代码搜索结果
找到约 10,000 项符合
State Machine 的代码
7628.txt
Rule:
--
Sid:
7628
--
Summary:
This event is generated when activity relating to the "skyrat show" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted ma
10074.txt
Rule:
--
Sid:
10074
--
Summary:
This event is generated when activity relating to the "Peacomm" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machi
7789.txt
Rule:
--
Sid:
7789
--
Summary:
This event is generated when activity relating to the "forced control uploader" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the
7611.txt
Rule:
--
Sid:
7611
--
Summary:
This event is generated when activity relating to the "flux 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machi
13506.txt
Rule:
--
Sid:
13506
--
Summary:
This event is generated when activity relating to the "evilotus 1.3.2" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targete
7714.txt
Rule:
--
Sid:
7714
--
Summary:
This event is generated when activity relating to the "netdevil" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machi
7084.txt
Rule:
--
Sid:
7084
--
Summary:
This event is generated when activity relating to the "erazer v1.1" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted ma
12166.txt
Rule:
--
Sid:
12166
--
Summary:
This event is generated when activity relating to the "lithium 1.02" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted
7778.txt
Rule:
--
Sid:
7778
--
Summary:
This event is generated when activity relating to the "elfrat" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machine
12151.txt
Rule:
--
Sid:
12151
--
Summary:
This event is generated when activity relating to the "cafeini 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted m