代码搜索结果
找到约 10,000 项符合
State Machine 的代码
7713.txt
Rule:
--
Sid:
7713
--
Summary:
This event is generated when activity relating to the "amitis v1.3" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted ma
6148.txt
Rule:
--
Sid:
6148
--
Summary:
This event is generated when activity relating to the "mantis" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machine
11316.txt
Rule:
--
Sid:
11316
--
Summary:
This event is generated when activity relating to the "lurker 1.1" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted ma
6121.txt
Rule:
--
Sid:
6121
--
Summary:
This event is generated when activity relating to the "net runner" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mac
7765.txt
Rule:
--
Sid:
7765
--
Summary:
This event is generated when activity relating to the "nt remote controller 2000" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of t
7769.txt
Rule:
--
Sid:
7769
--
Summary:
This event is generated when activity relating to the "data rape" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mach
6057.txt
Rule:
--
Sid:
6057
--
Summary:
This event is generated when activity relating to the "bifrose 1.1" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted ma
10083.txt
Rule:
--
Sid:
10083
--
Summary:
This event is generated when activity relating to the "W32.Nuwar.AY" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted
9661.txt
Rule:
--
Sid:
9661
--
Summary:
This event is generated when activity relating to the "bersek 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mac
6143.txt
Rule:
--
Sid:
6143
--
Summary:
This event is generated when activity relating to the "dark connection inside v1.2" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of