青青草原综合久久大伊人导航_色综合久久天天综合_日日噜噜夜夜狠狠久久丁香五月_热久久这里只有精品

S.l.e!ep.¢%

像打了激速一樣,以四倍的速度運轉,開心的工作
簡單、開放、平等的公司文化;尊重個性、自由與個人價值;
posts - 1098, comments - 335, trackbacks - 0, articles - 1
  C++博客 :: 首頁 :: 新隨筆 :: 聯系 :: 聚合  :: 管理

通過修改 import table Hook API 的實現

Posted on 2009-09-20 00:16 S.l.e!ep.¢% 閱讀(1409) 評論(0)  編輯 收藏 引用 所屬分類: Windows

//HookDemo.cpp文件
#include <windows.h>
#include <stdio.h>
// 掛鉤指定模塊hMod對MessageBoxA的調用
BOOL SetHookApi(HMODULE hMod, LPCSTR lpstrDLLName, PROC pfnOldFun, PROC pfnNewFun);


HANDLE
WINAPI
MY_CreateIoCompletionPort(
??? HANDLE FileHandle,
??? HANDLE ExistingCompletionPort,
??? DWORD CompletionKey,
??? DWORD NumberOfConcurrentThreads
??? )
{
?return (HANDLE)3;
}

void main()
{
?::SetHookApi(::GetModuleHandle(NULL), "Kernel32.dll", (PROC)CreateIoCompletionPort, (PROC)MY_CreateIoCompletionPort);
?HANDLE h = ::CreateIoCompletionPort(NULL, NULL, 0, 0);
}

BOOL SetHookApi(HMODULE hMod, LPCSTR lpstrDLLName, PROC pfnOldFun, PROC pfnNewFun)
{
?IMAGE_DOS_HEADER* pDosHeader = (IMAGE_DOS_HEADER*)hMod;
?IMAGE_OPTIONAL_HEADER * pOptHeader = (IMAGE_OPTIONAL_HEADER *)((BYTE*)hMod + pDosHeader->e_lfanew + 24);
?IMAGE_IMPORT_DESCRIPTOR* pImportDesc = (IMAGE_IMPORT_DESCRIPTOR*)
???????????????????????????????????? ((BYTE*)hMod +
?????????????? pOptHeader->DataDirectory[IMAGE_DIRECTORY_ENTRY_IMPORT].VirtualAddress);

?// 在導入表中查找user32.dll模塊。因為MessageBoxA函數從user32.dll模塊導出
?while(pImportDesc->FirstThunk)
?{
??char* pszDllName = (char*)((BYTE*)hMod + pImportDesc->Name);
??if(lstrcmpiA(pszDllName, lpstrDLLName) == 0)
??{
???break;
??}
??pImportDesc++;
?}

?if(pImportDesc->FirstThunk)
?{
??// 一個IMAGE_THUNK_DATA就是一個雙字,它指定了一個導入函數
??// 調入地址表其實是IMAGE_THUNK_DATA結構的數組,也就是DWORD數組
??IMAGE_THUNK_DATA* pThunk = (IMAGE_THUNK_DATA*)
???((BYTE*)hMod + pImportDesc->FirstThunk);

??while(pThunk->u1.Function)
??{
???// lpAddr指向的內存保存了函數的地址
???DWORD* lpAddr = (DWORD*)&(pThunk->u1.Function);
???if(*lpAddr == (DWORD)pfnOldFun)
???{
????DWORD dwOldProtect;
????MEMORY_BASIC_INFORMATION mb;
????VirtualQuery(lpAddr, &mb, sizeof(mb));
????VirtualProtect(lpAddr, sizeof(DWORD), PAGE_READWRITE, &dwOldProtect);

????// 修改IAT表項,使其指向我們自定義的函數,相當于“*lpAddr = (DWORD)MyMessageBoxA;”
????DWORD* lpNewProc = (DWORD*)pfnNewFun;

????::WriteProcessMemory(::GetCurrentProcess(),
?????lpAddr, &lpNewProc, sizeof(DWORD), NULL);
????VirtualProtect(lpAddr, sizeof(DWORD), dwOldProtect, 0);
????return TRUE;
???}

???pThunk++;
??}
?}

?return FALSE;
}


////////////////////////////////////////////////////////////////////////////////////////////////////////////
APIHIJACK.H

/*--------------------------------------------------------------------------------------------------------
? APIHIJACK.H - Based on DelayLoadProfileDLL.CPP, by Matt Pietrek for MSJ February 2000.
? http://msdn.microsoft.com/library/periodic/period00/hood0200.htm
? Adapted by Wade Brainerd, wadeb@wadeb.com
--------------------------------------------------------------------------------------------------------*/
#ifndef APIHIJACK_H
#define APIHIJACK_H

#pragma warning(disable:4200)

// Macro for convenient pointer addition.
// Essentially treats the last two parameters as DWORDs.? The first
// parameter is used to typecast the result to the appropriate pointer type.
#define MakePtr(cast, ptr, addValue ) (cast)( (DWORD)(ptr)+(DWORD)(addValue))

// Default Hook Stub Structure: Contains data about the original function, Name/Ordinal, Address
// and a Count field.? This is actually a block of assembly code.
#pragma pack( push, 1 )
struct DLPD_IAT_STUB
{
??? BYTE??? instr_CALL;
??? DWORD?? data_call;
??? BYTE??? instr_JMP;
??? DWORD?? data_JMP;
??? DWORD?? count;
??? DWORD?? pszNameOrOrdinal;

??? DLPD_IAT_STUB() : instr_CALL( 0xE8 ), instr_JMP( 0xE9 ), count( 0 ) {}
};
#pragma pack( pop )

// Example DefaultHook procedure, called from the DLPD_IAT_STUB stubs.?
// Increments "count" field of the stub.
// See the implementation for more information.
void __cdecl DefaultHook( PVOID dummy );

struct SFunctionHook
{
??? char* Name;???????? // Function name, e.g. "DirectDrawCreateEx".
??? void* HookFn;?????? // Address of your function.
??? void* OrigFn;?????? // Stored by HookAPICalls, the address of the original function.
};

struct SDLLHook
{
??? // Name of the DLL, e.g. "DDRAW.DLL"
??? char* Name;

??? // Set true to call the default for all non-hooked functions before they are executed.
??? bool UseDefault;
??? void* DefaultFn;

??? // Function hook array.? Terminated with a NULL Name field.
??? SFunctionHook Functions[];
};

// Hook functions one or more DLLs.
bool HookAPICalls( SDLLHook* Hook );

#endif

//////////////////////////////////////////////////////////////////
APIHIJACK.CPP

/*--------------------------------------------------------------------------------------------------------
??? APIHIJACK.CPP - Based on DelayLoadProfileDLL.CPP, by Matt Pietrek for MSJ February 2000.
??? http://msdn.microsoft.com/library/periodic/period00/hood0200.htm
??? Adapted by Wade Brainerd, wadeb@wadeb.com
--------------------------------------------------------------------------------------------------------*/
#define WIN32_LEAN_AND_MEAN
#include <windows.h>
#include <stdio.h>
#include "apihijack.h"

//===========================================================================
// Called from the DLPD_IAT_STUB stubs.? Increments "count" field of the stub

void __cdecl DefaultHook( PVOID dummy )
{
??? __asm?? pushad? // Save all general purpose registers

??? // Get return address, then subtract 5 (size of a CALL X instruction)
??? // The result points at a DLPD_IAT_STUB

??? // pointer math!? &dummy-1 really subtracts sizeof(PVOID)
??? PDWORD pRetAddr = (PDWORD)(&dummy - 1);

??? DLPD_IAT_STUB * pDLPDStub = (DLPD_IAT_STUB *)(*pRetAddr - 5);

??? pDLPDStub->count++;

??? #if 0
??? // Remove the above conditional to get a cheezy API trace from
??? // the loader process.? It's slow!
??? if ( !IMAGE_SNAP_BY_ORDINAL( pDLPDStub->pszNameOrOrdinal) )
??? {
??????? OutputDebugString( "Called hooked function: " );
??????? OutputDebugString( (PSTR)pDLPDStub->pszNameOrOrdinal );
??????? OutputDebugString( "\n" );
??? }
??? #endif

??? __asm?? popad?? // Restore all general purpose registers
}

// This function must be __cdecl!!!
void __cdecl DelayLoadProfileDLL_UpdateCount( PVOID dummy );

PIMAGE_IMPORT_DESCRIPTOR g_pFirstImportDesc;

//===========================================================================
// Given an HMODULE, returns a pointer to the PE header

