Home Malware Programs Browser Plugins Comet Cursor

Comet Cursor

Posted: March 28, 2006

Comet Cursor is a cursor-changing utility that offers thousands of third-party Windows mouse cursors. It includes an Internet Explorer toolbar that can be used to search the web. However, it also tracks user activity in the Internet and transfers gathered data to its home server. Comet Cursor is bundled with ad-supported software, but also can be manually installed. The application creates a directory, drops files in it and modifies the registry to register itself as a web browser add-on. It comes with the uninstaller.

File System Modifications

  • The following files were created in the system:
    # File Name
    1 comet.exe
    2 comutil.dll
    3 csapputil.dll
    4 csbho.dll
    5 csbrange.dll
    6 cscore.dll
    7 csctx.dll
    8 cseng.dll
    9 csietb.dll
    10 csinst.dll
    11 csinstall.exe
    12 cstray.exe
    13 fileutil.dll

Registry Modifications

  • The following newly produced Registry Values are:
    HKEY..\..\..\..{RegistryKeys}212B99A1-9CF6-11D3-80B7-0500487BDBACD74B159-A1D3-11D3-80BC-0500487BDBAE5C39DB-9DCC-11D3-80D6-00500487D1C5HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerBrowserHelperHKEY_LOCAL_MACHINESoftwareCometSystems
  • The following CLSID's were detected:
    HKEY..\..\{CLSID Path}FE6BC4EF-5676-484B-88AE-883323913256F147AE85-1855-4182-BE3A-174160995A40EDEE4CCB-0913-4CC9-8EA9-3DDD87AB8BDEEDC4193F-34AD-4D07-AA87-E3FDB89E3E76EB07A6D4-8E36-11D4-8138-00500487B1C5EA5BB125-A227-40A7-BCAA-652D497C2F65E3A6E4B2-16B4-4F56-A98A-5F4DE04CA2BEE28FCB54-8C8E-11D3-80D1-00500487B1C5DFA771A5-2138-48EE-A58E-F782C879AF8ECBE7D5E7-90A2-11D3-80D1-00500487B1C5C38FC998-3B1B-4F59-A710-5A6C9CF8BD92A5EA242A-442E-4ECB-9CAC-97037CCD6EC6A335D52F-D489-472D-9EAA-D72A40AAF7CA941228B3-3AD1-4633-A9F5-59154CB362D490C61707-C8F8-43DB-A25C-C1F4B18EE41E8AE68B04-D492-4474-A6E2-FD5FE884F4B1827A2ECE-D76F-4BCC-82ED-D6A287C112117F0F5DA7-84CB-11D4-8137-00500487B1C57BE4E188-DD04-47E4-8C1B-4AA330B18D9F64726B8A-0CBE-4F80-90B7-1CA1BC69FCFB6F2D6A5E-E3E7-4F18-887C-C777650DEF574AA5D526-44D5-4AF6-AC53-5CE1534CC40B4320AEEB-2F2A-4F97-B573-232C6576AA3A39E01E09-2B45-11D4-810D-00500487D1C537D026C3-84D7-4AC5-A026-C08B7907CACF1678F7E1-C422-11D0-AD7D-00400515CAAA15940F5D-D8BD-49BC-851D-29DCFB1669500E429272-96D8-11D3-80D5-00500487B1C50E42926E-96D8-11D3-80D5-00500487B1C50922EC1A-9EC7-11D3-80B9-00500487BDBA062EFA85-8BBB-11D3-80D0-00500487B1C504FC63F8-EE34-4283-8941-4A11BF17C447D14D6793-9B65-11D3-80B6-00500487BDBA

Use SpyHunter to Detect and Remove PC Threats

If you are concerned that malware or PC threats similar to Comet Cursor may have infected your computer, we recommend you start an in-depth system scan with SpyHunter. SpyHunter is an advanced malware protection and remediation application that offers subscribers a comprehensive method for protecting PCs from malware, in addition to providing one-on-one technical support service.

* See Free Trial offer below. EULA and Privacy/Cookie Policy.

Why can't I open any program including SpyHunter? You may have a malware file running in memory that kills any programs that you try to launch on your PC. Tip: Download SpyHunter from a clean computer, copy it to a USB thumb drive, DVD or CD, then install it on the infected PC and run SpyHunter's malware scanner.

Loading...
Spywareremove.com uses cookies to provide you with a better browsing experience and analyze how users navigate and utilize the Site. By using this Site or clicking on "OK", you consent to the use of cookies. Learn more.