Sourcefire VRT Rules Update

Date: 2012-05-10

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2.9.2.1.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:22447 <-> DISABLED <-> BLACKLIST DNS request for known malware domain lnz.worthhummer.net (blacklist.rules)
 * 1:22448 <-> DISABLED <-> BLACKLIST DNS request for known malware domain loading.bigish.net (blacklist.rules)
 * 1:22452 <-> DISABLED <-> BLACKLIST DNS request for known malware domain login.businessconsults.net (blacklist.rules)
 * 1:22453 <-> DISABLED <-> BLACKLIST DNS request for known malware domain log.infosupports.com (blacklist.rules)
 * 1:22454 <-> DISABLED <-> BLACKLIST DNS request for known malware domain login.safalife.com (blacklist.rules)
 * 1:22455 <-> DISABLED <-> BLACKLIST DNS request for known malware domain log.issnbgkit.net (blacklist.rules)
 * 1:22456 <-> DISABLED <-> BLACKLIST DNS request for known malware domain logs.chileexe77.com (blacklist.rules)
 * 1:22457 <-> DISABLED <-> BLACKLIST DNS request for known malware domain logs.issnbgkit.net (blacklist.rules)
 * 1:22458 <-> DISABLED <-> BLACKLIST DNS request for known malware domain logs.pcclubddk.net (blacklist.rules)
 * 1:22459 <-> DISABLED <-> BLACKLIST DNS request for known malware domain loper.purpledaily.com (blacklist.rules)
 * 1:22460 <-> DISABLED <-> BLACKLIST DNS request for known malware domain love.arrowservice.net (blacklist.rules)
 * 1:22461 <-> DISABLED <-> BLACKLIST DNS request for known malware domain lrl.infosupports.com (blacklist.rules)
 * 1:22462 <-> DISABLED <-> BLACKLIST DNS request for known malware domain lucie.dnsweb.org (blacklist.rules)
 * 1:22463 <-> DISABLED <-> BLACKLIST DNS request for known malware domain lucy2.businessconsults.net (blacklist.rules)
 * 1:22464 <-> DISABLED <-> BLACKLIST DNS request for known malware domain lucy2.infosupports.com (blacklist.rules)
 * 1:22465 <-> DISABLED <-> BLACKLIST DNS request for known malware domain lucy.bigdepression.net (blacklist.rules)
 * 1:22466 <-> DISABLED <-> BLACKLIST DNS request for known malware domain lucy.blackcake.net (blacklist.rules)
 * 1:22467 <-> DISABLED <-> BLACKLIST DNS request for known malware domain lucy.businessconsults.net (blacklist.rules)
 * 1:22468 <-> DISABLED <-> BLACKLIST DNS request for known malware domain lw.purpledaily.com (blacklist.rules)
 * 1:22469 <-> DISABLED <-> BLACKLIST DNS request for known malware domain mail.arrowservice.net (blacklist.rules)
 * 1:22470 <-> DISABLED <-> BLACKLIST DNS request for known malware domain mail.businessconsults.net (blacklist.rules)
 * 1:22471 <-> DISABLED <-> BLACKLIST DNS request for known malware domain mail.chileexe77.com (blacklist.rules)
 * 1:22472 <-> DISABLED <-> BLACKLIST DNS request for known malware domain mail.infosupports.com (blacklist.rules)
 * 1:22473 <-> DISABLED <-> BLACKLIST DNS request for known malware domain mail.newsonet.net (blacklist.rules)
 * 1:22474 <-> DISABLED <-> BLACKLIST DNS request for known malware domain mail.safalife.com (blacklist.rules)
 * 1:22475 <-> DISABLED <-> BLACKLIST DNS request for known malware domain mail.softsolutionbox.net (blacklist.rules)
 * 1:22476 <-> DISABLED <-> BLACKLIST DNS request for known malware domain man001.blackcake.net (blacklist.rules)
 * 1:22477 <-> DISABLED <-> BLACKLIST DNS request for known malware domain man001.infosupports.com (blacklist.rules)
 * 1:22478 <-> DISABLED <-> BLACKLIST DNS request for known malware domain mantech.blackcake.net (blacklist.rules)
 * 1:22479 <-> DISABLED <-> BLACKLIST DNS request for known malware domain max.arrowservice.net (blacklist.rules)
 * 1:22480 <-> DISABLED <-> BLACKLIST DNS request for known malware domain mcsc.buisnessconsults.net (blacklist.rules)
 * 1:22481 <-> DISABLED <-> BLACKLIST DNS request for known malware domain mcsc.businessconsults.net (blacklist.rules)
 * 1:22482 <-> DISABLED <-> BLACKLIST DNS request for known malware domain media.purpledaily.com (blacklist.rules)
 * 1:22483 <-> DISABLED <-> BLACKLIST DNS request for known malware domain merax.newsonet.net (blacklist.rules)
 * 1:22484 <-> DISABLED <-> BLACKLIST DNS request for known malware domain mfa.globalowa.com (blacklist.rules)
 * 1:22485 <-> DISABLED <-> BLACKLIST DNS request for known malware domain mfc.newsonet.net (blacklist.rules)
 * 1:22486 <-> DISABLED <-> BLACKLIST DNS request for known malware domain milk.arrowservice.net (blacklist.rules)
 * 1:22487 <-> DISABLED <-> BLACKLIST DNS request for known malware domain mini.arrowservice.net (blacklist.rules)
 * 1:22488 <-> DISABLED <-> BLACKLIST DNS request for known malware domain mko.busketball.com (blacklist.rules)
 * 1:22489 <-> DISABLED <-> BLACKLIST DNS request for known malware domain mlls.globalowa.com (blacklist.rules)
 * 1:22490 <-> DISABLED <-> BLACKLIST DNS request for known malware domain moon.blackcake.net (blacklist.rules)
 * 1:22491 <-> DISABLED <-> BLACKLIST DNS request for known malware domain moon.infosupports.com (blacklist.rules)
 * 1:22492 <-> DISABLED <-> BLACKLIST DNS request for known malware domain mor.newsonet.net (blacklist.rules)
 * 1:22493 <-> DISABLED <-> BLACKLIST DNS request for known malware domain mos.arrowservice.net (blacklist.rules)
 * 1:22494 <-> DISABLED <-> BLACKLIST DNS request for known malware domain moto.mefound.com (blacklist.rules)
 * 1:22495 <-> DISABLED <-> BLACKLIST DNS request for known malware domain motor.earthsolution.org (blacklist.rules)
 * 1:22496 <-> DISABLED <-> BLACKLIST DNS request for known malware domain mpe.arrowservice.net (blacklist.rules)
 * 1:22497 <-> DISABLED <-> BLACKLIST DNS request for known malware domain na.bigdepression.net (blacklist.rules)
 * 1:22498 <-> DISABLED <-> BLACKLIST DNS request for known malware domain nat.bigdepression.net (blacklist.rules)
 * 1:22499 <-> DISABLED <-> BLACKLIST DNS request for known malware domain nature.arrowservice.net (blacklist.rules)
 * 1:22500 <-> DISABLED <-> BLACKLIST DNS request for known malware domain navi.earthsolution.org (blacklist.rules)
 * 1:22501 <-> DISABLED <-> BLACKLIST DNS request for known malware domain nci.bigdepression.net (blacklist.rules)
 * 1:22502 <-> DISABLED <-> BLACKLIST DNS request for known malware domain nci.dnsweb.org (blacklist.rules)
 * 1:22503 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ncih.dnsweb.org (blacklist.rules)
 * 1:22504 <-> DISABLED <-> BLACKLIST DNS request for known malware domain nci.safalife.com (blacklist.rules)
 * 1:22505 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ncsc.businessconsults.net (blacklist.rules)
 * 1:22506 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ne.hugesoft.org (blacklist.rules)
 * 1:22507 <-> DISABLED <-> BLACKLIST DNS request for known malware domain net.infosupports.com (blacklist.rules)
 * 1:22508 <-> DISABLED <-> BLACKLIST DNS request for known malware domain new.arrowservice.net (blacklist.rules)
 * 1:22509 <-> DISABLED <-> BLACKLIST DNS request for known malware domain new.globalowa.com (blacklist.rules)
 * 1:22510 <-> DISABLED <-> BLACKLIST DNS request for known malware domain newport.bigdepression.net (blacklist.rules)
 * 1:22511 <-> DISABLED <-> BLACKLIST DNS request for known malware domain newport.infosupports.com (blacklist.rules)
 * 1:22512 <-> DISABLED <-> BLACKLIST DNS request for known malware domain newport.safalife.com (blacklist.rules)
 * 1:22513 <-> DISABLED <-> BLACKLIST DNS request for known malware domain news.bigdepression.net (blacklist.rules)
 * 1:22514 <-> DISABLED <-> BLACKLIST DNS request for known malware domain news.blackcake.net (blacklist.rules)
 * 1:22515 <-> DISABLED <-> BLACKLIST DNS request for known malware domain news.businessconsults.net (blacklist.rules)
 * 1:22516 <-> DISABLED <-> BLACKLIST DNS request for known malware domain news.busketball.com (blacklist.rules)
 * 1:22517 <-> DISABLED <-> BLACKLIST DNS request for known malware domain news.chileexe77.com (blacklist.rules)
 * 1:22518 <-> DISABLED <-> BLACKLIST DNS request for known malware domain news.dnsweb.org (blacklist.rules)
 * 1:22519 <-> DISABLED <-> BLACKLIST DNS request for known malware domain news.infosupports.com (blacklist.rules)
 * 1:22520 <-> DISABLED <-> BLACKLIST DNS request for known malware domain news.issnbgkit.net (blacklist.rules)
 * 1:22521 <-> DISABLED <-> BLACKLIST DNS request for known malware domain news.pcclubddk.net (blacklist.rules)
 * 1:22522 <-> DISABLED <-> BLACKLIST DNS request for known malware domain newsservice.bouncemet.net (blacklist.rules)
 * 1:22523 <-> DISABLED <-> BLACKLIST DNS request for known malware domain news.softsolutionbox.net (blacklist.rules)
 * 1:22524 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ngc.blackcake.net (blacklist.rules)
 * 1:22525 <-> DISABLED <-> BLACKLIST DNS request for known malware domain nhc.newsonet.net (blacklist.rules)
 * 1:22526 <-> DISABLED <-> BLACKLIST DNS request for known malware domain nhs1.newsonet.net (blacklist.rules)
 * 1:22527 <-> DISABLED <-> BLACKLIST DNS request for known malware domain nhsl.newsonet.net (blacklist.rules)
 * 1:22528 <-> DISABLED <-> BLACKLIST DNS request for known malware domain nhs.newsonet.net (blacklist.rules)
 * 1:22529 <-> DISABLED <-> BLACKLIST DNS request for known malware domain nis.purpledaily.com (blacklist.rules)
 * 1:22530 <-> DISABLED <-> BLACKLIST DNS request for known malware domain nousage.arrowservice.net (blacklist.rules)
 * 1:22531 <-> DISABLED <-> BLACKLIST DNS request for known malware domain nrfn.newsonet.net (blacklist.rules)
 * 1:22532 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ns.issnbgkit.net (blacklist.rules)
 * 1:22533 <-> DISABLED <-> BLACKLIST DNS request for known malware domain nucor001.purpledaily.com (blacklist.rules)
 * 1:22534 <-> DISABLED <-> BLACKLIST DNS request for known malware domain nuk.purpledaily.com (blacklist.rules)
 * 1:22535 <-> DISABLED <-> BLACKLIST DNS request for known malware domain num.safalife.com (blacklist.rules)
 * 1:22536 <-> DISABLED <-> BLACKLIST DNS request for known malware domain officeudpate.servehttp.com (blacklist.rules)
 * 1:22537 <-> DISABLED <-> BLACKLIST DNS request for known malware domain okie.businessconsults.net (blacklist.rules)
 * 1:22538 <-> DISABLED <-> BLACKLIST DNS request for known malware domain oliver.arrowservice.net (blacklist.rules)
 * 1:22539 <-> DISABLED <-> BLACKLIST DNS request for known malware domain onk.newsonet.net (blacklist.rules)
 * 1:22540 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ope.purpledaily.com (blacklist.rules)
 * 1:22541 <-> DISABLED <-> BLACKLIST DNS request for known malware domain oppa.bigdepression.net (blacklist.rules)
 * 1:22542 <-> DISABLED <-> BLACKLIST DNS request for known malware domain opp.infosupports.com (blacklist.rules)
 * 1:22543 <-> DISABLED <-> BLACKLIST DNS request for known malware domain optimizon.com (blacklist.rules)
 * 1:22544 <-> DISABLED <-> BLACKLIST DNS request for known malware domain orca.arrowservice.net (blacklist.rules)
 * 1:22545 <-> DISABLED <-> BLACKLIST DNS request for known malware domain otp.blackberrycluter.com (blacklist.rules)
 * 1:22546 <-> DISABLED <-> BLACKLIST DNS request for known malware domain otps.globalowa.com (blacklist.rules)
 * 1:22547 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ou1.blackcake.net (blacklist.rules)
 * 1:22548 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ou1.infosupports.com (blacklist.rules)
 * 1:22549 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ou2.infosupports.com (blacklist.rules)
 * 1:22550 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ou3.infosupports.com (blacklist.rules)
 * 1:22551 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ou4.infosupports.com (blacklist.rules)
 * 1:22552 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ou5.infosupports.com (blacklist.rules)
 * 1:22553 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ou6.infosupports.com (blacklist.rules)
 * 1:22554 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ou7.infosupports.com (blacklist.rules)
 * 1:22555 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ou.infosupports.com (blacklist.rules)
 * 1:22556 <-> DISABLED <-> BLACKLIST DNS request for known malware domain owa.arrowservice.net (blacklist.rules)
 * 1:22557 <-> DISABLED <-> BLACKLIST DNS request for known malware domain owa.businessconsults.net (blacklist.rules)
 * 1:22558 <-> DISABLED <-> BLACKLIST DNS request for known malware domain owa.softsolutionbox.net (blacklist.rules)
 * 1:22559 <-> DISABLED <-> BLACKLIST DNS request for known malware domain pacific.blackcake.net (blacklist.rules)
 * 1:22560 <-> DISABLED <-> BLACKLIST DNS request for known malware domain pacific.worthhummer.net (blacklist.rules)
 * 1:22561 <-> DISABLED <-> BLACKLIST DNS request for known malware domain paekl.gmailboxes.com (blacklist.rules)
 * 1:22562 <-> DISABLED <-> BLACKLIST DNS request for known malware domain pars.earthsolution.org (blacklist.rules)
 * 1:22563 <-> DISABLED <-> BLACKLIST DNS request for known malware domain part.bigdepression.net (blacklist.rules)
 * 1:22564 <-> DISABLED <-> BLACKLIST DNS request for known malware domain part.earthsolution.org (blacklist.rules)
 * 1:22565 <-> DISABLED <-> BLACKLIST DNS request for known malware domain parth.earthsolution.org (blacklist.rules)
 * 1:22566 <-> DISABLED <-> BLACKLIST DNS request for known malware domain pcie.arrowservice.net (blacklist.rules)
 * 1:22567 <-> DISABLED <-> BLACKLIST DNS request for known malware domain pdoc.earthsolution.org (blacklist.rules)
 * 1:22568 <-> DISABLED <-> BLACKLIST DNS request for known malware domain pear.blackcake.net (blacklist.rules)
 * 1:22569 <-> DISABLED <-> BLACKLIST DNS request for known malware domain pear.infosupports.com (blacklist.rules)
 * 1:22570 <-> DISABLED <-> BLACKLIST DNS request for known malware domain people.softsolutionbox.net (blacklist.rules)
 * 1:22571 <-> DISABLED <-> BLACKLIST DNS request for known malware domain phb.arrowservice.net (blacklist.rules)
 * 1:22572 <-> DISABLED <-> BLACKLIST DNS request for known malware domain picture.chileexe77.com (blacklist.rules)
 * 1:22573 <-> DISABLED <-> BLACKLIST DNS request for known malware domain pizf.peasoul.com (blacklist.rules)
 * 1:22574 <-> DISABLED <-> BLACKLIST DNS request for known malware domain pl0y.peasoul.com (blacklist.rules)
 * 1:22575 <-> DISABLED <-> BLACKLIST DNS request for known malware domain pme.worthhummer.net (blacklist.rules)
 * 1:22576 <-> DISABLED <-> BLACKLIST DNS request for known malware domain pop2.blackcake.net (blacklist.rules)
 * 1:22577 <-> DISABLED <-> BLACKLIST DNS request for known malware domain pop2.infosupports.com (blacklist.rules)
 * 1:22578 <-> DISABLED <-> BLACKLIST DNS request for known malware domain pop3.blackcake.net (blacklist.rules)
 * 1:22579 <-> DISABLED <-> BLACKLIST DNS request for known malware domain pop3.infosupports.com (blacklist.rules)
 * 1:22580 <-> DISABLED <-> BLACKLIST DNS request for known malware domain pop4.blackcake.net (blacklist.rules)
 * 1:22581 <-> DISABLED <-> BLACKLIST DNS request for known malware domain pop5.blackcake.net (blacklist.rules)
 * 1:22582 <-> DISABLED <-> BLACKLIST DNS request for known malware domain pop6.infosupports.com (blacklist.rules)
 * 1:22583 <-> DISABLED <-> BLACKLIST DNS request for known malware domain pop9.infosupports.com (blacklist.rules)
 * 1:22584 <-> DISABLED <-> BLACKLIST DNS request for known malware domain pop.blackcake.net (blacklist.rules)
 * 1:22585 <-> DISABLED <-> BLACKLIST DNS request for known malware domain pop.businessconsults.net (blacklist.rules)
 * 1:22098 <-> ENABLED <-> INDICATOR-COMPROMISE hex-encoded create_function detected (indicator-compromise.rules)
 * 1:22099 <-> ENABLED <-> BOTNET-CNC Trojan.Piroxcc variant outbound connection (botnet-cnc.rules)
 * 1:22100 <-> ENABLED <-> BOTNET-CNC Trojan.Midhos variant outbound connection (botnet-cnc.rules)
 * 1:22101 <-> ENABLED <-> FILE-OFFICE Microsoft Office RTF parsing remote code execution attempt (file-office.rules)
 * 1:22102 <-> ENABLED <-> FILE-OFFICE Microsoft Office RTF parsing remote code execution attempt (file-office.rules)
 * 1:22103 <-> ENABLED <-> BACKDOOR Win32.Coswid.klk runtime detection (backdoor.rules)
 * 1:22104 <-> ENABLED <-> FILE-OTHER libpng chunk decompression integer overflow attempt (file-other.rules)
 * 1:22105 <-> ENABLED <-> FILE-OTHER libpng chunk decompression integer overflow attempt (file-other.rules)
 * 1:22106 <-> ENABLED <-> FILE-OTHER libpng chunk decompression integer overflow attempt (file-other.rules)
 * 1:22107 <-> ENABLED <-> MISC libpng chunk decompression integer overflow attempt (misc.rules)
 * 1:22108 <-> ENABLED <-> MISC libpng chunk decompression integer overflow attempt (misc.rules)
 * 1:22109 <-> ENABLED <-> MISC libpng chunk decompression integer overflow attempt (misc.rules)
 * 1:22110 <-> DISABLED <-> SERVER-MAIL Metamail format string exploit attempt (server-mail.rules)
 * 1:22111 <-> DISABLED <-> SERVER-MAIL Metamail format string exploit attempt (server-mail.rules)
 * 1:22112 <-> DISABLED <-> SERVER-MAIL Metamail format string exploit attempt (server-mail.rules)
 * 1:22113 <-> DISABLED <-> SERVER-MAIL Metamail header length exploit attempt (server-mail.rules)
 * 1:22114 <-> DISABLED <-> SERVER-MAIL Metamail header length exploit attempt (server-mail.rules)
 * 1:22115 <-> DISABLED <-> SERVER-MAIL Metamail header length exploit attempt (server-mail.rules)
 * 1:22116 <-> DISABLED <-> BLACKLIST DNS request for known malware domain 08elec.purpledaily.com (blacklist.rules)
 * 1:22117 <-> DISABLED <-> BLACKLIST DNS request for known malware domain 09back.purpledaily.com (blacklist.rules)
 * 1:22118 <-> DISABLED <-> BLACKLIST DNS request for known malware domain 33bees.servebeer.com (blacklist.rules)
 * 1:22119 <-> DISABLED <-> BLACKLIST DNS request for known malware domain 3ml.infosupports.com (blacklist.rules)
 * 1:22120 <-> DISABLED <-> BLACKLIST DNS request for known malware domain a-af.arrowservice.net (blacklist.rules)
 * 1:22121 <-> DISABLED <-> BLACKLIST DNS request for known malware domain aam.businessconsults.net (blacklist.rules)
 * 1:22122 <-> DISABLED <-> BLACKLIST DNS request for known malware domain aar.bigdepression.net (blacklist.rules)
 * 1:22123 <-> DISABLED <-> BLACKLIST DNS request for known malware domain a-bne.arrowservice.net (blacklist.rules)
 * 1:22124 <-> DISABLED <-> BLACKLIST DNS request for known malware domain acli-mail.businessconsults.net (blacklist.rules)
 * 1:22125 <-> DISABLED <-> BLACKLIST DNS request for known malware domain acu.businessconsults.net (blacklist.rules)
 * 1:22126 <-> DISABLED <-> BLACKLIST DNS request for known malware domain adb.businessconsults.net (blacklist.rules)
 * 1:22127 <-> DISABLED <-> BLACKLIST DNS request for known malware domain add.infosupports.com (blacklist.rules)
 * 1:22128 <-> DISABLED <-> BLACKLIST DNS request for known malware domain addr.infosupports.com (blacklist.rules)
 * 1:22129 <-> DISABLED <-> BLACKLIST DNS request for known malware domain admin.arrowservice.net (blacklist.rules)
 * 1:22130 <-> DISABLED <-> BLACKLIST DNS request for known malware domain admin.softsolutionbox.net (blacklist.rules)
 * 1:22131 <-> DISABLED <-> BLACKLIST DNS request for known malware domain adt.businessconsults.net (blacklist.rules)
 * 1:22132 <-> DISABLED <-> BLACKLIST DNS request for known malware domain adtkl.newsonet.net (blacklist.rules)
 * 1:22133 <-> DISABLED <-> BLACKLIST DNS request for known malware domain adtlk.bigish.net (blacklist.rules)
 * 1:22134 <-> DISABLED <-> BLACKLIST DNS request for known malware domain aes.infosupports.com (blacklist.rules)
 * 1:22135 <-> DISABLED <-> BLACKLIST DNS request for known malware domain af.arrowservice.net (blacklist.rules)
 * 1:22136 <-> DISABLED <-> BLACKLIST DNS request for known malware domain afda.businessconsults.net (blacklist.rules)
 * 1:22137 <-> DISABLED <-> BLACKLIST DNS request for known malware domain afw.globalowa.com (blacklist.rules)
 * 1:22138 <-> DISABLED <-> BLACKLIST DNS request for known malware domain agl.softsolutionbox.net (blacklist.rules)
 * 1:22139 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ago.businessconsults.net (blacklist.rules)
 * 1:22140 <-> DISABLED <-> BLACKLIST DNS request for known malware domain a-if.arrowservice.net (blacklist.rules)
 * 1:22141 <-> DISABLED <-> BLACKLIST DNS request for known malware domain alarm.arrowservice.net (blacklist.rules)
 * 1:22142 <-> DISABLED <-> BLACKLIST DNS request for known malware domain alcan.arrowservice.net (blacklist.rules)
 * 1:22143 <-> DISABLED <-> BLACKLIST DNS request for known malware domain alion.businessconsults.net (blacklist.rules)
 * 1:22144 <-> DISABLED <-> BLACKLIST DNS request for known malware domain amne.purpledaily.com (blacklist.rules)
 * 1:22145 <-> DISABLED <-> BLACKLIST DNS request for known malware domain anglo.arrowservice.net (blacklist.rules)
 * 1:22146 <-> DISABLED <-> BLACKLIST DNS request for known malware domain aol.arrowservice.net (blacklist.rules)
 * 1:22147 <-> DISABLED <-> BLACKLIST DNS request for known malware domain aol.softsolutionbox.net (blacklist.rules)
 * 1:22148 <-> DISABLED <-> BLACKLIST DNS request for known malware domain apa.infosupports.com (blacklist.rules)
 * 1:22149 <-> DISABLED <-> BLACKLIST DNS request for known malware domain apa.newsonet.net (blacklist.rules)
 * 1:22150 <-> DISABLED <-> BLACKLIST DNS request for known malware domain apa.safalife.com (blacklist.rules)
 * 1:22151 <-> DISABLED <-> BLACKLIST DNS request for known malware domain apejack.bigish.net (blacklist.rules)
 * 1:22152 <-> DISABLED <-> BLACKLIST DNS request for known malware domain apekl.newsonet.net (blacklist.rules)
 * 1:22153 <-> DISABLED <-> BLACKLIST DNS request for known malware domain apple.blackcake.net (blacklist.rules)
 * 1:22154 <-> DISABLED <-> BLACKLIST DNS request for known malware domain apple.infosupports.com (blacklist.rules)
 * 1:22155 <-> DISABLED <-> BLACKLIST DNS request for known malware domain aps.bigdepression.net (blacklist.rules)
 * 1:22156 <-> DISABLED <-> BLACKLIST DNS request for known malware domain apss.newsonet.net (blacklist.rules)
 * 1:22157 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ara2.blackcake.net (blacklist.rules)
 * 1:22158 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ara2.infosupports.com (blacklist.rules)
 * 1:22159 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ara.blackcake.net (blacklist.rules)
 * 1:22160 <-> DISABLED <-> BLACKLIST DNS request for known malware domain arainfo.bigdepression.net (blacklist.rules)
 * 1:22161 <-> DISABLED <-> BLACKLIST DNS request for known malware domain arainfo.infosupports.com (blacklist.rules)
 * 1:22162 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ara.infosupports.com (blacklist.rules)
 * 1:22163 <-> DISABLED <-> BLACKLIST DNS request for known malware domain argsafhq.blackberrycluter.com (blacklist.rules)
 * 1:22164 <-> DISABLED <-> BLACKLIST DNS request for known malware domain armi.arrowservice.net (blacklist.rules)
 * 1:22165 <-> DISABLED <-> BLACKLIST DNS request for known malware domain asis.newsonet.net (blacklist.rules)
 * 1:22166 <-> DISABLED <-> BLACKLIST DNS request for known malware domain asiv.softsolutionbox.net (blacklist.rules)
 * 1:22167 <-> DISABLED <-> BLACKLIST DNS request for known malware domain asp.softsolutionbox.net (blacklist.rules)
 * 1:22168 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ass.globalowa.com (blacklist.rules)
 * 1:22169 <-> DISABLED <-> BLACKLIST DNS request for known malware domain astone.newsonet.net (blacklist.rules)
 * 1:22170 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ati2.globalowa.com (blacklist.rules)
 * 1:22171 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ati.arrowservice.net (blacklist.rules)
 * 1:22172 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ati.globalowa.com (blacklist.rules)
 * 1:22173 <-> DISABLED <-> BLACKLIST DNS request for known malware domain att.infosupports.com (blacklist.rules)
 * 1:22174 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ausi.businessconsults.net (blacklist.rules)
 * 1:22175 <-> DISABLED <-> BLACKLIST DNS request for known malware domain avph.earthsolution.org (blacklist.rules)
 * 1:22176 <-> DISABLED <-> BLACKLIST DNS request for known malware domain bab.infosupports.com (blacklist.rules)
 * 1:22177 <-> DISABLED <-> BLACKLIST DNS request for known malware domain back.earthsolution.org (blacklist.rules)
 * 1:22178 <-> DISABLED <-> BLACKLIST DNS request for known malware domain backup.infosupports.com (blacklist.rules)
 * 1:22179 <-> DISABLED <-> BLACKLIST DNS request for known malware domain back.worthhummer.net (blacklist.rules)
 * 1:22180 <-> DISABLED <-> BLACKLIST DNS request for known malware domain bah001.blackcake.net (blacklist.rules)
 * 1:22181 <-> DISABLED <-> BLACKLIST DNS request for known malware domain bah.safalife.com (blacklist.rules)
 * 1:22182 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ball.dnsweb.org (blacklist.rules)
 * 1:22183 <-> DISABLED <-> BLACKLIST DNS request for known malware domain bat.bigdepression.net (blacklist.rules)
 * 1:22184 <-> DISABLED <-> BLACKLIST DNS request for known malware domain bat.blackcake.net (blacklist.rules)
 * 1:22185 <-> DISABLED <-> BLACKLIST DNS request for known malware domain bat.infosupports.com (blacklist.rules)
 * 1:22186 <-> DISABLED <-> BLACKLIST DNS request for known malware domain bbc.blackcake.net (blacklist.rules)
 * 1:22187 <-> DISABLED <-> BLACKLIST DNS request for known malware domain bbh.dnsweb.org (blacklist.rules)
 * 1:22188 <-> DISABLED <-> BLACKLIST DNS request for known malware domain bcc.blackberrycluter.com (blacklist.rules)
 * 1:22189 <-> DISABLED <-> BLACKLIST DNS request for known malware domain bda.arrowservice.net (blacklist.rules)
 * 1:22190 <-> DISABLED <-> BLACKLIST DNS request for known malware domain bee.businessconsults.net (blacklist.rules)
 * 1:22191 <-> DISABLED <-> BLACKLIST DNS request for known malware domain bhbt.newsonet.net (blacklist.rules)
 * 1:22192 <-> DISABLED <-> BLACKLIST DNS request for known malware domain bksy.businessconsults.net (blacklist.rules)
 * 1:22193 <-> DISABLED <-> BLACKLIST DNS request for known malware domain bll.dnsweb.org (blacklist.rules)
 * 1:22194 <-> DISABLED <-> BLACKLIST DNS request for known malware domain blue.infosupports.com (blacklist.rules)
 * 1:22195 <-> DISABLED <-> BLACKLIST DNS request for known malware domain bob.dnsweb.org (blacklist.rules)
 * 1:22196 <-> DISABLED <-> BLACKLIST DNS request for known malware domain bobo.buisnessconsults.net (blacklist.rules)
 * 1:22197 <-> DISABLED <-> BLACKLIST DNS request for known malware domain bot.bigdepression.net (blacklist.rules)
 * 1:22198 <-> DISABLED <-> BLACKLIST DNS request for known malware domain bphb.arrowservice.net (blacklist.rules)
 * 1:22199 <-> DISABLED <-> BLACKLIST DNS request for known malware domain bswt.purpledaily.com (blacklist.rules)
 * 1:22200 <-> DISABLED <-> BLACKLIST DNS request for known malware domain built.arrowservice.net (blacklist.rules)
 * 1:22201 <-> DISABLED <-> BLACKLIST DNS request for known malware domain business.chileexe77.com (blacklist.rules)
 * 1:22202 <-> DISABLED <-> BLACKLIST DNS request for known malware domain business.infosupports.com (blacklist.rules)
 * 1:22203 <-> DISABLED <-> BLACKLIST DNS request for known malware domain buyer.arrowservice.net (blacklist.rules)
 * 1:22204 <-> DISABLED <-> BLACKLIST DNS request for known malware domain buz.businessconsults.net (blacklist.rules)
 * 1:22205 <-> DISABLED <-> BLACKLIST DNS request for known malware domain caaid.newsonet.net (blacklist.rules)
 * 1:22206 <-> DISABLED <-> BLACKLIST DNS request for known malware domain cac.bigdepression.net (blacklist.rules)
 * 1:22207 <-> DISABLED <-> BLACKLIST DNS request for known malware domain caci2.infosupports.com (blacklist.rules)
 * 1:22208 <-> DISABLED <-> BLACKLIST DNS request for known malware domain caci.blackcake.net (blacklist.rules)
 * 1:22209 <-> DISABLED <-> BLACKLIST DNS request for known malware domain caci.businessconsults.net (blacklist.rules)
 * 1:22210 <-> DISABLED <-> BLACKLIST DNS request for known malware domain caci.infosupports.com (blacklist.rules)
 * 1:22211 <-> DISABLED <-> BLACKLIST DNS request for known malware domain caci.safalife.com (blacklist.rules)
 * 1:22212 <-> DISABLED <-> BLACKLIST DNS request for known malware domain cacq.bigdepression.net (blacklist.rules)
 * 1:22213 <-> DISABLED <-> BLACKLIST DNS request for known malware domain cac.worthhummer.net (blacklist.rules)
 * 1:22214 <-> DISABLED <-> BLACKLIST DNS request for known malware domain cadfait.softsolutionbox.net (blacklist.rules)
 * 1:22215 <-> DISABLED <-> BLACKLIST DNS request for known malware domain cais.blackcake.net (blacklist.rules)
 * 1:22216 <-> DISABLED <-> BLACKLIST DNS request for known malware domain car1.bigdepression.net (blacklist.rules)
 * 1:22217 <-> DISABLED <-> BLACKLIST DNS request for known malware domain carpgallery.longmusic.com (blacklist.rules)
 * 1:22218 <-> DISABLED <-> BLACKLIST DNS request for known malware domain carvin.infosupports.com (blacklist.rules)
 * 1:22219 <-> DISABLED <-> BLACKLIST DNS request for known malware domain catalog.earthsolution.org (blacklist.rules)
 * 1:22220 <-> DISABLED <-> BLACKLIST DNS request for known malware domain cbc.purpledaily.com (blacklist.rules)
 * 1:22916 <-> ENABLED <-> SPECIFIC-THREATS Adobe Flash Player object confusion attempt (specific-threats.rules)
 * 1:22915 <-> ENABLED <-> SPECIFIC-THREATS Adobe Flash Player object confusion attempt (specific-threats.rules)
 * 1:22914 <-> DISABLED <-> BLACKLIST DNS request for known malware domain yang2.infosupports.com (blacklist.rules)
 * 1:22913 <-> DISABLED <-> BLACKLIST DNS request for known malware domain yang1.infosupports.com (blacklist.rules)
 * 1:22912 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www2.wikaba.com (blacklist.rules)
 * 1:22911 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ou7.infosupports.com (blacklist.rules)
 * 1:22909 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ou2.infosupports.com (blacklist.rules)
 * 1:22910 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ou3.infosupports.com (blacklist.rules)
 * 1:22908 <-> DISABLED <-> BLACKLIST DNS request for known malware domain catalog.earthsolution.org (blacklist.rules)
 * 1:22907 <-> DISABLED <-> BLACKLIST DNS request for known malware domain vope.purpledaily.com (blacklist.rules)
 * 1:22906 <-> DISABLED <-> BLACKLIST DNS request for known malware domain vop.earthsolution.org (blacklist.rules)
 * 1:22905 <-> DISABLED <-> BLACKLIST DNS request for known malware domain visual.earthsolution.org (blacklist.rules)
 * 1:22904 <-> DISABLED <-> BLACKLIST DNS request for known malware domain special.earthsolution.org (blacklist.rules)
 * 1:22903 <-> DISABLED <-> BLACKLIST DNS request for known malware domain quiet.earthsolution.org (blacklist.rules)
 * 1:22902 <-> DISABLED <-> BLACKLIST DNS request for known malware domain java.earthsolution.org (blacklist.rules)
 * 1:22901 <-> DISABLED <-> BLACKLIST DNS request for known malware domain hav.earthsolution.org (blacklist.rules)
 * 1:22900 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ghma.earthsolution.org (blacklist.rules)
 * 1:22899 <-> DISABLED <-> BLACKLIST DNS request for known malware domain gee.safalife.com (blacklist.rules)
 * 1:22898 <-> DISABLED <-> BLACKLIST DNS request for known malware domain webmail.whandjg.net (blacklist.rules)
 * 1:22897 <-> DISABLED <-> BLACKLIST DNS request for known malware domain webmail.dcfrr.com (blacklist.rules)
 * 1:22896 <-> DISABLED <-> BLACKLIST DNS request for known malware domain techniq.whandjg.net (blacklist.rules)
 * 1:22895 <-> DISABLED <-> BLACKLIST DNS request for known malware domain pop.dnsweb.org (blacklist.rules)
 * 1:22894 <-> DISABLED <-> BLACKLIST DNS request for known malware domain news.scitence.net (blacklist.rules)
 * 1:22893 <-> DISABLED <-> BLACKLIST DNS request for known malware domain news.billten.net (blacklist.rules)
 * 1:22892 <-> DISABLED <-> BLACKLIST DNS request for known malware domain mailsrv.scitence.net (blacklist.rules)
 * 1:22891 <-> DISABLED <-> BLACKLIST DNS request for known malware domain mail.new-soho.com (blacklist.rules)
 * 1:22890 <-> DISABLED <-> BLACKLIST DNS request for known malware domain info.scitence.net (blacklist.rules)
 * 1:22889 <-> DISABLED <-> BLACKLIST DNS request for known malware domain info.new-soho.com (blacklist.rules)
 * 1:22888 <-> DISABLED <-> BLACKLIST DNS request for known malware domain info.helpngr.net (blacklist.rules)
 * 1:22887 <-> DISABLED <-> BLACKLIST DNS request for known malware domain info.dcfrr.com (blacklist.rules)
 * 1:22886 <-> DISABLED <-> BLACKLIST DNS request for known malware domain info.billten.net (blacklist.rules)
 * 1:22884 <-> DISABLED <-> BLACKLIST DNS request for known malware domain db.billten.net (blacklist.rules)
 * 1:22885 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ddbb.gxdet.com (blacklist.rules)
 * 1:22883 <-> DISABLED <-> BLACKLIST DNS request for known malware domain conn.gxdet.com (blacklist.rules)
 * 1:22882 <-> DISABLED <-> BLACKLIST DNS request for known malware domain aar.bigdepression.net (blacklist.rules)
 * 1:22881 <-> DISABLED <-> BLACKLIST DNS request for known malware domain sysinfo.mynumber.org (blacklist.rules)
 * 1:22880 <-> DISABLED <-> BLACKLIST DNS request for known malware domain songs.longmusic.com (blacklist.rules)
 * 1:22879 <-> DISABLED <-> BLACKLIST DNS request for known malware domain seoulsummit.ddns.ms (blacklist.rules)
 * 1:22878 <-> DISABLED <-> BLACKLIST DNS request for known malware domain san.www1.biz (blacklist.rules)
 * 1:22877 <-> DISABLED <-> BLACKLIST DNS request for known malware domain office.lflink.com (blacklist.rules)
 * 1:22876 <-> DISABLED <-> BLACKLIST DNS request for known malware domain mosfdns.ddns.ms (blacklist.rules)
 * 1:22875 <-> DISABLED <-> BLACKLIST DNS request for known malware domain mailserver.sendsmtp.com (blacklist.rules)
 * 1:22874 <-> DISABLED <-> BLACKLIST DNS request for known malware domain mailserver.instanthq.com (blacklist.rules)
 * 1:22873 <-> DISABLED <-> BLACKLIST DNS request for known malware domain epaserver.toythieves.com (blacklist.rules)
 * 1:22872 <-> DISABLED <-> BLACKLIST DNS request for known malware domain argentinia.faqserv.com (blacklist.rules)
 * 1:22871 <-> DISABLED <-> BLACKLIST DNS request for known malware domain nsweb.hostent.org (blacklist.rules)
 * 1:22870 <-> DISABLED <-> BLACKLIST DNS request for known malware domain srs.infosupports.com (blacklist.rules)
 * 1:22869 <-> DISABLED <-> BLACKLIST DNS request for known malware domain sports.businessconsults.net (blacklist.rules)
 * 1:22868 <-> DISABLED <-> BLACKLIST DNS request for known malware domain qiao6.bigdepression.net (blacklist.rules)
 * 1:22867 <-> DISABLED <-> BLACKLIST DNS request for known malware domain qiao5.bigdepression.net (blacklist.rules)
 * 1:22866 <-> DISABLED <-> BLACKLIST DNS request for known malware domain qiao4.bigdepression.net (blacklist.rules)
 * 1:22865 <-> DISABLED <-> BLACKLIST DNS request for known malware domain qiao3.bigdepression.net (blacklist.rules)
 * 1:22864 <-> DISABLED <-> BLACKLIST DNS request for known malware domain qiao2.bigdepression.net (blacklist.rules)
 * 1:22863 <-> DISABLED <-> BLACKLIST DNS request for known malware domain qiao1.bigdepression.net (blacklist.rules)
 * 1:22862 <-> DISABLED <-> BLACKLIST DNS request for known malware domain news.businessconsults.net (blacklist.rules)
 * 1:22861 <-> DISABLED <-> BLACKLIST DNS request for known malware domain mantech.blackcake.net (blacklist.rules)
 * 1:22860 <-> DISABLED <-> BLACKLIST DNS request for known malware domain lucy.businessconsults.net (blacklist.rules)
 * 1:22859 <-> DISABLED <-> BLACKLIST DNS request for known malware domain lucy.blackcake.net (blacklist.rules)
 * 1:22858 <-> DISABLED <-> BLACKLIST DNS request for known malware domain lucy2.infosupports.com (blacklist.rules)
 * 1:22857 <-> DISABLED <-> BLACKLIST DNS request for known malware domain lucy2.businessconsults.net (blacklist.rules)
 * 1:22451 <-> DISABLED <-> BLACKLIST DNS request for known malware domain login.blackcake.net (blacklist.rules)
 * 1:22856 <-> DISABLED <-> BLACKLIST DNS request for known malware domain doa.bigdepression.net (blacklist.rules)
 * 1:22855 <-> DISABLED <-> BLACKLIST DNS request for known malware domain caci2.infosupports.com (blacklist.rules)
 * 1:22854 <-> DISABLED <-> BLACKLIST DNS request for known malware domain bah001.blackcake.net (blacklist.rules)
 * 1:22853 <-> DISABLED <-> BLACKLIST DNS request for known malware domain quick.earthsolution.org (blacklist.rules)
 * 1:22446 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ln.purpledaily.com (blacklist.rules)
 * 1:22851 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.optimizon.com (blacklist.rules)
 * 1:22852 <-> DISABLED <-> BLACKLIST DNS request for known malware domain inter.earthsolution.org (blacklist.rules)
 * 1:22724 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ug-enrc.hugesoft.org (blacklist.rules)
