DFSP # 245 - Fetch and Execute
This week I talk about the use of RUNDLL32 to exploit information files (.INF) to "fetch and execute" malware.
This week I talk about the use of RUNDLL32 to exploit information files (.INF) to "fetch and execute" malware.