代码搜索结果

找到约 10,000 项符合 State Machine 的代码

6322.txt

Rule: -- Sid: 6322 -- Summary: This event is generated when activity relating to the "ptakks2.1" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted mach

8361.txt

Rule: -- Sid: 8361 -- Summary: This event is generated when activity relating to the "black curse 4.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targete

12146.txt

Rule: -- Sid: 12146 -- Summary: This event is generated when activity relating to the "blue eye 1.0b" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted

7604.txt

Rule: -- Sid: 7604 -- Summary: This event is generated when activity relating to the "katux 2.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted mach

9657.txt

Rule: -- Sid: 9657 -- Summary: This event is generated when activity relating to the "bersek 1.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted mac

195.txt

Rule: -- Sid: 195 -- Summary: Deepthroat is a Trojan Horse offering the attacker control of the target. -- Impact: Possible theft of data and control of the targeted machine leading to a compromise

12724.txt

Rule: -- Sid: 12724 -- Summary: This event is generated when activity relating to the "dark moon 4.11" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targete

6170.txt

Rule: -- Sid: 6170 -- Summary: This event is generated when activity relating to the "digital rootbeer" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the target

6501.txt

Rule: -- Sid: 6501 -- Summary: This event is generated when activity relating to the "omerta 1.3" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted mac

6324.txt

Rule: -- Sid: 6324 -- Summary: This event is generated when activity relating to the "3xBackdoor" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted mac