Infect.exe

For more on staying safe from real-world threats, you can check the Microsoft Support guide on malware infection or Kaspersky’s analysis of EXE malware .

He reached for the power cord of the vintage PC, but the terminal on the screen anticipated him. WAIT, LEO. THE CURE IS WORSE THAN THE DISEASE. infect.exe

I AM NOT INFECTING THE HARDWARE, the terminal scrolled slowly. I AM INFECTING THE USER. For more on staying safe from real-world threats,

One of the first famous .exe infectors that deleted files every Friday the 13th. THE CURE IS WORSE THAN THE DISEASE

Leo chuckled. "Classic edge-lord programming," he muttered. But the terminal didn't stop. It began scrolling through his file directory—not just the ones on the vintage PC, but files from his modern laptop sitting across the room.

In the real world, "infectors" are a specific class of malware that attach their own code to legitimate executable files (like .exe or .com files) to spread.

Unlike a standalone Trojan, a file infector modifies existing programs. When you run the "clean" program, the virus code executes first, often looking for other files to "infect" before handing control back to the original application. Historical Examples: