Adversaries may execute their own malicious payloads by hijacking the way operating systems run programs.
Sub-techniques
T1574.001 T1574.002 T1574.004 T1574.005 T1574.006 T1574.007 T1574.008 T1574.009 T1574.010 T1574.011 T1574.012 T1574.013 T1574.014
See: MITRE ATT&CK