代码搜索结果
找到约 10,000 项符合
State Machine 的代码
6322.txt
Rule:
--
Sid:
6322
--
Summary:
This event is generated when activity relating to the "ptakks2.1" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mach
8361.txt
Rule:
--
Sid:
8361
--
Summary:
This event is generated when activity relating to the "black curse 4.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targete
12146.txt
Rule:
--
Sid:
12146
--
Summary:
This event is generated when activity relating to the "blue eye 1.0b" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted
7604.txt
Rule:
--
Sid:
7604
--
Summary:
This event is generated when activity relating to the "katux 2.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mach
9657.txt
Rule:
--
Sid:
9657
--
Summary:
This event is generated when activity relating to the "bersek 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mac
195.txt
Rule:
--
Sid:
195
--
Summary:
Deepthroat is a Trojan Horse offering the attacker control of the target.
--
Impact:
Possible theft of data and control of the targeted machine leading to a compromise
12724.txt
Rule:
--
Sid:
12724
--
Summary:
This event is generated when activity relating to the "dark moon 4.11" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targete
6170.txt
Rule:
--
Sid:
6170
--
Summary:
This event is generated when activity relating to the "digital rootbeer" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the target
6501.txt
Rule:
--
Sid:
6501
--
Summary:
This event is generated when activity relating to the "omerta 1.3" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mac
6324.txt
Rule:
--
Sid:
6324
--
Summary:
This event is generated when activity relating to the "3xBackdoor" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mac