User Guide

User’s Guide 269
Default Vulnerable and Compressed File Extensions
.COM Program Command/binary image files. These common
files run as infectable executable programs.
DOS and Windows system files frequently make
use of this extension.
.CSC Script/macro Corel script files. Script files can include viruses
or generate macro viruses.
.DL? Program Dynamic Link Library file; C++ dialog script files.
Dynamic Link Library files are resource files
linked to executable program files. Executable
files can load viruses stored in them and run
them as part of their native code.
.DOC Macro Microsoft Word document files. These files can
contain Word Basic macros and, therefore,
macro viruses
.DOT Macro Microsoft Word document template files. These
files can contain Word Basic macros and macro
viruses
.EXE Program Executable files. Most software uses this
extension to identify files that start its command
shell or program kernel.
.GMS Macro Corel Global Macro Storage files.
.GZ? Compressed UNIX GNU Gzip compressed files.
.HLP Macro Windows Help files. These files can contain
executable Word Basic or other macro code.
.HT? Script/macro Hyper Text Markup Language and related files;
Microsoft Hyper Text template files. Although
they are nominally plain text, these files can
contain powerful scripting functions that act
through browser software
.ICE Compressed ICE compressed files.
.IM? Program Image files for creating disk images.
.INI Program Windows initialization files. Although these are
generally text files, infected .INI files can cause
mIRC clients to perform unwanted actions.
.JS? Script JavaScript source files. JavaScript files can
contain virus code that acts directly on web
browsers.
.LZH Compressed LHARC compressed files
Table 10-1. Vulnerable file name extensions
Extension File Type File Description