You can check the latest ransomware information.
[ iq200 ransomware ]
[Virus/malware activity reported: iq200 ransomware]
As a security breach believed to be in the form of iq200 ransomware has occurred,
we would like to confirm the situation and provide a warning as follows.
iq200 ransomware
The ransomware is called iq200 and appears to be changing all files to existing name.existing extension.id-private key.[iq200@tutanota.com].iq20.
How it works
file version

[Figure 1 File version]

[Figure 2 File properties]
behavioral process
Register startup program
Register the ransomware executable file in the startup registry and folder and set it to run automatically when Windows starts.

[Figure 3 Startup program registration]
After encryption, users delete files using the CMD command to make it difficult to recover them.

[Figure 4 Check and delete shadow copies]
Infection results
The information file is created under the name mshta.exe in the info.txt and system32 folders on the desktop, and when encryption is performed, the file is saved as <existing name.existing extension.id-private key.[iq200@tutanota.com].iq20>. are changed.

[Figure 5 Infection result 1]

[Figure 6 Infection result 2]

[Figure 7 Infection result 3]
White Defender compatible
It supports real-time automatic restoration of files that will be encrypted before the malicious actions and blocking of White Defender ransomware.

[Figure 8 Block message]

[Figure 9 Block message]
Go watch the iq200 blocking video
