You can check the latest ransomware information.
[ iq200 ransomware ]
[Virus/malware activity reported: iq200 ransomware]
As a security breach believed to be in the form of iq200 ransomware has occurred,
we would like to confirm the situation and provide a warning as follows.
iq200 ransomware
The ransomware is called iq200 and appears to be changing all files to existing name.existing extension.id-private key.[iq200@tutanota.com].iq20.
How it works
file version
[Figure 1 File version]
[Figure 2 File properties]
behavioral process
Register startup program
Register the ransomware executable file in the startup registry and folder and set it to run automatically when Windows starts.
[Figure 3 Startup program registration]
After encryption, users delete files using the CMD command to make it difficult to recover them.
[Figure 4 Check and delete shadow copies]
Infection results
The information file is created under the name mshta.exe in the info.txt and system32 folders on the desktop, and when encryption is performed, the file is saved as <existing name.existing extension.id-private key.[iq200@tutanota.com].iq20>. are changed.
[Figure 5 Infection result 1]
[Figure 6 Infection result 2]
[Figure 7 Infection result 3]
White Defender compatible
It supports real-time automatic restoration of files that will be encrypted before the malicious actions and blocking of White Defender ransomware.
[Figure 8 Block message]
[Figure 9 Block message]