代码搜索结果
找到约 10,000 项符合
State Machine 的代码
7681.txt
Rule:
--
Sid:
7681
--
Summary:
This event is generated when activity relating to the "cool remote control 1.12" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of th
7630.txt
Rule:
--
Sid:
7630
--
Summary:
This event is generated when activity relating to the "helios 3.1" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mac
12375.txt
Rule:
--
Sid:
12375
--
Summary:
This event is generated when activity relating to the "radmin 3.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted ma
6014.txt
Rule:
--
Sid:
6014
--
Summary:
This event is generated when activity relating to the "coolcat" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machin
6124.txt
Rule:
--
Sid:
6124
--
Summary:
This event is generated when activity relating to the "ambush 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mac
12699.txt
Rule:
--
Sid:
12699
--
Summary:
This event is generated when activity relating to the "poison ivy 2.3.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targe
7065.txt
Rule:
--
Sid:
7065
--
Summary:
This event is generated when activity relating to the "cybernetic 1.62" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targete
6088.txt
Rule:
--
Sid:
6088
--
Summary:
This event is generated when activity relating to the "a trojan 2.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted m
10197.txt
Rule:
--
Sid:
10197
--
Summary:
This event is generated when activity relating to the "Wordpress backdoor theme.php code execution" Trojan Horse program is detected.
--
Impact:
Possible theft of da
10168.txt
Rule:
--
Sid:
10168
--
Summary:
This event is generated when activity relating to the "one" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machine l