How to remove the ICPP Copyright Violation Alert ransomware

How to remove the ICPP Copyright Violation Alert ransomware

Summary: Although the original domain used to facilitate the $400 transaction is down, a huge number of people remain infected with the "copyright violation alert". Here's a universal license code for removing it.

TOPICS: Security, Malware

Who would have thought that on your way to remove a ransomware scam that affected your PC, you would be one day pirating the application that was originally using a "copyright violation alert" theme, as a spreading technique?

What's the best way of removing it? A working license code that completely uninstalls the ransomware, remains the most effective post-infection approach.

Although the original domain used to facilitate the $400 transaction scam is down, a huge number of end users remain affected -- at least based on the few dozen of requests for removal instructions I received from Zero Day readers --despite the fact that the detection rate of the ransomware is relatively high - iqmanager.exe - Result: 35/41 (85.37%); mm.exe - Result: 29/41 (70.74%).

What would be the best, and most effective way to get rid of the ransomware once and for all, excluding the use of freeware tools that detect and remove it?

It's by using the universal unlocking code/licensing code required in the "Enter a previously purchased license code" window. In this case that's RFHM2-TPX47-YD6RT-H4KDM

As always, prevention is better than the cure.

Topics: Security, Malware

Dancho Danchev

About Dancho Danchev

Dancho Danchev is an independent security consultant and cyber threats analyst, with extensive experience in open source intelligence gathering, malware and cybercrime incident response.

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.


Log in or register to join the discussion
  • OK Dancho you get a free pass today.

    But does anybody else read this and have any sense for the degree to which Windows continues to get pwned?

    It has simply gotten ridiculous.

    It is so ridiculous, to the point that today's solution is to use a valid ransomware license key to remove the offending malware.

    Now, that's rich.

    This is yet again another roadside billboard which all Windows users should really stop and read carefully.

    Your Windows is getting bent over a Desk and compromised with malware the likes of this.

    That should be enough to enrage and embolden you into taken <a href="">major action</a>.

    Is this the 'final straw' for you?

    I hope it is.

    Please consider doing what <a href="">Jason Perlow did</a>.

    Make Ubuntu Lucid Lynx 10.04 LTS your base system and put Microsoft Windows on security probation--indefinitely.

    I hope you take my recommendation seriously.

    Ubuntu Linux: The safe choice.

    Dietrich T. Schmitz
    Linux Advocate
    Dietrich T. Schmitz, Your Linux Advocate
    • Not my Windows.

      My Windows is funning just fine and free of malware. Doesn't take much intelligence to keep it that way also.
      Test Subject
      • Ah. Good for you. :P

        Dietrich T. Schmitz, Your Linux Advocate
        • Mines' ok too. nt

      • Here is the Ultamate solutions to avoid viruses

        1. Isolate your Computer from internet and any other materials to any other computer. Dont share disks or CD from any other device

        2. Sell your computer and never get one again.

        Those 2 solutions will keep you safe from harm forever.
        • Exschellent

          Dietrich T. Schmitz, Your Linux Advocate
        • Or you could just switch to Linux. (nt)

          Henry Miller
          • But then you will get virius from his dirty blanket!

            Besides, I think Snoopy sleeps on it too!
          • GNU/Linux, not Linus van Pelt.

            [b] [/b]
          • OR NOT! nt

    • Why go through that hassle?

      You imply that running Microsoft Windows is somehow bad and switching to linux would be the solution. However you fail to neglect that the 5 seconds it takes to type in the key and disable the ransomware is much easier than having to back up terabytes of data, then spending hours of repartitioning, reformatting, and installing linux. That does not include compile time for applications. You are looking at a week's worth of time just to get it set up and configured. On top of all that your linux box is still not secured because it leaves the telnet port wide open allowing any intruders in. And guess what? You have no way of knowing because linux doesn't come with any type of auditing software or malware scanning software.

      So you go on with your false hopes, the rest of us will stick with the 5 second solution and have a Microsoft Windows machine that is usable.
      Loverock Davidson
      • On what planet?

        On Earth, modern Linux distros are like 400MB, not terabytes, and don't require you to manually partition or compile anything.
        • Read again

          he said *back up* terabytes of *data*, not downloading terabytes of a distro or distros.
          • That wouldn't make any sense either.

            All modern Linux distros comes with the ability to automatically mount, read, and write FAT32 and NTFS partitions.
        • Funny...

          Last Ubuntu I downloaded was far more than 400MB...

          But hey, what ever you need to do to make your point right buddy?
          • Far more being "several terabytes"?

            [b] [/b]
          • Nope... but also not being near 400mb.

            You're seriously a complete failure at twisting words. Why continue to try?
          • Almost fresh Ubuntu 9.04 here

            2.8 GB used, after installing Chrome and Opera to test our company website.

            desktop:/$ sudo du -h --max-depth 1
            60K ./tmp
            0 ./proc
            207M ./lib
            4.0K ./mnt
            12K ./.cache
            8.0K ./media
            0 ./sys
            1.9G ./usr
            4.0K ./srv
            112K ./root
            48M ./opt
            16K ./lost+found
            14M ./etc
            5.4M ./bin
            7.8M ./sbin
            122M ./home
            4.0K ./selinux
            30M ./boot
            468K ./dev
            492M ./var
            2.8G .
          • See... that was easy.

            2.8 gigs is fairly thin. No need to blantantly lie about it.

            There is a difference between liking Linux, and loving to hear yourself talk about Linux.

            I have seen Linux installs from a few megs to over 10 gigs. But most modern installs average a couple gigs to around 5. 400 usually gets you a minimal system that in no way compares to surface and usability of Windows or OSX. Sad, but true.
      • LD will be filling in for Mike Cox who is on vacation this week.

        Dietrich T. Schmitz, Your Linux Advocate