What is mediasrv.png?

mediasrv.png is part of important and developed by important according to the mediasrv.png version information.

mediasrv.png's description is "important"

mediasrv.png is usually located in the 'c:\windows\branding\' folder.

Some of the anti-virus scanners at VirusTotal detected mediasrv.png.

If you have additional information about the file, please share it with the FreeFixer users by posting a comment at the bottom of this page.

Vendor and version information [?]

The following is the available information on mediasrv.png:

PropertyValue
Product nameimportant
Company nameimportant
File descriptionimportant
Internal nameimportant
Original filenameimportant
Legal copyrightCopyright (C) important solutions 2020
Product version3.2.5.7
File version1.2.5.7

Here's a screenshot of the file properties when displayed by Windows Explorer:

Product nameimportant
Company nameimportant
File descriptionimportant
Internal nameimportant
Original filenameimportant
Legal copyrightCopyright (C) important solutions 2020
Product version3.2.5.7
File version1.2.5.7

Digital signatures [?]

mediasrv.png is not signed.

VirusTotal report

41 of the 72 anti-virus programs at VirusTotal detected the mediasrv.png file. That's a 57% detection rate.

ScannerDetection Name
Acronis suspicious
Ad-Aware Trojan.GenericKD.43223624
AegisLab Trojan.Win32.Generic.4!c
AhnLab-V3 Malware/Win64.Generic.C4085677
Alibaba Trojan:Application/based.68a062fc
ALYac Trojan.GenericKD.43223624
APEX Malicious
Arcabit Trojan.Generic.D2938A48
Avast Win64:TrojanX-gen [Trj]
AVG Win64:TrojanX-gen [Trj]
Avira HEUR/AGEN.1108462
BitDefender Trojan.GenericKD.43223624
CAT-QuickHeal Trojan.Wacatac
Cylance Unsafe
DrWeb Trojan.Siggen9.43740
Emsisoft Trojan.Agent (A)
Endgame malicious (high confidence)
ESET-NOD32 a variant of Win64/RA-based.D
F-Secure Heuristic.HEUR/AGEN.1108462
FireEye Generic.mg.6f37ab14cba1927a
Fortinet W64/RA_based.D!tr
GData Win64.Trojan.BackdoorTrmnl.A
Ikarus Trojan.Win64.Ra
K7AntiVirus Trojan ( 0055c4051 )
K7GW Trojan ( 0055c4051 )
MAX malware (ai score=84)
MaxSecure Trojan.Malware.101756211.susgen
McAfee Artemis!6F37AB14CBA1
McAfee-GW-Edition BehavesLike.Win64.Trojan.qc
Microsoft Trojan:Win32/Wacatac.C!ml
MicroWorld-eScan Trojan.GenericKD.43223624
Paloalto generic.ml
Qihoo-360 Win64/Trojan.d15
Rising Trojan.RA-based!8.80 (CLOUD)
Sophos Mal/Generic-S
Symantec Trojan.Gen.MBT
TrendMicro-HouseCall TROJ_GEN.R049H0CEQ20
VBA32 Trojan.Wacatac
VIPRE Trojan.Win32.Generic!BT
ViRobot Trojan.Win32.Z.Agent.56320.ALV
Webroot W32.Trojan.Gen
41 of the 72 anti-virus programs detected the mediasrv.png file.

Sandbox Report

The following information was gathered by executing the file inside Cuckoo Sandbox.

Summary

Successfully executed process in sandbox.

Summary

{
    "dll_loaded": [
        "kernel32",
        "api-ms-win-core-fibers-l1-1-1",
        "api-ms-win-core-localization-l1-2-1",
        "KERNEL32.DLL",
        "C:\\Users\\cuck\\AppData\\Local\\Temp\\bbdc64e28bbb47b080408d570099df0ee2fbff9a88c6da16bdc455eb3d755ca8.bin.dll",
        "USER32.dll",
        "api-ms-win-core-synch-l1-2-0"
    ],
    "file_opened": [
        "C:\\Users\\cuck\\AppData\\Local\\Temp\\bbdc64e28bbb47b080408d570099df0ee2fbff9a88c6da16bdc455eb3d755ca8.bin.dll"
    ],
    "command_line": [
        "\"C:\\Windows\\System32\\rundll32.exe\" C:\\Users\\cuck\\AppData\\Local\\Temp\\bbdc64e28bbb47b080408d570099df0ee2fbff9a88c6da16bdc455eb3d755ca8.bin.dll,DllMain"
    ],
    "file_exists": [
        "C:\\Users\\cuck\\AppData\\Local\\Temp\\bbdc64e28bbb47b080408d570099df0ee2fbff9a88c6da16bdc455eb3d755ca8.bin.dll",
        "C:\\Users\\cuck\\AppData\\Local\\Temp\\bbdc64e28bbb47b080408d570099df0ee2fbff9a88c6da16bdc455eb3d755ca8.bin.dll.manifest"
    ],
    "file_read": [
        "C:\\Users\\cuck\\AppData\\Local\\Temp\\bbdc64e28bbb47b080408d570099df0ee2fbff9a88c6da16bdc455eb3d755ca8.bin.dll"
    ],
    "regkey_read": [
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\GRE_Initialize\\DisableMetaFiles"
    ]
}

