Hi.  I'm a new member.  Is it OK to upload a Hijackthis log file for analysis?

Posted on 2010-08-19
Last Modified: 2012-05-10
Hi.  I'm a new member.  Is it OK to upload a Hijackthis log file for analysis?
Question by:markeightch
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2

Expert Comment

ID: 33474455
Yes, go for it. I'm sure everyone will be more than willing to have a look at it and help where we can.

What is the problems you are experiencing ?

Author Comment

ID: 33476852
I'm trying to install Comodo Internet Security, the firewall & anti virus.  I used to have have the firewall only installed but when I went to upgrade I got an error.  I uninstalled the firewall and tried again, same error.  I turned on the Windows firewall and forgot about it.  Now I'm ready to tackle this.
I'm trying to install in normal mode and I get an error 1603: fatal error during installation.  I've tried to install in safe mode and when I do I get an error 1625: this installation is forbidden. . . .  I've done a little research and have tried the remedy where you go through the control panel, admin tools, software restriction policies, enforcement, and select all users except admins.  That didn't work.  I've tried the method where you edit the registry and ultimately get to the PolicyScope registry value to change that from 0 to 1; it was already on one.
I found your site where someone said this problem is either a permission issue or a malware issue.  I've tried the above two fixes and they don't work so I don't know what else I can do as far as permissions.
I've run Malwarebytes and Avira Antivir under regular mode; they didn't find anything.
I've run Hijackthis in the safe mode and saved the log.
I'm currently running Avira again in the safe mode (already ran Malwarebytes in the safe mode - didn't find anything) and when that's done, provided it doesn't find anything I was going to run Hijackthis in regular mode.  At that point I'd have the safe mode log and the regular mode log and was hoping to submit them in hopes someone could help me with whether I have a malware problem.  You can only imagine how much I appreciate the help.
LVL 22

Expert Comment

ID: 33477874
What, When and Where - Security Threats from Q1

Join Corey Nachreiner, CTO, and Marc Laliberte, Information Security Threat Analyst, on July 26th as they explore their key findings from the first quarter of 2017.


Expert Comment

ID: 33480443
I suspect you have some remnants of Comodo Firewall still sitting on your machine.

Comodo is one of the more difficult firewalls to remove from a computer. Usually going thru add/remove programs works but only after turning it off before the removal process starts. If you did not shut comodo down I would suggest to re-install to the same location you had it before then reboot the computer and then turn comodo off and then go thru the add/remove programs. Run CCleaner for good measure.

I suspect that after this you will be able to load Comodo Internet Security.


Accepted Solution

Nettron earned 50 total points
ID: 33480476
Have a look at the following thread that might give some insight into the clean removal process and possibly your problem.

Author Comment

ID: 33507413
Thanks so much for the suggestions.  I've done the recommended scans for malware and haven't turned up anything, so I'm going to follow the path of making sure I removed the Comodo firewall correctly.  That's got to be it.  It looks like it's going to take a bit of time to follow the instructions, so I can't get to it for a day or two, but I'll keep you posted.  Thanks again for the help.

Featured Post


Modern healthcare requires a modern cloud. View this brief video to understand how the Concerto Cloud for Healthcare can help your organization.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ransomware continues to be a growing problem for both personal and business users alike and Antivirus companies are still struggling to find a reliable way to protect you from this dangerous threat.
One of the biggest threats facing all high-value targets are APT's.  These threats include sophisticated tactics that "often starts with mapping human organization and collecting intelligence on employees, who are nowadays a weaker link than network…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
In this video you will find out how to export Office 365 mailboxes using the built in eDiscovery tool. Bear in mind that although this method might be useful in some cases, using PST files as Office 365 backup is troublesome in a long run (more on t…

624 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question