When ran, Switch randomly searches the directories on the current hard drive and attempts to infect one file. It does not infect COMMAND.COM, and restores the original attributes of infected files.
Based on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the detected program or file, or ask you for a desired action.
Find the latest advice in our Community Knowledge Base.
See the manual for your F-Secure product on the Help Center.
Submit a file or URL for further analysis.
Switch deletes MSAV and TBAV checksum files in the directories it infects. It has three encryption methods:
- Standard rotate (Uses random key for seven possible 'mutations')- Standard XOR (Uses random key, for 256 possible 'mutations')- Flipping of code stored in host in reverse order