代码搜索结果

找到约 10,000 项符合 State Machine 的代码

7690.txt

Rule: -- Sid: 7690 -- Summary: This event is generated when activity relating to the "evade" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machine

6134.txt

Rule: -- Sid: 6134 -- Summary: This event is generated when activity relating to the "chupacabra 1.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted

6296.txt

Rule: -- Sid: 6296 -- Summary: This event is generated when activity relating to the "insurrection 1.1.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targ

7775.txt

Rule: -- Sid: 7775 -- Summary: This event is generated when activity relating to the "messiah 4.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted ma

7064.txt

Rule: -- Sid: 7064 -- Summary: This event is generated when activity relating to the "cybernetic 1.62" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targete

6023.txt

Rule: -- Sid: 6023 -- Summary: This event is generated when activity relating to the "silent spy 2.10" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targete

6078.txt

Rule: -- Sid: 6078 -- Summary: This event is generated when activity relating to the "autospy" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machin

7637.txt

Rule: -- Sid: 7637 -- Summary: This event is generated when activity relating to the "hornet 1.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted mac

12150.txt

Rule: -- Sid: 12150 -- Summary: This event is generated when activity relating to the "cafeini 1.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted m

6177.txt

Rule: -- Sid: 6177 -- Summary: This event is generated when activity relating to the "ultimate destruction" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the ta