mrac.dll threat report

MD5 7ad28486a334ae473ae9cec21d8144d7
Latest seen 2023-05-16 00:00:42 (2 years ago)
First seen 2019-09-12 00:33:12 (6 years ago)
Size 57 MB
Publisher LLC Mail.Ru
Signed by Mail.Ru LLC

GridinSoft Anti-Malware detection

Detected by GridinSoft before you download

The current ThreatInfo record shows this exact file hash detected as PUP.MailRu. Download GridinSoft Anti-Malware to scan the device, confirm whether this file is present, and remove the detected object if it is found.

Detection name
PUP.MailRu
Recommended action
Scan and remove
Last analysis
2023-05-16 00:00:42 (2 years ago)
File hash
7ad28486a334ae473ae9cec21d8144d7
Download Anti-Malware

Why it matters

Why GridinSoft flags this file

Detection

GridinSoft identifies the sample as PUP.MailRu.

Timeline

First seen 2019-09-12 00:33:12 (6 years ago); latest analysis 2023-05-16 00:00:42 (2 years ago).

Publisher context

Company metadata: LLC Mail.Ru. Product metadata: Mail.Ru AntiCheat.

Digital signature

Signed by Mail.Ru LLC. The signature is reported as valid, but signed files can still be bundled or abused.

Observed locations

ThreatInfo has seen this file in user or system paths listed below. Unexpected locations increase the need for local verification.

Recommended action

What to do next

  1. Compare the MD5 above with the file found on the device.
  2. Check whether the file appears in the observed locations or under one of the alternate names.
  3. Run GridinSoft Anti-Malware to confirm the detection and remove the file if it is present.

mrac.dll is a Windows file recorded in the ThreatInfo database. It is associated with Mail.Ru AntiCheat. The reported company name is LLC Mail.Ru. The current detection status is PUP.MailRu, based on the latest analysis from 2023-05-16 00:00:42 (2 years ago).

If mrac.dll appears on your computer unexpectedly, treat it as suspicious. Check its location, digital signature, and recent system changes before allowing it to run. A full anti-malware scan is recommended when this file is detected as PUP.MailRu.

Product Name: Mail.Ru AntiCheat
Company Name: LLC Mail.Ru
MD5: 7ad28486a334ae473ae9cec21d8144d7
Size: 57 MB
First Published: 2019-09-12 00:33:12 (6 years ago)
Latest Published: 2023-05-16 00:00:42 (2 years ago)
Status: PUP.MailRu (on last analysis)
Analysis Date: 2023-05-16 00:00:42 (2 years ago)
mrac.dll detection screenshot

The screenshot is a visual record of a GridinSoft Anti-Malware detection for this sample. Use the hash and metadata above as the primary identifiers when comparing the file on your system.

Signed By: Mail.Ru LLC
Status: Valid

The signature on mrac.dll is reported as valid. A valid signature helps confirm publisher identity, but it does not automatically make the file safe if the installer was bundled, abused, or downloaded from an untrusted source.

%sysdrive%\gamesmailru\warface
%sysdrive%\syca\warface
%sysdrive%\gamesmailru\warface
%sysdrive%\gamesmailru\warface
%sysdrive%\gamesmailru\warfacepts
%sysdrive%\gamesmailru\warface
%sysdrive%\gamesmailru\archeage
%sysdrive%\gamesmailru\warface
%sysdrive%\gamesmailru\warface
%sysdrive%\steam libray\steamapps\common\warface\warface

ThreatInfo has observed mrac.dll in the locations listed above. Files found in temporary folders, user profile folders, startup locations, or unusual application directories should be reviewed more carefully than files installed under a known program directory.

59.1%
4.5%
4.5%
4.5%
4.5%
4.5%
4.5%
4.5%
4.5%
4.5%

The strongest geographic signal for this file is Russian Federation with 59.1% of observed hits. Geographic distribution can help identify targeted campaigns, regional software bundles, or where a file is most commonly reported.

Windows 10 90.9%
Windows 8.1 4.5%
Windows 7 4.5%

The most common operating system signal for mrac.dll is Windows 10 with 90.9% of observed hits. If your system differs from the common profile, check whether the file was introduced by a specific installer, archive, or removable device.

mrac.dll is identified as pe for 32 systems. The subsystem is Windows GUI. PE header values are useful for triage, especially when they do not match the expected publisher, product, or release timeline.

Subsystem: Windows GUI
PE Type: pe
OS Bitness: 32
Image Base: 0x10000000
Entry Address: 0x027ae0c0

PE Sections:

Name Size of data MD5
.text 495616 53d20ceffe55e9134b507c29f002c7f5
.text3 349184 02cd28b38c00fabc124ff9cee67fc654
.sflb1 1140736 2bc27c078585205066c4749c552d3077
.sflb2 32768 98b6495e6f95202436b716ac935f21d9
.rdata 163328 4cf2e23b0691b02f6c167434b5d98a3a
.data 1057280 0dd0416e944329b533f1d5dc514435ca
.text2 13312 d7eab96f074b593c3fc7139c6eb818bb
.rsrc 1536 b34afd52f34fc9da76621914a592e1bc
.reloc 78336 008226ee1ec0040212f77fa96f5cdd52
.grcode 65536 5ff393aa0057cd8d9a4d6a2e8411fcc0
.sfcode 56668160 0c1350b17545e59c5f2f349b5853bd8f
.sfdata 8704 b1e3598a303efd209437cf1feddc0ec8
.grdata 86528 87585c8c29ceb7daf21a13dfadceeacd

PE section names and hashes can reveal packing, injected resources, or unusual build artifacts. Sections with uncommon names, very large raw data, or hashes that differ from a trusted copy deserve additional review.

More information: