0% found this document useful (0 votes)
37 views8 pages

Digital Forensic Analysis of Ransomwares For Identification and Binary Extraction of Cryptographic Keys

digital-forensic-analysis-of-ransomwares

Uploaded by

deivisonfranco
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views8 pages

Digital Forensic Analysis of Ransomwares For Identification and Binary Extraction of Cryptographic Keys

digital-forensic-analysis-of-ransomwares

Uploaded by

deivisonfranco
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Soares C, et al.

, J Forensic Leg Investig Sci 2022, 8: 067


DOI: 10.24966/FLIS-733X/100067

HSOA Journal of
Forensic, Legal & Investigative Sciences
Review Article

Digital Forensic Analysis of


Ransomwares for Identification
and Binary Extraction of
Cryptographic Keys
Cleber Soares1, Deivison Franco1,2* and Joas Santos1
Researcher and Consultant in Digital Forensic and Information Security–
1

Belém/PA, Brasil
2
ACCESS Security Lab and Bank of Amazônia–Belém/PA, Brasil Figure 1: Typical anatomy of a ransomware attack (Adapted from
STATISTA, 2016).

Abstract
The first ransomware was created in 1989, called PC Cyborg, pop-
This article aims to show the use of digital forensic to recover the ularly known as AIDS, it was developed by Joseph Popp and simulat-
cryptographic key of files encrypted by ransomwares through iden- ed the collection of a ransom in the amount of US$ 189.
tification, extraction and binary analysis of memory dumps. Thus, in
the approached scenario, it was verified the possibility of recovering Ransomware attacks have been increasing considerably, and one
the encrypted files by verifying the characteristics and behavior of of the best known in the world occurred on May 12, 2017-WannaCry,
the ransomware, allowing to identify and extract its cryptographic infecting thousands of users around the world.
key through the analysis of the data contained in memory, with a
methodological approach that can be used analogously for other Digital Forensic Analysis Process
similar cases in which it is necessary to recover environments at-
tacked by this type of malware. The expert work is based on technical-scientific doctrines and pro-
cedures, which aim at the preservation and integrity of the evidence.
Keywords: Binary extraction; Cryptographic keys; Digital forensic;
Memory dump; Ransomwares In the specific case of computation, the manipulation of data con-
tained in computational storage media must be carried out with all
possible attention, as the proof cannot have its initial state altered, that
Introduction is, no bit can be modified. This ensures the validity of the evidence
in court. Thus, the investigator should always use forensic equipment
Ransomware is a type of malware that prevents access to the in- and software. To get an idea of ​​the sensitivity of digital evidence, just
fected system by blocking and encrypting files, charging a ransom to by turning on a computer and waiting for its operating system to boot,
recover them by paying with cryptocurrencies, which makes it impos- data contained on the hard drive is already altered.
sible to identify and track the criminal. Once a system is infected, the
ransomware encrypts the user’s data in the background, without the The cybercrime investigation process, that is, the digital forensic
user noticing, and when ready, emits a “pop-up” informing that the process, consists of four phases that deal with everything from re-
machine is blocked and that the user will no longer be able to use it. ceiving the material to preparing the report, namely: Identification;
it, unless you pay a fee to obtain the key that gives access to the data. Preparation; Forensic Imaging; Forensic Analysis and Forensic Re-
(Figure 1) illustrates the typical anatomy of a ransomware attack. port. This entire procedure is illustrated in (Figure 2) and explained
below.
*Corresponding author: Deivison Franco, Researcher and Consultant in
Digital Forensic and Information Security, ACCESS Security Lab and Bank of
Amazônia–Belém/PA, Brasil, Email ID: [email protected]

Citation: Soares C, Franco D, Santos J (2022) Digital Forensic Analysis of Ran-


somwares for Identification and Binary Extraction of Cryptographic Keys. Foren-
sic Leg Investig Sci 8: 067.

Received: November 30, 2022; Accepted: December 12, 2022; Published: De-
cember 17, 2022

Copyright: © 2022 Soares C, et al. This is an open-access article distributed


under the terms of the Creative Commons Attribution License, which permits un-
restricted use, distribution, and reproduction in any medium, provided the original Figure 2: Digital Forensic Analysis Process.
author and source are credited.
Citation: Soares C, Franco D, Santos J (2022) Digital Forensic Analysis of Ransomwares for Identification and Binary Extraction of Cryptographic Keys. Forensic
Leg Investig Sci 8: 067.

