Sample viewer

vx.netlux.org/Virus.DOS.Monster.342

.

GIF

Syscalls:

Time Syscall Op Syscall Name
2018-12-17T23:02:57.071907982Z 26 PC: 12a71 | Set disk transfer address
2018-12-17T23:02:57.073813518Z 78 PC: 12aaa | Find first file
2018-12-17T23:02:57.079660111Z 61 PC: 12acd | Open file (Filename = 'SLEEP.COM')
2018-12-17T23:02:57.085955236Z 63 PC: 12adb | Read file or device (Read 4 bytes on handle 5)
2018-12-17T23:02:57.092603801Z 66 PC: 12afc | Move file pointer
2018-12-17T23:02:57.094308616Z 64 PC: 12b10 | Write file or device (Write 4 bytes on handle 5)
2018-12-17T23:02:57.097854444Z 44 PC: 12b14 | Get time 0x12b14: mov word ptr [bp + 0x250], dx
0x12b18: call 0x12b7e
0x12b1b: mov ax, 0x4200
0x12b1e: cdq
0x12b1f: xor cx, cx
0x12b21: int 0x21
0x12b23: mov ax, word ptr [bp + 0x27e]
0x12b27: inc ax
0x12b28: mov word ptr [bp + 0x106], ax
0x12b2c: mov byte ptr [bp + 0x105], 0xe9
0x12b31: mov byte ptr [bp + 0x108], 1
0x12b36: lea dx, word ptr [bp + 0x105]
0x12b3a: mov ah, 0x40
0x12b3c: mov cx, 4
0x12b3f: int 0x21
0x12b41: jmp 0x12a98
0x12b44: mov ax, 0x5701
0x12b47: mov cx, word ptr [bp + 0x269]
0x12b4b: mov dx, word ptr [bp + 0x26b]
0x12b4f: int 0x21
2018-12-17T23:02:57.10077458Z 64 PC: 12b8c | Write file or device (Write 338 bytes on handle 5)
2018-12-17T23:02:57.115198171Z 66 PC: 12b23 | Move file pointer
2018-12-17T23:02:57.116860494Z 64 PC: 12b41 | Write file or device (Write 4 bytes on handle 5)
2018-12-17T23:02:57.123874114Z 87 PC: 12b51 | Get or set file date and time
2018-12-17T23:02:57.126648301Z 62 PC: 12b55 | Close file
2018-12-17T23:02:57.146781897Z 79 PC: 12aaa | Find next file
2018-12-17T23:02:57.149739418Z 61 PC: 12acd | Open file (Filename = '��P����')
2018-12-17T23:02:57.156088697Z 79 PC: 12aaa | Find next file
2018-12-17T23:02:57.158665572Z 61 PC: 12acd | Open file (Filename = '��P����')
2018-12-17T23:02:57.163253228Z 79 PC: 12aaa | Find next file
2018-12-17T23:02:57.16857577Z 61 PC: 12acd | Open file (Filename = '��P����')
2018-12-17T23:02:57.173332655Z 79 PC: 12aaa | Find next file
2018-12-17T23:02:57.176827779Z 61 PC: 12acd | Open file (Filename = '��P����')
2018-12-17T23:02:57.18260444Z 79 PC: 12aaa | Find next file
2018-12-17T23:02:57.185872043Z 61 PC: 12acd | Open file (Filename = '��P����')
2018-12-17T23:02:57.198093807Z 79 PC: 12aaa | Find next file
2018-12-17T23:02:57.208387048Z 61 PC: 12acd | Open file (Filename = '��P����')
2018-12-17T23:02:57.214234549Z 79 PC: 12aaa | Find next file
2018-12-17T23:02:57.217099494Z 26 PC: 12a8f | Set disk transfer address