.
Time | Syscall Op | Syscall Name |
---|---|---|
2018-12-17T23:06:54.627090977Z | 26 | PC: 12a63 | Set disk transfer address |
2018-12-17T23:06:54.62938318Z | 78 | PC: 12a6d | Find first file |
2018-12-17T23:06:54.635965856Z | 79 | PC: 12aac | Find next file |
2018-12-17T23:06:54.638611828Z | 79 | PC: 12aac | Find next file |
2018-12-17T23:06:54.641460099Z | 79 | PC: 12aac | Find next file |
2018-12-17T23:06:54.644318846Z | 79 | PC: 12aac | Find next file |
2018-12-17T23:06:54.646905454Z | 79 | PC: 12aac | Find next file |
2018-12-17T23:06:54.649598791Z | 79 | PC: 12aac | Find next file |
2018-12-17T23:06:54.655038564Z | 79 | PC: 12aac | Find next file |
2018-12-17T23:06:54.65763265Z | 61 | PC: 12a8c | Open file (Filename = 'TEST.COM') |
2018-12-17T23:06:54.665364351Z | 63 | PC: 12a9b | Read file or device (Read 4 bytes on handle 5) |
2018-12-17T23:06:54.668566785Z | 62 | PC: 12a9f | Close file |
2018-12-17T23:06:54.670395015Z | 79 | PC: 12aac | Find next file |
2018-12-17T23:06:54.672747804Z | 26 | PC: 12b3d | Set disk transfer address |
2018-12-17T23:06:54.674348964Z | 44 | PC: 12b41 | Get time 0x12b41: xor dl, dl 0x12b43: xchg dl, dh 0x12b45: add dx, dx 0x12b47: add dx, 0x219 0x12b4b: mov si, dx 0x12b4d: mov dx, word ptr cs:[si] 0x12b50: mov ah, 9 0x12b52: int 0x21 0x12b54: jmp word ptr cs:[0x65f] 0x12b59: push bp 0x12b5a: add ch, byte ptr [bp + 2] 0x12b5d: pop word ptr [bp + si] 0x12b5f: lodsw ax, word ptr [si] 0x12b60: add al, ah 0x12b62: add ah, ch 0x12b64: add cl, byte ptr [bx + di] 0x12b66: add si, word ptr [bx + si] 0x12b68: add dx, word ptr [bp + 3] 0x12b6b: add word ptr [bp + di], -0x60 0x12b6e: add di, word ptr [si - 0x1ffd] |
2018-12-17T23:06:54.676586597Z | 9 | PC: 12b54 | Display string (String= ' Stealth techniques are cool ') |