代码搜索结果
找到约 10,000 项符合
State Machine 的代码
13877.txt
Rule:
--
Sid:
13877
--
Summary:
This event is generated when activity relating to the "trojan-spy.win32.delf.uv" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of t
13941.txt
Rule:
--
Sid:
13941
--
Summary:
This event is generated when activity relating to the "trojan agent.nac" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targe
7617.txt
Rule:
--
Sid:
7617
--
Summary:
This event is generated when activity relating to the "theef 2.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mach
7719.txt
Rule:
--
Sid:
7719
--
Summary:
This event is generated when activity relating to the "dameware mini remote control" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control o
7671.txt
Rule:
--
Sid:
7671
--
Summary:
This event is generated when activity relating to the "digital upload" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted
7793.txt
Rule:
--
Sid:
7793
--
Summary:
This event is generated when activity relating to the "remote anything 5.11.22" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the
6334.txt
Rule:
--
Sid:
6334
--
Summary:
This event is generated when activity relating to the "backlash" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machi
10114.txt
Rule:
--
Sid:
10114
--
Summary:
This event is generated when activity relating to the "Peacomm" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machi
13248.txt
Rule:
--
Sid:
13248
--
Summary:
This event is generated when activity relating to the "yuri 1.2" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mach
10067.txt
Rule:
--
Sid:
10067
--
Summary:
This event is generated when activity relating to the "Peacomm" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machi