 * 1:22725 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ug-ga.hugesoft.org (blacklist.rules)
 * 1:22726 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ug-hst.hugesoft.org (blacklist.rules)
 * 1:22727 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ug-irpf.hugesoft.org (blacklist.rules)
 * 1:22728 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ug-kfc.hugesoft.org (blacklist.rules)
 * 1:22729 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ug-man.hugesoft.org (blacklist.rules)
 * 1:22730 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ug-mbi.hugesoft.org (blacklist.rules)
 * 1:22731 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ug-nema.hugesoft.org (blacklist.rules)
 * 1:22732 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ug-opm.hugesoft.org (blacklist.rules)
 * 1:22733 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ug-piec.hugesoft.org (blacklist.rules)
 * 1:22734 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ug-pmet.hugesoft.org (blacklist.rules)
 * 1:22735 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ug-pnl.hugesoft.org (blacklist.rules)
 * 1:22736 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ug-rev.hugesoft.org (blacklist.rules)
 * 1:22737 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ug-rj.arrowservice.net (blacklist.rules)
 * 1:22738 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ug-rj.hugesoft.org (blacklist.rules)
 * 1:22739 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ug-sbig.hugesoft.org (blacklist.rules)
 * 1:22740 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ug-tree.hugesoft.org (blacklist.rules)
 * 1:22741 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ug-tta.hugesoft.org (blacklist.rules)
 * 1:22742 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ug-volpe.hugesoft.org (blacklist.rules)
 * 1:22743 <-> DISABLED <-> BLACKLIST DNS request for known malware domain unifh.earthsolution.org (blacklist.rules)
 * 1:22744 <-> DISABLED <-> BLACKLIST DNS request for known malware domain update.dnsweb.org (blacklist.rules)
 * 1:22745 <-> DISABLED <-> BLACKLIST DNS request for known malware domain update.safalife.com (blacklist.rules)
 * 1:22746 <-> DISABLED <-> BLACKLIST DNS request for known malware domain up.safalife.com (blacklist.rules)
 * 1:22747 <-> DISABLED <-> BLACKLIST DNS request for known malware domain url.blackcake.net (blacklist.rules)
 * 1:22748 <-> DISABLED <-> BLACKLIST DNS request for known malware domain url.infosupports.com (blacklist.rules)
 * 1:22749 <-> DISABLED <-> BLACKLIST DNS request for known malware domain usc.dnsweb.org (blacklist.rules)
 * 1:22750 <-> DISABLED <-> BLACKLIST DNS request for known malware domain usc.newsonet.net (blacklist.rules)
 * 1:22751 <-> DISABLED <-> BLACKLIST DNS request for known malware domain us.issnbgkit.net (blacklist.rules)
 * 1:22752 <-> DISABLED <-> BLACKLIST DNS request for known malware domain utc.bigdepression.net (blacklist.rules)
 * 1:22753 <-> DISABLED <-> BLACKLIST DNS request for known malware domain utc.dnsweb.org (blacklist.rules)
 * 1:22754 <-> DISABLED <-> BLACKLIST DNS request for known malware domain utex.earthsolution.org (blacklist.rules)
 * 1:22755 <-> DISABLED <-> BLACKLIST DNS request for known malware domain value.arrowservice.net (blacklist.rules)
 * 1:22756 <-> DISABLED <-> BLACKLIST DNS request for known malware domain velp.earthsolution.org (blacklist.rules)
 * 1:22757 <-> DISABLED <-> BLACKLIST DNS request for known malware domain via.blackcake.net (blacklist.rules)
 * 1:22758 <-> DISABLED <-> BLACKLIST DNS request for known malware domain via.infosupports.com (blacklist.rules)
 * 1:22759 <-> DISABLED <-> BLACKLIST DNS request for known malware domain vip.issnbgkit.net (blacklist.rules)
 * 1:22760 <-> DISABLED <-> BLACKLIST DNS request for known malware domain vip.pcclubddk.net (blacklist.rules)
 * 1:22761 <-> DISABLED <-> BLACKLIST DNS request for known malware domain visco.infosupports.com (blacklist.rules)
 * 1:22762 <-> DISABLED <-> BLACKLIST DNS request for known malware domain visual.earthsolution.org (blacklist.rules)
 * 1:22763 <-> DISABLED <-> BLACKLIST DNS request for known malware domain vol.infosupports.com (blacklist.rules)
 * 1:22764 <-> DISABLED <-> BLACKLIST DNS request for known malware domain vop.earthsolution.org (blacklist.rules)
 * 1:22765 <-> DISABLED <-> BLACKLIST DNS request for known malware domain vope.purpledaily.com (blacklist.rules)
 * 1:22766 <-> DISABLED <-> BLACKLIST DNS request for known malware domain vopm.earthsolution.org (blacklist.rules)
 * 1:22767 <-> DISABLED <-> BLACKLIST DNS request for known malware domain vpn.globalowa.com (blacklist.rules)
 * 1:22768 <-> DISABLED <-> BLACKLIST DNS request for known malware domain vpn.softsolutionbox.net (blacklist.rules)
 * 1:22769 <-> DISABLED <-> BLACKLIST DNS request for known malware domain vsec.bigdepression.net (blacklist.rules)
 * 1:22770 <-> DISABLED <-> BLACKLIST DNS request for known malware domain vseh.earthsolution.org (blacklist.rules)
 * 1:22771 <-> DISABLED <-> BLACKLIST DNS request for known malware domain walk.bigish.net (blacklist.rules)
 * 1:22772 <-> DISABLED <-> BLACKLIST DNS request for known malware domain wapi.businessconsults.net (blacklist.rules)
 * 1:22773 <-> DISABLED <-> BLACKLIST DNS request for known malware domain was.arrowservice.net (blacklist.rules)
 * 1:22774 <-> DISABLED <-> BLACKLIST DNS request for known malware domain wcov.businessconsults.net (blacklist.rules)
 * 1:22775 <-> DISABLED <-> BLACKLIST DNS request for known malware domain wdeh.businessconsults.net (blacklist.rules)
 * 1:22776 <-> DISABLED <-> BLACKLIST DNS request for known malware domain weather.chileexe77.com (blacklist.rules)
 * 1:22777 <-> DISABLED <-> BLACKLIST DNS request for known malware domain web.arrowservice.net (blacklist.rules)
 * 1:22778 <-> DISABLED <-> BLACKLIST DNS request for known malware domain web.bigdepression.net (blacklist.rules)
 * 1:22779 <-> DISABLED <-> BLACKLIST DNS request for known malware domain web.infosupports.com (blacklist.rules)
 * 1:22780 <-> DISABLED <-> BLACKLIST DNS request for known malware domain weblog.bigish.net (blacklist.rules)
 * 1:22781 <-> DISABLED <-> BLACKLIST DNS request for known malware domain webmail.arrowservice.net (blacklist.rules)
 * 1:22782 <-> DISABLED <-> BLACKLIST DNS request for known malware domain webmail.blackcake.net (blacklist.rules)
 * 1:22783 <-> DISABLED <-> BLACKLIST DNS request for known malware domain webmail.businessconsults.net (blacklist.rules)
 * 1:22784 <-> DISABLED <-> BLACKLIST DNS request for known malware domain webmail.newsonet.net (blacklist.rules)
 * 1:22785 <-> DISABLED <-> BLACKLIST DNS request for known malware domain webmail.softsolutionbox.net (blacklist.rules)
 * 1:22786 <-> DISABLED <-> BLACKLIST DNS request for known malware domain wed5.blackcake.net (blacklist.rules)
 * 1:22787 <-> DISABLED <-> BLACKLIST DNS request for known malware domain wed5.infosupports.com (blacklist.rules)
 * 1:22788 <-> DISABLED <-> BLACKLIST DNS request for known malware domain westkl.blackberrycluter.com (blacklist.rules)
 * 1:22789 <-> DISABLED <-> BLACKLIST DNS request for known malware domain westkl.worthhummer.net (blacklist.rules)
 * 1:22790 <-> DISABLED <-> BLACKLIST DNS request for known malware domain we.trickip.org (blacklist.rules)
 * 1:22791 <-> DISABLED <-> BLACKLIST DNS request for known malware domain wff.businessconsults.net (blacklist.rules)
 * 1:22792 <-> DISABLED <-> BLACKLIST DNS request for known malware domain what.arrowservice.net (blacklist.rules)
 * 1:22793 <-> DISABLED <-> BLACKLIST DNS request for known malware domain wmp.businessconsults.net (blacklist.rules)
 * 1:22794 <-> DISABLED <-> BLACKLIST DNS request for known malware domain wnam.businessconsults.net (blacklist.rules)
 * 1:22795 <-> DISABLED <-> BLACKLIST DNS request for known malware domain wnew.businessconsults.net (blacklist.rules)
 * 1:22796 <-> DISABLED <-> BLACKLIST DNS request for known malware domain wopec.businessconsults.net (blacklist.rules)
 * 1:22797 <-> DISABLED <-> BLACKLIST DNS request for known malware domain workstation.arrowservice.net (blacklist.rules)
 * 1:22798 <-> DISABLED <-> BLACKLIST DNS request for known malware domain world.businessconsults.net (blacklist.rules)
 * 1:22799 <-> DISABLED <-> BLACKLIST DNS request for known malware domain wpcs.businessconsults.net (blacklist.rules)
 * 1:22800 <-> DISABLED <-> BLACKLIST DNS request for known malware domain wpot.arrowservice.net (blacklist.rules)
 * 1:22801 <-> DISABLED <-> BLACKLIST DNS request for known malware domain wpot.businessconsults.net (blacklist.rules)
 * 1:22802 <-> DISABLED <-> BLACKLIST DNS request for known malware domain wpvn.businessconsults.net (blacklist.rules)
 * 1:22803 <-> DISABLED <-> BLACKLIST DNS request for known malware domain wpvn.softsolutionbox.net (blacklist.rules)
 * 1:22804 <-> DISABLED <-> BLACKLIST DNS request for known malware domain wrim.businessconsults.net (blacklist.rules)
 * 1:22805 <-> DISABLED <-> BLACKLIST DNS request for known malware domain wsyggfw.newsonet.net (blacklist.rules)
 * 1:22806 <-> DISABLED <-> BLACKLIST DNS request for known malware domain wwab.purpledaily.com (blacklist.rules)
 * 1:22807 <-> DISABLED <-> BLACKLIST DNS request for known malware domain wwt.blackcake.net (blacklist.rules)
 * 1:22808 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www1.bigdepression.net (blacklist.rules)
 * 1:22809 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www1.earthsolution.org (blacklist.rules)
 * 1:22810 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www1.infosupports.com (blacklist.rules)
 * 1:22811 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www2.bigdepression.net (blacklist.rules)
 * 1:22812 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www2.wikaba.com (blacklist.rules)
 * 1:22221 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ccb.blackberrycluter.com (blacklist.rules)
 * 1:22222 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ccsukl.purpledaily.com (blacklist.rules)
 * 1:22223 <-> DISABLED <-> BLACKLIST DNS request for known malware domain cdc01.hugesoft.org (blacklist.rules)
 * 1:22224 <-> DISABLED <-> BLACKLIST DNS request for known malware domain cdcd.newsonet.net (blacklist.rules)
 * 1:22226 <-> DISABLED <-> BLACKLIST DNS request for known malware domain center.arrowservice.net (blacklist.rules)
 * 1:22227 <-> DISABLED <-> BLACKLIST DNS request for known malware domain center.infosupports.com (blacklist.rules)
 * 1:22228 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ceros.buisnessconsults.net (blacklist.rules)
 * 1:22225 <-> DISABLED <-> BLACKLIST DNS request for known malware domain cdd.purpledaily.com (blacklist.rules)
 * 1:22229 <-> DISABLED <-> BLACKLIST DNS request for known malware domain chamus.gmailboxes.com (blacklist.rules)
 * 1:22231 <-> DISABLED <-> BLACKLIST DNS request for known malware domain cib.businessconsults.net (blacklist.rules)
 * 1:22232 <-> DISABLED <-> BLACKLIST DNS request for known malware domain cibuc.blackcake.net (blacklist.rules)
 * 1:22233 <-> DISABLED <-> BLACKLIST DNS request for known malware domain citrix.globalowa.com (blacklist.rules)
 * 1:22230 <-> DISABLED <-> BLACKLIST DNS request for known malware domain chq.newsonet.net (blacklist.rules)
 * 1:22234 <-> DISABLED <-> BLACKLIST DNS request for known malware domain climate.newsonet.net (blacklist.rules)
 * 1:22236 <-> DISABLED <-> BLACKLIST DNS request for known malware domain cman.blackcake.net (blacklist.rules)
 * 1:22237 <-> DISABLED <-> BLACKLIST DNS request for known malware domain coco.purpledaily.com (blacklist.rules)
 * 1:22238 <-> DISABLED <-> BLACKLIST DNS request for known malware domain cok.purpledaily.com (blacklist.rules)
 * 1:22235 <-> DISABLED <-> BLACKLIST DNS request for known malware domain clin.earthsolution.org (blacklist.rules)
 * 1:22239 <-> DISABLED <-> BLACKLIST DNS request for known malware domain comfile.softsolutionbox.net (blacklist.rules)
 * 1:22241 <-> DISABLED <-> BLACKLIST DNS request for known malware domain contact.ignorelist.com (blacklist.rules)
 * 1:22242 <-> DISABLED <-> BLACKLIST DNS request for known malware domain contact.purpledaily.com (blacklist.rules)
 * 1:22243 <-> DISABLED <-> BLACKLIST DNS request for known malware domain control.arrowservice.net (blacklist.rules)
 * 1:22240 <-> DISABLED <-> BLACKLIST DNS request for known malware domain contact.arrowservice.net (blacklist.rules)
 * 1:22244 <-> DISABLED <-> BLACKLIST DNS request for known malware domain control.blackberrycluter.com (blacklist.rules)
 * 1:22246 <-> DISABLED <-> BLACKLIST DNS request for known malware domain cool.newsonet.net (blacklist.rules)
 * 1:22247 <-> DISABLED <-> BLACKLIST DNS request for known malware domain copierexpert.com (blacklist.rules)
 * 1:22248 <-> DISABLED <-> BLACKLIST DNS request for known malware domain corp.purpledaily.com (blacklist.rules)
 * 1:22245 <-> DISABLED <-> BLACKLIST DNS request for known malware domain cook.globalowa.com (blacklist.rules)
 * 1:22249 <-> DISABLED <-> BLACKLIST DNS request for known malware domain count.blackcake.net (blacklist.rules)
 * 1:22251 <-> DISABLED <-> BLACKLIST DNS request for known malware domain covclient.arrowservice.net (blacklist.rules)
 * 1:22252 <-> DISABLED <-> BLACKLIST DNS request for known malware domain cow.arrowservice.net (blacklist.rules)
 * 1:22253 <-> DISABLED <-> BLACKLIST DNS request for known malware domain cowboy.bigish.net (blacklist.rules)
 * 1:22250 <-> DISABLED <-> BLACKLIST DNS request for known malware domain cov.arrowservice.net (blacklist.rules)
 * 1:22254 <-> DISABLED <-> BLACKLIST DNS request for known malware domain crab.arrowservice.net (blacklist.rules)
 * 1:22256 <-> DISABLED <-> BLACKLIST DNS request for known malware domain csba.bigdepression.net (blacklist.rules)
 * 1:22257 <-> DISABLED <-> BLACKLIST DNS request for known malware domain csc.businessconsults.net (blacklist.rules)
 * 1:22258 <-> DISABLED <-> BLACKLIST DNS request for known malware domain csch.infosupports.com (blacklist.rules)
 * 1:22255 <-> DISABLED <-> BLACKLIST DNS request for known malware domain crazycow.homenet.org (blacklist.rules)
 * 1:22259 <-> DISABLED <-> BLACKLIST DNS request for known malware domain csupp.bigish.net (blacklist.rules)
 * 1:22261 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ctcn.dns2.us (blacklist.rules)
 * 1:22262 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ctcn.purpledaily.com (blacklist.rules)
 * 1:22263 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ctcs.bigdepression.net (blacklist.rules)
 * 1:22260 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ctch.earthsolution.org (blacklist.rules)
 * 1:22264 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ctisk.purpledaily.com (blacklist.rules)
 * 1:22266 <-> DISABLED <-> BLACKLIST DNS request for known malware domain culture.chileexe77.com (blacklist.rules)
 * 1:22267 <-> DISABLED <-> BLACKLIST DNS request for known malware domain daa.bigdepression.net (blacklist.rules)
 * 1:22268 <-> DISABLED <-> BLACKLIST DNS request for known malware domain date.gmailboxes.com (blacklist.rules)
 * 1:22265 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ctx.safalife.com (blacklist.rules)
 * 1:22269 <-> DISABLED <-> BLACKLIST DNS request for known malware domain dcs.ygto.com (blacklist.rules)
 * 1:22271 <-> DISABLED <-> BLACKLIST DNS request for known malware domain den.blackcake.net (blacklist.rules)
 * 1:22272 <-> DISABLED <-> BLACKLIST DNS request for known malware domain denel.businessconsults.net (blacklist.rules)
 * 1:22273 <-> DISABLED <-> BLACKLIST DNS request for known malware domain des.blackcake.net (blacklist.rules)
 * 1:22270 <-> DISABLED <-> BLACKLIST DNS request for known malware domain default.arrowservice.net (blacklist.rules)
 * 1:22274 <-> DISABLED <-> BLACKLIST DNS request for known malware domain des.infosupports.com (blacklist.rules)
 * 1:22276 <-> DISABLED <-> BLACKLIST DNS request for known malware domain dfait-kl.worthhummer.net (blacklist.rules)
 * 1:22277 <-> DISABLED <-> BLACKLIST DNS request for known malware domain dgih.dnsweb.org (blacklist.rules)
 * 1:22278 <-> DISABLED <-> BLACKLIST DNS request for known malware domain dias.globalowa.com (blacklist.rules)
 * 1:22275 <-> DISABLED <-> BLACKLIST DNS request for known malware domain dev.teamattire.com (blacklist.rules)
 * 1:22279 <-> DISABLED <-> BLACKLIST DNS request for known malware domain dns.chileexe77.com (blacklist.rules)
 * 1:22281 <-> DISABLED <-> BLACKLIST DNS request for known malware domain dns.issnbgkit.net (blacklist.rules)
 * 1:22282 <-> DISABLED <-> BLACKLIST DNS request for known malware domain doa.bigdepression.net (blacklist.rules)
 * 1:22283 <-> DISABLED <-> BLACKLIST DNS request for known malware domain dod.dnsweb.org (blacklist.rules)
 * 1:22280 <-> DISABLED <-> BLACKLIST DNS request for known malware domain dnsg.bigdepression.net (blacklist.rules)
 * 1:22284 <-> DISABLED <-> BLACKLIST DNS request for known malware domain domain.arrowservice.net (blacklist.rules)
 * 1:22286 <-> DISABLED <-> BLACKLIST DNS request for known malware domain dove.blackcake.net (blacklist.rules)
 * 1:22287 <-> DISABLED <-> BLACKLIST DNS request for known malware domain down.safalife.com (blacklist.rules)
 * 1:22288 <-> DISABLED <-> BLACKLIST DNS request for known malware domain drs.infosupports.com (blacklist.rules)
 * 1:22285 <-> DISABLED <-> BLACKLIST DNS request for known malware domain dotnet.safalife.com (blacklist.rules)
 * 1:22289 <-> DISABLED <-> BLACKLIST DNS request for known malware domain drs.safalife.com (blacklist.rules)
 * 1:22291 <-> DISABLED <-> BLACKLIST DNS request for known malware domain dsw.blackcake.net (blacklist.rules)
 * 1:22292 <-> DISABLED <-> BLACKLIST DNS request for known malware domain dvid.blackcake.net (blacklist.rules)
 * 1:22293 <-> DISABLED <-> BLACKLIST DNS request for known malware domain dvid.infosupports.com (blacklist.rules)
 * 1:22290 <-> DISABLED <-> BLACKLIST DNS request for known malware domain dsh.newsonet.net (blacklist.rules)
 * 1:22294 <-> DISABLED <-> BLACKLIST DNS request for known malware domain dvn.newsonet.net (blacklist.rules)
 * 1:22296 <-> DISABLED <-> BLACKLIST DNS request for known malware domain dyns.infosupports.com (blacklist.rules)
 * 1:22297 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ecc.bigdepression.net (blacklist.rules)
 * 1:22298 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ecc.safalife.com (blacklist.rules)
 * 1:22295 <-> DISABLED <-> BLACKLIST DNS request for known malware domain dyn.newsonet.net (blacklist.rules)
 * 1:22299 <-> DISABLED <-> BLACKLIST DNS request for known malware domain eds1.infosupports.com (blacklist.rules)
 * 1:22301 <-> DISABLED <-> BLACKLIST DNS request for known malware domain email.hugesoft.org (blacklist.rules)
 * 1:22302 <-> DISABLED <-> BLACKLIST DNS request for known malware domain engineer2010.mynumber.org (blacklist.rules)
 * 1:22303 <-> DISABLED <-> BLACKLIST DNS request for known malware domain epic.purpledaily.com (blacklist.rules)
 * 1:22300 <-> DISABLED <-> BLACKLIST DNS request for known malware domain egcc.bigdepression.net (blacklist.rules)
 * 1:22304 <-> DISABLED <-> BLACKLIST DNS request for known malware domain epi.newsonet.net (blacklist.rules)
 * 1:22306 <-> DISABLED <-> BLACKLIST DNS request for known malware domain epod.businessconsults.net (blacklist.rules)
 * 1:22307 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ever.arrowservice.net (blacklist.rules)
 * 1:22308 <-> DISABLED <-> BLACKLIST DNS request for known malware domain explorer.pcanywhere.net (blacklist.rules)
 * 1:22305 <-> DISABLED <-> BLACKLIST DNS request for known malware domain epi.purpledaily.com (blacklist.rules)
 * 1:22309 <-> DISABLED <-> BLACKLIST DNS request for known malware domain eye.businessconsults.net (blacklist.rules)
 * 1:22311 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ffej.newsonet.net (blacklist.rules)
 * 1:22312 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ffej.purpledaily.com (blacklist.rules)
 * 1:22313 <-> DISABLED <-> BLACKLIST DNS request for known malware domain fher.bigish.net (blacklist.rules)
 * 1:22310 <-> DISABLED <-> BLACKLIST DNS request for known malware domain fed.purpledaily.com (blacklist.rules)
 * 1:22314 <-> DISABLED <-> BLACKLIST DNS request for known malware domain fher.buisnessconsults.net (blacklist.rules)
 * 1:22316 <-> DISABLED <-> BLACKLIST DNS request for known malware domain fhh.purpledaily.com (blacklist.rules)
 * 1:22317 <-> DISABLED <-> BLACKLIST DNS request for known malware domain fim.purpledaily.com (blacklist.rules)
 * 1:22318 <-> DISABLED <-> BLACKLIST DNS request for known malware domain finance.chileexe77.com (blacklist.rules)
 * 1:22315 <-> DISABLED <-> BLACKLIST DNS request for known malware domain fher.businessconsults.net (blacklist.rules)
 * 1:22319 <-> DISABLED <-> BLACKLIST DNS request for known malware domain fineca.blackberrycluter.com (blacklist.rules)
 * 1:22321 <-> DISABLED <-> BLACKLIST DNS request for known malware domain finekl.bigish.net (blacklist.rules)
 * 1:22322 <-> DISABLED <-> BLACKLIST DNS request for known malware domain finekl.purpledaily.com (blacklist.rules)
 * 1:22323 <-> DISABLED <-> BLACKLIST DNS request for known malware domain finekl.worthhummer.net (blacklist.rules)
 * 1:22320 <-> DISABLED <-> BLACKLIST DNS request for known malware domain fineca.newsonet.net (blacklist.rules)
 * 1:22324 <-> DISABLED <-> BLACKLIST DNS request for known malware domain fine.worthhummer.net (blacklist.rules)
 * 1:22326 <-> DISABLED <-> BLACKLIST DNS request for known malware domain flashingaway.otzo.com (blacklist.rules)
 * 1:22327 <-> DISABLED <-> BLACKLIST DNS request for known malware domain flucare.worthhummer.net (blacklist.rules)
 * 1:22328 <-> DISABLED <-> BLACKLIST DNS request for known malware domain fly.blackcake.net (blacklist.rules)
 * 1:22325 <-> DISABLED <-> BLACKLIST DNS request for known malware domain fjod.businessconsults.net (blacklist.rules)
 * 1:22329 <-> DISABLED <-> BLACKLIST DNS request for known malware domain fmcc.businessconsults.net (blacklist.rules)
 * 1:22331 <-> DISABLED <-> BLACKLIST DNS request for known malware domain fmp.worthhummer.net (blacklist.rules)
 * 1:22332 <-> DISABLED <-> BLACKLIST DNS request for known malware domain fnem.businessconsults.net (blacklist.rules)
 * 1:22333 <-> DISABLED <-> BLACKLIST DNS request for known malware domain fnpc.arrowservice.net (blacklist.rules)
 * 1:22330 <-> DISABLED <-> BLACKLIST DNS request for known malware domain fmp.bigish.net (blacklist.rules)
 * 1:22334 <-> DISABLED <-> BLACKLIST DNS request for known malware domain fnrn.businessconsults.net (blacklist.rules)
 * 1:22336 <-> DISABLED <-> BLACKLIST DNS request for known malware domain friends.arrowservice.net (blacklist.rules)
 * 1:22337 <-> DISABLED <-> BLACKLIST DNS request for known malware domain fstl.businessconsults.net (blacklist.rules)
 * 1:22338 <-> DISABLED <-> BLACKLIST DNS request for known malware domain fstl.worthhummer.net (blacklist.rules)
 * 1:22335 <-> DISABLED <-> BLACKLIST DNS request for known malware domain free.gmailboxes.com (blacklist.rules)
 * 1:22339 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ftp.freespirit.acmetoy.com (blacklist.rules)
 * 1:22341 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ftrj.businessconsults.net (blacklist.rules)
 * 1:22342 <-> DISABLED <-> BLACKLIST DNS request for known malware domain fwb.blackcake.net (blacklist.rules)
 * 1:22343 <-> DISABLED <-> BLACKLIST DNS request for known malware domain fwmo.businessconsults.net (blacklist.rules)
 * 1:22340 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ftp.purpledaily.com (blacklist.rules)
 * 1:22344 <-> DISABLED <-> BLACKLIST DNS request for known malware domain fwmo.newsonet.net (blacklist.rules)
 * 1:22346 <-> DISABLED <-> BLACKLIST DNS request for known malware domain gannett.infosupports.com (blacklist.rules)
 * 1:22347 <-> DISABLED <-> BLACKLIST DNS request for known malware domain gatu.arrowservice.net (blacklist.rules)
 * 1:22348 <-> DISABLED <-> BLACKLIST DNS request for known malware domain gayi.blackcake.net (blacklist.rules)
 * 1:22345 <-> DISABLED <-> BLACKLIST DNS request for known malware domain gaca.newsonet.net (blacklist.rules)
 * 1:22349 <-> DISABLED <-> BLACKLIST DNS request for known malware domain gdaa.ns02.info (blacklist.rules)
 * 1:22351 <-> DISABLED <-> BLACKLIST DNS request for known malware domain gdtm.earthsolution.org (blacklist.rules)
 * 1:22352 <-> DISABLED <-> BLACKLIST DNS request for known malware domain gege.newsonet.net (blacklist.rules)
 * 1:22353 <-> DISABLED <-> BLACKLIST DNS request for known malware domain gg.arrowservice.net (blacklist.rules)
 * 1:22350 <-> DISABLED <-> BLACKLIST DNS request for known malware domain gdsp.infosupports.com (blacklist.rules)
 * 1:22354 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ghma.earthsolution.org (blacklist.rules)
 * 1:22356 <-> DISABLED <-> BLACKLIST DNS request for known malware domain glj.purpledaily.com (blacklist.rules)
 * 1:22357 <-> DISABLED <-> BLACKLIST DNS request for known malware domain global.softsolutionbox.net (blacklist.rules)
 * 1:22358 <-> DISABLED <-> BLACKLIST DNS request for known malware domain glx.newsonet.net (blacklist.rules)
 * 1:22355 <-> DISABLED <-> BLACKLIST DNS request for known malware domain gjjr.newsonet.net (blacklist.rules)
 * 1:22359 <-> DISABLED <-> BLACKLIST DNS request for known malware domain gmail.bigdepression.net (blacklist.rules)
 * 1:22361 <-> DISABLED <-> BLACKLIST DNS request for known malware domain green.safalife.com (blacklist.rules)
 * 1:22362 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ground.earthsolution.org (blacklist.rules)
 * 1:22363 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ground.infosupports.com (blacklist.rules)
 * 1:22360 <-> DISABLED <-> BLACKLIST DNS request for known malware domain gmail.infosupports.com (blacklist.rules)
 * 1:22364 <-> DISABLED <-> BLACKLIST DNS request for known malware domain half.earthsolution.org (blacklist.rules)
 * 1:22366 <-> DISABLED <-> BLACKLIST DNS request for known malware domain happy.arrowservice.net (blacklist.rules)
 * 1:22367 <-> DISABLED <-> BLACKLIST DNS request for known malware domain hapyy2010.lflinkup.net (blacklist.rules)
 * 1:22368 <-> DISABLED <-> BLACKLIST DNS request for known malware domain hav.earthsolution.org (blacklist.rules)
 * 1:22365 <-> DISABLED <-> BLACKLIST DNS request for known malware domain half.infosupports.com (blacklist.rules)
 * 1:22369 <-> DISABLED <-> BLACKLIST DNS request for known malware domain help.purpledaily.com (blacklist.rules)
 * 1:22371 <-> DISABLED <-> BLACKLIST DNS request for known malware domain home.arrowservice.net (blacklist.rules)
 * 1:22372 <-> DISABLED <-> BLACKLIST DNS request for known malware domain host.arrowservice.net (blacklist.rules)
 * 1:22373 <-> DISABLED <-> BLACKLIST DNS request for known malware domain host.issnbgkit.net (blacklist.rules)
 * 1:22370 <-> DISABLED <-> BLACKLIST DNS request for known malware domain hill.arrowservice.net (blacklist.rules)
 * 1:22374 <-> DISABLED <-> BLACKLIST DNS request for known malware domain hotel.safalife.com (blacklist.rules)
 * 1:22376 <-> DISABLED <-> BLACKLIST DNS request for known malware domain house.gmailboxes.com (blacklist.rules)
 * 1:22377 <-> DISABLED <-> BLACKLIST DNS request for known malware domain hpd.newsonet.net (blacklist.rules)
 * 1:22378 <-> DISABLED <-> BLACKLIST DNS request for known malware domain hrsy.newsonet.net (blacklist.rules)
 * 1:22375 <-> DISABLED <-> BLACKLIST DNS request for known malware domain house.globalowa.com (blacklist.rules)
 * 1:22379 <-> DISABLED <-> BLACKLIST DNS request for known malware domain hy.purpledaily.com (blacklist.rules)
 * 1:22381 <-> DISABLED <-> BLACKLIST DNS request for known malware domain iabk.newsonet.net (blacklist.rules)
 * 1:22382 <-> DISABLED <-> BLACKLIST DNS request for known malware domain iea.businessconsults.net (blacklist.rules)
 * 1:22383 <-> DISABLED <-> BLACKLIST DNS request for known malware domain index.arrowservice.net (blacklist.rules)
 * 1:22380 <-> DISABLED <-> BLACKLIST DNS request for known malware domain hy.worthhummer.net (blacklist.rules)
 * 1:22384 <-> DISABLED <-> BLACKLIST DNS request for known malware domain india.arrowservice.net (blacklist.rules)
 * 1:22386 <-> DISABLED <-> BLACKLIST DNS request for known malware domain info.bigish.net (blacklist.rules)
 * 1:22813 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.arrowservice.net (blacklist.rules)
 * 1:22814 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.blackcake.net (blacklist.rules)
 * 1:22815 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www-conoco.businessconsults.net (blacklist.rules)
 * 1:22816 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.dnsweb.org (blacklist.rules)
 * 1:22817 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.freespirit.acmetoy.com (blacklist.rules)
 * 1:22818 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.globalowa.com (blacklist.rules)
 * 1:22819 <-> DISABLED <-> BLACKLIST DNS request for known malware domain wwwi.earthsolution.org (blacklist.rules)
 * 1:22820 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.newsonet.net (blacklist.rules)
 * 1:22821 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.purpledaily.com (blacklist.rules)
 * 1:22822 <-> DISABLED <-> BLACKLIST DNS request for known malware domain wwwt.infosupports.com (blacklist.rules)
 * 1:22823 <-> DISABLED <-> BLACKLIST DNS request for known malware domain wwww.arrowservice.net (blacklist.rules)
 * 1:22824 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.worthhummer.net (blacklist.rules)
 * 1:22825 <-> DISABLED <-> BLACKLIST DNS request for known malware domain xawh.earthsolution.org (blacklist.rules)
 * 1:22826 <-> DISABLED <-> BLACKLIST DNS request for known malware domain xmer.businessconsults.net (blacklist.rules)
 * 1:22827 <-> DISABLED <-> BLACKLIST DNS request for known malware domain xtap.newsonet.net (blacklist.rules)
 * 1:22828 <-> DISABLED <-> BLACKLIST DNS request for known malware domain yahoo.infosupports.com (blacklist.rules)
 * 1:22829 <-> DISABLED <-> BLACKLIST DNS request for known malware domain yahoo.newsonet.net (blacklist.rules)
 * 1:22830 <-> DISABLED <-> BLACKLIST DNS request for known malware domain yang1.infosupports.com (blacklist.rules)
 * 1:22831 <-> DISABLED <-> BLACKLIST DNS request for known malware domain yang2.infosupports.com (blacklist.rules)
 * 1:22832 <-> DISABLED <-> BLACKLIST DNS request for known malware domain yang.bigdepression.net (blacklist.rules)
 * 1:22833 <-> DISABLED <-> BLACKLIST DNS request for known malware domain yang.infosupports.com (blacklist.rules)
 * 1:22834 <-> DISABLED <-> BLACKLIST DNS request for known malware domain yard.earthsolution.org (blacklist.rules)
 * 1:22835 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ysb.purpledaily.com (blacklist.rules)
 * 1:22836 <-> DISABLED <-> BLACKLIST DNS request for known malware domain epod.businessconsults.net (blacklist.rules)
 * 1:22837 <-> DISABLED <-> BLACKLIST DNS request for known malware domain hapyy2010.lflinkup.net (blacklist.rules)
 * 1:22838 <-> DISABLED <-> BLACKLIST DNS request for known malware domain info.businessconsults.net (blacklist.rules)
 * 1:22839 <-> DISABLED <-> BLACKLIST DNS request for known malware domain pop.businessconsults.net (blacklist.rules)
 * 1:22840 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ssa.businessconsults.net (blacklist.rules)
 * 1:22841 <-> DISABLED <-> BLACKLIST DNS request for known malware domain sys.businessconsults.net (blacklist.rules)
 * 1:22842 <-> DISABLED <-> BLACKLIST DNS request for known malware domain bbs.india-videoer.com (blacklist.rules)
 * 1:22843 <-> DISABLED <-> BLACKLIST DNS request for known malware domain news.india-videoer.com (blacklist.rules)
 * 1:22844 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.india-videoer.com (blacklist.rules)
 * 1:22845 <-> DISABLED <-> BLACKLIST DNS request for known malware domain leets.hugesoft.org (blacklist.rules)
 * 1:22846 <-> DISABLED <-> BLACKLIST DNS request for known malware domain rouji.freespirit.acmetoy.com (blacklist.rules)
 * 1:22847 <-> DISABLED <-> BLACKLIST DNS request for known malware domain slnoa.newsonet.net (blacklist.rules)
 * 1:22848 <-> DISABLED <-> BLACKLIST DNS request for known malware domain sos.businessconsults.net (blacklist.rules)
 * 1:22849 <-> DISABLED <-> BLACKLIST DNS request for known malware domain trb.arrowservice.net (blacklist.rules)
 * 1:22850 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ug-aa.hugesoft.org (blacklist.rules)
 * 1:22387 <-> DISABLED <-> BLACKLIST DNS request for known malware domain info.businessconsults.net (blacklist.rules)
 * 1:22388 <-> DISABLED <-> BLACKLIST DNS request for known malware domain info.softsolutionbox.net (blacklist.rules)
 * 1:22385 <-> DISABLED <-> BLACKLIST DNS request for known malware domain indian.arrowservice.net (blacklist.rules)
 * 1:22389 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ins.globalowa.com (blacklist.rules)
 * 1:22391 <-> DISABLED <-> BLACKLIST DNS request for known malware domain intel.infosupports.com (blacklist.rules)
 * 1:22392 <-> DISABLED <-> BLACKLIST DNS request for known malware domain inter.earthsolution.org (blacklist.rules)
 * 1:22393 <-> DISABLED <-> BLACKLIST DNS request for known malware domain iri.infosupports.com (blacklist.rules)
 * 1:22390 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ins.purpledaily.com (blacklist.rules)
 * 1:22394 <-> DISABLED <-> BLACKLIST DNS request for known malware domain iri.worthhummer.net (blacklist.rules)
 * 1:22396 <-> DISABLED <-> BLACKLIST DNS request for known malware domain irsg.newsonet.net (blacklist.rules)
 * 1:22397 <-> DISABLED <-> BLACKLIST DNS request for known malware domain iscu.purpledaily.com (blacklist.rules)
 * 1:22398 <-> DISABLED <-> BLACKLIST DNS request for known malware domain iswb.softsolutionbox.net (blacklist.rules)
 * 1:22395 <-> DISABLED <-> BLACKLIST DNS request for known malware domain irs.businessconsults.net (blacklist.rules)
 * 1:22399 <-> DISABLED <-> BLACKLIST DNS request for known malware domain itau.businessconsults.net (blacklist.rules)
 * 1:22401 <-> DISABLED <-> BLACKLIST DNS request for known malware domain jbei.purpledaily.com (blacklist.rules)
 * 1:22402 <-> DISABLED <-> BLACKLIST DNS request for known malware domain jeph.earthsolution.org (blacklist.rules)
 * 1:22403 <-> DISABLED <-> BLACKLIST DNS request for known malware domain jfs.newsonet.net (blacklist.rules)
 * 1:22400 <-> DISABLED <-> BLACKLIST DNS request for known malware domain java.earthsolution.org (blacklist.rules)
 * 1:22404 <-> DISABLED <-> BLACKLIST DNS request for known malware domain jhd.newsonet.net (blacklist.rules)
 * 1:22406 <-> DISABLED <-> BLACKLIST DNS request for known malware domain johnbell.longmusic.com (blacklist.rules)
 * 1:22407 <-> DISABLED <-> BLACKLIST DNS request for known malware domain johntime.myftp.name (blacklist.rules)
 * 1:22408 <-> DISABLED <-> BLACKLIST DNS request for known malware domain jr.blackcake.net (blacklist.rules)
 * 1:22405 <-> DISABLED <-> BLACKLIST DNS request for known malware domain jhd.safalife.com (blacklist.rules)
 * 1:22409 <-> DISABLED <-> BLACKLIST DNS request for known malware domain king-kl.newsonet.net (blacklist.rules)
 * 1:22411 <-> DISABLED <-> BLACKLIST DNS request for known malware domain kit.infosupports.com (blacklist.rules)
 * 1:22412 <-> DISABLED <-> BLACKLIST DNS request for known malware domain klape.globalowa.com (blacklist.rules)
 * 1:22413 <-> DISABLED <-> BLACKLIST DNS request for known malware domain klati.newsonet.net (blacklist.rules)
 * 1:22410 <-> DISABLED <-> BLACKLIST DNS request for known malware domain kit.dnsweb.org (blacklist.rules)
 * 1:22414 <-> DISABLED <-> BLACKLIST DNS request for known malware domain klbar.purpledaily.com (blacklist.rules)
 * 1:22416 <-> DISABLED <-> BLACKLIST DNS request for known malware domain klbis.purpledaily.com (blacklist.rules)
 * 1:22417 <-> DISABLED <-> BLACKLIST DNS request for known malware domain kl-care.newsonet.net (blacklist.rules)
 * 1:22418 <-> DISABLED <-> BLACKLIST DNS request for known malware domain klecca.newsonet.net (blacklist.rules)
 * 1:22415 <-> DISABLED <-> BLACKLIST DNS request for known malware domain klbis.globalowa.com (blacklist.rules)
 * 1:22419 <-> DISABLED <-> BLACKLIST DNS request for known malware domain klecca.purpledaily.com (blacklist.rules)
 * 1:22421 <-> DISABLED <-> BLACKLIST DNS request for known malware domain kl-hqun.newsonet.net (blacklist.rules)
 * 1:22422 <-> DISABLED <-> BLACKLIST DNS request for known malware domain kliee.newsonet.net (blacklist.rules)
 * 1:22423 <-> DISABLED <-> BLACKLIST DNS request for known malware domain kl-knab.newsonet.net (blacklist.rules)
 * 1:22420 <-> DISABLED <-> BLACKLIST DNS request for known malware domain klenvi.purpledaily.com (blacklist.rules)
 * 1:22424 <-> DISABLED <-> BLACKLIST DNS request for known malware domain kllhd.globalowa.com (blacklist.rules)
 * 1:22426 <-> DISABLED <-> BLACKLIST DNS request for known malware domain klmfat.purpledaily.com (blacklist.rules)
 * 1:22427 <-> DISABLED <-> BLACKLIST DNS request for known malware domain klnrdc.newsonet.net (blacklist.rules)
 * 1:22428 <-> DISABLED <-> BLACKLIST DNS request for known malware domain klnrdc.purpledaily.com (blacklist.rules)
 * 1:22425 <-> DISABLED <-> BLACKLIST DNS request for known malware domain kl-mfa.newsonet.net (blacklist.rules)
 * 1:22429 <-> DISABLED <-> BLACKLIST DNS request for known malware domain klotp.purpledaily.com (blacklist.rules)
 * 1:22431 <-> DISABLED <-> BLACKLIST DNS request for known malware domain kl-rfc.newsonet.net (blacklist.rules)
 * 1:22432 <-> DISABLED <-> BLACKLIST DNS request for known malware domain kl-rio.newsonet.net (blacklist.rules)
 * 1:22433 <-> DISABLED <-> BLACKLIST DNS request for known malware domain kluscc.newsonet.net (blacklist.rules)
 * 1:22430 <-> DISABLED <-> BLACKLIST DNS request for known malware domain klpiec.newsonet.net (blacklist.rules)
 * 1:22434 <-> DISABLED <-> BLACKLIST DNS request for known malware domain kl-vfw.globalowa.com (blacklist.rules)
 * 1:22436 <-> DISABLED <-> BLACKLIST DNS request for known malware domain kmhl.mrbonus.com (blacklist.rules)
 * 1:22437 <-> DISABLED <-> BLACKLIST DNS request for known malware domain knab.newsonet.net (blacklist.rules)
 * 1:22438 <-> DISABLED <-> BLACKLIST DNS request for known malware domain knews.bigdepression.net (blacklist.rules)
 * 1:22435 <-> DISABLED <-> BLACKLIST DNS request for known malware domain klwest.purpledaily.com (blacklist.rules)
 * 1:22439 <-> DISABLED <-> BLACKLIST DNS request for known malware domain koa.purpledaily.com (blacklist.rules)
 * 1:22441 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ksap.peasoul.com (blacklist.rules)
 * 1:22442 <-> DISABLED <-> BLACKLIST DNS request for known malware domain lawste.purpledaily.com (blacklist.rules)
 * 1:22443 <-> DISABLED <-> BLACKLIST DNS request for known malware domain leets.hugesoft.org (blacklist.rules)
 * 1:22440 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ks01.peasoul.com (blacklist.rules)
 * 1:22444 <-> DISABLED <-> BLACKLIST DNS request for known malware domain lhd.globalowa.com (blacklist.rules)
 * 1:22445 <-> DISABLED <-> BLACKLIST DNS request for known malware domain life.blackcake.net (blacklist.rules)
 * 1:22449 <-> DISABLED <-> BLACKLIST DNS request for known malware domain local.dnsweb.org (blacklist.rules)
 * 1:22450 <-> DISABLED <-> BLACKLIST DNS request for known malware domain log.bigdepression.net (blacklist.rules)
 * 1:22586 <-> DISABLED <-> BLACKLIST DNS request for known malware domain pop.dnsweb.org (blacklist.rules)
 * 1:22587 <-> DISABLED <-> BLACKLIST DNS request for known malware domain pop.infosupports.com (blacklist.rules)
 * 1:22588 <-> DISABLED <-> BLACKLIST DNS request for known malware domain popw.infosupports.com (blacklist.rules)
 * 1:22589 <-> DISABLED <-> BLACKLIST DNS request for known malware domain port.infosupports.com (blacklist.rules)
 * 1:22590 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ppt.arrowservice.net (blacklist.rules)
 * 1:22591 <-> DISABLED <-> BLACKLIST DNS request for known malware domain prc.newsonet.net (blacklist.rules)
 * 1:22592 <-> DISABLED <-> BLACKLIST DNS request for known malware domain priv.dsmtp.com (blacklist.rules)
 * 1:22593 <-> DISABLED <-> BLACKLIST DNS request for known malware domain proc.blackberrycluter.com (blacklist.rules)
 * 1:22594 <-> DISABLED <-> BLACKLIST DNS request for known malware domain proc.purpledaily.com (blacklist.rules)
 * 1:22595 <-> DISABLED <-> BLACKLIST DNS request for known malware domain progress.purpledaily.com (blacklist.rules)
 * 1:22596 <-> DISABLED <-> BLACKLIST DNS request for known malware domain protoc.blackcake.net (blacklist.rules)
 * 1:22597 <-> DISABLED <-> BLACKLIST DNS request for known malware domain protoc.infosupports.com (blacklist.rules)
 * 1:22598 <-> DISABLED <-> BLACKLIST DNS request for known malware domain psu.businessconsults.net (blacklist.rules)
 * 1:22599 <-> DISABLED <-> BLACKLIST DNS request for known malware domain psu.worthhummer.net (blacklist.rules)
 * 1:22600 <-> DISABLED <-> BLACKLIST DNS request for known malware domain qedh.earthsolution.org (blacklist.rules)
 * 1:22601 <-> DISABLED <-> BLACKLIST DNS request for known malware domain qiao1.bigdepression.net (blacklist.rules)
 * 1:22602 <-> DISABLED <-> BLACKLIST DNS request for known malware domain qiao2.bigdepression.net (blacklist.rules)
 * 1:22603 <-> DISABLED <-> BLACKLIST DNS request for known malware domain qiao3.bigdepression.net (blacklist.rules)
 * 1:22604 <-> DISABLED <-> BLACKLIST DNS request for known malware domain qiao4.bigdepression.net (blacklist.rules)
 * 1:22605 <-> DISABLED <-> BLACKLIST DNS request for known malware domain qiao5.bigdepression.net (blacklist.rules)
 * 1:22606 <-> DISABLED <-> BLACKLIST DNS request for known malware domain qiao6.bigdepression.net (blacklist.rules)
 * 1:22607 <-> DISABLED <-> BLACKLIST DNS request for known malware domain qiao7.bigdepression.net (blacklist.rules)
 * 1:22608 <-> DISABLED <-> BLACKLIST DNS request for known malware domain qiao8.bigdepression.net (blacklist.rules)
 * 1:22609 <-> DISABLED <-> BLACKLIST DNS request for known malware domain qua.businessconsults.net (blacklist.rules)
 * 1:22610 <-> DISABLED <-> BLACKLIST DNS request for known malware domain qual.bigdepression.net (blacklist.rules)
 * 1:22611 <-> DISABLED <-> BLACKLIST DNS request for known malware domain quick.earthsolution.org (blacklist.rules)
 * 1:22612 <-> DISABLED <-> BLACKLIST DNS request for known malware domain quiet.earthsolution.org (blacklist.rules)
 * 1:22613 <-> DISABLED <-> BLACKLIST DNS request for known malware domain rcs.purpledaily.com (blacklist.rules)
 * 1:22614 <-> DISABLED <-> BLACKLIST DNS request for known malware domain red.infosupports.com (blacklist.rules)
 * 1:22615 <-> DISABLED <-> BLACKLIST DNS request for known malware domain release.purpledaily.com (blacklist.rules)
 * 1:22616 <-> DISABLED <-> BLACKLIST DNS request for known malware domain release.softsolutionbox.net (blacklist.rules)
 * 1:22617 <-> DISABLED <-> BLACKLIST DNS request for known malware domain research.purpledaily.com (blacklist.rules)
 * 1:22618 <-> DISABLED <-> BLACKLIST DNS request for known malware domain research.softsolutionbox.net (blacklist.rules)
 * 1:22619 <-> DISABLED <-> BLACKLIST DNS request for known malware domain rice.bigish.net (blacklist.rules)
 * 1:22620 <-> DISABLED <-> BLACKLIST DNS request for known malware domain rj.purpledaily.com (blacklist.rules)
 * 1:22621 <-> DISABLED <-> BLACKLIST DNS request for known malware domain roger.buisnessconsults.net (blacklist.rules)
 * 1:22622 <-> DISABLED <-> BLACKLIST DNS request for known malware domain rouji.freespirit.acmetoy.com (blacklist.rules)
 * 1:22623 <-> DISABLED <-> BLACKLIST DNS request for known malware domain rsut.purpledaily.com (blacklist.rules)
 * 1:22624 <-> DISABLED <-> BLACKLIST DNS request for known malware domain safbejn.worthhummer.net (blacklist.rules)
 * 1:22625 <-> DISABLED <-> BLACKLIST DNS request for known malware domain saf.blackberrycluter.com (blacklist.rules)
 * 1:22626 <-> DISABLED <-> BLACKLIST DNS request for known malware domain saf.globalowa.com (blacklist.rules)
 * 1:22627 <-> DISABLED <-> BLACKLIST DNS request for known malware domain sam.blackcake.net (blacklist.rules)
 * 1:22628 <-> DISABLED <-> BLACKLIST DNS request for known malware domain sam.infosupports.com (blacklist.rules)
 * 1:22629 <-> DISABLED <-> BLACKLIST DNS request for known malware domain sav.safalife.com (blacklist.rules)
 * 1:22630 <-> DISABLED <-> BLACKLIST DNS request for known malware domain sbh.businessconsults.net (blacklist.rules)
 * 1:22631 <-> DISABLED <-> BLACKLIST DNS request for known malware domain scc.globalowa.com (blacklist.rules)
 * 1:22632 <-> DISABLED <-> BLACKLIST DNS request for known malware domain scc.purpledaily.com (blacklist.rules)
 * 1:22633 <-> DISABLED <-> BLACKLIST DNS request for known malware domain sea001.arrowservice.net (blacklist.rules)
 * 1:22634 <-> DISABLED <-> BLACKLIST DNS request for known malware domain sea.arrowservice.net (blacklist.rules)
 * 1:22635 <-> DISABLED <-> BLACKLIST DNS request for known malware domain search.blackcake.net (blacklist.rules)
 * 1:22636 <-> DISABLED <-> BLACKLIST DNS request for known malware domain send.issnbgkit.net (blacklist.rules)
 * 1:22637 <-> DISABLED <-> BLACKLIST DNS request for known malware domain servf.zyns.com (blacklist.rules)
 * 1:22638 <-> DISABLED <-> BLACKLIST DNS request for known malware domain service.arrowservice.net (blacklist.rules)
 * 1:22639 <-> DISABLED <-> BLACKLIST DNS request for known malware domain service.issnbgkit.net (blacklist.rules)
 * 1:22640 <-> DISABLED <-> BLACKLIST DNS request for known malware domain sfn.globalowa.com (blacklist.rules)
 * 1:22641 <-> DISABLED <-> BLACKLIST DNS request for known malware domain shot.buisnessconsults.net (blacklist.rules)
 * 1:22642 <-> DISABLED <-> BLACKLIST DNS request for known malware domain shot.businessconsults.net (blacklist.rules)
 * 1:22643 <-> DISABLED <-> BLACKLIST DNS request for known malware domain sifcc.arrowservice.net (blacklist.rules)
 * 1:22644 <-> DISABLED <-> BLACKLIST DNS request for known malware domain sip.businessconsults.net (blacklist.rules)
 * 1:22645 <-> DISABLED <-> BLACKLIST DNS request for known malware domain sisc.purpledaily.com (blacklist.rules)
 * 1:22646 <-> DISABLED <-> BLACKLIST DNS request for known malware domain sky.safalife.com (blacklist.rules)
 * 1:22647 <-> DISABLED <-> BLACKLIST DNS request for known malware domain sllaw.hugesoft.org (blacklist.rules)
 * 1:22648 <-> DISABLED <-> BLACKLIST DNS request for known malware domain slnoa.hugesoft.org (blacklist.rules)
 * 1:22649 <-> DISABLED <-> BLACKLIST DNS request for known malware domain slnoa.newsonet.net (blacklist.rules)
 * 1:22650 <-> DISABLED <-> BLACKLIST DNS request for known malware domain slrfc.newsonet.net (blacklist.rules)
 * 1:22651 <-> DISABLED <-> BLACKLIST DNS request for known malware domain slrj.softsolutionbox.net (blacklist.rules)
 * 1:22652 <-> DISABLED <-> BLACKLIST DNS request for known malware domain slrouji.infosupports.com (blacklist.rules)
 * 1:22653 <-> DISABLED <-> BLACKLIST DNS request for known malware domain sls.purpledaily.com (blacklist.rules)
 * 1:22654 <-> DISABLED <-> BLACKLIST DNS request for known malware domain slutc.globalowa.com (blacklist.rules)
 * 1:22655 <-> DISABLED <-> BLACKLIST DNS request for known malware domain smooth.newsonet.net (blacklist.rules)
 * 1:22656 <-> DISABLED <-> BLACKLIST DNS request for known malware domain smtp.infosupports.com (blacklist.rules)
 * 1:22657 <-> DISABLED <-> BLACKLIST DNS request for known malware domain smtp.safalife.com (blacklist.rules)
 * 1:22658 <-> DISABLED <-> BLACKLIST DNS request for known malware domain snoopy.safalife.com (blacklist.rules)
 * 1:22659 <-> DISABLED <-> BLACKLIST DNS request for known malware domain snoot.earthsolution.org (blacklist.rules)
 * 1:22660 <-> DISABLED <-> BLACKLIST DNS request for known malware domain soler.buisnessconsults.net (blacklist.rules)
 * 1:22661 <-> DISABLED <-> BLACKLIST DNS request for known malware domain sona.arrowservice.net (blacklist.rules)
 * 1:22662 <-> DISABLED <-> BLACKLIST DNS request for known malware domain sope.purpledaily.com (blacklist.rules)
 * 1:22663 <-> DISABLED <-> BLACKLIST DNS request for known malware domain sos.businessconsults.net (blacklist.rules)
 * 1:22664 <-> DISABLED <-> BLACKLIST DNS request for known malware domain sotp.purpledaily.com (blacklist.rules)
 * 1:22665 <-> DISABLED <-> BLACKLIST DNS request for known malware domain spah.earthsolution.org (blacklist.rules)
 * 1:22666 <-> DISABLED <-> BLACKLIST DNS request for known malware domain spahi.dnsweb.org (blacklist.rules)
 * 1:22667 <-> DISABLED <-> BLACKLIST DNS request for known malware domain sports3.earthsolution.org (blacklist.rules)
 * 1:22668 <-> DISABLED <-> BLACKLIST DNS request for known malware domain sports.businessconsults.net (blacklist.rules)
 * 1:22669 <-> DISABLED <-> BLACKLIST DNS request for known malware domain sports.chileexe77.com (blacklist.rules)
 * 1:22670 <-> DISABLED <-> BLACKLIST DNS request for known malware domain spte.bigdepression.net (blacklist.rules)
 * 1:22671 <-> DISABLED <-> BLACKLIST DNS request for known malware domain srs.businessconsults.net (blacklist.rules)
 * 1:22672 <-> DISABLED <-> BLACKLIST DNS request for known malware domain srs.dnsweb.org (blacklist.rules)
 * 1:22673 <-> DISABLED <-> BLACKLIST DNS request for known malware domain srs.infosupports.com (blacklist.rules)
 * 1:22674 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ssa.businessconsults.net (blacklist.rules)
 * 1:22675 <-> DISABLED <-> BLACKLIST DNS request for known malware domain sslsrv1.infosupports.com (blacklist.rules)
 * 1:22676 <-> DISABLED <-> BLACKLIST DNS request for known malware domain sslsrv2.infosupports.com (blacklist.rules)
 * 1:22677 <-> DISABLED <-> BLACKLIST DNS request for known malware domain sslsrv5.infosupports.com (blacklist.rules)
 * 1:22678 <-> DISABLED <-> BLACKLIST DNS request for known malware domain sslsrv6.infosupports.com (blacklist.rules)
 * 1:22679 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ssun.arrowservice.net (blacklist.rules)
 * 1:22680 <-> DISABLED <-> BLACKLIST DNS request for known malware domain stell.purpledaily.com (blacklist.rules)
 * 1:22681 <-> DISABLED <-> BLACKLIST DNS request for known malware domain stk.blackcake.net (blacklist.rules)
 * 1:22682 <-> DISABLED <-> BLACKLIST DNS request for known malware domain stk.infosupports.com (blacklist.rules)
 * 1:22683 <-> DISABLED <-> BLACKLIST DNS request for known malware domain stock.bigish.net (blacklist.rules)
 * 1:22684 <-> DISABLED <-> BLACKLIST DNS request for known malware domain stulaw.bigish.net (blacklist.rules)
 * 1:22685 <-> DISABLED <-> BLACKLIST DNS request for known malware domain stuwal.newsonet.net (blacklist.rules)
 * 1:22686 <-> DISABLED <-> BLACKLIST DNS request for known malware domain sun.arrowservice.net (blacklist.rules)
 * 1:22687 <-> DISABLED <-> BLACKLIST DNS request for known malware domain sunnysaf.allowed.org (blacklist.rules)
 * 1:22688 <-> DISABLED <-> BLACKLIST DNS request for known malware domain sute.newsonet.net (blacklist.rules)
 * 1:22689 <-> DISABLED <-> BLACKLIST DNS request for known malware domain sw.hugesoft.org (blacklist.rules)
 * 1:22690 <-> DISABLED <-> BLACKLIST DNS request for known malware domain sword.bigish.net (blacklist.rules)
 * 1:22691 <-> DISABLED <-> BLACKLIST DNS request for known malware domain syn.arrowservice.net (blacklist.rules)
 * 1:22692 <-> DISABLED <-> BLACKLIST DNS request for known malware domain sys.businessconsults.net (blacklist.rules)
 * 1:22693 <-> DISABLED <-> BLACKLIST DNS request for known malware domain tape.businessconsults.net (blacklist.rules)
 * 1:22694 <-> DISABLED <-> BLACKLIST DNS request for known malware domain tape.dnsweb.org (blacklist.rules)
 * 1:22695 <-> DISABLED <-> BLACKLIST DNS request for known malware domain tape.purpledaily.com (blacklist.rules)
 * 1:22696 <-> DISABLED <-> BLACKLIST DNS request for known malware domain tclient.arrowservice.net (blacklist.rules)
 * 1:22697 <-> DISABLED <-> BLACKLIST DNS request for known malware domain test.chileexe77.com (blacklist.rules)
 * 1:22698 <-> DISABLED <-> BLACKLIST DNS request for known malware domain test.issnbgkit.net (blacklist.rules)
 * 1:22699 <-> DISABLED <-> BLACKLIST DNS request for known malware domain test.newsonet.net (blacklist.rules)
 * 1:22700 <-> DISABLED <-> BLACKLIST DNS request for known malware domain texc.arrowservice.net (blacklist.rules)
 * 1:22701 <-> DISABLED <-> BLACKLIST DNS request for known malware domain think.arrowservice.net (blacklist.rules)
 * 1:22702 <-> DISABLED <-> BLACKLIST DNS request for known malware domain think.purpledaily.com (blacklist.rules)
 * 1:22703 <-> DISABLED <-> BLACKLIST DNS request for known malware domain time.issnbgkit.net (blacklist.rules)
 * 1:22704 <-> DISABLED <-> BLACKLIST DNS request for known malware domain tod.newsonet.net (blacklist.rules)
 * 1:22705 <-> DISABLED <-> BLACKLIST DNS request for known malware domain train.newsonet.net (blacklist.rules)
 * 1:22706 <-> DISABLED <-> BLACKLIST DNS request for known malware domain tra.softsolutionbox.net (blacklist.rules)
 * 1:22707 <-> DISABLED <-> BLACKLIST DNS request for known malware domain trb.arrowservice.net (blacklist.rules)
 * 1:22708 <-> DISABLED <-> BLACKLIST DNS request for known malware domain trip.arrowservice.net (blacklist.rules)
 * 1:22709 <-> DISABLED <-> BLACKLIST DNS request for known malware domain tx.businessconsults.net (blacklist.rules)
 * 1:22710 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ug-aaon.hugesoft.org (blacklist.rules)
 * 1:22711 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ug-aeai.hugesoft.org (blacklist.rules)
 * 1:22712 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ug-ag.hugesoft.org (blacklist.rules)
 * 1:22713 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ug-asg.hugesoft.org (blacklist.rules)
 * 1:22714 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ug-ati.hugesoft.org (blacklist.rules)
 * 1:22715 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ug-bdai.hugesoft.org (blacklist.rules)
 * 1:22716 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ug-bdfa.hugesoft.org (blacklist.rules)
 * 1:22717 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ug-bpd.hugesoft.org (blacklist.rules)
 * 1:22718 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ug-cccc.hugesoft.org (blacklist.rules)
 * 1:22719 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ug-ccr.hugesoft.org (blacklist.rules)
 * 1:22720 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ug-co.hugesoft.org (blacklist.rules)
 * 1:22721 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ug-cono.hugesoft.org (blacklist.rules)
 * 1:22722 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ug-cti.hugesoft.org (blacklist.rules)
 * 1:22723 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ug-dfait.hugesoft.org (blacklist.rules)

Modified Rules:


 * 1:11263 <-> DISABLED <-> DOS Apache mod_ssl non-SSL connection to SSL port denial of service attempt (dos.rules)
 * 1:12239 <-> DISABLED <-> BACKDOOR webcenter v1.0 Backdoor - init connection (backdoor.rules)
 * 1:12244 <-> DISABLED <-> BACKDOOR itadem trojan 3.0 runtime detection (backdoor.rules)
 * 1:12661 <-> DISABLED <-> BACKDOOR troll.a runtime detection (backdoor.rules)
 * 1:13625 <-> DISABLED <-> BACKDOOR MBR rootkit HTTP POST activity detected (backdoor.rules)
 * 1:13815 <-> DISABLED <-> BACKDOOR zombget.03 runtime detection (backdoor.rules)
 * 1:13856 <-> DISABLED <-> BACKDOOR wintrim.z runtime detection (backdoor.rules)
 * 1:13876 <-> DISABLED <-> BACKDOOR zlob.acc runtime detection (backdoor.rules)
 * 1:13877 <-> DISABLED <-> BACKDOOR trojan-spy.win32.delf.uv runtime detection (backdoor.rules)
 * 1:13878 <-> DISABLED <-> BACKDOOR trojan-spy.win32.delf.uv runtime detection (backdoor.rules)
 * 1:13934 <-> DISABLED <-> BOTNET-CNC Hijacker mediatubecodec 1.470.0 runtime detection - hijack ie (botnet-cnc.rules)
 * 1:13935 <-> DISABLED <-> BOTNET-CNC Hijacker mediatubecodec 1.470.0 runtime detection - download other malware (botnet-cnc.rules)
 * 1:13936 <-> DISABLED <-> BOTNET-CNC Trickler dropper agent.rqg runtime detection - call home (botnet-cnc.rules)
 * 1:13941 <-> DISABLED <-> BACKDOOR trojan agent.nac runtime detection - click fraud (backdoor.rules)
 * 1:13942 <-> DISABLED <-> BACKDOOR trojan agent.nac runtime detection - call home (backdoor.rules)
 * 1:13944 <-> DISABLED <-> BACKDOOR trojan downloader small.gy runtime detection - get whitelist (backdoor.rules)
 * 1:13945 <-> DISABLED <-> BACKDOOR trojan downloader small.gy runtime detection - update (backdoor.rules)
 * 1:13953 <-> DISABLED <-> BOTNET-CNC Asprox trojan initial query (botnet-cnc.rules)
 * 1:14081 <-> DISABLED <-> BACKDOOR trojan agent.aarm runtime detection - call home (backdoor.rules)
 * 1:14082 <-> DISABLED <-> BACKDOOR trojan agent.aarm runtime detection - spread via spam (backdoor.rules)
 * 1:14083 <-> DISABLED <-> BACKDOOR trojan agent.aarm runtime detection - download other malware (backdoor.rules)
 * 1:14084 <-> DISABLED <-> BACKDOOR infostealer.banker.c runtime detection - download cfg.bin (backdoor.rules)
 * 1:14085 <-> DISABLED <-> BACKDOOR infostealer.banker.c runtime detection - collect user info (backdoor.rules)
 * 1:14086 <-> DISABLED <-> BACKDOOR Adware.Win32.Agent.BM runtime detection 1 (backdoor.rules)
 * 1:14087 <-> DISABLED <-> BACKDOOR Adware.Win32.Agent.BM runtime detection 2 (backdoor.rules)
 * 1:15295 <-> DISABLED <-> BOTNET-CNC Trojan.Bankpatch.C configuration attempt (botnet-cnc.rules)
 * 1:15296 <-> DISABLED <-> BOTNET-CNC Trojan.Bankpatch.C malicious file download attempt (botnet-cnc.rules)
 * 1:15297 <-> DISABLED <-> BOTNET-CNC Trojan.Bankpatch.C report home attempt (botnet-cnc.rules)
 * 1:15423 <-> DISABLED <-> BOTNET-CNC Clampi virus communication detected (botnet-cnc.rules)
 * 1:16092 <-> DISABLED <-> BACKDOOR win32.delf.jwh runtime detection (backdoor.rules)
 * 1:16094 <-> DISABLED <-> BACKDOOR trojan downloader exchan.gen variant runtime detection (backdoor.rules)
 * 1:16095 <-> DISABLED <-> BACKDOOR td.exe runtime detection - getfile (backdoor.rules)
 * 1:16096 <-> DISABLED <-> BACKDOOR td.exe runtime detection - download (backdoor.rules)
 * 1:16097 <-> DISABLED <-> BACKDOOR trojan win32.agent.vvm runtime detection (backdoor.rules)
 * 1:16099 <-> DISABLED <-> BACKDOOR trojan-dropper.win32.agent.wdv runtime detection (backdoor.rules)
 * 1:16100 <-> DISABLED <-> BACKDOOR trojan-downloader.win32.delf.phh runtime detection - file.exe (backdoor.rules)
 * 1:16101 <-> DISABLED <-> BACKDOOR trojan-downloader.win32.delf.phh runtime detection - 57329.exe (backdoor.rules)
 * 1:16102 <-> DISABLED <-> BACKDOOR trojan-downloader.win32.delf.phh runtime detection - sft_ver1.1454.0.exe (backdoor.rules)
 * 1:16105 <-> DISABLED <-> BACKDOOR trojan.zlob runtime detection - topqualityads (backdoor.rules)
 * 1:16108 <-> DISABLED <-> BACKDOOR trojan downloader exchanger.gen2 runtime detection (backdoor.rules)
 * 1:16109 <-> DISABLED <-> BACKDOOR trojan-downloader.win32.zlob.wwv runtime detection - onestoponlineshop (backdoor.rules)
 * 1:16110 <-> DISABLED <-> BACKDOOR trojan-downloader.win32.zlob.wwv runtime detection - childhe (backdoor.rules)
 * 1:16111 <-> DISABLED <-> BACKDOOR trojan-downloader.win32.zlob.wwv installtime detection (backdoor.rules)
 * 1:16112 <-> DISABLED <-> BACKDOOR trojan downloader.agent.vhb runtime detection - contact remote server (backdoor.rules)
 * 1:16113 <-> DISABLED <-> BACKDOOR trojan downloader.agent.vhb runtime detection - request login page (backdoor.rules)
 * 1:16124 <-> DISABLED <-> BOTNET-CNC downloader trojan.nsis.agent.s runtime detection (botnet-cnc.rules)
 * 1:16139 <-> DISABLED <-> BOTNET-CNC downloader_trojan.gen2 runtime detection - scanner page (botnet-cnc.rules)
 * 1:16242 <-> DISABLED <-> BACKDOOR downloader-ash.gen.b runtime detection - adload (backdoor.rules)
 * 1:16243 <-> DISABLED <-> BACKDOOR downloader-ash.gen.b runtime detection - 3264.php (backdoor.rules)
 * 1:16244 <-> DISABLED <-> BACKDOOR rogue software xp police antivirus runtime detection - purchase (backdoor.rules)
 * 1:16245 <-> DISABLED <-> BACKDOOR rogue software xp police antivirus install-timedetection (backdoor.rules)
 * 1:16246 <-> DISABLED <-> BACKDOOR rogue software spyware protect 2009 runtime detection - purchase request (backdoor.rules)
 * 1:16247 <-> DISABLED <-> BACKDOOR rogue software spyware protect 2009 runtime detection - block (backdoor.rules)
 * 1:16248 <-> DISABLED <-> BACKDOOR rogue software ms antispyware 2009 runtime detection - start (backdoor.rules)
 * 1:16249 <-> DISABLED <-> BACKDOOR rogue software ms antispyware 2009 runtime detection - pay (backdoor.rules)
 * 1:16250 <-> DISABLED <-> BACKDOOR rogue software win pc defender runtime detection (backdoor.rules)
 * 1:16251 <-> DISABLED <-> BACKDOOR rogue software win pc defender installtime detection (backdoor.rules)
 * 1:16252 <-> DISABLED <-> BACKDOOR rogue software pro antispyware 2009 runtime detection - purchase (backdoor.rules)
 * 1:16253 <-> DISABLED <-> BACKDOOR rogue software system security 2009 runtime detection (backdoor.rules)
 * 1:16254 <-> DISABLED <-> BACKDOOR rogue software system security 2009 installtime detection (backdoor.rules)
 * 1:16255 <-> DISABLED <-> BACKDOOR rogue software system security 2009 installtime detection (backdoor.rules)
 * 1:16256 <-> DISABLED <-> BACKDOOR rogue software coreguard antivirus 2009 runtime detection (backdoor.rules)
 * 1:16257 <-> DISABLED <-> BACKDOOR rogue software perfect defender 2009 runtime detection - update (backdoor.rules)
 * 1:16258 <-> DISABLED <-> BACKDOOR rogue software perfect defender 2009 runtime detection - purchase (backdoor.rules)
 * 1:16259 <-> DISABLED <-> BACKDOOR rogue software antivirusdoktor2009 runtime detection (backdoor.rules)
 * 1:16260 <-> DISABLED <-> BACKDOOR rogue software xp antivirus protection runtime detection - installation (backdoor.rules)
 * 1:16261 <-> DISABLED <-> BACKDOOR rogue software xp antivirus protection runtime detection - runtime (backdoor.rules)
 * 1:16262 <-> DISABLED <-> BACKDOOR rogue software xp-shield runtime detection (backdoor.rules)
 * 1:16263 <-> DISABLED <-> BACKDOOR rogue software xp-shield runtime detection - installation (backdoor.rules)
 * 1:16264 <-> DISABLED <-> BACKDOOR rogue software 007 anti-spyware runtime detection - update (backdoor.rules)
 * 1:16265 <-> DISABLED <-> BACKDOOR rogue software 007 anti-spyware runtime detection - register (backdoor.rules)
 * 1:16266 <-> DISABLED <-> BACKDOOR rogue software pc antispyware 2010 runtime detection - buy (backdoor.rules)
 * 1:16267 <-> DISABLED <-> BACKDOOR rogue software pc antispyware 2010 runtime detection - files (backdoor.rules)
 * 1:16272 <-> DISABLED <-> BACKDOOR trojan-dropper.irc.tkb runtime detection - lordhack (backdoor.rules)
 * 1:16273 <-> DISABLED <-> BACKDOOR trojan-dropper.irc.tkb runtime detection - dxcpm (backdoor.rules)
 * 1:16274 <-> DISABLED <-> BOTNET-CNC Trickler trojan-spy.win32.pophot runtime detection - connect to server (botnet-cnc.rules)
 * 1:16275 <-> DISABLED <-> BOTNET-CNC Trickler trojan-spy.win32.pophot runtime detection - download files (botnet-cnc.rules)
 * 1:16279 <-> DISABLED <-> BACKDOOR rogue-software windows antivirus 2008 runtime detection - pre-sale page (backdoor.rules)
 * 1:16280 <-> DISABLED <-> BACKDOOR rogue-software windows antivirus 2008 runtime detection - registration and payment page (backdoor.rules)
 * 1:16439 <-> DISABLED <-> BOTNET-CNC Possible Zeus User-Agent - _TEST_ (botnet-cnc.rules)
 * 1:16440 <-> DISABLED <-> BOTNET-CNC Possible Zeus User-Agent - ie (botnet-cnc.rules)
 * 1:16441 <-> DISABLED <-> BOTNET-CNC Possible Zeus User-Agent - Download (botnet-cnc.rules)
 * 1:16442 <-> DISABLED <-> BOTNET-CNC Possible Zeus User-Agent - Mozilla (botnet-cnc.rules)
 * 1:16457 <-> DISABLED <-> BACKDOOR Trojan.Downloader.Win32.Cutwail.AI runtime detection (backdoor.rules)
 * 1:16483 <-> DISABLED <-> BOTNET-CNC Koobface worm submission of collected data to C&C server attempt (botnet-cnc.rules)
 * 1:16495 <-> DISABLED <-> BOTNET-CNC Rustock botnet contact to C&C server attempt (botnet-cnc.rules)
 * 1:16613 <-> DISABLED <-> BACKDOOR c99shell.php command request - cmd (backdoor.rules)
 * 1:16614 <-> DISABLED <-> BACKDOOR c99shell.php command request - search (backdoor.rules)
 * 1:16615 <-> DISABLED <-> BACKDOOR c99shell.php command request - upload (backdoor.rules)
 * 1:16616 <-> DISABLED <-> BACKDOOR c99shell.php command request - about (backdoor.rules)
 * 1:16617 <-> DISABLED <-> BACKDOOR c99shell.php command request - encoder (backdoor.rules)
 * 1:16618 <-> DISABLED <-> BACKDOOR c99shell.php command request - bind (backdoor.rules)
 * 1:16619 <-> DISABLED <-> BACKDOOR c99shell.php command request - ps_aux (backdoor.rules)
 * 1:16620 <-> DISABLED <-> BACKDOOR c99shell.php command request - ftpquickbrute (backdoor.rules)
 * 1:16621 <-> DISABLED <-> BACKDOOR c99shell.php command request - security (backdoor.rules)
 * 1:16622 <-> DISABLED <-> BACKDOOR c99shell.php command request - sql (backdoor.rules)
 * 1:16623 <-> DISABLED <-> BACKDOOR c99shell.php command request - eval (backdoor.rules)
 * 1:16624 <-> DISABLED <-> BACKDOOR c99shell.php command request - feedback (backdoor.rules)
 * 1:16625 <-> DISABLED <-> BACKDOOR c99shell.php command request - selfremove (backdoor.rules)
 * 1:16626 <-> DISABLED <-> BACKDOOR c99shell.php command request - fsbuff (backdoor.rules)
 * 1:16627 <-> DISABLED <-> BACKDOOR c99shell.php command request - ls (backdoor.rules)
 * 1:16628 <-> DISABLED <-> BACKDOOR c99shell.php command request - phpinfo (backdoor.rules)
 * 1:16695 <-> ENABLED <-> BOTNET-CNC Rogue AV download/update atttempt (botnet-cnc.rules)
 * 1:16804 <-> DISABLED <-> BACKDOOR Win32.Qakbot.E - initial load (backdoor.rules)
 * 1:16805 <-> DISABLED <-> BACKDOOR Win32.Qakbot.E config check (backdoor.rules)
 * 1:16806 <-> DISABLED <-> BACKDOOR Win32.Qakbot.E - FTP upload seclog (backdoor.rules)
 * 1:16807 <-> DISABLED <-> BACKDOOR Win32.Qakbot.E - FTP Upload ps_dump (backdoor.rules)
 * 1:16808 <-> DISABLED <-> BACKDOOR Win32.Qakbot.E - register client (backdoor.rules)
 * 1:16813 <-> DISABLED <-> BOTNET-CNC known command and control channel traffic (botnet-cnc.rules)
 * 1:16814 <-> DISABLED <-> BOTNET-CNC known command and control channel traffic (botnet-cnc.rules)
 * 1:16815 <-> DISABLED <-> BOTNET-CNC known command and control channel traffic (botnet-cnc.rules)
 * 1:16818 <-> DISABLED <-> BOTNET-CNC known command and control channel traffic (botnet-cnc.rules)
 * 1:16819 <-> DISABLED <-> BOTNET-CNC known command and control channel traffic (botnet-cnc.rules)
 * 1:16821 <-> DISABLED <-> BOTNET-CNC known command and control channel traffic (botnet-cnc.rules)
 * 1:16825 <-> DISABLED <-> BOTNET-CNC known command and control channel traffic (botnet-cnc.rules)
 * 1:16829 <-> DISABLED <-> BOTNET-CNC known command and control channel traffic (botnet-cnc.rules)
 * 1:16830 <-> DISABLED <-> BOTNET-CNC known command and control channel traffic (botnet-cnc.rules)
 * 1:16831 <-> DISABLED <-> BOTNET-CNC known command and control channel traffic (botnet-cnc.rules)
 * 1:17058 <-> DISABLED <-> BOTNET-CNC Trojan-Downloader.JS.Agent.ewh Javascript download attempt (botnet-cnc.rules)
 * 1:18098 <-> DISABLED <-> BOTNET-CNC URI request for known malicious URI - Carberp (botnet-cnc.rules)
 * 1:18099 <-> DISABLED <-> BOTNET-CNC URI request for known malicious URI - Carberp (botnet-cnc.rules)
 * 1:18100 <-> DISABLED <-> BOTNET-CNC Tidserv malware command and control channel traffic (botnet-cnc.rules)
 * 1:18279 <-> DISABLED <-> BOTNET-CNC Trojan.Win32.Karagany.A contact to server attempt (botnet-cnc.rules)
 * 1:18281 <-> DISABLED <-> BOTNET-CNC Trojan.Win32.VB.njz contact to server attempt (botnet-cnc.rules)
 * 1:18562 <-> DISABLED <-> BOTNET-CNC RogueSoftware.Win32.LivePcCare contact to server attempt (botnet-cnc.rules)
 * 1:18563 <-> DISABLED <-> BOTNET-CNC Trojan.Gaboc contact to server attempt (botnet-cnc.rules)
 * 1:18564 <-> DISABLED <-> BOTNET-CNC RussKill botnet contact to C&C server attempt (botnet-cnc.rules)
 * 1:18577 <-> DISABLED <-> BOTNET-CNC Trojan-Banker.Win32.Banker.agum contact to server attempt (botnet-cnc.rules)
 * 1:18686 <-> DISABLED <-> BACKDOOR c99shell.php command request - tools (backdoor.rules)
 * 1:18687 <-> DISABLED <-> BACKDOOR c99shell.php command request - update (backdoor.rules)
 * 1:18688 <-> DISABLED <-> BACKDOOR c99shell.php command request - chmod (backdoor.rules)
 * 1:18690 <-> DISABLED <-> BACKDOOR c99shell.php command request - processes (backdoor.rules)
 * 1:18707 <-> DISABLED <-> BOTNET-CNC RogueSoftware.Win32.ControlCenter contact to server attempt (botnet-cnc.rules)
 * 1:18708 <-> DISABLED <-> BOTNET-CNC RogueSoftware.Win32.AntivirusSoft contact to server attempt (botnet-cnc.rules)
 * 1:18709 <-> DISABLED <-> BOTNET-CNC Trojan.Win32.Banker.aufm contact to server attempt (botnet-cnc.rules)
 * 1:18711 <-> DISABLED <-> BOTNET-CNC RogueSoftware.Win32.SecurityCentral contact to server attempt (botnet-cnc.rules)
 * 1:18712 <-> DISABLED <-> BOTNET-CNC RogueSoftware.Win32.XJRAntivirus contact to server attempt (botnet-cnc.rules)
 * 1:18716 <-> DISABLED <-> BOTNET-CNC Trojan.Win32.Banker.H contact to server attempt (botnet-cnc.rules)
 * 1:18717 <-> DISABLED <-> BOTNET-CNC Trojan.Win32.Banker.QO contact to server attempt (botnet-cnc.rules)
 * 1:18718 <-> DISABLED <-> BOTNET-CNC RogueSoftware.Win32.AdvancedDefender contact to server attempt (botnet-cnc.rules)
 * 1:18720 <-> DISABLED <-> BOTNET-CNC Trojan.Win32.Terzib.A contact to server attempt (botnet-cnc.rules)
 * 1:18723 <-> DISABLED <-> BOTNET-CNC RogueSoftware.Win32.CleanV contact to server attempt (botnet-cnc.rules)
 * 1:18724 <-> DISABLED <-> BOTNET-CNC RogueSoftware.Win32.ZeroClean contact to server attempt (botnet-cnc.rules)
 * 1:18739 <-> DISABLED <-> BOTNET-CNC Worm.Win32.Koobface.D contact to server attempt (botnet-cnc.rules)
 * 1:18936 <-> DISABLED <-> BOTNET-CNC URI request for known malicious URI - Win32.FakeAV (botnet-cnc.rules)
 * 1:18937 <-> DISABLED <-> BOTNET-CNC URI request for known malicious URI - Win32.Krap (botnet-cnc.rules)
 * 1:18938 <-> DISABLED <-> BOTNET-CNC URI request for known malicious URI - ZBot (botnet-cnc.rules)
 * 1:18940 <-> DISABLED <-> BOTNET-CNC URI request for known malicious URI - Sality (botnet-cnc.rules)
 * 1:18941 <-> DISABLED <-> BOTNET-CNC URI request for known malicious URI - FakeAV (botnet-cnc.rules)
 * 1:18944 <-> DISABLED <-> BOTNET-CNC URI request for known malicious URI - Suspected Crimepack (botnet-cnc.rules)
 * 1:18945 <-> DISABLED <-> BOTNET-CNC Virus.Win32.Feberr contact to server attempt (botnet-cnc.rules)
 * 1:18976 <-> DISABLED <-> BOTNET-CNC Rogue-Software.AVCare outbound connection (botnet-cnc.rules)
 * 1:18978 <-> DISABLED <-> BOTNET-CNC Trojan.Win32.Pasta.aoq runtime detection (botnet-cnc.rules)
 * 1:18980 <-> DISABLED <-> BOTNET-CNC WinSpywareProtect outbound connection (botnet-cnc.rules)
 * 1:18981 <-> DISABLED <-> BOTNET-CNC WinSpywareProtect outbound connection (botnet-cnc.rules)
 * 1:18982 <-> DISABLED <-> BOTNET-CNC WinSpywareProtect outbound connection (botnet-cnc.rules)
 * 1:19021 <-> DISABLED <-> BOTNET-CNC Trojan-Downloader.Win32.FraudLoad.dzm outbound connection (botnet-cnc.rules)
 * 1:19022 <-> DISABLED <-> BOTNET-CNC Trojan-Downloader.Win32.FraudLoad.dzm outbound connection (botnet-cnc.rules)
 * 1:19023 <-> DISABLED <-> BACKDOOR IRC.Zapchast.zwrc outbound connection (backdoor.rules)
 * 1:19024 <-> DISABLED <-> BOTNET-CNC Trojan.Win32.StartPage outbound connection (botnet-cnc.rules)
 * 1:19025 <-> DISABLED <-> BOTNET-CNC Trojan-Banker.Win32.Bancos.etf outbound connection (botnet-cnc.rules)
 * 1:19027 <-> DISABLED <-> BOTNET-CNC BrowserModifier.Win32.Kerlofost outbound connection (botnet-cnc.rules)
 * 1:19028 <-> DISABLED <-> BOTNET-CNC Trojan-Mailfinder.Win32.Mailbot.dz outbound connection (botnet-cnc.rules)
 * 1:19029 <-> DISABLED <-> BOTNET-CNC Win32.PcClient.AI outbound connection (botnet-cnc.rules)
 * 1:19030 <-> DISABLED <-> BOTNET-CNC TrojanDownloader.Win32.Uloadis.A outbound connection (botnet-cnc.rules)
 * 1:19031 <-> DISABLED <-> BOTNET-CNC iPRIVACY outbound connection (botnet-cnc.rules)
 * 1:19032 <-> DISABLED <-> BOTNET-CNC TrojanDownloader.Win32.Cornfemo.A outbound connection (botnet-cnc.rules)
 * 1:19033 <-> DISABLED <-> BOTNET-CNC TrojanDownloader.Win32.Cornfemo.A outbound connection (botnet-cnc.rules)
 * 1:19034 <-> DISABLED <-> BOTNET-CNC Win32.Kbot.qd outbound connection (botnet-cnc.rules)
 * 1:19036 <-> DISABLED <-> BACKDOOR Win32.IRCBrute.I contact to server attempt (backdoor.rules)
 * 1:19037 <-> DISABLED <-> BACKDOOR Win32.IRCBrute.I contact to server attempt (backdoor.rules)
 * 1:19039 <-> DISABLED <-> BACKDOOR Win32.Linkbot.alr contact to server attempt (backdoor.rules)
 * 1:19040 <-> DISABLED <-> BACKDOOR Win32.Linkbot.alr contact to server attempt (backdoor.rules)
 * 1:19041 <-> DISABLED <-> BOTNET-CNC Trojan.Win32.Carberp.C contact to server attempt (botnet-cnc.rules)
 * 1:19042 <-> DISABLED <-> BOTNET-CNC Trojan.Win32.Banker.ACQE contact to server attempt (botnet-cnc.rules)
 * 1:19045 <-> DISABLED <-> BOTNET-CNC Trojan.Win32.Bancos.XQ contact to server attempt (botnet-cnc.rules)
 * 1:19048 <-> DISABLED <-> BACKDOOR Win32.Darkness contact to server attempt (backdoor.rules)
 * 1:19049 <-> DISABLED <-> BACKDOOR Win32.Gigade contact to server attempt (backdoor.rules)
 * 1:19050 <-> DISABLED <-> BOTNET-CNC Trojan.Win32.Banbra.fxe contact to server attempt (botnet-cnc.rules)
 * 1:19052 <-> ENABLED <-> BACKDOOR Win32.Httpbot.qdc contact to server attempt (backdoor.rules)
 * 1:19055 <-> ENABLED <-> BACKDOOR Win32.Gosik.A registration attempt (backdoor.rules)
 * 1:19056 <-> ENABLED <-> BOTNET-CNC Trojan.Win32.QQFish contact to server attempt (botnet-cnc.rules)
 * 1:19060 <-> DISABLED <-> BOTNET-CNC Trojan.Win32.Ponmocup.A contact to server attempt (botnet-cnc.rules)
 * 1:19062 <-> DISABLED <-> BOTNET-CNC Trojan.Win32.FakePlus Runtime Detection (botnet-cnc.rules)
 * 1:19123 <-> DISABLED <-> BOTNET-CNC Dropper Win32.Cefyns.A outbound connection (botnet-cnc.rules)
 * 1:19135 <-> DISABLED <-> BACKDOOR Win32.Buterat Checkin (backdoor.rules)
 * 1:19310 <-> DISABLED <-> BOTNET-CNC Downloader Trojan.Gen3 outbound connection (botnet-cnc.rules)
 * 1:19312 <-> DISABLED <-> BACKDOOR Trojan Win32.Agent.aah outbound connection (backdoor.rules)
 * 1:19329 <-> DISABLED <-> BACKDOOR Faceback.exe outbound connection (backdoor.rules)
 * 1:19330 <-> DISABLED <-> BACKDOOR Adclicker Trojan Zlob.dnz outbound connection (backdoor.rules)
 * 1:19331 <-> DISABLED <-> BACKDOOR Adclicker Trojan Zlob.dnz outbound connection (backdoor.rules)
 * 1:19332 <-> DISABLED <-> BACKDOOR Trojan Win32.Clampi outbound connection (backdoor.rules)
 * 1:19349 <-> DISABLED <-> BACKDOOR Fakeav Vaccineclear outbound connection (backdoor.rules)
 * 1:19352 <-> DISABLED <-> BACKDOOR Win32.Small.D outbound connection (backdoor.rules)
 * 1:19355 <-> DISABLED <-> BOTNET-CNC Trojan.Win32.Fareit.A outbound connection (botnet-cnc.rules)
 * 1:19356 <-> DISABLED <-> BOTNET-CNC Win32.Fibbit.ax outbound connection (botnet-cnc.rules)
 * 1:19359 <-> DISABLED <-> BOTNET-CNC Trojan Win32.Dcbavict.A outbound connection (botnet-cnc.rules)
 * 1:19360 <-> DISABLED <-> BOTNET-CNC Trojan Win32.Dcbavict.A outbound connection (botnet-cnc.rules)
 * 1:19361 <-> DISABLED <-> BOTNET-CNC Trojan Win32.Dcbavict.A outbound connection (botnet-cnc.rules)
 * 1:19367 <-> DISABLED <-> BOTNET-CNC Worm Win32.Vaubeg.A outbound connection (botnet-cnc.rules)
 * 1:19368 <-> DISABLED <-> BOTNET-CNC Trojan Win32.Carberp.D outbound connection (botnet-cnc.rules)
 * 1:19369 <-> DISABLED <-> BOTNET-CNC Trojan Win32.Carberp.D outbound connection (botnet-cnc.rules)
 * 1:19370 <-> DISABLED <-> BOTNET-CNC Trojan Win32.Carberp.D outbound connection (botnet-cnc.rules)
 * 1:19371 <-> DISABLED <-> BOTNET-CNC Trojan Win32.Banker.IC outbound connection (botnet-cnc.rules)
 * 1:19394 <-> DISABLED <-> BACKDOOR Trojan Win32.Tidserv outbound connection (backdoor.rules)
 * 1:19395 <-> DISABLED <-> BOTNET-CNC Trojan Downloader Win32.Monkif.J inbound connection - dest ip infected (botnet-cnc.rules)
 * 1:19397 <-> DISABLED <-> BACKDOOR Win32.UltimateDefender.xv outbound connection (backdoor.rules)
 * 1:19398 <-> DISABLED <-> BACKDOOR Trojan BAT.Shutdown.ef outbound connection (backdoor.rules)
 * 1:19402 <-> DISABLED <-> BACKDOOR P2P Worm.Win32.Malas.r outbound connection (backdoor.rules)
 * 1:19426 <-> DISABLED <-> BACKDOOR Trojan Downloader Win32.Crypter.i outbound connection (backdoor.rules)
 * 1:19427 <-> DISABLED <-> BACKDOOR Win32.Agent.amjz outbound connection (backdoor.rules)
 * 1:19428 <-> DISABLED <-> BACKDOOR Trojan Downloader Win32.Adload.BG outbound connection (backdoor.rules)
 * 1:19433 <-> DISABLED <-> BACKDOOR W32.Fujacks.aw outbound connection (backdoor.rules)
 * 1:19454 <-> DISABLED <-> BOTNET-CNC Trojan.PWS.Win32.QQPass.IK runtime detection (botnet-cnc.rules)
 * 1:19456 <-> DISABLED <-> BACKDOOR Packed.Win32.Klone.bj runtime detection (backdoor.rules)
 * 1:19457 <-> DISABLED <-> BOTNET-CNC Trojan-Clicker.Win32.Vesloruki.ajb runtime detection (botnet-cnc.rules)
 * 1:19476 <-> DISABLED <-> BACKDOOR Exploit.Win32.SqlShell.r runtime detection (backdoor.rules)
 * 1:19477 <-> DISABLED <-> BOTNET-CNC Trojan.Win32.Krap.af contact to server attempt (botnet-cnc.rules)
 * 1:19483 <-> DISABLED <-> BACKDOOR Win32.Reload.fy contact to server attempt (backdoor.rules)
 * 1:19484 <-> DISABLED <-> BACKDOOR Win32.Agent.alqt contact to server attempt (backdoor.rules)
 * 1:19487 <-> DISABLED <-> BOTNET-CNC Trojan.Win32.Agent.kih contact to server attempt (botnet-cnc.rules)
 * 1:19489 <-> DISABLED <-> BACKDOOR Win32.DeAlfa.fa contact to server attempt (backdoor.rules)
 * 1:19490 <-> DISABLED <-> BACKDOOR Win32.Koceg.B contact to server attempt (backdoor.rules)
 * 1:19491 <-> DISABLED <-> BACKDOOR Trojan Downloader Win32.Genome.vau outbound connection (backdoor.rules)
 * 1:19492 <-> DISABLED <-> BACKDOOR Windows System Defender outbound connection (backdoor.rules)
 * 1:19494 <-> DISABLED <-> BACKDOOR W32.Licum outbound connection (backdoor.rules)
 * 1:19554 <-> DISABLED <-> BOTNET-CNC Trojan Fakeav Antivirus Xp Pro outbound connection (botnet-cnc.rules)
 * 1:19568 <-> DISABLED <-> BOTNET-CNC Trojan-Spy.Win32.PerfectKeylogger runtime detection (botnet-cnc.rules)
 * 1:19569 <-> DISABLED <-> BOTNET-CNC Trojan-Downloader.Win32.Perkesh runtime detection (botnet-cnc.rules)
 * 1:19572 <-> DISABLED <-> BOTNET-CNC Trojan.Win32.FFSearch.A runtime detection (botnet-cnc.rules)
 * 1:19573 <-> DISABLED <-> BACKDOOR Worm Win32.Chiviper.C outbound connection (backdoor.rules)
 * 1:19575 <-> DISABLED <-> BACKDOOR Worm Win32.Emold.U outbound connection (backdoor.rules)
 * 1:19577 <-> DISABLED <-> BACKDOOR Trojan Dropper Win32.Dogrobot.E outbound connection (backdoor.rules)
 * 1:19581 <-> DISABLED <-> BACKDOOR Trojan Downloader.Win32.Apher.gpd outbound connection (backdoor.rules)
 * 1:19583 <-> DISABLED <-> BACKDOOR Trojan Win32.Bumat.rts outbound connection (backdoor.rules)
 * 1:19586 <-> DISABLED <-> BACKDOOR Trojan Clicker Win32.Agent.dlg outbound connection (backdoor.rules)
 * 1:19587 <-> DISABLED <-> BACKDOOR Win32.Sereki.B outbound connection (backdoor.rules)
 * 1:19588 <-> DISABLED <-> BACKDOOR Win32.Sereki.B successful connection (backdoor.rules)
 * 1:19591 <-> DISABLED <-> BOTNET-CNC Trojan Win32.Powp.pyv outbound connection (botnet-cnc.rules)
 * 1:19592 <-> DISABLED <-> BOTNET-CNC Trickler Trojan-Downloader.Win32.Agent.bjkd Runtime Detection (botnet-cnc.rules)
 * 1:19608 <-> DISABLED <-> BOTNET-CNC Win32.Wisscmd.A outbound connection (botnet-cnc.rules)
 * 1:19612 <-> DISABLED <-> BACKDOOR Trojan Downloader.Win32.Banload.bvk outbound connection (backdoor.rules)
 * 1:19613 <-> DISABLED <-> BACKDOOR Rogue Software Registry Cleaner Pro outbound connection (backdoor.rules)
 * 1:19616 <-> DISABLED <-> BACKDOOR Trojan Banker.Win32.Banbra.mcq outbound connection (backdoor.rules)
 * 1:19652 <-> DISABLED <-> BOTNET-CNC Teevsock C outbound connection (botnet-cnc.rules)
 * 1:19654 <-> DISABLED <-> BOTNET-CNC Trojan-Spy.Win32.Zbot.wti contact to server attempt (botnet-cnc.rules)
 * 1:19655 <-> DISABLED <-> BOTNET-CNC Trojan-Dropper.Agent.IK contact to server attempt (botnet-cnc.rules)
 * 1:19656 <-> DISABLED <-> BACKDOOR Trojan-Dropper.Win32.Peace.lh Runtime Detection (backdoor.rules)
 * 1:19660 <-> DISABLED <-> BACKDOOR Win32.Riern.K outbound connection (backdoor.rules)
 * 1:19695 <-> DISABLED <-> BACKDOOR Trojan Downloader.Win32.VB.nec outbound connection (backdoor.rules)
 * 1:19697 <-> DISABLED <-> BACKDOOR Trojan Spy.Win32.VB.btm outbound connection (backdoor.rules)
 * 1:19698 <-> DISABLED <-> BACKDOOR Win32.Prosti.AG contact to server attempt (backdoor.rules)
 * 1:19699 <-> DISABLED <-> BOTNET-CNC TrojanDownloader.Win32.Korklic.A contact to server attempt (botnet-cnc.rules)
 * 1:19700 <-> DISABLED <-> BACKDOOR Win32.Agent.tnr Runtime Detection (backdoor.rules)
 * 1:19701 <-> DISABLED <-> BOTNET-CNC Win32.Hassar.A outbound connection (botnet-cnc.rules)
 * 1:19715 <-> DISABLED <-> BOTNET-CNC Trojan.URLZone contact to server attempt (botnet-cnc.rules)
 * 1:19716 <-> DISABLED <-> BACKDOOR TrojanSpy.Win32.Banker.OO Runtime Detection (backdoor.rules)
 * 1:19718 <-> DISABLED <-> BOTNET-CNC Trojan-Downloader.Win32.Agent.bkap contact to server attempt (botnet-cnc.rules)
 * 1:19720 <-> DISABLED <-> BOTNET-CNC Trojan-Downloader.Win32.Onestage.ws contact to server attempt (botnet-cnc.rules)
 * 1:19721 <-> DISABLED <-> BACKDOOR Win32.IRCBot.mlh contact to server attempt (backdoor.rules)
 * 1:19724 <-> DISABLED <-> BOTNET-CNC Trojan Win32.Agent.dhy outbound connection (botnet-cnc.rules)
 * 1:19733 <-> DISABLED <-> BACKDOOR Trojan Win32.Jorik.BRU outbound connection (backdoor.rules)
 * 1:19742 <-> DISABLED <-> BACKDOOR Trojan-Downloader.Win32.Agent.atff runtime detection (backdoor.rules)
 * 1:19743 <-> DISABLED <-> BACKDOOR Win32.Hupigon.eqlo runtime detection (backdoor.rules)
 * 1:19744 <-> DISABLED <-> BACKDOOR Worm.Win32.Deecee.a runtime detection (backdoor.rules)
 * 1:19745 <-> DISABLED <-> BACKDOOR Trojan-Downloader.Win32.FraudLoad.dyl runtime detection (backdoor.rules)
 * 1:19746 <-> DISABLED <-> BACKDOOR Trojan-Downloader.Win32.Agent.biiw runtime detection (backdoor.rules)
 * 1:19747 <-> DISABLED <-> BACKDOOR Win32.GGDoor.22 runtime detection (backdoor.rules)
 * 1:19749 <-> DISABLED <-> BACKDOOR Trojan.Win32.Agent.chgp contact to server attempt (backdoor.rules)
 * 1:19750 <-> DISABLED <-> BACKDOOR PWS.Win32.Zbot.PJ contact to server attempt (backdoor.rules)
 * 1:19751 <-> DISABLED <-> BACKDOOR Worm.Win32.Sohanad.bm contact to server attempt (backdoor.rules)
 * 1:19752 <-> DISABLED <-> BACKDOOR Trojan.Downloader.Win32.Agent.bkwx contact to server attempt (backdoor.rules)
 * 1:19753 <-> DISABLED <-> BOTNET-CNC Trojan TrojanSpy.Win32.Zbot.gen.C Runtime Detection (botnet-cnc.rules)
 * 1:19754 <-> DISABLED <-> BOTNET-CNC Trojan.Downloader.Delf.RGL Runtime Detection (botnet-cnc.rules)
 * 1:19755 <-> DISABLED <-> BACKDOOR Trojan.Win32.Alphabet contact to server attempt (backdoor.rules)
 * 1:19757 <-> DISABLED <-> BACKDOOR Trojan-Downloader.Win32.Agent.bqlu contact to server attempt (backdoor.rules)
 * 1:19758 <-> DISABLED <-> BACKDOOR Win32.Small.yw contact to server attempt (backdoor.rules)
 * 1:19759 <-> DISABLED <-> BACKDOOR Trojan-PSW.Win32.FireThief.h Runtime Detection (backdoor.rules)
 * 1:19760 <-> DISABLED <-> BOTNET-CNC Trojan Win32.Arsinfoder.A outbound connection (botnet-cnc.rules)
 * 1:19762 <-> DISABLED <-> BACKDOOR Win32.RDPdoor.AE outbound connection (backdoor.rules)
 * 1:19763 <-> DISABLED <-> BACKDOOR Win32.RDPdoor.AE outbound connection (backdoor.rules)
 * 1:19764 <-> DISABLED <-> BACKDOOR Win32.RDPdoor.AE outbound connection (backdoor.rules)
 * 1:19774 <-> DISABLED <-> BACKDOOR Gen-Trojan.Heur runtime detection (backdoor.rules)
 * 1:19781 <-> DISABLED <-> BACKDOOR Trojan-Dropper.Win32.Agent.aqpn Runtime Detection (backdoor.rules)
 * 1:19782 <-> DISABLED <-> BACKDOOR Trojan.Win32.AVKill.bc contact to server attempt (backdoor.rules)
 * 1:19783 <-> DISABLED <-> BACKDOOR Trojan-Downloader.Win32.Banload.agcw runtime detection (backdoor.rules)
 * 1:19785 <-> DISABLED <-> BACKDOOR Trojan Downloader.Win32.Malushka.T outbound connection (backdoor.rules)
 * 1:19788 <-> DISABLED <-> BACKDOOR Trojan Downloader.Win32.VB.pnc Runtime Detection (backdoor.rules)
 * 1:19792 <-> DISABLED <-> BACKDOOR Trojan Downloader Win32.Caxnet.A outbound connection (backdoor.rules)
 * 1:19793 <-> DISABLED <-> BACKDOOR Trojan Downloader Win32.SillyFDC-DS outbound connection (backdoor.rules)
 * 1:19794 <-> DISABLED <-> BACKDOOR W32.Fnumbot outbound connection (backdoor.rules)
 * 1:19795 <-> DISABLED <-> BACKDOOR Trojan FakeAV NoAdware outbound connection (backdoor.rules)
 * 1:19796 <-> DISABLED <-> BACKDOOR Trojan DL.CashnJoy.A outbound connection (backdoor.rules)
 * 1:19797 <-> DISABLED <-> BACKDOOR Safety Center outbound connection (backdoor.rules)
 * 1:19798 <-> DISABLED <-> BACKDOOR Trojan Win32.Agent2.kxu outbound connection (backdoor.rules)
 * 1:19799 <-> DISABLED <-> BACKDOOR PWS.Win32.Zbot.gen.Q Runtime Detection (backdoor.rules)
 * 1:19800 <-> DISABLED <-> BACKDOOR Trojan-Downloader.Win32.Pher.ij Runtime Detection (backdoor.rules)
 * 1:19802 <-> DISABLED <-> BACKDOOR TrojanDownloader.Win32.Wixud.B contact to server attempt (backdoor.rules)
 * 1:19803 <-> DISABLED <-> BACKDOOR TrojanDownloader.Win32.Renos.FH contact to server attempt (backdoor.rules)
 * 1:19804 <-> DISABLED <-> BACKDOOR Trojan.Win32.VB.ktq contact to server attempt (backdoor.rules)
 * 1:19805 <-> DISABLED <-> BACKDOOR Trojan.Win32.Smser.cx Runtime Detection (backdoor.rules)
 * 1:19819 <-> DISABLED <-> BACKDOOR Trojan.Win32.Ertfor.A runtime detection (backdoor.rules)
 * 1:19820 <-> DISABLED <-> BACKDOOR Trojan.Win32.Ertfor.A runtime detection (backdoor.rules)
 * 1:19822 <-> DISABLED <-> BACKDOOR Trojan.Win32.Banload.HH runtime detection (backdoor.rules)
 * 1:19828 <-> DISABLED <-> BACKDOOR Win32.SpyAgent.B runtime detection (backdoor.rules)
 * 1:19829 <-> DISABLED <-> BACKDOOR Win32.Rbot.gen runtime detection (backdoor.rules)
 * 1:19830 <-> DISABLED <-> BACKDOOR Win32.Poebot.BP runtime detection (backdoor.rules)
 * 1:19831 <-> DISABLED <-> BACKDOOR Trojan.Spy.Zbot.SO runtime detection (backdoor.rules)
 * 1:19832 <-> DISABLED <-> BACKDOOR Win32.Veslorn.gen.A runtime detection (backdoor.rules)
 * 1:19833 <-> DISABLED <-> BACKDOOR Trojan-Downloader.Win32.Banload.bda runtime detection (backdoor.rules)
 * 1:19834 <-> DISABLED <-> BACKDOOR Trojan.Spy.ZBot.RD runtime detection (backdoor.rules)
 * 1:19852 <-> DISABLED <-> BACKDOOR Trojan Downloader.Win32.Delf.tbv outbound connection (backdoor.rules)
 * 1:19854 <-> DISABLED <-> BACKDOOR W32.Sality.AM runtime detection (backdoor.rules)
 * 1:19855 <-> DISABLED <-> BACKDOOR W32.Sality.AM runtime detection (backdoor.rules)
 * 1:19856 <-> DISABLED <-> BACKDOOR Packed.Win32.Krap.i outbound connection (backdoor.rules)
 * 1:19861 <-> DISABLED <-> BACKDOOR Trojan-Downloader.Win32.Agent.cqcv contact to server attempt (backdoor.rules)
 * 1:19862 <-> DISABLED <-> BACKDOOR Trojan.Win32.Scar.iej contact to server attempt (backdoor.rules)
 * 1:19863 <-> DISABLED <-> BACKDOOR Win32.Httpbot.yi Runtime Detection (backdoor.rules)
 * 1:19895 <-> DISABLED <-> BACKDOOR Win32.Delf.jwh runtime detection (backdoor.rules)
 * 1:19898 <-> DISABLED <-> BACKDOOR Cinmus Variant outbound connection (backdoor.rules)
 * 1:19905 <-> DISABLED <-> BACKDOOR Trojan-Downloader.Win32.Small.jog runtime detection (backdoor.rules)
 * 1:19915 <-> DISABLED <-> BACKDOOR Win32.Gnutler.apd outbound connection (backdoor.rules)
 * 1:19916 <-> DISABLED <-> BOTNET-CNC Trojan Win32.Bancos.ACB outbound connection (botnet-cnc.rules)
 * 1:19917 <-> DISABLED <-> BACKDOOR Win32.Sogu.A outbound connection (backdoor.rules)
 * 1:19919 <-> DISABLED <-> BACKDOOR Win32.Murcy.A outbound connection (backdoor.rules)
 * 1:19920 <-> DISABLED <-> BACKDOOR Win32.Reppserv.A outbond connection (backdoor.rules)
 * 1:19921 <-> DISABLED <-> BOTNET-CNC Trojan Win32.Puprlehzae.A outbound connection (botnet-cnc.rules)
 * 1:19922 <-> DISABLED <-> BACKDOOR Win32.Shiz.ivr outbound connection (backdoor.rules)
 * 1:19931 <-> DISABLED <-> BACKDOOR Trojan.Lineage.Gen.Pac.3 outbound connection (backdoor.rules)
 * 1:19935 <-> DISABLED <-> BACKDOOR Trojan Dropper Win32.Delf.aba outbound connection (backdoor.rules)
 * 1:19936 <-> DISABLED <-> BACKDOOR Trojan Dropper Win32.Delf.aba outbound connection (backdoor.rules)
 * 1:19940 <-> DISABLED <-> BACKDOOR Trojan-Dropper.IRC.TKB outbound connection - dir4you (backdoor.rules)
 * 1:19941 <-> DISABLED <-> BACKDOOR TrojanSpy Win32.Zbot.Gen outbound connection (backdoor.rules)
 * 1:19942 <-> DISABLED <-> BACKDOOR TrojanSpy Win32.Zbot.Gen outbound connection (backdoor.rules)
 * 1:19944 <-> DISABLED <-> BACKDOOR Trojan Downloader.Win32.Banload.ykl outbound connection (backdoor.rules)
 * 1:19945 <-> DISABLED <-> BACKDOOR Trojan Downloader.Win32.Agent.amwd outbound connection (backdoor.rules)
 * 1:19946 <-> DISABLED <-> BACKDOOR Trojan Downloader.Win32.Agent.amwd outbound connection (backdoor.rules)
 * 1:19947 <-> DISABLED <-> BACKDOOR Trojan-Downloader.Win32.Agent.amwd outbound connection (backdoor.rules)
 * 1:19948 <-> DISABLED <-> BACKDOOR Trojan Win32.Agent.asjk outbound connection (backdoor.rules)
 * 1:19949 <-> DISABLED <-> BACKDOOR Trojan Win32.Agent.asjk outbound connection (backdoor.rules)
 * 1:19958 <-> DISABLED <-> BACKDOOR Trojan Win32.Agent.aulk outbound connection (backdoor.rules)
 * 1:19959 <-> DISABLED <-> BACKDOOR Trojan Win32.Agent.aulk outbound connection (backdoor.rules)
 * 1:19960 <-> DISABLED <-> BACKDOOR Trojan Win32.Agent.aulk outbound connection (backdoor.rules)
 * 1:19961 <-> DISABLED <-> BACKDOOR Fouad 1.0 outbound connection (backdoor.rules)
 * 1:19962 <-> DISABLED <-> BACKDOOR Email-Worm.CryptBox-A outbound connection (backdoor.rules)
 * 1:19963 <-> DISABLED <-> BACKDOOR Trojan Downloader.Win32.Banload.aajs outbound connection (backdoor.rules)
 * 1:19964 <-> DISABLED <-> BACKDOOR Virus Win32.Sality.aa outbound connection (backdoor.rules)
 * 1:19965 <-> DISABLED <-> BACKDOOR Trojan Downloader.Win32.Agent.avzz outbound connection (backdoor.rules)
 * 1:19967 <-> DISABLED <-> BACKDOOR Trojan-PSW.Win32.Papras.dm runtime detection (backdoor.rules)
 * 1:19968 <-> DISABLED <-> BACKDOOR Trojan.PSW.Win32.QQPass.amx runtime detection (backdoor.rules)
 * 1:19969 <-> DISABLED <-> BACKDOOR Trojan.Crypt.CY runtime detection (backdoor.rules)
 * 1:19970 <-> DISABLED <-> BACKDOOR W32.Smalltroj.MHYR runtime detection (backdoor.rules)
 * 1:19973 <-> DISABLED <-> BACKDOOR Worm.Trojan.Win32.Nebuler.D runtime detection (backdoor.rules)
 * 1:19974 <-> DISABLED <-> BACKDOOR Trojan.Win32.Small.bwj runtime detection (backdoor.rules)
 * 1:19975 <-> DISABLED <-> BACKDOOR Trojan.Win32.Crypt.vb runtime detection (backdoor.rules)
 * 1:19977 <-> DISABLED <-> BACKDOOR Trojan.LooksLike.Zaplot runtime detection (backdoor.rules)
 * 1:19978 <-> DISABLED <-> BACKDOOR Viking.JB Worm runtime traffic detected (backdoor.rules)
 * 1:19981 <-> DISABLED <-> BOTNET-CNC Trojan Micstus.A runtime traffic detected (botnet-cnc.rules)
 * 1:19982 <-> DISABLED <-> BACKDOOR Win32.Agent.wwe outbound connection (backdoor.rules)
 * 1:19983 <-> DISABLED <-> BACKDOOR Win32.Kolabc.fic outbound connection (backdoor.rules)
 * 1:19988 <-> DISABLED <-> BACKDOOR Asprox outbound connection (backdoor.rules)
 * 1:19991 <-> DISABLED <-> BACKDOOR Trojan.Win32.Zbot.PG runtime traffic detected (backdoor.rules)
 * 1:19992 <-> DISABLED <-> BACKDOOR Trojan-Dropper.Win32.Farfli.A runtime traffic detected (backdoor.rules)
 * 1:19996 <-> DISABLED <-> BACKDOOR Worm Brontok.C outbound connection (backdoor.rules)
 * 1:19997 <-> DISABLED <-> BACKDOOR Trojan PSW.Win32.QQPass.gam outbound connection (backdoor.rules)
 * 1:19998 <-> DISABLED <-> BOTNET-CNC Trojan.Downloader.Win32.Agent.dyfn outbound connection (botnet-cnc.rules)
 * 1:20003 <-> DISABLED <-> BACKDOOR Trojan Spy Pilonoc runtime traffic detected (backdoor.rules)
 * 1:20004 <-> DISABLED <-> BACKDOOR Trojan Spy Pilonoc install-time traffic detected (backdoor.rules)
 * 1:20005 <-> DISABLED <-> BACKDOOR Win32 Lecna.cr runtime traffic detected (backdoor.rules)
 * 1:20015 <-> DISABLED <-> BOTNET-CNC Trojan Zeus outbound connection (botnet-cnc.rules)
 * 1:20016 <-> DISABLED <-> BOTNET-CNC Trojan Zeus outbound connection (botnet-cnc.rules)
 * 1:20017 <-> DISABLED <-> BACKDOOR Worm Win32.Koobface.dq outbound connection (backdoor.rules)
 * 1:20018 <-> DISABLED <-> BACKDOOR W32.Autorun.worm.dq outbound connection (backdoor.rules)
 * 1:20019 <-> DISABLED <-> BACKDOOR W32.Autorun.worm.dq outbound connection (backdoor.rules)
 * 1:20020 <-> DISABLED <-> BACKDOOR Malware Doctor outbound connection (backdoor.rules)
 * 1:20022 <-> DISABLED <-> BACKDOOR Worm Win32.Padobot.z outbound connection (backdoor.rules)
 * 1:20023 <-> DISABLED <-> BACKDOOR Advanced Virus Remover outbound connection (backdoor.rules)
 * 1:20024 <-> DISABLED <-> BACKDOOR Win32.Dreamy.bc outbound connection (backdoor.rules)
 * 1:20026 <-> DISABLED <-> BACKDOOR Trojan Downloader.Win32.Banker.abg.b outbound connection (backdoor.rules)
 * 1:20028 <-> DISABLED <-> BACKDOOR Windows Antivirus Pro outbound connection (backdoor.rules)
 * 1:20040 <-> DISABLED <-> BOTNET-CNC Trojan Win32.KSpyPro.A outbound connection (botnet-cnc.rules)
 * 1:20042 <-> DISABLED <-> BOTNET-CNC Trojan Sinowal outbond connection (botnet-cnc.rules)
 * 1:20043 <-> DISABLED <-> BOTNET-CNC Adware Kraddare.AZ outbound connection (botnet-cnc.rules)
 * 1:20057 <-> DISABLED <-> BOTNET-CNC BitCoin Miner IP query (botnet-cnc.rules)
 * 1:20064 <-> DISABLED <-> BOTNET-CNC Malware Trojan.Win32.Clemag.A contact to server attempt (botnet-cnc.rules)
 * 1:20066 <-> DISABLED <-> BOTNET-CNC Trojan Win32 SensLiceld.A runtime traffic detected (botnet-cnc.rules)
 * 1:20067 <-> DISABLED <-> BOTNET-CNC Trojan Win32 Zatvex.A runtime traffic detected (botnet-cnc.rules)
 * 1:20068 <-> DISABLED <-> BOTNET-CNC Trojan Jetilms.A runtime activity detected (botnet-cnc.rules)
 * 1:20069 <-> DISABLED <-> BOTNET-CNC Trojan VB.alhq runtime traffic detected (botnet-cnc.rules)
 * 1:20076 <-> DISABLED <-> BACKDOOR Win32.Agobot.ast outbound connection (backdoor.rules)
 * 1:20077 <-> DISABLED <-> BACKDOOR Win32.Agobot.ast outbound connection (backdoor.rules)
 * 1:20078 <-> DISABLED <-> BACKDOOR Win32.Russkill.C outbound connection (backdoor.rules)
 * 1:20079 <-> DISABLED <-> BACKDOOR Win32.Russkill.C outbound connection (backdoor.rules)
 * 1:20083 <-> DISABLED <-> BOTNET-CNC Trojan Win32.Fucobha.A outbound connection (botnet-cnc.rules)
 * 1:20086 <-> DISABLED <-> BOTNET-CNC Trojan Win32.Banload.ABY outbound connection (botnet-cnc.rules)
 * 1:20087 <-> DISABLED <-> BOTNET-CNC Trojan Win32.Banker.FGU outbound connection (botnet-cnc.rules)
 * 1:20088 <-> DISABLED <-> BACKDOOR Win32.Emudbot.A outbound connection (backdoor.rules)
 * 1:20096 <-> DISABLED <-> BOTNET-CNC Trojan Win32.Agent.dcir outbound connection (botnet-cnc.rules)
 * 1:20097 <-> DISABLED <-> BOTNET-CNC Trojan Win32.Agent.dcir infected host at destination ip (botnet-cnc.rules)
 * 1:20107 <-> DISABLED <-> BOTNET-CNC Trojan Downloader.Win32.Small.Cns outbound connection (botnet-cnc.rules)
 * 1:20108 <-> DISABLED <-> BOTNET-CNC Trojan Win32.Banker.Pher outbound connection (botnet-cnc.rules)
 * 1:20217 <-> DISABLED <-> BACKDOOR Win32.Ramagedos.A outbound connection (backdoor.rules)
 * 1:20218 <-> DISABLED <-> BACKDOOR Win32.Ramagedos.A outbound connection (backdoor.rules)
 * 1:20219 <-> DISABLED <-> BACKDOOR Win32.ToriaSpy.A outbound connection (backdoor.rules)
 * 1:20221 <-> DISABLED <-> BOTNET-CNC Trojan.Injector outbound connection (botnet-cnc.rules)
 * 1:20222 <-> DISABLED <-> BACKDOOR Trojan.Win32.Payazol.B outbound connection (backdoor.rules)
 * 1:20235 <-> DISABLED <-> BACKDOOR Win32.AdobeReader.Uz runtime traffic detected (backdoor.rules)
 * 1:20289 <-> DISABLED <-> BACKDOOR Win32.Doschald.A outbound connection (backdoor.rules)
 * 1:20290 <-> DISABLED <-> BACKDOOR Win32.Doschald.A inbound connection (backdoor.rules)
 * 1:20292 <-> DISABLED <-> BOTNET-CNC Trojan Win32.FresctSpy.A outbound connection (botnet-cnc.rules)
 * 1:20428 <-> DISABLED <-> BACKDOOR Win32.Zewit.A outbound connection (backdoor.rules)
 * 1:20432 <-> DISABLED <-> BACKDOOR Win32.Hiloti outbound connection (backdoor.rules)
 * 1:20448 <-> DISABLED <-> BACKDOOR Win32.Meciv.A outbound connection (backdoor.rules)
 * 1:20449 <-> DISABLED <-> BACKDOOR Worm Win32.Busifom.A outbound connection (backdoor.rules)
 * 1:20525 <-> DISABLED <-> BOTNET-CNC Trojan.Duqu contact to C&C server attempt (botnet-cnc.rules)
 * 1:20561 <-> DISABLED <-> BOTNET-CNC Trojan.Win32.PWSBanker.SHE contact to cnc-server attempt (botnet-cnc.rules)
 * 1:20562 <-> DISABLED <-> BOTNET-CNC Trojan.Win32.PWSBanker.SHE contact to cnc-server attempt (botnet-cnc.rules)
 * 1:20587 <-> DISABLED <-> BOTNET-CNC Trojan.Win32.Larchik.A backdoor phishing attempt (botnet-cnc.rules)
 * 1:20595 <-> DISABLED <-> BOTNET-CNC Win32.Ixeshe.F backdoor access attempt (botnet-cnc.rules)
 * 1:20596 <-> DISABLED <-> BOTNET-CNC Trojan.Win32.Smoaler.A trojan injection attempt (botnet-cnc.rules)
 * 1:20597 <-> DISABLED <-> BOTNET-CNC Trojan.Win32.Smoaler.A trojan injection attempt (botnet-cnc.rules)
 * 1:20598 <-> DISABLED <-> BOTNET-CNC Trojan.Win32.Smoaler.A trojan injection attempt (botnet-cnc.rules)
 * 1:20599 <-> DISABLED <-> BOTNET-CNC Trojan.Win32.Smoaler.A trojan injection attempt (botnet-cnc.rules)
 * 1:20604 <-> DISABLED <-> BOTNET-CNC Trojan.Win32.Buzus.isqy trojan phishing attempt (botnet-cnc.rules)
 * 1:20606 <-> DISABLED <-> BOTNET-CNC Win32.Domsingx.A contact to C&C server attempt (botnet-cnc.rules)
 * 1:20626 <-> DISABLED <-> BOTNET-CNC Trojan.Win32.Shylock.A contact to C&C server attempt (botnet-cnc.rules)
 * 1:20627 <-> DISABLED <-> BOTNET-CNC Trojan.Win32.Shylock.A C&C server response attempt (botnet-cnc.rules)
 * 1:20630 <-> DISABLED <-> BOTNET-CNC Win32.Winnti.A contact to cnc server attempt (botnet-cnc.rules)
 * 1:20639 <-> DISABLED <-> BOTNET-CNC Malware Trojan.Win32.Higest.N outbound connection attempt (botnet-cnc.rules)
 * 1:20661 <-> DISABLED <-> BOTNET-CNC Simbda variant outbound connection (botnet-cnc.rules)
 * 1:20676 <-> DISABLED <-> BOTNET-CNC Win32.EggDrop.acn connect to cnc-server attempt (botnet-cnc.rules)
 * 1:20677 <-> DISABLED <-> BOTNET-CNC Win32.EggDrop.acn connect to cnc-server attempt (botnet-cnc.rules)
 * 1:20678 <-> DISABLED <-> BOTNET-CNC Trojan-Downloader.Win32.Genome.aior contact to cnc-server attempt (botnet-cnc.rules)
 * 1:20679 <-> DISABLED <-> BOTNET-CNC Win32.Syrutrk connect to cnc-server attempt (botnet-cnc.rules)
 * 1:20681 <-> DISABLED <-> BOTNET-CNC Trojan-Downloader.Win32.Agent.NMS connect to cnc-server attempt (botnet-cnc.rules)
 * 1:20682 <-> DISABLED <-> BOTNET-CNC Trojan-Downloader.Win32.Agent.NMS connect to cnc-server attempt (botnet-cnc.rules)
 * 1:20683 <-> DISABLED <-> BOTNET-CNC Cleanvaccine connect to cnc-server attempt (botnet-cnc.rules)
 * 1:20684 <-> DISABLED <-> BOTNET-CNC Cleanvaccine connect to cnc-server attempt (botnet-cnc.rules)
 * 1:20685 <-> DISABLED <-> BOTNET-CNC Win32.Heloag.A connect to cnc-server attempt (botnet-cnc.rules)
 * 1:20688 <-> DISABLED <-> BOTNET-CNC Trojan-Spy.Win32.Zbot.Jeib connect to cnc-server attempt (botnet-cnc.rules)
 * 1:20689 <-> DISABLED <-> BOTNET-CNC Trojan-Spy.Win32.Zbot.Jeib connect to cnc-server attempt (botnet-cnc.rules)
 * 1:20695 <-> DISABLED <-> BOTNET-CNC Trojan.Win32.Banker.GZW connect to cnc server attempt (botnet-cnc.rules)
 * 1:20696 <-> DISABLED <-> BOTNET-CNC Trojan.Win32.Ransom.CK connect to cnc server attempt (botnet-cnc.rules)
 * 1:20697 <-> DISABLED <-> BOTNET-CNC Trojan.Win32.Ransom.CK connect to cnc server attempt (botnet-cnc.rules)
 * 1:20830 <-> DISABLED <-> BOTNET-CNC Trojan.Win32.Banbra.amdu outbound connection (botnet-cnc.rules)
 * 1:20844 <-> DISABLED <-> BOTNET-CNC Win32.Banker.smxy runtime traffic detected (botnet-cnc.rules)
 * 1:20877 <-> DISABLED <-> BOTNET-CNC RunTime Worm.Win32.Warezov.gs outbound connection (botnet-cnc.rules)
 * 1:20890 <-> DISABLED <-> BOTNET-CNC Win32.VB.adbp runtime traffic detected (botnet-cnc.rules)
 * 1:20891 <-> DISABLED <-> BOTNET-CNC Win32.VB.adbp runtime traffic detected (botnet-cnc.rules)
 * 1:20892 <-> DISABLED <-> BOTNET-CNC Worm.Win32.Skopvel.A runtime traffic detected (botnet-cnc.rules)
 * 1:21003 <-> DISABLED <-> BOTNET-CNC Cute Pack cute-ie.html request (botnet-cnc.rules)
 * 1:21004 <-> DISABLED <-> BOTNET-CNC Cute Pack cute-ie.html landing page (botnet-cnc.rules)
 * 1:21005 <-> DISABLED <-> BOTNET-CNC Yang Pack yg.htm download request (botnet-cnc.rules)
 * 1:21006 <-> DISABLED <-> BOTNET-CNC Yang Pack yg.htm landing page (botnet-cnc.rules)
 * 1:21028 <-> DISABLED <-> BOTNET-CNC Trojan.Usinec connect to server attempt (botnet-cnc.rules)
 * 1:21055 <-> DISABLED <-> BACKDOOR Trojan-Downloader.Win32.Utka.A outbound connection (backdoor.rules)
 * 1:21123 <-> DISABLED <-> BOTNET-CNC Win32.Flymux.A runtime traffic detected (botnet-cnc.rules)
 * 1:21124 <-> DISABLED <-> BOTNET-CNC Win32.Opachki.A runtime traffic detected (botnet-cnc.rules)
 * 1:21125 <-> DISABLED <-> BOTNET-CNC Win32.Alureon.DG runtime traffic detected (botnet-cnc.rules)
 * 1:21126 <-> DISABLED <-> BOTNET-CNC Win32.Koutodoor.C runtime traffic detected (botnet-cnc.rules)
 * 1:21127 <-> DISABLED <-> BOTNET-CNC Win32.Setfic.A runtime traffic detected (botnet-cnc.rules)
 * 1:21128 <-> DISABLED <-> BOTNET-CNC Win.32.Dromedan.A runtime traffic detected (botnet-cnc.rules)
 * 1:21142 <-> DISABLED <-> BOTNET-CNC Win32.Zbot.PKJ runtime traffic detected (botnet-cnc.rules)
 * 1:21143 <-> DISABLED <-> BOTNET-CNC Win32.Zbot.PKJ runtime traffic detected (botnet-cnc.rules)
 * 1:21144 <-> DISABLED <-> BOTNET-CNC Win32.Zbot.PKJ runtime traffic detected (botnet-cnc.rules)
 * 1:21145 <-> DISABLED <-> BOTNET-CNC Win32.Neraweq.A runtime traffic detected (botnet-cnc.rules)
 * 1:21151 <-> DISABLED <-> BOTNET-CNC Win32.Stegae.A runtime traffic detected (botnet-cnc.rules)
 * 1:21179 <-> DISABLED <-> BACKDOOR Win32.Coofus.RFM outbound connection (backdoor.rules)
 * 1:21180 <-> DISABLED <-> BACKDOOR Worm.Win32.Magania.clfv outbound connection (backdoor.rules)
 * 1:21181 <-> DISABLED <-> BACKDOOR Win32.Agent.czgu outbound connection (backdoor.rules)
 * 1:21183 <-> DISABLED <-> BACKDOOR Win32.Agent.alfu outbound connection (backdoor.rules)
 * 1:21185 <-> DISABLED <-> BACKDOOR Worm.Win32.Kufgal.A inbound connection (backdoor.rules)
 * 1:21192 <-> DISABLED <-> BOTNET-CNC Trojan Win32.Syswrt.dvd outbound connection (botnet-cnc.rules)
 * 1:21193 <-> DISABLED <-> BACKDOOR Win32.Dalbot.A outbound connection (backdoor.rules)
 * 1:21195 <-> DISABLED <-> BACKDOOR Win32.Protux.B outbound connection (backdoor.rules)
 * 1:21196 <-> DISABLED <-> BACKDOOR Win32.Caphaw.A outbound connection (backdoor.rules)
 * 1:21197 <-> DISABLED <-> BACKDOOR Win32.Caphaw.A outbound connection (backdoor.rules)
 * 1:21198 <-> DISABLED <-> BACKDOOR Win32.Qinubot.A outbound connection (backdoor.rules)
 * 1:21199 <-> DISABLED <-> BACKDOOR Win32.Qinubot.A outbound connection (backdoor.rules)
 * 1:21200 <-> DISABLED <-> BOTNET-CNC Trojan.Win32.Yakes.cmu outbound connection (botnet-cnc.rules)
 * 1:21201 <-> DISABLED <-> BOTNET-CNC Trojan.Win32.Yakes.cmu outbound connection (botnet-cnc.rules)
 * 1:21202 <-> DISABLED <-> BOTNET-CNC Trojan Win32.Scapzilla.A outbound connection (botnet-cnc.rules)
 * 1:21203 <-> DISABLED <-> BOTNET-CNC Virus Win32.Induc.B outbound connection (botnet-cnc.rules)
 * 1:21204 <-> DISABLED <-> BOTNET-CNC Virus Win32.Induc.B outbound connection (botnet-cnc.rules)
 * 1:21205 <-> DISABLED <-> BOTNET-CNC Virus Win32.Induc.B outbound connection (botnet-cnc.rules)
 * 1:21207 <-> DISABLED <-> BACKDOOR Win32.Dekara.A outbound connection (backdoor.rules)
 * 1:21209 <-> DISABLED <-> BOTNET-CNC Trojan.Win32.Enviserv.A outbound connection (botnet-cnc.rules)
 * 1:21210 <-> DISABLED <-> BOTNET-CNC Trojan.Win32.Rallovs.A outbound connection (botnet-cnc.rules)
 * 1:21211 <-> DISABLED <-> BOTNET-CNC Trojan.Win32.Banker.slrj outbound connection (botnet-cnc.rules)
 * 1:21213 <-> DISABLED <-> BOTNET-CNC Worm.Win32.Cridex.B outbound connection (botnet-cnc.rules)
 * 1:21215 <-> DISABLED <-> BOTNET-CNC Trojan Win32.Banker.Am outbound connection (botnet-cnc.rules)
 * 1:21216 <-> DISABLED <-> BOTNET-CNC Trojan Win32.Banker.Am outbound connection (botnet-cnc.rules)
 * 1:21217 <-> DISABLED <-> BOTNET-CNC Trojan Win32.Banker.Am outbound connection (botnet-cnc.rules)
 * 1:21218 <-> DISABLED <-> BOTNET-CNC Trojan Win32.Sodager.C outbound connection (botnet-cnc.rules)
 * 1:21226 <-> DISABLED <-> BOTNET-CNC Win32.Louisdreyfu.A outbound connection (botnet-cnc.rules)
 * 1:21230 <-> DISABLED <-> BOTNET-CNC Trojan.Win32.Betad.A outbound connection (botnet-cnc.rules)
 * 1:21231 <-> DISABLED <-> BOTNET-CNC Win32.Bedobot.B outbound connection (botnet-cnc.rules)
 * 1:21251 <-> DISABLED <-> BACKDOOR Trojan.Win32.Sirefef.P runtime detection (backdoor.rules)
 * 1:21252 <-> DISABLED <-> BACKDOOR Trojan.Win32.Sirefef.P runtime detection (backdoor.rules)
 * 1:21273 <-> DISABLED <-> BOTNET-CNC Tusha.cv runtime traffic detected (botnet-cnc.rules)
 * 1:21274 <-> DISABLED <-> BOTNET-CNC Tusha.cv runtime traffic detected (botnet-cnc.rules)
 * 1:21275 <-> DISABLED <-> BACKDOOR Hupigon.hddn runtime traffic detected (backdoor.rules)
 * 1:21276 <-> DISABLED <-> BACKDOOR Hupigon.hddn install time traffic detected (backdoor.rules)
 * 1:21279 <-> DISABLED <-> BACKDOOR Win.32.Kbot.s runtime traffic detected (backdoor.rules)
 * 1:21368 <-> DISABLED <-> BOTNET-CNC Win32.Wallop.de runtime traffic detected (botnet-cnc.rules)
 * 1:21369 <-> DISABLED <-> BOTNET-CNC Win32.Wallop.de runtime traffic detected (botnet-cnc.rules)
 * 1:21376 <-> DISABLED <-> BOTNET-CNC Trojan Microjoin activity (botnet-cnc.rules)
 * 1:21379 <-> DISABLED <-> BOTNET-CNC Win32.Genome.Amqj runtime traffic detected (botnet-cnc.rules)
 * 1:21381 <-> DISABLED <-> BOTNET-CNC Win32.Dialer.ngb runtime traffic detected (botnet-cnc.rules)
 * 1:21382 <-> DISABLED <-> BOTNET-CNC Win32.Nuqel.Q host setting3.yeahost.com runtime traffic detected (botnet-cnc.rules)
 * 1:21383 <-> DISABLED <-> BOTNET-CNC Win32.Nuqel.Q host 9999mb.com runtime traffic detected (botnet-cnc.rules)
 * 1:21384 <-> DISABLED <-> BOTNET-CNC Win32.Nuqel.Q host freewebs.com runtime traffic detected (botnet-cnc.rules)
 * 1:21386 <-> DISABLED <-> BOTNET-CNC Win32.Wadolin.A runtime traffic detected (botnet-cnc.rules)
 * 1:21391 <-> DISABLED <-> BOTNET-CNC Win32.Agent.dcac runtime traffic detected (botnet-cnc.rules)
 * 1:21400 <-> DISABLED <-> BOTNET-CNC Trojan.Win32.Kenzor.B outbound connection (botnet-cnc.rules)
 * 1:21401 <-> DISABLED <-> BOTNET-CNC Trojan.Win32.Kenzor.B outbound connection (botnet-cnc.rules)
 * 1:21402 <-> DISABLED <-> BACKDOOR Trojan-Downloader.Win32.Ponfoy.A runtime detection (backdoor.rules)
 * 1:21403 <-> DISABLED <-> BACKDOOR Worm.Win32.Vobfus.DL runtime detection (backdoor.rules)
 * 1:21404 <-> DISABLED <-> BACKDOOR Worm.Win32.Vobfus.DL runtime detection cont (backdoor.rules)
 * 1:21448 <-> DISABLED <-> BOTNET-CNC Trojan.Win32.Webmoner.zu connect to server attempt (botnet-cnc.rules)
 * 1:21449 <-> DISABLED <-> BOTNET-CNC Trojan-Downloader.Win32.Obitel install attempt (botnet-cnc.rules)
 * 1:21450 <-> DISABLED <-> BOTNET-CNC Trojan-Downloader.Win32.Obitel connect to cnc server attempt (botnet-cnc.rules)
 * 1:21451 <-> DISABLED <-> BOTNET-CNC Trojan.Win32.Agent.djvk malicious hosts file download attempt (botnet-cnc.rules)
 * 1:21452 <-> DISABLED <-> BOTNET-CNC Trojan.Win32.Agent.djvk connect to server attempt (botnet-cnc.rules)
 * 1:21454 <-> DISABLED <-> BOTNET-CNC Trojan.Win32.Banbra.vec runtime detection (botnet-cnc.rules)
 * 1:21456 <-> DISABLED <-> BOTNET-CNC W32.DarkComet variant outbound connection (botnet-cnc.rules)
 * 1:21463 <-> DISABLED <-> BOTNET-CNC Win32.Bibei variant outbound connection (botnet-cnc.rules)
 * 1:21464 <-> DISABLED <-> BOTNET-CNC Downloader-CEW.b runtime traffic detected (botnet-cnc.rules)
 * 1:21470 <-> DISABLED <-> BOTNET-CNC Trojan.Krap.Gy connect to server attempt (botnet-cnc.rules)
 * 1:21471 <-> DISABLED <-> BOTNET-CNC Win32.Bancos variant outbound connection (botnet-cnc.rules)
 * 1:21472 <-> DISABLED <-> BOTNET-CNC Trojan.Delf.tzp download attempt (botnet-cnc.rules)
 * 1:21474 <-> DISABLED <-> BACKDOOR Win32.Lancafdo.A runtime detection (backdoor.rules)
 * 1:21477 <-> DISABLED <-> BOTNET-CNC Trojan.Noobot outbound connection (botnet-cnc.rules)
 * 1:21502 <-> DISABLED <-> BOTNET-CNC Trojan.Win32.VBbot.V connect to server attempt (botnet-cnc.rules)
 * 1:21511 <-> DISABLED <-> BOTNET-CNC Trojan.Vaxpy runtime detection (botnet-cnc.rules)
 * 1:21514 <-> DISABLED <-> BOTNET-CNC Trojan.Banbra connect to server attempt (botnet-cnc.rules)
 * 1:21518 <-> DISABLED <-> BOTNET-CNC Trojan.Agent-59544 connect to server attempt (botnet-cnc.rules)
 * 1:21520 <-> DISABLED <-> BOTNET-CNC Trojan.Bayrob initial connection attempt (botnet-cnc.rules)
 * 1:21521 <-> DISABLED <-> BOTNET-CNC Trojan.Bayrob update connection attempt (botnet-cnc.rules)
 * 1:21635 <-> DISABLED <-> BACKDOOR Win32.Phdet.gen.A runtime detection (backdoor.rules)
 * 1:21643 <-> DISABLED <-> BOTNET-CNC Trojan.Bredolab variant outbound connection (botnet-cnc.rules)
 * 1:21945 <-> DISABLED <-> BACKDOOR Win32.Litmpuca.A Runtime Detection (backdoor.rules)
 * 1:21946 <-> DISABLED <-> BACKDOOR Win32.Litmpuca.A Runtime Detection (backdoor.rules)
 * 1:22087 <-> ENABLED <-> FILE-OTHER Microsoft Windows True Type Font maxComponentPoints overflow attempt (file-other.rules)
 * 1:6492 <-> DISABLED <-> BACKDOOR Trickler Backdoor-BAC.gen.e runtime detection - notification (backdoor.rules)
 * 1:6493 <-> DISABLED <-> BACKDOOR Trickler Backdoor-BAC.gen.e runtime detection - post data (backdoor.rules)
 * 1:7118 <-> DISABLED <-> BACKDOOR y3k 1.2 runtime detection - user-agent string detected (backdoor.rules)
 * 1:7147 <-> DISABLED <-> BOTNET-CNC Hacker-Tool sars notifier runtime detection - icq notification (botnet-cnc.rules)
 * 1:7149 <-> DISABLED <-> BOTNET-CNC Hacker-Tool sars notifier runtime detection - php notification (botnet-cnc.rules)
 * 1:7742 <-> DISABLED <-> BACKDOOR nova 1.0 runtime detection - cgi notification client-to-server (backdoor.rules)
 * 1:9418 <-> ENABLED <-> BOTNET-CNC bagle.a http notification detection (botnet-cnc.rules)
 * 1:989 <-> DISABLED <-> BACKDOOR sensepost.exe command shell attempt (backdoor.rules)