Makop Ransomware
Makop is a malicious ransomware strain that encrypts victim files and demands ransom payment for decryption. First observed in the wild on August 1, 2011, this ransomware has been actively targeting systems worldwide. Security researchers also track this malware under the aliases: Oled-Makop, Carlos, Shootlock, Shootlock-2, Origami, Tomas, Zbw, Fireee, Zes, Hidden, Captcha, Fair.
Quick facts
How Makop ransomware works
File encryption patterns
Makop modifies encrypted files using specific patterns to mark them as encrypted:
Ransom note and payment demands
After encrypting files, Makop displays ransom notes demanding payment for file recovery:
notes/readme-warning.txt
notes/build note.txt
notes/+README-WARNING+.txt
Technical indicators
Associated executable files
The following executable files are associated with Makop ransomware:
- executable.exe
- visual.exe
- visual.bin
- 1NS.exe
- makop.exe
- 지원서_20200303(열심히하겠습니다 잘부탁드립니다).exe
- svchost.exe.tmp
- makop_nowin.exe
- MetadataSys.exe
- MetadataSys
- MetadataSys.dll
- svchost.exe
- screensaver.exe
- 1964400829.exe
- Desktop_Locker.exe
- Desktop Locker.exe
- 1074076748.exe
- 396017923.exe
- 105521611.exe
- lov.exe
- invoice.exe
- explore.exe
- DESKTOP LOCKER.EXE
- cmd.exe
- DesktopLocker.exe
- winl.exe
- Desktop Locker(@A7la6) .exe
- Desktop_Locker.exe-
- filename
- Screen Locker B.exe
- winlogon.exe
- Desktop_Locker-spaces.ru.exe
- Desktop-Locker.exe
- Desktop_Locker-spaces.ru-spaces.ru.exe
- desktop_locker.exe
- 1.exe
- freebieblog.ru_desktop_locker.exe
- апа.exe
- a.exe
- 이력서(20200609)_경력사항 기재하였으니 확인부탁드립니다 감사합니다.exe
- makop_visual.exe
- vt.exe
- maki.exe
- zes.exe
- 입사지원서_200812(경력사항도 같이 확인 부탁드리겠습니다 열심히하겠습니다).exe
- 경력사항_200826(경력사항도 같이 확인부탁드리겠습니다 열심히하겠습니다).exe
- 부당 전자상거래 위반행위 안내(20201006)자료 반드시 준비해주세요.exe
- Betternet-6.4.0.exe
- 부당 전자상거래 위반행위 안내(20201020)자료 반드시 준비해주세요.exe
- 부당 전자상거래 위반행위 안내(20201023)자료 반드시 준비해주세요.exe
- ║╬┤τ └ⁿ└┌╗≤░┼╖í └º╣▌╟α└º ╛╚│╗(20201022)└┌╖ß ╣▌╡σ╜├ ┴╪║±╟╪┴╓╝╝┐Σ.exe
- captcha_visual.exe
- .mc_auto.exe
- 1111.bin.exe
- 1111.exe
- fgf.exe
- 저작권법 관련하여 위반인 사항들 정리하여 보내드립니다.exe
- GameDownload
- GameDownload.exe
- 是官.exe
- X.exe
- research document.doc
- 이미지 원본(제가 제작한 이미지)과 사용하고 있으신 이미지 정리한 내용.exe
- Fat32Formatter.exe
- 입사지원서(경력사항도 같이 기재하였습니다 잘 부탁드립니다).exe
- wlnlogon.exe
- 이력서_210905(경력사항도 같이 기재하였습니다 같이 확인부탁드립니다).exe
- 이력서_211223(경력사항도 같이 기재하였습니다 잘 부탁드립니다).exe
- N1eh.exe
- _____220228(_____ __ _______ _______).exe
- 이력서(200305)열심히하겠습니다 잘부탁드립니다.exe
- Polygon's Microshaft
- 포트폴리오.exe
- .mc_hand.exe
About this analysis
This Makop ransomware analysis is part of Elastio's comprehensive ransomware detection database. Elastio provides advanced ransomware protection and recovery, helping organizations defend against and recover from ransomware attacks like Makop.
Last updated: December 30, 2025
Elastio detects Makop inside your data and backups.
The Hunt Engine uses Deep File Inspection to identify Makop across live data, replicated data, and backups. If this family is in your environment, Elastio finds it before encryption completes. Run a scan against your recovery points to confirm.
Recent ransomware
Explore other threats in our database