代码搜索结果
找到约 10,000 项符合
State Machine 的代码
7110.txt
Rule:
--
Sid:
7110
--
Summary:
This event is generated when activity relating to the "vampire" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machin
12701.txt
Rule:
--
Sid:
12701
--
Summary:
This event is generated when activity relating to the "poison ivy 2.3.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targe
12142.txt
Rule:
--
Sid:
12142
--
Summary:
This event is generated when activity relating to the "access remote pc" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targe
6071.txt
Rule:
--
Sid:
6071
--
Summary:
This event is generated when activity relating to the "freak 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mach
7612.txt
Rule:
--
Sid:
7612
--
Summary:
This event is generated when activity relating to the "flux 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machi
7763.txt
Rule:
--
Sid:
7763
--
Summary:
This event is generated when activity relating to the "nt remote controller 2000" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of t
7816.txt
Rule:
--
Sid:
7816
--
Summary:
This event is generated when activity relating to the "darkmoon" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machi
12378.txt
Rule:
--
Sid:
12378
--
Summary:
This event is generated when activity relating to the "shark 2.3.2" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted m
7644.txt
Rule:
--
Sid:
7644
--
Summary:
This event is generated when activity relating to the "ullysse" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machin
8477.txt
Rule:
--
Sid:
8477
--
Summary:
This event is generated when activity relating to the "superspy 2.0 beta" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targe