How to analyze hijackthis logs?

ASK THE COMMUNITY