- An attacker uploads a malicious DLL to a shared network directory. A trusted application mistakenly loads this DLL, allowing the attacker to execute arbitrary code.
- A developer downloads a series of DLL files and their corresponding application files from a secure repository for testing purposes.