Automated Malware Analysis Report For

Total Page:16

File Type:pdf, Size:1020Kb

Automated Malware Analysis Report For ID: 430572 Cookbook: browseurl.jbs Time: 16:38:56 Date: 07/06/2021 Version: 32.0.0 Black Diamond Table of Contents Table of Contents 2 Analysis Report https://www.weebly.com/app/help/us/en/topics/quick-answer-guide 3 Overview 3 General Information 3 Detection 3 Signatures 3 Classification 3 Process Tree 3 Malware Configuration 3 Yara Overview 3 Sigma Overview 3 Signature Overview 3 Mitre Att&ck Matrix 4 Behavior Graph 4 Screenshots 4 Thumbnails 4 Antivirus, Machine Learning and Genetic Malware Detection 5 Initial Sample 5 Dropped Files 5 Unpacked PE Files 5 Domains 5 URLs 5 Domains and IPs 6 Contacted Domains 6 Contacted URLs 6 URLs from Memory and Binaries 6 Contacted IPs 6 Public 6 General Information 6 Simulations 7 Behavior and APIs 7 Joe Sandbox View / Context 7 IPs 7 Domains 7 ASN 7 JA3 Fingerprints 7 Dropped Files 7 Created / dropped Files 7 Static File Info 17 No static file info 17 Network Behavior 17 Network Port Distribution 17 TCP Packets 17 UDP Packets 17 DNS Queries 17 DNS Answers 17 HTTPS Packets 18 Code Manipulations 20 Statistics 20 Behavior 20 System Behavior 20 Analysis Process: iexplore.exe PID: 3412 Parent PID: 792 20 General 20 File Activities 20 Registry Activities 20 Analysis Process: iexplore.exe PID: 4084 Parent PID: 3412 20 General 20 File Activities 21 Registry Activities 21 Disassembly 21 Copyright Joe Security LLC 2021 Page 2 of 21 Analysis Report https://www.weebly.com/app/help/us/en…/topics/quick-answer-guide Overview General Information Detection Signatures Classification Sample URL: https://www.weebly.c No high impact signatures. om/app/help/us/en/topics/q uick-answer-guide Analysis ID: 430572 Infos: Ransomware Most interesting Screenshot: Miner Spreading mmaallliiiccciiioouusss malicious Evader Phishing sssuusssppiiiccciiioouusss suspicious cccllleeaann clean Exploiter Banker Spyware Trojan / Bot Adware Score: 0 Range: 0 - 100 Whitelisted: false Confidence: 80% Process Tree System is w10x64 iexplore.exe (PID: 3412 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596) iexplore.exe (PID: 4084 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:3412 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A) cleanup Malware Configuration No configs have been found Yara Overview No yara matches Sigma Overview No Sigma rule has matched Signature Overview Click to jump to signature section Copyright Joe Security LLC 2021 Page 3 of 21 There are no malicious signatures, click here to show all signatures . Mitre Att&ck Matrix Command Remote Initial Privilege Defense Credential Lateral and Network Service Access Execution Persistence Escalation Evasion Access Discovery Movement Collection Exfiltration Control Effects Effects Impact Valid Windows Path Process Masquerading 1 OS File and Remote Data from Exfiltration Encrypted Eavesdrop on Remotely Modify Accounts Management Interception Injection 1 Credential Directory Services Local Over Other Channel 2 Insecure Track Device System Instrumentation Dumping Discovery 1 System Network Network Without Partition Medium Communication Authorization Default Scheduled Boot or Boot or Process LSASS Application Remote Data from Exfiltration Non- Exploit SS7 to Remotely Device Accounts Task/Job Logon Logon Injection 1 Memory Window Desktop Removable Over Application Redirect Phone Wipe Data Lockout Initialization Initialization Discovery Protocol Media Bluetooth Layer Calls/SMS Without Scripts Scripts Protocol 1 Authorization Domain At (Linux) Logon Script Logon Obfuscated Files Security Query SMB/Windows Data from Automated Application Exploit SS7 to Obtain Delete Accounts (Windows) Script or Information Account Registry Admin Shares Network Exfiltration Layer Track Device Device Device (Windows) Manager