Jump to content


  • Content Count

  • Joined

Posts posted by Fatdcuk

  1. Hi Mam

    Malwarebytes has just updated to include detection for the extension you have reported.

    Either a threat scan with the latest database update will remove it.

    Or in the FireFox's MenuBar goto tools tab and then select addons then Extensions.

    Most Firefox extensions whether good/bad can be removed via the addon Extension menu manually.




  2. Hi Pkshadow

    Just to confirm that dsengine.js and dsengine.cfg are not false positive detections.

    Because the files are overriding any changes to default search engine selection in the Firefox browser UI then they are considered as potentially unwanted.


    RE Lavasoft Web Companion detection by Adware Cleaner then I believe this is an intentional detection by them.

    However if you require further clarification then please start a new topic in the following sub forum and the guys that work on it will be able to respond.


    Since your initial report has been responded too i am now going to lock this topic as concluded.





  3. 1 hour ago, nitrousable said:

    You misunderstood me. I have copied the infected Web Data file to my desktop. I ran a scan on it - it was detected.

    Then I removed the offending search engine in Chrome - the copied file on desktop is no longer detected.

    If I were to replace the clean file with infected file, the copy of the infected file would be detected again. 

    Hi its not a bug but by design :)

    Detection technical data removed.

  4. 5 minutes ago, David-B said:

    Thank you for the clarification. What is Malwarebytes deleting? From looking at the results of my scan, the issue is not with extensions or the remains of a malicious extension I had installed. Rather, it seems that the data that is being delete relates to cookies stored for websites or something of that nature.


    We rolled out fixing for startup URL, newtab, homebutton and search engines with multi profile support for all fixing.

    In all theories we should not be targeting chrome cookie data but some of the settings do get backed up to WebData file.

  5. 1 hour ago, David-B said:

    Well assuming that it is a false positive, and I believe it is, this is on Malwarebytes' end unless Google is distributing malware with Chrome.


    These are not f/p detections but we introduced new chrome fixing 2 days ago.

    Chrome is not distributing malware/PUP's intentionally but its Sync service when used will save many Chrome settings/extensions/search engines that can potentially include any bad ones if you may have onboard at the time of setting up the sync service or any installed along the way with sync service active.

    It is a great feature to be able to transfer your profile across multiple devices but it cant differentiate between good or bad stuff when syncing data..

    The current issues with repeat detections are being caused by Chrome sync service restoring bad data that we are attempting to remove.

    We are at the moment working towards a fix to the sync service issue and apologise for any alarm or inconvenience caused.

    As as interim work around to stop the detection(s) then staying signed out of sync service will stop bad data being rewritten or alternatively you can temporarily set exclusions in malwarebytes for the file(s) where the detection(s) are being made.


    For example but your pathway for the files will be listed in a Malwarebytes scan log where the detections are made.

    C:\Users\%YOURUSERACCOUNT%\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences
    C:\Users\%YOURUSERACCOUNT%\AppData\Local\Google\Chrome\User Data\Default\Web Cache




Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.