What is this?

C

contender

Guest
Ive only seen this lately... Kerio has been detecting it when I run IE.

c:\WINDOWS\system32\mostat.exe

What is mostat?
 
Description

An IE browser helper object that detects visits to known sites and redirects them through a third-party server in order to take the affiliate fees. WurldMedia even steals the fees from other webmasters when you use their own links.
Variants

WurldMedia/bpboh: first variant released with early Preview Releases. You have this variant if there is a file called "bpboh.dll" in your Windows directory. Presumbly the name should have been 'bpbho' (Buyers' Port Browser Helper Object), but someone made a typo. There will also be a 'rdxrNNNN.de' file containing an encoded target list. (NNNN is some numbers, looks like a date.)

WurldMedia/mbho: installs 'mbho.dll' and the 'rdxr' data file in the System directory instead of the Windows directory. Installer is not so stealthy and includes an option to prompt the user before redirecting a merchant site. However, if "enable" (the default option) is chosen on any of these prompts, it will be silent again forever.

WurldMedia/MSCStat: in this variant you get an 'MSCStat.exe' system tray program in the System directory, with an 'msc(numbers).de' file and 'ad(numbers).de.xml' as well as the files from the mbho variant. WurldMedia/MSCStat2: the MSCStat.exe file is renamed MSCStat2, and there is finally an entry in Add/Remove Programs, which disables the software (though it leaves behind the files and some registry entries).

WurldMedia/MShop, WurldMedia/MPohs and WurldMedia/MDef have new IDs and filenames: m030106shop.dll, m030206pohs.dll and mdefshop.dll, respectively.

WurldMedia/Mo and WurldMedia/Moaa. The BHO is renamed mo030414s.dll or moaa030425s.dll and has new ID; the mscstat process is renamed mostat.exe and there is a configuration program called moconfig.exe.

WurldMedia/TChk is bundled with the Mo and Moaa variants. It checks for the existance of the WurldMedia BHO, and, if it finds it missing, contacts its controlling server xnef.com. At the time of writing this server is not responding, but it is suspected that if it were working it would direct TChk to reinstall the software. WurldMedia/TChk tries to escape detection by using a completely random filename and ID.
Also known as

Morpheus Shopping Club, WURLD Shopping Community, BuyersPort.
Distribution

Bundled with Morpheus.
What it does
Advertising

No.
Privacy violation

Yes. WurldMedia will be informed of visits to any of their targeted sites with referring site information and user-tracking through a unique ID built into the software.
Security issues

Yes, for MSCStat and later. These versions can connect to its controlling servers when IE is first run to download a new version of themselves, allowing arbitrary code to be executed.
Stability problems

The redirect mechanism used by this software breaks the web browser's 'back' button in some variants.
Removal

Later variants of WurldMedia add a "Shopping Community" entry to the Control Panel's Add/Remove Programs option, which should remove the software. (Though it will try quite hard to persuade you not to.)

Spybot S&D can detect and remove variants up to WurldMedia/MDef. Ad-Aware can detect and remove variants up to WurldMedia/MShop.
Manual removal
TChk variant

If you have WurldMedia/TChk, you must remove it before trying to remove any other variant you have. To do this you will have to open the registry (click 'Start', choose 'Run', enter 'regedit') and open the key HKEY_CLASSES_ROOT\Tchk.TChkBHO\CLSID. On the right, the '(Default)' value should hold a class ID, a long string of hexadecimal digits in groups separated with dashes. Note down this ID then delete the entire Tchk.TChkBHO key, as well as Tchk.TChkBHO.1.

Open the key HKEY_CLASSES_ROOT\CLSID and find the subkey with the same name as the class ID you noted. Click the 'InprocServer32' subkey and note down the filename given in the '(Default)' entry. Then delete the key with the class ID for its name. Also delete the entry of the same name from the key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects.

When you next restart the machine, you should be able to delete the file with the name you noted down.
Other variants

Before you can delete the DLL, you will need to deregister it. Open a DOS command prompt window (from Start->Programs->Accessories) and enter (for the bpboh variant):

cd "%WinDir%\System"
regsvr32 /u ..\bpboh.dll

Or, for Mbho, MSCStat or MSCStat2 variants:

cd "%WinDir%\System"
regsvr32 /u mbho.dll

Or, for the MShop variant:

cd "%WinDir%\System"
regsvr32 /u m030106shop.dll

Or, for the MPohs variant:

cd "%WinDir%\System"
regsvr32 /u m030206pohs.dll

Or, for the MDef variant:

cd "%WinDir%\System"
regsvr32 /u mdefshop.dll

Or, for the Mo variant:

cd "%WinDir%\System"
regsvr32 /u mo030414s.dll

Or, for the Moaa variant:

cd "%WinDir%\System"
regsvr32 /u moaa030425s.dll

After restarting the computer, you should be able to delete the DLL from the System folder (inside the Windows folder, called 'System32' under Windows NT/2000/XP or 'System' under Windows 95/98/Me). In the Bpboh variant it is in the Windows folder instead.

In the Bpboh, Mbho, MSCStat and MSCStat2 variants, you can also delete the 'rdxrNNNNNN' file in the same directory (the extension will be '.dat' for the bpboh variant, or '.de' for the other variants; NNNNNN is a date-like six-digit number).

If you have the MSCStat variant you should delete 'MSCStat.exe', 'adNNNNNN.de.xml' and 'mscNNNNNN.de'. If you have MSCStat2 or later variants, you can remove 'MSCStat2.exe'.

In you have Mo or Moaa variants, you should delete 'mostat.exe', 'moconfig.exe' and 'moz02NNNNNN.de'.

Finally, there is also a key called 'morp' (Mo, Moaa variants) or 'rdxr' (older variants) in the registry key HKEY_LOCAL_MACHINE\Software in the registry which you can delete to clean up if you like.

From > http://www.doxdesk.com/parasite/WurldMedia.html
 
Do you recommend a good trojan scanner that will detect this?
 
Read his post m8, it shows you how to delete it ;)
 
Yup, either follow the manual removal instructions or get one of these apps ..
"Spybot S&D can detect and remove variants up to WurldMedia/MDef. Ad-Aware can detect and remove variants up to WurldMedia/MShop."
 

Members online

No members online now.

Latest profile posts

Also Hi EP and people. I found this place again while looking through a oooollllllldddd backup. I have filled over 10TB and was looking at my collection of antiques. Any bids on the 500Mhz Win 95 fix?
Any of the SP crew still out there?
Xie wrote on Electronic Punk's profile.
Impressed you have kept this alive this long EP! So many sites have come and gone. :(

Just did some crude math and I apparently joined almost 18yrs ago, how is that possible???
hello peeps... is been some time since i last came here.
Electronic Punk wrote on Sazar's profile.
Rest in peace my friend, been trying to find you and finally did in the worst way imaginable.

Forum statistics

Threads
62,015
Messages
673,494
Members
5,621
Latest member
naeemsafi
Back