• Page 2 of 7 •

Identification What is the size of the area to be isolated in order to cover all trac-
es? The rule is to isolate the largest possible area within the context
In this first step, digital evidence seized on a crime scene need of the crime, since isolation done too little can contaminate the region
to be identified. Responsible for the seizure must write a report, to not covered by the isolation and lose important traces.
specify everything captured, with type of evidence, trademark, serial
number, memory capacity, exact place where it was, and people to It is worth remembering that human beings are not the only agent
that modifies the environment, there are other factors to be consid-
whom it belongs. Based on that report, forensic examiners write these
ered, such as bad weather (cold, rain, humidity, heat, sunlight, wind,
evidence characteristics on the forensic report. magnetic radiation, etc.). Depending on the region, some additional
Preparation measures must be taken in order to quickly identify and isolate exist-
ing traces. Therefore, some classifications of the places are necessary.
In the second step, all forensic examination is performed based on
Regarding the region
a document, called “forensic request”. This request is analyzed, to ve-
rify if there is sufficient information to start the examinations. Foren- a. Immediate: region with the highest concentration of traces of the
sic examiners can coordinate the investigation and examination with occurrence of the fact. More careful examinations will be carried
requesters to determine additional steps. They also setup and validate out there, since due to the principle of locality of spatial reference,
forensic hardware and software. Afterwards, based on the forensic most of the evidence will probably be found there.
request and on the data to be analyzed, forensic tools are selected,
b. Mediate: region comprised by the periphery of the immediate re-
for instance: tools for evidence analysis, data recovery, decryption gion. In the same way that occurred in the immediate region, we
and password cracking, steganography analysis and mobile forensics have the possibility of the existence of more than one mediate re-
examination. gion.
Forensic imaging Regarding the preservation
In this step, forensic examiners must make a forensic imaging of a. Suitable: place where the traces have remained unchanged since
the evidence data since they are not allowed to work directly on the the occurrence of the fact until its registration.
original evidence due to the risk to modify and/or to damage eviden-
ce. Hence, after this step, the forensic examiners work just based on b. Inappropriate: place where the vestiges were compromised, either
the copies of the evidence. by removal, insertion or a combination of both.
Regarding the area
Forensic analysis
a. Internal: one that has at least superior protection against rain, sun
This step is the process to discover evidentiary information in the
and other more aggressive natural elements. The absence of walls
computer evidence based on the forensic request. In some cases, this
in the confinement of the room does not deprive it of this classifi-
information is not apparent to the investigators or may be protected
cation. An open shed or a building entrance are examples of this
by passwords or encryption. Forensic examiners may use specific
type of classification.
software’s, such as FTK [1], EnCase [2], SleuthKit [3]and others, to
locate, undelete, and put available all user’s files, for instance, .pdf, b. External: that which is located outside the premises and is directly
Microsoft Office files and email. Note that the exemplified files are subject to the influence of the most aggressive natural elements.
usually the most important for the investigation. It is possible to find in these environments network cables, signal
transmitting/receiving antennas, biometric authentication devices,
Forensic report etc.
In this last step, a forensic report may be issued based on the foren-
c. Virtual: one where there is no direct link between the physical con-
sic request, and on the forensic data analysis. All forensic procedures
text and the logical one. An action performed in a given physical
done during the examination may be written in this report, as well
environment can produce physical and logical evidence in another
as all important evidence discovered. The questions of the forensic
completely different location.
request need to be answered in this report.
Regarding the nature
Isolation of Cybernetic Traces
Place classified according to the type of event associated with it,
Isolation, although described as a subsequent phase to identifica- such as: pedophilia, insertion of data into information systems, inva-
tion and registration, in practice can occur concurrently, as as items sion of computer networks, etc.
are identified at the crime scene, some measures can be taken to
ensure their isolation. Logical isolation
The nature of the device to be isolated for subsequent seizure is
The main idea of isolation
​​ is to prevent attacks on the integrity
who will dictate the appropriate procedures. The most common de-
of the evidence (alterations, deletions, insertions, destructions). Due
vice categories at digital crime scenes are highlighted below.
to the special nature of the cybernetic trace, we will divide isolation
into two categories: the physical and the logical. Notebooks and desktops

Physical isolation Most of the time, the most relevant information to be isolated is
found on some secondary storage media: HD, Pendrive, external HD,
Understanding the physical perimeter and delimiting it in order to etc. This means that only these storage devices need to be isolated for
isolate it seems simple, but it is a difficult task to perform. later collection.
J Forensic Leg Investig Sci ISSN: 2473-733X, Open Access Journal Volume 8 • Issue 2 • 100067
DOI: 10.24966/FLIS-733X/100067
Citation: Soares C, Franco D, Santos J (2022) Digital Forensic Analysis of Ransomwares for Identification and Binary Extraction of Cryptographic Keys. Forensic
Leg Investig Sci 8: 067.

• Page 3 of 7 •

In some cases the entire machine will have to be identified and The guarantee of the authenticity and integrity of data collected
isolated for this purpose, this is the case with those that use RAID [4] such as logs, operating system settings, information system files, user
disk arrangements where from a physical point of view we find sever- files and others deemed necessary, will be done by preserving the
al HDs and from a logical point of view we have a single disk. In this original directory structure, as well as the metadata of these files, such
sense, another aspect that must be taken into account is the state these as date, creation time and permissions. If possible, it is recommended
devices are in: On or Off. to take your cryptographic digests (hashes [2]).

• On: if it is on and the operating system is properly initialized, first Network connected devices
check the feasibility of registering evidence in flagrant situations.
This fact must be recorded and the machine must be disconnect-
Collecting the contents of primary memory, which is often vola-
ed from the network, either by disconnecting the cable or by turning
tile, should be considered. Shared files, running programs, open
off the machine itself. It may be necessary to identify and isolate the
windows, browsing sessions in progress, conversations in commu-
network element itself as evidence of the crime (switch/router). Many
nication software and, mainly, information decrypted when read-
times the data of these equipments and their internal configurations
ing (but which is encrypted when stored on secondary media). In
will serve as evidence [5].
any case, the main idea in this state is to ensure that during the
shutdown process, the normal operating system shutdown steps Special attention must be given to wireless networks, since the
are not followed, since they may be associated with unwanted absence of metallic or optical cabling does not mean the absence of
events or compromising the integrity of the evidence. computer networks. It is necessary to identify access points to wire-
less networks or even the configuration of ad-hoc networks [6].
• Off: generally, it should be kept in these conditions, and should
not be turned on, since the operating system initialization process Digital Forensic Analysis of Ransomware for Identi-
causes changes in certain data regions of the secondary storage fication and Binary Cryptographic Key Extraction
media, some user programs may still carry out unwanted activi-
ties, which can compromise the integrity of the trace. If there is Analyzed scenario
a need to analyze this type of media in loco, care must be taken
with regard to protection against writing, for this purpose, a widely A scenario was analyzed in which a user executed a malicious
adopted solution is to boot using another operating system stored artifact that encrypted all his files, which was replicated in a virtual-
on another media that, in this way, will not produce changes. in the ized laboratory, where a Command and Control environment was de-
media questioned. veloped (C2) containing encoded ransomware that, when executed,
encrypts the host’s data and forwards its cryptographic key to C2, as
Input/Output devices per the scheme in (Figure 3) and execution shown in (Figure 4).
Generally, they should not be collected, but in specific cases, their
identification and isolation are essential to elucidate the case. As hy-
pothetical examples, a case of anonymous defamatory emails typed
from a computer whose keyboard is defective on certain keys, or a
printer responsible for printing fraudulent certificates; in a scanner
used to capture images used in counterfeit paper money, etc.

Due to the plurality of connection formats and standards, cables,


accessories and chargers must be identified as part of the equipment
for collection purposes. Figure 3: Outline of the analyzed scenario.
Single media

This category includes basically all external secondary storage


media on computers (optical media, pendrives, external HDs, memo-
ry cards, floppy disks, zip-drives, etc.).

