代码搜索结果
找到约 10,000 项符合
State Machine 的代码
6166.txt
Rule:
--
Sid:
6166
--
Summary:
This event is generated when activity relating to the "unicorn" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machin
1981.txt
Rule:
--
Sid:
1981
--
Summary:
Deepthroat is a Trojan Horse offering the attacker control of the target.
--
Impact:
Possible theft of data and control of the targeted machine leading to a compromis
12158.txt
Rule:
--
Sid:
12158
--
Summary:
This event is generated when activity relating to the "optix pro v1.32" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the target
8475.txt
Rule:
--
Sid:
8475
--
Summary:
This event is generated when activity relating to the "superspy 2.0 beta" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targe
13856.txt
Rule:
--
Sid:
13856
--
Summary:
This event is generated when activity relating to the "wintrim.z" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mac
6299.txt
Rule:
--
Sid:
6299
--
Summary:
This event is generated when activity relating to the "insurrection 1.1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targ
141.txt
Rule:
--
Sid:
141
--
Summary:
hack-a-tack is a Trojan Horse.
--
Impact:
Possible theft of data via download, upload of files, execution of files and reboot the targeted machine.
--
Detailed Inform
7080.txt
Rule:
--
Sid:
7080
--
Summary:
This event is generated when activity relating to the "up and run v1.0 beta" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the ta
7697.txt
Rule:
--
Sid:
7697
--
Summary:
This event is generated when activity relating to the "hanky panky 1.1" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targete
12675.txt
Rule:
--
Sid:
12675
--
Summary:
This event is generated when activity relating to the "Versi TheTheef" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targete