URL:

https://deltaexecutor.io/delta-executor-for-pc/

Full analysis: https://app.any.run/tasks/0d381714-f285-4c1a-8c82-20435bc00fd8
Verdict: Malicious activity
Analysis date: March 21, 2024, 18:27:57
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

C91183CC096D71213ECB58EFA1C710C1

SHA1:

6B58E90A401452103E74F06174092C8BCDADC865

SHA256:

CB891863306B7D571DED4B0D1D8E48EF1DC787D777CBFBB8AE176C8AAD489870

SSDEEP:

3:N8YL/9i9qRNKXIVd:2YBi9qRNKXIVd

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • Delta V3.61 b_04570772.exe (PID: 1232)
      • setup04570772.exe (PID: 2588)
    • Actions looks like stealing of personal data

      • setup04570772.exe (PID: 2588)
      • OfferInstaller.exe (PID: 4072)
  • SUSPICIOUS

    • Reads the Internet Settings

      • Delta V3.61 b_04570772.exe (PID: 1232)
      • setup04570772.exe (PID: 2588)
      • setup04570772.exe (PID: 2344)
      • OfferInstaller.exe (PID: 4072)
      • cmd.exe (PID: 2556)
    • Checks Windows Trust Settings

      • Delta V3.61 b_04570772.exe (PID: 1232)
      • setup04570772.exe (PID: 2588)
    • Executable content was dropped or overwritten

      • Delta V3.61 b_04570772.exe (PID: 1232)
      • setup04570772.exe (PID: 2588)
    • Reads settings of System Certificates

      • Delta V3.61 b_04570772.exe (PID: 1232)
      • setup04570772.exe (PID: 2588)
      • OfferInstaller.exe (PID: 4072)
    • Reads security settings of Internet Explorer

      • Delta V3.61 b_04570772.exe (PID: 1232)
      • setup04570772.exe (PID: 2588)
      • setup04570772.exe (PID: 2344)
      • OfferInstaller.exe (PID: 4072)
    • Process drops legitimate windows executable

      • setup04570772.exe (PID: 2588)
    • The process drops C-runtime libraries

      • setup04570772.exe (PID: 2588)
    • The process creates files with name similar to system file names

      • setup04570772.exe (PID: 2588)
    • Reads the Windows owner or organization settings

      • setup04570772.exe (PID: 2588)
      • OfferInstaller.exe (PID: 4072)
    • Adds/modifies Windows certificates

      • setup04570772.exe (PID: 2588)
      • Delta V3.61 b_04570772.exe (PID: 1232)
    • Searches for installed software

      • setup04570772.exe (PID: 2588)
    • Executing commands from a ".bat" file

      • setup04570772.exe (PID: 2588)
      • OfferInstaller.exe (PID: 4072)
    • Get information on the list of running processes

      • cmd.exe (PID: 1264)
      • cmd.exe (PID: 2152)
    • Starts CMD.EXE for commands execution

      • setup04570772.exe (PID: 2588)
      • OfferInstaller.exe (PID: 4072)
    • Uses TIMEOUT.EXE to delay execution

      • cmd.exe (PID: 1264)
      • cmd.exe (PID: 2152)
    • Start notepad (likely ransomware note)

      • Delta V3.61 b_04570772.exe (PID: 1232)
  • INFO

    • Application launched itself

      • iexplore.exe (PID: 2124)
    • Reads the machine GUID from the registry

      • Delta V3.61 b_04570772.exe (PID: 1232)
      • setup04570772.exe (PID: 2588)
      • setup04570772.exe (PID: 2344)
      • OfferInstaller.exe (PID: 4072)
    • Executable content was dropped or overwritten

      • iexplore.exe (PID: 1352)
      • iexplore.exe (PID: 2124)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 2124)
    • Drops the executable file immediately after the start

      • iexplore.exe (PID: 1352)
      • iexplore.exe (PID: 2124)
    • Reads the software policy settings

      • Delta V3.61 b_04570772.exe (PID: 1232)
      • setup04570772.exe (PID: 2588)
      • OfferInstaller.exe (PID: 4072)
    • Checks supported languages

      • setup04570772.exe (PID: 2588)
      • setup04570772.exe (PID: 2344)
      • OfferInstaller.exe (PID: 4072)
      • Delta V3.61 b_04570772.exe (PID: 1232)
    • Creates files or folders in the user directory

      • Delta V3.61 b_04570772.exe (PID: 1232)
      • setup04570772.exe (PID: 2588)
      • OfferInstaller.exe (PID: 4072)
    • Reads the computer name

      • setup04570772.exe (PID: 2588)
      • setup04570772.exe (PID: 2344)
      • OfferInstaller.exe (PID: 4072)
      • Delta V3.61 b_04570772.exe (PID: 1232)
    • Create files in a temporary directory

