IUProcessFilter.sys threat report

MD5 4322a290dfabdd836af0c0cabd5dcd20
Latest seen 2026-05-02 23:01:27 (2 days ago)
First seen 2022-05-06 23:21:49 (3 years ago)
Size 18 KB
Publisher IObit
Product Uninstaller
Signed by IObit CO., LTD

This report summarizes the file identity, detection status, publisher metadata, observed locations, and technical indicators for IUProcessFilter.sys. ThreatInfo currently classifies this sample as PUP.Gen.

GridinSoft Anti-Malware detection

GridinSoft already detects this file

The latest ThreatInfo record shows IUProcessFilter.sys detected as PUP.Gen. You can download GridinSoft Anti-Malware to scan the system and remove this detection if the file is present on your device.

Detection name
PUP.Gen
Last analysis
2026-05-02 23:01:27 (2 days ago)
File hash
4322a290dfabdd836af0c0cabd5dcd20
Download Anti-Malware

IUProcessFilter.sys is a Windows file recorded in the ThreatInfo database. It is associated with Uninstaller. The reported company name is IObit. The current detection status is PUP.Gen, based on the latest analysis from 2026-05-02 23:01:27 (2 days ago).

If IUProcessFilter.sys appears on your computer unexpectedly, treat it as suspicious. Check its location, digital signature, and recent system changes before allowing it to run. A full anti-malware scan is recommended when this file is detected as PUP.Gen.

Product Name: Uninstaller
Company Name: IObit
MD5: 4322a290dfabdd836af0c0cabd5dcd20
Size: 18 KB
First Published: 2022-05-06 23:21:49 (3 years ago)
Latest Published: 2026-05-02 23:01:27 (2 days ago)
Status: PUP.Gen (on last analysis)
Analysis Date: 2026-05-02 23:01:27 (2 days ago)
IUProcessFilter.sys detection screenshot

The screenshot is a visual record of a GridinSoft Anti-Malware detection for this sample. Use the hash and metadata above as the primary identifiers when comparing the file on your system.

Signed By: IObit CO., LTD
Status: Valid

The signature on IUProcessFilter.sys is reported as valid. A valid signature helps confirm publisher identity, but it does not automatically make the file safe if the installer was bundled, abused, or downloaded from an untrusted source.

%programfiles%\iobit\iobit uninstaller\drivers
%programfiles%\iobit\iobit uninstaller\drivers
%programfiles%\iobit\iobit uninstaller\drivers
%programfiles%\iobit\iobit uninstaller\drivers
%programfiles%\iobit\iobit uninstaller\drivers
%programfiles%\iobit\iobit uninstaller\drivers
%programfiles%\iobit\iobit uninstaller\drivers
%programfiles%\iobit\iobit uninstaller\drivers
%programfiles%\iobit uninstaller\drivers
%programfiles%\iobit\iobit uninstaller\drivers

ThreatInfo has observed IUProcessFilter.sys in the locations listed above. Files found in temporary folders, user profile folders, startup locations, or unusual application directories should be reviewed more carefully than files installed under a known program directory.

13.3%
13.3%
13.3%
6.7%
6.7%
6.7%
6.7%
6.7%
6.7%
6.7%
6.7%
6.7%

The strongest geographic signal for this file is Argentina with 13.3% of observed hits. Geographic distribution can help identify targeted campaigns, regional software bundles, or where a file is most commonly reported.

Windows 10 100.0%

The most common operating system signal for IUProcessFilter.sys is Windows 10 with 100.0% of observed hits. If your system differs from the common profile, check whether the file was introduced by a specific installer, archive, or removable device.

IUProcessFilter.sys is identified as pe for 32 systems. The subsystem is Native. PE header values are useful for triage, especially when they do not match the expected publisher, product, or release timeline.

Subsystem: Native
PE Type: pe
OS Bitness: 32
Image Base: 0x00010000
Entry Address: 0x0000503e

PE Sections:

Name Size of data MD5
.text 4608 3657e873fceb1ef1e69bc87e83defba6
.rdata 512 0cebe050bef7fc105bdb3b26c69a5954
.data 512 d3e2ac459bae8be2dc63727d2659be45
INIT 1024 bfed9d971e4fa2943afbc3effffc28d7
.rsrc 1024 a8e7952a36f9bd32da0868dff84f3b82
.reloc 512 10c846fe424a1ed7e457d1b2a596e1be

PE section names and hashes can reveal packing, injected resources, or unusual build artifacts. Sections with uncommon names, very large raw data, or hashes that differ from a trusted copy deserve additional review.

More information: