In here contains CreateMountPoint.exe which can create the directory links.
Next, we can transfer our files to the target machine.
Next, we make a directory \mount\ and move version.dll into it.
We can then make a custom scan in TotalAV and scan our malicious file.
Great, TotalAV has detected the file and we can set our action to quarantine and click remove threats.
After version.dll is in quarantine, we can use CreateMountPoint.exe to link the mount directory to another location. In this case, we mount the directory to the .NET Framework location on this system.
We can then use Metasploit to receive our reverse shell connection.
The DLL needs to be loaded by a system process, so we reboot the target machine. After which, we receive a connection to our Metasploit listener and we get SYSTEM.