New, unrecognized entries in your "Startup" apps.

If you executed the file, treat your passwords as compromised. Change your main email and banking passwords from a different, clean device .

Unusual .exe names running in Task Manager that consume high CPU or Memory.

The file may use "obfuscation" to hide its true intent from antivirus software until it is extracted and run. Signs of Compromise

Unusual outgoing connections to unknown IP addresses (often used to send stolen data to a "Command and Control" server). Recommended Actions