代码搜索结果
找到约 10,000 项符合
State Machine 的代码
8471.txt
Rule:
--
Sid:
8471
--
Summary:
This event is generated when activity relating to the "superspy 2.0 beta" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targe
9662.txt
Rule:
--
Sid:
9662
--
Summary:
This event is generated when activity relating to the "bersek 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mac
7773.txt
Rule:
--
Sid:
7773
--
Summary:
This event is generated when activity relating to the "messiah 4.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted ma
10066.txt
Rule:
--
Sid:
10066
--
Summary:
This event is generated when activity relating to the "Peacomm" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machi
6155.txt
Rule:
--
Sid:
6155
--
Summary:
This event is generated when activity relating to the "dirtxt" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machine
6027.txt
Rule:
--
Sid:
6027
--
Summary:
This event is generated when activity relating to the "netshadow" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mach
12725.txt
Rule:
--
Sid:
12725
--
Summary:
This event is generated when activity relating to the "dark moon 4.11" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targete
10449.txt
Rule:
--
Sid:
10449
--
Summary:
This event is generated when activity relating to the "acid shivers" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted
6151.txt
Rule:
--
Sid:
6151
--
Summary:
This event is generated when activity relating to the "back attack v1.4" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the target
10446.txt
Rule:
--
Sid:
10446
--
Summary:
This event is generated when activity relating to the "acidbattery 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the target