diff --git a/atomics/T1003/T1003.md b/atomics/T1003/T1003.md
index 9b80a39e..73bee9d6 100644
--- a/atomics/T1003/T1003.md
+++ b/atomics/T1003/T1003.md
@@ -248,9 +248,9 @@ reg save HKLM\security "#{output_folder}\security"
#### Cleanup Commands:
```
-rm "#{output_folder}\sam"
-rm "#{output_folder}\system"
-rm "#{output_folder}\security"
+del "#{output_folder}\sam" >nul 2> nul
+del "#{output_folder}\system" >nul 2> nul
+del "#{output_folder}\security" >nul 2> nul
```
@@ -277,7 +277,7 @@ ProcDump. The tool may be downloaded from https://docs.microsoft.com/en-us/sysin
#### Cleanup Commands:
```
-rm "#{output_file}"
+del "#{output_file}" >nul 2> nul
```
@@ -402,9 +402,9 @@ reg save HKLM\SYSTEM #{extract_path}\SYSTEM_HIVE
#### Cleanup Commands:
```
-rm "#{extract_path}\ntds.dit"
-rm "#{extract_path}\VSC_SYSTEM_HIVE"
-rm "#{extract_path}\SYSTEM_HIVE"
+del "#{extract_path}\ntds.dit" >nul 2> nul
+del "#{extract_path}\VSC_SYSTEM_HIVE" >nul 2> nul
+del "#{extract_path}\SYSTEM_HIVE" >nul 2> nul
```
diff --git a/atomics/index.yaml b/atomics/index.yaml
index ccb71f9b..1f7498a2 100644
--- a/atomics/index.yaml
+++ b/atomics/index.yaml
@@ -19786,9 +19786,9 @@ credential-access:
reg save HKLM\system "#{output_folder}\system"
reg save HKLM\security "#{output_folder}\security"
cleanup_command: |
- rm "#{output_folder}\sam"
- rm "#{output_folder}\system"
- rm "#{output_folder}\security"
+ del "#{output_folder}\sam" >nul 2> nul
+ del "#{output_folder}\system" >nul 2> nul
+ del "#{output_folder}\security" >nul 2> nul
- name: Dump LSASS.exe Memory using ProcDump
description: |
The memory of lsass.exe is often dumped for offline credential theft attacks. This can be achieved with Sysinternals
@@ -19808,7 +19808,7 @@ credential-access:
elevation_required: true
name: command_prompt
command: "#{procdump_binary_path} -accepteula -ma lsass.exe #{output_file}\n"
- cleanup_command: 'rm "#{output_file}"
+ cleanup_command: 'del "#{output_file}" >nul 2> nul
'
- name: Dump LSASS.exe Memory using Windows Task Manager
@@ -19913,9 +19913,9 @@ credential-access:
copy #{vsc_name}\Windows\System32\config\SYSTEM #{extract_path}\VSC_SYSTEM_HIVE
reg save HKLM\SYSTEM #{extract_path}\SYSTEM_HIVE
cleanup_command: |
- rm "#{extract_path}\ntds.dit"
- rm "#{extract_path}\VSC_SYSTEM_HIVE"
- rm "#{extract_path}\SYSTEM_HIVE"
+ del "#{extract_path}\ntds.dit" >nul 2> nul
+ del "#{extract_path}\VSC_SYSTEM_HIVE" >nul 2> nul
+ del "#{extract_path}\SYSTEM_HIVE" >nul 2> nul
- name: GPP Passwords (findstr)
description: 'Look for the encrypted cpassword value within Group Policy Preference
files on the Domain Controller. This value can be decrypted with gpp-decrypt