessing the internet from any of the machines/equipment.Recently, data breaches have been reported frequently from users who are concerned about their personal information, as well as threats from criminal actors.Giving loss of data and information to an innocent user comes under the jurisdiction of cyber-attack.These kinds of cyber-attacks are far more dangerous when it comes to the many types of devices employed in an internet of things (IoT) environment.Continuous surveillance of IoT devices and forensic tools are required to overcome the issues pertaining to secure data and assets.Peer to peer (P2P) applications have been utilized for criminal operations on the web.Therefore, it is a challenge for a forensic investigator to perform forensic analysis of the evolving hardware and software platforms for IoT.For identity concealment and privacyprotection,the Onion Router(Tor)and Chrome with the Invisible Internet Project (I2P) as the foundation browser are often used.Confirmation is required to determine whether Tor is truly anonymous and private as they claim.Some people, on the other hand, utilize the Tor browser for evil reasons.Tools and techniques are available for the collection of artifacts, identifying problem areas, further processing and analysis of data on the computer and IoT.Present research tried to explore a few tools for the tracing of I2P activities over computer on windows 10 that reflects IoT devices.According to the results of this research, it leaves an excessive amount of important digital evidence on the operating system that can be exploited to attack the information of users.This research is based on windows operating system and does not support other operating systems.

    Keywords: Cyber-security; peer-to-peer; invisible internet project (I2P);forensic analysis; the onion router (Tor)

    1 Introduction

    The Internet has become the inevitable part of our life today.According to datareportal.com,almost 4.66 billion people were active internet users as of Jan 2021, having 59.5% of the global population [1].This tremendous increase in internet users has provided consumers with a variety of useful services, such as entertainment, social networking, e-commerce, live gaming, blogging, online tickets, banking, and so on.Furthermore, it is worth mentioning that approximately 8 million internet users use Tor to access the internet [2].However, there are cyber-attacks escalation as well.In the field of computers, every activity is stored in digital form and can be retrieved by the process of forensic analysis.Today, many tools are available to obtain anonymity for the purpose of trackless browsing.In some countries, there is the possibility of having legal cover for anonymity, and in some areas,it could be a lethal weapon for cyber criminals [3].There have been some major cyber-attacks that have prompted investigators to consider cybercrime, which is a growing problem in today’s world.Cybercrime is defined as any fraudulent activities using a computer, digital device, or a network node.

    The Tor project was started in 1995 by the US Naval Research Laboratories with the goal of separating the identity of a user as of routing and providing a military-friendly anonymous communication network [4].No doubt, Tor was especially built for the military, but now, as per Tor metrics, about 3 million active users are available, having more than 7000 nodes for their traffic and 26 Gbps of bandwidth for the network.Tor is an advanced version of Mozilla Firefox that connects to the Tor overlay network to route users’communications anonymously, providing enhanced privacy and hidden identity capabilities.

    Peer-to-Peer networks (P2P) are self-controlled overlay networks that are spread over Internet Protocol (IP) networks.P2P file-sharing networks are modelled after the Internet of Things (IoT),which features self-governing connected devices in dispersed and de-centralized systems [5].The Scalability is facilitated by P2P overlays in a dynamic and de-centralized system.On the contrary toward the client-server architecture, the nodes in a P2P system are handled separately.These overlay networks can sometimes provide services those are not available through traditional client-server systems.

    The most widely used open-source unidentified communication tool is the Invisible Internet Project (I2P) featuring identity hiding and maintaining privacy.The I2P is an unidentified peer to peer network layer over which enormous unidentified applications can work.I2P is mainly used for nameless browsing, file sharing, email, chat, blogs, online shopping and much more.To participate in an I2P network, an application software known as a router is required.The software does not know the endpoints or destinations linked to different applications.Thus, an end user would have several local destinations on their router.A separate tunnel is created for explicitly sending and receiving messages through a predefined list of routers.In I2P communication, inbound and outbound tunnels are used.I2P also uses garlic routing, a modified version of an onion router.It can encrypt multiple messages together and, hence, traffic analysis will be more complex and the data transfer speed would increase as shown in Fig.1.

    Figure 1: I2P connectivity in P2P networks for inbound and outbound users

    In Fig.1 virtual circuits B, C, E and D are created for sharing routing information of inbound and outbound participants E, F, D and B, C respectively.Tor client can get relay information from directory server netDb of I2P network.A“tunnel”is another crucial phrase to comprehend I2P.A tunnel is a path that is steered through a set of routers that has been carefully chosen.Each tunnel has a beginning and an end point (the first router, often known as the“gate”).There are two types of tunnels:“Outbound,”which sends a message from the tunnel’s maker, and“Inbound,”which delivers a message to the tunnel’s originator.We can convey messages from the sender to the recipient using the combination of these two tunnels.The I2P network database (netDb) is required to connect the two tunnels.This database contains the information needed to contact a certain router (public keys,transport addresses, and so on) as well as the information needed to reach the target recipient (the gateway, which enables a destination, the lifetime of the tunnel, a public key pair to encrypt messages).

    The most difficult problem is addressing the misappropriations caused by the P2P network’s capabilities in I2P.Many Law Enforcement Organizations (LEO) are struggling to cope with the new technologies and techniques that are being mistreated by P2P users who help facilitate and contribute to fraudulent activities online.There is a need to investigate the P2P networks for forensic analysis of I2P browsers on Windows 10 to recover some important artifacts in memory, registry and browsing activities on the hard disk.Moreover, it is pertinent to mention here that as far, no research is available for Law Enforcement Agencies (LEA) and with the help of proposed research forensic analysis of Windows 10 can be done speedily and easily.Therefore, our main focus is on cybercrime to benefit law enforcement agencies by providing a mechanism for forensic analysis.Furthermore, most of the time the network artefacts or Windows-based artefacts are under observations, hence,we are discovering the traces of dark web activity in criminal investigations on Windows 10.This is helping in P2P document sharing for organizations which are using the mirror for the Internet of Things (IoT) worldview with self-ruling arranged gadgets inside conveyed and decentralized framework [6].

    The rest of the paper is organized as Section 2 presents the related work and shows the need of the presented work.Section 3 describes the methodology with its detailed tools and phases.Section 4 analyzes the results and compares with the previous research work.Finally, the conclusion section summarizes the current research with future work.

    2 Literature Review

    Studies of Tor and I2P forensics have previously motivated on memory forensics to recognize the source of dark web sites or to de-anonymize users.In [6], researchers presented a database containing domain link to present the reconstructed relations as graph and analyzed for interconnection with darknet.The results shows that main darknet service play important role in the communication paths of the darknet.As limitations, it is hard to find weaknesses if dataset contains services of TOR that are deployed securely.Several browsing tools are analyzed and presented a feature based comparison for analysis of browser running in normal, private and portable mode.Best forensic approaches are aapplied for the creation of digital artifacts [7].ACase Study for Privacy andAnonymity on theWeb has collected TOR artifacts from host machine and carried out a detail analysis of artifacts from registry,memory and hard disks [8].The obtained results are supportive for LEA in cases where a Tor browser user is under investigation.It is performed onwindows 8.1with no support for latest operating systems.It is found that when the user used Incognito mode all the data of each eventmade by the user is traced like Login details, Email details, browsing details, etc.even after the browser closed or even open.The Universal Control (UC) Browser dealer said that by using Incognito mode of it, user history of events and other details will not be observable but using this forensics investigation it can be discoverable and the private browsing mode is still challenging according to user privacy [9].The limitations for the research is that the research has been done on the incognito mode of the UC browser and finds some artifacts.But no forensic analysis on the onion browser.

    A similar research on the forensic analysis of web browser is done in which the way to analyze the browser forensically is to take the image of the hard drive, select some user’s search words from the history file, and use the Forensic Toolkit (FTK) Live Search option to search those keywords in the image drive.She revealed that no user can browse safely on the internet [10].The researcher uses investigation based on the steps from live forensics method for acquisition of data on live media.The research is compatible to perform data acquisition process and background to the problem behind live forensic methods.For testing, Firefox browser is used in the research with privacy feature on and off.The result of the investigation shows that sufficient and valuable information is obtained after live memory forensic about suspicious activities [11].These activities included traces of email and Facebook id even after the browser is closed, website visited, clear history and keywords on the internet.These artifacts are sufficient for the accusing of culprit.

    The study of correlating message from multiple Instant Messaging (IM) networks to identify digital forensic artifacts, the suspect is communicating with correspondent relatedly through Digsby Instant Messaging (DIM) client.For the experimenting and conducting research, they have taken four IM protocols which include AIM, Windows Live Messenger protocols, Google Talk and Yahoo Messenger.The chat contents of each IM protocol either in complete or fractional form found at various locations found in Random Access Memory (RAM).Forensic Analyst can collect complete conversation contents from RAM as stored in Digsby logs.Additionally, the status updates (live, idle,away,etc.)can also gather from RAM using login ID of particular IM protocol and login ID of Digsby.Moreover, an automated tool should be developed to resolve the issue of using multiple IM protocols for a single conversation session [12].In computer forensics, extraction of memory forensic artifacts are very important and provide basis for data acquisition.Thomas et al.have done memory forensic in different phases such as identification of Kernal Process Control Register (KPCR), extraction of running process list, identifying Process Environment Block (PEB) and its related structures and extracting process memory.They observed that the process of memory analysis is highly dependent on the operating system.In the given paper method for acquiring important information are KPCR,CR3 register value, process details, loaded Dynamic Link Libraries (DLLs) and process memory from windows 7 memory dump.However, as far as limitations are concerned this whole technique can be done on the latest window like windows 8.1 and windows 10 [13].

    The researcher in [14] have proposed a system which extracts the physical memory dumps and local files of the system as input and processes it and then generates a report having I2P artifacts as output.The traces of I2P were successfully pointed out using in depth analysis of the memory dump and local system files.Furthermore, registry also contain I2P traces and HDD is also a place where traces of I2P can be find.No support for registry and HDD analysis is provided.Overall objectives in this research have been obtained but complex and updated application needs further improvements in research.

    The implementation of classification of I2P network data traffic is performed on the basis of algorithms such as Baysnet, naivebays, Support Vector Machine (SVM) and random forest traffic[15].The obtained results shows that for segmentation of data set, RandomForest is greatest having accuracy of 100%.As far as limitations are concerned no in-depth detailed analysis of the encryption principle and anonymous implementation of the I2P protocol.Whereas in [16], authors presented I2P characteristics to point out the security flaws and problems finding artifacts of the I2P.The results shows that the I2P artifacts collected and analyzed on the basis of vulnerabilities of I2P networks and specific security issues.The platform comprises on data acquisition module, forum information inquiry module and visualization module are analyzed in [17].The obtained results help law enforcement agencies to analyze illegal and criminal activities over dark web.Research on Tor or onion routers is missing.In [18], a theoretical comparison of TOR and I2P is made from a variety of aspects, including community visibility, scalability, memory utilization, latency, bandwidth,documentation, vulnerability to DoS attacks, and the number of exit nodes.The authors attempted to characterize the file sharing environment within I2P, analyzing how it affects the network’s anonymity.The majority of I2P’s activities are focused on file sharing and anonymous site hosting, according to the findings.Furthermore, the nodes are found to be spatially scattered.

    As per analysis of various literatures, comprehensive research on the latest windows 10 is missing as well as browser artifacts are mandatory in analysis.Various researches are also available on the topic but Tor left various browsing artifacts on memory and hard disk which is missing in previous research.The comparative analysis of some important research papers on the basis of above literature review is given as under see Tab.1.Many structures for digital forensics already exist, demonstrating their relevance to the area.These current frameworks serve as a foundation for the suggested framework for this study.Tor memory forensics encompass huge research gap [19].The present paper throws light on this issue and proposed a forensic platform for I2P and Tor browser memory, registry and hard disk analysis.

    Table 1: Comparative analysis of literature review

    3 Methodology

    With the invention of new hardware and software, as well as the rapid growth in internet users,many Peer-to-Peer (P2P) users are contributing to and facilitating illegal activities online, which should be addressed based on solid evidence.For the collection of these evidences, law enforcement agencies must be updated with new tools and techniques.The methodology that will be adopted in this work is shown in Fig.2.In the first phase of methodology, a computer system having virtual machine with windows 10 operating system was setup for experimental purposes.The second phase comprises of acquisition of data for forensic analysis.In this phase artefacts were collected from registry, RAM and hard disk were taken.After acquisition, collected data was forensically analyzed in third phase for presentation of evidences.For the experimental purpose, the required platform and tools will be prepared on the host system.After installation of the required tools, data acquisition will be carried out.In the first phase, registry data artifacts will be collected and in second phase, memory data artifacts will be collected.Finally, browsing data artifacts will be collected as shown in Fig.2.The mandatory investigational tools are tabulated in Tab.2 to produce a fast and accurate result, a fresh Windows 10 installation was prepared in a virtual box.The tools used for the current investigations are totally free and easy to use.

    Before the start of forensic analysis, some input is required to be given to the system.So that system could produce artifacts.In order to fulfill the requirement, experimental input was prepared in the form of performing activities over I2P and Tor browsers.One Instagram account, one Yahoo mail account, two Gmail accounts, two Skype accounts, two Twitter accounts, and three Facebook accounts are created for this purpose.The sample data is also shared between these accounts.Tab.3 contains information on these activities.After these activities, all the downloaded images and files are removed from the system before the data acquisition.

    Figure 2: Proposed system design for forensic analysis

    Table 2: Forensic analysis tools

    Table 3: Browsing activity over Tor and normal browser

    Table 3: Continued

    The data acquisition is completed in three phases.In the first phase, registry data is collected and in the second phase, I2P based Tor only memory data is collected.Finally in the third phase, artifacts of memory and storage are collected.After the data is collected from the three phases, the system is returned to a spotless state to confirm that no pieces from the preceding phase remained.The first phase entails gathering pre-installation data.The acquisition of post-installation data is part of the second phase.The third step is to collect post-uninstallation data.The Regshot tool is used for data acquisition of the registry [19].Memory data acquisition is carried out in two portions.These parts are I2P based Tor only and I2P based Tor browsing.Whereas two scenarios are considered for I2P based Tor browsing open and closed.

    4 Results and Analysis

    Browsers are necessary for a productive work environment but they also serve as an ideal vector for cyber-attacks.Cyber-attacks and crimes are multi-faceted in today’s world and they are on the rise[20].With sophisticated tools, digital forensics is a great discipline for limiting and investigating such risks.The web browser is the most extensively used application for accessing content on the internet and serves as the user’s interface to the rest of the world.Visit web pages, access email accounts, use social media, and upload and download various files are all common browsing activities.There are three stages to forensic analysis such as registry snapshots followed by memory and storage images in the second and third stages respectively.

    The Regshot tool is used to take registry snapshots and to analyze them.During installation,this browser adds three registry keys, according to the research.After uninstallation, all of these keys remain in the registry, showing that it does not erase its registry artefacts.It is also revealed that in different instances that these keys are added in a different order as shown in Tab.4.The browser is installed in this case with the option to“Open browser automatically after installation.”The browser is automatically launched after installation.The first two keys were inserted into the registry.When the browser was reopened after being closed, the third key was added.

    Table 4: Artifacts of registry

    Table 4: Continued

    The browser is installed in this case without the option to“Open browser automatically after installation.”After the installation is complete, the first key is added.When the browser is opened,the second and third keys are added.These scenarios will be highly useful in circumstances when investigators want to determine if the individual only set up the Tor browser and if they used it after that.In respect to MS Word documents, various digital evidences can be recovered from memory.Al-Sharifet al.[21]developed a memory forensic technique based on the XML form utilized by MS Office internally.Different parts of MS Word can be recovered from memory to establish that the document was seen or modified by the user, according to their findings.Al-Saleh et al.[22] have investigated the effects of memory forensic methods on network reconnaissance detection.They made use of the data that can be retrieved from memory.Furthermore, they discovered that packets sent or received across the network can be stored in memory for a long time.Their findings revealed that memory analysis was useful in detecting assault artefacts.Primary artifacts recovered from Autopsy as shown in Fig.3.

    After installation, software leaves a large number of artifacts on the host machine.This section of the research focuses on recovering all of the artifact left on the host machine by Tor browser after installation and operation.For forensics analysis of obtained memory images, the Autopsy framework is employed.According tomemory analysis, the Tor browser has two processes inmemory: Firefox.exe.Other artifacts associated to these two processes are also recovered using their process ids.The key terms“Firefox”and“tor.exe”are used in obtaining information about Tor version artifacts for the two programs.