PIMAGE_NT_HEADERS PEHeaderFromHModule(HMODULE hModule)
{
??? PIMAGE_NT_HEADERS pNTHeader = 0;
???
??? __try
??? {
??????? if ( PIMAGE_DOS_HEADER(hModule)->e_magic != IMAGE_DOS_SIGNATURE )
??????????? __leave;

??????? pNTHeader = PIMAGE_NT_HEADERS(PBYTE(hModule)
??????????????????? + PIMAGE_DOS_HEADER(hModule)->e_lfanew);
???????
??????? if ( pNTHeader->Signature != IMAGE_NT_SIGNATURE )
??????????? pNTHeader = 0;
??? }
??? __except( EXCEPTION_EXECUTE_HANDLER )
??? {??????
??? }

??? return pNTHeader;
}

//===========================================================================
// Builds stubs for and redirects the IAT for one DLL (pImportDesc)

bool RedirectIAT( SDLLHook* DLLHook, PIMAGE_IMPORT_DESCRIPTOR pImportDesc, PVOID pBaseLoadAddr )
{
??? PIMAGE_THUNK_DATA pIAT;???? // Ptr to import address table
??? PIMAGE_THUNK_DATA pINT;???? // Ptr to import names table
??? PIMAGE_THUNK_DATA pIteratingIAT;

??? // Figure out which OS platform we're on
??? OSVERSIONINFO osvi;
??? osvi.dwOSVersionInfoSize = sizeof(osvi);
??? GetVersionEx( &osvi );

??? // If no import names table, we can't redirect this, so bail
??? if ( pImportDesc->OriginalFirstThunk == 0 )
??????? return false;

??? pIAT = MakePtr( PIMAGE_THUNK_DATA, pBaseLoadAddr, pImportDesc->FirstThunk );
??? pINT = MakePtr( PIMAGE_THUNK_DATA, pBaseLoadAddr, pImportDesc->OriginalFirstThunk );

??? // Count how many entries there are in this IAT.? Array is 0 terminated
??? pIteratingIAT = pIAT;
??? unsigned cFuncs = 0;
??? while ( pIteratingIAT->u1.Function )
??? {
??????? cFuncs++;
??????? pIteratingIAT++;
??? }

??? if ( cFuncs == 0 )? // If no imported functions, we're done!
??????? return false;

??? // These next few lines ensure that we'll be able to modify the IAT,
??? // which is often in a read-only section in the EXE.
??? DWORD flOldProtect, flNewProtect, flDontCare;
??? MEMORY_BASIC_INFORMATION mbi;
???
??? // Get the current protection attributes???????????????????????????
??? VirtualQuery( pIAT, &mbi, sizeof(mbi) );
???
??? // remove ReadOnly and ExecuteRead attributes, add on ReadWrite flag
??? flNewProtect = mbi.Protect;
??? flNewProtect &= ~(PAGE_READONLY | PAGE_EXECUTE_READ);
??? flNewProtect |= (PAGE_READWRITE);
???
??? if ( !VirtualProtect(?? pIAT, sizeof(PVOID) * cFuncs,
??????????????????????????? flNewProtect, &flOldProtect) )
??? {
??????? return false;
??? }

??? // If the Default hook is enabled, build an array of redirection stubs in the processes memory.
??? DLPD_IAT_STUB * pStubs = 0;
??? if ( DLLHook->UseDefault )
??? {
??????? // Allocate memory for the redirection stubs.? Make one extra stub at the
??????? // end to be a sentinel
??????? pStubs = new DLPD_IAT_STUB[ cFuncs + 1];
??????? if ( !pStubs )
??????????? return false;
??? }

??? // Scan through the IAT, completing the stubs and redirecting the IAT
??? // entries to point to the stubs
??? pIteratingIAT = pIAT;

??? while ( pIteratingIAT->u1.Function )
??? {
??????? void* HookFn = 0;? // Set to either the SFunctionHook or pStubs.

??????? if ( !IMAGE_SNAP_BY_ORDINAL( pINT->u1.Ordinal ) )? // import by name
??????? {
??????????? PIMAGE_IMPORT_BY_NAME pImportName = MakePtr( PIMAGE_IMPORT_BY_NAME, pBaseLoadAddr, pINT->u1.AddressOfData );

??????????? // Iterate through the hook functions, searching for this import.
??????????? SFunctionHook* FHook = DLLHook->Functions;
??????????? while ( FHook->Name )
??????????? {
??????????????? if ( lstrcmpi( FHook->Name, (char*)pImportName->Name ) == 0 )
??????????????? {
??????????????????? OutputDebugString( "Hooked function: " );
??????????????????? OutputDebugString( (char*)pImportName->Name );
??????????????????? OutputDebugString( "\n" );

??????????????????? // Save the old function in the SFunctionHook structure and get the new one.
??????????????????? FHook->OrigFn = pIteratingIAT->u1.Function;
??????????????????? HookFn = FHook->HookFn;
??????????????????? break;
??????????????? }

??????????????? FHook++;
??????????? }

??????????? // If the default function is enabled, store the name for the user.
??????????? if ( DLLHook->UseDefault )
??????????????? pStubs->pszNameOrOrdinal = (DWORD)&pImportName->Name;
??????? }
??????? else
??????? {
??????????? // If the default function is enabled, store the ordinal for the user.
??????????? if ( DLLHook->UseDefault )
??????????????? pStubs->pszNameOrOrdinal = pINT->u1.Ordinal;
??????? }

??????? // If the default function is enabled, fill in the fields to the stub code.
??????? if ( DLLHook->UseDefault )
??????? {
??????????? pStubs->data_call = (DWORD)(PDWORD)DLLHook->DefaultFn
??????????????????????????????? - (DWORD)(PDWORD)&pStubs->instr_JMP;
??????????? pStubs->data_JMP = *(PDWORD)pIteratingIAT - (DWORD)(PDWORD)&pStubs->count;

??????????? // If it wasn't manually hooked, use the Stub function.
??????????? if ( !HookFn )
??????????????? HookFn = (void*)pStubs;
??????? }

??????? // Replace the IAT function pointer if we have a hook.
??????? if ( HookFn )
??????? {
??????????? // Cheez-o hack to see if what we're importing is code or data.
??????????? // If it's code, we shouldn't be able to write to it
??????????? if ( IsBadWritePtr( (PVOID)pIteratingIAT->u1.Function, 1 ) )
??????????? {
??????????????? pIteratingIAT->u1.Function = (PDWORD)HookFn;
??????????? }
??????????? else if ( osvi.dwPlatformId == VER_PLATFORM_WIN32_WINDOWS )
??????????? {
??????????????? // Special hack for Win9X, which builds stubs for imported
??????????????? // functions in system DLLs (Loaded above 2GB).? These stubs are
??????????????? // writeable, so we have to explicitly check for this case
??????????????? if ( pIteratingIAT->u1.Function > (PDWORD)0x80000000 )
??????????????????? pIteratingIAT->u1.Function = (PDWORD)HookFn;
??????????? }
??????? }

??????? if ( DLLHook->UseDefault )
??????????? pStubs++;?????????? // Advance to next stub

??????? pIteratingIAT++;??? // Advance to next IAT entry
??????? pINT++;???????????? // Advance to next INT entry
??? }

??? if ( DLLHook->UseDefault )
??????? pStubs->pszNameOrOrdinal = 0;?? // Final stub is a sentinel

??? // Put the page attributes back the way they were.
??? VirtualProtect( pIAT, sizeof(PVOID) * cFuncs, flOldProtect, &flDontCare);
???
??? return true;
}

//===========================================================================
// Top level routine to find the EXE's imports, and redirect them
bool HookAPICalls( SDLLHook* Hook )
{
??? if ( !Hook )
??????? return false;

??? HMODULE hModEXE = GetModuleHandle( 0 );

??? PIMAGE_NT_HEADERS pExeNTHdr = PEHeaderFromHModule( hModEXE );
???
??? if ( !pExeNTHdr )
??????? return false;

??? DWORD importRVA = pExeNTHdr->OptionalHeader.DataDirectory
??????????????????????? [IMAGE_DIRECTORY_ENTRY_IMPORT].VirtualAddress;
??? if ( !importRVA )
??????? return false;

??? // Convert imports RVA to a usable pointer
??? PIMAGE_IMPORT_DESCRIPTOR pImportDesc = MakePtr( PIMAGE_IMPORT_DESCRIPTOR,
??????????????????????????????????????????????????? hModEXE, importRVA );

??? // Save off imports address in a global for later use
??? g_pFirstImportDesc = pImportDesc;??

