A SOC analyst establishes a remote control session on an end user’s machine and discovers the following in a file:
gmail.com[ENT][email protected][ENT]NoOneCanGuessThis123! [ENT]Hello Susan, it was great to see you the other day! Let’s plan a followup[BACKSPACE]follow-up meeting soon. Here is the link to register. [RTN][CTRL]c [CTRL]v [RTN]after[BACKSPACE]After you register give me a call on my cellphone.
Which of the following actions should the SOC analyst perform first?
nocwyn
1 month, 3 weeks agonocwyn
1 month, 3 weeks agocab08df
2 months, 3 weeks agofc040c7
3 months, 1 week agoAriGarcia
3 months, 1 week agoBunaventi
3 months, 1 week agob422ce6
3 months, 1 week ago1eccfc0
3 months, 2 weeks agoClau95
3 months, 2 weeks ago