代码搜索结果
找到约 10,000 项符合
State Machine 的代码
6168.txt
Rule:
--
Sid:
6168
--
Summary:
This event is generated when activity relating to the "unicorn" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machin
7704.txt
Rule:
--
Sid:
7704
--
Summary:
This event is generated when activity relating to the "roach 1.0 server installation notification - email" Trojan Horse program is detected.
--
Impact:
Possible theft
6291.txt
Rule:
--
Sid:
6291
--
Summary:
This event is generated when activity relating to the "justjoke v2.6" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted
7699.txt
Rule:
--
Sid:
7699
--
Summary:
This event is generated when activity relating to the "brain wiper" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted ma
12153.txt
Rule:
--
Sid:
12153
--
Summary:
This event is generated when activity relating to the "optix pro v1.32" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the target
12238.txt
Rule:
--
Sid:
12238
--
Summary:
This event is generated when activity relating to the "theef 2.10" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted ma
6050.txt
Rule:
--
Sid:
6050
--
Summary:
This event is generated when activity relating to the "fun factory" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted ma
7678.txt
Rule:
--
Sid:
7678
--
Summary:
This event is generated when activity relating to the "cool remote control 1.12" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of th
6318.txt
Rule:
--
Sid:
6318
--
Summary:
This event is generated when activity relating to the "rtb666" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machine
10102.txt
Rule:
--
Sid:
10102
--
Summary:
This event is generated when activity relating to the "crossfires trojan 3.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the