代码搜索结果

找到约 10,000 项符合 State Machine 的代码

7075.txt

Rule: -- Sid: 7075 -- Summary: This event is generated when activity relating to the "bandook 1.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted ma

6300.txt

Rule: -- Sid: 6300 -- Summary: This event is generated when activity relating to the "cia 1.3" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machin

7104.txt

Rule: -- Sid: 7104 -- Summary: This event is generated when activity relating to the "aol admin" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted mach

6301.txt

Rule: -- Sid: 6301 -- Summary: This event is generated when activity relating to the "cia 1.3" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machin

9833.txt

Rule: -- Sid: 9833 -- Summary: This event is generated when activity relating to the "ieva 1.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machi

6132.txt

Rule: -- Sid: 6132 -- Summary: This event is generated when activity relating to the "chupacabra 1.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted

7739.txt

Rule: -- Sid: 7739 -- Summary: This event is generated when activity relating to the "alexmessomalex" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted

7614.txt

Rule: -- Sid: 7614 -- Summary: This event is generated when activity relating to the "flux 1.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted machi

7082.txt

Rule: -- Sid: 7082 -- Summary: This event is generated when activity relating to the "mosucker3.0" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted ma

7077.txt

Rule: -- Sid: 7077 -- Summary: This event is generated when activity relating to the "minimo v0.6" Trojan Horse program is detected. -- Impact: Possible theft of data and control of the targeted ma