Persistence Via Sticky Key Backdoor (1070db9a-3e5d-412e-8e7b-7183b616e1b3)
By replacing the sticky keys executable with the local admins CMD executable, an attacker is able to access a privileged windows console session without authenticating to the system. When the sticky keys are "activated" the privilleged shell is launched.