mrac64.dll file report

MD5 183e73f734234910e4c0919803787062
Latest seen 2024-05-13 23:01:47 (2 years ago)
First seen 2019-06-11 10:49:16 (6 years ago)
Size 53 MB
Publisher LLC Mail.Ru
Signed by Mail.Ru LLC

Why it matters

Evidence available for this file

Detection

No final classification is available yet.

Timeline

First seen 2019-06-11 10:49:16 (6 years ago); latest analysis 2024-05-13 23:01:47 (2 years ago).

Publisher context

Company metadata: LLC Mail.Ru. Product metadata: Mail.Ru AntiCheat.

Digital signature

Signed by Mail.Ru LLC. The signature is reported as valid, but signed files can still be bundled or abused.

Observed locations

ThreatInfo has seen this file in user or system paths listed below. Unexpected locations increase the need for local verification.

Recommended action

What to do next

  1. Use the hash and metadata below to verify the exact file identity.
  2. Review publisher, signature, paths, and PE details for inconsistencies.
  3. Run a local scan if the file appears unexpectedly or starts with Windows.

mrac64.dll is a Windows file recorded in the ThreatInfo database. It is associated with Mail.Ru AntiCheat. The reported company name is LLC Mail.Ru. The current detection status is Undefined, based on the latest analysis from 2024-05-13 23:01:47 (2 years ago).

ThreatInfo does not have a final classification for this file yet. Use the technical details below to compare the hash, size, signature, and observed locations with the copy found on your device.

Product Name: Mail.Ru AntiCheat
Company Name: LLC Mail.Ru
MD5: 183e73f734234910e4c0919803787062
Size: 53 MB
First Published: 2019-06-11 10:49:16 (6 years ago)
Latest Published: 2024-05-13 23:01:47 (2 years ago)
Status: Undefined (on last analysis)
Analysis Date: 2024-05-13 23:01:47 (2 years ago)
Signed By: Mail.Ru LLC
Status: Valid

The signature on mrac64.dll is reported as valid. A valid signature helps confirm publisher identity, but it does not automatically make the file safe if the installer was bundled, abused, or downloaded from an untrusted source.

%programfiles%\steam\steamapps\common\conqueror's blade\conqueror`s blade my.com\game\x64\ship
%sysdrive%\gamesmailru\conqueror`s blade\game\x64\ship
%programfiles%\steam\steamapps\common\conqueror's blade\conqueror`s blade my.com\game\x64\ship
%sysdrive%\steamlibrary\steamapps\common\conqueror's blade\conqueror`s blade my.com\game\x64\ship
%sysdrive%\mygames\conqueror`s blade my.com\game\x64\ship
%sysdrive%\mygames\conqueror`s blade my.com\game\x64\ship
%sysdrive%\steamlibrary\steamapps\common\conqueror's blade\conqueror`s blade my.com\game\x64\ship
%sysdrive%\steamlibrary\steamapps\common\conqueror's blade\conqueror`s blade my.com\game\x64\ship
%programfiles%\steam\steamapps\common\conqueror's blade\conqueror`s blade my.com\game\x64\ship
%sysdrive%\steamlibrary\steamapps\common\conqueror's blade\conqueror`s blade my.com\game\x64\ship

ThreatInfo has observed mrac64.dll in the locations listed above. Files found in temporary folders, user profile folders, startup locations, or unusual application directories should be reviewed more carefully than files installed under a known program directory.

23.3%
20.0%
20.0%
6.7%
6.7%
6.7%
6.7%
3.3%
3.3%
3.3%

The strongest geographic signal for this file is United States with 23.3% of observed hits. Geographic distribution can help identify targeted campaigns, regional software bundles, or where a file is most commonly reported.

Windows 10 90.3%
Windows 7 6.5%
Windows 8 3.2%

The most common operating system signal for mrac64.dll is Windows 10 with 90.3% of observed hits. If your system differs from the common profile, check whether the file was introduced by a specific installer, archive, or removable device.

mrac64.dll is identified as pe for 64 systems. The subsystem is Windows GUI. PE header values are useful for triage, especially when they do not match the expected publisher, product, or release timeline.

Subsystem: Windows GUI
PE Type: pe
OS Bitness: 64
Image Base: 0x0000000180000000
Entry Address: 0x02e4b060

PE Sections:

Name Size of data MD5
.text 493056 0cc4e6175f690e7f49d4d3a22961b867
.text3 157184 875fe4f06de7bd6fce1e4577d6b0cde5
.sflb1 771072 29bd8080844c9bd4a0d2d2082a5fcb8b
.sflb2 28160 51aec6fbcfd2212d83bfa235783f575a
.rdata 248832 7a7421f9b059068aa76f8ba5f3cfb2ad
.data 1058304 6de64c31b288f9258cf44c853532eda8
.pdata 40960 f90f43db466a7f0f0a36c1b19a6854cd
.gfids 2048 be8a3a31dbfa1aff4f5d541e41c778ea
.tls 512 1f354d76203061bfdd5a53dae48d5435
.text2 1536 53e979547d8c2ea86560ac45de08ae25
.rsrc 1536 d70ae5eb37483d4c404be28c8d79cba1
.reloc 5632 82f80f1e187353390e6e18c396ff2dd5
.grcode 65536 b104ab2f68b944cddefdd8e06f2fc1da
.sfcode 53420032 f36e899a2afbd39d41563da4441275a6
.sfdata 12800 396203e860abb4a32c9506cc933bd5b9
.grdata 13824 2a5310caf74e7e1f1bf01323115f39ee

PE section names and hashes can reveal packing, injected resources, or unusual build artifacts. Sections with uncommon names, very large raw data, or hashes that differ from a trusted copy deserve additional review.

More information: