Theory: Areas for hiding programs, Running a program as a system service, Dll spoofing
Please see the PDFÂ attached