代码搜索结果
找到约 10,000 项符合
State Machine 的代码
7782.txt
Rule:
--
Sid:
7782
--
Summary:
This event is generated when activity relating to the "net devil 1.4" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted
7695.txt
Rule:
--
Sid:
7695
--
Summary:
This event is generated when activity relating to the "hanky panky 1.1" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targete
7655.txt
Rule:
--
Sid:
7655
--
Summary:
This event is generated when activity relating to the "small uploader 1.01" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the tar
7746.txt
Rule:
--
Sid:
7746
--
Summary:
This event is generated when activity relating to the "bobo 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machi
7625.txt
Rule:
--
Sid:
7625
--
Summary:
This event is generated when activity relating to the "skyrat show" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted ma
6092.txt
Rule:
--
Sid:
6092
--
Summary:
This event is generated when activity relating to the "a trojan 2.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted m
12156.txt
Rule:
--
Sid:
12156
--
Summary:
This event is generated when activity relating to the "optix pro v1.32" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the target
7649.txt
Rule:
--
Sid:
7649
--
Summary:
This event is generated when activity relating to the "minicom lite" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted m
11317.txt
Rule:
--
Sid:
11317
--
Summary:
This event is generated when activity relating to the "abremote pro 3.1" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targe
7639.txt
Rule:
--
Sid:
7639
--
Summary:
This event is generated when activity relating to the "air" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machine le