After the weapon is delivered to the victim, follows the targetingof an application or vulnerability of the operating system. The infected filecan be used by the self-execution facility to launch the malware code, or itcan be executed by the user himself;