For example, if CHKDISK were typed in at the command line, a bogus CHKDISK.COM file would be executed before the legitimate CHKDISK.EXE. In many cases, the companion virus also runs the legitimate ...