The behavior of most common malicious email attachments infecting Windows [42.1.1]
To counter malware, it can make a difference to know the malicious attachments that are commonly used in phishing emails to distribute malware. Each malware has specific attachment behavior.