Solved

Virus Exploit:Win32/Pdfjsc.AEI

Posted on 2013-12-24
10
439 Views
Last Modified: 2013-12-24
Downloaded and scanned with MS Safety Scanner and it said that it partially removed the following exploit.  What does partially mean?  Any ideas.  Ran the quick scan and it came back clean.  Computer was running Malwarebytes Pro, that scan came back clean as well.

---------------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------

Microsoft Safety Scanner v1.0, (build 1.165.538.0)
Started On Mon Dec 23 22:05:44 2013

Extended Scan Results
----------------
->Scan ERROR: resource file://C:\pagefile.sys (code 0x00000020 (32))
->Scan ERROR: resource file://C:\pagefile.sys (code 0x0000054F (1359))
->Scan ERROR: resource file://C:\pagefile.sys (code 0x00000020 (32))
->Scan ERROR: resource file://\\SERVER\WPDATA~1 (code 0x0000054F (1359))
Threat detected: Exploit:Win32/Pdfjsc.AEI
    containerfile://C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.Outlook\MX4H1RNN\282244.pdf
        SHA1:   470C0FFA41185D920502904E9CA04BEE4EBEB032
    file://C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.Outlook\MX4H1RNN\282244.pdf->(pdf0002:)
        SigSeq: 0x00000E287E53DD1D
        SHA1:   022D7BE468A0DF363965C377E5FC58787030CCBD

Extended Scan Removal Results
----------------
Start 'remove' for file://\\?\C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.Outlook\MX4H1RNN\282244.pdf->(pdf0002:)
Operation failed (code=0x8026), please use a full antivirus product ! !

Start 'remove' for containerfile://\\?\C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.Outlook\MX4H1RNN\282244.pdf
Operation failed (code=0x8026), please use a full antivirus product ! !


Results Summary:
----------------
Found Exploit:Win32/Pdfjsc.AEI, partially removed.
Microsoft Safety Scanner Finished On Tue Dec 24 06:44:10 2013


Return code: 7 (0x7)

---------------------------------------------------------------------------------------

Microsoft Safety Scanner v1.0, (build 1.165.566.0)
Started On Tue Dec 24 06:50:55 2013
->Scan ERROR: resource file://C:\pagefile.sys (code 0x00000020 (32))
->Scan ERROR: resource file://C:\pagefile.sys (code 0x0000054F (1359))
0
Comment
Question by:mmitcni
  • 4
  • 4
  • 2
10 Comments
 
LVL 11

Assisted Solution

by:Miftaul
Miftaul earned 250 total points
ID: 39738104
Its a vulnerability in PDF, please update the adobe reader to latest version.
0
 
LVL 18

Expert Comment

by:awawada
ID: 39738164
0
 

Author Comment

by:mmitcni
ID: 39738182
Thank you.  I opened the PDF reader and went to help>check updates.  
Said that it had the latest version.
0
Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 
LVL 18

Expert Comment

by:awawada
ID: 39738221
Do you use Adobe Reader?
If yes which version do you have?
0
 

Author Comment

by:mmitcni
ID: 39738234
Adobe Reader 10.1.8
0
 
LVL 18

Accepted Solution

by:
awawada earned 250 total points
ID: 39738237
You must have 11.0.05.
Get it from http://get.adobe.com/reader

After run an update to get 11.0.05 .
0
 

Author Comment

by:mmitcni
ID: 39738258
Done.  11.0.05
0
 
LVL 18

Expert Comment

by:awawada
ID: 39738264
Now you are up-to-date :)
Happy Xmas.
0
 

Author Comment

by:mmitcni
ID: 39738294
Thanks, to you as well:)
0
 
LVL 11

Expert Comment

by:Miftaul
ID: 39738328
Please mark answers as accepted.
0

Featured Post

Free Tool: Postgres Monitoring System

A PHP and Perl based system to collect and display usage statistics from PostgreSQL databases.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article summarizes using a simple matrix to map the different type of phishing attempts and its targeted victims. It also run through many scam scheme scenario with "real" phished emails. There are safeguards highlighted to stay vigilance and h…
This story has been written with permission from the scammed victim, a valued client of mine – identity protected by request.
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial

685 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question