A SOC analyst establishes a remote control session on an end user’s machine and discovers the following in a file:
gmail.com[ENT][email protected][ENT]NoOneCanGuessThis123! [ENT]Hello Susan, it was great to see you the other day! Let’s plan a followup[BACKSPACE]follow-up meeting soon. Here is the link to register. [RTN][CTRL]c [CTRL]v [RTN]after[BACKSPACE]After you register give me a call on my cellphone.
Which of the following actions should the SOC analyst perform first?
nocwyn
3 months, 2 weeks agonocwyn
3 months, 2 weeks agocab08df
4 months, 1 week agofc040c7
4 months, 4 weeks agoAriGarcia
4 months, 4 weeks agoBunaventi
5 months agob422ce6
5 months ago1eccfc0
5 months agoClau95
5 months, 1 week ago