代码搜索结果
找到约 10,000 项符合
State Machine 的代码
7771.txt
Rule:
--
Sid:
7771
--
Summary:
This event is generated when activity relating to the "messiah 4.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted ma
7687.txt
Rule:
--
Sid:
7687
--
Summary:
This event is generated when activity relating to the "illusion" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machi
10450.txt
Rule:
--
Sid:
10450
--
Summary:
This event is generated when activity relating to the "only 1 rat" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted ma
6338.txt
Rule:
--
Sid:
6338
--
Summary:
This event is generated when activity relating to the "hatredfriend" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted m
10454.txt
Rule:
--
Sid:
10454
--
Summary:
This event is generated when activity relating to the "[x]-ztoo 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted
7750.txt
Rule:
--
Sid:
7750
--
Summary:
This event is generated when activity relating to the "buschtrommel 1.22" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targe
7085.txt
Rule:
--
Sid:
7085
--
Summary:
This event is generated when activity relating to the "erazer v1.1" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted ma
12297.txt
Rule:
--
Sid:
12297
--
Summary:
This event is generated when activity relating to the "bifrost v1.2.1" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targete
7622.txt
Rule:
--
Sid:
7622
--
Summary:
This event is generated when activity relating to the "remote control 1.7" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targ
7818.txt
Rule:
--
Sid:
7818
--
Summary:
This event is generated when activity relating to the "infector v1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted