brkl9.exe - Dangerous
brkl9.exe
Manual removal instructions:
Antivirus Report of brkl9.exe:
brkl9.exe
We suggest you to remove BRKl9.exe from your computer as soon as possible.
BRKl9.exe is Trojan/Backdoor.
Kill the process BRKl9.exe and remove BRKl9.exe from Windows startup.
Malware dropper: 1.exe
Removed: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\~4090.ex
-------------------------------------------------------------------------------------
Classification:
Code:
Antivirus Version Last Update Result
F-Secure 8.0.14470.0 2009.10.07 Trojan-Downloader:W32/Perkesh.C
Kaspersky 7.0.0.125 2009.10.07 Trojan-Dropper.Win32.Mudrop.dyq
McAfee 5763 2009.10.06 Downloader-BWK
Microsoft 1.5101 2009.10.07 TrojanDownloader:Win32/Perkesh.F
NOD32 4487 2009.10.07 a variant of Win32/TrojanDownloader.Perkesh.I
Symantec 1.4.4.12 2009.10.07 Trojan.Dropper
Additional information
File size: 28672 bytes
MD5 : 882a20641183903aa9370799992fcf9e
SHA1 : 5e9457f994af2805aef1a8f87592d67b9127e849
-------------------------------------------------------------------------------------
Installation
When the program is executed, it creates the following registry subkeys and values:
----------------------------------
Keys added:6
----------------------------------
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe
HKLM\SOFTWARE\Microsoft\DownloadManager
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VB
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VB\0000
HKLM\SYSTEM\CurrentControlSet\Services\vb
HKLM\SYSTEM\CurrentControlSet\Services\vb\Security
----------------------------------
Values added:14
----------------------------------
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe\Debugger: "services.exe"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VB\0000\Service: "vb"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VB\0000\Legacy: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VB\0000\ConfigFlags: 0x00000000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VB\0000\Class: "LegacyDriver"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VB\0000\ClassGUID: "{8ECC055D-047F-11D1-A537-0000F8753ED1}"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VB\0000\DeviceDesc: "vb"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VB\NextInstance: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Services\vb\Security\Security: 01 00 14 80 90 00 00 00 9C 00 00 00 14 00 00 00 30 00 00 00 02 00 1C 00 01 00 00 00 02 80 14 00 FF 01 0F 00 01 01 00 00 00 00 00 01 00 00 00 00 02 00 60 00 04 00 00 00 00 00 14 00 FD 01 02 00 01 01 00 00 00 00 00 05 12 00 00 00 00 00 18 00 FF 01 0F 00 01 02 00 00 00 00 00 05 20 00 00 00 20 02 00 00 00 00 14 00 8D 01 02 00 01 01 00 00 00 00 00 05 0B 00 00 00 00 00 18 00 FD 01 02 00 01 02 00 00 00 00 00 05 20 00 00 00 23 02 00 00 01 01 00 00 00 00 00 05 12 00 00 00 01 01 00 00 00 00 00 05 12 00 00 00
HKLM\SYSTEM\CurrentControlSet\Services\vb\Type: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Services\vb\Start: 0x00000003
HKLM\SYSTEM\CurrentControlSet\Services\vb\ErrorControl: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Services\vb\ImagePath: "\??\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\~4090.ex"
HKLM\SYSTEM\CurrentControlSet\Services\vb\DisplayName: "vb"
----------------------------------
Values modified:0
----------------------------------
----------------------------------
Files added:2
----------------------------------
C:\Documents and Settings\Administrator\Local Settings\Temp\~4090.exe
C:\WINDOWS\system32\BRKl9.exe
----------------------------------
Files [attributes?] modified:0
----------------------------------
----------------------------------
Folders added:0
----------------------------------
----------------------------------
Folders deleted:0
----------------------------------
----------------------------------
Total changes:22
----------------------------------
-------------------------------------------------------------------------------------
Detected by UnHackMe:
- none -
After first reboot detected by UnHackMe:
Item Name: vb
Author:
Related File: \??\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\~4090.ex
Type: Services detected by Partizan
Removal Results: Success
Number of reboot: 1
-------------------------------------------------------------------------------------
Recommended software:
UnHackMe anti-rootkit and anti-malware
http://www.unhackme.com
RegRun Security Suite (Good choice for removal and protection)
brkl9.exe | Malware |
brkl9.exe | Dangerous |
brkl9.exe | High Risk |
BRKl9.exe is Trojan/Backdoor.
