Introduction - If you have any usage issues, please Google them yourself
DLL hijacking as an executable file is run, Windows loader maps the executable module to the process' s address space, executable module loader of the input table and try to find any required DLL, and they mapped to the process' s address space.