    The third VMware snapshot was obtained for the“Open Browser”scenario, while the fourth was engaged for the“Closed Browser”scenario, as detailed in Data Acquisition.These two VMware snapshots’memory images (.mem files) are examined for surfing evidence.For analysis, the tool bulk extractor and a Hex workshop are utilized [23].The bulk extractor is used for the majority of the analysis.Bulk extractor uses string search to locate links to user’s social media account profiles,the profiles visited, videos watched and another artifact.The current strings are derived from the address of the site visited and user names that are used during the user’s activity of browsing phase.Without utilizing strings searches, all of these artefacts can be found by analyzing all of the sites collected by Bulk Extractor, though this method is slower than string searches.Hex work-shops are used to search for email text in memory.To find these emails, the memory image was unwrapped using tool Hex workshop and various string explorations are conducted.During the user activities section, some strings from email text that are sent and received are also searched.The emails can also be recovered in memory without using string explorations by using hex workshop to display all strings present in memory completely.However, in the case of big memory images, this method is quite time consuming.All Gmail and Yahoo inbox emails, including unopened emails, are stored in memory when using Tor browser.Fig.4 illustrates some of the emails found using string searches in the memory image of the third snapshot.Public keys and other relevant information of Tor relays used during communication by Tor browser for transmitting its traffic can be found using the strings“PUBLIC KEY”and“Relay=.”IP address, Bandwidth, Ports, Name and Fingerprint, Tor version used, date and time of connection, and present status are among the other details (entry or exit) [24].Figs.5 and 6 show screenshots of public keys and some useful other information taken in the third VMware snapshot’s memory picture.

    Figure 3: Tor artifacts recovered from autopsy

    Figure 4: Recovered email artifacts using bulk extractor

    The “cached-certs”, “cached-microdesc-consensus”, “cached-microdescs” and “cached-microdescs.new” folders in TorBrowser/Browser/TorBrowser/Data/Tor also contain the same artifact.As demonstrated in A, B, and C these files are evaluated in Hex Workshop.Various artifact can assist LEA in tracking down a person using Tor for any criminal behavior through gathering evidence about the user’s browsing activities from these relays.Both memory pictures contained identical traces, indicating that Tor did not remove browsing history of user from memory when the Tor is closed.Tab.5 presents a detail of all the artifacts discovered in memory about user browsing behaviors.Fig.7 show screenshots of several of these artefacts.All of these artifacts were discovered using bulk extractor, with the exception of Yahoo and Gmail inbox messages, those are discovered using Hex workshop.

    Figure 5: Memory showing public key of tor relay

    Figure 6: Memory showing relay information of Tor

    Table 5: Browsing artifact recovered from memory

    Table 5: Continued

    The artifacts on the hard disk are analyzed when the browser is open using the Magnet Axiom to examine both the VMDK file of OS and the snapshot VMDK file of the third snapshot.The registry artifact found in these VMDK files are searched using Hex Workshop.The OS VMDK file is supported by Magnet Axiom, however the snapshot VMDK file is not.Using the image conversion method, we convert this VMDK file into EnCase Image File Format, which is supported by Axiom, using FTK imager.To confirm the integrity of converted snapshot VMDK files, hashes were calculated and matched before and after conversion using the FTK imager.FTK imager was also used to construct MD5 and SHA1 hashes for the OS virtual hard drive file.On the OS VMDK file, no Tor artifacts were discovered.This VMDK file was inspected in Hex Workshop for registry artifacts, and various string searches were conducted.In these searches, the strings“firefox.exe % b”and“SIGN.MEDIA=31C3D37”were used.In the OS VMDK file, there were no registry artifacts.However, as shown in Tab.6, various artifacts are discovered during the examination of the converted snapshot VMDK file.

    Figure 7: Twitter artifacts in memory

    Table 6: Tor browser artifacts on Hard Disk

    Magnet Axiom discovered artifacts that contained all of the download data.Torrent files are displayed as peer-to-peer artefacts, whereas downloaded photos were displayed as media artefacts.Apart from downloaded images, Axiom found a plethora of other photographs from the OS’s internal application.The Tor browser icon could also be seen in the photos, showing that Tor had been installed on the device.There was no other instance under the OS artefacts except for firefox.exe.During the collection of artifacts various artifacts of Tor browser regarding relays information has been recovered.This information is very useful in scenarios where back tracking is essentially required.This is done by obtaining the address of next node.Several artifacts recovered from Tor Browser are presented below as additional artifacts.

    This artifact is collected when the Tor Browser is open.“cached-cert”file located in Tor browser folder at Desktop was loaded in Hex workshop.The file contains public key of Tor Browser.This artifact is collected when the Tor Browser is open.“cached-microdesc.new”file located in Tor browser folder at Desktop was loaded in Hex workshop.The file contains public key of Tor Relay as shown in Figs.8-10.This artifact was collected when the Tor Browser is open.“cached-microdesc-consensus”file located in Tor browser folder at Desktop was loaded in Hex workshop.The file contains Relays information of Tor Browser.

    Various researches have been performed for the analysis of security and privacy of Tor browser[25].A few researches are found on the topic and detailed comparison of research is shown in Tab.7.In a research where windows 7 platform is used for analysis of Tor browser [26].Only memory was considered for obtaining artefacts for finding traces of Tor.Moreover, platform used was outdated.Whereas in our research many important artefacts were recovered from registry and hard disk as well as analysis performed on windows 10.Another research comprises on the analysis of user browsing artefacts from memory was presented [27].Authors also confirmed that Tor remove all of its artefacts from memory when it is closed.Where our results shows that Tor leaves artefact while it is closed.Analysis of registry and hard disk is also missing.A research performed on windows 10 presented analysis over windows 10 [28].But major drawback was no browser artefacts were collected and analysis performed [29].Another major findings of our research is tracing relays information from hard disk and memory.The relays information will be useful in backtracking process.No previous research on recover relay information of Tor forensic.Browsing artefacts are also recovered in previous research from our dated windows.Our research is capable of collecting browsing artefacts from memory and hard disk running OS windows 10.

    Figure 8: Cached-microdesc-consensus file contains relay information

    Figure 9: Cached-cert file finds public keys of tor relay

    Figure 10: Cached-microdesc.new file searches public key of tor relay

    Table 7: Research comparison

    Table 7: Continued

    5 Conclusion

    The forensic study of the Tor browser on Windows 10 is presented in this study.We observed the registry of the system, RAM and HDD for any traces that the Tor left on the user’s system when it’s open and when it’s closed.We were looking for evidence of installation of Tor, use, and browsingbehaviors.Thefindingsoftheresearchrevealthatthe Torleavesseveralartifactsontheuser’s computer, particularly in the system memory.By using different open source tools, all the necessary and sufficient available artifacts of the Tor browser were collected and analyzed.Network forensics is anessentialcomponentofanydigitalinquiry.The Torbrowser’snetworkforensicsisanareaofinterest for future research.This will aid in understanding the browser’s forensic behavior.We’re especially curious about the forensics of Orfox, the browser used for Android devices.Another app runs on Android that acts as a Tor proxy is Orbot.Our future research aims also involve forensic investigation of this application.

    Acknowledgement:This research is ongoing research supported by Yayasan Universiti Teknologi PETRONAS Grant Scheme; 015LC0029 and 015LC0277.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    91精品国产国语对白视频| 18禁裸乳无遮挡动漫免费视频| 七月丁香在线播放| av卡一久久| 国产精品一二三区在线看| 天天影视国产精品| 大话2 男鬼变身卡| 视频区图区小说| 制服人妻中文乱码| 99热全是精品| 另类亚洲欧美激情| 男的添女的下面高潮视频| 最近最新中文字幕免费大全7| 中国国产av一级| a 毛片基地| 韩国高清视频一区二区三区| 久久久精品区二区三区| 国语对白做爰xxxⅹ性视频网站| 免费大片18禁| 日本av免费视频播放| 在线播放无遮挡| 亚洲综合精品二区| 亚洲熟女精品中文字幕| 一个人免费看片子| av天堂久久9| 久久久a久久爽久久v久久| 在线免费观看不下载黄p国产| 国模一区二区三区四区视频| 王馨瑶露胸无遮挡在线观看| 性色avwww在线观看| 亚洲精品日本国产第一区| 在线观看www视频免费| 自线自在国产av| 国语对白做爰xxxⅹ性视频网站| av在线app专区| 九九久久精品国产亚洲av麻豆| 久久久久久久久久人人人人人人| 亚洲人与动物交配视频| 亚洲精品国产av成人精品| 高清av免费在线| 久久ye,这里只有精品| 免费大片18禁| 激情五月婷婷亚洲| 国产免费视频播放在线视频| 久久精品久久久久久噜噜老黄| 欧美激情 高清一区二区三区| 夜夜骑夜夜射夜夜干| 最近最新中文字幕免费大全7| 免费不卡的大黄色大毛片视频在线观看| 美女大奶头黄色视频| 日韩视频在线欧美| 亚洲四区av| 校园人妻丝袜中文字幕| 制服人妻中文乱码| 成人国语在线视频| 美女主播在线视频| 国产伦精品一区二区三区视频9| 这个男人来自地球电影免费观看 | 久久久久精品久久久久真实原创| 亚洲熟女精品中文字幕| 少妇丰满av| 亚洲国产精品专区欧美| 国产精品国产三级国产av玫瑰| 国产亚洲最大av| 18禁在线播放成人免费| 一区二区三区乱码不卡18| 久久人人爽人人片av| 丝袜喷水一区| 亚洲第一区二区三区不卡| 日韩三级伦理在线观看| 一本大道久久a久久精品| 精品亚洲乱码少妇综合久久| 18+在线观看网站| 性高湖久久久久久久久免费观看| 免费高清在线观看视频在线观看| 免费观看性生交大片5| 中文字幕制服av| 免费大片黄手机在线观看| 一区在线观看完整版| 国产综合精华液| 国产一级毛片在线| 久久国产精品大桥未久av| 菩萨蛮人人尽说江南好唐韦庄| 好男人视频免费观看在线| 亚洲图色成人| 在线看a的网站| 欧美精品国产亚洲| 久久精品国产亚洲网站| 亚洲精品美女久久av网站| 精品久久久久久久久亚洲| 国产免费视频播放在线视频| 欧美97在线视频| 纵有疾风起免费观看全集完整版| 青春草亚洲视频在线观看| 日本黄色片子视频| 夫妻性生交免费视频一级片| 大片电影免费在线观看免费| 亚洲成人一二三区av| 免费看光身美女| 久久精品国产自在天天线| 91精品国产国语对白视频| 亚洲国产精品国产精品| 中文天堂在线官网| 丰满迷人的少妇在线观看| 嘟嘟电影网在线观看| 亚洲,欧美,日韩| 日本色播在线视频| 国产在视频线精品| 99久久精品一区二区三区| 亚洲激情五月婷婷啪啪| 丰满迷人的少妇在线观看| 飞空精品影院首页| 精品国产露脸久久av麻豆| 国产欧美另类精品又又久久亚洲欧美| 午夜激情福利司机影院| 国产精品一区二区三区四区免费观看| 亚洲av福利一区| 下体分泌物呈黄色| 亚洲在久久综合| 少妇被粗大猛烈的视频| 免费日韩欧美在线观看| 欧美激情 高清一区二区三区| 婷婷色综合大香蕉| 国内精品宾馆在线| 久久av网站| 亚洲天堂av无毛| 久久国产亚洲av麻豆专区| 99久久人妻综合| 国产av码专区亚洲av| 精品久久久久久久久亚洲| 爱豆传媒免费全集在线观看| 高清av免费在线| 亚洲精品视频女| 伦理电影大哥的女人| 秋霞伦理黄片| 国产在线一区二区三区精| 毛片一级片免费看久久久久| 免费av中文字幕在线| 久久久国产一区二区| 亚洲国产欧美在线一区| 亚洲经典国产精华液单| 91精品国产九色| 久久精品久久精品一区二区三区| 国产国拍精品亚洲av在线观看| xxx大片免费视频| av国产精品久久久久影院| 人成视频在线观看免费观看| 性高湖久久久久久久久免费观看| 精品国产一区二区三区久久久樱花| 一级毛片黄色毛片免费观看视频| 亚洲伊人久久精品综合| 人妻 亚洲 视频| av不卡在线播放| 欧美日韩国产mv在线观看视频| 欧美丝袜亚洲另类| 国产又色又爽无遮挡免| 十八禁网站网址无遮挡| 一级毛片黄色毛片免费观看视频| 汤姆久久久久久久影院中文字幕| 99久久中文字幕三级久久日本| 精品少妇久久久久久888优播| 国产精品女同一区二区软件| 在线观看免费高清a一片| av卡一久久| 熟女人妻精品中文字幕| 精品亚洲乱码少妇综合久久| 国产精品人妻久久久久久| 色94色欧美一区二区| 色网站视频免费| 九九久久精品国产亚洲av麻豆| 伦理电影免费视频| 99久国产av精品国产电影| 欧美成人精品欧美一级黄| 夜夜爽夜夜爽视频| 国产欧美亚洲国产| 高清视频免费观看一区二区| 曰老女人黄片| 免费少妇av软件| 免费观看av网站的网址| 一区二区av电影网| 日本色播在线视频| 最新中文字幕久久久久| 国产精品一国产av| av网站免费在线观看视频| 久久女婷五月综合色啪小说| 看免费成人av毛片| 免费观看av网站的网址| 免费不卡的大黄色大毛片视频在线观看| 18禁在线无遮挡免费观看视频| 久久久久久久国产电影| 国产在线免费精品| 国产 一区精品| 日本午夜av视频| 日本wwww免费看| 18禁裸乳无遮挡动漫免费视频| 国产国拍精品亚洲av在线观看| 久久久久人妻精品一区果冻| 久久久久久久精品精品| 热re99久久国产66热| 国产亚洲精品久久久com| 简卡轻食公司| 国产亚洲一区二区精品| 国产欧美日韩一区二区三区在线 | 久久人妻熟女aⅴ| 亚洲av中文av极速乱| 亚洲精品日韩av片在线观看| 搡女人真爽免费视频火全软件| av又黄又爽大尺度在线免费看| 2018国产大陆天天弄谢| 亚洲美女视频黄频| 亚洲欧美精品自产自拍| 国产熟女午夜一区二区三区 | 亚洲精品av麻豆狂野| 丰满饥渴人妻一区二区三| 日韩视频在线欧美| 伊人久久精品亚洲午夜| 看免费成人av毛片| 超色免费av| 黄色怎么调成土黄色| 亚洲精品第二区| 国产成人一区二区在线| 亚洲怡红院男人天堂| 老司机影院成人| 伦精品一区二区三区| 日本wwww免费看| 在现免费观看毛片| 国产午夜精品一二区理论片| 伊人亚洲综合成人网| 日韩中文字幕视频在线看片| 观看美女的网站| av女优亚洲男人天堂| 午夜免费观看性视频| 色网站视频免费| 久久久久视频综合| 亚洲婷婷狠狠爱综合网| 黑人巨大精品欧美一区二区蜜桃 | 性高湖久久久久久久久免费观看| 午夜av观看不卡| 国产免费视频播放在线视频| 久久国产精品男人的天堂亚洲 | 91精品国产国语对白视频| 午夜视频国产福利| 菩萨蛮人人尽说江南好唐韦庄| 日韩一区二区三区影片| 久久久久久久久久久久大奶| 久久国内精品自在自线图片| 99精国产麻豆久久婷婷| 91精品伊人久久大香线蕉| 97超碰精品成人国产| 女人精品久久久久毛片| 在线亚洲精品国产二区图片欧美 | 国产爽快片一区二区三区| 国产永久视频网站| 久久久久网色| 中文字幕人妻丝袜制服| 啦啦啦视频在线资源免费观看| h视频一区二区三区| 精品一区二区免费观看| 免费观看无遮挡的男女| 日韩一区二区三区影片| 久久狼人影院| 汤姆久久久久久久影院中文字幕| 国产亚洲精品久久久com| 成年人免费黄色播放视频| 精品久久久久久久久av| 久久久a久久爽久久v久久| 国产一区二区在线观看日韩| 免费黄色在线免费观看| 久久热精品热| 五月天丁香电影| 国产精品一区二区三区四区免费观看| 精品少妇久久久久久888优播| 日韩一区二区视频免费看| 26uuu在线亚洲综合色| 国产黄色视频一区二区在线观看| 永久免费av网站大全| 毛片一级片免费看久久久久| 伦精品一区二区三区| 午夜久久久在线观看| 久久精品国产亚洲av天美| 久久99蜜桃精品久久| 男人爽女人下面视频在线观看| 成人免费观看视频高清| 啦啦啦中文免费视频观看日本| h视频一区二区三区| 中国三级夫妇交换| av在线app专区| 3wmmmm亚洲av在线观看| 亚洲国产欧美日韩在线播放| 蜜臀久久99精品久久宅男| 男人爽女人下面视频在线观看| 大陆偷拍与自拍| 国精品久久久久久国模美| 久久毛片免费看一区二区三区| 日韩中文字幕视频在线看片| 18禁动态无遮挡网站| 在线观看免费日韩欧美大片 | 如日韩欧美国产精品一区二区三区 | 最近2019中文字幕mv第一页| 我的老师免费观看完整版| 亚洲高清免费不卡视频| 欧美日本中文国产一区发布| 国产黄片视频在线免费观看| 国产精品国产av在线观看| 亚洲精品乱久久久久久| av在线老鸭窝| 国产精品国产三级国产av玫瑰| 亚洲精品乱码久久久v下载方式| 欧美日韩视频精品一区| 日本黄色片子视频| 中文欧美无线码| 午夜激情福利司机影院| 天天躁夜夜躁狠狠久久av| 人妻人人澡人人爽人人| 熟女电影av网| 美女cb高潮喷水在线观看| 人妻制服诱惑在线中文字幕| 中文字幕最新亚洲高清| h视频一区二区三区| 草草在线视频免费看| 特大巨黑吊av在线直播| av福利片在线| 蜜桃久久精品国产亚洲av| 如日韩欧美国产精品一区二区三区 | 免费人成在线观看视频色| 各种免费的搞黄视频| 亚洲精品乱码久久久v下载方式| 欧美人与性动交α欧美精品济南到 | 男人操女人黄网站| 在线免费观看不下载黄p国产| 中文天堂在线官网| 国产精品99久久99久久久不卡 | 成人二区视频| 哪个播放器可以免费观看大片| 在线免费观看不下载黄p国产| 亚洲av欧美aⅴ国产| 免费观看的影片在线观看| 亚洲成色77777| 91精品国产国语对白视频| 看免费成人av毛片| 在线观看免费高清a一片| 看免费成人av毛片| 免费大片18禁| 午夜视频国产福利| 国产精品一区二区在线不卡| 日韩在线高清观看一区二区三区| 欧美性感艳星| 人人妻人人爽人人添夜夜欢视频| 日本av手机在线免费观看| 日本91视频免费播放| 九九久久精品国产亚洲av麻豆| 99热这里只有精品一区| 视频区图区小说| 亚洲人成网站在线播| 看非洲黑人一级黄片| 欧美丝袜亚洲另类| 国产精品一国产av| 狠狠精品人妻久久久久久综合| 国产一区二区在线观看日韩| 亚洲不卡免费看| 视频区图区小说| 国产爽快片一区二区三区| 少妇丰满av| 久久久久久人妻| 看非洲黑人一级黄片| 狠狠精品人妻久久久久久综合| 3wmmmm亚洲av在线观看| 中文字幕亚洲精品专区| 久久久久精品久久久久真实原创| 自线自在国产av| 草草在线视频免费看| 99久久人妻综合| 精品久久久久久电影网| 亚洲国产毛片av蜜桃av| 亚洲国产欧美在线一区| 久热这里只有精品99| 亚洲内射少妇av| 午夜免费观看性视频| 黑人猛操日本美女一级片| 80岁老熟妇乱子伦牲交| 亚洲情色 制服丝袜| 99re6热这里在线精品视频| 久久久久久久精品精品| 黄色一级大片看看| 99久久综合免费| 欧美激情极品国产一区二区三区 | 亚洲av在线观看美女高潮| 视频区图区小说| av线在线观看网站| 99久久中文字幕三级久久日本| 久久久a久久爽久久v久久| 国产欧美另类精品又又久久亚洲欧美| h视频一区二区三区| 一级毛片电影观看| 欧美人与善性xxx| 久久青草综合色| 日本黄色日本黄色录像| 久久午夜福利片| 夫妻性生交免费视频一级片| 亚洲av免费高清在线观看| 国产成人精品久久久久久| a级毛片黄视频| 久久免费观看电影| 在线观看www视频免费| av免费观看日本| 99热这里只有精品一区| 中国三级夫妇交换| 日韩一区二区视频免费看| 91久久精品国产一区二区三区| 国产又色又爽无遮挡免| 最近中文字幕高清免费大全6| 午夜视频国产福利| 一级片'在线观看视频| 97在线人人人人妻| 精品久久久久久久久亚洲| 青春草国产在线视频| 边亲边吃奶的免费视频| 日韩欧美精品免费久久| 亚洲欧美成人精品一区二区| 亚洲精品乱久久久久久| 国产精品嫩草影院av在线观看| av有码第一页| 少妇人妻久久综合中文| 最近手机中文字幕大全| 日韩欧美一区视频在线观看| 五月伊人婷婷丁香| 99久久精品国产国产毛片| 精品酒店卫生间| 啦啦啦在线观看免费高清www| 少妇人妻精品综合一区二区| 精品国产一区二区三区久久久樱花| 搡老乐熟女国产| 十八禁高潮呻吟视频| 亚洲精品视频女| 久久女婷五月综合色啪小说| 色婷婷av一区二区三区视频| 成人毛片a级毛片在线播放| 免费观看性生交大片5| 中文字幕人妻熟人妻熟丝袜美| 亚洲精品乱码久久久久久按摩| 亚洲欧美中文字幕日韩二区| 国产精品99久久久久久久久| 97超视频在线观看视频| 国产乱人偷精品视频| 少妇被粗大猛烈的视频| 久久久精品区二区三区| 亚洲精品亚洲一区二区| 欧美精品亚洲一区二区| 日韩av不卡免费在线播放| 亚洲人与动物交配视频| 视频在线观看一区二区三区| 国产精品秋霞免费鲁丝片| 曰老女人黄片| 亚洲人成77777在线视频| 制服人妻中文乱码| 亚洲国产毛片av蜜桃av| 免费播放大片免费观看视频在线观看| 妹子高潮喷水视频| 一级,二级,三级黄色视频| 中文乱码字字幕精品一区二区三区| 老司机影院毛片| 一级毛片我不卡| 在线看a的网站| 国产精品国产三级国产专区5o| 少妇被粗大猛烈的视频| 久久久久久久亚洲中文字幕| 青春草亚洲视频在线观看| 少妇高潮的动态图| 女性被躁到高潮视频| 久久99精品国语久久久| 久久精品国产鲁丝片午夜精品| 国产成人精品婷婷| 亚洲久久久国产精品| 午夜福利视频精品| 国产女主播在线喷水免费视频网站| 建设人人有责人人尽责人人享有的| 精品久久久久久久久亚洲| 免费黄频网站在线观看国产| 亚洲欧洲精品一区二区精品久久久 | 成人亚洲精品一区在线观看| 国产精品熟女久久久久浪| 最新的欧美精品一区二区| 亚洲国产欧美日韩在线播放| 精品久久蜜臀av无| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 男人操女人黄网站| 一个人免费看片子| 亚洲国产精品一区三区| 成人亚洲欧美一区二区av| 熟女人妻精品中文字幕| 精品国产乱码久久久久久小说| 久久久久久久亚洲中文字幕| 黄片播放在线免费| 成人亚洲欧美一区二区av| 国产黄色视频一区二区在线观看| 99热国产这里只有精品6| 精品久久久噜噜| 免费大片18禁| 中文字幕人妻丝袜制服| 性色av一级| 色婷婷av一区二区三区视频| 免费看不卡的av| 日日摸夜夜添夜夜爱| 久久人妻熟女aⅴ| 麻豆精品久久久久久蜜桃| 国产欧美日韩综合在线一区二区| 精品视频人人做人人爽| 日日爽夜夜爽网站| 亚洲欧美一区二区三区黑人 | 亚洲欧美中文字幕日韩二区| 3wmmmm亚洲av在线观看| 精品视频人人做人人爽| 日日爽夜夜爽网站| 亚洲av欧美aⅴ国产| 中文字幕亚洲精品专区| 九色成人免费人妻av| 亚洲久久久国产精品| 亚洲精品国产av成人精品| 久久99精品国语久久久| 在线观看人妻少妇| 黄片播放在线免费| 永久网站在线| 国产无遮挡羞羞视频在线观看| 少妇人妻久久综合中文| 国产精品不卡视频一区二区| av电影中文网址| 亚洲精品久久久久久婷婷小说| 伊人久久国产一区二区| 伦理电影免费视频| 国产av精品麻豆| 秋霞在线观看毛片| 日韩不卡一区二区三区视频在线| 涩涩av久久男人的天堂| 一本—道久久a久久精品蜜桃钙片| 日本91视频免费播放| 亚洲,欧美,日韩| 在线观看国产h片| 国产在线视频一区二区| 国产免费视频播放在线视频| 插逼视频在线观看| 2021少妇久久久久久久久久久| 两个人的视频大全免费| 久久久久精品性色| 这个男人来自地球电影免费观看 | 成人免费观看视频高清| 午夜免费鲁丝| 亚洲成人av在线免费| 久久久久网色| 成人手机av| 久久精品国产鲁丝片午夜精品| 久久久国产一区二区| 亚洲性久久影院| 高清不卡的av网站| 日本-黄色视频高清免费观看| 亚洲国产精品成人久久小说| 免费人妻精品一区二区三区视频| 蜜桃久久精品国产亚洲av| 国产成人精品婷婷| 97超碰精品成人国产| 久久 成人 亚洲| 欧美xxⅹ黑人| 秋霞在线观看毛片| 日韩精品有码人妻一区| 国产一区有黄有色的免费视频| 多毛熟女@视频| 久久精品国产亚洲av涩爱| 18禁在线无遮挡免费观看视频| 免费观看av网站的网址| 国产精品一区www在线观看| av播播在线观看一区| 国产乱人偷精品视频| 少妇的逼好多水| 色5月婷婷丁香| 久久 成人 亚洲| 久久女婷五月综合色啪小说| av不卡在线播放| 国产永久视频网站| 天堂俺去俺来也www色官网| 最黄视频免费看| 午夜视频国产福利| 日韩免费高清中文字幕av| 中文欧美无线码| 日韩精品免费视频一区二区三区 | 亚洲国产精品成人久久小说| 国产精品秋霞免费鲁丝片| 尾随美女入室| 国产片特级美女逼逼视频| 亚洲美女视频黄频| 久久av网站| 亚洲国产精品成人久久小说| 国产一区二区在线观看av| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 美女国产视频在线观看| 亚洲国产精品999| 成年人午夜在线观看视频| 久久精品久久久久久噜噜老黄| 蜜桃在线观看..| 婷婷色综合www| 99热国产这里只有精品6| 亚洲精品一二三| 在线 av 中文字幕| 亚洲国产av新网站| 91精品三级在线观看| 亚洲欧美一区二区三区国产| 亚洲一级一片aⅴ在线观看| 大香蕉久久网| 在线免费观看不下载黄p国产| 日韩三级伦理在线观看| 国产白丝娇喘喷水9色精品| 少妇 在线观看| av又黄又爽大尺度在线免费看| 久久精品人人爽人人爽视色| 欧美丝袜亚洲另类| 国产亚洲午夜精品一区二区久久| 国产av码专区亚洲av|