What is the "hijackthis.exe" ?
Our database contains 32 different files for filename hijackthis.exe . You can also check most distributed file variants with name hijackthis.exe. This files most often belongs to product HijackThis. and were most often developed by company Trend Micro Inc.. This files most often have description HijackThis. Agregate rating is 5(5) stars - based on 6 reviews.This is executable file. You can find it running in Task Manager as the process hijackthis.exe.
This file is the main executable for the HijackThis utility from Trend Micro Inc. HijackThis is a free tool that quickly scans your computer to find settings that may have been changed by spyware, malware or any other unwanted programs. The tool creates a report or log file with the results of the scan. This tool is mainly used for the Trend Micro community help, the log output from it is used for anlysis of the professionals when help is needed. Check more on this article : "Generating Trend Micro HijackThis logs for malware analysis" : http://esupport.trendmicro.com/solution/en-us/1037994.aspx?name=How%20to%20generate%20Trend%20Micro%20HijackThis%20logs%20for%20malware%20analysis
File details of most used file with name "hijackthis.exe"
- Product:
- HijackThis
- Company:
- Trend Micro Inc.
- Description:
- HijackThis
- Version:
- 2.00.0004
- MD5:
- 9a2347903d6edb84c10f288bc0578c1c
- SHA1:
- ae96a47e781ed600704b0b040f6b5c8a92ac5e51
- SHA256:
- 5dca5dad7a63810dacee7f38c098a7b2d68617bf8175f05147e44d19dfa57a04
- Size:
- 388608
- Directory:
- %SystemDiskRoot%\Users\NAPSTER\Downloads
- Operating System:
- Windows 7
- Occurence:
- Medium
Is the Process "hijackthis.exe" Safe or Threat ?
User Reviews of the "hijackthis.exe"
Reviews for all files with name "hijackthis.exe"
-
SAFErating from user MikeOne for file %DESKTOP%\údržba\hijackthis.exe (Variant: 19687661)
This file is the main executable for the HijackThis utility from Trend Micro Inc. HijackThis is a free tool that quickly scans your computer to find settings that may have been changed by spyware, malware or any other unwanted programs. The tool creates a report or log file with the results of the scan. This tool is mainly used for the Trend Micro community help, the log output from it is used for anlysis of the professionals when help is needed. Check more on this article : "Generating Trend Micro HijackThis logs for malware analysis" : http://esupport.trendmicro.com/solution/en-us/1037994.aspx?name=How%20to%20generate%20Trend%20Micro%20HijackThis%20logs%20for%20malware%20analysis