Comet Cursor
Comet Cursor is a cursor-changing utility that offers thousands of third-party Windows mouse cursors. It includes an Internet Explorer toolbar that can be used to search the web. However, it also tracks user activity in the Internet and transfers gathered data to its home server. Comet Cursor is bundled with ad-supported software, but also can be manually installed. The application creates a directory, drops files in it and modifies the registry to register itself as a web browser add-on. It comes with the uninstaller.
File System Modifications
- The following files were created in the system:
# File Name 1 comet.exe 2 comutil.dll 3 csapputil.dll 4 csbho.dll 5 csbrange.dll 6 cscore.dll 7 csctx.dll 8 cseng.dll 9 csietb.dll 10 csinst.dll 11 csinstall.exe 12 cstray.exe 13 fileutil.dll
Registry Modifications
- The following newly produced Registry Values are:
HKEY..\..\..\..{RegistryKeys}212B99A1-9CF6-11D3-80B7-0500487BDBACD74B159-A1D3-11D3-80BC-0500487BDBAE5C39DB-9DCC-11D3-80D6-00500487D1C5HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerBrowserHelperHKEY_LOCAL_MACHINESoftwareCometSystems - The following CLSID's were detected:
HKEY..\..\{CLSID Path}FE6BC4EF-5676-484B-88AE-883323913256F147AE85-1855-4182-BE3A-174160995A40EDEE4CCB-0913-4CC9-8EA9-3DDD87AB8BDEEDC4193F-34AD-4D07-AA87-E3FDB89E3E76EB07A6D4-8E36-11D4-8138-00500487B1C5EA5BB125-A227-40A7-BCAA-652D497C2F65E3A6E4B2-16B4-4F56-A98A-5F4DE04CA2BEE28FCB54-8C8E-11D3-80D1-00500487B1C5DFA771A5-2138-48EE-A58E-F782C879AF8ECBE7D5E7-90A2-11D3-80D1-00500487B1C5C38FC998-3B1B-4F59-A710-5A6C9CF8BD92A5EA242A-442E-4ECB-9CAC-97037CCD6EC6A335D52F-D489-472D-9EAA-D72A40AAF7CA941228B3-3AD1-4633-A9F5-59154CB362D490C61707-C8F8-43DB-A25C-C1F4B18EE41E8AE68B04-D492-4474-A6E2-FD5FE884F4B1827A2ECE-D76F-4BCC-82ED-D6A287C112117F0F5DA7-84CB-11D4-8137-00500487B1C57BE4E188-DD04-47E4-8C1B-4AA330B18D9F64726B8A-0CBE-4F80-90B7-1CA1BC69FCFB6F2D6A5E-E3E7-4F18-887C-C777650DEF574AA5D526-44D5-4AF6-AC53-5CE1534CC40B4320AEEB-2F2A-4F97-B573-232C6576AA3A39E01E09-2B45-11D4-810D-00500487D1C537D026C3-84D7-4AC5-A026-C08B7907CACF1678F7E1-C422-11D0-AD7D-00400515CAAA15940F5D-D8BD-49BC-851D-29DCFB1669500E429272-96D8-11D3-80D5-00500487B1C50E42926E-96D8-11D3-80D5-00500487B1C50922EC1A-9EC7-11D3-80B9-00500487BDBA062EFA85-8BBB-11D3-80D0-00500487B1C504FC63F8-EE34-4283-8941-4A11BF17C447D14D6793-9B65-11D3-80B6-00500487BDBA
Use SpyHunter to Detect and Remove PC Threats
If you are concerned that malware or PC threats similar to Comet Cursor may have infected your computer, we recommend you start an in-depth system scan with SpyHunter. SpyHunter is an advanced malware protection and remediation application that offers subscribers a comprehensive method for protecting PCs from malware, in addition to providing one-on-one technical support service.
Download SpyHunter's Malware Scanner** See Free Trial offer below. EULA and Privacy/Cookie Policy.
Why can't I open any program including SpyHunter? You may have a malware file running in memory that kills any programs that you try to launch on your PC. Tip: Download SpyHunter from a clean computer, copy it to a USB thumb drive, DVD or CD, then install it on the infected PC and run SpyHunter's malware scanner.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.