      • setup04570772.exe (PID: 2588)
      • setup04570772.exe (PID: 2344)
      • OfferInstaller.exe (PID: 4072)
    • Reads product name

      • setup04570772.exe (PID: 2588)
      • OfferInstaller.exe (PID: 4072)
    • Reads Environment values

      • setup04570772.exe (PID: 2588)
      • OfferInstaller.exe (PID: 4072)
    • The process uses the downloaded file

      • iexplore.exe (PID: 2124)
    • Checks proxy server information

      • Delta V3.61 b_04570772.exe (PID: 1232)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
75
Monitored processes
27
Malicious processes
4
Suspicious processes
1

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe iexplore.exe delta v3.61 b_04570772.exe no specs delta v3.61 b_04570772.exe setup04570772.exe setup04570772.exe no specs offerinstaller.exe cmd.exe no specs tasklist.exe no specs find.exe no specs timeout.exe no specs notepad.exe no specs cmd.exe no specs msiexec.exe no specs iexplore.exe cmd.exe no specs tasklist.exe no specs find.exe no specs timeout.exe no specs find.exe no specs tasklist.exe no specs timeout.exe no specs iexplore.exe no specs find.exe no specs tasklist.exe no specs timeout.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
116"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2124 CREDAT:1447214 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exeiexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
680timeout 1C:\Windows\System32\timeout.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
timeout - pauses command processing
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\timeout.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
784find /I "4072"C:\Windows\System32\find.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (grep) Utility
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\find.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ulib.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
968"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\78RFYB7Z\Delta V3.61 b_04570772.exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\78RFYB7Z\Delta V3.61 b_04570772.exeiexplore.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Download Manager
Exit code:
3221226540
Version:
1
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\78rfyb7z\delta v3.61 b_04570772.exe
c:\windows\system32\ntdll.dll
1232"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\78RFYB7Z\Delta V3.61 b_04570772.exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\78RFYB7Z\Delta V3.61 b_04570772.exe
iexplore.exe
User:
admin
Integrity Level:
HIGH
Description:
Download Manager
Exit code:
0
Version:
1
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\78rfyb7z\delta v3.61 b_04570772.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1264C:\Windows\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\H2OCleanup.bat""C:\Windows\System32\cmd.exesetup04570772.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1352"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2124 CREDAT:3544328 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
1644tasklist /FI "PID eq 4072" /fo csv C:\Windows\System32\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Lists the current running tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1784timeout 5C:\Windows\System32\timeout.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
timeout - pauses command processing
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\timeout.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
1832find /I "4072"C:\Windows\System32\find.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (grep) Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\find.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ulib.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
76 258
Read events
75 784
Write events
325
Delete events
149

Modification events

(PID) Process:(2124) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(2124) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(2124) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
31095741
(PID) Process:(2124) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(2124) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
31095741
(PID) Process:(2124) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2124) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2124) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2124) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2124) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
26
Suspicious files
46
Text files
138
Unknown types
18

Dropped files

PID
Process
Filename
Type
3276iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:E74078AD57B78A955E62033380373C61
SHA256:23871E0126135C1D68926075B5B06A962EBE3763663CDE3905134D972768A4A0
3276iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAder
MD5:608881BCCD83BD848D8E1C5E44052740
SHA256:FE4388C8A609D41BF65A8925F7002372FD327DE30AF9CBF98C0CDD93D395F7D5
3276iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\jquery.min[1].jstext
MD5:826EB77E86B02AB7724FE3D0141FF87C
SHA256:CB6F2D32C49D1C2B25E9FFC9AAAFA3F83075346C01BCD4AE6EB187392A4292CF
3276iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464der
MD5:8202A1CD02E7D69597995CABBE881A12
SHA256:58F381C3A0A0ACE6321DA22E40BD44A597BD98B9C9390AB9258426B5CF75A7A5
3276iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\delta-executor-for-pc[1].htmhtml
MD5:4165D40A912DAB4BFA847FC27F8A7C32
SHA256:5DCF1C3424F0AD05668739816E94F642A7840485A901B60A5A8CA23BB9C80CCB
3276iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464binary
MD5:4B9A5099394ECADD3B90D3C9C2F1BCD5
SHA256:68F9E4FBC92999C30F3862F365254637E5A758DCDDC040297F93CFCA605E9625
3276iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAbinary
MD5:21D83A23A0F0EF691E41F21D17A7DCDA
SHA256:C1B46ADF6B6EC12122EA3E75A3A51B5F4F097B1E17D72CFD9CB1231237FA6C0F
3276iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBAder
MD5:AC89A852C2AAA3D389B2D2DD312AD367
SHA256:0B720E19270C672F9B6E0EC40B468AC49376807DE08A814573FE038779534F45
3276iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\lazyload.min[1].jstext
MD5:D18523E4A4AAA9420A86E4DDDFB07554
SHA256:6E86A52A9858206302E32036D89907E3AC87762055E7F9C6364AEC33221B3E41
3276iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_EBA017AD8B5E69D2B53583F745E38C07der
MD5:8248D4F4D3EA4A08289DE7B51F965094
SHA256:2C09CC9E960032BBA97F463D6BC531E65F6ECCE74A3E27D46626339876627E25
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
28
TCP/UDP connections
114
DNS requests
60
Threats
7