Kill the process BRKl9.exe and remove BRKl9.exe from Windows startup.
Malware dropper: 1.exe
Removed: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\~4090.ex
-------------------------------------------------------------------------------------
Classification:
Code:
Antivirus Version Last Update Result
F-Secure 8.0.14470.0 2009.10.07 Trojan-Downloader:W32/Perkesh.C
Kaspersky 7.0.0.125 2009.10.07 Trojan-Dropper.Win32.Mudrop.dyq
McAfee 5763 2009.10.06 Downloader-BWK
Microsoft 1.5101 2009.10.07 TrojanDownloader:Win32/Perkesh.F
NOD32 4487 2009.10.07 a variant of Win32/TrojanDownloader.Perkesh.I
Symantec 1.4.4.12 2009.10.07 Trojan.Dropper
Additional information
File size: 28672 bytes
MD5 : 882a20641183903aa9370799992fcf9e
SHA1 : 5e9457f994af2805aef1a8f87592d67b9127e849
-------------------------------------------------------------------------------------
Installation
When the program is executed, it creates the following registry subkeys and values:
----------------------------------
Keys added:6
----------------------------------
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe
HKLM\SOFTWARE\Microsoft\DownloadManager
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VB
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VB\0000
HKLM\SYSTEM\CurrentControlSet\Services\vb
HKLM\SYSTEM\CurrentControlSet\Services\vb\Security
----------------------------------
Values added:14
----------------------------------
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe\Debugger: "services.exe"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VB\0000\Service: "vb"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VB\0000\Legacy: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VB\0000\ConfigFlags: 0x00000000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VB\0000\Class: "LegacyDriver"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VB\0000\ClassGUID: "{8ECC055D-047F-11D1-A537-0000F8753ED1}"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VB\0000\DeviceDesc: "vb"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VB\NextInstance: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Services\vb\Security\Security: 01 00 14 80 90 00 00 00 9C 00 00 00 14 00 00 00 30 00 00 00 02 00 1C 00 01 00 00 00 02 80 14 00 FF 01 0F 00 01 01 00 00 00 00 00 01 00 00 00 00 02 00 60 00 04 00 00 00 00 00 14 00 FD 01 02 00 01 01 00 00 00 00 00 05 12 00 00 00 00 00 18 00 FF 01 0F 00 01 02 00 00 00 00 00 05 20 00 00 00 20 02 00 00 00 00 14 00 8D 01 02 00 01 01 00 00 00 00 00 05 0B 00 00 00 00 00 18 00 FD 01 02 00 01 02 00 00 00 00 00 05 20 00 00 00 23 02 00 00 01 01 00 00 00 00 00 05 12 00 00 00 01 01 00 00 00 00 00 05 12 00 00 00
HKLM\SYSTEM\CurrentControlSet\Services\vb\Type: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Services\vb\Start: 0x00000003
HKLM\SYSTEM\CurrentControlSet\Services\vb\ErrorControl: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Services\vb\ImagePath: "\??\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\~4090.ex"
HKLM\SYSTEM\CurrentControlSet\Services\vb\DisplayName: "vb"
----------------------------------
Values modified:0
----------------------------------
----------------------------------
Files added:2
----------------------------------
C:\Documents and Settings\Administrator\Local Settings\Temp\~4090.exe
C:\WINDOWS\system32\BRKl9.exe
----------------------------------
Files [attributes?] modified:0
----------------------------------
----------------------------------
Folders added:0
----------------------------------
----------------------------------
Folders deleted:0
----------------------------------
----------------------------------
Total changes:22
----------------------------------
-------------------------------------------------------------------------------------
Detected by UnHackMe:
- none -
After first reboot detected by UnHackMe:
Item Name: vb
Author:
Related File: \??\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\~4090.ex
Type: Services detected by Partizan
Removal Results: Success
Number of reboot: 1
-------------------------------------------------------------------------------------
Recommended software:
UnHackMe anti-rootkit and anti-malware
http://www.unhackme.com
RegRun Security Suite (Good choice for removal and protection)
Dmitry Sokolov:
I created UnHackMe in 2006 to fix the problem that antivioruses did not fix: detecting rootkits.
Since that time I work every day to fix the issues that antiviruses cannot.
If your antivirus have not helped you solve the problem, you should try UnHackMe.
We are a small company and you can ask me directly, if you have any questions.