Checking Established Network
This page demonstrates how to check if our Windows PC is compromised.
Last updated
This page demonstrates how to check if our Windows PC is compromised.
Last updated
This process refers to . Please see it for more details.
What first we need to check is to see the network status on Command Prompt.
Especially, "ESTABLISHED" status might be suspicious to be connected attackers server. So we need to investigate the IP address which is connected with our machine.
Let's OSINT.
Copy the ip address and paste it into IP lookup site like . Then check who owns that ip address. If the famous (reliable) organization owns it, we may be relax. However, unknown organization or individual owns it, we have to doubt this ip. So paste the ip address into to check if it is an evil or not.
If the ip address is still suspicious, we need to do additional investigation.
Copy the PID at the right of "ESTABLISHED" in suspicious line in Command Prompt.
Open Task Manager and click Details section in the left side menu.
On Task Manger, put the PID into the search field, then find target process.
Right-click on the process and go to Properties. Then check the program details in Details tab.
On Task Manager, right-click on the suspicious process then click Open File Location.
In Windows Explorer, delete the file after checking this file is really not innecent file associated with our Windows machine.