Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

HijackThis 2.0.4 or 1.99.1 ? Is there a difference between the two versions?


  • Please log in to reply
6 replies to this topic

#1 QQR1

QQR1

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:11:31 AM

Posted 25 March 2014 - 07:11 PM

Hello!
 
Is there a difference between the two versions HijackThis 2.0.4 or 1.99.1 ? Studying tutorials for 2005 still serve to the latest version of HiijackThis or I'll look for a more recent tutorial 2012, 2013 and 2014?
 


BC AdBot (Login to Remove)

 


m

#2 1PW

1PW

  • Members
  • 316 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:North of the 38th parallel.
  • Local time:05:31 AM

Posted 25 March 2014 - 07:29 PM

Hello QQR1:

 

There is also a HijackThis 2.0.5 Beta from Trend Micro. There are incremental improvements in each new version.

 

However, many malware removal experts have turned to newer tools but HijackThis elements have found there way to the latest/greatest.

 

Lurk in the malware removal forums and you will soon see what the latest is.

 

HTH :)


All viruses are malware but not all malware are viruses and if the malware doesn't self replicate it just isn't a virus.


#3 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 50,603 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:08:31 AM

Posted 26 March 2014 - 07:50 AM

Trend Micro released HijackThis 2.00 BETA 03/11/07. That was followed by releases of v2.02 on 07/06/07, v2.03 BETA on 12/09/09 and v2.04 on 04/21/10 and v2.05 BETA on 02/15/11. On February 16, 2012, Trend Micro released the HijackThis source code as open source and it is now available on the SourceForge site.

HijackThis only scans certain areas of a computer's system/registry to help diagnose the presence of undetected malware in known hiding places. Given the sophistication of malware hiding techniques used by attackers in today's environment, HijackThis is limited in its ability to detect infection and generate a report outside these known hiding places. This limitation has made its usefulness nearly obsolete since a HijackThis log cannot reveal all the malware residing on a computer. As such, HijackThis has been replaced by other preferred tools like DDS, OTL and RSIT that provide comprehensive logs with specific details about more areas of a computer's system, files, folders and registry keys which may have been modified by malware infection.

Unless you know how to read and analyze logs from DDS, OTL or RSIT there's no point on downloading and using them. If those tools are needed for a malware infection you should seek assistance from an expert who will advise you accordingly.

Like HijackThis, these are powerful tools which rely on trained experts to interpret the log entries, determine what needs to be fixed and plan a strategy for disinfection. Using such tools requires advanced knowledge about the Windows Operating System and can cause system damage if used incorrectly. If you do not have advanced knowledge about computers or training in the use of these tools, you should NOT attempt to use them or fix anything without consulting a expert as to what to fix.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#4 QQR1

QQR1
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:11:31 AM

Posted 30 March 2014 - 06:46 AM

Hello QQR1:

 

There is also a HijackThis 2.0.5 Beta from Trend Micro. There are incremental improvements in each new version.

 

However, many malware removal experts have turned to newer tools but HijackThis elements have found there way to the latest/greatest.

 

Lurk in the malware removal forums and you will soon see what the latest is.

 

HTH :)

thank you very much

 

 

 

Trend Micro released HijackThis 2.00 BETA 03/11/07. That was followed by releases of v2.02 on 07/06/07, v2.03 BETA on 12/09/09 and v2.04 on 04/21/10 and v2.05 BETA on 02/15/11. On February 16, 2012, Trend Micro released the HijackThis source code as open source and it is now available on the SourceForge site.

HijackThis only scans certain areas of a computer's system/registry to help diagnose the presence of undetected malware in known hiding places. Given the sophistication of malware hiding techniques used by attackers in today's environment, HijackThis is limited in its ability to detect infection and generate a report outside these known hiding places. This limitation has made its usefulness nearly obsolete since a HijackThis log cannot reveal all the malware residing on a computer. As such, HijackThis has been replaced by other preferred tools like DDS, OTL and RSIT that provide comprehensive logs with specific details about more areas of a computer's system, files, folders and registry keys which may have been modified by malware infection.

Unless you know how to read and analyze logs from DDS, OTL or RSIT there's no point on downloading and using them. If those tools are needed for a malware infection you should seek assistance from an expert who will advise you accordingly.

Like HijackThis, these are powerful tools which rely on trained experts to interpret the log entries, determine what needs to be fixed and plan a strategy for disinfection. Using such tools requires advanced knowledge about the Windows Operating System and can cause system damage if used incorrectly. If you do not have advanced knowledge about computers or training in the use of these tools, you should NOT attempt to use them or fix anything without consulting a expert as to what to fix.

Thank you for the information. My goal is to explore ways to remove malware. I'm not infected. I want to learn more about the subject of malware, as it infects computers and removal processes. I study (I will) other (DDS, OTL and RSIT) tools also. Thank you! 
 
Thank you again!
 
---
 
sorry for bad english, I use google translator...

Edited by QQR1, 30 March 2014 - 06:49 AM.


#5 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 50,603 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:08:31 AM

Posted 30 March 2014 - 07:12 AM

If learning about malware removal techniques and how to use specialized fix tools like DDS, RSIT, OTL, ComboFix, GMER, etc is something you are interested in, please read BleepingComputer's Malware Removal Training Program.

The above link explains how to apply and what is required. If there are no slots available, you will have to keep checking back at a later time. We are swamped with such requests and there are not enough instructors able to provide teaching so that limits the number of trainees we can accept.

Due to the self-paced structure of training and limited number of instructors here at BC, it is impossible to say with any accuracy when slots will open. New slots are opened up as our existing trainees complete the lower levels of study and move up toward more advanced levels. This is to prevent our volunteer staff being overwhelmed by an influx of new trainees. There is no notification system in place for when slots open so you need to keeping checking back if BC Study Hall is the school you prefer to enroll in. The logistics and management of such a notification system and the fact we have a worldwide membership negate the potential effectiveness and fairness one would expect from it.

If you don't want to wait for an opening here at BleepingComputer's Malware Removal Training Program, please be aware that training in malware removal is conducted at various other online Unite Schools to include:
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#6 QQR1

QQR1
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:11:31 AM

Posted 30 March 2014 - 08:47 AM

quietman7,

 

Again thank you very much. I've read (I have read) the procedures to join the Training of malware program here the Bleeping Computer. And also read the links from other programs malware removal associated with UNITE training.



#7 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 50,603 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:08:31 AM

Posted 30 March 2014 - 08:54 AM

You're welcome and good luck.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users