代码搜索结果

找到约 10,000 项符合 State Machine 的代码

6166.txt

Rule: -- Sid: 6166 -- Summary: This event is generated when activity relating to the "unicorn" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machin

1981.txt

Rule: -- Sid: 1981 -- Summary: Deepthroat is a Trojan Horse offering the attacker control of the target. -- Impact: Possible theft of data and control of the targeted machine leading to a compromis

12158.txt

Rule: -- Sid: 12158 -- Summary: This event is generated when activity relating to the "optix pro v1.32" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the target

8475.txt

Rule: -- Sid: 8475 -- Summary: This event is generated when activity relating to the "superspy 2.0 beta" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targe

13856.txt

Rule: -- Sid: 13856 -- Summary: This event is generated when activity relating to the "wintrim.z" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted mac

6299.txt

Rule: -- Sid: 6299 -- Summary: This event is generated when activity relating to the "insurrection 1.1.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targ

141.txt

Rule: -- Sid: 141 -- Summary: hack-a-tack is a Trojan Horse. -- Impact: Possible theft of data via download, upload of files, execution of files and reboot the targeted machine. -- Detailed Inform

7080.txt

Rule: -- Sid: 7080 -- Summary: This event is generated when activity relating to the "up and run v1.0 beta" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the ta

7697.txt

Rule: -- Sid: 7697 -- Summary: This event is generated when activity relating to the "hanky panky 1.1" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targete

12675.txt

Rule: -- Sid: 12675 -- Summary: This event is generated when activity relating to the "Versi TheTheef" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targete