BlockDefense (Block Defense)

BlockDefense or Block Defense is the latest release from the rogue program developers who also created SaveDefense, TrustNinja, SaveKeep and other of the same kind. BlockDefense can be installed on computers by another Trojan who can easily pass-through an installed security programs by utilizing a software vulnerabilities of the target computer. Once infected, computer will display various irregularities and malfunction. Internet browser will be closed automatically and a bunch of pop-up alert messages to attract users attention and promote this rogue security program.

Remove BlockDefense with the help of a legitimate anti-malware or anti-virus application. Do a full scan after starting the computer is Safe Mode. You may also try to use legitimate online virus scanner from different reputable company to ensure that all viruses will be detected and removed from the system.

TypeRogue
Sub-TypeFakeAV
Aliases 
OS AffectedWindows
Detected ByMalwareBytes

What are the symptoms of this Rogue Program?

After installation it will run its own virus scanner.
BlockDefense Image

It will modify Windows Registry and add the following entries:

  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Current Version\Uninstall\BlockDefense
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Current Version\Run = “BlockDefense”
  • HKEY_LOCAL_MACHINE\SOFTWARE\BlockDefense
  • HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_BLOCKDEFENSESVC
  • HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_BLOCKDEFENSESVC\0000
  • HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_BLOCKDEFENSESVC\0000\Control
  • HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\BlockDefenseSvc
  • HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\BlockDefenseSvc\Security
  • HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\BlockDefenseSvc\Enum
  • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_BLOCKDEFENSESVC
  • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_BLOCKDEFENSESVC\0000
  • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_BLOCKDEFENSESVC\0000\Control
  • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\BlockDefenseSvc
  • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\BlockDefenseSvc\Security
  • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\BlockDefenseSvc\Enum

The threat will drop the following malicious files:

  • %ProgramFiles%\BlockDefense Software\BlockDefense
  • %ProgramFiles%\BlockDefense Software\BlockDefense\data.bin
  • %ProgramFiles%\BlockDefense Software\BlockDefense\license.txt
  • %ProgramFiles%\BlockDefense Software\BlockDefense\BlockDefense.exe
  • %ProgramFiles%\BlockDefense Software\BlockDefense\BlockDefenseSvc.exe
  • %ProgramFiles%\BlockDefense Software\BlockDefense\uninstall.exe
  • %Documents and Settings%\All Users\Desktop\BlockDefense.lnk
  • %Documents and Settings%\All Users\Start Menu\Programs\BlockDefense\1 BlockDefense.lnk
  • %Documents and Settings%\All Users\Start Menu\Programs\BlockDefense\2 BlockDefense.lnk
  • %Documents and Settings%\All Users\Start Menu\Programs\BlockDefense\3 BlockDefense.lnk
  • %Temp%\nsm2.tmp\nsProcess.dll
  • %Temp%\nsm2.tmp\nsSCM.dll

How to Remove BlockDefense Manually

1. Restart your computer in SafeMode
- After Power-On the computer, just before Windows start, press F8
- From the selections, Select SafeMode

2. Remove Registry entries that the threat added. You MUST BACKUP YOUR REGISTRY FIRST.
- Click Start > Run
- Type in the field, regedit
- Navigate and look for the registry entries mentioned above and delete if necessary

3. Delete malicious files that the threat added:
- Base on the given location above, browse and delete the file
- If no location is given, click Start>Search> and search for the file.
- If cannot be deleted, press Ctrl+Alt+Del to access Task Manager, see if the file is running in the process. If it is, select the file and click End Process. Perform file delete again.

4. Scan computer with Antivirus Program
- Update antivirus program
- Scan computer and delete all detected threats.

Leave a Reply

Your email address will not be published. Required fields are marked *

(Required)

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>