Solved

Hi.  I'm a new member.  Is it OK to upload a Hijackthis log file for analysis?

Posted on 2010-08-19
6
637 Views
Last Modified: 2012-05-10
Hi.  I'm a new member.  Is it OK to upload a Hijackthis log file for analysis?
0
Comment
Question by:markeightch
  • 3
  • 2
6 Comments
 
LVL 2

Expert Comment

by:Nettron
ID: 33474455
Yes, go for it. I'm sure everyone will be more than willing to have a look at it and help where we can.

What is the problems you are experiencing ?
0
 

Author Comment

by:markeightch
ID: 33476852
I'm trying to install Comodo Internet Security, the firewall & anti virus.  I used to have have the firewall only installed but when I went to upgrade I got an error.  I uninstalled the firewall and tried again, same error.  I turned on the Windows firewall and forgot about it.  Now I'm ready to tackle this.
I'm trying to install in normal mode and I get an error 1603: fatal error during installation.  I've tried to install in safe mode and when I do I get an error 1625: this installation is forbidden. . . .  I've done a little research and have tried the remedy where you go through the control panel, admin tools, software restriction policies, enforcement, and select all users except admins.  That didn't work.  I've tried the method where you edit the registry and ultimately get to the PolicyScope registry value to change that from 0 to 1; it was already on one.
I found your site where someone said this problem is either a permission issue or a malware issue.  I've tried the above two fixes and they don't work so I don't know what else I can do as far as permissions.
I've run Malwarebytes and Avira Antivir under regular mode; they didn't find anything.
I've run Hijackthis in the safe mode and saved the log.
I'm currently running Avira again in the safe mode (already ran Malwarebytes in the safe mode - didn't find anything) and when that's done, provided it doesn't find anything I was going to run Hijackthis in regular mode.  At that point I'd have the safe mode log and the regular mode log and was hoping to submit them in hopes someone could help me with whether I have a malware problem.  You can only imagine how much I appreciate the help.
0
 
LVL 22

Expert Comment

by:optoma
ID: 33477874
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 
LVL 2

Expert Comment

by:Nettron
ID: 33480443
I suspect you have some remnants of Comodo Firewall still sitting on your machine.

Comodo is one of the more difficult firewalls to remove from a computer. Usually going thru add/remove programs works but only after turning it off before the removal process starts. If you did not shut comodo down I would suggest to re-install to the same location you had it before then reboot the computer and then turn comodo off and then go thru the add/remove programs. Run CCleaner for good measure.

I suspect that after this you will be able to load Comodo Internet Security.




0
 
LVL 2

Accepted Solution

by:
Nettron earned 50 total points
ID: 33480476
Have a look at the following thread that might give some insight into the clean removal process and possibly your problem.

http://forums.comodo.com/firewall-help-cis/how-do-i-remove-all-traces-of-comodo-firewall-from-computer-t44720.0.html
0
 

Author Comment

by:markeightch
ID: 33507413
Thanks so much for the suggestions.  I've done the recommended scans for malware and haven't turned up anything, so I'm going to follow the path of making sure I removed the Comodo firewall correctly.  That's got to be it.  It looks like it's going to take a bit of time to follow the instructions, so I can't get to it for a day or two, but I'll keep you posted.  Thanks again for the help.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
In this video I am going to show you how to back up and restore Office 365 mailboxes using CodeTwo Backup for Office 365. Learn more about the tool used in this video here: http://www.codetwo.com/backup-for-office-365/ (http://www.codetwo.com/ba…
Internet Business Fax to Email Made Easy - With eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now