代码搜索结果
找到约 10,000 项符合
State Machine 的代码
105.txt
Rule:
--
Sid:
105
--
Summary:
This event is generated when activity from the Dagger trojan horse program is detected in network traffic.
--
Impact:
Possible theft of data and control of the targete
7097.txt
Rule:
--
Sid:
7097
--
Summary:
This event is generated when activity relating to the "remote hack 1.5" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targete
9837.txt
Rule:
--
Sid:
9837
--
Summary:
This event is generated when activity relating to the "sun shadow 1.70" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targete
7821.txt
Rule:
--
Sid:
7821
--
Summary:
This event is generated when activity relating to the "nightcreature beta 0.01" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the
11949.txt
Rule:
--
Sid:
11949
--
Summary:
This event is generated when activity relating to the "lame rat v1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted
6336.txt
Rule:
--
Sid:
6336
--
Summary:
This event is generated when activity relating to the "buttman v0.9p" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted
7692.txt
Rule:
--
Sid:
7692
--
Summary:
This event is generated when activity relating to the "exception 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted
10080.txt
Rule:
--
Sid:
10080
--
Summary:
This event is generated when activity relating to the "W32.Nuwar.AY" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted
6150.txt
Rule:
--
Sid:
6150
--
Summary:
This event is generated when activity relating to the "netcontrol v1.0.8" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targe
10455.txt
Rule:
--
Sid:
10455
--
Summary:
This event is generated when activity relating to the "[x]-ztoo 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted