Jump to content

KatZund

Members
  • Content Count

    13
  • Joined

About KatZund

  • Rank
    New Member

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. You can mark this topic as solved. Got a tip to check cleartype font settings in w10 (cfg > fonts > turn on cleartype). That solved the problem. Thank you for your attention/help. kind regards, Kat
  2. @LiquidTension I had no issues with malwarebytes 3 latest version before I installed version 4. I will start with the info from Exile360 and will turn to #2 technical issues if needed. thank you, Kat ----- it can take a few days before I reply here because of personal situation.
  3. Hello, The font looks like on the picture. How can I adjust to a better looking font? thank you, Kat
  4. Greetings Exile360, I would have added the info you asked but I started with checking windows, added (video)driver updates, windows updates and allround checks (to see if there were any errors),reboots and after this everything I tested was working like intended. The capture scrolling page worked fine again too. Thank you for help but consider it solved now. ? /best regards, Kat
  5. I'm using Malwarebytes 3.6.1.2711 / 1.0.463 / 1.0.6983 and Faststone Capture 9.0 To reproduce my error: I found that FS Capture's 'capture scrolling window' is not working anymore. After disabling MWB 'web protection' it works fine again.
  6. Got something blocked by malwarebytes as riskware. I supect a false positive. Please investigate. My system is 100% clean. I'm using AirVPN and curl.exe is a file from airvpn's 'Eddie' cfg software. The IP that is blocked is 213.152.162.89 and it belongs to https://www.ip-tracker.org/locator/ip-lookup.php?ip=213.152.162.89 Thank you
  7. That could/should be it. Had no problems except the one I mentioned. All is well. Anyway thanks for attention/help. best regards and a safe/healthy 2018 Kat
  8. Hi, I've checked. Somehow strange because it was detected while running the program. Now I've let malwarebytes check c:\ and to be sure I tried again by narrowing to let it scan the appdata directory only. Nothing bad found. Ran the original Exif Remover (in c/program files x86) several times to see if I can get the ransomeware warning. Nothing. The file 'exiftool.exe' is still in the appdata/local/temp dir. I've had the warning one or two times before by running the software but had no time to check it out and write on the forum. Three malwarebytes files have internet access btw. thank you Kat ------- this pc runs win10x64,Eset Smart Security and Malwarebytes.
  9. I'm using Exif Remover 5.1 (from rlvision) for a long time and malwarebytes gives me a message that ransomware ('exiftool.exe' in c/users/name/appdata/local/temp) has been stopped. Hash 256: cd003e8957e75f43de4e9ca4ce965e80da73c1940663a39222ea63ef3bd35be2 https://www.virustotal.com/nl/file/cd003e8957e75f43de4e9ca4ce965e80da73c1940663a39222ea63ef3bd35be2/analysis/ /happy new year to y'all KatZ
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.