HiJack review needed

By chief472
Jun 12, 2012
  1. Please review the attached hijack file and let me know what to delete. Thanks.

    Edit: Attached HijackThis log has been deleted by Bobbye
  2. Bobbye

    Bobbye Helper on the Fringe Posts: 16,335   +36

    We do not screen for malware with HijackThis.

    If you would like us to check the system for malware, please follow these steps: Preliminary Virus and Malware Removal.

    NOTE: If you already have any of the scanning programs on the computer, please remove them and download the versions in these links.

    When you have finished, leave the logs for review in your next reply .
    NOTE: Logs must be pasted in the replies. Attached logs will not be reviewed.

    My Guidelines: please read and follow:
    • Be patient. Malware cleaning takes time. I am also working with other members while I am helping you.
    • Read my instructions carefully. If you don't understand or have a problem, ask me. Follow the order of the tasks I give you. Order is crucial in cleaning process.
    • If you have questions, or if a program doesn't work, stop and tell me about it. Don't try to get around it yourself.
    • File sharing programs should be uninstalled or disabled during the cleaning process..
    • Observe these:
      [o] Don't follow directions given to someone else
      [o] Don't use any other cleaning programs or scans while I'm helping you.
      [o] Don't use a Registry cleaner or make any changes in the Registry.
      [o] Don't download and install new programs- except those I give you.
    Threads are closed after 5 days if there is no reply.
  3. chief472

    chief472 TS Rookie Topic Starter

  4. Bobbye

    Bobbye Helper on the Fringe Posts: 16,335   +36

    Sir, TechSpot hosts a lot of programs to download. That doesn't mean that all of them are appropriate to be used all of the time.

    The link you left for HJT was input Jan 6, 2005. There were times we did use 'attach' instead of paste. Some of the other forums in TechSpot may ask you to attach the log.

    In this forum, we are very clear in what we want you to run and how we want to view the logs. Our reason is because there may be many processes to be identified and it is not possible to meet the demands of the members if the helpers are the ones who have to copy and paste each entry. It also allows all of the logs to be viewable.

    I simply told you that we do not use HJT to screen for malware, not that we never use it.

    If you go to the link I left, you will find the links for the preliminary scans. If you leave the logs as instructed, I'll be glad to review them.
Topic Status:
Not open for further replies.

Similar Topics

Add New Comment

You need to be a member to leave a comment. Join thousands of tech enthusiasts and participate.
TechSpot Account You may also...