

HijackReader uses two lists to analyze the logfile. It should be clear from the description that it is necessary to analyze the ratings of the helper application as well before you remove any items.

If you would like fast results you could also use the software HijackReader which analyzes HijackThis logfiles in an attempt to rate items. Note: HiJackReader has not been updated since 2007 and should not be used anymore to analyze HiJackThis log files. There are actually several forums that can be used. Most users tend to post their logs in forums so that experienced users can take a look at them and recommend actions.

The program makes no distinction in regards to items in the list so that it is necessary to check item after item to find out about its nature. This log is hard to read for beginners because it contains "good" and "bad" elements in it and it requires knowledge of those items to make a distinction between elements that you have to keep and those that are indeed malicious or problematic in nature. The application checks lots of different elements like startup items, Browser Helper Objects, running processes and the like and presents a log of the results at the end.
