Tag
An adversary may attempt to bypass AMSI by creating a rogue AMSI DLL in an unusual location to evade detection.