Solution
Short answer: it’s most likely a local program / scheduled task / leftover startup entry and not “someone remotely popping up windows” — but it can be suspicious if the process path is odd (Temp, user profile, unsigned, or a renamed system binary). Below are practical steps to determine exactly which application is creating the “IP SERVER” popup and what to do depending on what you find.
Before we start
Before we start
- Can you paste the exact text shown in the popup or upload a screenshot? That often points directly to the culprit. safe)
1) Task Manager — Command line - When the popup appears, open Task Manager (Ctrl+Shift+Esc) → Details tab → right‑click header → Select columns → enable Command line. Reproduce the popup and look for newly...
- Joined
- Mar 14, 2023
- Messages
- 101,371
Short answer: it’s most likely a local program / scheduled task / leftover startup entry and not “someone remotely popping up windows” — but it can be suspicious if the process path is odd (Temp, user profile, unsigned, or a renamed system binary). Below are practical steps to determine exactly which application is creating the “IP SERVER” popup and what to do depending on what you find.
Before we start
3) Autoruns (Sysinternals)
If the quick checks don’t showtor (Procmon) to capture the creator process (this will tell you exactly which binary launched the popup):
Before we start
- Can you paste the exact text shown in the popup or upload a screenshot? That often points directly to the culprit. safe)
1) Task Manager — Command line - When the popup appears, open Task Manager (Ctrl+Shift+Esc) → Details tab → right‑click header → Select columns → enable Command line. Reproduce the popup and look for newly started processes and their command lines. This often reveals the exact executable/path.
3) Autoruns (Sysinternals)
- Download/rund inspect Logon, Scheduled Tasks, Services, and Drivers tabs. It shows everything that can start at boot and is great for finding odd entries you missed.
If the quick checks don’t showtor (Procmon) to capture the creator process (this will tell you exactly which binary launched the popup):
- Download Procmon (Sysinternals) and run as Administrator.
- Stop capture, clear the log, then add a filter:
- Filter: Operation is Process Create → Include.
- (If the popup looks like a CMD window, also add: Process Name is cmd.exe → Include.
- Start capture, reproduce the popup once, stop capture.
- Look for the Process Create events and check the Image / CommandLine / Parent PID columns — you’ll see the full path and parent process that started the popup. That identifies the initiating application. Procmon is the most reliable method to find transient, short‑lived processes.
- Use elevated netstat opup is present:
- netstat -abno | findstr /i "LISTEN ESTABLISHED" (admin required)
- Or use TCPView (Sysinternals) to see live connections and owning processes. Match the PID → Get-Process -Id <pid> to find path. For similar “netsh / IP” popups, users often tracked netsh.exe via Procmon/Autoruns.
- If process path is in Program Files, signed, and vendor‑named (printer, VPN, Bonjour, AV, virtualization helpers, etc. it’s probably benign.
- If path is in %TEMP%, user profile, odd folder, unsigned, or name looks like Windows but is in the wrong location → treat as suspicious. Run full AV + Malwarebytes scan and consider isolating the machine until clean.
- Clean boot (msconfig: hide Microsoft services → disable others, then reboot) to see if it stops, then re-ee to find the offender.
- If you suspect system corruption: run DISM /Online /Cleanup-Image /RestoreHealth then sfc /scannow.
- Or if you upthe popup (or paste the exact text), I’ll try to identify the likely app immediately and give the precise next command to run.