stapp

Global Moderator
  • Content Count

    3063
  • Joined

  • Last visited

  • Days Won

    52

Everything posted by stapp

  1. Security researcher Troy Hunt has revealed that he is planning to sell his data breach service Have I Been Pwned (HIPB). https://www.troyhunt.com/project-svalbard-the-future-of-have-i-been-pwned/
  2. It is recommended to upload a copy of the ransom note along with an encrypted file to ID Ransomware so that you can verify which ransomware you are dealing with. https://id-ransomware.malwarehunterteam.com/ You can paste a link to the results into a reply so that one of our experts can review them.
  3. It is recommended to upload a copy of the ransom note along with an encrypted file to ID Ransomware so that you can verify which ransomware you are dealing with to this site here: https://id-ransomware.malwarehunterteam.com/ You can paste a link to the results into a reply so that one of our experts can review them.
  4. EAM doesn't work on XP or Vista now. System requirements are :- For Windows 7/8.1/10, 32 & 64 bit
  5. Follow the steps here https://support.emsisoft.com/topic/31280-gerosan-file-encrypted-please-help/?tab=comments#comment-193731
  6. It is recommended to upload a copy of the ransom note along with an encrypted file to ID Ransomware so that you can verify which ransomware you are dealing with to this site here: https://id-ransomware.malwarehunterteam.com/ You can paste a link to the results into a reply so that one of our experts can review them.
  7. Follow the instructions here https://support.emsisoft.com/topic/31280-gerosan-file-encrypted-please-help/?tab=comments#comment-193731
  8. ..and my next update just now replaces the file with another
  9. It comes the same time as EAM gets an update?
  10. I recommend uploading a copy of the ransom note along with an encrypted file to ID Ransomware so that you can verify which ransomware you are dealing with: https://id-ransomware.malwarehunterteam.com/ You can paste a link to the results into a reply so that they can be reviewed
  11. I recommend uploading a copy of the ransom note along with an encrypted file to ID Ransomware so that you can verify which ransomware you are dealing with: https://id-ransomware.malwarehunterteam.com/ You can paste a link to the results into a reply so that they can be reviewed
  12. Just pointing out to the experts that you have the same thread running here https://www.bleepingcomputer.com/forums/t/698808/new-ransomware-ive-never-heard/?hl=%2Bburan#entry4801969
  13. I recommend uploading a copy of the ransom note along with an encrypted file to ID Ransomware so that you can verify which ransomware you are dealing with: https://id-ransomware.malwarehunterteam.com/ You can paste a link to the results into a reply so that they can be reviewed
  14. I recommend uploading a copy of the ransom note along with an encrypted file to ID Ransomware so that you can verify which ransomware you are dealing with: https://id-ransomware.malwarehunterteam.com/ You can paste a link to the results into a reply so that they can be reviewed.
  15. Emsisoft Protection Platform cannot stop you going into safe mode. You should be able to access safe mode from the Automatic Repair Screen. Advanced Options > Troubleshoot > Advanced Options > Startup Settings > Restart and select either 4 or 5.
  16. Devs are aware Batman https://support.emsisoft.com/topic/31178-beta-9469/?tab=comments#comment-193231
  17. Upload a copy of the ransom note along with an encrypted file to ID Ransomware to verify which ransomware you are dealing with to this site here: https://id-ransomware.malwarehunterteam.com/ You can paste a link to the results into a reply so that one of our experts can review them.
  18. In all the years I have been sending debug logs I have always captured the event before zipping and sending the logs. I don't need anymore instructions on how to do it. I am finished with this thread now.
  19. I do not understand why you are telling me this. I have been right-clicking and selecting..send to compressed zip.. on in use debug files for years now. There is no need to copy them to another folder. The action of sending them to compressed zip from the context menu copies them.
  20. Upload a copy of the ransom note along with an encrypted file to ID Ransomware to verify which ransomware you are dealing with to this site here: https://id-ransomware.malwarehunterteam.com/ You can paste a link to the results into a reply so that one of our experts can review them.
  21. ? I got rid of all logs including debug logs to see if it still happened when debug logging was restarted... it did. All debug logs I deleted from ProgramData.
  22. I wanted to start with a clean slate so I got rid of everything (by the way the reset counters also gets rid of the 'malware objects detected'' number on the main gui)
  23. Jeremy I have send debug logs to the devs the same way for years.. and they are complete up to the time that I do it. As regards the context menu corruption , when I highlight the 3 logs and right-click the context menu appears and immediately disappears. I purged all logs via the gui (Settings.. Advanced.. Factory defaults.. Revert.. clear all logs and reset counters.) I also turned off debug logginging and deleted all logs inside ProgramData Emsi folder. After turning debug logging back on the same issue occurs with the in use debug logs. The a2service logs contain an access denied error which may have some relevance. It is a form of corruption of EAM debug logging just on this machine, so I doubt it will have a high priority.
  24. I guess my logs about it weren't of any interest either
  25. As there has been no comment from devs on how this context menu corruption of EAM debug logs may have occurred, I guess I'll just forget it for now.