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3276
iexplore.exe
GET
304
184.24.77.194:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?7f30423e8f7249ff
unknown
unknown
3276
iexplore.exe
GET
304
184.24.77.194:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?5259f1aa84763c8c
unknown
unknown
3276
iexplore.exe
GET
200
172.217.18.99:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
unknown
binary
1.41 Kb
unknown
3276
iexplore.exe
GET
200
172.217.18.99:80
http://ocsp.pki.goog/gts1c3/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEQDS57q68k6VpwlSRtIvj9A4
unknown
binary
472 b
unknown
3276
iexplore.exe
GET
200
172.217.18.99:80
http://ocsp.pki.goog/gts1c3/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEQD6BeWhIbleexId20FpK0af
unknown
binary
472 b
unknown
2124
iexplore.exe
GET
304
184.24.77.194:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?e55f0cb727843010
unknown
unknown
3276
iexplore.exe
GET
200
172.217.18.99:80
http://ocsp.pki.goog/gts1c3/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEAyHMKz2kyk1CqjxEi3JIhc%3D
unknown
binary
471 b
unknown
3276
iexplore.exe
GET
200
172.217.18.99:80
http://ocsp.pki.goog/gts1c3/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEDCzOo5s7pVrEK5Ujf4VGcs%3D
unknown
binary
471 b
unknown
2124
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAzlnDD9eoNTLi0BRrMy%2BWU%3D
unknown
binary
313 b
unknown
1352
iexplore.exe
GET
200
184.24.77.194:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?565ae2eb20d86d7e
unknown
compressed
67.5 Kb
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
224.0.0.252:5355
unknown
4
System
192.168.100.255:137
whitelisted
3276
iexplore.exe
188.114.97.3:443
deltaexecutor.io
CLOUDFLARENET
NL
unknown
3276
iexplore.exe
184.24.77.194:80
ctldl.windowsupdate.com
Akamai International B.V.
DE
unknown
3276
iexplore.exe
172.217.18.99:80
ocsp.pki.goog
GOOGLE
US
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
3276
iexplore.exe
172.217.23.98:443
pagead2.googlesyndication.com
GOOGLE
US
whitelisted
3276
iexplore.exe
172.217.16.200:443
www.googletagmanager.com
GOOGLE
US
whitelisted
3276
iexplore.exe
172.217.16.202:443
fonts.googleapis.com
GOOGLE
US
whitelisted

DNS requests

Domain
IP
Reputation
deltaexecutor.io
  • 188.114.97.3
  • 188.114.96.3
unknown
ctldl.windowsupdate.com
  • 184.24.77.194
  • 184.24.77.186
  • 184.24.77.193
  • 23.32.238.201
  • 23.32.238.178
whitelisted
ocsp.pki.goog
  • 172.217.18.99
whitelisted
pagead2.googlesyndication.com
  • 172.217.23.98
whitelisted
www.googletagmanager.com
  • 172.217.16.200
whitelisted
fonts.googleapis.com
  • 172.217.16.202
whitelisted
region1.google-analytics.com
  • 216.239.32.36
  • 216.239.34.36
whitelisted
tpc.googlesyndication.com
  • 216.58.206.33
whitelisted
www.gstatic.com
  • 142.250.181.227
whitelisted
fonts.gstatic.com
  • 142.250.184.195
whitelisted

Threats

Found threats are available for the paid subscriptions
7 ETPRO signatures available at the full report
Process
Message
Delta V3.61 b_04570772.exe
Delta V3.61 b_04570772.exe
at getFileInfo.@285@39 (this://app/main.html(307))
Delta V3.61 b_04570772.exe
Error: (undefined) has no property - value
Delta V3.61 b_04570772.exe
at initializeDynamicVariables (this://app/main.html(329))
Delta V3.61 b_04570772.exe
setup04570772.exe
at sciter:init-script.tis
setup04570772.exe
file:resources/tis/TranslateOfferTemplate.tis(82) : warning :'async' does not contain any 'await'
setup04570772.exe
setup04570772.exe
setup04570772.exe
Error: File not found - sciterwrapper:console.tis