PUP.Optional.WhiteClick

Short bio

PUP.Optional.WhiteClick is Malwarebytes’ detection name for a potentially unwanted program (PUP) that shows advertisements.

Symptoms

Users may see these warnings during install:

Whiteclick install

Whiteclick install

Whiteclick install

and see this entry in their list of installed Programs and Features:

PUP.Optional.WhiiteClick installed

Source and type of infection

PUP.Optional.WhiiteClick creates a search bar in the Windows taskbar.
PUP.Optional.WhiiteClick is usually installed as part of a bundle.

WhiteClick search bar

WhiteClick search bar

Protection

Malwarebytes protects users from PUP.Optional.WhiiteClick by using real-time protection.

block PUP.Optional.WhiiteClick

Malwarebytes blocks PUP.Optional.WhiiteClick

Remediation

Malwarebytes can detect and remove PUP.Optional.WhiiteClick without further user interaction.

  1. Please download Malwarebytes to your desktop.
  2. Double-click mb3-setup-consumer-{version}.exe and follow the prompts to install the program.
  3. Then click Finish.
  4. Once the program has fully updated, select Scan Now on the Dashboard. Or select the Threat Scan from the Scan menu.
  5. If another update of the definitions is available, it will be implemented before the rest of the scanning procedure.
  6. When the scan is complete, make sure that all Threats are selected, and click Remove Selected.
  7. Restart your computer when prompted to do so.

Malwarebytes removal log

A Malwarebytes log of removal will look similar to this:

Malwarebytes
www.malwarebytes.com

-Log Details-
Scan Date: 7/10/18
Scan Time: 6:54 PM
Log File: e13da69c-8461-11e8-bc63-00ffdcc6fdfc.json
Administrator: Yes

-Software Information-
Version: 3.5.1.2522
Components Version: 1.0.374
Update Package Version: 1.0.5855
License: Premium

-System Information-
OS: Windows 7 Service Pack 1
CPU: x64
File System: NTFS
User: {computername}\{username}

-Scan Summary-
Scan Type: Threat Scan
Scan Initiated By: Manual
Result: Completed
Objects Scanned: 251293
Threats Detected: 65
Threats Quarantined: 65
Time Elapsed: 3 min, 30 sec

-Scan Options-
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Enabled
Heuristics: Enabled
PUP: Detect
PUM: Detect

-Scan Details-
Process: 0
(No malicious items detected)

Module: 0
(No malicious items detected)

Registry Key: 1
PUP.Optional.WhiteClick, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{D66F6F24-652D-4405-A0D3-C568F825FE66}, Quarantined, [5080], [538662],1.0.5855

Registry Value: 1
PUP.Optional.WhiteClick, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{D66F6F24-652D-4405-A0D3-C568F825FE66}|DISPLAYNAME, Quarantined, [5080], [538662],1.0.5855

Registry Data: 0
(No malicious items detected)

Data Stream: 0
(No malicious items detected)

Folder: 10
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\System Images, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Tabs\0, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Tabs\1, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Tabs\2, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Tabs\3, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Tabs\4, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Tabs\5, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Tabs, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\USERS\{username}\APPDATA\LOCAL\WHITECLICK, Quarantined, [5080], [538656],1.0.5855

File: 53
PUP.Optional.WhiteClick, C:\USERS\{username}\APPDATA\LOCAL\WHITECLICK\ACTIVE-SEARCH.ICO, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\afisha.mail.ru.png, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\ali.getoneclick.ru.png, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\auto.mail.ru.png, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\aw.my.com.png, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\bing.com.png, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\e.mail.ru.png, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\facebook.com.png, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\horo.mail.ru.png, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\instagram.com.png, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\linkedin.com.png, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\mail.ru.png, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\vk.com.png, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\warface.com.png, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\warface.ru.png, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\warthunder.com.png, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\warthunder.ru.png, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\worldoftanks.com.png, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\worldoftanks.ru.png, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\worldofwarships.com.png, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\worldofwarships.ru.png, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\wot.getoneclick.ru.png, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\wows.getoneclick.ru.png, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\wtr.getoneclick.ru.png, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\youtube.com.png, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\my.mail.ru.png, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\news.mail.ru.png, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\ok.ru.png, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\otvet.mail.ru.png, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\pogoda.mail.ru.png, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\rev.mail.ru.png, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\ru.aliexpress.com.png, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\sport.mail.ru.png, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Images\twitter.com.png, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\System Images\add_tab.png, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\System Images\loupe.png, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\System Images\question_mark.png, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\System Images\right-arrow.png, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Tabs\0\Settings.ini, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Tabs\1\Settings.ini, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Tabs\2\Settings.ini, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Tabs\3\Settings.ini, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Tabs\4\Settings.ini, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Tabs\5\Settings.ini, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\License.rtf, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Newtonsoft.Json.dll, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\Start.exe, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\System.Net.Http.dll, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\WebClient.dll, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\WhiteClick.dll, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\Users\{username}\AppData\Local\WhiteClick\WhiteClick.InstallState, Quarantined, [5080], [538656],1.0.5855
PUP.Optional.WhiteClick, C:\USERS\{username}\DESKTOP\WHITECLICK.EXE, Quarantined, [5080], [538670],1.0.5855
PUP.Optional.WhiteClick, C:\WINDOWS\INSTALLER\AFB537.MSI, Quarantined, [5080], [538669],1.0.5855

Physical Sector: 0
(No malicious items detected)

WMI: 0
(No malicious items detected)


(end)

Add an exclusion

Should users wish to keep this program and exclude it from being detected in future scans, they can add the program to the exclusions list. Here’s how to do it.

The Exclusions tab includes a list of items to be excluded from scans. The items may include files, folders, websites, or applications that connect to the Internet, as well as previously detected exploits.

To access the exclusions in Malwarebytes:

  • Click on the Settings tab in the left pane.
  • Click on the Exclusions tab.
  • Click the Add Exclusion button.
  • Select the exclusion type Exclude a File or Folder and use the Browse button to select the main folder for the software that you wish to keep.
  • Repeat this for any secondary folder(s) that belong to the software.
  • If you want to allow the program to connect to the Internet, for example to fetch updates, add an exclusion of the type Exclude an application that Connects to the Internet and use the Browse button to select the file you wish to grant access.

Traces/IOCs

You may see these entries in FRST logs:

Startup: C:\Users\{username}\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Shortcut to Primary output from Start (Active).lnk [2018-07-10]
ShortcutTarget: Shortcut to Primary output from Start (Active).lnk -> C:\Users\{username}\AppData\Roaming\Microsoft\Installer\{D66F6F24-652D-4405-A0D3-C568F825FE66}\_64A90423D4124B9A5633D3.exe ()
C:\Users\{username}\AppData\Local\WhiteClick

WhiteClick (HKLM-x32\...\{D66F6F24-652D-4405-A0D3-C568F825FE66}) (Version: 1.0.2 - AITI LODZHYK, TOV)

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language