Exploit.pdf-js.gen

The Shield Deluxe 2009 Log File


Product : The Shield Deluxe 2009


Version : The Shield Deluxe 2009 UIScanner


Scanning task : Deep System Scan


Log date : 20:10:27 03/10/2009


Log path : C:\Documents and Settings\All Users\Application Data\Bitdefender\Desktop\Profiles\Logs\deep_scan\1254615027_1_02.xml


Scan Paths:Path 0000: C:\


Path 0001: D:\


Scan Options:Scan for viruses : Yes


Scan for adware : Yes


Scan for spyware : Yes


Scan for applications : Yes


Scan for dialers : Yes


Scan for rootkits : Yes


Target Selection Options:Scan registry keys : Yes


Scan cookies : Yes


Scan boot sectors : Yes


Scan memory processes : Yes


Scan archives : Yes


Scan runtime packers : Yes


Scan emails : No


Scan all files : Yes


Heuristic Scan : Yes


Scanned extensions :


Excluded extensions :


Target Processing:Default action for infected objects : Disinfect


Default action for suspicious objects : None


Default action for hidden objects : None


Default action for encrypted infected objects : None


Default action for encrypted suspicious objects : None


Default action for password-protected objects : None


Scan engines summaryNumber of virus signatures : 4311635


Archive plugins : 44


Email plugins : 6


Scan plugins : 13


System plugins : 5


Unpack plugins : 8


Overall scan summaryScanned items : 400487


Infected items : 1


Suspicious items : 0


Resolved items : 1


Unresolved items : 5


Password-protected items : 5


Individual viruses found : 1


Scanned directories : 11975


Scanned boot sectors : 3


Scanned archives : 11253


Input-output errors : 2


Scan time : 00:59:07


Files per second : 112


Scanned processes summaryScanned : 25


Infected : 0


Scanned registry keys summaryScanned : 926


Infected : 0


Scanned cookies summaryScanned : 926


Infected : 0


Resolved issues:Object Name Threat Name Final Status


C:\Documents and Settings\HP_Administrator.PLAYROOM\Local Settings\Temporary Internet Files\Content.IE5\OJYH0X8D\pdf5[1].pdf=](JAVASCRIPT) Exploit.PDF-JS.Gen Moved to Quarantine


Objects that were not scanned:Object Name Reason Final Status


C:\Documents and Settings\All Users\Application Data\AOL\UserProfiles\All Users\antiSpyware\quarantine\Quarantine\20090727020459.zip=]0 Password-protected No action was possible


C:\Documents and Settings\All Users\Application Data\AOL\UserProfiles\All Users\antiSpyware\quarantine\Quarantine\20090924144411.zip=]0 Password-protected No action was possible


C:\Documents and Settings\HP_Administrator\My Documents\LimeWire\Saved\06 - Backspacer - Amongst the Waves.mp3=]06 - Backspacer - Amongst the Waves.mp3 Password-protected No action was possible


C:\Documents and Settings\HP_Administrator\My Documents\LimeWire\Saved\09 - Backspacer - Speed of Sound.mp3=]09 - Backspacer - Speed of Sound.mp3 Password-protected No action was possible


C:\Documents and Settings\HP_Administrator\My Documents\LimeWire\Saved\The Fray - Enough For Now.mp3=]07-The Fray-Enough For Now.mp3 Password-protected No action was possible


I'd rather not leave it in quarantine, and what do I do about the unscanned objects?


thank you so much for your help

Comments

  • Hello jaci12,


    You have to manually delete the file:


    C:\Documents and Settings\HP_Administrator.PLAYROOM\Local Settings\Temporary Internet Files\Content.IE5\OJYH0X8D\pdf5[1].pdf


    About the objects that were not scanned, they do not represent any threat to your system. They are password protected archives, and that's why they couldn't be scanned.


    Cris.