These media can be found both connected and disconnected from


computers. Sometimes they are found inside their original equip-
ment, such as camcorders or cameras. In these cases, it is important
to remember that despite being a camcorder or camera, the memory
contained therein behaves like any other memory, being capable of
storing other types of files in addition to photos and videos.
On-site data copies

If in the identification phase any device is identified as important,


but the logical evidence can be extracted without the need to collect
its support, that is, the physical evidence, copies can be made on site
for later analysis. Such copies aim to meet the technical or legal un-
feasibility of the collection or even the reduction of the scope of the Figure 4: Ransomware execution.
materials to be collected.
J Forensic Leg Investig Sci ISSN: 2473-733X, Open Access Journal Volume 8 • Issue 2 • 100067
DOI: 10.24966/FLIS-733X/100067
Citation: Soares C, Franco D, Santos J (2022) Digital Forensic Analysis of Ransomwares for Identification and Binary Extraction of Cryptographic Keys. Forensic
Leg Investig Sci 8: 067.

• Page 4 of 7 •

Initial procedures After running the FTK Imager, click on the “File” menu and select
the “Capture Memory” option, as shown in (Figure 7).
After the incident, the incident response and forensic teams must
act quickly following their own or market methodologies to prevent
and/or minimize damage. So, avoiding decision-making can hinder
creating forensic graphs, or identifying root causes, or creating a con-
sistent knowledge base.

The compromised machine was isolated from its infrastructure,


kept on and running a GNU/Linux live CD with the CAINE Forensic
distribution (CAINE Live USB/DVD [3]), which has several tools.

Among the range of distribution tools, the FTK Imager was used
- forensic software developed by Access Data Corp. [3] that creates
binary disk copies, makes memory dumps, in addition to having an
intuitive and friendly graphical interface that helps in the forensic
analysis process of the dumped images. Therefore, the operational
procedures for digital forensic analysis of ransomware were followed
for identification and binary extraction of its cryptographic key [7-9]. Figure 7: “Capture Memory” option.

Downloaded FTK Imager Lite and, after downloading, the “FT-


KImagerLite” folder was accessed and the “FTKImagerLite.exe” ap- A window opened and in it, in the “Destination path” option, where
plication was executed, as shown in (Figures 5 & 6). to save the memory dump was chosen and in “Destination filename”,
the dump file was named as “memdump.mem”, and the options of
include a paging file (“Include pagefile” [10]) and create an AD1 file
(“Create AD1 file”) not used at this stage.
Once that was done, click on “Capture Memory”, as shown in
(Figure 8) (a very valid observation is that if the operating system has
a lot of memory, the process may take a while).

Figure 5: Application Folder “FTKImagerLite”.

Figure 8: Setting the “Capture Memory” option.

After completing the procedure, click on the “Close” button as


shown in (Figure 9).

With the output file in the selected destination folder, the media
was removed for analysis of the dump on another device.

In the next step, Volatility [10] was used-command line tool de-
veloped in python and one of the most used for memory analysis,
containing several plugins for Windows, Linux and Mac systems.

Identification and binary extraction of cryptographic key

There is not even a step-by-step to be followed, as the tool allows


Figure 6: Application “FTKImagerLite.exe”. the inheritance and analysis of useful memory information, such as
running processes and network connections, also allowing to discard
J Forensic Leg Investig Sci ISSN: 2473-733X, Open Access Journal Volume 8 • Issue 2 • 100067
DOI: 10.24966/FLIS-733X/100067
Citation: Soares C, Franco D, Santos J (2022) Digital Forensic Analysis of Ransomwares for Identification and Binary Extraction of Cryptographic Keys. Forensic
Leg Investig Sci 8: 067.

• Page 5 of 7 •

Afterwards, to verify the processes that were running in the oper-


ating system, the “pslist” plugin was used, with the command shown
in (Figure 12).

Figure 9: Running the “Capture Memory” option.

DLLs [10] and processes for later analysis, it is up to the investigator


to assess what is most useful for his analysis. Next, the procedures Figure 12: Running the command “volatility -f memdump.mem --pro-
performed and the commands executed for the scenario under anal- file=Win10x64_10240_17770 pslist”.
ysis. # volatility -f memdump.mem --profile=Win10x64_10240_17770 pslist
First, the tool’s information was verified, showing its commands
and the operating system versions that support it through the “info” One option of the “pslist” plugin, which can be used to display the
option, shown in (Figure 10). parent and child processes, is the “pstree”, which was employed as
shown in (Figure 13).

Figure 10: Running the command “volatility --info”.


Figure 13: Running the command “volatility -f memdump.mem --pro-
# volatility –info file=Win10x64_10240_17770 pstree”.
# volatility -f memdump.mem --profile=Win10x64_10240_17770 pstree
Then, to analyze information about memory dumps, the “imagein-
fo” option was used, as shown in (Figure 11).
Then, the “psxview” plugin was used to list the processes that are
trying to hide on the computer, as shown in (Figure 14).

After checking the running processes, another fundamental point


is to analyze the connections related to them. For this, the “netscan”
command was executed, which showed that there was a connection
between the machine 192.168.10.12, with “close” status, with the C2
of the attacker 192.168.10.10, as shown in (Figure 15), below.
Although there was evidence of a connection, apparently no sus-
picious processes were found. So, it was necessary to better analyze
some more specific artifacts, as it is characteristic of malware to inject
itself into legitimate processes.

Figure 11: Running the command “volatility imageinfo -f memdump. Given the above, to validate the Security Identifiers (SIDs), the
mem”. “getsids” command was used to identify the processes associated with
a given user and that may have privileges that can be maliciously
J Forensic Leg Investig Sci ISSN: 2473-733X, Open Access Journal Volume 8 • Issue 2 • 100067
DOI: 10.24966/FLIS-733X/100067
Citation: Soares C, Franco D, Santos J (2022) Digital Forensic Analysis of Ransomwares for Identification and Binary Extraction of Cryptographic Keys. Forensic
Leg Investig Sci 8: 067.

• Page 6 of 7 •

Therefore, based on the results of the “pstree” and “pslist” com-


mands, the “memdump” command was used in process 2420 to ex-
tract all its information and dump it in a specific file with the “-p 2420”
command followed by the “-dump-dir” option (directory where you
want to extract the dump), as shown in Figure 17.

Figure 17: Running the command “volatility -f memdump.mem --pro-


file=Win10x64_10240_17770 memdump -p 2420 –dump-dir /home/
kali/Desktop/dump”.

# volatility -f memdump.mem --profile=Win10x64_10240_17770 mem-


dump -p 2420 –dump-dir/home/kali/Desktop/dump

That done, with the “strings” command, the content of the dump
was redirected to a file with the “>” parameter, as shown in Figure 18.

Figure 18: Running the command “strings 2420.dmp > 2420.txt”.


Figure 14: Running the command “volatility -f memdump.mem --pro-
file=Win10x64_10240_17770 psxview”. # strings 2420.dmp > 2420.txt
# volatility -f memdump.mem --profile=Win10x64_10240_17770 psxview
After a thorough analysis of the identified and extracted binary,
it was possible to identify the computer’s communication with the
attacker’s Command and Control, including some machine informa-
tion, such as a password that is the key to decrypt the files, as shown
in Figure 19.

Figure 15: Running the command “volatility -f memdump.mem --pro-


file=Win10x64_10240_17770 netscan”.
# volatility -f memdump.mem --profile=Win10x64_10240_17770 netscan

escalated, and among the various processes, it was observed that that Figure 19: Connection information to the attacker’s Command and Con-
trol environment including the ransomware’s cryptographic key.
process 2420 was being executed by several users, in particular by the
user “srvmaster” as shown in (Figure 16).
Therefore, in the environment that was replicated, it was possible
to identify all the information of the equipment present in the attack-
er’s C2, including the rescue password, as can be seen in Figure 20.

Conclusion
Due to the increase in the number of connected computing devic-
es, the distribution of malicious programs associated with criminal
practice grows daily. Consequently, the presence of malware in fo-
rensic examinations is increasingly frequent. In addition, the high di-
versity of classes and distinct methods of malware performance make
the expert examinations performed in these types of programs create
challenges for digital forensic specialists. The purpose of this article
Figure 16: Running the command “volatility -f memdump.mem --pro- was to present ransomware-specific analysis to professionals in the
file=Win10x64_10240_17770 getsids -p 2420”. field, along with tools and techniques that will assist in identifying
and extracting its cryptographic key.
J Forensic Leg Investig Sci ISSN: 2473-733X, Open Access Journal Volume 8 • Issue 2 • 100067
DOI: 10.24966/FLIS-733X/100067
Citation: Soares C, Franco D, Santos J (2022) Digital Forensic Analysis of Ransomwares for Identification and Binary Extraction of Cryptographic Keys. Forensic
Leg Investig Sci 8: 067.

