stapp

Global Moderator
  • Content Count

    3220
  • Joined

  • Last visited

  • Days Won

    54

Everything posted by stapp

  1. Win 10 1903 When exactly is Auto-Silent mode triggered? On my machine just now it was enabled/disable by me going into full screen (and then trying to get it back again!!!) I usually use Dark Mode but as you said some UI changes had been made, and I couldn't see any in dark mode I switched to Bright. I almost fell off my chair..that is really bright, have you changed that bit?
  2. It is recommended to upload a copy of the ransom note along with an encrypted file to ID Ransomware so that you can verify which ransomware you are dealing with: https://id-ransomware.malwarehunterteam.com/ You can paste a link to the results into a reply.
  3. Security researcher Troy Hunt has revealed that he is planning to sell his data breach service Have I Been Pwned (HIPB). https://www.troyhunt.com/project-svalbard-the-future-of-have-i-been-pwned/
  4. It is recommended to upload a copy of the ransom note along with an encrypted file to ID Ransomware so that you can verify which ransomware you are dealing with. https://id-ransomware.malwarehunterteam.com/ You can paste a link to the results into a reply so that one of our experts can review them.
  5. It is recommended to upload a copy of the ransom note along with an encrypted file to ID Ransomware so that you can verify which ransomware you are dealing with to this site here: https://id-ransomware.malwarehunterteam.com/ You can paste a link to the results into a reply so that one of our experts can review them.
  6. EAM doesn't work on XP or Vista now. System requirements are :- For Windows 7/8.1/10, 32 & 64 bit
  7. Follow the steps here https://support.emsisoft.com/topic/31280-gerosan-file-encrypted-please-help/?tab=comments#comment-193731
  8. It is recommended to upload a copy of the ransom note along with an encrypted file to ID Ransomware so that you can verify which ransomware you are dealing with to this site here: https://id-ransomware.malwarehunterteam.com/ You can paste a link to the results into a reply so that one of our experts can review them.
  9. Follow the instructions here https://support.emsisoft.com/topic/31280-gerosan-file-encrypted-please-help/?tab=comments#comment-193731
  10. ..and my next update just now replaces the file with another
  11. It comes the same time as EAM gets an update?
  12. I recommend uploading a copy of the ransom note along with an encrypted file to ID Ransomware so that you can verify which ransomware you are dealing with: https://id-ransomware.malwarehunterteam.com/ You can paste a link to the results into a reply so that they can be reviewed
  13. I recommend uploading a copy of the ransom note along with an encrypted file to ID Ransomware so that you can verify which ransomware you are dealing with: https://id-ransomware.malwarehunterteam.com/ You can paste a link to the results into a reply so that they can be reviewed
  14. Just pointing out to the experts that you have the same thread running here https://www.bleepingcomputer.com/forums/t/698808/new-ransomware-ive-never-heard/?hl=%2Bburan#entry4801969
  15. I recommend uploading a copy of the ransom note along with an encrypted file to ID Ransomware so that you can verify which ransomware you are dealing with: https://id-ransomware.malwarehunterteam.com/ You can paste a link to the results into a reply so that they can be reviewed
  16. I recommend uploading a copy of the ransom note along with an encrypted file to ID Ransomware so that you can verify which ransomware you are dealing with: https://id-ransomware.malwarehunterteam.com/ You can paste a link to the results into a reply so that they can be reviewed.
  17. Emsisoft Protection Platform cannot stop you going into safe mode. You should be able to access safe mode from the Automatic Repair Screen. Advanced Options > Troubleshoot > Advanced Options > Startup Settings > Restart and select either 4 or 5.
  18. Devs are aware Batman https://support.emsisoft.com/topic/31178-beta-9469/?tab=comments#comment-193231
  19. Upload a copy of the ransom note along with an encrypted file to ID Ransomware to verify which ransomware you are dealing with to this site here: https://id-ransomware.malwarehunterteam.com/ You can paste a link to the results into a reply so that one of our experts can review them.
  20. In all the years I have been sending debug logs I have always captured the event before zipping and sending the logs. I don't need anymore instructions on how to do it. I am finished with this thread now.
  21. I do not understand why you are telling me this. I have been right-clicking and selecting..send to compressed zip.. on in use debug files for years now. There is no need to copy them to another folder. The action of sending them to compressed zip from the context menu copies them.
  22. Upload a copy of the ransom note along with an encrypted file to ID Ransomware to verify which ransomware you are dealing with to this site here: https://id-ransomware.malwarehunterteam.com/ You can paste a link to the results into a reply so that one of our experts can review them.
  23. ? I got rid of all logs including debug logs to see if it still happened when debug logging was restarted... it did. All debug logs I deleted from ProgramData.
  24. I wanted to start with a clean slate so I got rid of everything (by the way the reset counters also gets rid of the 'malware objects detected'' number on the main gui)
  25. Jeremy I have send debug logs to the devs the same way for years.. and they are complete up to the time that I do it. As regards the context menu corruption , when I highlight the 3 logs and right-click the context menu appears and immediately disappears. I purged all logs via the gui (Settings.. Advanced.. Factory defaults.. Revert.. clear all logs and reset counters.) I also turned off debug logginging and deleted all logs inside ProgramData Emsi folder. After turning debug logging back on the same issue occurs with the in use debug logs. The a2service logs contain an access denied error which may have some relevance. It is a form of corruption of EAM debug logging just on this machine, so I doubt it will have a high priority.