代码搜索结果

找到约 10,000 项符合 State Machine 的代码

10458.txt

Rule: -- Sid: 10458 -- Summary: This event is generated when activity relating to the "[x]-ztoo 1.0 or illusion" Trojan Horse program is detected. -- Impact: Possible theft of data and control of t

8080.txt

Rule: -- Sid: 8080 -- Summary: This event is generated when activity relating to the "x2a" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machine le

13944.txt

Rule: -- Sid: 13944 -- Summary: This event is generated when activity relating to the "trojan downloader small.gy" Trojan Horse program is detected. -- Impact: Possible theft of data and control of

7068.txt

Rule: -- Sid: 7068 -- Summary: This event is generated when activity relating to the "delta source 0.5 beta" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the t

12727.txt

Rule: -- Sid: 12727 -- Summary: This event is generated when activity relating to the "bandook 1.35" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted

7758.txt

Rule: -- Sid: 7758 -- Summary: This event is generated when activity relating to the "glacier" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machin

7735.txt

Rule: -- Sid: 7735 -- Summary: This event is generated when activity relating to the "bionet 4.05" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted ma

12077.txt

Rule: -- Sid: 12077 -- Summary: This event is generated when activity relating to the "c99shell.php" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted

7693.txt

Rule: -- Sid: 7693 -- Summary: This event is generated when activity relating to the "exception 1.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted

7098.txt

Rule: -- Sid: 7098 -- Summary: This event is generated when activity relating to the "remote hack 1.5" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targete