two separate questions which are somewhat related. i received several images today inside a .uue encoded file, one of which had the .shs extension after the .jpg extension. i decoded all of them before i realized that one had the .shs on it. i never viewed that image, but instead simply highlighted it, and shift-deleted it. i *think* that when i highlighted it, the .shs disappeared. i'm wondering if, since windows explorer under 2k allows you to view thumbnails of images, might that feature have activated the virus even if i didn't have that feature activated?
also, is it normal for wowexec.exe to show up in the task manager? i have wowexec.exe showing up with a space in front of it, and there is no process id or any other info such as cpu time, mem usage, etc etc... i don't seem to recall this process ever being there before my little mishap with the funlove .shs file... any ideas..?
one more thing... can funlove even infect a 2000 machine, or is it only 9x and nt machines..?
-syf3r.
also, is it normal for wowexec.exe to show up in the task manager? i have wowexec.exe showing up with a space in front of it, and there is no process id or any other info such as cpu time, mem usage, etc etc... i don't seem to recall this process ever being there before my little mishap with the funlove .shs file... any ideas..?
one more thing... can funlove even infect a 2000 machine, or is it only 9x and nt machines..?
-syf3r.