We generate and update the correlation policies and danger indicators necessary to continually detect and forestall attacks.Creating a scheduled undertaking to execute the malware applying PowerShell. PowerShell will decompress and decrypt the ultimate payload (Support) that may be injected in to the winlogon.exe approach and executed by way of dll