代码搜索结果
找到约 10,000 项符合
State Machine 的代码
10081.txt
Rule:
--
Sid:
10081
--
Summary:
This event is generated when activity relating to the "W32.Nuwar.AY" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted
6020.txt
Rule:
--
Sid:
6020
--
Summary:
This event is generated when activity relating to the "dsk lite 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted m
6315.txt
Rule:
--
Sid:
6315
--
Summary:
This event is generated when activity relating to the "net demon" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mach
7067.txt
Rule:
--
Sid:
7067
--
Summary:
This event is generated when activity relating to the "cybernetic 1.62" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targete
6136.txt
Rule:
--
Sid:
6136
--
Summary:
This event is generated when activity relating to the "clindestine 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targete
6175.txt
Rule:
--
Sid:
6175
--
Summary:
This event is generated when activity relating to the "cookie monster 0.24" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the tar
12245.txt
Rule:
--
Sid:
12245
--
Summary:
This event is generated when activity relating to the "furax 1.0 b3" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted
7804.txt
Rule:
--
Sid:
7804
--
Summary:
This event is generated when activity relating to the "war trojan ver1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targe
13247.txt
Rule:
--
Sid:
13247
--
Summary:
This event is generated when activity relating to the "yuri 1.2" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mach
7669.txt
Rule:
--
Sid:
7669
--
Summary:
This event is generated when activity relating to the "screen control 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targ