Game Guide Extensions which you don't want to open!

Status
Not open for further replies.

RESiSTANT

Server Owner
Joined
February 1st , 2009
Messages
20,886
Reaction score
60,594
Location
Europe

Dangerous and malicious file extension list


Group of file extensions, which can be dangerous and harmful for your computer, but it may be also a regular program or data files. You should run a virus scan before opening any unknown file type from this group.
Malicious software, also known as malware, is an application or a file, which is harmful to the computer user. Malicious software includes computer viruses, worms, trojan horses, spyware, adware or rootkits.
Computer virus - virus is a program or programming code, which replicates by being copied or initiating its copying to another program, computer boot sector or document. Viruses can be transmitted as attachments to an e-mail note or in a downloaded file, or can be present on a diskette or CD. Some viruses wreak their effect as soon as their code is executed, other lie dormant until circumstances cause their code to be executed by the computer.
Computer worm - worm is a self-replicating virus, which does not alter files, but resides in active memory and duplicates itself. Worms use parts of the operating system that are automatic and usually invisible to the user. It is common for worms to be noticed only after their uncontrolled replication consumes system resources, slowing or halting other tasks.
Trojan horses - trojan horse (also known as trojan), is non-self-replicating malware, which appears to perform a desirable function for the user, while facilitates unauthorized access to the user's computer system.
Spyware - spyware is any technology, which aids in gathering information about a person or organization without their knowledge. Spyware is a program that is installed in someone's computer to secretly gather information about the user and to relay it to advertisers or other interested parties. Spyware can get in the computer as a software virus or as the result of installing a new program.
Adware - adware is any software package, which automatically plays, displays or downloads advertisements to the computer after the software is installed on it or while the application is being used.
Rootkits - rootkit is a collection of programs that enable administrator-level access to a computer or computer network. Typically, a cracker installs a rootkit on a computer after first obtaining user-level access, either by exploiting a known vulnerability or cracking the password. Once the rootkit is installed, it allows the attacker to mask intrusion and gain root or privileged access to the computer and possibly also to other machines in the network.


[TABLE="class: extensiontable, width: 100%"]
[TR="class: bg3, bgcolor: #FFA100"]
[TD]Extension
arrow-up.gif
[/TD]
[TD]File type description[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD]
386-windows-virtual-device-driver.png
file extension 386[/TD]
[TD]Windows virtual device driver[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"] file extension aru[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Autorun.aru malicious file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD]
atm-troj-proagent-a.jpg
file extension atm[/TD]
[TD]Troj/ProAgent-A[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"] file extension aut[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Malware AutoStartup file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD]
bat-batch-file-executable.png
file extension bat[/TD]
[TD]Batch file (executable)[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"]
bin-cd-dvd-binary-image-file.png
file extension bin[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]CD/DVD binary image file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD] file extension bkd[/TD]
[TD]Book Library Local Dos exploit file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"] file extension blf[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Beast Trojan File[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD] file extension bll[/TD]
[TD]VBS/European-A worm file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"] file extension bmw[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]W32/Liji-A virus file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD] file extension boo[/TD]
[TD]Microsoft Booasm.arc encoded file archive[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"] file extension bqf[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Backdoor.Win32.Ciadoor.bqf trojan file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD] file extension buk[/TD]
[TD]Malicious file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"] file extension bxz[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]itaup.bxz malware file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD] file extension ce0[/TD]
[TD]Winewar worm file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"] file extension ceo[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Winewar worm file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD] file extension cfxxe[/TD]
[TD]Possibly Malware file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"]
chm-microsoft-compiled-html-help-file.png
file extension chm[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Microsoft compiled HTML help file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD] file extension cih[/TD]
[TD]Chernobyl virus file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"]
cla-java-class-file.png
file extension cla[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Java Class file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD]
class-java-bytecode-class-file.png
file extension class[/TD]
[TD]Java bytecode class file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"]
cmd-windows-command-script-file.png
file extension cmd[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Windows command script file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD] file extension cnm[/TD]
[TD]Microsoft Windows application menu options and setup file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"]
com-command-executable-file.png
file extension com[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Command executable file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD]
cpl-microsoft-windows-control-panel-file.png
file extension cpl[/TD]
[TD]Microsoft Windows Control Panel file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"] file extension cxq[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]SillyDl.CXQ downloading trojan file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD] file extension cyw[/TD]
[TD]Rbot.CYW worm file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"] file extension dbd[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]DemoShield project file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD]
dev-windows-device-driver-file.png
file extension dev[/TD]
[TD]Windows Device Driver file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"] file extension dlb[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Troj/Dloadr-AHT file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD] file extension dli[/TD]
[TD]Win32.Sober.AD@mm file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"]
dll-dynamic-link-library-file.png
file extension dll[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Dynamic Link Library file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD] file extension dllx[/TD]
[TD]Backdoor.Bot file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"] file extension dom[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]DomPlayer malicious file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD]
drv-microsoft-windows-device-driver.png
file extension drv[/TD]
[TD]Microsoft Windows device driver[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"] file extension dx[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Win32/Alureon file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD] file extension dxz[/TD]
[TD]Trojan backdoor virus file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"] file extension dyv[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]WORM_AUTORUN.DYV Worm file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD] file extension dyz[/TD]
[TD]Backdoor.Win32.ProRat.dyz trojan file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"]
eml-email-message-file.png
file extension eml[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Email message file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD]
exe-program-executable-file.gif
file extension exe[/TD]
[TD]Program executable file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"] file extension exe1[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Renamed executable file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD] file extensionexe_renamed[/TD]
[TD]Renamed EXE file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"] file extension ezt[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Worm.Win32.AutoRun.ezt file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD] file extension ***[/TD]
[TD]Win32.AutoRun.***[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"] file extension fjl[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Rootkit.Win32.Agent.fjl virus file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD] file extension fnr[/TD]
[TD]Trojan-Dropper.Win32.Flystud.lc. file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"] file extension fuj[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Worm.Win32.AutoRun.fuj virus file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD]
gif-graphics-interchange-file-format.ico
file extension gif[/TD]
[TD]Graphics interchange file format[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"]
hlp-help-file.png
file extension hlp[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Help file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD] file extension hlw[/TD]
[TD]win32/AMalum.EDHZ file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"] file extension hsq[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Qaz Trojan data file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD] file extension hts[/TD]
[TD]Troj/DelSpy-E file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"]
ini-text-configuration-file.gif
file extension ini[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Text configuration file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD] file extension iva[/TD]
[TD]Dementia.4207 virus file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"] file extension iws[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Trojan-Downloader.JS.Agent file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD]
js-javascript-file.png
file extension js[/TD]
[TD]JavaScript file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"] file extension kcd[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]rshiphop.kcd malware file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD] file extension lik[/TD]
[TD]Trojan.Win32.Agent.lik file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"] file extension lkh[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Worm.Generic.LKH virus file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD]
lnk-windows-shortcut-file.png
file extension lnk[/TD]
[TD]Windows Shortcut file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"] file extension lok[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]W32/Rbot-WE log file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD] file extension mfu[/TD]
[TD]Backdoor.Win32.Agent.mfu virus file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"] file extension mjz[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Trojan.Win32.Agent.mjz file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD] file extension oar[/TD]
[TD]HSQLDB database file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"]
ocx-activex-control-file.png
file extension ocx[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]ActiveX control file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD] file extension osa[/TD]
[TD]W32/Sober-AD file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"] file extension ozd[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Win32.TrojanDownloader.Agent.OZD trojan[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD]
pcx-paintbrush-bitmap-image.ico
file extension pcx[/TD]
[TD]Paintbrush bitmap image[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"]
pgm-portable-graymap-file-format.ico
file extension pgm[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Portable graymap file format[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD]
php2-php-version-2-script-hypertext-preprocessor.png
file extension php2[/TD]
[TD]PHP version 2 script (HyperText PreProcessor)[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"]
php3-php-version-3-script-file.png
file extension php3[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]PHP version 3 script file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD] file extension pid[/TD]
[TD]W32/Yayin-A worm data file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"]
pif-microsoft-windows-program-information-file.png
file extension pif[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Microsoft Windows Program Information File[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD] file extension plc[/TD]
[TD]Lotus add-in functions macros applications[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"]
png-portable-network-graphic-file.ico
file extension png[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Portable Network Graphic file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD] file extension pr[/TD]
[TD]W32/Brontok-DP worm file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"] file extension qit[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Backdoor.QIT trojan horse file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD] file extension rhk[/TD]
[TD]Backdoor.Win32.Rbot.rhk trojan virus file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"] file extension rna[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Malware file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD] file extension rsc_tmp[/TD]
[TD]Temporary file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"] file extension s7p[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]SubSeven trojan file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD]
scr-microsoft-windows-screensaver-file.png
file extension scr[/TD]
[TD]Microsoft Windows screensaver file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"] file extension scr[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Script file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD]
shs-microsoft-windows-shell-scrap-object-file.png
file extension shs[/TD]
[TD]Microsoft Windows Shell Scrap Object file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"] file extension ska[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Happy99 virus file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD] file extension smm[/TD]
[TD]Ami Pro macro file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"] file extension smtmp[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Trojan:Win32/FakeSysdef folder[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD] file extension sop[/TD]
[TD]Malware word.sop file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"] file extension spam[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Spam e-mail message[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD] file extension ssy[/TD]
[TD]W32/Sober-AD file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"]
swf-shockwave-flash-animated-vector-format-for-the-internet.jpg
file extension swf[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]ShockWave Flash, Animated vector format for the Internet[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD] file extension sys[/TD]
[TD]System file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"]
tif-aldus-tagged-image-file-format-tiff-bitmap-image.ico
file extension tif[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Aldus Tagged Image File Format (TIFF) bitmap image[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD] file extension tko[/TD]
[TD]Win32/Oficla malware file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"] file extension tps[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Scam torrent file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD] file extension tsa[/TD]
[TD]jnana.tsa malware file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"] file extension tti[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Beast Trojan file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD] file extension txs[/TD]
[TD]Beast Trojan file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"] file extension upa[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Fake download file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD] file extension uzy[/TD]
[TD]Backdoor.Sokacaps file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"]
vb-microsoft-visual-studio-visual-basic-script-file.png
file extension vb[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Microsoft Visual Studio Visual Basic script file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD]
vba-visual-basic-vba-module-file.png
file extension vba[/TD]
[TD]Visual Basic VBA module file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"]
vbe-microsoft-visual-basic-encoded-script-file.png
file extension vbe[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Microsoft Visual Basic encoded script file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD]
vbs-visual-basic-for-applications-script-file.png
file extension vbs[/TD]
[TD]Visual Basic for applications script file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"]
vbx-microsoft-visual-basic-extension-file.png
file extension vbx[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Microsoft Visual Basic Extension file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD] file extension vexe[/TD]
[TD]Infected executable file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"]
vsd-microsoft-visio-diagram-document-file.png
file extension vsd[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Microsoft Visio diagram document file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD]
vxd-microsoft-windows-virtual-device-driver.png
file extension vxd[/TD]
[TD]Microsoft Windows virtual device driver[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"] file extension vzr[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Sinowal.vzr malware file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD] file extension wlpginstall[/TD]
[TD]Possible Malware file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"]
wmf-windows-metafile-format.ico
file extension wmf[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Windows metafile format[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD]
ws-microsoft-windows-script-file.png
file extension ws[/TD]
[TD]Microsoft Windows script file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"]
wsc-microsoft-windows-scripting-component-file.png
file extension wsc[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Microsoft Windows scripting component file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD]
wsf-microsoft-windows-scripting-file.png
file extension wsf[/TD]
[TD]Microsoft Windows scripting file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"]
wsh-microsoft-windows-scripting-host-file.png
file extension wsh[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Microsoft Windows Scripting Host file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD]
wss-microsoft-windows-sound-system-file.png
file extension wss[/TD]
[TD]Microsoft Windows Sound System file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"] file extension xdu[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Backdoor.Win32.PcClient.xdu file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD] file extension xir[/TD]
[TD]BackDoor.Generic9.XIR trojan file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"]
xlm-microsoft-excel-macro-file.png
file extension xlm[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Microsoft Excel Macro file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD]
xlv-microsoft-excel-vba-module-file.ico
file extension xlv[/TD]
[TD]Microsoft Excel VBA module file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"] file extension xnt[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]W32/Sober-AD file[/TD]
[/TR]
[TR="class: bg2, bgcolor: #FFFFFF"]
[TD]
zix-winzix-compressed-archive-file.ico
file extension zix[/TD]
[TD]WinZix compressed archive file[/TD]
[/TR]
[TR]
[TD="class: bg2, bgcolor: #FFFFFF"] file extension zvz[/TD]
[TD="class: bg1, bgcolor: #EAEAEA"]Malware file[/TD]
[/TR]
[/TABLE]

Source: http://www.file-extensions.org/filetype/extension/name/dangerous-malicious-files
 
Last edited by a moderator:
Status
Not open for further replies.
Back
Top Bottom