Gridinsoft Logo

The libcurl.dll (Optimized Configurable) File Analysis

Technical Analysis

File Name libcurl.dll
File Type
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
Scanner Version 1.0.227.174
Database Version 2025-10-19 01:00:18 UTC

Clean File

No threats detected by our scanner

0%
Detection Rate
692,288
File Size (bytes)
2025-10-19
Analysis Date

Scan Another File

File Identification

Hash Type Value Action
MD5
9a10d6e6f13def44b839472233ee77b4
SHA1
155f0926a59a684b36268b19ab3a377a663859b9
SHA256
de015c8198f45e54c70a58b8cbb6042c2ff7a86f5233ccf0fb08f71b518de026
SHA512
3cdaac54860b98a7aee291424383bd1b34cba7bf5fdab80317be217c306c4614377c30b69c1f068236d19fda54c2694f5a14a443bebb22953bc71dd808cdd908
ImpHash
e45d4c68df042254b75c2e78cd75d44a

PE Analysis

Basic Information

Image Base 0x322e60000
Entry Point 0x322e611f0
Compilation Time 2025-10-18 20:25:49
Checksum 0x000afc0b (Actual: 0x000b8dc5)
OS Version 4.0
PEiD Signatures PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
Digital Signature The expected hash does not match the digest in SpcInfo
Imports 4 libraries
bcrypt, KERNEL32, msvcrt, USER32
Exports 4 functions
Resources 2 Resources
Sections 11 Sections

Version Information

CompanyName Tensor Peak Enterprises
FileDescription Optimized Configurable
FileVersion 8.45.392.46241
InternalName adaptive_collaborative_reactive_detector
LegalCopyright Copyright (C) 2016 Tensor Peak Enterprises
OriginalFilename adaptive_.exe
ProductName Adaptive Collaborative Reactive Detector
ProductVersion 8.45.392.46241
Translation 0x0409 0x04b0

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Characteristics MD5
.text 0x00001000 11,136 bytes 11,264 bytes 6.07 (Normal) IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ 11F46582366106458078CE0753DA0654
.data 0x00004000 660,016 bytes 660,480 bytes 8.00 (Packed/Encrypted) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE F6E34A0D1B68B3172D41210CC98473CB
.rdata 0x000a6000 2,248 bytes 2,560 bytes 4.08 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ B6103E87A52927A7DA486B1242DFA729
.pdata 0x000a7000 636 bytes 1,024 bytes 2.98 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ AB9122CF3609D2C4251E08E2DBDBAD8E
.xdata 0x000a8000 492 bytes 512 bytes 3.92 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 2E2ACD82F2333F4193B3637C31B83DF0
.bss 0x000a9000 272 bytes 0 bytes 0.00 (Normal) IMAGE_SCN_CNT_UNINITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE D41D8CD98F00B204E9800998ECF8427E
.edata 0x000aa000 160 bytes 512 bytes 1.89 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 9EA7BE0B9E89578A9B676626CCEC775B
.idata 0x000ab000 1,856 bytes 2,048 bytes 4.08 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ CC26B2BB585212FDCE62E8D10D689E02
.tls 0x000ac000 16 bytes 512 bytes 0.00 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE BF619EAC0CDF3F68D496EA9344137E8B
.rsrc 0x000ad000 1,480 bytes 1,536 bytes 4.05 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 89CE92C1E7AEB9AA03C88329456E7219
.reloc 0x000ae000 116 bytes 512 bytes 1.56 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_DISCARDABLE|IMAGE_SCN_MEM_READ 8F203ACD13FAB36965ECAD4ADFA383DC
Entropy Analysis Alert

1 section(s) with high entropy (≥7.5) detected - possible packing/encryption

Resource Analysis

Total Resources: 2 (1,320 bytes)
Resource Type Count Total Size Percentage
RT_VERSION 1 944 bytes
71.5%
RT_MANIFEST 1 376 bytes
28.5%

Certificate Chain Analysis

Certificate Information
Product Adaptive Collaborative Reactive Detector
Description Optimized Configurable
File Version 8.45.392.46241
Original Name adaptive_.exe
Signing Date 07:01 AM 07/31/2025 (164 days ago)
Verification Status The digital signature of the object did not verify.
Signers Microsoft Corporation; Microsoft Code Signing PCA 2011; Microsoft Root Certificate Authority 2011
Counter Signers Microsoft Time-Stamp Service; Microsoft Time-Stamp PCA 2010; Microsoft Root Certificate Authority 2010
Internal Name adaptive_collaborative_reactive_detector
Copyright Copyright (C) 2016 Tensor Peak Enterprises
Certificate Chain Summary
Microsoft Corporation #1 Primary
Validity Period: 2025-05-15 18:49:10 → 2026-05-15 18:49:10
Signature Algorithm: sha256RSA
Serial Number: 33 00 00 04 7F 2F 42 2A 73 53 08 DE EA 00 00 00 00 04 7F
Microsoft Code Signing PCA 2011 #2 Chain
Validity Period: 2011-07-08 20:59:09 → 2026-07-08 21:09:09
Signature Algorithm: sha256RSA
Serial Number: 61 0E 90 D2 00 00 00 00 00 03
Microsoft Time-Stamp Service #3 Chain
Validity Period: 2024-07-25 18:31:19 → 2025-10-22 18:31:19
Signature Algorithm: sha256RSA
Serial Number: 33 00 00 01 FF 12 38 7C F7 C1 65 D6 A1 00 01 00 00 01 FF
Microsoft Time-Stamp PCA 2010 #4 Chain
Validity Period: 2021-09-30 18:22:25 → 2030-09-30 18:32:25
Signature Algorithm: sha256RSA
Serial Number: 33 00 00 00 15 C5 E7 6B 9E 02 9B 49 99 00 00 00 00 00 15

✓ This file has been digitally signed and the certificate chain has been verified

  • The signature ensures file integrity and authenticity from the publisher
  • Timestamping proves when the signature was applied
Certificate Verification Status

The expected hash does not match the digest in SpcInfo

Recommendation: Verify the file source and ensure it comes from a trusted publisher.

Remember: This is Result of Online Virus Scanner

Gridinsoft Anti-Malware has a much more powerful virus scanning engine. We recommend using it for a more precise diagnosis of infected systems. This brief guide will help you install our flagship product for more accurate diagnostics:

Download Anti-Malware

Keep Your System Protected

This file appears clean, but regular security maintenance is important

  1. Regular Scans: Run weekly system scans to detect new threats before they can cause damage.
  2. Keep Software Updated: Ensure your operating system and all applications have the latest security patches.
  3. Safe Browsing: Avoid suspicious websites and never download software from untrusted sources.
  4. Email Security: Be cautious with email attachments and links, even from known contacts.
Proactive Protection
This file passed all security checks, but stay vigilant. New malware variants appear daily that can evade detection. Always verify files come from official sources and check digital signatures when available.

Leave a Comment

Share your thoughts or insights about this file. Do you align with our conclusion?

Your feedback could influence our rating, and rest assured, your email will remain confidential and will only be used to communicate with you if necessary.

Your Score for
/

Gridinsoft Anti-Malware

Stay Malware-Free: Keep Your PC Protected with Gridinsoft Anti-Malware

Gridinsoft Anti-Malware offers just that—peace of mind with a robust, user-friendly solution that’s constantly updated to combat the latest threats. Designed by cybersecurity experts, it provides real-time protection and effortless malware removal. It’s not just about detecting threats; it's about enhancing your digital life with uninterrupted security. Give it a try and experience what it feels like to browse worry-free!

Gridinsoft Anti-Malware