fig-01-how-weaponized-legitimate-tools-are-used-in-a-ransomware-campaign