Can You Name the Malware? Free Scanner | aftertheaffair.uk

Your Ex Does Not Send Messages.
They Deploy Payloads.

Each message is engineered to exploit a specific vulnerability in your emotional operating system. This free scanner teaches you to read the code underneath the words — so you can name the malware before it executes.

The 7 manipulation tactics mapped with detection signals, breach patterns, and exact firewall responses
A quick-scan checklist to run before every response — so you stop reacting and start reading the code
Recognition is the firewall. Once you can name it, it loses the ability to execute

Run the scanner below. Then get the full PDF to keep on your phone.

The Emotional Malware Scanner

7 Malware Types. Read all of them.
Highlight the 2 or 3 your ex uses most.

Click each malware type to expand it. Read the detection signals. Note which ones you recognise in your own message history. That recognition is the beginning of the firewall.

BAIT.exe The Provocation Bait

What it is

Pure bait has no logistical purpose. It exists to provoke a defensive or emotional response — giving your ex proof that they can still reach you. Once you respond, they’ve won.

Live samples

“I know what you said about me to the kids.”
“I can’t believe you think it’s okay to parent that way.”
“Everyone knows what you’re really like.”

Firewall response

QUARANTINE. No response. No correction. No explanation. Bait is not information — it is a trap. Archive and move on.
GHOST.exe The Guilt Injection

What it is

Guilt injection reframes normal parenting decisions as evidence of your cruelty or failure. It makes an emotional argument designed to destabilize your confidence until you give in.

Live samples

“Do you even think about what this does to the kids?”
“You used to care about this family. Now I don’t even recognize you.”

Firewall response

NAME IT, DON’T ABSORB IT. If it contains a logistics question, answer only that. The emotional payload? Let it slide off the glass.
URGENT.exe False Urgency

What it is

False urgency manufactures a crisis to bypass your rational vetting system. Most crises from a high-conflict ex are not emergencies. They are control attempts with an expiration date attached.

Live samples

“I need to talk to you RIGHT NOW.”
“Something happened with the kids and you need to call me immediately.”
“If you don’t respond in the next hour I’m calling my lawyer.”

Firewall response

APPLY THE 10-MINUTE RULE. A true emergency involves specific, verifiable danger. Read fully. Breathe. Assess. If it’s real, respond. If not, log and hold.
REWRITE.exe History Rewriting

What it is

History rewriting presents a distorted version of past events as established fact — and dares you to correct it. The trap is in the correction. They will never agree. The argument is the goal.

Live samples

“You know exactly what you did.”
“I have texts proving you agreed to this. You always do this.”

Firewall response

DECLINE THE NARRATIVE. If it contains no actionable logistics, do not engage. If legally relevant, log it and share with your attorney. Do not debate history.
CLOAK.exe Threat in Disguise

What it is

Veiled threats produce fear while maintaining plausible deniability. Your ex isn’t threatening you — they’re “just expressing concern.” The intimidation is the message; the civilized wrapper is the disguise.

Live samples

“I’m just saying, my lawyer might have a different view on that.”
“I hope you’re keeping records, because I certainly am.”

Firewall response

DOCUMENT AND HOLD. Log with exact timestamp. Do not acknowledge the implied threat. Respond only to buried logistics. If threats escalate, your attorney handles it.
SWEET.exe Love Bombing

What it is

Love bombing reverses the pattern suddenly — kindness, nostalgia, apparent reasonableness. It feels like a breakthrough. It is a tactic to lower your firewall. The warmth evaporates the moment it achieves its purpose.

Live samples

“I’ve been doing a lot of thinking and I really miss the family we had.”
“I think we actually make a great team when we try.”

Firewall response

MAINTAIN PROTOCOL. Warmth is not a reason to change the system. Log it with the same neutrality you log everything else. The firewall applies to kindness AND hostility.
FLOOD.exe Message Flooding

What it is

Message flooding uses sheer volume to overwhelm your vetting system. When messages come in rapid succession, you stop reading carefully and start reacting. The goal is to keep you permanently on their schedule.

Live samples

[Multiple rapid messages in sequence about unrelated topics]
“Why aren’t you responding? I know you’re seeing these.”

Firewall response

COLLAPSE TO ONE WINDOW. Let them send. Do not read in real-time. At your designated window, identify any single piece of actionable logistics, send one response. Volume gets one reply — never one per message.

Quick Scan Checklist — Mark which ones your ex uses

BAIT.exe — Pure provocation with no logistical purpose
GHOST.exe — Guilt injection designed to make you feel responsible
URGENT.exe — Manufactured crises that bypass your vetting system
REWRITE.exe — History presented as fact, daring you to correct it
CLOAK.exe — Veiled threats wrapped in civil language
SWEET.exe — Sudden warmth designed to lower your guard
FLOOD.exe — Volume as overwhelm to keep you reactive
0
malware types identified
1 to 2 Types Identified: Targeted Tactics

Your ex has a focused playbook. Knowing the specific types they use means you can build a targeted firewall. The Firewall Protocol gives you the full VAULT system and the exact response library for each of these tactics.

3 to 4 Types Identified: Rotating Arsenal

Your ex cycles between tactics depending on which gets the best response. The VAULT method in the Firewall Protocol is specifically designed for this — it works across all 7 types because it addresses the mechanism, not just the tactic.

5 to 7 Types Identified: Full-Spectrum Attack

Your ex deploys most or all of the toolkit. This level of tactics is exhausting precisely because no single response strategy works across all of them. The Firewall Protocol gives you the unified system that handles all 7 types with one framework: the VAULT method.

Inside The Course

Everything in The Firewall Protocol

One course. One payment of $97. The complete communication firewall system for high-conflict co-parenting.

🎧
The Firewall Protocol
The 45-minute core audio. The VAULT method (Vet, Abbreviate, Uncouple, Log, Terminate) and the full 7 Malware Type system for treating every message as a data transaction, not an emotional event.
Core Audio
📋
The Gray Rock Response Library
52 pre-written, emotionally sterile responses across 8 categories. Find the scenario, fill in the brackets, copy, paste, send. Do not add to them.
Part 2
🚗
The Custody Exchange Safety Script
The pre-exchange reset, 5 core phrases covering 80% of all exchanges, and scenario-by-scenario scripts for 12 high-conflict exchange situations.
Part 3
📊
The Communication Audit Checklist
14 questions across 5 vulnerability zones with a scored firewall status and a 48-Hour Patch Plan for every gap identified.
Part 4
🃏
The Firewall Field Guide
Three laminate-ready cards: the VAULT Protocol, the 7 Malware Types quick reference, and the Gray Rock Master Script. Screenshot them to your phone.
Part 5
📁
The Evidence Archive System
The documentation mindset, master archive folder structure, screenshot protocol, and incident log template. PDF and editable Word versions included.
Part 6
🔄
The Reaction Chain Reset
The audio that breaks the specific chain that runs from message received to emotional response sent — before VAULT has a chance to activate.
Part 7

You can now name the code.
The protocol teaches you to block it.

Naming the malware type is the beginning of the firewall. The Firewall Protocol gives you the full VAULT system, the 52 response library, the exchange scripts, the audit, the field guide cards, and the evidence archive. Everything you need to make their messages produce no spike at all.

Full course and all 7 parts included: $97

Get Instant Access for $97 →

Secure checkout. Instant access on purchase. 30-day money-back guarantee.

Scroll to Top