代码搜索结果
找到约 10,000 项符合
State Machine 的代码
10458.txt
Rule:
--
Sid:
10458
--
Summary:
This event is generated when activity relating to the "[x]-ztoo 1.0 or illusion" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of t
8080.txt
Rule:
--
Sid:
8080
--
Summary:
This event is generated when activity relating to the "x2a" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machine le
13944.txt
Rule:
--
Sid:
13944
--
Summary:
This event is generated when activity relating to the "trojan downloader small.gy" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of
7068.txt
Rule:
--
Sid:
7068
--
Summary:
This event is generated when activity relating to the "delta source 0.5 beta" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the t
12727.txt
Rule:
--
Sid:
12727
--
Summary:
This event is generated when activity relating to the "bandook 1.35" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted
7758.txt
Rule:
--
Sid:
7758
--
Summary:
This event is generated when activity relating to the "glacier" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machin
7735.txt
Rule:
--
Sid:
7735
--
Summary:
This event is generated when activity relating to the "bionet 4.05" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted ma
12077.txt
Rule:
--
Sid:
12077
--
Summary:
This event is generated when activity relating to the "c99shell.php" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted
7693.txt
Rule:
--
Sid:
7693
--
Summary:
This event is generated when activity relating to the "exception 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted
7098.txt
Rule:
--
Sid:
7098
--
Summary:
This event is generated when activity relating to the "remote hack 1.5" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targete