Generic

[
    {
        "process_path": "C:\\Windows\\SysWOW64\\rundll32.exe",
        "process_name": "rundll32.exe",
        "pid": 2436,
        "summary": {
            "dll_loaded": [
                "C:\\Users\\cuck\\AppData\\Local\\Temp\\bbdc64e28bbb47b080408d570099df0ee2fbff9a88c6da16bdc455eb3d755ca8.bin.dll"
            ],
            "file_opened": [
                "C:\\Users\\cuck\\AppData\\Local\\Temp\\bbdc64e28bbb47b080408d570099df0ee2fbff9a88c6da16bdc455eb3d755ca8.bin.dll"
            ],
            "command_line": [
                "\"C:\\Windows\\System32\\rundll32.exe\" C:\\Users\\cuck\\AppData\\Local\\Temp\\bbdc64e28bbb47b080408d570099df0ee2fbff9a88c6da16bdc455eb3d755ca8.bin.dll,DllMain"
            ],
            "file_exists": [
                "C:\\Users\\cuck\\AppData\\Local\\Temp\\bbdc64e28bbb47b080408d570099df0ee2fbff9a88c6da16bdc455eb3d755ca8.bin.dll",
                "C:\\Users\\cuck\\AppData\\Local\\Temp\\bbdc64e28bbb47b080408d570099df0ee2fbff9a88c6da16bdc455eb3d755ca8.bin.dll.manifest"
            ],
            "file_read": [
                "C:\\Users\\cuck\\AppData\\Local\\Temp\\bbdc64e28bbb47b080408d570099df0ee2fbff9a88c6da16bdc455eb3d755ca8.bin.dll"
            ],
            "regkey_read": [
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\GRE_Initialize\\DisableMetaFiles"
            ]
        },
        "first_seen": 1594219985.640625,
        "ppid": 2736
    },
    {
        "process_path": "C:\\Windows\\System32\\rundll32.exe",
        "process_name": "rundll32.exe",
        "pid": 2828,
        "summary": {
            "file_exists": [
                "C:\\Users\\cuck\\AppData\\Local\\Temp\\bbdc64e28bbb47b080408d570099df0ee2fbff9a88c6da16bdc455eb3d755ca8.bin.dll",
                "C:\\Users\\cuck\\AppData\\Local\\Temp\\bbdc64e28bbb47b080408d570099df0ee2fbff9a88c6da16bdc455eb3d755ca8.bin.dll.manifest"
            ],
            "regkey_read": [
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\GRE_Initialize\\DisableMetaFiles"
            ],
            "dll_loaded": [
                "kernel32",
                "api-ms-win-core-fibers-l1-1-1",
                "api-ms-win-core-localization-l1-2-1",
                "KERNEL32.DLL",
                "C:\\Users\\cuck\\AppData\\Local\\Temp\\bbdc64e28bbb47b080408d570099df0ee2fbff9a88c6da16bdc455eb3d755ca8.bin.dll",
                "USER32.dll",
                "api-ms-win-core-synch-l1-2-0"
            ]
        },
        "first_seen": 1594219985.796875,
        "ppid": 2436
    },
    {
        "process_path": "C:\\Windows\\System32\\lsass.exe",
        "process_name": "lsass.exe",
        "pid": 476,
        "summary": {},
        "first_seen": 1594219985.328125,
        "ppid": 376
    }
]

Signatures

[
    {
        "markcount": 2,
        "families": [],
        "description": "The binary likely contains encrypted or compressed data indicative of a packer",
        "severity": 2,
        "marks": [
            {
                "entropy": 7.9576311039308445,
                "section": {
                    "size_of_data": "0x0000d000",
                    "virtual_address": "0x0001b000",
                    "entropy": 7.9576311039308445,
                    "name": "UPX1",
                    "virtual_size": "0x0000d000"
                },
                "type": "generic",
                "description": "A section with a high entropy has been found"
            },
            {
                "entropy": 0.9629629629629629,
                "type": "generic",
                "description": "Overall entropy of this PE file is high"
            }
        ],
        "references": [
            "http:\/\/www.forensickb.com\/2013\/03\/file-entropy-explained.html",
            "http:\/\/virii.es\/U\/Using%20Entropy%20Analysis%20to%20Find%20Encrypted%20and%20Packed%20Malware.pdf"
        ],
        "name": "packer_entropy"
    },
    {
        "markcount": 2,
        "families": [],
        "description": "The executable is compressed using UPX",
        "severity": 2,
        "marks": [
            {
                "section": "UPX0",
                "type": "generic",
                "description": "Section name indicates UPX"
            },
            {
                "section": "UPX1",
                "type": "generic",
                "description": "Section name indicates UPX"
            }
        ],
        "references": [],
        "name": "packer_upx"
    }
]

Yara

The Yara rules did not detect anything in the file.

