.
Time | Syscall Op | Syscall Name |
---|---|---|
2018-12-17T21:56:10.423573428Z | 26 | PC: 12a5e | Set disk transfer address |
2018-12-17T21:56:10.425368229Z | 71 | PC: 12a87 | Get current directory |
2018-12-17T21:56:10.428123397Z | 78 | PC: 12a92 | Find first file |
2018-12-17T21:56:10.433920684Z | 61 | PC: 12aaa | Open file (Filename = 'TEST.EXE') |
2018-12-17T21:56:10.441687557Z | 63 | PC: 12ab6 | Read file or device (Read 24 bytes on handle 5) |
2018-12-17T21:56:10.444247105Z | 66 | PC: 12bd8 | Move file pointer |
2018-12-17T21:56:10.445594942Z | 44 | PC: 12b0b | Get time 0x12b0b: xor dh, dh 0x12b0d: or dl, 0xa 0x12b10: mov word ptr [bp + 0x29a], dx 0x12b14: mov ah, 0x40 0x12b16: lea dx, word ptr [bp + 0x100] 0x12b1a: call 0x12bee 0x12b1d: mov al, 2 0x12b1f: call 0x12bd1 0x12b22: mov cx, 0x200 0x12b25: div cx 0x12b27: inc ax 0x12b28: mov word ptr [bp + 0x2bc], dx 0x12b2c: mov word ptr [bp + 0x2be], ax 0x12b30: xor al, al 0x12b32: call 0x12bd1 0x12b35: mov ah, 0x40 0x12b37: mov cx, 0x18 0x12b3a: lea dx, word ptr [bp + 0x2ba] 0x12b3e: int 0x21 0x12b40: lea si, word ptr [bp + 0x2e8] |
2018-12-17T21:56:10.447778982Z | 64 | PC: 12bf6 | Write file or device (Write 442 bytes on handle 5) |
2018-12-17T21:56:10.462170172Z | 66 | PC: 12bd8 | Move file pointer |
2018-12-17T21:56:10.463428914Z | 66 | PC: 12bd8 | Move file pointer |
2018-12-17T21:56:10.464632151Z | 64 | PC: 12b40 | Write file or device (Write 24 bytes on handle 5) |
2018-12-17T21:56:10.467510142Z | 87 | PC: 12b4e | Get or set file date and time |
2018-12-17T21:56:10.468882399Z | 62 | PC: 12b52 | Close file |
2018-12-17T21:56:10.476659077Z | 67 | PC: 12b5f | Get or set file attributes |
2018-12-17T21:56:10.481815269Z | 79 | PC: 12a92 | Find next file |
2018-12-17T21:56:10.484122961Z | 59 | PC: 12a9c | Change current directory |
2018-12-17T21:56:10.488117461Z | 59 | PC: 12b6c | Change current directory |
2018-12-17T21:56:10.490417022Z | 74 | PC: 12b74 | Reallocate memory |
2018-12-17T21:56:10.491775768Z | 72 | PC: 12b7c | Allocate memory |