.
Time | Syscall Op | Syscall Name |
---|---|---|
2018-12-17T22:45:18.756057088Z | 26 | PC: 12b5e | Set disk transfer address |
2018-12-17T22:45:18.758120538Z | 71 | PC: 12b87 | Get current directory |
2018-12-17T22:45:18.762036456Z | 78 | PC: 12b92 | Find first file |
2018-12-17T22:45:18.769506632Z | 61 | PC: 12baa | Open file (Filename = 'TEST.EXE') |
2018-12-17T22:45:18.77681579Z | 63 | PC: 12bb6 | Read file or device (Read 24 bytes on handle 5) |
2018-12-17T22:45:18.781316276Z | 66 | PC: 12cdd | Move file pointer |
2018-12-17T22:45:18.784312999Z | 44 | PC: 12c0c | Get time 0x12c0c: xor dh, dh 0x12c0e: or dl, 0xa 0x12c11: mov word ptr ds:[bp + 0x29f], dx 0x12c16: mov ah, 0x40 0x12c18: lea dx, word ptr [bp + 0x100] 0x12c1c: call 0x12cf4 0x12c1f: mov al, 2 0x12c21: call 0x12cd6 0x12c24: mov cx, 0x200 0x12c27: div cx 0x12c29: inc ax 0x12c2a: mov word ptr ds:[bp + 0x2c2], dx 0x12c2f: mov word ptr ds:[bp + 0x2c4], ax 0x12c34: xor al, al 0x12c36: call 0x12cd6 0x12c39: mov ah, 0x40 0x12c3b: mov cx, 0x18 0x12c3e: lea dx, word ptr [bp + 0x2c0] 0x12c42: int 0x21 0x12c44: lea si, word ptr [bp + 0x2ee] |
2018-12-17T22:45:18.788245821Z | 64 | PC: 12cfc | Write file or device (Write 448 bytes on handle 5) |
2018-12-17T22:45:19.140002291Z | 66 | PC: 12cdd | Move file pointer |
2018-12-17T22:45:19.141666279Z | 66 | PC: 12cdd | Move file pointer |
2018-12-17T22:45:19.143159663Z | 64 | PC: 12c44 | Write file or device (Write 24 bytes on handle 5) |
2018-12-17T22:45:19.146762294Z | 87 | PC: 12c52 | Get or set file date and time |
2018-12-17T22:45:19.148597365Z | 62 | PC: 12c56 | Close file |
2018-12-17T22:45:19.157657832Z | 67 | PC: 12c64 | Get or set file attributes |
2018-12-17T22:45:19.164878905Z | 79 | PC: 12b92 | Find next file |
2018-12-17T22:45:19.169045379Z | 59 | PC: 12b9c | Change current directory |
2018-12-17T22:45:19.173984255Z | 59 | PC: 12c71 | Change current directory |
2018-12-17T22:45:19.176230927Z | 74 | PC: 12c79 | Reallocate memory |
2018-12-17T22:45:19.177836912Z | 72 | PC: 12c81 | Allocate memory |