代码搜索结果
找到约 10,000 项符合
State Machine 的代码
6141.txt
Rule:
--
Sid:
6141
--
Summary:
This event is generated when activity relating to the "hellzaddiction v1.0e" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the ta
7715.txt
Rule:
--
Sid:
7715
--
Summary:
This event is generated when activity relating to the "netdevil" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machi
11950.txt
Rule:
--
Sid:
11950
--
Summary:
This event is generated when activity relating to the "killav_gj" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mac
12237.txt
Rule:
--
Sid:
12237
--
Summary:
This event is generated when activity relating to the "theef 2.10" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted ma
7790.txt
Rule:
--
Sid:
7790
--
Summary:
This event is generated when activity relating to the "forced control uploader" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the
13878.txt
Rule:
--
Sid:
13878
--
Summary:
This event is generated when activity relating to the "trojan-spy.win32.delf.uv" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of t
6106.txt
Rule:
--
Sid:
6106
--
Summary:
This event is generated when activity relating to the "alvgus 2000" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted ma
7059.txt
Rule:
--
Sid:
7059
--
Summary:
This event is generated when activity relating to the "charon" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machine
7711.txt
Rule:
--
Sid:
7711
--
Summary:
This event is generated when activity relating to the "amitis runtime command detection attacker to victim" Trojan Horse program is detected.
--
Impact:
Possible thef
7618.txt
Rule:
--
Sid:
7618
--
Summary:
This event is generated when activity relating to the "theef 2.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mach