代码搜索结果
找到约 10,000 项符合
State Machine 的代码
7748.txt
Rule:
--
Sid:
7748
--
Summary:
This event is generated when activity relating to the "bobo 1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machi
12376.txt
Rule:
--
Sid:
12376
--
Summary:
This event is generated when activity relating to the "radmin 3.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted ma
7629.txt
Rule:
--
Sid:
7629
--
Summary:
This event is generated when activity relating to the "skyrat show" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted ma
12052.txt
Rule:
--
Sid:
12052
--
Summary:
This event is generated when activity relating to the "the[x] 1.2" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted ma
10079.txt
Rule:
--
Sid:
10079
--
Summary:
This event is generated when activity relating to the "W32.Nuwar.AY" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted
7118.txt
Rule:
--
Sid:
7118
--
Summary:
This event is generated when activity relating to the "y3k 1.2" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted machin
7727.txt
Rule:
--
Sid:
7727
--
Summary:
This event is generated when activity relating to the "reversable ver1.0" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targe
7679.txt
Rule:
--
Sid:
7679
--
Summary:
This event is generated when activity relating to the "cool remote control 1.12" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of th
6396.txt
Rule:
--
Sid:
6396
--
Summary:
This event is generated when activity relating to the "a-311 death" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the targeted ma
7643.txt
Rule:
--
Sid:
7643
--
Summary:
This event is generated when activity relating to the "netcontrol takeover" Trojan Horse program is detected.
--
Impact:
Possible theft of data and control of the tar