Posted Yesterday, 08:32 PM Here are some screenshots of all the users on my computer and a wall of my security event logs all happening in under a second:
https://imgur.com/a/Y0Qdgy8 And I have attached the .txt version of the event viewer results, but here is the logs of a few of those events online al well:
https://pad.riseup.net/p/Impersonation_Builtin.Owner_-_Suspicious This is where it all started. I got an alert from Dell saying there was like 16 files that left almost all their computer's backdoors wide open to attacks.
https://www.bleepingcomputer.com/forums/t/777235/sign-in-by-someone-clearly-remotely-as-builtinowner-using-impersonation/#bleepingcomputer
Sinun täytyy kirjautua sisään ennen kuin voit kommentoida.