^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ CRYPT NEWSLETTER #6 (or something like that) - still another in an occasional series of info-glutted, humorous monographs solely for the enjoyment of the virus programming pro or enthusiast interested in the particulars of cyber-electronic data replication and corruption. -Edited by URNST KOUCH. [Oct. 1992] ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ This issue's top quote: ****************************************************** "Giveitaway, giveitaway, giveitaway now!" --long-haired, tattoo'd dolt from The Red Hot Chili Peppers, speaking out about viral source code at a recent computer security seminar. ****************************************************** IN THIS ISSUE: Local NEWS...New Section: INCAPABILITIES - exposing the flaws in various a-v software packages with Urnst Kouch and other guest 'speakers' like Vesko Bontchev...Charles Bowen: Recipient of National Dummkopf Award...rehash of US NEWS & WORLD REPORT/IRAQI COMPUTER VIRUS imbroglio...The INSUFF/MtE spawning viruses... ...COMPUFON trojan...'ARTIFICIAL LIFE' book review...ZCOMM & Hyper- ACCESS: more term programs (one with a-v scanning), definitely not for sissies...DIOGENES virus...sarcasm, trenchant wit, etc. NEWS! NEWS! NEWS! NEWS! NEWS! IF THE SHOE FITS: Some users of the FidoNet's Virus echo have been seen referring to moderator Frans Hagelaars as "Dutch" ever since Crypt Newsletter renamed him back in August. IN CONTINUING FIDO VIRUS ECHO NEWS, Sara Gordon, the e.e.cummings of antivirus-dom, has been seen flaming on baseball pro David Justice who provoked her by impugning her looks. We offer to settle this dispute at the Crypt Newsletter. If Sara and David will send cheap portraits of themselves (it must be the kind of photo obtained from an arcade photo booth - you know, the ones you see on the boardwalk in Ocean City, NJ.), Crypt Newsletter editors will judge them on the basis of "looks" and publish the results in a future issue. The address of the Crypt Newsletter is: The heehee Desk Mr. Aggrieved, Assoc. Editor POB 1234 Nether Poo-Stink, PA 18017 LATE BREAKING GOSSIP: Pro-ballplayer Dave Justice was just seen cursing Paul Ferguson's name in the Virus echo. This nullifies the Gordon/Justice 'looks' rate-down. It would have been unfair to exclude Ferguson from the contest but the editors of the newsletter are too busy to judge the expanded field of entrants, so we decided to cancel. Hey, cool it wontcha, guys?? But, on more serious matters, we excerpt a tiny segment of one of Sara Gordon's mid-September FIDO flames for further comment: "...if you are interested in keeping information free, then learn to be responsible with its use. your freedom to information does not include the right to destroy it. its [sic] MY information too, and its [sic] not YOUR right to rip it up. "if you think killing people is cool, and are aware of the implications of your actions,i.e. knowing that your virus could wipe out some hospital database in some third world country, or even in u.s.a. in appalachia, where they cant [sic] afford backups, and effectively be responsible for the deaths of innocent people, then write them." WHoah! Whoah! Whoah! Sara! What a stretch. Let's entertain that fool claim for a moment. Do you think a backwoods hospital would have computers, but no hard copy system? (What if a fire broke out in "RECORDS"?) But even if we let that slide for the sake of the argument, let's consider a different tool of destruction. Arms. The U.S. sell arms to lunatics on the left and right in "Third World Countries." Does anyone who makes them in this country get held responsible, or even LOSE ANY SLEEP, when civilians get blown away by the same guns in any number of mindless civil wars? Of course not, BECAUSE IT'S THE AMERICAN WAY TO BE AN INCONSIDERATE, HYPOCRITICAL LOUSE. So, jumping back to computer viruses, which are decidedly more trivial than the business end of a Claymore mine, it's totally ludicrous to even presume that virus programmers are "effectively responsible for the deaths of innocent people." Far better to waste your time, if you must Sara, arguing with the arms merchants than virus programmers, we think. In fact, The Crypt Newsletter decided to back this up with a little research on virus strikes in hospitals. Now keep in mind, although our skills are much vaunted, we're still a relatively new publication and your results may differ. Still, this is the best we could come up with - two small newspieces purloined from CSERVE (who in turn purloined them from the New England Journal of Medicine) ca. 1989. What follows is transcript: --------------------------------- HOSPITAL STRUCK BY COMPUTER VIRUS --------------------------------- (March 22) - 1989 Data on two Apple Macintoshes used by a Michigan hospital was altered recently by one or more computer viruses, at least one of which apparently traveled into the system on a new hard disk that the institution bought. In its latest edition, the prestigious New England Journal of Medicine quotes a letter from a radiologist at William Beaumont Hospitals in Royal Oak, Mich., that describes what happened when two viruses infected computers used to store and read nuclear scans that are taken to diagnose patients' diseases. The radiologist, Dr. Jack E. Juni, said one of the viruses was relatively benign, making copies of itself while leaving other data alone. However, the second virus inserted itself into programs and directories of patient information and made the machines malfunction. "No lasting harm was done by this," Juni wrote, because the hospital had backups, "but there certainly was the potential." Science writer Daniel Q. Haney of The Associated Press quoted Juni's letter as saying about three-quarters of the programs stored in the two Mac II PCs were infected. Haney said Juni did not know the origin of the less harmful virus, "but the more venal of the two apparently was on the hard disk of one of the computers when the hospital bought it new. ... The virus spread from one computer to another when a doctor used a word processing program on both machines while writing a medical paper." Juni said the hard disk in question was manufactured by CMS Enhancements of Tustin, Calif. CMS spokesman Ted James confirmed for AP that a virus was inadvertently put on 600 hard disks last October. Says Haney, "The virus had contaminated a program used to format the hard disks. ... It apparently got into the company's plant on a hard disk that had been returned for servicing. James said that of the 600 virus-tainted disks, 200 were shipped to dealers, and four were sold to customers." James also said the virus was "as harmless as it's possible to be," that it merely inserted a small piece of extra computer code on hard disks but did not reproduce or tamper with other material on the disk. James told AP he did not think the Michigan hospital's problems actually were caused by that virus. --Charles Bowen [October's Crypt National Dummkopf] ------------------------------ MORE HOSPITALS STRUCK BY VIRUS ------------------------------ (March 23) - 1989 The latest computer virus attack, this one on hospital systems, apparently was more far- reaching than originally thought. As reported here, a radiologist wrote a letter to the New England Journal of Medicine detailing how data on two Apple Macintoshes used by the William Beaumont Hospital in Royal Oak, Mich., was altered by one or more computer viruses. At least one of the viruses, he said, apparently traveled into the system on a new hard disk the institution bought. Now Science writer Rob Stein of United Press International says the virus -- possibly another incarnation of the so-called "nVIR" virus -- infected computers at three Michigan hospitals last fall. Besides the Royal Oak facility, computers at another William Beaumont Hospital in Troy, Mich., were infected as were some desktop units at the University of Michigan Medical Center in Ann Arbor. Stein also quoted Paul Pomes, a virus expert at the University of Illinois in Champaign, as saying this was the first case he had heard of in which a virus had disrupted a computer used for patient care or diagnosis in a hospital. However, he added such disruptions could become more common as personal computers are used more widely in hospitals. The virus did not harm any patients but reportedly did delay diagnoses by shutting down computers, creating files of non-existent patients and garbling names on patient records, which could have caused more serious problems. Dr. Jack Juni, the radiology who reported the problem in the medical journal, said the virus "definitely did affect care in delaying things and it could have affected care in terms of losing this information completely." He added that if patient information had been lost, the virus could have forced doctors to repeat tests that involve exposing patients to radiation. Phony and garbled files could have caused a mix-up in patient diagnosis. "This was information we were using to base diagnoses on," he said. "We were lucky and caught it in time." Juni said the virus surfaced when a computer used to display images used to diagnose cancer and other diseases began to malfunction at the 250-bed Troy hospital last August. In October, Juni discovered a virus in the computer in the Troy hospital. The next day, he found the same virus in a similar computer in the 1,200-bed Royal Oak facility. As noted, the virus seems to have gotten into the systems through a new hard disk the hospitals bought, then spread via floppy disks. The provider of the disk, CMS Enhancements Inc. of Tustin, Calif., said it found a virus in a number of disks, removed the virus from the disks that had not been sent to customers and sent replacement programs to distributors that had received some 200 similar disks that already had been shipped. However, CMS spokesman Ted James described the virus his company found as harmless, adding he doubted it could have caused the problems Juni described. "It was a simple non-harmful virus," James told UPI, "that had been created by a software programmer as a demonstration of how viruses can infect a computer." Juni, however, maintains the version of the virus he discovered was a mutant, damaging version of what originally had been written as a harmless virus known as "nVIR." He added he also found a second virus that apparently was harmless. He did not know where the second virus originated. --Charles Bowen [October's Crypt National Dummkopf] -------------------------------------------------------------------- Hmmmmm. Pretty slim pickin's, Sara Gordon. No fatalities, no injuries, no nothing. A lot of 'but if's', though. But at the Crypt Newsletter we don't count 'but if's'. 'But if's' are the domain of mediocre bureaucrats, Pentagon nuclear war planners, corporate stiffs and American double-knit upper management types. However, here at the editorial bungalow, we know you were riled on the FidoNet when you e-mailed the now deemed idiot observation about virus programmers being "effectively responsible for the deaths of innocent people," so we won't give you this issue's "National Dummkopf" award. It's Charles Bowen's (for reasons described below). Your rep remains unblemished. All readers are invited to e-mail any evidence of "computer virus induced human death" to the Crypt Newsletter at any time. We'll put it in a news piece called, appropriately, "Computer Virus Induced Human Death (or Man Bites Dog)" That has a nice ring, don't you think? *************************************************************************** PITY CSERVE's CHARLES BOWEN, HE CAN'T TALK AND CHEW GUM AT THE SAME TIME. AND THAT'S WHY CRYPT NEWSLETTER REPRINTS THIS STORY WITHOUT PERMISSION BUT WITH A "BOWEN TRANSLATION" SO THAT YOU ALL MIGHT BENEFIT. YOU GOT IT, CHARLES BOWEN GET'S THIS ISSUE's 'NATIONAL DUMMKOPF' AWARD!! HE CAN SHARE IT WITH JEFFREY O. KEPHART OF IBM's HIGH INTEGRITY COMPUTING LAB, AS YOU SHALL SEE. {Comments in []'s by URNST KOUCH} ************************************************************************** CSERVE's Online Today, Sept. 8, 1992 SPREAD OF VIRUSES SLOWER THAN SOME THINK, IBM RESEARCH SUGGESTS (Sept. 8) A study conducted by an IBM computer scientist at the Thomas J. Watson Research Center suggests computer viruses may spread more slowly and less widely than some current estimates project. IBM said in a statement from Yorktown Heights, N.Y., that an immediate implication of the work "is that the computer virus problem will not become explosively rampant as some experts [WHO??] have predicted on the basis of conventional epidemiological models that overlook important constraining factors." IBM said the discrepancy in projections arises from "topology," that is, the structure of the connectedness among individuals in the population through which infection spreads. [You said a mouthful.] Jeffrey O. Kephart of IBM's computer sciences department, said the importance of topology in analyzing the way things like viruses and rumors [What the Hell is this nonsense? Viruses are related to rumors?] Mebbe so, mebbe so. But you're gonna have to go back to Michelangelo for that story.] spread in a population is seldom taken into sufficient account. Kephart said most epidemiological projections of the spread of viral infections -- in people as well as in computers -- are based upon the assumption of a fully-connected world: in effect, a world in which everyone is connected to everyone else. [No, not true. "Epidemiology" generally deals with the spread of disease in living populations where every member of the affected group is thought to have some potential for contracting the "bug." This "everyone connected to everyone else" stuff is bogus.] For example, members the "homogenous-mixing" topology makes epidemiology easy, he observed, but is obviously not realistic. [Eh? Good jargon, though. Your guess is as good as mine and I KNOW something about this stuff.] Nonetheless, says IBM, Kephart's research "shows that it works rather well for certain kinds of infectious diseases, particularly air-borne ones like influenza." [Does it? Evidence? Where is it?] He says computer-virus infections present quite a different story, noting that they are usually spread by friends exchanging disks that contain the virus. [Isn't this rather reminiscent of the popular description sof how the AIDS virus is transmitted? So just how is computer virus spread different? It'c certainly not clear at all here.] Kephart, a member of IBM's High Integrity Computing Laboratory, says the kind of connectedness that characterizes the spread of computer viruses is thus not homogenous but local. In this topology, "individuals connect not to everyone else but only to their nearest neighbors who [have compatible computers, and] in turn, are connected [only] to their neighbors [who have compatible computers], and so on," says the statement. [I'm sure this is what Kephart really means.] "The effects of different topologies on the spread of an infection becomes striking when the homogenous-mixing and local models are compared. In a fully-connected, homogenous population, Kephart explained, an infectious disease spreads exponentially -- explosively -- and all-encompassingly. [Bah. This is unadulterated horse shit. Most examples of disease never spread in this manner, but, then, there goes the story! The spread of disease in human populations is remarkable for its variability, not homogeneity. If what he says happens were true, we'd all die of cholera everytime there's an outbreak in Peru.] In a local topology, he said, infection is transmitted sparsely, from each individual to just a few others." --Charles Bowen [While Kephart's research is doubtless interesting, you'd never know it from Bowen's short, tangled mess. Full of jargon and bullshit, all you can get from it is that computer viruses, on the whole, are restricted to local outbreaks. Big deal, didn't we already know that? Perhaps a better word for characterizing computer virus infection is the term "smoldering." While this is only from personal experience, it seems virus infections "smolder" on a local basis, mostly unseen and untrackable, but very occasionally erupting into runaway outbreaks which disrupt school systems, corporate workplaces, and probably most often, the private home where some chowderhead is engaged in obsessive/compulsive software piracy. 'Smoldering,' BTW is a term epidemiologists often use to describe various natural infections.] -*- ************************************************************************** AND IN CASE YOU DIDN'T KNOW WHERE WE GOT THE IDEA FOR THE 'NATIONAL DUMMKOPF' AWARD, THIS REPRINT OF THE US NEWS & WORLD REPORT/IRAQI COMPUTER VIRUS BOONDOGGLE MAY REFRESH YOUR MEMORY ************************************************************************** From CSERVE's OnLine Today, Sept 11, 1992 [No, I don't know why they've chosen to reprint it now.]: Monitor - {comments in [] by URNST} US HIT IRAQI COMPUTERS WITH VIRUS BEFORE GULF WAR, MAGAZINE SAYS (Jan. 11) A weekly news magazine is reporting US intelligence agents inserted a virus into a network of Iraqi computers tied to that country's air defense system several weeks before the start of the Persian Gulf War a year ago. US News and World Report, citing two unidentified senior US officials, reports in its issue dated next week the virus was designed by the supersecret National Security Agency at Fort Meade, Md., and was intended to disable a mainframe computer. The magazine says the virus appeared to have worked, but gave no details. The report is part of a book, based on 12 months of [somewhat shakey] research by US News reporters, called "Triumph Without Victory: The Unreported History of the Persian Gulf War," to be published next month. The magazine also said the virus operation may have been irrelevant because of the allies' overwhelming air superiority. It reported the secret operation began when US intelligence agents identified a French-made computer printer that was to be smuggled from Amman, Jordan, to a military facility in Baghdad. The Associated Press, quoting the magazine report, says, "The agents in Amman replaced a computer microchip in the printer with another microchip that contained the virus in its electronic circuits. By attacking the Iraqi computer through the printer, the virus was able to avoid detection by normal electronic security measures, the report said." The magazine goes on, "Once the virus was in the system, the US officials explained, each time an Iraqi technician opened a `window' on his computer screen to access information, the contents of the screen simply vanished." --Charles Bowen WAS REPORT OF US VIRUS ASSAULT ON IRAQI SYSTEM BASED ON A SPOOF? (Jan. 14) A 1991 April Fools Day spoof in a computer magazine has writers and editors at US News and World Report rechecking sources on its report that the US inserted a virus into a network of Iraqi air defense computers several weeks before the start of the Persian Gulf War. As reported earlier, the news magazine cited two unidentified senior US officials in reporting the alleged virus was designed by the supersecret National Security Agency at Fort Meade, Md., and was transmitted by a printer smuggled into Baghdad. The magazine said the virus appeared to have worked, but gave no details. However, Associated Press writer Robert Burns reports today, "Trouble is, a computer industry publication, InfoWorld, sketched out a strikingly similar scenario in a column that ran in its April 1, 1991, issue. That article was an April Fool's joke, pure fantasy dreamed up by writer John Gantz." This news has the folks at US News and World Report concerned. The main author of the magazine's report, Brian Duffy, told Burns, "I have no doubt" US intelligence agents carried out such an operation, though he acknowledged the similarities with the InfoWorld article were "obviously troubling." Duffy said the magazine is rechecking its sources to determine whether details from InfoWorld's spoof "leeched into our report." [No news on whether desktop PC's at US NEWS & WORLD REPORT were infected by a LEECH virus variant.] As noted, US News said in print it had learned from unidentified US officials that intelligence agents placed the virus in a computer printer being smuggled to Baghdad through Amman, Jordan. It said the printer, described as French made, spread the virus to an Iraqi mainframe computer that the magazine said was critical to Iraq's air defense system. Burns notes the InfoWorld article was not labeled as fiction but "the last paragraph made clear that it was an April Fool's joke." [What does this mean: Said [article] was not labeled as fiction but "the last paragraph made clear it was an April Fool's joke"? See Orwell's "1984" for other good examples of "newspeak/doublespeak."] Gantz, the InfoWorld author, told Burns his article was "totally a spoof," and that he had no knowledge of any such intelligence operation. Burns said questions about the accuracy of the US News story arose yesterday "when a number of readers called The AP to say the virus account was curiously like the InfoWorld article, which Duffy said he hadn't previously seen." [And monkeys are flying out my ass.] The InfoWorld spoof said the virus was designed by the National Security Agency for use against Iraq's air defense control system, and that the CIA had inserted the virus into a printer being smuggled into Iraq through Jordan before the Persian Gulf war began last January. The article continued, "Then the virus was on its own, and by Jan. 8, the allies had confirmation that half the displays and printers in the Iraqi air defense system were permanently out of commission." The US News report also said the virus was developed by the National Security Agency. Both the publications stressed the reason for placing the virus in the printer was to circumvent normal anti-tampering systems in mainframe computers. AP noted, however, some private computer experts said it seemed highly unlikely that a virus could be transferred to a mainframe computer from a printer. Winn Schwartau, executive director of the International Partnership Against Computer Terrorism, observed, "A printer is a receiving device. Data does not transmit from the printer to the computer." [Winn Schartau, obviously a cool guy, knows a line when he hears it.] --Charles Bowen MAGAZINE STICKS TO ITS GUNS ON ITS PERSIAN GULF WAR VIRUS STORY (Jan. 17) Contending it has re-checked its sources, US News & World Report says it is standing behind its original story that US intelligence agents tried to disable an Iraqi military network with a computer virus transported to Baghdad in a printer just before the start of the Persian Gulf War. The Associated Press reports the magazine said it had confirmed the attempt was made, as reported in its Jan. 20 issue, but had not been able to determine whether the virus attempt was successful. That original story was called into question when journalists noted its striking [I saw both articles. "Striking similarity" aren't the words I would use. How about "so exact it's plagiarism."] similarity to a 1991 April Fools Day spoof published in the computer magazine, InfoWorld. AP quoted US News editors as saying in a statement, "We took seriously questions which were raised about the accuracy of this story and have re-reported it. We have confirmed that, as we reported, a high-level intelligence operation based in Jordan was targeted at Iraqi air defenses. As we reported, a computer virus was inserted into a French-made computer printer that was to be smuggled into Iraq to disable its air defense system. What cannot be confirmed is whether the operation was ultimately successful." [LIARS.] Brian Duffy, the magazine's assistant managing editor for investigative projects, told the wire service the original sources believed the system must have worked because Iraqi air defense guns opened up before any US airplanes had appeared. [Liar, liar, pants on fire. How does that prove anything? Mebbe the Iraqis were jumpy is a far better explanation.] Duffy said the magazine checked [Liar, liar, pants on fire.] with two senior Pentagon officers who confirmed the planting of the virus in the printer, but said it was not known whether the printer ever reached Iraq. [Hoho! That's an interesting way to get off the hook. I'll have to remember it.] --Charles Bowen ------------------------------------------------------------------- AND WE'RE STILL KEEPING AN EYE ON THE WORLD OF CORPORATE STIFFS (OR ANOTHER ONE SOURCE, STRONG BUT VAGUE NEWSPIECE): ------------------------------------------------------------------- BEWARE OF THE INFESTED UNDERGROUND BBS - from LAN Times, Sept. 14, 1992 Virus-authoring toolkits for creating rogue code are working their way into the arsenals of the nation's top computer crackers. The initial distribution point for this new variety of CASE tool is an underground BBS sponsored by a select fraternity of highly intelligent, but socially inept, teens. Some experts fear the toolkits could increase the crackers' productivity exponentially, enabling them to generate viruses far faster than the security industry could detect each new strain and come up with antidotes or vaccines. "The current crop of virus-authoring tools have so far only produced only mediocre viruses, and some don't work at all," said one security expert who has examined the code. "However, some of these fledgling viruses could prove lethal. All the authors would have to do is simply alter one piece of the instruction code." The BBS fraternity is thus far confined to about 25 members, with dozens more "wanna-be's" trying to penetrate the inner circle. To gain acceptance, newcomers must establish their bona fides. First, they get the attention of the ringleaders with a creative login name. This is usually a historical character or an outlandish nickname, such as "Dr. Doom" or "Master Blaster." Next comes the initiation rite. "This usually consists of uploading a new, exotic virus that the crackers haven't seen or heard of," the security expert told LAN Times. If the new guys do indeed upload such a virus, the BBS ringleaders will usually let them download one of the virus writing tools. "The BBS is really the equivalent of a clubhouse or fraternity for these kids," said another source. Electronic bulletin boards are legitimate sources of information accessed by hundreds of thousands of users each day. And, ironically, the legitimate BBSes are often the best sources for the cracker network. There is one BBS in San Francisco whose members are made up almost entirely of security practitioners. Among the files it disseminates is 40HEX, which contains disassemblies of viruses. While the sponsors of this BBS are the good guys, anyone can get access by paying $45 for a membership in the National Computer Security Association (NCSA). The NCSA has about 1,000 members, and all of them - security professionals and crackers alike - can download virus code from the BBS. --L.D. [This story was obviously 'leaked' by some holier-than-thou fink in the anti-virus community who's got a professional axe to grind with the NCSA. Christ, these people will eat themselves if left alone long enough.] **************************************************************************** INCAPABILITIES!! - a new Crypt column discussing plotted weaknesses INCAPABILITIES!! - in current editions of antivirus software. INCAPABILITIES!! - This month's kickoff report by Vesko Bontchev, INCAPABILITIES!! - culled from a Virus Digest/FidoNet transmission. Software pack (the INSUFF/MtE spawning viruses) and additional research by URNST KOUCH. THE MTE, POLYMORPHIC VIRUSES AND SCANNING TECHNOLOGY (OR LACK OF IT) VIRUS-L Digest Thursday, 10 Sep 1992 Volume 5 : Issue 150 Date: 09 Sep 92 19:31:01 +0000 >From: bontchev@fbihh.informatik.uni-hamburg.de (Vesselin Bontchev) Subject: Scanners and polymorphic viruses (PC) Hello, everybody! With the advent of the sophisticated polymorphic viruses like Dark Avenger's Mutating Engine, it is becoming more and more obvious that the scanners have really hard time to detect all infections. I have already posted several times articles about how well (or, more exactly, how bad) the different scanners detect the MtE-based viruses. Several people have asked me why I am testing only MtE detection capabilities, since none of the currently existing MtE-based viruses is intelligent enough to spread widely and to be a significant danger. I am doing this because the MtE is one of the most sophisticated tool for building polymorphic viruses and presents a lot of trouble to the producers of scanning software. Therefore, the inability to detect the MtE-based viruses shows very well how limited the scanners are - the MtE has been available since almost a year, yet only about a dozen scanners achieve at least some success in detecting it. Of them about the half are unable to detect it reliably. However, the MtE-based viruses are not the only polymorphic viruses which present problems to the scanners... I have tested several scanners on a lot of examples of some of the most polymorphic viruses. There is clear need to use a lot of examples, since some scanners are able to detect only one or two instances of some polymorphic viruses - the examples that the producer of the scanner has... I used the following viruses during the tests: Standard CARO name: Number of different mutants generated: /------------------- -------------------------------------- Andryushka.A 46 Emmie 16 Haifa.Haifa 105 Haifa.Motzkin 101 Involuntary.A 8 Involuntary.B 89 Maltese_Amoeba 39 MtE_0_90.Dedicated 96 MtE_0_90.Pogue 98 MtE_0_90.Questo 101 MVF 96 Necros 115 PC-Flu_2 35 Silly_Willy 93 Simulate 29 Slovakia.2_02 81 Slovakia.3_00 57 StarShip 148 Tequila 68 Todor 101 V2Px.V2P1 35 V2Px.V2P2 8 V2Px.V2P6 27 V2Px.V2P6Z 61 WordSwap.1391 3 WordSwap.1495 10 Whale 164 (covering mutants #00 to #33) The following scanners were used during the tests: Scanner: Version: Producer: /-------- -------- --------- FindVirus 4.34 S & S International F-Prot 2.05 FRISK Software VIRUSCAN 95 McAfee Associates HTScan 1.8 Harry Thijssen VirX 2.4 Microcom AntiVir IV 4.04 H+BEDV Anti-Virus+ 4.20.01 IRIS CPAV 1.0 Central Point Software Some comments. You all know the first three products; I used the latest versions available. HTScan is a user-programmable scanner. It depends on a text file, containing wildcard scan strings. Since most polymorphic viruses cannot be detected this way (they need algorithmic approach), I tested another feature of the scanner - the so-called AVR modules. They are loadable at runtime small programs, which are executed by the scanner and are supposed to perform algorithmic detection of those polymorphic viruses, which cannot be detected with simple or even with wildcard scan strings. In this particular version, there are AVR modules for Maltese_Amoeba, MtE-based viruses, and the V2Px.* series. VirX I couldn't test. It does something incredibly stupid - tries to keep the whole report file in memory. Of course, it soon runs out of memory, so not record is kept about what viruses are detected and which are not. I did only a partial test - on the MtE-based viruses only. We have only a very ancient version of CPAV, so the test results for it are not up-to-date. That version tried to detect only V2Px.* and Whale. Unsuccessfully, on the top of that... Here are the results of the tests. Note that when I say that a scanner reliably detects a virus, this holds only for these tests. It does not mean that it will be able to detect all possible instances of the virus; it just means that I have been unable to find an instance that it does not detect. However, when I say that a scanner does not detect a virus reliably, this means that it misses at least one example and I have proven this. FindVirus detected all infected files. However, this result is not very fair towards the other scanners, since Dr. Solomon had access to the infected samples, before submitting that version of the scanner. This was not so with the other anti-virus producers. F-Prot failed to detect at all Necros, Silly_Willy and Todor. It failed to detect reliably Andryushka.A, Whale (mutant #32), and V2Px.V2P6Z (only one example missed). It detected reliably all other viruses. VIRUSCAN does not detect at all Andryushka.A and StarShip. The latter is rather strange, since I have submitted examples of this virus to McAfee Associates months ago. The scanner does not detect reliably MtE_0_90.Questo, MVF, Slovakia.2_02, Slovakia.3_00, V2Px.V2P6Z (only one example missed) and Whale (mutant #33 missed). It also sometimes misidentifies MtE_0_90.Pogue as 7thSon (when the virus is not encrypted), but SCAN is proverbial with its lack of exact identification. It succeeded to detect the other viruses reliably. VirX tested on the MtE-based viruses only still does not recognize those viruses reliably. It missed 12 of the total 292 examples. AntiVir IV (a German anti-virus product) does not detect at all Andryushka.A, Emmie, Haifa.Haifa, Haifa.Motzkin, Involuntary.A, Involuntary.B, MVF, Necros, PC-Flu_2, StarShip and Todor. It failed to identify correctly V2Px.V2P2 (one missed example) and Whale (several mutants). The other viruses were detected reliably - even the MtE-based one, with the exception that the non-encrypted files infected with an MtE-based virus were reported to contain two viruses. HTScan's AVR module for Maltese_Amoeba (IRISH.AVR) doesn't detect the virus reliably. Surprisingly, the collection of wildcard scan strings for the same virus, which is present in the text database, -does- detect this virus reliably. So, my advice to the users of HTScan is to delete the file IRISH.AVR and to rely on the database of signatures. The module for Haifa.Haifa detected reliably all instances of the virus, but didn't detect even one instance of the related virus Haifa.Motzkin. The module which is supposed to detect MtE-based viruses (its version is 2.3) failed to detect the non-encrypted examples, infected with MtE_0_90.Pogue and MtE_0_90.Questo. The module for the V2Px viruses (called "Washburn") detects reliably V2Px.V2P1, but missed one instance of V2Px.V2P2, three instances of V2Px.V2P6 and lots of instances of V2Px.V2P6Z. The Whale virus was detected reliably by the collection of scan strings in the database. Anti-Virus+ does not detect at all Andryushka.A, Emmie, MVF, Necros, Silly_Willy, Necros, Slovakia.2_02, Slovakia.3_00, StarShip, Tequila, Todor, WordSwap.1391 and WordSwap.1485. It did not detect reliably Involuntary.A (in SYS files), MtE_0_90.Dedicated, MtE_0_90.Questo, V2Px.V2P6, V2Px.V2P6Z and Whale (several mutants). The other viruses were detected reliably. The above tests clearly show that most of the current scanners are still unable to cope with the existing polymorphic viruses. Even with such well known viruses like V2P6 and MtE. At least one scanner was unable to detect even Tequila! This virus is quite widespread and can be detected with a few wildcard scan strings (3-4, I believe). And in the near future we'll see more and more polymorphic viruses... If some producer of scanning software thinks that his product is able to show better results but I have missed to test it, s/he is welcome to contact me and provide me a copy of their product (or tell me where to get it, if it is available through anonymous ftp). I am ready to test it and to publish the results, provided that: 1) The scanner is able to run without user intervention. I don't want to be prompted to "press any key" each time a virus is found. 2) The scanner is able to produce a report file. 3) The scanner is able to output in the report file the names of all files being scanned, not only those that it considers to be infected. 