Shared Protocol 2 Location Cloud Data Drive Backups Behavior Graph Hide Legend Behavior Graph Legend: ID: 430572 Process URL: https://www.weebly.com/app/... Signature Startdate: 07/06/2021 Created File Architecture: WINDOWS DNS/IP Info Score: 0 Is Dropped Is Windows Process Number of created Registry Values www.weebly.com weebly.com started Number of created Files Visual Basic Delphi iexplore.exe Java .Net C# or VB.NET C, C++ or other language 2 84 Is malicious Internet started iexplore.exe 3 49 weebly.com weebly.map.fastly.net 74.115.50.109, 443, 49702, 49703 151.101.1.46, 443, 49711, 49712 3 other IPs or domains WEEBLYUS FASTLYUS United States United States Screenshots Thumbnails This section contains all screenshots as thumbnails, including those not shown in the slideshow. Copyright Joe Security LLC 2021 Page 4 of 21 Antivirus, Machine Learning and Genetic Malware Detection Initial Sample Source Detection Scanner Label Link https://www.weebly.com/app/help/us/en/topics/quick-answer-guide 0% Avira URL Cloud safe Dropped Files No Antivirus matches Unpacked PE Files No Antivirus matches Domains No Antivirus matches URLs Copyright Joe Security LLC 2021 Page 5 of 21 Source Detection Scanner Label Link https://raw.githubusercontent.com/jashkenas/underscore/master/LICENSE 0% Avira URL Cloud safe https://orbit.weebly.net/cdn/releases 0% Avira URL Cloud safe https://www.google.%/ads/ga-audiences 0% URL Reputation safe https://www.google.%/ads/ga-audiences 0% URL Reputation safe https://www.google.%/ads/ga-audiences 0% URL Reputation safe www.wikipedia.com/ 0% URL Reputation safe www.wikipedia.com/ 0% URL Reputation safe www.wikipedia.com/ 0% URL Reputation safe https://openjsf.org/ 0% URL Reputation safe https://openjsf.org/ 0% URL Reputation safe https://openjsf.org/ 0% URL Reputation safe https://webpack.js.org/guides/production/ 0% Avira URL Cloud safe Domains and IPs Contacted Domains Name IP Active Malicious Antivirus Detection Reputation weebly.map.fastly.net 151.101.1.46 true false unknown weebly.com 74.115.50.109 true false high cdn.embedly.com unknown unknown false high www.weebly.com unknown unknown false high cdn2.editmysite.com unknown unknown false high Contacted URLs Name Malicious Antivirus Detection Reputation https://www.weebly.com/app/help/us/en/topics/quick-answer-guide false high URLs from Memory and Binaries Contacted IPs Public IP Domain Country Flag ASN ASN Name Malicious 74.115.50.109 weebly.com United States 27647 WEEBLYUS false 151.101.1.46 weebly.map.fastly.net United States 54113 FASTLYUS false General Information Joe Sandbox Version: 32.0.0 Black Diamond Analysis ID: 430572 Start date: 07.06.2021 Start time: 16:38:56 Joe Sandbox Product: CloudBasic Overall analysis duration: 0h 3m 29s Hypervisor based Inspection enabled: false Report type: light Cookbook file name: browseurl.jbs Sample URL: https://www.weebly.com/app/help/us/en/topics/qui ck-answer-guide Analysis system description: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211 Number of analysed new started processes analysed: 18 Number of new started drivers analysed: 0 Copyright Joe Security LLC 2021 Page 6 of 21 Number of existing processes analysed: 0 Number of existing drivers analysed: 0 Number of injected processes analysed: 0 Technologies: HCA enabled EGA enabled AMSI enabled Analysis Mode: default Analysis stop reason: Timeout Detection: CLEAN Classification: clean0.win@3/30@4/2 Cookbook Comments: Adjust boot time Enable AMSI Warnings: Show All Simulations Behavior and APIs No simulations Joe Sandbox View / Context IPs No context Domains No context ASN No context JA3 Fingerprints No context Dropped Files No context Created / dropped Files C:\Users\user\AppData\Local\Microsoft\Internet Explorer\DOMStore\VXQPHS0A\www.weebly[1].xml Process: C:\Program Files (x86)\Internet Explorer\iexplore.exe File Type: ASCII text, with no line terminators Category: dropped Size (bytes): 13 Entropy (8bit): 2.469670487371862 Encrypted: false SSDEEP: 3:D90aKb:JFKb MD5: C1DDEA3EF6BBEF3E7060A1A9AD89E4C5 SHA1: 35E3224FCBD3E1AF306F2B6A2C6BBEA9B0867966 SHA-256: B71E4D17274636B97179BA2D97C742735B6510EB54F22893D3A2DAFF2CEB28DB SHA-512: 6BE8CEC7C862AFAE5B37AA32DC5BB45912881A3276606DA41BF808A4EF92C318B355E616BF45A257B995520D72B7C08752C0BE445DCEADE5CF79F73480910FE D Copyright Joe Security LLC 2021 Page 7 of 21 C:\Users\user\AppData\Local\Microsoft\Internet Explorer\DOMStore\VXQPHS0A\www.weebly[1].xml Malicious: false Reputation: low Preview: <root></root> C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{A3B948A4-C7E9-11EB-90E4-ECF4BB862DED}.dat Process: C:\Program Files\internet explorer\iexplore.exe File Type: Microsoft Word Document Category: dropped Size (bytes): 30296 Entropy (8bit): 1.856276539099741 Encrypted: false SSDEEP: 96:rsZvZL2UW9rst9ryqf9rN5PrM9rcH59rytb9rZUf9rq5O7X:rsZvZL2UW9ot9Pf95BM989a9Kf9OcX MD5: 9077360F74A221A8E8C8AB33C28584C7 SHA1: 49595D84C435F058E1D3ADA15B5BB8D5591DE4FB SHA-256: 62ECDE01E20072AB6CE90D7A38C6AC2DB3E9EBF4D01E895C422BE2CD2283F49C SHA-512: FD612AE92DFB9714892C70B8B9359FFCBB70399D87D69D3F32093F27FAC243587BAB2AEEE943B0C11D5D2E88CF230DD0487D10C43F3F373B694FF72C4F6B3959 Malicious: false Reputation: low Preview: .............................................................................................................................................................................................................................................................................. ..................................................................................................................................................................................................................................................R.o.o.t.
Recommended publications
  • Optimal Interleaving: Serial Phonology-Morphology Interaction in a Constraint-Based Model
    OPTIMAL INTERLEAVING: SERIAL PHONOLOGY-MORPHOLOGY INTERACTION IN A CONSTRAINT-BASED MODEL A Dissertation Presented by MATTHEW ADAM WOLF Submitted to the Graduate School of the University of Massachusetts Amherst in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY September 2008 Department of Linguistics © Copyright by Matthew Adam Wolf 2008 All Rights Reserved OPTIMAL INTERLEAVING: SERIAL PHONOLOGY-MORPHOLOGY INTERACTION IN A CONSTRAINT-BASED MODEL A Dissertation Presented by MATTHEW A. WOLF Approved as to style and content by: ____________________________________ John J. McCarthy, Chair ____________________________________ Joseph V. Pater, Member ____________________________________ Elisabeth O. Selkirk, Member ____________________________________ Mark H. Feinstein, Member ___________________________________ Elisabeth O. Selkirk, Head Department of Linguistics ACKNOWLEDGEMENTS I’ve learned from my own habits over the years that the acknowledgements are likely to be the most-read part of any dissertation. It is therefore with a degree of trepidation that I set down these words of thanks, knowing that any omissions or infelicities I might commit will be a source of amusement for who-knows-how-many future generations of first-year graduate students. So while I’ll make an effort to avoid cliché, falling into it will sometimes be inevitable—for example, when I say (as I must, for it is true) that this work could never have been completed without the help of my advisor, John McCarthy. John’s willingness to patiently hear out half-baked ideas, his encyclopedic knowledge of the phonology literature, his almost unbelievably thorough critical eye, and his dogged insistence on making the vague explicit have made this dissertation far better, and far better presented, than I could have hoped to achieve on my own.
    [Show full text]
  • How Children Learn to Write Words
    How Children Learn to Write Words How Children Learn to Write Words Rebecca TReiman and bReTT KessleR 1 3 Oxford University Press is a department of the University of Oxford. It furthers the University’s objective of excellence in research, scholarship, and education by publishing worldwide. Oxford New York Auckland Cape Town Dar es Salaam Hong Kong Karachi Kuala Lumpur Madrid Melbourne Mexico City Nairobi New Delhi Shanghai Taipei Toronto With offices in Argentina Austria Brazil Chile Czech Republic France Greece Guatemala Hungary Italy Japan Poland Portugal Singapore South Korea Switzerland Thailand Turkey Ukraine Vietnam Oxford is a registered trademark of Oxford University Press in the UK and certain other countries. Published in the United States of America by Oxford University Press 198 Madison Avenue, New York, NY 10016 © Oxford University Press 2014 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, without the prior permission in writing of Oxford University Press, or as expressly permitted by law, by license, or under terms agreed with the appropriate reproduction rights organization. Inquiries concerning reproduction outside the scope of the above should be sent to the Rights Department, Oxford University Press, at the address above. You must not circulate this work in any other form and you must impose this same condition on any acquirer. A copy of this book’s Catalog-in-Publication Data is on file with the Library of Congress ISBN 978–0–19–990797–7
    [Show full text]
  • Armenian Range: 0530–058F
    Armenian Range: 0530–058F This file contains an excerpt from the character code tables and list of character names for The Unicode Standard, Version 14.0 This file may be changed at any time without notice to reflect errata or other updates to the Unicode Standard. See https://www.unicode.org/errata/ for an up-to-date list of errata. See https://www.unicode.org/charts/ for access to a complete list of the latest character code charts. See https://www.unicode.org/charts/PDF/Unicode-14.0/ for charts showing only the characters added in Unicode 14.0. See https://www.unicode.org/Public/14.0.0/charts/ for a complete archived file of character code charts for Unicode 14.0. Disclaimer These charts are provided as the online reference to the character contents of the Unicode Standard, Version 14.0 but do not provide all the information needed to fully support individual scripts using the Unicode Standard. For a complete understanding of the use of the characters contained in this file, please consult the appropriate sections of The Unicode Standard, Version 14.0, online at https://www.unicode.org/versions/Unicode14.0.0/, as well as Unicode Standard Annexes #9, #11, #14, #15, #24, #29, #31, #34, #38, #41, #42, #44, #45, and #50, the other Unicode Technical Reports and Standards, and the Unicode Character Database, which are available online. See https://www.unicode.org/ucd/ and https://www.unicode.org/reports/ A thorough understanding of the information contained in these additional sources is required for a successful implementation.
