In this article, we'll look at how Clipboard works and focus on copied or cut data that we capture.

 

Today we’ll take a closer look at how the content of infected libraries is running into running processes, or how to deploy moduls - Inline Hooking Dll. 

 

Detect target, exit ... and after a certain number of exits, destroy the computer ...

 

In this example, I will show - describe the way the malware module works, namely the keylogger.

In this example, I will use the option HOOKING, specificl fuctnions called CallBack.

  

Have you ever think about what rights your created file has, or what access rights I can use, what is UAC at all, how does "As Administrator" launch right work, and how to abuse it all?

 

Sample code for the first malware module, Watcher.