HackTool - Pypykatz Credentials Dumping Activity (a29808fd-ef50-49ff-9c7a-59a9b040b404)
Detects the usage of "pypykatz" to obtain stored credentials. Adversaries may attempt to extract credential material from the Security Account Manager (SAM) database through Windows registry where the SAM database is stored