脱式计算是什么意思| 鼻塞有脓鼻涕吃什么药| 樱菜是什么菜| 做流产手术需要准备什么东西| 牙龈肿痛吃什么药好| 食指有痣代表什么意思| 叶酸对人体有什么好处| 8月8号什么星座| 蓝天白云是什么生肖| 喜怒无常是什么意思| 炸薯条用什么淀粉| 椰土是什么| 离卦代表什么| 二个月不来月经是什么原因| 喝什么牛奶好| 心肌缺血吃什么药管用| 性感染有什么症状| 下馆子什么意思| 皇后是什么意思| 低烧是什么原因引起的| 宝宝喜欢趴着睡觉是什么原因| 宫颈肥大是什么原因| 潍坊有什么好玩的| 猫腻是什么意思| 妇科炎症是什么原因引起的| 什么样的人不能献血| 下套什么意思| 烫伤用什么药| 东边日出西边雨是什么生肖| 阳明病是什么意思| 打粉是什么意思| 载体是什么意思| 牛肉炖什么好吃又营养| 溜肩是什么意思| 什么是凶宅| 翘楚是什么意思| 炉甘石是什么东西| 前列腺增大是什么意思| 早上7点到9点是什么时辰| kg是什么单位| 脚侧面骨头突出叫什么| 浅表性胃炎吃什么中成药最好| 孩子流口水是什么原因引起的| 物是人非什么意思| 去化是什么意思| 中出是什么意识| 喝茶心慌的人什么体质| 厨子什么意思| 行政许可是什么意思| 拉尿有泡沫是什么原因| 肾结石什么不可以吃| 女性为什么会感染hpv| 肚脐眼臭是什么原因| 早孕三项检查什么| 为什么睡觉总是做梦| 老公工作劳累炖什么汤| 腠理是什么意思| 中暑吃什么水果好| 性出血是什么原因造成的呢要怎么办| 拿手机手抖是什么原因| 飞机杯有什么用| 申字五行属什么| 曹操是什么时期的人| 神经官能症是什么病| 胆红素高是什么原因| 眼压是什么意思| 赵匡胤为什么不传位给儿子| tao是什么意思| 寻麻疹吃什么药| 荨麻疹是什么病| 情劫什么意思| 胳膊肘往外拐是什么意思| 为什么胸会痒| 疱疹用什么药可以根治| 宫内孕和宫外孕有什么区别| 老流口水是什么原因| 丁胺卡那又叫什么药名| 身上长白色的斑点是什么原因| 闺蜜过生日送什么礼物好| 不是什么意思| 微信号为什么会封号| 八卦分别代表什么| 舌苔开裂是什么原因呢| 红斑是什么病| 蝉什么时候叫| 向日葵的花语是什么| 鼻子痒是什么原因| 上车饺子下车面什么意思| 臀纹不对称有什么影响| 什么蔬菜| 火花塞坏了有什么症状| prich是什么牌子| 白矾和明矾有什么区别| 右耳朵耳鸣是什么原因| 存款准备金率下调意味着什么| 站久了腰疼是什么原因| 水饮是什么意思| 吐黑水是什么原因| 七情六欲是什么意思| 人为什么会失眠| 豆浆喝多了有什么副作用| 什么东西驱蛇效果最好| 珍母口服液有什么作用| 夏字五行属什么| 灰指甲有什么危害| 女人戴黄金有什么好处| 唾液腺是什么组织| 预包装食品指的是什么| 泌乳素是什么意思| 杀什么吓什么| 月经没来吃什么药可以催月经来| 吃什么容易减肥| 羊肉和什么食物相克| 什么消炎药最好| 热天不出汗是什么原因| 脉跳的快是什么原因| 梦见吃酒席是什么意思| 6合是什么生肖| 小脑的功能是什么| 什么品种的狗最粘人| 绿松石是什么| 桥本甲状腺炎是什么意思| 长期便秘喝什么茶好| 肝内小钙化灶是什么意思| 精子不液化吃什么药| 谷雨是什么时候| 笔触是什么意思| 红薯开花预示着什么| 苦瓜对肝脏有什么好处| 心悸是什么意思啊| 脉细是什么意思| 喝菊花茶有什么功效| 包涵是什么意思| 脑垂体挂什么科| 什么东西越晒越湿| 1992属什么生肖| 一个口一个且念什么| 什么时候买机票便宜| 对唔嗨住什么意思| 女人吃秋葵有什么好处| 婊子是什么生肖| 性早熟有什么症状| 4级手术是什么意思| 江湖是什么| 发生火灾时的正确做法是什么| 子时属什么生肖| 二十四节气分别是什么| 冰岛说什么语言| 肝硬化吃什么药| 盆腔积液是什么意思啊| 蚊子怕什么味道| 疼痛科属于什么科| 固精缩尿是什么意思| 性病都有什么| 心脏有早搏吃什么药好| 头面是什么| 梦见人头是什么征兆| 窦性心律不齐是什么情况| 可乐煮姜有什么作用| 四肢发达是什么生肖| 阿昔洛韦片是什么药| 喜欢吃冰的是什么原因| 一吃东西就牙疼是什么原因引起的| 城字五行属什么| 三七粉主要治什么病| 什么茶不影响睡眠| 什么药降尿蛋白| 朋友的意义是什么| 决明子和什么搭配最好| 复印病历需要什么证件| 吃什么对甲状腺有好处| 拔罐后要注意什么| 曌是什么意思| 胃酸分泌过多是什么原因造成的| 狗男和什么属相最配| 减肥头晕是什么原因| 肩膀疼应该挂什么科| 鼻塞吃什么药| 食粉是什么粉| 中国在什么半球| 先天性心脏病最怕什么| 蓝莓有什么营养价值| 今天是什么日子老黄历| 正三角形是什么| 男人有泪痣代表什么| 长期喝饮料对身体有什么危害| 尿道感染吃什么消炎药| 蓦然是什么意思| 量程是什么| 克罗心是什么档次| 螺内酯片是什么药| 什么叫伴手礼| single是什么意思| 1.30是什么星座| 蛋白粉和胶原蛋白粉有什么区别| 吃什么愈合伤口恢复最快| 攒肚是什么意思| 黄疸高对婴儿有什么影响| 什么的风儿| 头孢加酒有什么反应| 头发干枯毛躁用什么洗发水| 二氧化碳有什么作用| dw是什么牌子| 头麻是什么病的前兆| 龙胆草长什么样| 什么民族不吃猪肉| 什么t恤质量好| 什么是矿泉水| 肝火旺盛是什么原因引起的| 蔓越莓对女性妇科有什么好处| 干是什么意思| 什么生花| 看腋臭挂什么科| 优格是什么| 贵姓是什么意思| 内痔是什么样的图片| 耐信是什么药| 甲硝唑的副作用是什么| 经期吃什么| 气血不足吃什么中成药最好| 贫血做什么检查能查出来| 生地和熟地有什么区别| 屁特别臭是什么原因| 漏尿是什么原因造成的| 胸骨后是什么位置图| 进字五行属什么| 肺火吃什么中成药| 脑缺血吃什么药| 什么言| 莲蓬乳是什么| 杭州落户需要什么条件| 心悸是什么病| 或缺是什么意思| 番茄红素有什么作用| 什么东西嘴里没有舌头| 什么的遐想| 金银花泡水喝有什么功效| 淋巴结肿大是什么样子| 什么地躺着| 菊花有什么作用| 用什么回奶最快最有效| 拉姆什么意思| 五月十八什么星座| 七月出生的是什么星座| 汗蒸有什么好处和功效| 豌豆荚是什么| 手癣用什么药膏效果好| 跪舔是什么意思| 坐月子可以吃什么零食| 玉米什么时候打药| 五谷有什么| 生理盐水是什么东西| 大马猴是什么意思| 批号是什么意思| 眉毛变白是什么原因| 头痛反胃想吐什么原因| 立秋是什么时候| 西凤酒是什么香型| 1996年是什么命| 什么不宁| 南瓜和什么食物相克| 紫皮大蒜和白皮大蒜有什么区别| 柿子和什么不能一起吃| 70年的狗是什么命| 百度Jump to content

6个远离职业病小妙招

From Wikipedia, the free encyclopedia
Hex dump of the Blaster worm, showing a message left for Microsoft CEO Bill Gates by the worm's creator
Spread of Conficker worm
百度 另外,她发现,自去年下半年开始,电影票平台价格显示均价30-40元,而前一年的均价为20元。

A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.[1] It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers. When these new worm-invaded computers are controlled, the worm will continue to scan and infect other computers using these computers as hosts, and this behaviour will continue.[2] Computer worms use recursive methods to copy themselves without host programs and distribute themselves based on exploiting the advantages of exponential growth, thus controlling and infecting more and more computers in a short time.[3] Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

Many worms are designed only to spread, and do not attempt to change the systems they pass through. However, as the Morris worm and Mydoom showed, even these "payload-free" worms can cause major disruption by increasing network traffic and other unintended effects.

History

[edit]

The first ever computer worm is generally accepted to be a self-replicating version of Creeper created by Ray Tomlinson and Bob Thomas at BBN in 1971 to replicate itself across the ARPANET.[4][5] Tomlinson also devised the first antivirus software, named Reaper, to delete the Creeper program.

The term "worm" was first used in this sense in John Brunner's 1975 novel, The Shockwave Rider. In the novel, Nichlas Haflinger designs and sets off a data-gathering worm in an act of revenge against the powerful people who run a national electronic information web that induces mass conformity. "You have the biggest-ever worm loose in the net, and it automatically sabotages any attempt to monitor it. There's never been a worm with that tough a head or that long a tail!"[6] "Then the answer dawned on him, and he almost laughed. Fluckner had resorted to one of the oldest tricks in the store and turned loose in the continental net a self-perpetuating tapeworm, probably headed by a denunciation group "borrowed" from a major corporation, which would shunt itself from one nexus to another every time his credit-code was punched into a keyboard. It could take days to kill a worm like that, and sometimes weeks."[6]

Xerox PARC was studying the use of "worm" programs for distributed computing in 1979.[7]

On November 2, 1988, Robert Tappan Morris, a Cornell University computer science graduate student, unleashed what became known as the Morris worm, disrupting many computers then on the Internet, guessed at the time to be one tenth of all those connected.[8] During the Morris appeal process, the U.S. Court of Appeals estimated the cost of removing the worm from each installation at between $200 and $53,000; this work prompted the formation of the CERT Coordination Center[9] and Phage mailing list.[10] Morris himself became the first person tried and convicted under the 1986 Computer Fraud and Abuse Act.[11]

Conficker, a computer worm discovered in 2008 that primarily targeted Microsoft Windows operating systems, is a worm that employs three different spreading strategies: local probing, neighborhood probing, and global probing.[12] This worm was considered a hybrid epidemic and affected millions of computers. The term "hybrid epidemic" is used because of the three separate methods it employed to spread, which was discovered through code analysis.[13]

Features

[edit]

Independence

Computer viruses generally require a host program.[14] The virus writes its own code into the host program. When the program runs, the written virus program is executed first, causing infection and damage. A worm does not need a host program, as it is an independent program or code chunk. Therefore, it is not restricted by the host program, but can run independently and actively carry out attacks.[15][16]

Exploit attacks

Because a worm is not limited by the host program, worms can take advantage of various operating system vulnerabilities to carry out active attacks. For example, the "Nimda" virus exploits vulnerabilities to attack.

Complexity

Some worms are combined with web page scripts, and are hidden in HTML pages using VBScript, ActiveX and other technologies. When a user accesses a webpage containing a virus, the virus automatically resides in memory and waits to be triggered. There are also some worms that are combined with backdoor programs or Trojan horses, such as "Code Red".[17]

Contagiousness

Worms are more infectious than traditional viruses. They not only infect local computers, but also all servers and clients on the network based on the local computer. Worms can easily spread through shared folders, e-mails,[18] malicious web pages, and servers with a large number of vulnerabilities in the network.[19]

Harm

[edit]

Any code designed to do more than spread the worm is typically referred to as the "payload". Typical malicious payloads might delete files on a host system (e.g., the ExploreZip worm), encrypt files in a ransomware attack, or exfiltrate data such as confidential documents or passwords.[20]

Some worms may install a backdoor. This allows the computer to be remotely controlled by the worm author as a "zombie". Networks of such machines are often referred to as botnets and are very commonly used for a range of malicious purposes, including sending spam or performing DoS attacks.[21][22][23]

Some special worms attack industrial systems in a targeted manner. Stuxnet was primarily transmitted through LANs and infected thumb-drives, as its targets were never connected to untrusted networks, like the internet. This virus can destroy the core production control computer software used by chemical, power generation and power transmission companies in various countries around the world - in Stuxnet's case, Iran, Indonesia and India were hardest hit - it was used to "issue orders" to other equipment in the factory, and to hide those commands from being detected. Stuxnet used multiple vulnerabilities and four different zero-day exploits (e.g.: [1]) in Windows systems and Siemens SIMATICWinCC systems to attack the embedded programmable logic controllers of industrial machines. Although these systems operate independently from the network, if the operator inserts a virus-infected drive into the system's USB interface, the virus will be able to gain control of the system without any other operational requirements or prompts.[24][25][26]

Countermeasures

[edit]

Worms spread by exploiting vulnerabilities in operating systems. Vendors with security problems supply regular security updates[27] (see "Patch Tuesday"), and if these are installed to a machine, then the majority of worms are unable to spread to it. If a vulnerability is disclosed before the security patch released by the vendor, a zero-day attack is possible.

