Threat Database Adware Adware.Addlyrics.DC

Adware.Addlyrics.DC

By CagedTech in Adware

Threat Scorecard

Popularity Rank: 20,051
Threat Level: 20 % (Normal)
Infected Computers: 65
First Seen: June 16, 2022
Last Seen: April 18, 2026
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Adware.Addlyrics.DC
Signature status: No Signature

Known Samples

MD5: 559a51261b157bfa783f5d20f9c071ff
SHA1: ce37d103fb3c7eb27d063d7adbdc3c1ea901d530
SHA256: 24A763B9C3D3233AAB4188D70DD76D69C7F3A5D4726F44752AA09E5D0B55FF37
File Size: 172.96 KB, 172956 bytes
MD5: 8c34d366db5131880231335ce9242b78
SHA1: 1cb5711d5d1e0046b683d01c03134c53d89c96a8
SHA256: B4F59950638C670053024F0C2D397F1988C46003BC6449B867785ABFD751C794
File Size: 293.44 KB, 293441 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Comments Copyright (c) 2014
File Description For Windows
File Version
  • 1.186.0.0
  • 1.157.0.0
Legal Copyright
  • Copyright (c) 2014
  • Copyright 2013

File Traits

  • dll
  • HighEntropy
  • x86

Files Modified

File Attributes
c:\users\user\appdata\local\temp\nsia8ee.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete
c:\users\user\appdata\local\temp\nsic13d.tmp\iospecial.ini Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\nsic13d.tmp\iospecial.ini Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsic13d.tmp\modern-wizard.bmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsnbfd5.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete
c:\users\user\appdata\local\temp\nssc0de.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete
c:\users\user\appdata\local\temp\nstaa17.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete
c:\users\user\appdata\local\temp\nstaa66.tmp\installoptions.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nstaa66.tmp\iospecial.ini Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\nstaa66.tmp\iospecial.ini Generic Write,Read Attributes
Show More
c:\users\user\appdata\local\temp\nstaa66.tmp\modern-wizard.bmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\~nsu.tmp\au_.exe Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144

Registry Modifications

Key::Value Data API Name
HKLM\system\controlset001\control\session manager::pendingfilerenameoperations *1\??\C:\Windows\SystemTemp\MicrosoftEdgeUpdate.exe.old122e4*1\??\C:\Windows\SystemTemp\CopilotUpdate.exe.old12352*1\??\C:\P RegNtPreCreateKey
HKLM\system\controlset001\control\session manager::pendingfilerenameoperations *1\??\C:\Windows\SystemTemp\MicrosoftEdgeUpdate.exe.old122e4*1\??\C:\Windows\SystemTemp\CopilotUpdate.exe.old12352*1\??\C:\P RegNtPreCreateKey
HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 RegNtPreCreateKey

Windows API Usage

Category API
Process Shell Execute
  • CreateProcess

Shell Command Execution

"C:\Users\Evfzfyuu\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=c:\users\user\downloads\
"C:\Users\Mhhyvqpz\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=c:\users\user\downloads\

Trending

Most Viewed

Loading...