Hi.  I'm a new member.  Is it OK to upload a Hijackthis log file for analysis?

Posted on 2010-08-19
Last Modified: 2012-05-10
Hi.  I'm a new member.  Is it OK to upload a Hijackthis log file for analysis?
Question by:markeightch
  • 3
  • 2

Expert Comment

ID: 33474455
Yes, go for it. I'm sure everyone will be more than willing to have a look at it and help where we can.

What is the problems you are experiencing ?

Author Comment

ID: 33476852
I'm trying to install Comodo Internet Security, the firewall & anti virus.  I used to have have the firewall only installed but when I went to upgrade I got an error.  I uninstalled the firewall and tried again, same error.  I turned on the Windows firewall and forgot about it.  Now I'm ready to tackle this.
I'm trying to install in normal mode and I get an error 1603: fatal error during installation.  I've tried to install in safe mode and when I do I get an error 1625: this installation is forbidden. . . .  I've done a little research and have tried the remedy where you go through the control panel, admin tools, software restriction policies, enforcement, and select all users except admins.  That didn't work.  I've tried the method where you edit the registry and ultimately get to the PolicyScope registry value to change that from 0 to 1; it was already on one.
I found your site where someone said this problem is either a permission issue or a malware issue.  I've tried the above two fixes and they don't work so I don't know what else I can do as far as permissions.
I've run Malwarebytes and Avira Antivir under regular mode; they didn't find anything.
I've run Hijackthis in the safe mode and saved the log.
I'm currently running Avira again in the safe mode (already ran Malwarebytes in the safe mode - didn't find anything) and when that's done, provided it doesn't find anything I was going to run Hijackthis in regular mode.  At that point I'd have the safe mode log and the regular mode log and was hoping to submit them in hopes someone could help me with whether I have a malware problem.  You can only imagine how much I appreciate the help.
LVL 22

Expert Comment

ID: 33477874
Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.


Expert Comment

ID: 33480443
I suspect you have some remnants of Comodo Firewall still sitting on your machine.

Comodo is one of the more difficult firewalls to remove from a computer. Usually going thru add/remove programs works but only after turning it off before the removal process starts. If you did not shut comodo down I would suggest to re-install to the same location you had it before then reboot the computer and then turn comodo off and then go thru the add/remove programs. Run CCleaner for good measure.

I suspect that after this you will be able to load Comodo Internet Security.


Accepted Solution

Nettron earned 50 total points
ID: 33480476
Have a look at the following thread that might give some insight into the clean removal process and possibly your problem.

Author Comment

ID: 33507413
Thanks so much for the suggestions.  I've done the recommended scans for malware and haven't turned up anything, so I'm going to follow the path of making sure I removed the Comodo firewall correctly.  That's got to be it.  It looks like it's going to take a bit of time to follow the instructions, so I can't get to it for a day or two, but I'll keep you posted.  Thanks again for the help.

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Transferring data across the virtual world became simpler but protecting it is becoming a real security challenge.  How to approach cyber security  in today's business world!
This story has been written with permission from the scammed victim, a valued client of mine – identity protected by request.
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…

861 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question