Should I block it?

98%
Yes, 98% block recommendation.
Possible reasons:
Multiple malware detections
Performance resource utilization

Relationships

Parent process
Related files

PE structurePE file structure

Show functions
Import table
advapi32.dll
RegQueryValueExA, RegEnumValueA, RegSetKeySecurity, ConvertSidToStringSidA, RegQueryInfoKeyA, RegQueryInfoKeyW, RegDeleteValueA, RegEnumKeyExA, RegSetValueExA, OpenProcessToken, RegCloseKey, RegDeleteKeyA, RegCreateKeyExA, RegOpenKeyExA, RegGetKeySecurity, RegOpenKeyA, GetTokenInformation
gdi32.dll
SelectObject, GetStockObject, GetObjectA, CreateSolidBrush, GetDeviceCaps, BitBlt, CreateCompatibleDC, CreateCompatibleBitmap, DeleteDC, DeleteObject
kernel32.dll
GetTickCount, RaiseException, EnterCriticalSection, LeaveCriticalSection, lstrcmpiA, OutputDebugStringA, IsDBCSLeadByte, Sleep, CreateThread, CreateEventA, GetModuleHandleW, SetEvent, ExitProcess, FreeLibrary, FindResourceA, LoadLibraryExA, GetCommandLineA, FlushInstructionCache, GetCurrentProcess, SetLastError, LoadLibraryA, LocalAlloc, LocalFree, GetDateFormatA, SetFilePointer, CreateDirectoryA, GetTempPathA, MoveFileExA, GetTempFileNameA, InitializeCriticalSection, GlobalUnlock, GlobalLock, GlobalAlloc, lstrcmpA, MulDiv, ReleaseMutex, ResetEvent, CreateMutexA, GetVersionExA, GetEnvironmentVariableA, SetEnvironmentVariableA, WideCharToMultiByte, CompareStringW, CreateFileW, WriteConsoleW, FlushFileBuffers, SetStdHandle, GetModuleHandleExA, LoadLibraryW, GetConsoleMode, GetConsoleCP, LCMapStringW, GetCurrentProcessId, QueryPerformanceCounter, GetFileType, SetHandleCount, GetEnvironmentStringsW, FreeEnvironmentStringsW, GetStringTypeW, IsValidCodePage, GetOEMCP, GetACP, GetCPInfo, TlsFree, TlsSetValue, TlsGetValue, TlsAlloc, GetModuleFileNameW, GetStdHandle, GetTimeZoneInformation, TerminateProcess, IsDebuggerPresent, SetUnhandledExceptionFilter, UnhandledExceptionFilter, HeapCreate, GetSystemTimeAsFileTime, GetStartupInfoW, HeapSetInformation, VirtualQuery, GetSystemInfo, VirtualProtect, GetTimeFormatA, RtlUnwind, EncodePointer, DecodePointer, InterlockedPopEntrySList, VirtualAlloc, VirtualFree, IsProcessorFeaturePresent, InterlockedPushEntrySList, InterlockedCompareExchange, GetProcessHeap, HeapSize, HeapReAlloc, HeapFree, HeapAlloc, HeapDestroy, CloseHandle, GetModuleFileNameA, GetCurrentThreadId, lstrlenA, InterlockedIncrement, InitializeCriticalSectionAndSpinCount, WaitForSingleObject, GetFileTime, InterlockedDecrement, lstrlenW, MultiByteToWideChar, FileTimeToLocalFileTime, GetModuleHandleA, GetProcAddress, CreateFileA, FindResourceExW, FindResourceW, LoadResource, LockResource, SizeofResource, DeleteCriticalSection, GetLastError, FileTimeToSystemTime, WriteFile
ole32.dll
CoRegisterClassObject, OleInitialize, OleUninitialize, OleRun, CoCreateInstance, CLSIDFromProgID, CLSIDFromString, CoTaskMemFree, StringFromCLSID, CoTaskMemAlloc, CoTaskMemRealloc, CoInitialize, CoUninitialize, CoRevokeClassObject, CoGetClassObject, StringFromGUID2, CoAddRefServerProcess, CoCreateGuid, CoReleaseServerProcess, CoInitializeEx, CreateStreamOnHGlobal, OleLockRunning
sensapi.dll
IsNetworkAlive
shell32.dll
SHGetSpecialFolderPathA, Shell_NotifyIconA, ShellExecuteA, SHGetFileInfoA, ShellExecuteExA, SHGetSpecialFolderPathW
shlwapi.dll
StrStrW, SHSetValueA, PathIsURLW, PathRemoveFileSpecA, PathAddBackslashA, StrToIntW, PathFindExtensionA, PathFindFileNameA, SHGetValueA, PathRenameExtensionA, PathAppendA
user32.dll
UnhookWindowsHookEx, CallNextHookEx, GetDlgItem, SetForegroundWindow, SetFocus, SetWindowsHookExA, SetTimer, IsWindow, SendMessageA, KillTimer, UnregisterClassA, SendInput, ShowWindow, CharNextA, PostThreadMessageA, CharUpperA, GetClassNameA, LoadIconA, TranslateMessage, DispatchMessageA, MsgWaitForMultipleObjects, PeekMessageA, GetWindowTextLengthA, GetWindowTextA, CreateAcceleratorTableA, DestroyAcceleratorTable, GetDesktopWindow, GetFocus, GetWindow, BeginPaint, EndPaint, FillRect, ReleaseCapture, CharNextW, GetParent, IsChild, SetCapture, RedrawWindow, InvalidateRgn, InvalidateRect, ReleaseDC, GetDC, ScreenToClient, ClientToScreen, GetClientRect, MoveWindow, GetSysColor, RegisterWindowMessageA, PostQuitMessage, CreateWindowExA, RegisterClassExA, CallWindowProcA, GetWindowLongA, DefWindowProcA, LoadCursorA, GetClassInfoExA, SetWindowLongA, SetWindowTextA, DestroyWindow, SetWindowPos, GetMessageA

deltasrv.exe

Delta Toolbar by Montera Technologeis LTD (Signed)

Remove deltasrv.exe
Version:   1.8.20.0
MD5:   92eb4def3833beaff0111d33b9e5bcf5
SHA1:   781f353ea130dcb9c496d35204cb5ab96c4dccbf
SHA256:   a8a3578c5fee1bd35f26808ddbba3f8f413e0d03e896f48e10392c57fb69d07e
Warning 4 antivirus scanners has detected malware.

Overview

deltasrv.exe is malware that executes as a process with the local user's privileges usually within the context of Windows Explorer. This is typically installed with the program Delta toolbar published by Babylon Ltd and is most likely removed by most users once installed (81% removed). The file is digitally signed by Montera Technologeis LTD which was issued by the COMODO CA Limited certificate authority (CA). This particular version is usually found on Windows 7 Ultimate (6.1.7601.65536).

DetailsDetails

File name:deltasrv.exe
Publisher:Delta-search.com
Product name:Delta Toolbar
Typical file path:C:\Program Files\delta\delta\1.8.21.5\deltasrv.exe
File version:1.8.20.0
Size:369.4 KB (378,264 bytes)
Build date:5/20/2013 12:02 PM
Certificate
Issued to:Montera Technologeis LTD
Authority (CA):COMODO CA Limited
Digital DNA
PE subsystem:Windows GUI
File packed:No
.NET CLR:No
More details

ResourcesPrograms

The following program will install this file
Babylon Ltd
  81% remove
The Delta Toolbar is a web browser plugin that supports Internet Explorer, Firefox and Chrome. It is typically bundled with various third party software. When installed, it will modify the user's home page and search settings to redirect to delta-search.com. It also sends various configuration information to its remote servers and tracks your browsing habits and uses such as URLs visited and such in order for the toolbar to provide adve...

MalwareMalware detections

Based on 40+ industry antivirus scanners, 4 of them detected the following malware.
Antivirus engineEngine versionDetection
Dr.Web 8.13.10.5 Adware.Toolbar.205
Malwarebytes 1.75.0.1 PUP.Optional.Delta
SUPERAntiSpyware 5.6.0.1008 PUP.DeltaSearch
VIPRE Antivirus 21558 Babylon (fs)

ResourcesResource utilization

(Note: statistics below are averages based on a minimum sample size of 200 unique participants)
Averages
 
CPU
Total CPU:0.00001639%
0.028634%
Kernel CPU:0.00000820%
0.013761%
User CPU:0.00000820%
0.014873%
Kernel CPU time:156,001 ms/min
100,923,805ms/min
Memory
Private memory:1.17 MB
21.59 MB
Private (maximum):4.56 MB
Private (minimum):2.62 MB
Non-paged memory:1.17 MB
21.59 MB
Virtual memory:49.95 MB
140.96 MB
Virtual memory (peak):52.95 MB
169.69 MB
Working set:2.64 MB
18.61 MB
Working set (peak):4.59 MB
37.95 MB
Resource allocations
Threads:4
12
Handles:78
600
GUI GDI count:9
103
GUI GDI peak:10
142
GUI USER count:2
49
GUI USER peak:3
71

BehaviorsProcess properties

Integrety level:High
Platform:32-bit
Command line:"C:\Program Files\delta\delta\1.8.21.5\deltasrv.exe"
Owner:User
Parent process:explorer.exe (Windows Explorer by Microsoft Corporation)

Windows OS versionsDistribution by Windows OS

OS versiondistribution
Windows 7 Ultimate 100.00%

OEM distributionDistribution by PC manufacturer

PC Manufacturerdistribution
Hewlett-Packard 100.00%
Should I remove It? Clean your PC of unwanted adware, toolbars and bloatware.

Download it for FREE