Sample code for the first malware module, Watcher.

 

Detect target, exit ... and after a certain number of exits, destroy the computer ...

Have you ever think about what rights your created file has, or what access rights I can use, what is UAC at all, how does "As Administrator" launch right work, and how to abuse it all?