[filename.info logo]
[cn ntoskrnl.exe][de ntoskrnl.exe][es ntoskrnl.exe][fr ntoskrnl.exe][gb ntoskrnl.exe][it ntoskrnl.exe][jp ntoskrnl.exe][kr ntoskrnl.exe][nl ntoskrnl.exe][pt ntoskrnl.exe][ru ntoskrnl.exe][us ntoskrnl.exe]
 

ntoskrnl.exe (5.1.2600.1151)

包含在软件

名字:Windows XP Home Edition, Deutsch
执照:商业
信息链接:http://www.microsoft.com/windowsxp/

文件细节

文件道路:C:\WINDOWS\Driver Cache\i386 \ ntoskrnl.exe
文件日期:2003-04-24 19:15:36
版本:5.1.2600.1151
文件大小:1.927.936 字节

检查和和文件hashes

CRC32:C835E20D
MD5:3B7A AA18 52BC 635B 5278 8144 EA79 7CBC
SHA1:7883 A571 BA5F 5E7B 5D1A DA6A B9EB 9113 6A6F D4B4

版本资源信息

公司名称:Microsoft Corporation
文件描述:NT-Kernel und -System
文件操作系统:Windows NT, Windows 2000, Windows XP, Windows 2003
文件类型:Application
文件版本:5.1.2600.1151
内部名:ntoskrnl.exe
法律版权: Microsoft Corporation. Alle Rechte vorbehalten.
原始的文件名:ntoskrnl.exe
产品名称:Betriebssystem Microsoft Windows
产品版本:5.1.2600.1151

ntoskrnl.exe 被发现了在以下报告:

W97M.Homer

关于W97M.Homer
...It deletes the file C:WinntSystem32Ntoskrnl.exe from Windows NT systems Type: Virus...
威胁评估
...Deletes files: Ntoskrnl.exe Modifies files:...
技术细节
...The virus deletes the file C:WinntSystem32Ntoskrnl.exe from Windows NT systems. This payload is triggered...
来源: http://securityresponse.symantec.com/avcenter/venc/data/w97m.homer.html

W32.Bolzano

技术细节
...In such a case, W32.Bolzano has the chance to patch ntoskrnl.exe, the Windows NT kernel, located in the WINNTSYSTEM32 directory....
...virus modifies only 2 bytes in a security API called SeAccessCheck that is part of ntoskrnl.exe. This way Bolzano is able to...
...Unfortunately the consistency of ntoskrnl.exe is checked in only one place....
...The loader, ntldr, is supposed to check it when it loads ntoskrnl.exe into physical memory during machine boot-up....
...If the kernel gets corrupted ntldr is supposed to stop loading ntoskrnl.exe and display an error message even before a "blue screen" appears....
撤除指示
...If the system has been infected, the system files ntoskrnl.exe and ntldr.exe have been patched....
...prolific virus, W32.Funlove.4099, which applies the same patching techniques to ntoskrnl.exe and ntldr.exe. You can find this tool here:...
来源: http://securityresponse.symantec.com/avcenter/venc/data/w32.bolzano.html

W32.Funlove.4099

技术细节
...the equivalent rights logs on, W32.FunLove.4099 has the opportunity to modify the Ntoskrnl.exe file, the Windows NT kernel located in the WinntSystem32 folder....
...Unfortunately, the consistency of Ntoskrnl.exe is checked only once during the startup process....
...The loader, Ntldr, checks Ntoskrnl.exe when it loads into physical memory during startup....
...If the kernel becomes corrupted, Ntldr is supposed to stop loading Ntoskrnl.exe and display an error message, even before a "blue screen" appears....
...files on those computers. In addition, the Ntoskrnl.exe and Ntldr patch is performed on the network drives....
...components over the network. The Ntoskrnl.exe and Ntldr patches are executed by a routine picked up from the Bolzano virus....
...Developer Network documentation. Can Ntoskrnl.exe be infected across the network, without Flcss.exe actually being copied to the system?...
...As long as the drive is writeable, FunLove will modify Ntoskrnl.exe over the network, even without dropping Flcss.exe onto the system....
...FunLove does not actually infect Ntoskrnl.exe, but it changes the file's security function....
...Once the affected computer is restarted, the modified Ntoskrnl.exe and Ntldr are loaded, and security is compromised....
来源: http://securityresponse.symantec.com/avcenter/venc/data/w32.funlove.4099.html

W32.Petch

技术细节
...C:WindowsSystem32Ntkrnlpa.exe C:WindowsSystem32Ntoskrnl.exe C:WindowsSystem32Ntoskrnl.exe...
来源: http://securityresponse.symantec.com/avcenter/venc/data/w32.petch.html

W32.Gruel@mm

技术细节
...C:WINNTSystem32*.dll C:WINNTSystem32Ntoskrnl.exe C:WINNTSystem32Command.com...
...C:WINNTRegedit.exe C:WindowsSystem32Ntoskrnl.exe C:WindowsSystem32Command.com...
......
来源: http://securityresponse.symantec.com/avcenter/venc/data/w32.gruel@mm.html



Valid HTML 4.01!