Download Hijack Hunter and install in your computer. Portable version of the tool is also available. So, if you don’t want to install, you can download the portable version. Now run the Scan. It will take few minutes and scan the various areas of your system.
In my case, it took around 10 minutes. And after the scan, it created a log file automatically. You can see the above screenshot to know what system areas it scanned to generate the log file. Log file opened automatically when scan finishes. I don’t think you may fine it easy to understand the log file. Because it is too complicated and contains technical information. You can also find the same log in the tool.
At the left side, you will find other tools. In the settings section, you will find various configuration settings on the tool.
Restorer is the most useful section of the tool. From this section, you can enable various system tools disabled by malware. Here you can enable:
- Restore Registry Editor
- Restore Task Manager
- Restore CMD
- Delete DisallowRun Key
- Restore SHOWALL
- Enable Window Firewall
- Enable show Hidden FIles
- Enable Show System Files
- Enable Require SignedAppInit_DLLS
- Enable Folder Options