Hijack Hunter
|
Inspect your computer and generate detailed report to detect suspicious system behaviors. Hijack Hunter is designed to scan your entire system and generate a detailed report that can be used by experienced users to detect harmful viruses and other pests affecting Microsoft Windows.
To help the users to detect suspicious system behaviors, our product shows all the needed information in a report file, taking care of all details, on running processes, registry startups keys, drivers installed, windows hijacks, browser helper objects and much more.
It is possible for the users to list files in custom folders and to dump the registry data from custom registry keys and values.
We have included also some features that can list all the executable files that are in suspicious folders commonly used by malware. The program displays also hidden files in suspicious folders, executable files in Temp Folder and system parameters that are commonly hijacked by recent malware and spyware.
Key Features:
1. Generic System Information
2. Running Processes
3. Loaded Modules
4. TCP Connections
5. Registry Startups
6. Startup Folders
7. TCPIP Nameservers
8. Internet Explorer Settings
9. Programs allowed in Windows Firewall
10. Ports allowed in Windows Firewall
11. Windows Hijacks
12. Winlogon Notify
13. ShellExecuteHooks
14. SharedTaskScheduler
15. Shell Open Commands
16. Browser Helper Objects (BHOs)
17. Wallpaper
18. Executables in Temp folder
19. Executables in suspicious folders
20. Files created 7, 15 and 30 days ago
21. Hidden files in suspicious folders
22. Executables in Internet Explorer Folder
23. Drivers -> FSFilter Anti-Virus
24. Drivers
25. Services
26. Custom files listing
27. Custom Registry Keys and Values Dump
28. Exclude Microsoft System Files
29. Multilingual
30. HOSTS File Manager
31. Windows Tools
32. CLSID List
33. Restorer
34. Restore Safe Mode
35. Restore System Hijacks
36. Restore Startup Hijacks
37. Restore IE URLs
38. Restore IE Hijacks
39. Reduce memory usage
40. Exclusion List
41. Startup files manager
42. Boot Files manager
43. Work in background
44. Kernel Mode Info
The license of this software is Freeware, you can free download and free use this trojan remover software.