代码搜索结果
找到约 10,000 项符合
State Machine 的代码
7691.txt
Rule:
--
Sid:
7691
--
Summary:
This event is generated when activity relating to the "evade" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machine
7646.txt
Rule:
--
Sid:
7646
--
Summary:
This event is generated when activity relating to the "snipernet 2.1" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted
6158.txt
Rule:
--
Sid:
6158
--
Summary:
This event is generated when activity relating to the "satanz Backdoor" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targete
7619.txt
Rule:
--
Sid:
7619
--
Summary:
This event is generated when activity relating to the "theef 2.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mach
6401.txt
Rule:
--
Sid:
6401
--
Summary:
This event is generated when activity relating to the "snowdoor" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machi
10076.txt
Rule:
--
Sid:
10076
--
Summary:
This event is generated when activity relating to the "Peacomm" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machi
7096.txt
Rule:
--
Sid:
7096
--
Summary:
This event is generated when activity relating to the "remote hack 1.5" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targete
10451.txt
Rule:
--
Sid:
10451
--
Summary:
This event is generated when activity relating to the "only 1 rat" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted ma
6059.txt
Rule:
--
Sid:
6059
--
Summary:
This event is generated when activity relating to the "neurotickat1.3" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted
7670.txt
Rule:
--
Sid:
7670
--
Summary:
This event is generated when activity relating to the "digital upload" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted