Jump to content

AlisVeritas

Member
  • Posts

    2
  • Joined

  • Last visited

Awards

This user doesn't have any awards

AlisVeritas's Achievements

  1. Thanks for the reply. I was just wondering if there is some user grade way of seeing any malicious activities that may have been conducted on your machine, without full fledged investigation into every account and system that one is using. About the name I meant more specifically not the Trojan part but the type. In the case above DELU. Don't know if there's a list somewhere of what each variant of a trojan does.
  2. Hey all, So here's the situation. At work I had a colleague forward an email asking if it was legitimate. Upon quickly determining it was phishing I asked if she had opened the attached file, and she had. After installing Bitdefender on her machine it did turn out an infection (Trojan.Agent.DELU) and there were some shady files in the startup that started a windows process marked as vulnerability. And here comes the topic question: Can you retroactively find out what had been done to your PC after threat detection? Without a priori installing monitoring and logging software, can you find out what had been done to your system? And does the Trojan name giveaway somehow the possible vulnerabilities that were exploited or all of them are backdoors into everything?
×