Does anyone know if BranchIO is malware?

chris m 20 Reputation points
2026-01-19T02:52:24.8633333+00:00

On my personal computer it has been very slow recently. I looked through my registry editor and saw BranchIO and clicked it and everything seemed normal but it went from BranchIO to key_live_pfaVqo.... to session, in session it had 4 files, default, identity,randomized_bundle_token, and randomized_device_token. I checked this because something had been running commands randomly in event viewer it was and event id 4624 and then a 4672 and it kept repeating those two events. Any and all advice is greatly appreciated.

Windows for home | Windows 10 | Security and privacy
0 comments No comments
{count} votes

Answer accepted by question author
  1. Alex-L 2,665 Reputation points Microsoft External Staff Moderator
    2026-01-19T07:25:39.8166667+00:00

    Hi chris m

    Thanks for posting in the Microsoft Q&A Forum!

    I’m really sorry you’re dealing with all this. Sudden Event Viewer activity paired with a Trojan alert can be stressful, so you’re on track to double‑check everything. I’ll try to break things down as clearly as possible.

    1)BranchIO is safe and not related to your security events

    The BranchIO registry key you found is not malware and not a Windows system component. It comes from the Branch.io SDK, which is used by many legitimate apps (games, installers, mobile‑linked apps, analytics tools, etc.).

    Here is the Microsoft Learn thread confirming that the BranchIO registry key is harmless: https://learn.microsoft.com/en-us/answers/questions/4023467/registry-related?page=2#answers

    In that thread, DaveM121 (Microsoft Independent Advisor) states:

    “That BranchIO registry key is doing no harm on your PC, you should not touch that registry key.”

    So yes, BranchIO is safe and not related to the Event Viewer logs you’re seeing.

    Those events occur at a much deeper system level. BranchIO does not have that kind of access or functionality.

    2)What do these Event IDs mean?

    • 4624 – Successful logon
    • 4672 – Special admin privileges used
    • 4798 – Group membership enumeration (often used by malware to check privileges)
    • 5058 / 5061 – Key/cryptographic operations
    • 5379 – Credential Manager access (repeated entries can indicate password harvesting)

    Especially when they appear back‑to‑back or in large batches, they can be signs of:

    • leftover malware components
    • credential‑stealing tools
    • malicious scheduled tasks
    • unauthorized background services
    • a Trojan that wasn’t fully removed

    3)What you can do about the other suspicious Registry/System Behavior

    Here are safe steps you can take next:

    A. Run Microsoft Defender offline scan

    Windows Security → Virus & threat protection → Scan options → Microsoft Defender Offline scan

    B. Check for persistence methods

    Malware often stays alive using:

    • Task Scheduler
    • Startup items (Run keys)
    • Services

    You can safely inspect these:

    Task Scheduler: taskschd.msc Look for newly created tasks or tasks with random names.

    Startup registry keys:

    HKCU\Software\Microsoft\Windows\CurrentVersion\Run

    HKLM\Software\Microsoft\Windows\CurrentVersion\Run

    Services: services.msc Look for services with:

    • random names
    • no description
    • recent installation

    If you want, you can list suspicious entries by name and someone can help identify them.

    C. Reset your passwords

    Because Event ID 5379 suggests something accessed Credential Manager.

    D. As a last resort, consider a clean reinstall

    If suspicious activity continues even after cleaning, a fresh install guarantees the system is safe.

    Hope this can help providing additional information. Feel free to update here if anything comes up!


    If the answer is helpful, please click "Accept Answer" and kindly upvote it. If you have extra questions about this answer, please click "Comment".

    Note: Please follow the steps in our documentation to enable e-mail notifications if you want to receive the related email notification for this thread.


1 additional answer

Sort by: Most helpful
  1. chris m 20 Reputation points
    2026-01-19T02:57:52.97+00:00

    I forgot to mention it also executes event id 5058 and 5061. 5058 Other system events, and 5061 system integrity. I hope this added information can help and if anyone needs anything else to help diagnose my issue I can send pictures of the problems. (Edit) my computer just notified me that a Trojan was trying to activate and I quarantined and removed it successfully I hope. But I'm pretty sure there is still something deeper that is causing malfunctions and problems for me. (2nd edit) i just saw that in event viewer and in the security tab of windows logs was 3 back to back id 4798, user account management. It stated that a user's local group membership was enumerated. I have no idea what that means and I hope it was just removing the Trojan and not adding more malware or hurting files.


Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.