代码搜索结果
找到约 10,000 项符合
State Machine 的代码
7103.txt
Rule:
--
Sid:
7103
--
Summary:
This event is generated when activity relating to the "gwboy 0.92" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mac
7720.txt
Rule:
--
Sid:
7720
--
Summary:
This event is generated when activity relating to the "desktop scout" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted
6181.txt
Rule:
--
Sid:
6181
--
Summary:
This event is generated when activity relating to the "netraider 0.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted
6025.txt
Rule:
--
Sid:
6025
--
Summary:
This event is generated when activity relating to the "tequila bandita 1.2" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the tar
7734.txt
Rule:
--
Sid:
7734
--
Summary:
This event is generated when activity relating to the "bionet 4.05" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted ma
7057.txt
Rule:
--
Sid:
7057
--
Summary:
This event is generated when activity relating to the "charon" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machine
6474.txt
Rule:
--
Sid:
6474
--
Summary:
This event is generated when activity relating to the "loosky" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machine
6128.txt
Rule:
--
Sid:
6128
--
Summary:
This event is generated when activity relating to the "dkangel" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machin
7108.txt
Rule:
--
Sid:
7108
--
Summary:
This event is generated when activity relating to the "undetected" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mac
6176.txt
Rule:
--
Sid:
6176
--
Summary:
This event is generated when activity relating to the "guptachar 2.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted