When you encounter one of these files, you should take extra care to make sure that you are protected. Obviously you should always have your anti-virus software running and active, and protecting you in the background — but knowing more about some uncommon file extensions can be useful in preventing something bad from happening.
These file extensions are potentially dangerous because they can contain code or execute arbitrary commands. Media files — like. JPEG images and. There have been some cases where a maliciously crafted image or other media file can exploit a vulnerability in a viewer application, but these problems are rare and are patched quickly.
EXE — An executable program file. Most of the applications running on Windows are. PIFs the same as. EXE files if they contain executable code. MSI — A Microsoft installer file.
These install other applications on your computer, although applications can also be installed by. MSP — A Windows installer patch file. Used to patch applications deployed with. MSI files. SCR — A Windows screen saver. Windows screen savers can contain executable code. Unlike HTML applications run in browsers,. HTA files are run as trusted applications without sandboxing. All of the utilities found in the Windows Control Panel are. CPL files. Applications such as the group policy editor and disk management tool are.
MSC files. JAR —. JAR files contain executable Java code. If you have the Java runtime installed,. JAR files will be run as programs. BAT — A batch file. Add a comment. Active Oldest Votes. However, a file can use double file extension like this, so watch out: a-virus-file. If it is a URL, why would the extension be hidden? For example: MyVirus. Seth Seth 1, 1 1 gold badge 8 8 silver badges 17 17 bronze badges. This answer is rather.. You should specify, given there are two questions in the OP, not one.
You can spot this by mousing over the link and looking at the address in your browser. Next, head to VirusTotal. This tool has been owned by Google since Click the search button or press Enter to scan the file. VirusTotal will download the file you specified to its servers and scan it with a large number of different antivirus engines. If other people have recently scanned the file, VirusTotal will show you the recent scan results. This means it should be clean. In fact, not two days after publishing this article, our example file—CCleaner 5.
In some cases, the opinion may be near unanimous. In other cases, only a few antivirus tools may have a problem with the file. This is often a false positive, though in certain circumstances it could be that some antivirus tools have spotted new malware before others. You can scroll down to see which antivirus tools had a problem with the file, view more details about the file, and see community comments about whether the URL is safe or not.
In some cases, for example, it may just be flagged for including bundled crapware, which is easily bypassable. To make this process easier, the VirusTotal project offers browser extensions.
Download the appropriate extension and you can right-click a link and select the VirusTotal option to quickly scan it and see the results. If VirusTotal is unanimous that a file is dangerous, you should stay away. They are often delivered as an unknown e-mail attachment that will run when opened.
An SCF file is a Windows Explorer command used to perform an action such as moving up or down a directory or showing the Desktop. It can be run via Internet Explorer. The danger: Since the file is a Windows Explorer command file it can be used to tell Windows Explorer to execute commands that are dangerous to your computer. An SCR file is a screensaver file for Windows used to display vector graphic or text animations, play slide shows, animation, or videos, and may include sound effects when a computer is inactive for a customized period of time.
The danger: Screensaver files contain executable code, which makes it possible for programmers to hide malicious code inside them. Since SCR files are commonly used for screensavers, it can be difficult to recognize a malicious one. It can also be used as a shortcut to an executable file, much like an. LNK file. Therefore, a PIF file can be used to transmit viruses or other harmful scripts.
Please rate your experience Yes No. Any additional feedback? Submit and view feedback for This product This page. View all page feedback.
0コメント