??? // Iterate through each import descriptor, and redirect if appropriate
??? while ( pImportDesc->FirstThunk )
??? {
??????? PSTR pszImportModuleName = MakePtr( PSTR, hModEXE, pImportDesc->Name);

??????? if ( lstrcmpi( pszImportModuleName, Hook->Name ) == 0 )
??????? {
??????????? OutputDebugString( "Found " );
??????????? OutputDebugString( Hook->Name );
??????????? OutputDebugString( "...\n" );

??????????? RedirectIAT( Hook, pImportDesc, (PVOID)hModEXE );
??????? }
???????
??????? pImportDesc++;? // Advance to next import descriptor
??? }

??? return true;
}



SDLLHook D3DHook =
{
??? "DDRAW.DLL",
??? false, NULL,??// Default hook disabled, NULL function pointer.
??? {
??????? { "DirectDrawCreateEx", MyDirectDrawCreateEx },
??????? { NULL, NULL }
??? }
};

// Hook function.
HRESULT WINAPI MyDirectDrawCreateEx( GUID FAR * lpGuid, LPVOID? *lplpDD, REFIID? iid,IUnknown FAR *pUnkOuter )
{
??? // Let the world know we're working.
??? MessageBeep( MB_ICONINFORMATION );

??? OutputDebugString( "TESTDLL: MyDirectDrawCreateEx called.\n" );

??? DirectDrawCreateEx_Type OldFn =
??????? (DirectDrawCreateEx_Type)D3DHook.Functions[D3DFN_DirectDrawCreateEx].OrigFn;
??? return OldFn( lpGuid, lplpDD, iid, pUnkOuter );
}

HookAPICalls( &D3DHook );

青青草原综合久久大伊人导航_色综合久久天天综合_日日噜噜夜夜狠狠久久丁香五月_热久久这里只有精品
  • <ins id="pjuwb"></ins>
    <blockquote id="pjuwb"><pre id="pjuwb"></pre></blockquote>
    <noscript id="pjuwb"></noscript>
          <sup id="pjuwb"><pre id="pjuwb"></pre></sup>
            <dd id="pjuwb"></dd>
            <abbr id="pjuwb"></abbr>
            午夜欧美大尺度福利影院在线看| 亚洲国产精品一区二区三区| 99国产精品久久久久久久| 麻豆精品视频在线| 1204国产成人精品视频| 欧美成人精品| 欧美黄色日本| 中文日韩电影网站| 亚洲一区二区成人| 国产一区二三区| 欧美成人第一页| 欧美激情一区在线观看| 亚洲一区二区三区四区五区午夜| 一区二区三区国产精品| 国产美女精品视频免费观看| 亚洲综合电影| 欧美在线日韩| 激情亚洲网站| 亚洲黄色大片| 国产精品久久久久久久久久直播| 午夜精品久久久久久久久久久久| 一区二区三区国产精华| 国产亚洲精品福利| 亚洲三级性片| 国产美女精品一区二区三区| 理论片一区二区在线| 欧美成人资源网| 午夜精品福利一区二区蜜股av| 欧美在线看片| av成人免费| 久久国产精品久久久久久电车| 亚洲国产精品一区二区尤物区| 亚洲精品欧美日韩专区| 国产一区二区三区久久悠悠色av | 国产精品日韩二区| 欧美 日韩 国产 一区| 国产精品久久久久9999| 美日韩丰满少妇在线观看| 国产精品国产亚洲精品看不卡15| 久久天天躁夜夜躁狠狠躁2022 | 欧美福利影院| 国产精品老牛| 亚洲精品国精品久久99热| 国产午夜精品一区二区三区欧美| 亚洲国产精品一区| 国产婷婷一区二区| 一区二区三区.www| 亚洲人妖在线| 久久精品国产99精品国产亚洲性色 | 在线观看日韩专区| 亚洲深夜福利网站| 亚洲免费av电影| 久久久亚洲影院你懂的| 亚洲激情校园春色| 亚洲视频一区二区免费在线观看| 亚洲精品久久视频| 久久久精品性| 久久精品国产免费| 国产精品久久午夜夜伦鲁鲁| 亚洲区一区二| 亚洲精品乱码视频 | 久久er精品视频| 国产精品理论片| 亚洲作爱视频| 一区二区三区 在线观看视频| 久久久高清一区二区三区| 日韩一区二区久久| 久久久久成人精品免费播放动漫| 久久福利毛片| 国产日产高清欧美一区二区三区| 宅男噜噜噜66国产日韩在线观看| 99精品视频免费在线观看| 欧美高清视频| 亚洲欧洲一区二区天堂久久| 亚洲黄页一区| 欧美国产在线视频| 亚洲人体偷拍| 亚洲网站视频| 国产精品日韩欧美一区| 亚洲一区二区三区高清| 午夜在线视频一区二区区别 | 久久久国产精品一区| 亚洲女同性videos| 欧美精品成人一区二区在线观看| 欧美激情一区二区三区在线视频观看 | 午夜精品一区二区在线观看| 久久国产精品网站| 在线日本成人| 欧美精品一区在线播放| 亚洲免费观看在线视频| 亚洲小说欧美另类社区| 欧美激情一区二区三区在线| 亚洲精品在线一区二区| 亚洲一区免费网站| 国产欧美日韩亚洲一区二区三区| 欧美一区二区三区播放老司机| 久久婷婷av| 亚洲三级国产| 国产精品女主播| 久久久www成人免费精品| 欧美成人dvd在线视频| 99视频精品免费观看| 欧美精品一级| 欧美一区激情| 91久久精品www人人做人人爽| 国产精品99久久久久久白浆小说| 国产精品白丝av嫩草影院 | 麻豆精品视频在线观看| 夜夜嗨av一区二区三区网站四季av | 欧美激情视频一区二区三区免费 | 国产区在线观看成人精品| 久久综合色婷婷| 国产精品99久久久久久人| 久久综合国产精品| 亚洲线精品一区二区三区八戒| 国产一区二区按摩在线观看| 欧美国产三级| 亚洲视频一区二区| 欧美自拍偷拍午夜视频| 亚洲精品一区二区三区在线观看| 国产九色精品成人porny| 欧美福利视频在线观看| 国产亚洲欧洲997久久综合| 欧美精品在线极品| 欧美一区日韩一区| 一区二区三区欧美在线| 亚洲国产日韩美| 老牛嫩草一区二区三区日本| 亚洲一区久久久| 一本色道**综合亚洲精品蜜桃冫 | 亚洲女性喷水在线观看一区| 欧美国产日韩二区| 久久久噜噜噜久久人人看| 亚洲小视频在线观看| 99精品热6080yy久久| 亚洲国产mv| 一区二区三区在线视频观看| 欧美韩日一区二区三区| 久久深夜福利| 久久久久久久综合| 久久精品国产久精国产爱| 亚洲欧美日本国产有色| 亚洲视频在线播放| 一区二区免费在线播放| 亚洲伦伦在线| 亚洲欧美日韩另类精品一区二区三区| 亚洲制服少妇| 久久国产精品第一页| 蜜臀va亚洲va欧美va天堂| 欧美大胆人体视频| 欧美视频二区36p| 国产欧美日韩精品a在线观看| 国产偷国产偷精品高清尤物| 精东粉嫩av免费一区二区三区| 伊人婷婷久久| 日韩一级免费观看| 午夜欧美精品久久久久久久| 久久久人成影片一区二区三区观看| 久久久噜久噜久久综合| 亚洲成人直播| 在线视频一区观看| 久久精品国产精品亚洲综合 | 亚洲性线免费观看视频成熟| 午夜伦理片一区| 噜噜爱69成人精品| 欧美体内谢she精2性欧美| 国产一区导航| aaa亚洲精品一二三区| 欧美一区二区三区啪啪| 欧美激情1区2区| 国产精品中文字幕欧美| 亚洲欧洲一区二区三区| 亚洲专区国产精品| 欧美刺激午夜性久久久久久久| 一区二区日韩伦理片| 久热国产精品视频| 国产精品一区免费视频| 亚洲精品一二| 久久久亚洲精品一区二区三区| 亚洲青涩在线| 久久天天综合| 国产视频一区三区| 在线视频欧美精品| 免费日韩av| 欧美亚洲一区在线| 欧美日韩在线不卡一区| 尤物九九久久国产精品的分类| 亚洲香蕉网站| 亚洲区中文字幕| 噜噜噜躁狠狠躁狠狠精品视频| 国产精品每日更新| 一本色道**综合亚洲精品蜜桃冫| 久久综合九色欧美综合狠狠| 亚洲一区二区欧美日韩| 欧美另类极品videosbest最新版本| 国产视频精品xxxx| 亚洲欧美国内爽妇网| 亚洲精选一区| 欧美精品在线一区| 亚洲精品视频在线观看网站|