When the executable is launched, Windows will prioritize it over its native DLL as long as it has the same name. When the DLL is loaded in this attack, it will create two threads, one that loads Pupy ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results