• Page 7 of 7 •

References
1. https://academiadeforensedigital.com.br/iso-27037-identificacao-coleta-aqui-
sicao-e-preservacao-de-evidencia https://www.academia.edu/34105040/Fo-
rensic_Toolkit_FTK_User_Guide

2. ACCESSDATA CORP. FTK User Guide. Lindon, Utah, EUA: AccessData,


2010.

3. Aquilina J, Casey E, Malin C (2008) Malware Forensics: Investigating and


Analyzing Malicious Code. EUA: Syngress.

4. Departamento de segurança da informação e comunicações do gabinete de


segurança institucional da presidência da república. Diretrizes para o registro
de eventos, coleta e preservação de evidências de incidentes de segurança em
Figure 20: Information from the attacker’s Command and Control envi- redes. Brasília, 2014.
ronment with the ransomware cryptographic key.
5. https://es.statista.com/grafico/9376/como-funciona-un-ransomware/

In view of the above, this article addressed the digital forensic 6. http://ldemetrio.com.br/Livros/Livros_TI/segunda_unid/Sistemas%20
analysis of ransomware for the binary extraction of its cryptograph- Operacionais%20Modernos%20-%20Tanenbaum%20-%204%20
ic key, given the preservation of the cybernetic trace along with its Edi%C3%A7%C3%A3o.pdf
respective identification, isolation and collection, since the manipu-
lation of data contained in computational storage media must be car- 7. Velho JA (2016) Tratado de Computação Forense. Campinas: Milennium.
ried out with all possible care, as the test cannot have its initial state
changed, that is, no bit can be modified. 8. Velho JA, Costa KA, Damasceno CTM (2013) Locais de Crimes - dos Vestí-
gios à Dinâmica Criminosa. Campinas: Millennium.
In the approached scenario, it was verified the possibility of recov-
ering the encrypted files by verifying the characteristics and behavior 9. Velho JA, Geiser GC (2021) Espíndula A Ciências Forenses-Uma introdução
às principais áreas da Criminalística Moderna. 4a. ed. Campinas: Millennium.
of the ransomware, allowing to identify and extract its cryptograph-
ic key through the analysis of the data contained in memory, with a 10. Velho JA, Vilar GP, Gusmão E, Franco DP, Grochocki LR, (2020) Polícia
methodological approach that can be used analogously for other sim- Científica-Transformando Vestígios em Evidências. Curitiba: Intersaberes.
ilar cases in which it is necessary to recover environments attacked
by this type of malware, since the analysis of malware, in particular
ransomware, becomes an increasingly frequent reality in forensic
examinations. Understanding the concepts on the subject, knowing
methods to understand its operation in order to identify and extract its
cryptographic key(s) are tasks that must be present in the daily life of
any criminal expert who works in Forensic Computer.

J Forensic Leg Investig Sci ISSN: 2473-733X, Open Access Journal Volume 8 • Issue 2 • 100067
DOI: 10.24966/FLIS-733X/100067
Advances In Industrial Biotechnology | ISSN: 2639-5665 Journal Of Genetics & Genomic Sciences | ISSN: 2574-2485

Advances In Microbiology Research | ISSN: 2689-694X Journal Of Gerontology & Geriatric Medicine | ISSN: 2381-8662

Archives Of Surgery And Surgical Education | ISSN: 2689-3126 Journal Of Hematology Blood Transfusion & Disorders | ISSN: 2572-2999

Archives Of Urology Journal Of Hospice & Palliative Medical Care

Archives Of Zoological Studies | ISSN: 2640-7779 Journal Of Human Endocrinology | ISSN: 2572-9640

Current Trends Medical And Biological Engineering Journal Of Infectious & Non Infectious Diseases | ISSN: 2381-8654

International Journal Of Case Reports And Therapeutic Studies | ISSN: 2689-310X Journal Of Internal Medicine & Primary Healthcare | ISSN: 2574-2493

Journal Of Addiction & Addictive Disorders | ISSN: 2578-7276 Journal Of Light & Laser Current Trends
Journal Of Agronomy & Agricultural Science | ISSN: 2689-8292 Journal Of Medicine Study & Research | ISSN: 2639-5657
Journal Of AIDS Clinical Research & STDs | ISSN: 2572-7370 Journal Of Modern Chemical Sciences
Journal Of Alcoholism Drug Abuse & Substance Dependence | ISSN: 2572-9594
Journal Of Nanotechnology Nanomedicine & Nanobiotechnology | ISSN: 2381-2044
Journal Of Allergy Disorders & Therapy | ISSN: 2470-749X
Journal Of Neonatology & Clinical Pediatrics | ISSN: 2378-878X
Journal Of Alternative Complementary & Integrative Medicine | ISSN: 2470-7562
Journal Of Nephrology & Renal Therapy | ISSN: 2473-7313
Journal Of Alzheimers & Neurodegenerative Diseases | ISSN: 2572-9608
Journal Of Non Invasive Vascular Investigation | ISSN: 2572-7400
Journal Of Anesthesia & Clinical Care | ISSN: 2378-8879
Journal Of Nuclear Medicine Radiology & Radiation Therapy | ISSN: 2572-7419
Journal Of Angiology & Vascular Surgery | ISSN: 2572-7397
Journal Of Obesity & Weight Loss | ISSN: 2473-7372
Journal Of Animal Research & Veterinary Science | ISSN: 2639-3751
Journal Of Ophthalmology & Clinical Research | ISSN: 2378-8887
Journal Of Aquaculture & Fisheries | ISSN: 2576-5523
Journal Of Orthopedic Research & Physiotherapy | ISSN: 2381-2052
Journal Of Atmospheric & Earth Sciences | ISSN: 2689-8780
Journal Of Otolaryngology Head & Neck Surgery | ISSN: 2573-010X
Journal Of Biotech Research & Biochemistry
Journal Of Pathology Clinical & Medical Research
Journal Of Brain & Neuroscience Research
Journal Of Pharmacology Pharmaceutics & Pharmacovigilance | ISSN: 2639-5649
Journal Of Cancer Biology & Treatment | ISSN: 2470-7546
Journal Of Physical Medicine Rehabilitation & Disabilities | ISSN: 2381-8670
Journal Of Cardiology Study & Research | ISSN: 2640-768X
Journal Of Plant Science Current Research | ISSN: 2639-3743
Journal Of Cell Biology & Cell Metabolism | ISSN: 2381-1943
Journal Of Practical & Professional Nursing | ISSN: 2639-5681
Journal Of Clinical Dermatology & Therapy | ISSN: 2378-8771
Journal Of Protein Research & Bioinformatics
Journal Of Clinical Immunology & Immunotherapy | ISSN: 2378-8844
Journal Of Psychiatry Depression & Anxiety | ISSN: 2573-0150
Journal Of Clinical Studies & Medical Case Reports | ISSN: 2378-8801
Journal Of Pulmonary Medicine & Respiratory Research | ISSN: 2573-0177
Journal Of Community Medicine & Public Health Care | ISSN: 2381-1978
Journal Of Reproductive Medicine Gynaecology & Obstetrics | ISSN: 2574-2574
Journal Of Cytology & Tissue Biology | ISSN: 2378-9107
Journal Of Stem Cells Research Development & Therapy | ISSN: 2381-2060
Journal Of Dairy Research & Technology | ISSN: 2688-9315
Journal Of Surgery Current Trends & Innovations | ISSN: 2578-7284
Journal Of Dentistry Oral Health & Cosmesis | ISSN: 2473-6783
Journal Of Toxicology Current Research | ISSN: 2639-3735
Journal Of Diabetes & Metabolic Disorders | ISSN: 2381-201X
Journal Of Translational Science And Research
Journal Of Emergency Medicine Trauma & Surgical Care | ISSN: 2378-8798

Journal Of Environmental Science Current Research | ISSN: 2643-5020 Journal Of Vaccines Research & Vaccination | ISSN: 2573-0193

Journal Of Food Science & Nutrition | ISSN: 2470-1076 Journal Of Virology & Antivirals

Journal Of Forensic Legal & Investigative Sciences | ISSN: 2473-733X Sports Medicine And Injury Care Journal | ISSN: 2689-8829

Journal Of Gastroenterology & Hepatology Research | ISSN: 2574-2566 Trends In Anatomy & Physiology | ISSN: 2640-7752

Submit Your Manuscript: https://www.heraldopenaccess.us/submit-manuscript

Herald Scholarly Open Access, 2561 Cornelia Rd, #205, Herndon, VA 20171, USA.
Tel: +1 202-499-9679; E-mail: [email protected]
http://www.heraldopenaccess.us/

You might also like