Network

{
    "tls": [],
    "udp": [
        {
            "src": "192.168.56.101",
            "dst": "192.168.56.255",
            "offset": 662,
            "time": 6.179084062576294,
            "dport": 137,
            "sport": 137
        },
        {
            "src": "192.168.56.101",
            "dst": "224.0.0.252",
            "offset": 5442,
            "time": 6.1146559715271,
            "dport": 5355,
            "sport": 51001
        },
        {
            "src": "192.168.56.101",
            "dst": "224.0.0.252",
            "offset": 5770,
            "time": 4.142915964126587,
            "dport": 5355,
            "sport": 53595
        },
        {
            "src": "192.168.56.101",
            "dst": "224.0.0.252",
            "offset": 6098,
            "time": 6.122106075286865,
            "dport": 5355,
            "sport": 53848
        },
        {
            "src": "192.168.56.101",
            "dst": "224.0.0.252",
            "offset": 6426,
            "time": 4.646744012832642,
            "dport": 5355,
            "sport": 54255
        },
        {
            "src": "192.168.56.101",
            "dst": "224.0.0.252",
            "offset": 6754,
            "time": 3.027959108352661,
            "dport": 5355,
            "sport": 55314
        },
        {
            "src": "192.168.56.101",
            "dst": "239.255.255.250",
            "offset": 7082,
            "time": 4.67746901512146,
            "dport": 1900,
            "sport": 1900
        },
        {
            "src": "192.168.56.101",
            "dst": "239.255.255.250",
            "offset": 16880,
            "time": 4.178124904632568,
            "dport": 3702,
            "sport": 49152
        },
        {
            "src": "192.168.56.101",
            "dst": "239.255.255.250",
            "offset": 25264,
            "time": 6.229167938232422,
            "dport": 1900,
            "sport": 53598
        }
    ],
    "dns_servers": [],
    "http": [],
    "icmp": [],
    "smtp": [],
    "tcp": [],
    "smtp_ex": [],
    "mitm": [],
    "hosts": [],
    "pcap_sha256": "09cf20c14181a0a3a886ef7ad28a75cbcdb91be9a9fdf35f8d2eef2739e0e54a",
    "dns": [],
    "http_ex": [],
    "domains": [],
    "dead_hosts": [],
    "sorted_pcap_sha256": "d7af16b23d76b6a98ebbb15e47c975946c7ca4689b67b9b4ffe9e700da083aa5",
    "irc": [],
    "https_ex": []
}

Screenshots

Screenshot from the sandboxScreenshot from the sandbox

mediasrv.png removal instructions

The instructions below shows how to remove mediasrv.png with help from the FreeFixer removal tool. Basically, you install FreeFixer, scan your computer, check the mediasrv.png file for removal, restart your computer and scan it again to verify that mediasrv.png has been successfully removed. Here are the removal instructions in more detail:

  1. Download and install FreeFixer: http://www.freefixer.com/download.html
  2. Start FreeFixer and press the Start Scan button. The scan will finish in approximately five minutes.
    Screenshot of Start Scan button
  3. When the scan is finished, locate mediasrv.png in the scan result and tick the checkbox next to the mediasrv.png file. Do not check any other file for removal unless you are 100% sure you want to delete it. Tip: Press CTRL-F to open up FreeFixer's search dialog to quickly locate mediasrv.png in the scan result.
    Red arrow point on the unwanted file
    c:\windows\branding\mediasrv.png
  4. Scroll down to the bottom of the scan result and press the Fix button. FreeFixer will now delete the mediasrv.png file.
    Screenshot of Fix button
  5. Restart your computer.
  6. Start FreeFixer and scan your computer again. If mediasrv.png still remains in the scan result, proceed with the next step. If mediasrv.png is gone from the scan result you're done.
  7. If mediasrv.png still remains in the scan result, check its checkbox again in the scan result and click Fix.
  8. Restart your computer.
  9. Start FreeFixer and scan your computer again. Verify that mediasrv.png no longer appear in the scan result.
Please select the option that best describe your thoughts on the removal instructions given above








Free Questionnaires

Hashes [?]

PropertyValue
MD56f37ab14cba1927ae217e918c855f1be
SHA256bbdc64e28bbb47b080408d570099df0ee2fbff9a88c6da16bdc455eb3d755ca8

What will you do with mediasrv.png?

To help other users, please let us know what you will do with mediasrv.png:



What did other users do?

The poll result listed below shows what users chose to do with mediasrv.png. 75% have voted for removal. Based on votes from 4 users.

User vote results: There were 3 votes to remove and 1 vote to keep

NOTE: Please do not use this poll as the only source of input to determine what you will do with mediasrv.png. Only 4 users has voted so far so it does not offer a high degree of confidence.

Comments

Please share with the other users what you think about this file. What does this file do? Is it legitimate or something that your computer is better without? Do you know how it was installed on your system? Did you install it yourself or did it come bundled with some other software? Is it running smoothly or do you get some error message? Any information that will help to document this file is welcome. Thank you for your contributions.

I'm reading all new comments so don't hesitate to post a question about the file. If I don't have the answer perhaps another user can help you.

No comments posted yet.

Leave a reply