Any executable is vulnerable to DLL hijacking, they're just looking for easier targets that load known DLLs (with known function signatures) from their own folders (NOT system folders).
I'm assuming the goal is to minimise detection by what they call PSPs (av / security products)
[1] https://wikileaks.org/ciav7p1/cms/page_26968090.html