IndoVirus.A creates multiple copies of itself on all available drives. IndoVirus.A attempts to disguise its executable file(s) as Windows folders. It changes the attributes of the original root folders to "hidden" and makes copies of its file using those folder names. It displays a folder-like icon and adjusts the Folder Options/View to "Do not show hidden files and folders" and sets "Hide extensions for known file types". The result of this disguise are multiple files using folder-like icons lying in wait for the computer user to click on them.
Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.
A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:
Check for the latest database updates
First check if your F-Secure security program is using the latest updates, then try scanning the file again.
Submit a sample
After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.
Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.
Exclude a file from further scanning
If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.
Note: You need administrative rights to change the settings.
Upon execution, the virus drops a copy of itself with a random name to the Windows and Windows System directories:
It also drops the following files, which are copies of the virus:
The malware uses a folder icon for its executable file, it drops a copy of itself using the name of all existing folders into the root directory of all drives in an infected machine and then it hides the original folders by adjusting their attributes. So, this malware pretends to be a valid folder on a hard drive.
The virus disables the Windows Task Manager and modifies the following Registry entries:
The virus modifies the Registry so that a user can not change Windows Explorer's option to "Show all hidden files or folders". To check for this modification, it is enough to open Windows Explorer, click on Tools menu, and choose Folder Options. Then click on View tab. The "Show all hidden files or folders" option is not available after the infection. The following Registry entries are modified:
The virus creates the following startup Registry entries for its files: