Tedi Heriyanto<p>DFIR Next Steps: What To Do After You Find a Suspicious Use Of certutil.exe: <a href="https://www.cybertriage.com/dfir-next-steps/dfir-next-steps-what-to-do-after-you-find-a-suspicious-use-of-certutil-exe/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cybertriage.com/dfir-next-step</span><span class="invisible">s/dfir-next-steps-what-to-do-after-you-find-a-suspicious-use-of-certutil-exe/</span></a></p><p><a href="https://infosec.exchange/tags/dfir" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dfir</span></a> <a href="https://infosec.exchange/tags/certutil" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>certutil</span></a></p>