[filename.info logo]
[cn ntoskrnl.exe][de ntoskrnl.exe][es ntoskrnl.exe][fr ntoskrnl.exe][gb ntoskrnl.exe][it ntoskrnl.exe][jp ntoskrnl.exe][kr ntoskrnl.exe][nl ntoskrnl.exe][pt ntoskrnl.exe][ru ntoskrnl.exe][us ntoskrnl.exe]
 

ntoskrnl.exe (5.1.2600.1151)

Contenido en software

Nombre:Windows XP Home Edition, Deutsch
Licencia:comercial
Acoplamiento de la información:http://www.microsoft.com/windowsxp/

Detalles del archivo

Trayectoria del archivo:C:\WINDOWS\system32 \ ntoskrnl.exe
Fecha del archivo:2003-04-24 19:15:28
Versión:5.1.2600.1151
Tamaño del archivo:1.894.912 octetos

La suma de comprobación y el archivo hashes

CRC32:A3A9A642
MD5:5803 22A6 DA90 A885 EA6A 491A D2A6 0B99
SHA1:C5C2 C854 C059 A2E6 2ADB F339 A741 D0C9 DBDF 7EB6

Información del recurso de la versión

Nombre de compañía:Microsoft Corporation
Descripción del archivo:NT-Kernel und -System
Sistema operativo del archivo:Windows NT, Windows 2000, Windows XP, Windows 2003
Tipo del archivo:Application
Versión del archivo:5.1.2600.1151
Nombre interno:ntkrnlmp.exe
Copyright legal:© Microsoft Corporation. Alle Rechte vorbehalten.
Nombre de fichero original:ntkrnlmp.exe
Nombre del producto:Betriebssystem Microsoft® Windows®
Versión del producto:5.1.2600.1151

ntoskrnl.exe fue encontrado en los informes siguientes:

W97M.Homer

Sobre W97M.Homer
...It deletes the file C:WinntSystem32Ntoskrnl.exe from Windows NT systems Type: Virus...
Gravamen de la amenaza
...Deletes files: Ntoskrnl.exe Modifies files:...
Detalles técnicos
...The virus deletes the file C:WinntSystem32Ntoskrnl.exe from Windows NT systems. This payload is triggered...
Fuente: http://securityresponse.symantec.com/avcenter/venc/data/w97m.homer.html

W32.Bolzano

Detalles técnicos
...In such a case, W32.Bolzano has the chance to patch ntoskrnl.exe, the Windows NT kernel, located in the WINNTSYSTEM32 directory....
...virus modifies only 2 bytes in a security API called SeAccessCheck that is part of ntoskrnl.exe. This way Bolzano is able to...
...Unfortunately the consistency of ntoskrnl.exe is checked in only one place....
...The loader, ntldr, is supposed to check it when it loads ntoskrnl.exe into physical memory during machine boot-up....
...If the kernel gets corrupted ntldr is supposed to stop loading ntoskrnl.exe and display an error message even before a "blue screen" appears....
Instrucciones del retiro
...If the system has been infected, the system files ntoskrnl.exe and ntldr.exe have been patched....
...prolific virus, W32.Funlove.4099, which applies the same patching techniques to ntoskrnl.exe and ntldr.exe. You can find this tool here:...
Fuente: http://securityresponse.symantec.com/avcenter/venc/data/w32.bolzano.html

W32.Funlove.4099

Detalles técnicos
...the equivalent rights logs on, W32.FunLove.4099 has the opportunity to modify the Ntoskrnl.exe file, the Windows NT kernel located in the WinntSystem32 folder....
...Unfortunately, the consistency of Ntoskrnl.exe is checked only once during the startup process....
...The loader, Ntldr, checks Ntoskrnl.exe when it loads into physical memory during startup....
...If the kernel becomes corrupted, Ntldr is supposed to stop loading Ntoskrnl.exe and display an error message, even before a "blue screen" appears....
...files on those computers. In addition, the Ntoskrnl.exe and Ntldr patch is performed on the network drives....
...components over the network. The Ntoskrnl.exe and Ntldr patches are executed by a routine picked up from the Bolzano virus....
...Developer Network documentation. Can Ntoskrnl.exe be infected across the network, without Flcss.exe actually being copied to the system?...
...As long as the drive is writeable, FunLove will modify Ntoskrnl.exe over the network, even without dropping Flcss.exe onto the system....
...FunLove does not actually infect Ntoskrnl.exe, but it changes the file's security function....
...Once the affected computer is restarted, the modified Ntoskrnl.exe and Ntldr are loaded, and security is compromised....
Fuente: http://securityresponse.symantec.com/avcenter/venc/data/w32.funlove.4099.html

W32.Petch

Detalles técnicos
...C:WindowsSystem32Ntkrnlpa.exe C:WindowsSystem32Ntoskrnl.exe C:WindowsSystem32Ntoskrnl.exe...
Fuente: http://securityresponse.symantec.com/avcenter/venc/data/w32.petch.html

W32.Gruel@mm

Detalles técnicos
...C:WINNTSystem32*.dll C:WINNTSystem32Ntoskrnl.exe C:WINNTSystem32Command.com...
...C:WINNTRegedit.exe C:WindowsSystem32Ntoskrnl.exe C:WindowsSystem32Command.com...
......
Fuente: http://securityresponse.symantec.com/avcenter/venc/data/w32.gruel@mm.html



Valid HTML 4.01!