AxComponentsRTL.bpl threat report

MD5 b3901bfa62bd956ee20b326d95e74dd8
Latest seen 2022-06-28 23:11:15 (3 years ago)
First seen 2019-07-06 00:06:55 (6 years ago)
Size 1 MB
Publisher Ausl˜ogics

This report summarizes the file identity, detection status, publisher metadata, observed locations, and technical indicators for AxComponentsRTL.bpl. ThreatInfo currently classifies this sample as PUP.Auslogics.

GridinSoft Anti-Malware detection

GridinSoft already detects this file

The latest ThreatInfo record shows AxComponentsRTL.bpl detected as PUP.Auslogics. You can download GridinSoft Anti-Malware to scan the system and remove this detection if the file is present on your device.

Detection name
PUP.Auslogics
Last analysis
2022-06-28 23:11:15 (3 years ago)
File hash
b3901bfa62bd956ee20b326d95e74dd8
Download Anti-Malware

AxComponentsRTL.bpl is a Windows file recorded in the ThreatInfo database. It is associated with Components Package. The reported company name is Ausl˜ogics. The current detection status is PUP.Auslogics, based on the latest analysis from 2022-06-28 23:11:15 (3 years ago).

If AxComponentsRTL.bpl appears on your computer unexpectedly, treat it as suspicious. Check its location, digital signature, and recent system changes before allowing it to run. A full anti-malware scan is recommended when this file is detected as PUP.Auslogics.

Product Name: Components Package
Company Name: Ausl˜ogics
MD5: b3901bfa62bd956ee20b326d95e74dd8
Size: 1 MB
First Published: 2019-07-06 00:06:55 (6 years ago)
Latest Published: 2022-06-28 23:11:15 (3 years ago)
Status: PUP.Auslogics (on last analysis)
Analysis Date: 2022-06-28 23:11:15 (3 years ago)
AxComponentsRTL.bpl detection screenshot

The screenshot is a visual record of a GridinSoft Anti-Malware detection for this sample. Use the hash and metadata above as the primary identifiers when comparing the file on your system.

Signed By: Auslogics Labs Pty Ltd
Status: Valid

The signature on AxComponentsRTL.bpl is reported as valid. A valid signature helps confirm publisher identity, but it does not automatically make the file safe if the installer was bundled, abused, or downloaded from an untrusted source.

%sysdrive%\windows.old\users\adminakoge.soyuz\appdata\local\temp
%programfiles%\auslogics
%programfiles%\auslogics
%programfiles%\auslogics
%programfiles%\auslogics
%programfiles%\auslogics
%programfiles%\auslogics
%programfiles%\auslogics
%programfiles%\auslogics

ThreatInfo has observed AxComponentsRTL.bpl in the locations listed above. Files found in temporary folders, user profile folders, startup locations, or unusual application directories should be reviewed more carefully than files installed under a known program directory.

42.9%
14.3%
14.3%
14.3%
14.3%

The strongest geographic signal for this file is Thailand with 42.9% of observed hits. Geographic distribution can help identify targeted campaigns, regional software bundles, or where a file is most commonly reported.

Windows 10 75.0%
Windows 8.1 25.0%

The most common operating system signal for AxComponentsRTL.bpl is Windows 10 with 75.0% of observed hits. If your system differs from the common profile, check whether the file was introduced by a specific installer, archive, or removable device.

AxComponentsRTL.bpl is identified as pe for 32 systems. The subsystem is Windows GUI. PE header values are useful for triage, especially when they do not match the expected publisher, product, or release timeline.

Subsystem: Windows GUI
PE Type: pe
OS Bitness: 32
Image Base: 0x50000000
Entry Address: 0x000fc4c8

PE Sections:

Name Size of data MD5
.text 1027584 96a02e025e03c32b5c5ba870aee144b6
.itext 1536 68c284408f096143e4f0c1d83c721a99
.data 9728 99e610a0cb1c9204968800af5829c944
.bss 0 00000000000000000000000000000000
.idata 42496 9c7ec0858cfd37561f6c38786b7db7d4
.didata 1024 52791b2664f0aeb39140ec8229807eb3
.edata 600064 29e7c72635bd20ce89995e0f85252bad
.rdata 512 e0c540e478c31623586ef976ccaa9eed
.reloc 92160 6216f0b4b8284a53fde76eaaaa1b00dd
.rsrc 98304 f46c4462b7dee7a24890807f786cdb68

PE section names and hashes can reveal packing, injected resources, or unusual build artifacts. Sections with uncommon names, very large raw data, or hashes that differ from a trusted copy deserve additional review.

More information: