Administrator Lite Posted January 14, 2010 Administrator Share Posted January 14, 2010 HijackThis! is a specialised tool that can used to clear a system of malware. It is intended for use of intermediate- advanced users. If you aren't familiar with the tool, here is perhaps the best tutorial around. The information being presented is meant for those wishing to learn more about what HijackThis! is showing you and how to analyse logs yourself. It is not really meant for novices. It is meant to be more educational for intermediate to advanced PC users.Each line in a HijackThis log starts with a section name, for example;R0, R1, R2, R3 - Internet Explorer Start/Search pages URLs F0, F1, F2, F3 - Autoloading programs N1, N2, N3, N4 - Netscape/Mozilla Start/Search pages URLs O1 - Hosts file redirection O2 - Browser Helper Objects O3 - Internet Explorer toolbars O4 - Autoloading programs from Registry O5 - IE Options icon not visible in Control Panel O6 - IE Options access restricted by Administrator O7 - Regedit access restricted by Administrator O8 - Extra items in IE right-click menu O9 - Extra buttons on main IE button toolbar, or extra items in IE 'Tools' menu O10 - Winsock hijacker O11 - Extra group in IE 'Advanced Options' window O12 - IE plugins O13 - IE DefaultPrefix hijack O14 - 'Reset Web Settings' hijack O15 - Unwanted site in Trusted Zone O16 - ActiveX Objects (aka Downloaded Program Files) O17 - Lop.com domain hijackers O18 - Extra protocols and protocol hijackers O19 - User style sheet hijack O20 - AppInit_DLLs Registry value autorunO21 - ShellServiceObjectDelayLoad Registry key autorunO22 - SharedTaskScheduler Registry key autorunO23 - Windows NT ServicesO24 - Windows Active Desktop ComponentsThe full article continues at source.Source Link to comment Share on other sites More sharing options...
Administrator DKT27 Posted January 14, 2010 Administrator Share Posted January 14, 2010 Really useful info. I would say that this thread should be in "sticky". :) Link to comment Share on other sites More sharing options...
karachidude Posted January 17, 2010 Share Posted January 17, 2010 thanks for this Link to comment Share on other sites More sharing options...
Bizarre™ Posted January 17, 2010 Share Posted January 17, 2010 This would prove helpful in analyzing HijackThis! logs ^_^ Link to comment Share on other sites More sharing options...
HX1 Posted January 17, 2010 Share Posted January 17, 2010 04, 20 very useful area.. Alot of infections like this area.. Link to comment Share on other sites More sharing options...
Toshiro Posted January 17, 2010 Share Posted January 17, 2010 How to make a log Link to comment Share on other sites More sharing options...
implague Posted February 23, 2010 Share Posted February 23, 2010 how i missed this.... this is terrifik Link to comment Share on other sites More sharing options...
WaKa WaKa Posted February 23, 2010 Share Posted February 23, 2010 You can paste the LOG in thi web --> http://www.hijackthis.deIts an automatic analyzer. Link to comment Share on other sites More sharing options...
Bizarre™ Posted February 23, 2010 Share Posted February 23, 2010 @Waka Waka:Thanks for sharing :) Link to comment Share on other sites More sharing options...
Administrator Lite Posted March 5, 2010 Author Administrator Share Posted March 5, 2010 Please do be careful with those "automated scanners" - they are known to throw up some false detections and even rate malware as "legit" in cases. Link to comment Share on other sites More sharing options...
Toshiro Posted March 6, 2010 Share Posted March 6, 2010 Please do be careful with those "automated scanners" - they are known to throw up some false detections and even rate malware as "legit" in cases.True, I keep warning people for it. You can use it as a guideline.. but never trust is 100% Link to comment Share on other sites More sharing options...
Recommended Posts
Archived
This topic is now archived and is closed to further replies.