Hide Navigation Hide TOC Potentially Suspicious PowerShell Child Processes (e4b6d2a7-d8a4-4f19-acbd-943c16d90647) Detects potentially suspicious child processes spawned by PowerShell Cluster A Galaxy A Cluster B Galaxy B Level Potentially Suspicious PowerShell Child Processes (e4b6d2a7-d8a4-4f19-acbd-943c16d90647) Sigma-Rules PowerShell - T1059.001 (970a3432-3237-47ad-bcca-7d8cbb217736) Attack Pattern 1 Command and Scripting Interpreter - T1059 (7385dfaf-6886-4229-9ecd-6fd678040830) Attack Pattern PowerShell - T1059.001 (970a3432-3237-47ad-bcca-7d8cbb217736) Attack Pattern 2