代码搜索结果
找到约 10,000 项符合
State Machine 的代码
7690.txt
Rule:
--
Sid:
7690
--
Summary:
This event is generated when activity relating to the "evade" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machine
6134.txt
Rule:
--
Sid:
6134
--
Summary:
This event is generated when activity relating to the "chupacabra 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted
6296.txt
Rule:
--
Sid:
6296
--
Summary:
This event is generated when activity relating to the "insurrection 1.1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targ
7775.txt
Rule:
--
Sid:
7775
--
Summary:
This event is generated when activity relating to the "messiah 4.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted ma
7064.txt
Rule:
--
Sid:
7064
--
Summary:
This event is generated when activity relating to the "cybernetic 1.62" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targete
6023.txt
Rule:
--
Sid:
6023
--
Summary:
This event is generated when activity relating to the "silent spy 2.10" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targete
6078.txt
Rule:
--
Sid:
6078
--
Summary:
This event is generated when activity relating to the "autospy" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machin
7637.txt
Rule:
--
Sid:
7637
--
Summary:
This event is generated when activity relating to the "hornet 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mac
12150.txt
Rule:
--
Sid:
12150
--
Summary:
This event is generated when activity relating to the "cafeini 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted m
6177.txt
Rule:
--
Sid:
6177
--
Summary:
This event is generated when activity relating to the "ultimate destruction" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the ta