代码搜索结果
找到约 10,000 项符合
State Machine 的代码
13507.txt
Rule:
--
Sid:
13507
--
Summary:
This event is generated when activity relating to the "evilotus 1.3.2" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targete
10078.txt
Rule:
--
Sid:
10078
--
Summary:
This event is generated when activity relating to the "W32.Nuwar.AY" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted
7061.txt
Rule:
--
Sid:
7061
--
Summary:
This event is generated when activity relating to the "charon" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machine
7093.txt
Rule:
--
Sid:
7093
--
Summary:
This event is generated when activity relating to the "uprising screen control 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of
1983.txt
Rule:
--
Sid:
1983
--
Summary:
Deepthroat is a Trojan Horse offering the attacker control of the target.
--
Impact:
Possible theft of data and control of the targeted machine leading to a compromis
7113.txt
Rule:
--
Sid:
7113
--
Summary:
This event is generated when activity relating to the "donalddick v1.5b3" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targe
7620.txt
Rule:
--
Sid:
7620
--
Summary:
This event is generated when activity relating to the "remote control 1.7" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targ
1980.txt
Rule:
--
Sid:
1980
--
Summary:
Deepthroat is a Trojan Horse offering the attacker control of the target.
--
Impact:
Possible theft of data and control of the targeted machine leading to a compromis
10443.txt
Rule:
--
Sid:
10443
--
Summary:
This event is generated when activity relating to the "acidbattery 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the target
10461.txt
Rule:
--
Sid:
10461
--
Summary:
This event is generated when activity relating to the "winicabras 1.1" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targete