Users need to be wary of opening unexpected emails,[28][29] and should not run attached files or programs, or visit web sites that are linked to such emails. However, as with the ILOVEYOU worm, and with the increased growth and efficiency of phishing attacks, it remains possible to trick the end-user into running malicious code.

Anti-virus and anti-spyware software are helpful, but must be kept up-to-date with new pattern files at least every few days. The use of a firewall is also recommended.

Users can minimize the threat posed by worms by keeping their computers' operating system and other software up to date, avoiding opening unrecognized or unexpected emails and running firewall and antivirus software.[30]

Mitigation techniques include:

Infections can sometimes be detected by their behavior - typically scanning the Internet randomly, looking for vulnerable hosts to infect.[31][32] In addition, machine learning techniques can be used to detect new worms, by analyzing the behavior of the suspected computer.[33]

Helpful worms

[edit]

A helpful worm or anti-worm is a worm designed to do something that its author feels is helpful, though not necessarily with the permission of the executing computer's owner. Beginning with the first research into worms at Xerox PARC, there have been attempts to create useful worms. Those worms allowed John Shoch and Jon Hupp to test the Ethernet principles on their network of Xerox Alto computers.[34] Similarly, the Nachi family of worms tried to download and install patches from Microsoft's website to fix vulnerabilities in the host system by exploiting those same vulnerabilities.[35] In practice, although this may have made these systems more secure, it generated considerable network traffic, rebooted the machine in the course of patching it, and did its work without the consent of the computer's owner or user. Another example of this approach is Roku OS patching a bug allowing for Roku OS to be rooted via an update to their screensaver channels, which the screensaver would attempt to connect to the telnet and patch the device.[36] Regardless of their payload or their writers' intentions, security experts regard all worms as malware.

One study proposed the first computer worm that operates on the second layer of the OSI model (Data link Layer), utilizing topology information such as Content-addressable memory (CAM) tables and Spanning Tree information stored in switches to propagate and probe for vulnerable nodes until the enterprise network is covered.[37]

Anti-worms have been used to combat the effects of the Code Red,[38] Blaster, and Santy worms. Welchia is an example of a helpful worm.[39] Utilizing the same deficiencies exploited by the Blaster worm, Welchia infected computers and automatically began downloading Microsoft security updates for Windows without the users' consent. Welchia automatically reboots the computers it infects after installing the updates. One of these updates was the patch that fixed the exploit.[39]

Other examples of helpful worms are "Den_Zuko", "Cheeze", "CodeGreen", and "Millenium".[39]

Art worms support artists in the performance of massive scale ephemeral artworks. It turns the infected computers into nodes that contribute to the artwork.[40]

See also

[edit]

References

[edit]
  1. ^ Barwise, Mike. "What is an internet worm?". BBC. Archived from the original on 2025-08-06. Retrieved 9 September 2010.
  2. ^ Zhang, Changwang; Zhou, Shi; Chain, Benjamin M. (2025-08-06). "Hybrid Epidemics—A Case Study on Computer Worm Conficker". PLOS ONE. 10 (5): e0127478. arXiv:1406.6046. Bibcode:2015PLoSO..1027478Z. doi:10.1371/journal.pone.0127478. ISSN 1932-6203. PMC 4433115. PMID 25978309.
  3. ^ Marion, Jean-Yves (2025-08-06). "From Turing machines to computer viruses". Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences. 370 (1971): 3319–3339. Bibcode:2012RSPTA.370.3319M. doi:10.1098/rsta.2011.0332. ISSN 1364-503X. PMID 22711861.
  4. ^ IEEE Annals of the History of Computing. Vol. 27–28. IEEE Computer Society. 2005. p. 74. [...]from one machine to another led to experimentation with the Creeper program, which became the world's first computer virus: a computation that used the network to recreate itself on another node, and spread from node to node. The source code of creeper remains unknown.
  5. ^ From the first email to the first YouTube video: a definitive internet history. Tom Meltzer and Sarah Phillips. The Guardian. 23 October 2009
  6. ^ a b Brunner, John (1975). The Shockwave Rider. New York: Ballantine Books. ISBN 978-0-06-010559-4.
  7. ^ J. Postel (17 May 1979). Internet Meeting Notes 8, 9, 10 & 11 May 1979. p. 5. doi:10.17487/RFC2555. RFC 2555.
  8. ^ "The Submarine". www.paulgraham.com.
  9. ^ "Security of the Internet". CERT/CC.
  10. ^ "Phage mailing list". securitydigest.org. Archived from the original on 2025-08-06. Retrieved 2025-08-06.
  11. ^ Dressler, J. (2007). "United States v. Morris". Cases and Materials on Criminal Law. St. Paul, MN: Thomson/West. ISBN 978-0-314-17719-3.
  12. ^ Zhang, Changwang; Zhou, Shi; Chain, Benjamin M. (2025-08-06). "Hybrid Epidemics—A Case Study on Computer Worm Conficker". PLOS ONE. 10 (5): e0127478. arXiv:1406.6046. Bibcode:2015PLoSO..1027478Z. doi:10.1371/journal.pone.0127478. ISSN 1932-6203. PMC 4433115. PMID 25978309.
  13. ^ Zhang, Changwang; Zhou, Shi; Chain, Benjamin M. (2025-08-06). Sun, Gui-Quan (ed.). "Hybrid Epidemics—A Case Study on Computer Worm Conficker". PLOS ONE. 10 (5): e0127478. arXiv:1406.6046. Bibcode:2015PLoSO..1027478Z. doi:10.1371/journal.pone.0127478. ISSN 1932-6203. PMC 4433115. PMID 25978309.
  14. ^ "Worm vs. Virus: What's the Difference and Does It Matter?". Worm vs. Virus: What's the Difference and Does It Matter?. Retrieved 2025-08-06.
  15. ^ Yeo, Sang-Soo. (2012). Computer science and its applications : CSA 2012, Jeju, Korea, 22-25.11.2012. Springer. p. 515. ISBN 978-94-007-5699-1. OCLC 897634290.
  16. ^ Yu, Wei; Zhang, Nan; Fu, Xinwen; Zhao, Wei (October 2010). "Self-Disciplinary Worms and Countermeasures: Modeling and Analysis". IEEE Transactions on Parallel and Distributed Systems. 21 (10): 1501–1514. doi:10.1109/tpds.2009.161. ISSN 1045-9219. S2CID 2242419.
  17. ^ Brooks, David R. (2017), "Introducing HTML", Programming in HTML and PHP, Undergraduate Topics in Computer Science, Springer International Publishing, pp. 1–10, doi:10.1007/978-3-319-56973-4_1, ISBN 978-3-319-56972-7
  18. ^ Deng, Yue; Pei, Yongzhen; Li, Changguo (2025-08-06). "Parameter estimation of a susceptible–infected–recovered–dead computer worm model". Simulation. 98 (3): 209–220. doi:10.1177/00375497211009576. ISSN 0037-5497. S2CID 243976629.
  19. ^ Lawton, George (June 2009). "On the Trail of the Conficker Worm". Computer. 42 (6): 19–22. doi:10.1109/mc.2009.198. ISSN 0018-9162. S2CID 15572850.
