Skip navigation

Analyzing HijackThis Logs

If you use HiJackThis to find and remove malware that hijacks your browsers then you might find Tony Bradley's article on very useful. He goes into a fair amount of detail showing how to analyze the log output so you can better understand what HiJackThis has detected. Having this information helps you better understand what items you really need to remove from the system and what is all right to leave in place.

Hide comments


  • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.