Hide Navigation Hide TOC Potential PowerShell Obfuscation Via WCHAR (e312efd0-35a1-407f-8439-b8d434b438a6) Detects suspicious encoded character syntax often used for defense evasion Cluster A Galaxy A Cluster B Galaxy B Level Obfuscated Files or Information - T1027 (b3d682b6-98f2-4fb0-aa3b-b4df007ca70a) Attack Pattern Potential PowerShell Obfuscation Via WCHAR (e312efd0-35a1-407f-8439-b8d434b438a6) Sigma-Rules 1 PowerShell - T1059.001 (970a3432-3237-47ad-bcca-7d8cbb217736) Attack Pattern Potential PowerShell Obfuscation Via WCHAR (e312efd0-35a1-407f-8439-b8d434b438a6) Sigma-Rules 1 PowerShell - T1059.001 (970a3432-3237-47ad-bcca-7d8cbb217736) Attack Pattern Command and Scripting Interpreter - T1059 (7385dfaf-6886-4229-9ecd-6fd678040830) Attack Pattern 2