4) The scanner is requires a reasonable amount of memory. For instance, Norton Anti-Virus 2.1 refused to run in about 400 Kb free memory. A description how to instruct the scanner to conform to the above requirements (i.e., secret options, etc.) is welcome. Regards, Vesselin Vesselin Vladimirov Bontchev Virus Test Center, University of Hamburg Tel.:+49-40-54715-224, Fax: +49-40-54715-226 Fachbereich Informatik - AGN ** PGP public key available on demand. ** Vogt-Koelln-Strasse 30, rm. 107 C e-mail: bontchev@fbihh.informatik.uni-hamburg.de D-2000 Hamburg 54, Germany -*- Well, now, if only Vesko would clean up his English skills the report would have been damn near perfect. In any case, the report gets right to the heart of this issue's software offering: the INSUFFICIENT MEMORY (or INSUFF/INSUFFERABLE) viruses. If you're a virus collector, you know MtE loaded programs are a hot item. Even though the Engine is a genuine White Elephant (hobbled by incredibly poor documentation), because of judicious media attention and perfect p.r. timing by anti-virus software developers, it remains an object of keen interest to many rather poorly informed individuals. So, for your educational pleasure the Crypt Newsletter has worked up a number of simple MtE-loaded companion viruses, unique if only because no one but us has come up with the stupid idea of using the MtE in a spawning program. In keeping with Vesko's results, these viruses are not detected by the SCAN 95b, CPAV, VIREX or NAV's most recent roll-outs. In regards, to the latter I include a press release from SYMANTEC, for your review: "Our AntiVirus Labs tested the detection capabilities of The Norton AntiVirus v2.1 against the Mutation Engine, which created over 900,000 mutations during our test. The Norton AntiVirus v2.1 detected all 900,000, and will detect them on your system too, before they destroy your data." Here at the Crypt Newsletter we feel fortunate to have gotten those 900,001st, 900,002nd and 900,003rd MtE mutations that NAV 2.1 cannot detect. Ruh-hemmmhmmmm. Perhaps SYMANTEC shouldn't be so hasty in jobbing out these tasks to Gary Watson in the future. [It's an inside joke.] In any case, F-PROT 2.05, tbSCAN (ThunderByte) and AVScan v.097 (beta) (DataTechnik) do detect the MtE variants spawned from the viruses in this issue. tbSCAN, according to its documentation, disassembles the virus on the fly. It's easy to see why developer Frans Veldman may have decided to go this route if you load the INSUFF viruses into a debugger like ZanySoft's ZD86 and 'proc' step through them. (Or if you're ballsy, just 'Go.') It takes only an instant for the virus to 'unspool' in memory; a 'step through' through the MtE decryption key follows a distinct pattern for every 'mutant.' AVScan v. 097 did a nice job on them, too, even correctly identifying encrypted and unencrypted forms. However, only the techies will be using tBSCAN and AVScan. Your average mook lashes himself to SCAN, CPAV, VIRX, or NAV and these programs remain sadly inadequate when engaging 'new' MtE viruses. In our benchtop tests, all four failed to detect any mutants generated by our closely related school of spawning viruses. And that brings the discussion around to "Why SPAWNING, for crying out loud?" We shall tell you. The current edition of CPAV and a number of other no-name retail a-v packages are COMPLETELY vulnerable to penetration by companion viruses even with default resident protection and integrity checking enabled. To understand this, you must recall the spawning viruses don't actually touch your files. Instead, the average spawner goes out at infection time, looks for a target .EXE file and creates a duplicate of itself as a 'companion' .COM file to the targeted .EXE. Then when you call that .EXE, DOS looks around, finds a .COM (the virus) with the same name and loads it instead. Usually, the virus stores itself as a hidden, read-only, system file to elude casual observation and this is what the INSUFF programs do. In bench-top tests, CPAV DID NOT DETECT ANY of our companion virus infections. In fact, it added the 'companion' files to its .CPS integrity listings without a squeak. (CPAV was installed on our test system using the recommended defaults.) In comparison, Stiller Research's INTEGRITY MASTER 1.12 easily followed companion infections on our machine and notified the user with a warning screen which gave proper advice for removal. The Crypt Newsletter reader gets a lesson in simple virus design with the INSUFF programs. Spawning sneaks through a big back door in CPAV, the MtE polymorphic encryption targets many scanners directly. The INSUFF viruses still remain quite simple. The source code supplied will only give you a virus which searches the current directory. INSUFF1, then, illustrates the principle but will hardly get very far - probably not beyond a primary infection (although I never underestimate viruses). It is not even particularly dangerous since it doesn't touch your files and is easily removed by deletion. INSUFF2 is a little more interesting, for the reader impatient with INSUFF1. INSUFF2 will drop the NOIZ Trojan onto .EXE's in the current directory anytime after 4:00 pm. If INSUFF has already created 'companions' for these files, the user may see nothing initially. The NOIZ Trojan does not scan. However, when INSUFF2 is removed or eliminated as a 'companion' for the altered .EXE, the NOIZ Trojan will be unmasked. Calling the .EXE will install NOIZ in RAM where it takes up about 8k and compells the PC to make frequent, strange farting noises until the machine is rebooted. NOIZ will not install itself more than once in RAM, it is a semi-intelligent 'zombie.' Of course, it goes without saying that files altered by the NOIZ Trojan are permanently ruined and must be restored from back-up. The NOIZ trojan hooks a hardware interrupt when it becomes resident. We leave it to the reader as an insignificant academic exercise to find interrupt. Since INSUFF1 and INSUFF2 are 'direct-action' infectors of their current directory, they are FAST. If called on a system they will search and write to the drive in less than a fraction of a second. In most case, the drive light flicker will be analogous to what is seen when an "Unknown command or file name" error is produced. So, when a 'spawn-infected' program misfires because the virus is doing its business, it's quite possible the mystified user will repeat the command once or twice before giving up, putting the viruses well into the directory. [This is exactly the worst thing to do.] If called from a different directory in the path, INSUFF can get out of hand. Keep in mind that if INSUFF2 is on a system and called after 4 in the afternoon many executables may silently suffer 'zombie-fication.' This is frustratingly destructive and difficult to overlook. The newsletter also contains the DEBUG script for INSUFF3. INSUFF3 will jump out of the current directory once it has infected all files in it. This simple directory span increases its potential for fast spread considerably. INSUFF3, like INSUFF2, will trojanize selected .EXE files with the NOIZ 'zombie' in the directory it is called from anytime after 4:00 pm. [If the reader needs the source code for INSUFF2 and INSUFF3, both can be obtained, no-questions-asked, from the DARK COFFIN BBS, listed at the end of this document. Codes are located in the Crypt Newsletter directory in the Files section of the BBS.] Next issue: The poor man's guide to making multi-partite viruses. Maybe. (I tend to change my mind a lot.) ***************************************************************************** KRYPT KONSUMER KORNER (Guide to Term addendum): ZCOMM (Omen Technology) v. HyperACCESS/5 (Hilgraeve) -- ZCOMM, the shareware subset of Chuck Forsberg's Pro-YAM comm tool ain't for everyone. It doesn't beep and boop, it's got no menus to speak of; it is spare, spare, spare in 'looks.' But you, the assertive, manly Crypt newsletter reader don't crave 'looks' now, do you? You want performance - raw, uncompromised power! ZCOMM has it in spades. Enter ZCOMM in DOS. Up comes a command prompt. Type 'call koolwarez' and if you've had the wit to add the number of the KOOLWAREZ BBS to ZCOMM's master script, PHOMAST.T, with a simple ASCI editor, you're gone. (ZCOMM comes with a public domain editor, CSE, very similar in function to Semware's QEdit. CSE is from the Colorado School of Mines. You know they must have real men there!) For transfers, Forsberg gives you X/Y/ZModems in all their flavors, KERMIT, Clink, Telink, MODEM7 and WXModem. If that's not good enough, time to flee to Mars. As for performance, none of the ZModem implementations in the packages reviewed last issue (PCPlus 2.01, Telemate, QModem 5.0, COM-AND 2.8) approached that of ZCOMM. And if you're spying on someone's BBS or just remembered that you want to save something that scrolled by 5 minutes ago, ZCOMM will save your butt. Toggle its capture file and ZCOMM will write everything to disk from its ridiculously oversized scrollback buffer. Scrutinize a hex/ASCI dump of that raw virus you just downloaded with ZCOMM's display command! ZCOMM will remove noxious ESC sequences from screen captures polluted by the work of brain-damaged FelonyNet ANSI-artists, too, thus saving you and your printer much grief. Forget these features with ANY OTHER PACKAGE! In truth, though, many will not feel up to the ZCOMM/Pro-YAM challenge. These users will be easily befuddled by ZCOMM's UNIX-like instruction set and look. They will be bullied into submission by ZCOMM's stark command line and nettled at the prospect of doing all configuration from the master script with nothing but a text editor and a meager amount of cerebrum as safety nets. They will crash and curse ZCOMM's author savagely when attempting as simple a task as logging on to a "local" pd BBS. (Of course, The Crypt Newsletter reader is no such craven swine.) But such is the ZCOMM/Pro-YAM price of excellence. Another program vieing for dominance with ZCOMM/Pro-YAM in the brute power category is Hilgraeve's HyperACCESS/5 3.0. It is of interest here at the Crypt because it's the first instance of a comm program which incorporates virus scanning in its file transfer suite. That said, we did an off the cuff evaluation of HyperACCESS's anti- virus ability. The program will unpack .ZIPfiles on the fly and scan executables archived within them or scan your system as a stand-alone. A quick test revealed HyperACCESS could detect common viruses; in fact, it was rather efficient at picking up STONED 'droppers', JERUSALEM strains, numerous wearisome BURGER perversions and even the odd image file of a TELEFONICA boot infector. On the other hand, the scanner was sacked repeatedly the common MtE viruses as well as all Crypt newsletter formulations. It did not detect MALTESE AMOEBA, STARSHIP, COMMANDER BOMBER, SUOMI (eh?) or any VCL or PS-MPC creations or derivatives. Our consumer advice: you won't be buying HyperACCESS as an a-v scanner anytime soon. This simple a-v utility does suggest itself for one virus-hunting use. It might be a nice exercise to enable HyperACCESS's 'unzip-on-the- fly' option when downloading new virus samples from boards you suspect of having nothing but BURGER, VIENNA and AMSTRAD hacks. HyperACCESS can flag such archives as they arrive on your end, name the virus, and log the results to a file for later browsing. Then you have a nice report verifying the 'quality' of the audited Vx BBS. But even if we overlook its a-v features, HyperACCESS offers many handy utilities thought to be almost exclusively the domain of ZCOMM. It's got a fast, efficient file manager and its DOS gateway is supremely efficient. The capture buffer is generous and looks deep into the scrollback if you ask nice. HyperACCESS includes an extravagant text editor every bit the equal of QEdit with only a rather crippled spell-checker to mar the picture. (The first time I used it on the Crypt newsletter it crashed when confronted by all the 50-buck words.) In contrast to ZCOMM, HyperACCESS has been designed with an eye to luring away the average ProComm cripple from his favorite software. It will convert PCPlus 2.01 .FON directories for its own use although its documentation sneers at the 'look and feel' of the Datastorm product. HyperACCESS/5 can also be used by point-and-shoot premature ejaculators and has slippery-looking sliding menus and terminal screens which even I enjoyed in a corrupt sort of way. But Hilgraeve knows its limitations, too. While its ZModem implementation is adequate, HA/5 includes two macros for utilizing Omen's DSZ program as an instant drop-in. No figuring out stupid external batch files, hey, hey! On my disk, it's a toss-up between HyperACCESS/5 and ZCOMM/Pro-YAM. --------------------- ZCOMM 17.96 is $45 cash money shareware from Omen Technology. That's good for a diskette containing the ZCOMM programs and a daunting manual written in a style opaque to anyone even close to being a lip-reader. The unregistered ZCOMM is downloadable from just about everywhere, but I found it in the COMM Programs software library in CSERVE's IBMCOMM special interest group. (Type 'Go: IBMCOMM'). Hilgraeve's HyperACCESS/5 v. 3.0 is retail only, for a short time available at $49.95, not including shipping and handling. You can reach Hilgraeve at: 1-800-826-2760. ***************************************************************************** -*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*- THE READING ROOM: BOOKS OF INTEREST TO THE VIRUS COMMUNITY "Artificial Life" by Steven Levy (Pantheon) "Computer viruses, then, stand on the cusp of life - and soon will cross over." - Steven Levy in "AL" And here in Central Schnookville, PA, gravity drops to zero come noon and all the corporate stiffs lunching on the village common float through the air plucking startled birds out of the sky with their bare hands. A good portion of "Artifical Life" has Levy expounding that computer viruses fill what is known as the "strong claim" toward artificial life. It is the very essence of neo-intellectual flatus - the kind of prose that makes the ocassional reading of Scientific American such an unpleasant experience. Levy comes up with interesting descriptive jargon for viruses, too. "Add-on" which I suppose means "appending"; "shell" for God knows what. The "diabolical" Brain virus comes in for special attention; it hides a portion of itself in clusters marked "BAD," "a cluster stretches over 2 sectors of a 9 sector disk," writes Levy. (Hmmmm. Doesn't leave too much room for anything else, does it?) Plenty of minor stupid technical errors of this nature pepper Levy's book. Of course, they've flown by any number of dumbbell editors in the publishing business and they'll repeat the job on almost anyone who reads this book. But don't think that because no one will know, somehow it's right. It's not and, unfortuately, its typical of the modern 'science' journalist who thinks that simply by interviewing experts like Fred Cohen for three hours, he can magically obtain understanding. The skeptical Crypt newsletter reader will find "Artificial Life" is total crap. However, he may be amused by quotes like: "Machines, being a form of life, are in competition with carbon-based life. Machines will make carbon-based life extinct." (page 336) or "A rock would certainly be low on any continuum of aliveness . . ." (page 6). or "Steven Levy needs help finding his ass with both hands." (Oops, how'd that get in here???) Levy's previous work includes "Hackers," but "AL" WILL only be enjoyed by those who like the concept of "edu-tainment" or think that a library full of comic books, cyberpunk novels and cuttings from OMNI magazine constitute a national resource. The Crypt Newsletter gives "Artificial Life" a solid thumbs down! "ACCIDENTAL EMPIRES" by Robert X. Cringely (Addison-Wesley paperback) After wincing your way through "AL" you may want to head out to the local mall and pop for Cringely's worldview/thumbnail history of American computerland, now in paperback. Guaranteed, you'll be on the floor inside the first six pages when you read "Hate group number three . . . will just hate [this] book because somewhere I write that object- oriented programming was invented in Norway in 1967, when they know it was invented in BERGEN, Norway, on a rainy afternoon in late 1966. I never have been able to please these folks, who are mainly programmers and engineers, but I take some consolation in knowing that there are only a couple hundred thousand of them." Recognize the type? Yup, Robert, we see 'em every day here at the newsletter, too. Fuck 'em. The shrewd Crypt newsletter reader will guess that we give "Accidental Empires" a solid thumbs up! *********************************************************************** *********************************************************************** Crypt Newsletter Software: Additional documentation, lamentation and user notes for the terminally stupid. Why? Because we care! DIOGENES virus: Enclosed in this archive is a DEBUG script of DIOGENES virus. Created by Seeker, DIOGENES is a second generation VCL 1.0 derived, appending .COM infector. DIOGENES is encrypted and will do its virus thing until the 31st of any month. On that day, it will spoil the data and valuable programming on your hard drive in a quick, professional manner. DIOGENES is not scanned by the current editions of F-PROT (2.05), VIREX-PC, SCAN, CPAV, AVSCAN, NORTON ANTIVIRUS, INTEGRITY MASTER and tbSCAN. F-PROT 2.05 will flag it as being 'self-modifying' in heuristic mode, definitely a 'weak' warning. User documentation for DIOGENES is listed in DIOGENES.DOC; source code for the virus is archived on the DARK COFFIN BBS. To produce the software in the Crypt Newsletter, ensure that the DOS program, DEBUG, is in your path. At the C: prompt, type DEBUG <*.scr, where *.scr is the name of the .scr file of interest included with the newsletter. DEBUG will assemble the program from which the script is derived and write it to disk in the current directory. Also included as DEBUG scripts are the INSUFF viruses. INSUFF1's source listing, INSUFF.ASM, accompanies the archive but it cannot be assembled directly without possession of the MtE091b OBJECT files. We assume the average Crypt newsletter reader interested in the code will have a general idea on how to come by the MtE archive if he doesn't possess it already. In our continuing series of public domain and 'porn' trojan programs is the DEBUG script for COMPUFON, a pop-up auto-dialer and corporate phonebook complete with the usual utterly convincing yet COMPLETELY BOGUS documentation. COMPUFON is an assembly coded comms utility that will store a phone directory for you and will dial the phone. It will also smash the C; drive just before it dials your selected number. It is instructive because it demonstrates an easy source of trojan code: utility listings published and placed into public circulation by organizations like BYTE, PC MAGAZINE or Ziff-Davis. COMPUFON can be recognized as a hacked version of PC-DIAL. *********************************************************************** *********************************************************************** END NOTES: This issue's acknowledgements go to Seeker for tossing DIOGENES virus our way with nice attention to deadline. And I can't forget Nowhere Man who patiently answered some stupid questions on spawning viruses and MtE encryption. This issue of the Crypt newsletter should come in the archive CRPTLET6.ZIP. And the archive should contain: CRPTLET.TR6 - this electronic document INSUFF.ASM - TASM 2.5 source code for the basic INSUFF MEMORY viruses. INSUFF.SCR - DEBUG script for INSUFF virus INSUFF2.SCR - DEBUG script for INSUFF2 virus INSUFF3.SCR - DEBUG script for INSUFF3 virus DIOGENES.SCR - DEBUG script for DIOGENES virus, a third generation VCL 1.0 designed program DIOGENES.DOC - additional notes for DIOGENES virus CMPUFON.SCR - DEBUG script for the COMPUFON trojan CMPUFON.DOC - BOGUS documentation for COMPUFON WARNING.TXT - additional documentation for COMPUFON MAKE.BAT - .BAT file to assist in generation of INSUFF viruses If any of these files are missing demand upgrade at any of the BBS's listed in the tail of this file. In addition, you should realize that the programming examples in the Crypt newsletter are quite capable of folding, spindling and mutilating the valuables on your machine. Handle them stupidly or irresponsibly, and that's just what they'll do. Readers should feel free to send e-mail to editor URNST KOUCH on any of the BBS's listed in this file. On Hell Pit, I can be reached as COUCH. To ensure you don't miss an issue of the newsletter, I invite you to come to DARK COFFIN and e-mail me with a data number of your favorite BBS. I'll include it in my database and begin delivery if they'll have it. This guarantees you'll be the first on your block to get fresh issues. The Crypt newsletter is distributed first at the following sites: ÉÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ» º This V/T info phile brought to you by €ç˜ž, º º Makers/Archivists/Info Specialists on Viruses/Trojans. º ÌÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͹ º Dark Coffin úúúúúúúúúúúúúúúúúúúú HQ/Main Support úúú 215.966.3576 º ÇÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄĶ º VIRUS_MAN úúúúúúúúúúúúúúúúúúúúúú Member Support úúúú ITS.PRI.VATE º º Callahan's Crosstime Saloon úúúú Southwest HQ úúúúúú 314.939.4113 º º Nuclear Winter úúúúúúúúúúúúúúúúú Member Board úúúúúú 215.882.9122 º ÈÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍͼ