Threat Database Adware Adware.AddLyrics.D

Adware.AddLyrics.D

By CagedTech in Adware

Threat Scorecard

Popularity Rank: 16,698
Threat Level: 20 % (Normal)
Infected Computers: 108
First Seen: July 24, 2009
Last Seen: October 11, 2025
OS(es) Affected: Windows

Aliases

7 security vendors flagged this file as malicious.

Antivirus Vendor Detection
Sophos Mal/Behav-136
Prevx1 Heuristic: Suspicious Self Modifying File
Panda Suspicious file
Kaspersky not-a-virus:AdWare.Win32.Agent.aka
Ikarus Trojan.Win32.Delf.nf
Fortinet Adware/Agent
AntiVir ADSPY/Agent.aka

File System Details

Adware.AddLyrics.D may create the following file(s):
# File Name MD5 Detections
1. op_uid.dll 2ef6a3a17e6891a2631edad751bf7c9c 0

Analysis Report

General information

Family Name: Adware.AddLyrics.D
Signature status: No Signature

Known Samples

MD5: 11b6679c68c744dacb90f2ce7aea2146
SHA1: 37e88fd721ee5ab9d06047f88fcc51cc521e0eac
SHA256: 25A3C4EBDA76A98C47F576008F694B3E2DAB48B840FEB55EDD70B6BF4BDD307C
File Size: 1.18 MB, 1181881 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
File Version 1.155.0.0
Legal Copyright Copyright 2013

File Traits

  • dll
  • x86

Files Modified

File Attributes
c:\users\user\appdata\local\temp\nsg7079.tmp Synchronize,Write Attributes
c:\users\user\appdata\local\temp\nsg7079.tmp\nsr.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsg7079.tmp\nsr.dll Synchronize,Write Attributes
c:\users\user\appdata\local\temp\nsr7069.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete

Registry Modifications

Key::Value Data API Name
HKLM\software\classes\appid\{5c61f36a-34ca-477e-bf9b-c6b5b4829dc0}::appidflags ٬ RegNtPreCreateKey
HKLM\software\classes\appid\{5c61f36a-34ca-477e-bf9b-c6b5b4829dc0}::authenticationlevel ꊋ梱 RegNtPreCreateKey
HKLM\system\controlset001\control\session manager::pendingfilerenameoperations \??\C:\Users\Ouphktnl\AppData\Local\Temp\nsg7079.tmp\ RegNtPreCreateKey

Trending

Most Viewed

Loading...