Theory: Areas for hiding programs, Running a program as a system service, Dll spoofing

Please see the PDF attached