Although a typical malware attack on the Windows platform involves dropping an executable file on the disk, a fileless attack bypasses this stage thus trying to evade protection. The initial attack usually starts from an exploit, a script or Office macro.