代码搜索结果
找到约 10,000 项符合
State Machine 的代码
10065.txt
Rule:
--
Sid:
10065
--
Summary:
This event is generated when activity relating to the "Peacomm" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machi
7731.txt
Rule:
--
Sid:
7731
--
Summary:
This event is generated when activity relating to the "outbreak_0.2.7" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted
6086.txt
Rule:
--
Sid:
6086
--
Summary:
This event is generated when activity relating to the "autospy" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machin
7732.txt
Rule:
--
Sid:
7732
--
Summary:
This event is generated when activity relating to the "outbreak_0.2.7" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted
6321.txt
Rule:
--
Sid:
6321
--
Summary:
This event is generated when activity relating to the "ptakks2.1" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mach
12243.txt
Rule:
--
Sid:
12243
--
Summary:
This event is generated when activity relating to the "hotmail hacker log edition 5.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and contro
7728.txt
Rule:
--
Sid:
7728
--
Summary:
This event is generated when activity relating to the "radmin" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machine
7606.txt
Rule:
--
Sid:
7606
--
Summary:
This event is generated when activity relating to the "katux 2.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mach
7792.txt
Rule:
--
Sid:
7792
--
Summary:
This event is generated when activity relating to the "remote anything 5.11.22" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the
7641.txt
Rule:
--
Sid:
7641
--
Summary:
This event is generated when activity relating to the "am remote client" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the target