>
Windows Syscalls
Syscalls
Version map
ATT&CK
Malware
Generator
Syscall graph
Blog
Language
EN — English
FR — Français
ES — Español
DE — Deutsch
← Back to ATT&CK index
T1543.003
sub-technique
Create or Modify System Process: Windows Service
View on attack.mitre.org →
1 syscalls implement this technique
NtLoadDriver
Loads a kernel-mode driver from a registry-described service entry — the BYOVD entry point.