Related blog content
Malwarebytes gets tougher on PUPs
PUP.Optional.WhiteClick is Malwarebytes’ detection name for a potentially unwanted program (PUP) that shows advertisements.
Users may see these warnings during install:
and see this entry in their list of installed Programs and Features:
PUP.Optional.WhiiteClick creates a search bar in the Windows taskbar.
PUP.Optional.WhiiteClick is usually installed as part of a bundle.
Malwarebytes protects users from PUP.Optional.WhiiteClick by using real-time protection.
Malwarebytes can detect and remove PUP.Optional.WhiiteClick without further user interaction.
A Malwarebytes log of removal will look similar to this:
Malwarebytes www.malwarebytes.com -Log Details- Scan Date: 7/10/18 Scan Time: 6:54 PM Log File: e13da69c-8461-11e8-bc63-00ffdcc6fdfc.json Administrator: Yes -Software Information- Version: 3.5.1.2522 Components Version: 1.0.374 Update Package Version: 1.0.5855 License: Premium -System Information- OS: Windows 7 Service Pack 1 CPU: x64 File System: NTFS User: {computername}\{username} -Scan Summary- Scan Type: Threat Scan Scan Initiated By: Manual Result: Completed Objects Scanned: 251293 Threats Detected: 65 Threats Quarantined: 65 Time Elapsed: 3 min, 30 sec -Scan Options- Memory: Enabled Startup: Enabled Filesystem: Enabled Archives: Enabled Rootkits: Enabled Heuristics: Enabled PUP: Detect PUM: Detect -Scan Details- Process: 0 (No malicious items detected) Module: 0 (No malicious items detected) Registry Key: 1 PUP.Optional.WhiteClick, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{D66F6F24-652D-4405-A0D3-C568F825FE66}, Quarantined, [5080], [538662],1.0.5855 Registry Value: 1 PUP.Optional.WhiteClick, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{D66F6F24-652D-4405-A0D3-C568F825FE66}|DISPLAYNAME, Quarantined, [5080], [538662],1.0.5855 Registry Data: 0 (No malicious items detected) Data Stream: 0 (No malicious items detected) Folder: 10 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\System Images, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Tabs\0, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Tabs\1, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Tabs\2, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Tabs\3, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Tabs\4, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Tabs\5, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Tabs, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\USERS\{username}\APPDATA\LOCAL\WHITECLICK, Quarantined, [5080], [538656],1.0.5855 File: 53 PUP.Optional.WhiteClick, C:\USERS\{username}\APPDATA\LOCAL\WHITECLICK\ACTIVE-SEARCH.ICO, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\afisha.mail.ru.png, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\ali.getoneclick.ru.png, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\auto.mail.ru.png, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\aw.my.com.png, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\bing.com.png, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\e.mail.ru.png, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\facebook.com.png, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\horo.mail.ru.png, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\instagram.com.png, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\linkedin.com.png, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\mail.ru.png, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\vk.com.png, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\warface.com.png, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\warface.ru.png, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\warthunder.com.png, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\warthunder.ru.png, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\worldoftanks.com.png, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\worldoftanks.ru.png, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\worldofwarships.com.png, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\worldofwarships.ru.png, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\wot.getoneclick.ru.png, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\wows.getoneclick.ru.png, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\wtr.getoneclick.ru.png, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\youtube.com.png, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\my.mail.ru.png, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\news.mail.ru.png, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\ok.ru.png, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\otvet.mail.ru.png, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\pogoda.mail.ru.png, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\rev.mail.ru.png, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\ru.aliexpress.com.png, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\sport.mail.ru.png, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\twitter.com.png, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\System Images\add_tab.png, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\System Images\loupe.png, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\System Images\question_mark.png, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\System Images\right-arrow.png, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Tabs\0\Settings.ini, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Tabs\1\Settings.ini, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Tabs\2\Settings.ini, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Tabs\3\Settings.ini, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Tabs\4\Settings.ini, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Tabs\5\Settings.ini, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\License.rtf, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Newtonsoft.Json.dll, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Start.exe, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\System.Net.Http.dll, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\WebClient.dll, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\WhiteClick.dll, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\WhiteClick.InstallState, Quarantined, [5080], [538656],1.0.5855 PUP.Optional.WhiteClick, C:\USERS\{username}\DESKTOP\WHITECLICK.EXE, Quarantined, [5080], [538670],1.0.5855 PUP.Optional.WhiteClick, C:\WINDOWS\INSTALLER\AFB537.MSI, Quarantined, [5080], [538669],1.0.5855 Physical Sector: 0 (No malicious items detected) WMI: 0 (No malicious items detected) (end)
Should users wish to keep this program and exclude it from being detected in future scans, they can add the program to the exclusions list. Here’s how to do it.
If you want to allow the program to connect to the Internet, for example to fetch updates, also add an exclusion of the type Allow an application to connect to the internet and use the Browse button to select the file you wish to grant access.
You may see these entries in FRST logs:
Startup: C:\Users\{username}\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Shortcut to Primary output from Start (Active).lnk [2018-07-10] ShortcutTarget: Shortcut to Primary output from Start (Active).lnk -> C:\Users\{username}\AppData\Roaming\Microsoft\Installer\{D66F6F24-652D-4405-A0D3-C568F825FE66}\_64A90423D4124B9A5633D3.exe () C:\Users\{username}\AppData\Local\WhiteClick WhiteClick (HKLM-x32\...\{D66F6F24-652D-4405-A0D3-C568F825FE66}) (Version: 1.0.2 - AITI LODZHYK, TOV)
Select your language