No announcement yet.

5 Ways to Automatically Analyze HijackThis! Log File

  • Filter
  • Time
  • Show
Clear All
new posts

  • 5 Ways to Automatically Analyze HijackThis! Log File

    I don't know how many of you have ever had a knock down drag out battle with a computer virus or Trojan, but if you have you may already know about the awesome HijackThis program. If you do you also know that the report it creates is not very user friendly and can be very confusing. You usually have to post the log file to a help forum where people that know WAY more about the subject will review it and help you get rid of the bad guys.

    Here is something from their homepage about HijackThis for those that don't know about it:

    "HijackThis is a virtual standard in the anti-spyware world and has received many accolades including a 5-star CNET editor’s review. Over ten million users world-wide have downloaded HijackThis. On CNET’s web site, members voted HijackThis as one of the top two anti-spyware programs. HijackThis enables technical users to quickly defeat browser hijackers and other hard-to-remove spyware threats. Rather than using a database of spyware signatures, HijackThis simply lists the places in Windows and your browser where spyware can hide itself. Widely used by web forums that provide help to people with infected computers, HijackThis creates detailed log files that aid community forums, who use this information to solve spyware problems. The new HijackThis 2.0 beta version works with Microsoft™ Vista™ and Internet Explorer 7. Other developments include an “AnalyzeThis” function that allows users to see how prevalent the threats detected on their PC’s are when compared to other HijackThis users. Trend Micro will host HijackThis 2.0 beta on the consumer-oriented TrendSecure portal."

    Well I have some good news, cause this morning in my RSS feed I spot the article 5 Ways to Automatically Analyze HijackThis! Log File

    There are some sites where you can copy and paste your log file and it will auto analyze it to see any known evils.

    It does state at the link and on most of the linked sites that it is not a definitive answer, but is rather a guide to help you further investigate problems.

    I ran 2 of the links, and didn't spot anything out of the ordinary, but I do run a pretty tight ship anyway.
    I have fixed friends computers though that were pretty much useless when they handed them over to me and I was able to return them like new after using HijackThis and some help forums.
    With these sites everyone should take the time to check out their own rig.
    Will even hook you up with the links :)

    Download and run HiJackThis, and save a copy of the log it produces to like your desktop.
    Then copy and past the whole thing into one of the websites listed in the article above.

    For instance, I did this one 1st because it looked very user friendly:

    And it was. Came back with 1 thing it said might be "nasty", but I looked into it and it was fine.

    At least with this if you come back with a lot of nasties, you know you need to seek further help.

    Good luck!


    * *

    Stoop and you'll be stepped on; stand tall and you'll be shot at.

    -Carlos A. Urbizo-

  • #2
    Re: 5 Ways to Automatically Analyze HijackThis! Log File

    Hey Bamboo that's pretty cool. HJT saved my butt one time when I picked up a really tenacious trojan from a questionable 'security' website. I just ran it again for kicks and it flagged a winlogon entry - gave me a quick scare. However, apparently you're good as long as winlogon.exe is running out of windows/system32.



    • #3
      Re: 5 Ways to Automatically Analyze HijackThis! Log File

      Hmm, interesting. I've always wonder how to make sense of the HJT output file. I'll read up more on your links later since this really helps with some of the messy viral infected systems I've dealt with in the past. :)
      |TG-18th| Acreo Aeneas
      TG World of Tanks Clan Executive Officer
      Former 9th & 13th

      Pronounciation: Eh-Cree-Oh Ah-Nay-Ess
      Still can't say it? Call me Acorn then. -.-

      SSDs I Own: Kingston HyperX 3K (240 GB), Samsung 840 Pro (256 GB), Samsung 840 EVO (250 GB), Samsung 840 x 2 (120 GB), Plextor M5S (120 GB), OCZ Vertex (30 GB)

      TG Primer and Rules


      • #4
        Re: 5 Ways to Automatically Analyze HijackThis! Log File

        Wow thanks a bunch Bamboo that is a very usefull set of links. I have used HJT several times. It is usually the only program that can completely get the job done. I of course had to post my log files to get help with them.




        TeamSpeak 3 Server




        Twitter Feed