代码搜索结果
找到约 10,000 项符合
State Machine 的代码
7701.txt
Rule:
--
Sid:
7701
--
Summary:
This event is generated when activity relating to the "brain wiper" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted ma
12235.txt
Rule:
--
Sid:
12235
--
Summary:
This event is generated when activity relating to the "theef 2.10" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted ma
12055.txt
Rule:
--
Sid:
12055
--
Summary:
This event is generated when activity relating to the "tron" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machine
7621.txt
Rule:
--
Sid:
7621
--
Summary:
This event is generated when activity relating to the "remote control 1.7" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targ
9653.txt
Rule:
--
Sid:
9653
--
Summary:
This event is generated when activity relating to the "apofis 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted mac
7122.txt
Rule:
--
Sid:
7122
--
Summary:
This event is generated when activity relating to the "y3k 1.2" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machin
6292.txt
Rule:
--
Sid:
6292
--
Summary:
This event is generated when activity relating to the "joker ddos v1.0.1" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targe
2100.txt
Rule:
--
Sid:
2100
--
Summary:
This event indicates that network activity relating to the Trojan Horse
program Subseven 2.1 Gold has been detected. This software offers complete
control of the infe
6039.txt
Rule:
--
Sid:
6039
--
Summary:
This event is generated when activity relating to the "fade 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machi
7672.txt
Rule:
--
Sid:
7672
--
Summary:
This event is generated when activity relating to the "remoter" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machin