Dedicated to the preservation of the vx-scene ... and maybe the resurrection ... 88 88 88 88 88 88 8b d8 8b, ,d8 88 88 8b,dPPYba, ,adPPYb,88 ,adPPYba, 8b,dPPYba, ,adPPYb,d8 8b,dPPYba, ,adPPYba, 88 88 8b,dPPYba, ,adPPYb,88 `8b d8' `Y8, ,8P' 88 88 88P' `"8a a8" `Y88 a8P_____88 88P' "Y8 a8" `Y88 88P' "Y8 a8" "8a 88 88 88P' `"8a a8" `Y88 `8b d8' )888( 88 88 88 88 8b 88 8PP""""""" 88 8b 88 88 8b d8 88 88 88 88 8b 88 `8b,d8' ,d8" "8b, "8a, ,a88 88 88 "8a, ,d88 "8b, ,aa 88 "8a, ,d88 88 "8a, ,a8" "8a, ,a88 88 88 "8a, ,d88 "8" 8P' `Y8 `"YbbdP'Y8 88 88 `"8bbdP"Y8 `"Ybbd8"' 88 `"YbbdP"Y8 88 `"YbbdP"' `"YbbdP'Y8 88 88 `"8bbdP"Y8 aa, ,88 "Y8bbdP" xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxkkkkkkxkkkkkkkkkxkkkkkkkkkkkkkkkkkkkkkkkkkkkOOkkkkOOkkkkOOOkkkkkOOOOOOkkkOOOOOOOOOOOOk xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxkkkkkdddkOkdlc::;;:oxkOOOOkkkkkkkkkkkkkkkkkkkkkkkkkkOOkkkkOkkkkkkkOOkkkkOOOOOOOOOkOOOOOk xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxkkxxxkkkkxdoccclc;;,,;;,:clooodxkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkOkkkkkkkkOOOOOOOOOOOOOkkkOOOOOO xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxkkkxxddolclllcccclccclllloollllodxkOOkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkOOOOOOOOkkkOOOOOOOOOk xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxkkxxxdoolcccccllccc:::::ccc::cccclllllodxkkkOkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkOOOkOOkkkkkOOkOOOOOO xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxkkxddolcccc::::ccccc:cccccccc:::::::::::::lodxkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkOkOOkkkkkkkOOkkkOO xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxkxxxdollllccc:::::cccccccccccccccc::::::::;;;;:ccodxkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkOkkkkkkkkkkkOkkkkkk xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxdollllllllcccccc::::ccc::::ccccclc::;;,,;;;;::::;:coxkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkOkkkkOkkkkkkk xxxxxxxxxxxxxxddxxxxxxxxxxxxxxxxxxxxxxxxxxxxxdolllllcccclcc::::::::::c::::::::::;;;;;;,,,,;;;::::;,;:loxkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk xxxxxxxxxxxxxxddxxxxxxxxxxxxxxxxxxxxxxxxxxxdlllllllccccllc:::::::::::::::c:::::;;;;;;;,,,,;,;;;;;;;,,,;:coxkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkOkkkkkkkkkkkk xxxxxxxddxxxxxdddxxxxxxxxxxxxxxxxxxxxxxxdolccclllllcccloolc::::::::::;;;::::;;;;;:::;,,'',,,,;;;;;;;,,,,;:coxkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk xxxxxxxxxxxxxxddxxxxxxxxdddxxxxxxxxxxxxoccccllllllcccccllc::::::::::;;;;;,,;;;;;;;;;;;;;;:::;;;;:;;;;,,'',;;coxkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk xdddxxxxxxxxxxdddddddddxdddxxxxxxxxxxxlccodxxxxxdddoollcc:;;;;;::::;;;;;;;;;;;;::::::cclllooooddddool:;;,,;;;:cdkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk xddddxxxdxxxxxddxdddddxddddxxxxxxxxxxdodxkO000KXXXXXXKOxdllc:::::::;;;;;:::::::cccccclooddoolllllllllll:::::;;:clxkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk xddddxxddddxxxdddddddddddddxxxxxxdllllllllollloodxkO0KXXX0Oxdoc::;;,,,;;:::ccccllloddollc::;;,,''...';;,',,,,,,::cdkkOkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk dddddddddddxxxdddddddddddxxxxxdlc;;::;;,;;;,,,,,;;;:cloxk0KKK0koc:,,,,,,,,;;;:ccooolc:;,,''''.....'',,''''''''''',;okOkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk ddddddddddddddddddddddddxxxxdl:,,;,,,,,,,,,,,,,,,,,,,,;;;:clx0XKkoc;,,,,,,;;;:clol:,''''...........''........'..''',cdkOkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk ddddddddddddddddddddxxxxxxxoc:;;;ccc;,,''''''''''',,,,,,,,,,,;o0NX0kdl:;;;;;:lll:''''..............''''''....,;'''''',cdkkkkkkxkkkkkkkkkkkkkkkkkkkkkkk ddddddddddddddddddddxxxxxdl:;:;co;.cl'';;,,''''''',,,,;;,''...';dXWWWNXK000OOd:,........'''''''.....';:;,,:;;o:..;''''',cdkkkkkkkkkkkkkkkkkkkkkkkkkkkk ddddddddddddddddddddxxxxdc;,,,,lx;'c; .;oolllc;,'',;;:;;;,''....'c0WMMMMMMMMWx,......'',,,''''....';colc;cl,.;:'':,..'''';lkkkkkkkkkkkkkkkkxkkkkkkkkkk ddddddddddddddddddddxxxdc,,,,,,;ll:. .:loxkkkxo:,',:cc:;;,''...'lKNWWWMMWWXo'.....',,,,,'.....;ldxdl;''... ........'',,':xkkkkkkkkkkkkkkxkkkkkkkkkk ddddddddddddddddddxxxxdc;,,,,:cc;. ...';ldkOkl,',:lc::,''''.;x0KXXXX00kc'.....',,;,'....:xOdc,'.. .,;;'''',,';dkkkkkkkkxxkkkkkkkkkkkkkk dddddddddddddddddddxxxl:;;;coo:. ..:oxOk:'.;llc:;;,'';okkkkkxxxd:'.....''''...'lOOxo;. .:do:,',;;,;okkkkkkkkkkxxxkkkkkkkkkk dddddddddddddddddddxxl;;::dOo'. .,coOOl'.;oolc:;,',lddddooooo:......'..''':kKkoc' 'cdl;;;::,;okkkkkkxxxxxxxkkkkkkkkk ddddddddddddddoc::lxo:;;cdkc. 'clOOc'.:olc:;,',cooollllll;.....''.,,,cdkocc. 'cl:;:::,;dkkkkkxxxxxxxxkkkkkkkk ddddddddddddddc,'.,lc,;:dx:. .;ox0kl;':oc:;,',coollllllc;.....'',;;;lo;..,. .,::;:::,cxkkkkkxxxxxxxxxxxxxxx dddddddddddddl;'';od:;:dk:. ';''oocdkxxoc::;,collllllll;.....'';od;,c;..:, ':::::;;lxkO0Oxxxxxxxxxxxxxxx ddddodddoodddc;,cOXx;cxOl. .:c..:;.'dOOdllc:;cooooollll;....',cOKKc..',,'. .,lc:::,;:;,;ldxxxxxxxxxxxxxx ddooooddoodkKkc:,';:;lkx, .::;. .',;,,;cooooooool;'.'',;cdxdlc'. .lo:::;;c;'coxddxxxxxxxxxxxx doooooddooodxo;:, .;cloc. ... ..',,,cooodddool:'..'',,''.';o:. .ldc::;,'.:0Xkcoxxxxxxxxxxxx ooooooodddl::;.';;''lo;;,. .ld, ..',,;lxxxdddool:'..',,,,...'oO:.. .:dkl.....'cl;;oxxxxxxxxxxxx oooooodddo:lxo;'cl'.:,.... .:0x. ...,;;;dOkkxddool;''',,,,,'..':kkc,. ..,;cc'.';,l0Kc'cdxxxxxxxxxxx oooooddddo:;lc,..,;,. .. .;OK: ...';:;;dOOOkxdooc;''',,;;,,....:xxl;. .;' ......,kk:'cdxxxxxxxxxxx ooooooodool:cc' .cc. .,xXo. .'',:;,;dOOOkkdolc;''',,,;,,'....,oxl,. ;x; .::;,cdxxxxxxxxxxx oooooooooookKO:.. .. .lk: .,kXd. .,:::;,':x0OOkkxolc,''',,,;;''. ..'lkd;. .od' lKKd;cxxxxxxxxxxxx ooooooooool:c:'. .. .ckO:. .:OKo. .;llc:,'':k0OOOkxol:,'',,,;;;,''. ..;xd:'. .oxl;. .ckkc.;dxxxxxxxxxxx oooooooooooc;'... ...';x0o' ..,d0k; ..,clcc:,''c0K00Okxol:''''',,;;;,,'.. .:oc;'.. ,dxoc:. .....';oxxxxxxxxxxxx oooooooooooddc'.. .. .'dXKd;. .. ...;ldd;. ..,:ccc:;,,,oKXKKK0xol:''''',,,,,,,,'.. .,:;,.....,... .':ol,........ ...,oxxxxxxxxxxxxxx oooooooooooodl,,' .,....:kKX0xl:,,cl,.';coc'. ..;:::c:;,'',xXNXXK0kol:,'',,,,,,;;:;;,'.. ..''':dl..',.';:c:,. .....,. ...,dkxxxxxxxxddddx oooooooooooodo;,,.....:o'..',;coxOx' 'l;.,:'. ..';:::::;;,,,;kWWWNXKkoc;''',,,,,,,;::c:;,,'. .'.,:;';:'.... .....,'. ','cxxxxxxxxddddddx oooooooooooodo;.......,c:,.',,,...;l;;,..;:'. .';;:::::;;;;,':0MWWWNXOo:,.'',,,,,,,,,;;;;;;;,.. ...''.. ....;c'',..,;,cxxxxxxddddddddx oooooooooooood:. .''..cc'',;;,'.... ..'.. ..,;::::c::;;;,'..lNMMMMWNKo;,...',,,,,,,,,,,,,;;;;,'. ... .....cko,,,..'''cxxxxxdddddddddd ooooloooooooodl. ....cxc'.',;:::;,'.. .';cloc:::c::;;,,'...dWMMMMMMNxc,....',,,,,,,,,,',,,,;::;,... ...... 'okxl:'. ...;dxxxxddddddddddd llolloooooooooo;. .;:;:odxc....,;:ccc:;'..,;:llolcc:;,,,,''...'kMMMMMMMM0x:...'',,,;,,,,'''''''''',,,,'...............'dOo.... ..:xxxxxddddddddddd ollolloooooooodc'.. .odddddd:.....''''''''''',;:cccc:;,,,''.....;0MMMMMMMMXOl....'',,;,,''..'..''.......................ckk:... .cxxxxxddddddddddd ollllloooolloool,.. 'ododddo' ...............',;:::::;,,,''.....lNMMMMMMMWXOl.....'''''''.................. .......'dkkl,,'. .'';oxxxxxxdddddddddd ollllllolllllooo:,',cooooddc. ................',;;:;;,,,'.......dWMMMMMMWXOxl,.......'..................... ....... .:xxxxxxxl..,,:dxxxxdddddddddddd olllllloolllllloooooooooodo;. ....'..........'',,,;;,,''',,;:,',kWWWWWWNX0xdo;.....',,'''................. ....... 'dkxxxxxxl'.'':dxxxddddddddddddd llllllllllllllloooooooooodl' ....''........',,,,,,,'',;;'cd:,ck0000OOkxxddoc,..'cl'.''''................ ........ ;xkxxxxxxdl:::odxddddddddddddddd llllllllllllllllllolloooooc. .....,'....''',,,,,,,',;ccoolc;;lddolllllooooolc,.'oc'::'',''........... ........ 'dkxxxxxxxxxdxdddddddddddddddddd llllllllllllllllllllllooodc. ....','....',,,,,,',;::coxdc;;cdddoccccccloddol:'.;l:oxc,','........... ........ .lkxxxxxxxxddddddddddddddddddddd llllllllllllllllllllllooool'. .....,,'...'''',,,,,:clc:,,,;o0XXK0Okxdolllllool;..,:;,,',:;'........ ....'..... .ckkxxxxxxxddddddddddddddddddddd llllllllllllllllllllllloool,.. .....';,...''''',,,::;,'..,,:odxxxxxdddoollcclll:'..''''.cd;'........ .....'..........,cdxxxxxxxdddddddddddddddddddd llllllllllllllllllllllloooo:'.........,;'..',,,,,;:::;''',,'... ........... .oo,'...... .....'.......... ..,coxxxxxxxddddddddddddddddd lllllllllllllllllllllllloooo:'........';,''',;;;:cc;;;,,,.. 'cc'. ..... ;dc,;,...........'........... . ..,cdxxxxddddddddddddddddd llllllllllllllllllllllllooooo:'.......',,'',;:lll:..''... .....,oxo;'........ ....co:,,'................... ..... .. ..,coxxxddddddddddddddd lllllllllllllllllllllllllllol:'........',,',:ll:'. ....';codkOOO00OOkxxolccccc:;,'... ...lo;,,'.................';'.. .. ... ..:odddddddddddddddd llllllllllllllllllllllllllllooc;'. ....'',:clc'...,cdOKNWWMMMMMMMMWWWWNKOkkkxdolc::;,'...;,;lc;:;............... .okxo:'.... ..... .cdddddddddddddddd llllllllllllllllllllllllllllllolc'. ..,cl::ccl;,:ok0XWMMMMMMMMMMMMWWWWWMMWWNNXX0Oxdolc::;,;oc;lk0Oxc............ .lxxxxxxoc,.. ......cdddddddddddddddd lllllllllllllllllllllllllllllclllc,.:xKXWk;:c,,d0XWMMMMWXKOOOOO00OOOOOkkkkkkkkO00000kxdolc;:l,:KOlokOd:'........,lxxxxxxxxxxdl:,,;;:lddddddddddddddddd lllllllllllclllllllllllllllccccccokKX0ooK0:::,oXWWX0OkOOkxdxkkOOOkkxxxxddoolllloxkOOkkkkxdlclcoO:.,:lxOkl'....;odxxxxddddddddxxxdxxxdddddddddddddddddd lllllllllllllllllllllllllcccccld0XKko:'.d0c,,;dOxxdoodxkkkkkOOO00OOkxxdollcccc:::clllloolcllclko. .cc;:d0O:..,oxxdddddddddddddddddddddddddoddddddddddd llllllllllllllllllllllllllccclONXxccc' .ckl'..,::ldddxk000KKKKKKKKKK0OOkxdoddoolc:;,,;::,'.::ckl.. ,o:,,oKx''ldddddddddddddddddddddddddddddddddddddddd llllllllllllllcllllllllllllccoKXx:;lc..;oxl,..':ldkO00KKKKKKKKKKKKKK00OOkxxxdddolcc::::;,',:;lkc:;.;o;'',::,cddddddddddddddddddddddddddddddddooodddddd llllllllllllccclllllllllllllllol:::oo'.;oko,'.,cdkOO00KK00OO0OOkkxxkkxxxdddoooooolccccc:;,:l:ox:,.'oo;,'''',lxxxddddddddddddddddddddoooooddooooodddddd llllllllllllcclllllllllllllll:;;;cllol'.:Oo.'',ldxdxkOkxddoooolcllllllccccccc::ccccccllc:;,:cxk, .co:;,,''.'cxxddddddddddddddddddddddooooooooooooddddd lllllllcclllllllllllllllllllc:;;:clc:::'lKl...,col:coddoooloollloollcccc::;;;;;;;,,,;;::;,'..x0;.;c;;;,''..,lxxdddddddddddddddddddddddoooooooooooddddd lllllllllllllccclllllllllllll:,,,:oc;;:dXXc .',;:clodddddooolooddolcccc:;,,,,,,,''''',''',''kNd;,,,,,'....:dxddddddddddddddddddddoooooooooooodddddddd lllllllccccllccllllllllllllll:,.,xXl,okOOo. ..';:looddxxdddooooooolllccc::;;,,,''....''.'''..c0Kxc'.ox:...;oxddddddddddddddddddddooooooooooooodddddddd lllllcccccclllclllllcclllllllc;';ONkdxl'.....;:cclooxkOOkkxxddxxxkOxoodolcc::;;,..........'..,;;lxdo0Wx...cddddddddddddddddddddddooooooooooooddooooood llllccccccclccccllllclllllllclxxdxx:,...;o:';cclodxkOOOOkxxdooollOKx;:llllccc::;;;;;,........lc...'codc;,,ldddddddddddddddddddddoooooooooooooooooooddd llccccccccclccccllllccclclllllxOxc,...,;cdlcodddxxxdolllc:;,'..'o00kc'',:::::cccccclc:,''....lo'.....':dxooddooooooooodddddddooooooooooooooooooddooddd cccccccccclllccclllllcclcccllcccc;..,;;:ldxooocccc:;;,... 'lc::c, .....',;::ccc::;,,''oo,......';:lodddoooooooooooooooooooooooooooooooooooooooo ccccccccccccccccllllllllcclllllllc;;;:cllodl'.',,,,'...... ..,'..;,.',,;;,,''''''',;:;,'.:xo,'''...';coddoooooooooooooooooooooooooooooooooooooooooo lccccccccccccccccllllllllllllllllc:;:lolc::c;..',;;;;:::::::cccc::;;,,,;;::::cccccc:,,''...;do:;;,'....;:ldddooooooooooooooooooooooooooooooooooooooooo ccccccccccccccccclllccllllllllllc;:clc:;;;;;::;;,',,,,,,,,;;;;;;;;;,;;;:::::::::::::::;,';ll:,,,;;,,''..':odoooooooooooooooooooooooooooooooooooooooooo cccccccccccccccccllccclcclllllll:;;c:;;;;;;,,,;;,'..',,,;;;;;;;:;;;;:::;:::::::::;;;'.',:c:;;;;,,,,,,'...:oooooooooooooooooooooooooooooooooooooooooooo ccccccccccccccccccccccccccllllll;,,;;;;;:;:lol;',;;'..',;;;;::::;::::::::::::::;,'.',;;,,:c:;;:;,,,;,....;looooooooooooooooooooooooooooooooooooooooooo cccccccccccccccccccccccccccclll:,,;,'';;:;clclc,',,;;,...,;,:;'':c,';c;',;;,;;,'.',::;,':llo;';::;'.,;'..,looooooooooooooooooooooooooooooooooooooooooo ccccccccccccccccccccccccclllllc;,,'',;;;;;::::;,,cc:',;'...,oo,,lo,.:l,.,c,....',;,;:c;';;;:;;:::;'. .;,..:ooooooooooooooooooooooooooooooooooooooooooo ccccccccccccccccccccccccccclll:,,'',:;;;;;;;;;;;::co:,;:;'..co,'cl,.;l,.':'...;::;;llll,,;;;;;;;:::;...;,';ooooolloooooooooooooooooooooooooooooolloooo ccccccccccccccccccccccccccccll:''.,::::;::;;;;;;::::;:::::,.;o;.:l,.,c,.':,.,:c::::ccc:;;;;;;;;;:::c:'..,,,looolollloooooollloollloooooooooooooollllll cccccccccccccccccccccccccccclc,..';;;::::;;,,;;,;:;;::;::::,:l;.;l,.,c,..::;;:ccc:cc:,;;;,;;;:::::c:c:..',,cooolllllooooooollllolllllllloolllooooollll ccccccccccccccccccccccccccccc;...';:;;:;;;;;;;,,;;..;:..,:,.;l;.;l;.,c;..:;...;;..;;..':;;::::::::::cc;...'cooolllllloooooooollllllllllllllloollllllll ccccccccccccccccccccccccccccccoxc;;:;;:;;:::::;';:..,:'.;c,.,c;.,c;.'c;..:;...;;..;:..':;;c::::::::::cc,...coollllllllllloolllllllllllllllllllllllllll ccccccccccccccccccccccccccccloddl::;;::;:::::c;.';'.':,.':,.':,.'c;.'c;..:;...;;..;:..,c;;cc:::::::::cc;:l:,clllllllllllllllllllllllllllllllllllllllll cccccccccccccccccccccccccccclc;.':::::;;;::::c;..''..,'..'...'..,c:.'c:..:;....'..,;..,:'':c:c::::::::c:;:ccclllllllllllllllllllllllllllllllllllllllll lllccccccccccccccccccccccccccclc;;;;::::::::cc:' ... .'c:..::..;,.. . ....':::cc:::::::c:,,collllllllllllllllllllllllllllllllllllllllll lllllccccccccccccccccccccccccccc:,,;;;:::::::::;'. ....'','''...::..::..;,...... .:c::::::::::::::cclllllllllllllllllllllllllllllllllllllllllll ccllcccccccccccccccccccccccccccccc;;;;;::::::;,....';:cccccclc;..;:..;:..;,.,:cc:;;,.....,;:::::::::::::;;clccllllllllllllllllllllllllllllllllllllllll ccccccccccccccccccccccccccccccccclxo,,,;;;,,....,,;:;:::::ccc;....'..''......:cccccc:;,'....';::::cc:::,.,ccccccclllllllllllllllllllllllllllllllllllll llccccccccccccccccccccccccccccccccodc,........,::;clll;,::::' .:cc:;:cl:,;;'....,;::::,.':cccccccccclllllllllllllllllllllllllllllllllll lcccccccccccccccccccccccccccccccccclc,.....,,,:cc;:::c;,::;'. ....';::;,locl;,;,,'......'.,loccccccccccccccclllllllllllllllllllllllllllllll lcccccccccccccccccccccccccccccccccccc:,'',;:;;ccoc',;;;;;,,,,,,,''..'',;;::::;;;::;;:::,::::,,;'.. .lolcccccccccccccccllcccllllllllllllllllllllllllll ccccccccccccccccccccccccccccccccccccccc::;;;;;:;:;,;;,,,,,,;;;::::cccccc:::;;;;;::;;:;,,:::lc:c:;;,';:ccccccccccccccccccccccccllllllllllllllllllllllll cccccccccccccccccccccccc:cccccccccccccccccc:;,,;;;;;;;,;;;;;;;::ccccccc:::;;;;;;::::::::;:::::::::cccc::ccccccccccccccccccccccccclllllllllllllllllllll ccccccccccccccccccccccccccccccccccccccccccccc:::cccc::;;;,;;;:::cccccc:::;;;;;:cccccccc:::::::::::::ccccccccccccccccccccccccccccccccclllllllllllllllll cccccccccccccccccccccccccc::::::cccccccccccccccccccc:::::;;;;::cccccccc::;,,',:cc::::;;;::::::::::::ccccccccccccccccccccccccccccccccccccccccccclllllll cccccccccccccccccccccccc:::::::ccccccc:::::cccc:::c:::::::::::::cccl:cc,......,::::::;;;;:::::::::::cc::::ccccccccccccccccccccccccccccccccccccllllllll cccccccccccccccc::ccc::::::::::cccc:::::::::::::::::::::::::::::;;:cc;'. ....,:::::;;;;;;::::::::::::::::ccccccccccccccccccccccccccccccclcccclllcccll cccccccccccccccccc::::::::::::::::::::::c::::::::::::::::::::::::;:::'.. ....,:::::;;;;;;:::::::::::::::::cccccccccccccccccccccccccccccccccccccccccll cccccccccccccccc:::::::::::::::::::::::::::::::::::::::::::::::::::::,... ....,:::::;;;;;;;:::::::::::::::::::cccccccccccccccccccccccccccccccccccccccl ccccccccccccccccccc::::::::::::::::::::::::::::::::::::::::::::::::::,........,::::;;;;;;::::::::::::::::::::::cccccccccccccccccccccccccccccccclcccccc -- Contact -- https://twitter.com/vxunderground vxug@null.net Donate to support us
──────────────────────────────────────────────────────────────────────────────────────────────────────────────── __ ____ ___ _ ____ ____ _ _ _ _ \ \ / /\ \/ / | | |/ ___| / ___|___ | | | ___ ___| |_(_) ___ _ __ \ \ / / \ /| | | | | _ | | / _ \| | |/ _ \/ __| __| |/ _ \| '_ \ \ V / / \| |_| | |_| | | |__| (_) | | | __/ (__| |_| | (_) | | | | \_/ /_/\_\\___/ \____| \____\___/|_|_|\___|\___|\__|_|\___/|_| |_| ──────────────────────────────────────────────────────────────────────────────────────────────────────────────── The current VXUG collection is the aggregation of content which VXUG believes to be of a higher standard, non-generic, or further educates individuals on concepts which are often poorly explained. Papers listed are not a direct endorsement from VXUG unless explicitly stated. Masking Malicious Memory Artifacts – Part I: Phantom DLL Hollowing by Forrest Orr Position Independence Re-examined by smelly__vx Common Language Runtime Hook for Persistence by Paul Laîné Defeating Userland Hooks ft. BitDefender by 0x00dtm Anti-Reverse Engineering Linux by Jacob Baines Analyzing Modern Malware Techniques - Part 1 by Danus Demonstration of assembler based Polymorphism by Rafael S Marques Advanced Metamorphic Techniques in Computer Viruses Automatic Static Unpacking of Malware Binaries Auto-Sign: an automatic signature generator for high-speed malware filtering devices Polygraph: Automatically Generating Signatures for Polymorphic Worms Hydan: Hiding Information in Program Binaries
──────────────────────────────────────────────────────────────────────────────────────────────────────────────── __ __ _ _ ____ _ _ _ _ \ \ / /_ _| | | | ___ __ ___ _____ _ __ / ___|___ | | | ___ ___| |_(_) ___ _ __ \ \ / /\ \/ / |_| |/ _ \/ _` \ \ / / _ \ '_ \ | | / _ \| | |/ _ \/ __| __| |/ _ \| '_ \ \ V / > <| _ | __/ (_| |\ V / __/ | | | | |__| (_) | | | __/ (__| |_| | (_) | | | | \_/ /_/\_\_| |_|\___|\__,_| \_/ \___|_| |_| \____\___/|_|_|\___|\___|\__|_|\___/|_| |_| ──────────────────────────────────────────────────────────────────────────────────────────────────────────────── Classics: The Little Black Book of Computer Viruses The Giant Black Book of Computer Viruses The Ultimate Anti-Reversing Reference by Peter Ferrie History: A Brief History of PC Viruses Brief history of AVers vs VXers The Bulgarian and Soviet Virus Factories Situation in VX scene History of Computer Viruses VX Papers: Windows Specific -Execution redirection thru Image File Execution Options key -Hooking Windows API Technics of hooking API functions on Windows -Invisibility on NT boxes, How to become unseen on Windows NT -Tracing under Win32 -Experimenting with SfcIsFileProtected -Impersonation, your friend -Writing VX with ASP.NET -Batch virii Tutorial -Heavens Gate 64-bit code in 32-bit file -Brief Intro to VX in F# -VBA viruses and trojans -Using Structured Exception Handler (SEH) -Subtle SEH Linux Specific / *Nix -ELF et virologie informatique -INT 0x80 No, thank you! -Piggyback -Unix ELF parasites and virus -UNIX SH and BASH shell viruses -Unix viruses -Linux Shell Script Viren -Linux virus writing tutorial -Linux Worms - some ideas Infection -Easy To Infect Hard to Detect -GriYo EPO Entry-Point Obscuring -Infecting loadable kernel modules -Using the .NET runtime compiler for file infection -Matlab.MicrophoneFever2 -MenuetOS infection -Over-File Splitting -Ryan Neill - 'Modern Day ELF Runtime infection via GOT poisoning -Infecting Windows Shortcuts -MSIL PE Infection -Entry-point Obscuring -Infecting ISO CD images -Boot Infectors -Caveat virus -Perl EPO Techniques -Methodology Behind a Polymorphic Engine -A Discussion of Polymorphism -Perl Viren -Polymorphism in Perl Viruses -Cross Infection in JavaScript -Compiled HTML -Advanced polymorphic engine construction -Disassemblers in VX -Abusing .CTORS and .DTORS for fun 'n profit -Chomsky Hierarchy and the Word Problem in Code Mutation -Code via Behaviour -Code Mutations via Behaviour Analysis -Code transformation and finite automatons -ELF Parasitic Infector in C -Favorites Infection -PE Infector -Polymorphism - Analysis on the decryptor generator 1.5 -Polymorphism in JavaScript -Polymorphism using the Microsoft Script Encoder -EPOlution The Evolution of Entry Point Obscuring -Shared library call redirection using ELF PLT infection -Runtime kernel kmem patching -Self Checking Executable Files -Shell script and perl script infection -Static linked ELF infecting -Infecting ELF-files using function padding for Linux -Infecting Mach-O Files -Infecting Mathematica Notebook files -Infecting PE files By Adding new resource -Some ideas about OpenOffice infection -GLiTCH's Polymorphic Batch Tutorial -Guide to improving Polymorphic Engines -Polymorphism In Batch -Polymorphism in BatXP -Metamorphism (part 1) -Metamorphism -The Mental Driller Metamorphism in practice or How I made MetaPHOR and what Ive learnt Armouring | Encryption | Evasion | Masquerading -Exotic Morphing Techniques In JavaScript -Exploring RDA -Total encryption for PE infectors -Alternate Javascript Encoding Properties by Peter Ferrie -A simple way to detect VirtualBox -Advanced Macro Virus Techniques -Useful Things for Batch VX -Vx Encryption p1 -Vx Encryption p2 -Encryption in Perl Viruses -AV Evasion In Batch -Anti-Disassembly using Cryptographic Hash Functions.pdf -Out of Office Responses -SPTH How to encrypt JavaScript viriis Tips | Tricks | Other -FBSL Virus Writing Guide -Macro virus trickz -SPTH Server - Client Communtication for Preprocessor languages (PHP) -The macro virus writing tutorial -32bit ASM Optimization Tricks for VXers -Understanding Stack Alignment in 64bit Calling Conventions -1999 - Linux Vx Tutorial -Computer Virues - Artificial Life and Evolution -Neophyte's Macro Virus Tutorial -Python Virus Writing Tutorial -RUBY Virus Writing Guide -PHP Virus Writing Guide -Stealth API-based decryptor -Permutation conditions -JScript Prototypes -Useful things in JavaScript Anti-Virus related -Macro virus identification problems -An Overview of Unix Rootkits.pdf -Anomalous Payload-based Network Intrusion Detection -Anomalous Payload-based Worm Detection and Signature Generation -Anonymous and Malicious -Fighting EPO Viruses
──────────────────────────────────────────────────────────────────────────────────────────────────────────────── ____ _ ____ _ _ _ _ / ___| _ _ _ __ ___ __ _ _ __ | |_ ___ ___ / ___|___ | | | ___ ___| |_(_) ___ _ __ \___ \| | | | '_ ` _ \ / _` | '_ \| __/ _ \/ __| | | / _ \| | |/ _ \/ __| __| |/ _ \| '_ \ ___) | |_| | | | | | | (_| | | | | || __/ (__ | |__| (_) | | | __/ (__| |_| | (_) | | | | |____/ \__, |_| |_| |_|\__,_|_| |_|\__\___|\___| \____\___/|_|_|\___|\___|\__|_|\___/|_| |_| |___/ ──────────────────────────────────────────────────────────────────────────────────────────────────────────────── 32-Bit Virus Threats on 64-Bit Windows IME as a Possible Keylogger Have I Got News for you: Analysis of Flamer C&C Server Analysis of malware targeting the Boleto payment system An Analysis of the Slapper Worm Exploit Analysis of the Windows Vista Security Model Android.Opfake In-Depth The Apple threat landscape Assessment of Windows Vista Kernel-Mode Security Assets, Threats and Vulnerabilities: Discovery and Analysis Attacks on point-of-sales systems Attacks on Virtual Machine Emulators ATTACKS ON WIN32 – PART II The Black Vine cyberespionage group Blended Attacks Exploits, Vulnerabilities and Buffer-Overflow Techniques in Computer Viruses* Symantec Brightmail™ Anti Phishing The continued rise of DDoS attacks Crisis: The Advanced Malware Cyberterrorism? Cyberterrorism and the Home User The Digital Immune System Dragonfly: Cyberespionage Attacks Against Energy Suppliers Drive-By Pharming The Economics of Information Warfare - Poking Layered Security with a Stick The Elderwood Project The evolution of the fileless click-fraud malware Poweliks Evolving ShellCode Financial threats 2015 Hidden Lynx – Professional Hackers for Hire How safe is your quantified self? Hunting For Metamorphic IM_a nuisance – W32.Imav.A THE INCREASED USE OF POWERSHELL IN ATTACKS Insecurity in the Internet of Things ISTR Cryptojacking: A Modern Cash Cow Learn More About Viruses and Worms The Luckycat Hackers Malicious Threats to Personal Digital Assistants Malicious Threats and Vulnerabilities in Instant Messaging Malicious Yahooligans Malicious Threats of Peer-to-Peer Networking Managing Security Incidents in the Enterprise Me code write good: The l33t skillz of the virus writer. MEMORY SCANNING UNDER WINDOWS NT Microsoft Office 2000 and Security Against Macro Viruses Mistakes in the IaaS cloud could put your data at risk Mobile Adware and Malware Analysis Motivations of Recent Android Malware Responding to the Nimda worm: Recommendations for addressing blended threats NTFS Streams Palm Breach The Panda Outlaw: W32.Fujacks Peerbot: Catch me if you can Phishing Attacks In and Around April through September 2006 “Phishing In The Middle Of The Stream” - Today’s Threats To Online Banking Potential Threats to WAP Enabled Devices Privacy: A Study of Attitudes and Behaviors in US, UK and EU Information Security Professionals Ransomware and Businesses 2016 Ransomware: A Growing Menace Regin: Top-tier espionage tool enables stealthy surveillance Regional Threats Rootkits Sality: Story of a Peerto-Peer Viral Network Scams and Spam to Avoid on Facebook Script-Based Mobile Threats A Short Course in Antivirus Software Testing: Seven Simple Rules for Evaluating Tests* Stealing Virtual Assets from a Digital World Stories From The DRM World: The Settec Case Striking Similarites: Win32/Simile and Metamorphic Virus Code Stuxnet 0.5: The Missing Link Targeted Attacks Against the Energy Sector Techniques of Adware and Spyware The Teredo Protocol: Tunneling Past Network Security and Other Security Implications A Testing Methodology for Rootkit Removal Effectiveness The evolution of ransomware The Nitro Attacks: Stealing Secrets from the Chemical Industry Threats to Online Banking Threats to virtual environments Trojan.Bamital Trojan.Neloweg: Bank Robbing Bot in the Browser Trojan.Taidoor: Targeting Think Tanks Uncovering a persistent diet spam operation on Twitter Understanding and Managing Polymorphic Viruses Understanding Symantec’s Anti-virus Strategy for Internet Gateways Understanding Heuristics: Symantec’s Bloodhound Technology Understanding Virus Behavior in 32-bit Operating Environments Understanding Virus Behavior under Windows NT Virus and Vulnerability Classification Schemes: Standards and Integration W32.Changeup: How the Worm Was Created W32.Duqu: The precursor to the next Stuxnet W32.Qakbot in Detail W32.Xpaj.B: Making Easy Money from Complex Code The Waterbug attack group Web Based Attacks What next? Trojan.Linkoptimizer What’s in a Name? When Malware Meets Rootkits Windows Rootkit Overview Windows 8 Security Wireless LAN Security The World of Financial Trojans ZeroAccess Indepth Windows Vista Network Attack Surface Analysis W32.Ramnit analysis Trojan.ZeroAccess: Infection Analysis Inside the Windows Meta File Format
──────────────────────────────────────────────────────────────────────────────────────────────────────────────── ___ _ _ |_ _|_ __ | |_ ___ _ ____ _(_) _____ _____ | || '_ \| __/ _ \ '__\ \ / / |/ _ \ \ /\ / / __| | || | | | || __/ | \ V /| | __/\ V V /\__ \ |___|_| |_|\__\___|_| \_/ |_|\___| \_/\_/ |___/ ──────────────────────────────────────────────────────────────────────────────────────────────────────────────── Perforin Interview with herm1t Eternal Maverick Executioner Foxz Duke GriYo herm1t Benny29A Blonde Cicatric Coke Crom-Cruach Cyclone Alan Solomon Nightmare Joker Dark Fiber Dark Slayer Data Disruptor Jerk1n John Tardy Karl Sims Lovin God Masud Khafir Metabolis DiA Benny Interview with Billy BelcebuiKX Benny Interview with StarZer0iKX Kpv-Team Methyl Mikee Mr. Sandman Nucleii Opic person from AV company Potti Rotti Ralph Burger Retro roy g biv RustBug for Slam Sarah Gordon Second Part To Hell SennaSpy SMT SnakeByte Stefan Kurtzhals Stormbringer synge Tom Ray Toro Trigger Ultras Wildworker Doctor Owl SPTH Interview with SnakeByte
───────────────────────────────────────────────────────────────────────────────────────────────────────────────── _ ____ _ _ _ _ _ | |__ |___ \| |__ ___ ___ ___ | | | ___ ___| |_(_) ___ _ __ | '_ \ __) | '_ \ / __| / __/ _ \| | |/ _ \/ __| __| |/ _ \| '_ \ | | | |/ __/| | | | (__ | (_| (_) | | | __/ (__| |_| | (_) | | | | |_| |_|_____|_| |_|\___| \___\___/|_|_|\___|\___|\__|_|\___/|_| |_| ──────────────────────────────────────────────────────────────────────────────────────────────────────────────── Anti-Forensics by Domingo Montanaro Process Infection by Carlos Barros Detecting BluePill by Edgar Barbosa PE Binary Infection by Maycon Vitali Malwares VS Antivírus by Wendel Guglielmetti Henrique Kernel-Land Rootkits by "Strauss" + Code PCI Rootkits by Bruno Cardoso Lopes and João Batista Correa Ring x64 Realidade das BotNets Atuais by Ranieri Romera Detecting Obfuscated Malicious JavaScript with Snort and Razorback by Alex Kirk I Know Kung-Fu! Analyzing Mobile Malware by Alex Kirk Linux Kernel Rootkits by Ilya V. Matveychikov and Ighor Augusto Construindo Bootkits: Ideias para GRUB2 com Linux UEFI Firmware Rootkits: Myths and Reality by Alex Matrosov and Eugene Rodionov
──────────────────────────────────────────────────────────────────────────────────────────────────────────────── __ ___ ____ _ _ _ _ \ \ / (_)_ __ _ _ ___ | __ ) _ _| | | ___| |_(_)_ __ \ \ / /| | '__| | | / __| | _ \| | | | | |/ _ \ __| | '_ \ \ V / | | | | |_| \__ \ | |_) | |_| | | | __/ |_| | | | | \_/ |_|_| \__,_|___/ |____/ \__,_|_|_|\___|\__|_|_| |_| ────────────────────────────────────────────────────────────────────────────────────────────────────────────────
1989 July, 1989
Table of Contents
August, 1989
Table of Contents
September, 1989
Table of Contents
October, 1989
Table of Contents
November, 1989
Table of Contents
December, 1989
Table of Contents
1990 January, 1990
Table of Contents
February, 1990
Table of Contents
March, 1990
Table of Contents
April, 1990
Table of Contents
May, 1990
Table of Contents
June, 1990
Table of Contents
July, 1990
Table of Contents
August, 1990
Table of Contents
September, 1990
Table of Contents
October, 1990
Table of Contents
November, 1990
Table of Contents
December, 1990
Table of Contents
1991 January, 1991
Table of Contents
February, 1991
Table of Contents
March, 1991
Table of Contents
April, 1991
Table of Contents
May, 1991
Table of Contents
June, 1991
Table of Contents
July, 1991
Table of Contents
August, 1991
Table of Contents
September, 1991
Table of Contents
October, 1991
Table of Contents
November, 1991
Table of Contents
December, 1991
Table of Contents
1992 January, 1992
Table of Contents
February, 1992
Table of Contents
March, 1992
Table of Contents
April, 1992
Table of Contents
May, 1992
Table of Contents
June, 1992
Table of Contents
July, 1992
Table of Contents
August, 1992
Table of Contents
September, 1992
Table of Contents
October, 1992
Table of Contents
November, 1992
Table of Contents
December, 1992
Table of Contents
1993 January, 1993
Table of Contents
February, 1993
Table of Contents
March, 1993
Table of Contents
April, 1993
Table of Contents
May, 1993
Table of Contents
June, 1993
Table of Contents
July, 1993
Table of Contents
August, 1993
Table of Contents
September, 1993
Table of Contents
October, 1993
Table of Contents
November, 1993
Table of Contents
December, 1993
Table of Contents
1994 January, 1994
Table of Contents
February, 1994
Table of Contents
March, 1994
Table of Contents
April, 1994
Table of Contents
May, 1994
Table of Contents
June, 1994
Table of Contents
July, 1994
Table of Contents
August, 1994
Table of Contents
September, 1994
Table of Contents
October, 1994
Table of Contents
November, 1994
Table of Contents
December, 1994
Table of Contents
1995 January, 1995
Table of Contents
February, 1995
Table of Contents
March, 1995
Table of Contents
April, 1995
Table of Contents
May, 1995
Table of Contents
June, 1995
Table of Contents
July, 1995
Table of Contents
August, 1995
Table of Contents
September, 1995
Table of Contents
October, 1995
Table of Contents
November, 1995
Table of Contents
December, 1995
Table of Contents
1996 January, 1996
Table of Contents
February, 1996
Table of Contents
March, 1996
Table of Contents
April, 1996
Table of Contents
May, 1996
Table of Contents
June, 1996
Table of Contents
July, 1996
Table of Contents
August, 1996
Table of Contents
September, 1996
Table of Contents
October, 1996
Table of Contents
November, 1996
Table of Contents
December, 1996
Table of Contents
1997 January, 1997
Table of Contents
February, 1997
Table of Contents
March, 1997
Table of Contents
April, 1997
Table of Contents
May, 1997
Table of Contents
June, 1997
Table of Contents
July, 1997
Table of Contents
August, 1997
Table of Contents
September, 1997
Table of Contents
October, 1997
Table of Contents
November, 1997
Table of Contents
December, 1997
Table of Contents
1998 January, 1998
Table of Contents
February, 1998
Table of Contents
March, 1998
Table of Contents
April, 1998
Table of Contents
May, 1998
Table of Contents
June, 1998
Table of Contents
July, 1998
Table of Contents
August, 1998
Table of Contents
September, 1998
Table of Contents
October, 1998
Table of Contents
November, 1998
Table of Contents
December, 1998
Table of Contents
1999 January, 1999
Table of Contents
February, 1999
Table of Contents
March, 1999
Table of Contents
April, 1999
Table of Contents
May, 1999
Table of Contents
June, 1999
Table of Contents
July, 1999
Table of Contents
August, 1999
Table of Contents
September, 1999
Table of Contents
October, 1999
Table of Contents
November, 1999
Table of Contents
December, 1999
Table of Contents
2000 January, 2000
Table of Contents
February, 2000
Table of Contents
March, 2000
Table of Contents
April, 2000
Table of Contents
May, 2000
Table of Contents
June, 2000
Table of Contents
July, 2000
Table of Contents
August, 2000
Table of Contents
September, 2000
Table of Contents
October, 2000
Table of Contents
November, 2000
Table of Contents
December, 2000
Table of Contents
2001 January, 2001
Table of Contents
February, 2001
Table of Contents
March, 2001
Table of Contents
April, 2001
Table of Contents
May, 2001
Table of Contents
June, 2001
Table of Contents
July, 2001
Table of Contents
August, 2001
Table of Contents
September, 2001
Table of Contents
October, 2001
Table of Contents
November, 2001
Table of Contents
December, 2001
Table of Contents
2002 January, 2002
Table of Contents
February, 2002
Table of Contents
March, 2002
Table of Contents
April, 2002
Table of Contents
May, 2002
Table of Contents
June, 2002
Table of Contents
July, 2002
Table of Contents
August, 2002
Table of Contents
September, 2002
Table of Contents
October, 2002
Table of Contents
November, 2002
Table of Contents
December, 2002
Table of Contents
2003 January, 2003
Table of Contents
February, 2003
Table of Contents
March, 2003
Table of Contents
April, 2003
Table of Contents
May, 2003
Table of Contents
June, 2003
Table of Contents
July, 2003
Table of Contents
August, 2003
Table of Contents
September, 2003
Table of Contents
October, 2003
Table of Contents
November, 2003
Table of Contents
December, 2003
Table of Contents
2004 January, 2004
Table of Contents
February, 2004
Table of Contents
March, 2004
Table of Contents
April, 2004
Table of Contents
May, 2004
Table of Contents
June, 2004
Table of Contents
July, 2004
Table of Contents
August, 2004
Table of Contents
September, 2004
Table of Contents
October, 2004
Table of Contents
November, 2004
Table of Contents
December, 2004
Table of Contents