代码搜索结果
找到约 10,000 项符合
State Machine 的代码
7121.txt
Rule:
--
Sid:
7121
--
Summary:
This event is generated when activity relating to the "y3k 1.2" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machin
6024.txt
Rule:
--
Sid:
6024
--
Summary:
This event is generated when activity relating to the "nuclear rat v6_21" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targe
13246.txt
Rule:
--
Sid:
13246
--
Summary:
This event is generated when activity relating to the "troya 1.4" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mac
9658.txt
Rule:
--
Sid:
9658
--
Summary:
This event is generated when activity relating to the "bersek 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mac
6066.txt
Rule:
--
Sid:
6066
--
Summary:
This event is generated when activity relating to the "optixlite 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted
6303.txt
Rule:
--
Sid:
6303
--
Summary:
This event is generated when activity relating to the "cia 1.3" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machin
7788.txt
Rule:
--
Sid:
7788
--
Summary:
This event is generated when activity relating to the "forced control uploader" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the
7781.txt
Rule:
--
Sid:
7781
--
Summary:
This event is generated when activity relating to the "net devil 1.4" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted
11954.txt
Rule:
--
Sid:
11954
--
Summary:
This event is generated when activity relating to the "supervisor plus" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the target
7689.txt
Rule:
--
Sid:
7689
--
Summary:
This event is generated when activity relating to the "evade" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machine