代码搜索结果

找到约 10,000 项符合 State Machine 的代码

6141.txt

Rule: -- Sid: 6141 -- Summary: This event is generated when activity relating to the "hellzaddiction v1.0e" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the ta

7715.txt

Rule: -- Sid: 7715 -- Summary: This event is generated when activity relating to the "netdevil" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machi

11950.txt

Rule: -- Sid: 11950 -- Summary: This event is generated when activity relating to the "killav_gj" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted mac

12237.txt

Rule: -- Sid: 12237 -- Summary: This event is generated when activity relating to the "theef 2.10" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted ma

7790.txt

Rule: -- Sid: 7790 -- Summary: This event is generated when activity relating to the "forced control uploader" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the

13878.txt

Rule: -- Sid: 13878 -- Summary: This event is generated when activity relating to the "trojan-spy.win32.delf.uv" Trojan Horse program is detected. -- Impact: Possible theft of data and control of t

6106.txt

Rule: -- Sid: 6106 -- Summary: This event is generated when activity relating to the "alvgus 2000" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted ma

7059.txt

Rule: -- Sid: 7059 -- Summary: This event is generated when activity relating to the "charon" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machine

7711.txt

Rule: -- Sid: 7711 -- Summary: This event is generated when activity relating to the "amitis runtime command detection attacker to victim" Trojan Horse program is detected. -- Impact: Possible thef

7618.txt

Rule: -- Sid: 7618 -- Summary: This event is generated when activity relating to the "theef 2.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted mach