A remote code vulnerability exists when Windows fails to validate the authenticity of a module before loading it in run-time. An attacker who successfully exploited the vulnerability could execute arbitrary code in the context of the user running the affected application.
Apply associated Trend Micro DPI Rules.