If malware was intercepted by its signature on the outer defense rings, it could not cause any damage yet. Only when the code contained in the code is actually executed and gets computing time in the processor can it unfold its potential. Once a malware has overcome all levels and is activated on the client,