Threat Descriptons



Category :


Type :


Aliases :

IndoVirus.a, Virus.Win32.IndoVirus.a


IndoVirus.A creates multiple copies of itself on all available drives. IndoVirus.A attempts to disguise its executable file(s) as Windows folders. It changes the attributes of the original root folders to "hidden" and makes copies of its file using those folder names. It displays a folder-like icon and adjusts the Folder Options/View to "Do not show hidden files and folders" and sets "Hide extensions for known file types". The result of this disguise are multiple files using folder-like icons lying in wait for the computer user to click on them.


Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.

A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:

  • Check for the latest database updates

    First check if your F-Secure security program is using the latest updates, then try scanning the file again.

  • Submit a sample

    After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.

    Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.

  • Exclude a file from further scanning

    If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.

    Note: You need administrative rights to change the settings.

Technical Details


Upon execution, the virus drops a copy of itself with a random name to the Windows and Windows System directories:

  • %temp%\[random].bat
  • %windir%\[random].scr
  • %windir%\system32\[random].com

It also drops the following files, which are copies of the virus:

  • %userprofile%\My Documents\My Music.exe
  • %userprofile%\My Documents\My Pictures.exe

The malware uses a folder icon for its executable file, it drops a copy of itself using the name of all existing folders into the root directory of all drives in an infected machine and then it hides the original folders by adjusting their attributes. So, this malware pretends to be a valid folder on a hard drive.


The virus disables the Windows Task Manager and modifies the following Registry entries:

  • HKLM\SOFTWARE\Classes\exefile (default) = File Folder (the default value is "Application")
  • HKLM\SOFTWARE\Classes\batfile (default) = Kabatia (the default value is "MS-DOS Batch file")
  • HKLM\SOFTWARE\Classes\comfile (default) = Demi Allah Zul cinta kamu Anick (the default value is "MS-DOS Application") Translation in English: Swear to God, Zul loves you Anick

Registry Changes

The virus modifies the Registry so that a user can not change Windows Explorer's option to "Show all hidden files or folders". To check for this modification, it is enough to open Windows Explorer, click on Tools menu, and choose Folder Options. Then click on View tab. The "Show all hidden files or folders" option is not available after the infection. The following Registry entries are modified:

  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL The "Type" is set to blank (the normal value of this is the string "radio")
  • HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced The "ShowSuperHidden" is set to 00000000
  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\HideFileExt The "UncheckedValue" is set to 00000001
  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL The "CheckedValue" is set to 00000000
  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\SuperHidden The "UncheckedValue" is set to 00000001

The virus creates the following startup Registry entries for its files:

  • HKCU\Software\Microsoft\Windows\CurrentVersion\Run Zul_Cinta_Anick = C:\WINDOWS\system32\[random].com
  • HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Run cintaku = C:\WINDOWS\[random].scr
  • HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Explorer.exe = C:\WINDOWS\[random].scr
  • HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell Explorer.exe = C:\DOCUME~1\[user]\LOCALS~1\Temp\[random].bat
More Support


Ask questions in our Community .

User Guides

Check the user guide for instructions.

Contact Support

Chat with or call an expert.

Submit a Sample

Submit a file or URL for analysis.