Jump to content

What Chrome extensions are creating these Pups, Trovis, Conduits?


Recommended Posts

I keep quarantining them and they keep coming back... I'm thinking these might be legit files / directories created by some of the extensions I'm using BUT I cannot tell what extensions these files are related to... is there an easy way to find out? 

Malwarebytes
www.malwarebytes.com

-Log Details-
Scan Date: 2/11/22
Scan Time: 8:33 AM
Log File: f61e9316-8b4f-11ec-8963-14feb5ee2e33.json

-Software Information-
Version: 4.5.2.157
Components Version: 1.0.1562
Update Package Version: 1.0.50943
License: Premium

-System Information-
OS: Windows 10 (Build 19044.1526)
CPU: x64
File System: NTFS
User: System

-Scan Summary-
Scan Type: Threat Scan
Scan Initiated By: Scheduler
Result: Completed
Objects Scanned: 299592
Threats Detected: 11
Threats Quarantined: 0
Time Elapsed: 5 min, 3 sec

-Scan Options-
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Heuristics: Enabled
PUP: Detect
PUM: Detect

-Scan Details-
Process: 0
(No malicious items detected)

Module: 0
(No malicious items detected)

Registry Key: 0
(No malicious items detected)

Registry Value: 0
(No malicious items detected)

Registry Data: 0
(No malicious items detected)

Data Stream: 0
(No malicious items detected)

Folder: 2
PUP.Optional.Trovi, C:\USERS\SALIM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Sync Data\LevelDB, No Action By User, 487, 454808, , , , , , 
PUP.Optional.Conduit, C:\USERS\SALIM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Sync Data\LevelDB, No Action By User, 180, 454835, , , , , , 

File: 9
PUP.Optional.Trovi, C:\Users\salim\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000004.log, No Action By User, 487, 454808, , , , , A53F459D9575F7BE94BE4D655CAF0EE5, 0906BAEE622AB2C27311FC15EC586AED7BDEBD935B636889701692A9C2386281
PUP.Optional.Trovi, C:\Users\salim\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000005.ldb, No Action By User, 487, 454808, , , , , 693F63E3B105208A9613F9D0AE0D8DCD, 7EF53B5712236F5652F23E25E0DE5B97FB54C630D7F44F42B0B0F025530F3E74
PUP.Optional.Trovi, C:\Users\salim\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\CURRENT, No Action By User, 487, 454808, , , , , 46295CAC801E5D4857D09837238A6394, 0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
PUP.Optional.Trovi, C:\Users\salim\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOCK, No Action By User, 487, 454808, , , , , , 
PUP.Optional.Trovi, C:\Users\salim\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG, No Action By User, 487, 454808, , , , , 4D2CFD82E608E8B7BD0C771FC08EEA79, 9B81708A09FB0DD63AAF621CF906E5F13065F21DB0086C8CAF1AB53673B38A6E
PUP.Optional.Trovi, C:\Users\salim\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\MANIFEST-000001, No Action By User, 487, 454808, , , , , 482CB3B387FC2ACB86DC0AC0C82AD41F, 71DD39195A3AC0441F48C5882E060B367EDA696C18B080F87D4FE26F600DE377
PUP.Optional.Trovi, C:\USERS\SALIM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Preferences, No Action By User, 487, 454808, , , , , B7C9D5A20EFBBB33F704AFBA42A13CBD, EB10D44CD512C50BA50FA644420ECF955B7F095546098965C556A339B7F82E35
PUP.Optional.Trovi, C:\USERS\SALIM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Web Data, No Action By User, 487, 454808, 1.0.50943, , ame, , 849CFA06EBDD95890366B62888D0ECCA, 3B2A1221898C15EC2E9D488807D5D30B55B93734C7F0A7224AC887CBD2FFF1B9
PUP.Optional.Conduit, C:\USERS\SALIM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Web Data, No Action By User, 180, 454835, 1.0.50943, , ame, , 849CFA06EBDD95890366B62888D0ECCA, 3B2A1221898C15EC2E9D488807D5D30B55B93734C7F0A7224AC887CBD2FFF1B9

Physical Sector: 0
(No malicious items detected)

WMI: 0
(No malicious items detected)


(end)

 

20220211 mwb.txt

Link to post
Share on other sites

  • Staff

***This is an automated reply***

Hi,

Thanks for posting in the Malwarebytes for Windows Help forum.

If you are having technical issues with our Windows product, please do the following:

Malwarebytes Support Tool - Advanced Options

This feature is designed for the following reasons:

  • For use when you are on the forums and need to provide logs for assistance
  • For use when you don't need or want to create a ticket with Malwarebytes
  • For use when you want to perform local troubleshooting on your own

How to use the Advanced Options:

Spoiler
  1. Download Malwarebytes Support Tool
  2. Double-click mb-support-X.X.X.XXXX.exe to run the program
    • You may be prompted by User Account Control (UAC) to allow changes to be made to your computer. Click Yes to consent.
  3. Place a checkmark next to Accept License Agreement and click Next
  4. Navigate to the Advanced tab
  5. The Advanced menu page contains four categories:
    • Gather Logs: Collects troubleshooting information from the computer. As part of this process, Farbar Recovery Scan Tool (FRST) is run to perform a complete diagnosis. The information is saved to a file on the Desktop named mbst-grab-results.zip and can be added as an email attachment or uploaded to a forum post to assist with troubleshooting the issue at hand.
    • Clean: Performs an automated uninstallation of all Malwarebytes products installed to the computer and prompts to install the latest version of Malwarebytes for Windows afterwards. The Premium license key is backed up and reinstated. All user configurations and other data are removed. This process requires a reboot.
    •  Repair System: Includes various system-related repairs in case a Windows service is not functioning correctly that Malwarebytes for Windows is dependent on. It is not recommended to use any Repair System options unless instructed by a Malwarebytes Support agent.
    • Anonymously help the community by providing usage and threat statistics: Unchecking this option will prevent Malwarebytes Support Tool from sending anonymous telemetry data on usage of the program.
  6. To provide logs for review click the Gather Logs button
  7. Upon completion, click OK
  8. A file named mbst-grab-results.zip will be saved to your Desktop
  9. Please attach the file in your next reply.
  10. To uninstall all Malwarebytes Products, click the Clean button.
  11. Click the Yes button to proceed. 
  12. Save all your work and click OK when you are ready to reboot.
  13. After the reboot, you will have the option to re-install the latest version of Malwarebytes for Windows.
  14. Select Yes to install Malwarebytes.
  15. Malwarebytes for Windows will open once the installation completes successfully.

Screenshots:

Spoiler
 
 
 
 
Spoiler

 

 

01.png

02.png

03.png

04.png

05.png

06.png

 

 

If you are having licensing issues, please do the following: 

Spoiler

For any of these issues:

  • Renewals
  • Refunds (including double billing)
  • Cancellations
  • Update Billing Info
  • Multiple Transactions
  • Consumer Purchases
  • Transaction Receipt

Please contact our support team at https://support.malwarebytes.com/hc/en-us/requests/new to get help

If you need help looking up your license details, please head here: Find my premium license key

 

 

Thanks in advance for your patience.

-The Malwarebytes Forum Team

Link to post
Share on other sites

well... i already know that some extension is causing these... 

What I really want to do is find out what extensions are causing these... because if I want those extensions, then I may want to then just ignore these pups, right?

I just want to know where they're coming from...

Is there not some kind of fingerprint db to match these pups with possible extensions names? 

  • Confused 1
Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.