    [Show full text]
  • N5020 2019-01-11
    ISO/IEC JTC 1/SC 2 N____ ISO/IEC JTC 1/SC 2/WG 2 N5020 2019-01-11 ISO/IEC JTC 1/SC 2/WG 2 Universal Coded Character Set (UCS) - ISO/IEC 10646 Secretariat: ANSI DOC TYPE: Meeting minutes TITLE: Unconfirmed minutes of WG 2 meeting 67 SOAS University of London, London, UK; 2018-06-16/20 SOURCE: V.S. Umamaheswaran ([email protected]), Recording Secretary Michel Suignard ([email protected]), Convener PROJECT: JTC 1.02.18 - ISO/IEC 10646 STATUS: SC 2/WG 2 participants are requested to review the attached unconfirmed minutes, act on appropriate noted action items, and to send any comments or corrections to the convener as soon as possible but no later than the due date below. ACTION ID: ACT DUE DATE: 2019-05-01 DISTRIBUTION: SC 2/WG 2 members and Liaison organizations MEDIUM: Acrobat PDF file NO. OF PAGES: 46 (including cover sheet) ISO International Organization for Standardization Organisation Internationale de Normalisation ISO/IEC JTC 1/SC 2/WG 2 Universal Coded Character Set (UCS) ISO/IEC JTC 1/SC 2 N____ ISO/IEC JTC 1/SC 2/WG 2 N5020 2019-01-11 Title: Unconfirmed minutes of WG 2 meeting 67 SOAS University of London, London, UK; 2018-06-16/20 Source: V.S. Umamaheswaran ([email protected]), Recording Secretary Michel Suignard ([email protected]), Convener Action: WG 2 members and Liaison organizations Distribution: ISO/IEC JTC 1/SC 2/WG 2 members and liaison organizations 1 Opening Input document: 4950 Agenda for the 67th Meeting of ISO/IEC JTC 1/SC2/WG2, SOAS, London, U.K.
    [Show full text]
  • Armenian Phonetic Characters in Unicode∗
    Armenian Phonetic Characters in Unicode∗ Luc V. Baronian, PhD Visiting Scholar, Stanford Associate Professor, UQAC January 19, 2017 1 Introduction Armenian has a relatively small number of speakers, yet it has a sesquimillennial written tradition and several contemporary academic publications. The numeric disadvantage, combined with the existence of two standard versions of the modern language (Eastern and Western), a unique alphabet and the evolution of Armenia's universities in the sphere of Russia, rather than that of Western Europe and North America, have all contributed to a poorer knowledge of its language and its academic achievements in the West than it deserves. For example, there exists an Armenian linguistic tradition, which, like the American, French and other linguistic traditions, has used a phonetic alphabet of its own for about a century, but based on the Armenian alphabet. The works of Hrach'ya Acharyan1 were crucial in disseminating the use of this phonetic alphabet still in use today among Armenian scholars. 2 The characters proposed for inclusion in Unicode While most of the Armenian phonetic characters consist of Armenian letters with or without the use of diacritics such as the umlaut or a combining ring, I have identified two characters that cannot be represented in the current state of Unicode. The first character consists of ARMENIAN SMALL LETTER AYB (U+0561, ) rotated 180 degrees. The letter could sometimes be confused for a LATIN SMALL LETTER M (U+006D); however, in those Armenian fonts that use square angles for Ayb, the difference is noticeable. Even a rotated curvy Ayb may look different from an m, especially in the rendition of the initial m-stroke (final Ayb-stroke).
    [Show full text]
  • MSR-4: Annotated Repertoire Tables, Non-CJK
    Maximal Starting Repertoire - MSR-4 Annotated Repertoire Tables, Non-CJK Integration Panel Date: 2019-01-25 How to read this file: This file shows all non-CJK characters that are included in the MSR-4 with a yellow background. The set of these code points matches the repertoire specified in the XML format of the MSR. Where present, annotations on individual code points indicate some or all of the languages a code point is used for. This file lists only those Unicode blocks containing non-CJK code points included in the MSR. Code points listed in this document, which are PVALID in IDNA2008 but excluded from the MSR for various reasons are shown with pinkish annotations indicating the primary rationale for excluding the code points, together with other information about usage background, where present. Code points shown with a white background are not PVALID in IDNA2008. Repertoire corresponding to the CJK Unified Ideographs: Main (4E00-9FFF), Extension-A (3400-4DBF), Extension B (20000- 2A6DF), and Hangul Syllables (AC00-D7A3) are included in separate files. For links to these files see "Maximal Starting Repertoire - MSR-4: Overview and Rationale". How the repertoire was chosen: This file only provides a brief categorization of code points that are PVALID in IDNA2008 but excluded from the MSR. For a complete discussion of the principles and guidelines followed by the Integration Panel in creating the MSR, as well as links to the other files, please see “Maximal Starting Repertoire - MSR-4: Overview and Rationale”. Brief description of exclusion
    [Show full text]
  • Proposal for an Armenian Script Root Zone LGR 1 General Information
    Proposal for an Armenian Script Root Zone LGR Version 3 Date: 2015-06-04 1 General information The purpose of this document is to give an overview of the proposed LGR and the rationale behind the design decisions taken. It includes a discussion of relevant features of the script, the communities or languages using it, the process and methodology used and information on the contributors. The formal specification of the LGR can be found in the accompanying XML document (Proposed-LGR-Armn- 20150604.xml). 1.1 Script for which the LGR is proposed Code: Armn N°: 230 English Name: Armenian Property Value Alias: Armenian Date: 2004-05-01 English name of the script: Hye Native name of the script: հայ The Armenian language is an Indo-European language spoken by the Armenians. It is the official language of the Republic of Armenia and the self-proclaimed Nagorno-Karabakh Republic. It has historically been spoken throughout the Armenian Highlands and today is widely spoken in the Armenian Diaspora. Armenian has its own unique script, the Armenian alphabet, invented in 405 AD by Mesrop Mashtots. Linguists classify Armenian as an independent branch of the Indo-European language family. There are two standardized modern literary forms, Eastern Armenian and Western Armenian, with which most contemporary dialects are mutually intelligible. 1 1.2 Principal languages using that script List Language code and name for each (from ISO 639-3) ISO 639-1 hy ISO 639-2 arm (B) hye (T) ISO 639-3 Variously: hye – Modern Armenian xcl – Classical Armenian axm – Middle Armenian Glottolog arme1241 Linguasphere 57-AAA-a 1.3 Geographic territories or countries with significant user communities for the script Official language in Armenia Nagorno-Karabakh Republic Big Diaspora using the Armenian language in Argentina Brazil Cyprus France Georgia (Samtskhe- Javakheti) Hungary Iraq Lebanon Poland Romania Syria Turkey Ukraine United States 2 Uruguay Total Armenian population in the world is about 10mln.
    [Show full text]
  • Fasold R., Connor-Linton J
    0521847680pre_pi-xvi.qxd 1/11/06 3:32 PM Page i sushil Quark11:Desktop Folder: An Introduction to Language and Linguistics This accessible new textbook is the only introduction to linguistics in which each chapter is written by an expert who teaches courses on that topic, ensuring balanced and uniformly excellent coverage of the full range of modern linguistics. Assuming no prior knowledge, the text offers a clear introduction to the traditional topics of structural linguistics (theories of sound, form, meaning, and language change), and in addition provides full coverage of contextual linguistics, including separate chapters on discourse, dialect variation, language and culture, and the politics of language. There are also up-to-date separate chapters on language and the brain, computational linguistics, writing, child language acquisition, and second language learning. The breadth of the textbook makes it ideal for introductory courses on language and linguistics offered by departments of English, sociology, anthropology, and communications, as well as by linguistics departments. RALPH FASOLD is Professor Emeritus and past Chair of the Department of Linguistics at Georgetown University. He is the author of four books and editor or coeditor of six others. Among them are the textbooks The Sociolinguistics of Society (1984) and The Sociolinguistics of Language (1990). JEFF CONNOR-LINTON is an Associate Professor in the Department of Linguistics at Georgetown University, where he has been Head of the Applied Linguistics Program and Department
    [Show full text]
  • I.Mkrtumyan, Armenian Registry
    Arm GP Proposal for an Armenian Script Root Zone LGR (TLDCON-2015, IDN Session) I.Mkrtumyan, Armenian Generation Panel ISOC Annual Meeting, Yerevan, 1 Nov. 7, 2012 General information Armenian IDN • Code: Armn • N°: 230 • English Name: Armenian • English name of the script: Hye • Native name of the script: հայ The announcement for the successful completion of Armenia's string evaluation has been posted at https://www.icann.org/news/announcement- 2014-11-20-en. September 10, 2015 TLDCON-2015, IDN Session 2 Armenian language • The Armenian language is an Indo- European language spoken by the Armenians. It is the official language of the Republic of Armenia and the self- proclaimed Nagorno-Karabakh Republic. It has historically been spoken throughout the Armenian Highlands and today is widely spoken in the Armenian Diaspora. September 10, 2015 TLDCON-2015, IDN Session 3 Armenian language • Armenians has its own unique script, the Armenian alphabet, invented in 405 AD by Mesrop Mashtots. • Linguists classify Armenian as an independent branch of the Indo-European language family. • There are two standardized modern literary forms, Eastern Armenian and Western Armenian, with which most contemporary dialects are mutually intelligible. • Total Armenian population in the world is about 10mln. September 10, 2015 TLDCON-2015, IDN Session 4 Geographic territories or countries with significant user communities for the script Official language in Armenia and Nagorno Karabakh Republic Big Diaspora using the Armenian language in Argentina Poland Brazil
    [Show full text]
  • Armenian and Cyrillic Homoglyphs
    IDN Root Zone LGR Workshop Sarmad Hussain | ICANN54 | 21 October 2015 Agenda Root Zone LGR – Asmus Freytag, IP Community Updates Chinese GP update – Wang Wei Japanese GP update – Hiro Hotta Arabic Script GP update – Nabil Benamar Armenian GP update – Igor Mkrtumyan Cyrillic GP update – Yuriy Kargapolov Q/A | 3 Armenian Generation Panel Lianna Galstyan and Igor Mkrtumyan Armenian language • The Armenian language is an Indo-European language spoken by the Armenians. It is the official language of the Republic of Armenia and the self-proclaimed Nagorno-Karabakh Republic. It has historically been spoken throughout the Armenian Highlands and today is widely spoken in the Armenian Diaspora. The following web site contains a full description of the Armenian repertoire for use in the Armenian writing system: http://www.omniglot.com/writing/armenian.htm October 21, 2015 IDN Workshop, ICANN 54 45 Selected code points Code Script Name Code Script Name 0561 ա ARMENIAN SMALL LETTER AYB 0574 մ ARMENIAN SMALL LETTER MEN 0562 բ ARMENIAN SMALL LETTER BEN 0575 յ RMENIAN SMALL LETTER YI 0563 գ ARMENIAN SMALL LETTER GIM 0576 ն ARMENIAN SMALL LETTER NOW 0564 դ ARMENIAN SMALL LETTER DA 0577 շ ARMENIAN SMALL LETTER SHA 0565 ե ARMENIAN SMALL LETTER ECH 0578 ո ARMENIAN SMALL LETTER VO 0566 զ ARMENIAN SMALL LETTER ZA 0579 չ ARMENIAN SMALL LETTER CHA 0567 է ARMENIAN SMALL LETTER EH 057A պ ARMENIAN SMALL LETTER PEH 0568 ը ARMENIAN SMALL LETTER ET 057B ջ ARMENIAN SMALL LETTER JHEH 0569 թ ARMENIAN SMALL LETTER TO 057C ռ ARMENIAN SMALL LETTER RA 056A ժ ARMENIAN
    [Show full text]
  • Proposal to Adjust Identifier Properties
    Proposal to Adjust Identifier Properties Date: 2019‐10‐07 Authors: Asmus Freytag, Mark Davis and Michel Suignard 1 Status This is an updated document. Appendices 3 and 4 are new, and for each section the proposed changes have been summarized. 2 Overview UTS#39 “Unicode Security Measures” provides a breakdown of code points by several overlapping Identifier Types. For example, “Exclusion” is based on UAX#31 “Unicode Identifier and Pattern Syntax” Table 4 and defines code points that should be excluded from identifiers as belonging to scripts and blocks of special use, archaic, liturgical and other uncommon or problematic characters. Since 2013, ICANN has been engaged in a process of defining the repertoire for IDN top level domain names resulting in a specification called the Root Zone Label Generation Rules (RZ‐LGR). As first step in that process, a Maximal Starting Repertoire (MSR) has been created, that similar to the Identifier Types attempts to set an outer boundary of code points, within which the LGRs for specific scripts can be designed. The scope of the RZ‐LGR and therefore the MSR in principle encompasses all modern writing systems that are in general, everyday use. (See the [Procedure] document establishing the parameters and goals of the project). The development of the MSR took into account the information from UAX#31 on recommended scripts, but excluded Bopomofo, which was seen as not sufficiently general. Where code points weren’t associated with known orthographies, the developers consulted the original character proposals (where available) to understand the nature of the proposed character and whether they were for modern orthographies of more specialized purposes.
    [Show full text]
  • IDN Program Update Sarmad Hussain | IDN Program Sr
    IDN Program Update Sarmad Hussain | IDN Program Sr. Manager | 24 June 2015 Agenda ¤ IDN Program - Overview and Progress – Sarmad Hussain ¤ Integration Panel Update – Integration Panel ¤ Community Updates: • Arabic Generaon Panel – Meikal Mumin • Armenian Generaon Panel – Igor Mkrtumyan • Japanese Generaon Panel - Hiro Hoa • Korean Generaon Panel - Kyongsok Kim ¤ Q&A | 3 IDN Program – Overview and Progress Sarmad Hussain IDN Program Senior Manager ICANN Overview of Presentation !! IDNs at Top Level •! IDN TLD Program ?(@' ?(@' A9)&%B&#+,*' H)I).,93)*6' o! Label Generation Ruleset (LGR) #*C'D,,.'E-FG' E-JKJG' o LGR Toolset ! 4HL'M#"K' 4HL'&&D?H' 439.K'E-NG' O#:6'D"#&1' o! IDN Variant Implementation •! IDN ccTLD Fast Track Process 4HL'?#*52#5)' 4HL''439.K' Implementation D#$.):' (2%C).%*):'' !! IDNs at Second Level for gTLDs P,332*%&#+,*:'-.#*' •! IDN Implementation Guidelines QR)&2+,*' •! IDN Tables !! Community Outreach and Involvement | 5 IDN TLD Program H)6)"3%*)' 439.)3)*6' 4C)*+Y7'4::2):' H)B*)'-",$.)3' A,.2+,*' A,.2+,*' P#:)'A62C%):T' 4*6)5"#6)C'4::2):' -",W)&6:T' -",W)&6:T' !"#$%&' @)9,"6'' -F'?(@'X0?' -F'?(@'A9)&:K' PU%*):)' A9)&%B&#+,*' #*C'D,,.:)6' P7"%..%&' -JKF'?(@'-",&)::' -JKJ'?(@' Y,"'6U)'@,,6'Z,*)' H)I).,93)*6' -<!AQ'F'EJSFFG' H)I#*#5#"%' -['\:)"' -N'?(@' ("))1' -<!AQ'J'EJSFF;FJG' -<!AQ'V'EJSFJ;FVG' QR9)"%)*&)'A62C7' 439.)3)*6#+,*' -<!AQ']'EA%*&)'JSFVG' ?#+*' Y,"'D?H'M#"%#*6:' Community agreed to define Label Generation Rules (LGR). Reports and documentation of all completed projects available at: https://www.icann.org/resources/pages/reports-2013-04-03-en.
    [Show full text]