  20. ^ "What is a malicious payload?". www.cloudflare.com. Retrieved 2025-08-06.
  21. ^ Ray, Tiernan (February 18, 2004). "Business & Technology: E-mail viruses blamed as spam rises sharply". The Seattle Times. Archived from the original on August 26, 2012. Retrieved May 18, 2007.
  22. ^ McWilliams, Brian (October 9, 2003). "Cloaking Device Made for Spammers". Wired.
  23. ^ "Hacker threats to bookies probed". BBC News. February 23, 2004.
  24. ^ Bronk, Christopher; Tikk-Ringas, Eneken (May 2013). "The Cyber Attack on Saudi Aramco". Survival. 55 (2): 81–96. doi:10.1080/00396338.2013.784468. ISSN 0039-6338. S2CID 154754335.
  25. ^ Lindsay, Jon R. (July 2013). "Stuxnet and the Limits of Cyber Warfare". Security Studies. 22 (3): 365–404. doi:10.1080/09636412.2013.816122. ISSN 0963-6412. S2CID 154019562.
  26. ^ Wang, Guangwei; Pan, Hong; Fan, Mingyu (2014). "Dynamic Analysis of a Suspected Stuxnet Malicious Code". Proceedings of the 3rd International Conference on Computer Science and Service System. Vol. 109. Paris, France: Atlantis Press. doi:10.2991/csss-14.2014.86. ISBN 978-94-6252-012-7.
  27. ^ "USN list". Ubuntu. Retrieved 2025-08-06.
  28. ^ "Threat Description Email-Worm". Archived from the original on 2025-08-06. Retrieved 2025-08-06.
  29. ^ "Email-Worm:VBS/LoveLetter Description | F-Secure Labs". www.f-secure.com.
  30. ^ "Computer Worm Information and Removal Steps". Veracode. 2025-08-06. Retrieved 2025-08-06.
  31. ^ Sellke, S. H.; Shroff, N. B.; Bagchi, S. (2008). "Modeling and Automated Containment of Worms". IEEE Transactions on Dependable and Secure Computing. 5 (2): 71–86. doi:10.1109/tdsc.2007.70230.
  32. ^ "A New Way to Protect Computer Networks from Internet Worms". Newswise. Retrieved July 5, 2011.
  33. ^ Moskovitch, Robert; Elovici, Yuval; Rokach, Lior (2008). "Detection of unknown computer worms based on behavioral classification of the host". Computational Statistics & Data Analysis. 52 (9): 4544–4566. doi:10.1016/j.csda.2008.01.028. S2CID 1097834.
  34. ^ Shoch, John; Hupp, Jon (Mar 1982). "The "Worm" Programs - Early Experience with a Distributed Computation". Communications of the ACM. 25 (3): 172–180. doi:10.1145/358453.358455. S2CID 1639205.
  35. ^ "Virus alert about the Nachi worm". Microsoft.
  36. ^ "Root My Roku". GitHub.
  37. ^ Al-Salloum, Z. S.; Wolthusen, S. D. (2010). "A link-layer-based self-replicating vulnerability discovery agent". The IEEE symposium on Computers and Communications. p. 704. doi:10.1109/ISCC.2010.5546723. ISBN 978-1-4244-7754-8. S2CID 3260588.
  38. ^ "vnunet.com 'Anti-worms' fight off Code Red threat". Sep 14, 2001. Archived from the original on 2025-08-06.
  39. ^ a b c The Welchia Worm. December 18, 2003. p. 1. Retrieved 9 June 2014.
  40. ^ Aycock, John (2025-08-06). "Painting the Internet". Leonardo. 42 (2): 112–113 – via MUSE.
[edit]
奶油奶酪可以做什么 什么醒酒 发呆是什么意思 地是什么生肖 爱理不理是什么意思
心脏不好喝什么茶比较好 你有一双会说话的眼睛是什么歌 1.6号是什么星座 为什么总打喷嚏 锦纹是什么中药
紧急避孕药有什么副作用 宜是什么意思 山药与什么食物相克 月经期吃什么水果好 8月23是什么星座的
无创dna是检查什么的 补办医保卡需要什么资料 口什么心什么 梅花开在什么季节 一个虫一个尧念什么
画地为牢什么意思hcv9jop1ns9r.cn miki是什么意思hcv8jop1ns7r.cn 腰臀比是什么意思hcv9jop4ns0r.cn sicu是什么科室hcv9jop8ns3r.cn 滑囊炎吃什么药weuuu.com
bq是什么意思啊hcv9jop0ns6r.cn 懵的意思是什么hcv8jop7ns5r.cn 梦见雨伞是什么意思hcv9jop0ns2r.cn 手指头痒是什么原因hcv8jop5ns1r.cn 夏枯草长什么样子hcv8jop5ns3r.cn
梦到大牙掉了一颗是什么意思hcv9jop3ns8r.cn 非营利性医院是什么意思hcv9jop1ns4r.cn 蓁是什么意思1949doufunao.com 藿香正气水有什么功效hcv7jop9ns3r.cn 梦见血是什么预兆解梦hcv8jop5ns6r.cn
六七年属什么生肖hcv8jop7ns8r.cn 嗓子咽口水疼吃什么药hcv9jop3ns6r.cn 牛蹄筋炖什么好吃hcv8jop7ns5r.cn 117是什么电话hcv8jop3ns7r.cn 肺大泡吃什么药hcv8jop0ns4r.cn
百度