J
joecu
I moved a file from another drive to a temp folder on my C: drive, which MSE scans in real time, hoping to install it if there was no warning; but MSE immediately quarantined it and said it is a "Trojan Win32/Meredrop" with an Alert Level "Severe" and a recommendation to delete it. I 'll take MSE at its word on what this is but it is the only utility I can think of offhand that does what this one claimed for itself--making a text or HTML list of the files (or the files or type of files I want) contained in an XP Windows Explorer folder--a feature I wish Explorer had natively.
This particular situation raises for me corrolary general questions of principle: Because of this designation as a "trojan", and the way the Microsoft site I clicked to described trojans and "trojan droppers", should I conclude that this little utility, "FileList Siever.exe" (ver. 1.4) has been written from the get-go as a trojan, and not as a legitimate utility that someone may have corrupted to act as malware? Put another way, can I conclude that this means I cannot find a "clean" copy anywhere of FileList Siever.exe because there never was one? Are trojans scratch-written, and other utilities that have been corrupted by someone else called by a different name, or is there somewhat a case-by-case malware nomenclature?
Continue reading...
This particular situation raises for me corrolary general questions of principle: Because of this designation as a "trojan", and the way the Microsoft site I clicked to described trojans and "trojan droppers", should I conclude that this little utility, "FileList Siever.exe" (ver. 1.4) has been written from the get-go as a trojan, and not as a legitimate utility that someone may have corrupted to act as malware? Put another way, can I conclude that this means I cannot find a "clean" copy anywhere of FileList Siever.exe because there never was one? Are trojans scratch-written, and other utilities that have been corrupted by someone else called by a different name, or is there somewhat a case-by-case malware nomenclature?
Continue reading...