... much different and all based on presentation slides. Method advantages: - It is relatively new; - Can execute payload from memory (fileless); - Zombified target process has legitimate look; - It is Windows design feature, not a bug or vulnerability not in NTFS not in loader, nothing to fix here; ...