代码搜索结果
找到约 10,000 项符合
State Machine 的代码
7075.txt
Rule:
--
Sid:
7075
--
Summary:
This event is generated when activity relating to the "bandook 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted ma
6300.txt
Rule:
--
Sid:
6300
--
Summary:
This event is generated when activity relating to the "cia 1.3" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machin
7104.txt
Rule:
--
Sid:
7104
--
Summary:
This event is generated when activity relating to the "aol admin" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mach
6301.txt
Rule:
--
Sid:
6301
--
Summary:
This event is generated when activity relating to the "cia 1.3" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machin
9833.txt
Rule:
--
Sid:
9833
--
Summary:
This event is generated when activity relating to the "ieva 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machi
6132.txt
Rule:
--
Sid:
6132
--
Summary:
This event is generated when activity relating to the "chupacabra 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted
7739.txt
Rule:
--
Sid:
7739
--
Summary:
This event is generated when activity relating to the "alexmessomalex" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted
7614.txt
Rule:
--
Sid:
7614
--
Summary:
This event is generated when activity relating to the "flux 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machi
7082.txt
Rule:
--
Sid:
7082
--
Summary:
This event is generated when activity relating to the "mosucker3.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted ma
7077.txt
Rule:
--
Sid:
7077
--
Summary:
This event is generated when activity relating to the "minimo v0.6" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted ma