In this article, we'll look at how Clipboard works and focus on copied or cut data that we capture.


Today we’ll take a closer look at how the content of infected libraries is running into running processes, or how to deploy moduls - Inline Hooking Dll. 


Detect target, exit ... and after a certain number of exits, destroy the computer ...


In this example, I will show - describe the way the malware module works, namely the keylogger.

In this example, I will use the option HOOKING, specificl fuctnions called CallBack.


Have you ever think about what rights your created file has, or what access rights I can use, what is UAC at all, how does "As Administrator" launch right work, and how to abuse it all?


Sample code for the first malware module, Watcher.