When ran, Switch randomly searches the directories on the current hard drive and attempts to infect one file. It does not infect COMMAND.COM, and restores the original attributes of infected files.
Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.
Detailed instructions for F-Secure security products are available in the documentation found in the Downloads section of our Home - Global site.
You may also refer to the Knowledge Base on the F-Secure Community site for further assistance.
Switch deletes MSAV and TBAV checksum files in the directories it infects. It has three encryption methods:
- Standard rotate (Uses random key for seven possible 'mutations') - Standard XOR (Uses random key, for 256 possible 'mutations') - Flipping of code stored in host in reverse order