Sourcefire VRT Rules Update

Date: 2012-06-05

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2.9.2.1.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:23077 <-> DISABLED <-> BLACKLIST DNS request for known malware domain serveflash.info - Flame (blacklist.rules)
 * 1:23080 <-> DISABLED <-> BLACKLIST DNS request for known malware domain synclock.info - Flame (blacklist.rules)
 * 1:23063 <-> DISABLED <-> BLACKLIST DNS request for known malware domain chchengine.com - Flame (blacklist.rules)
 * 1:23065 <-> DISABLED <-> BLACKLIST DNS request for known malware domain dailynewsupdater.com - Flame (blacklist.rules)
 * 1:23069 <-> DISABLED <-> BLACKLIST DNS request for known malware domain isyncautomation.in - Flame (blacklist.rules)
 * 1:23059 <-> DISABLED <-> FILE-OFFICE Microsoft Office Visio TAG_xxxSect code execution attempt (file-office.rules)
 * 1:23066 <-> DISABLED <-> BLACKLIST DNS request for known malware domain diznet.biz - Flame (blacklist.rules)
 * 1:23085 <-> ENABLED <-> INDICATOR-OBFUSCATION Obfuscated javascript string - join (indicator-obfuscation.rules)
 * 1:23068 <-> DISABLED <-> BLACKLIST DNS request for known malware domain flushdns.info - Flame (blacklist.rules)
 * 1:23072 <-> DISABLED <-> BLACKLIST DNS request for known malware domain mysync.info - Flame (blacklist.rules)
 * 1:23081 <-> DISABLED <-> BLACKLIST DNS request for known malware domain syncprovider.info - Flame (blacklist.rules)
 * 1:23089 <-> ENABLED <-> INDICATOR-OBFUSCATION Obfuscated javascript strings - obfuscation pattern (indicator-obfuscation.rules)
 * 1:23090 <-> DISABLED <-> WEB-CLIENT known malicious SSL certificate derived from Microsoft CA detected (web-client.rules)
 * 1:23094 <-> DISABLED <-> FILE-OFFICE EMF corruption attempt (file-office.rules)
 * 1:23064 <-> DISABLED <-> BLACKLIST DNS request for known malware domain chchengine.net - Flame (blacklist.rules)
 * 1:23070 <-> DISABLED <-> BLACKLIST DNS request for known malware domain isyncautoupdater.in - Flame (blacklist.rules)
 * 1:23062 <-> DISABLED <-> BLACKLIST DNS request for known malware domain bannerzone.in - Flame (blacklist.rules)
 * 1:23060 <-> DISABLED <-> WEB-CLIENT Microsoft Internet Explorer style.position use-after-free memory corruption attempt (web-client.rules)
 * 1:23061 <-> DISABLED <-> BLACKLIST DNS request for known malware domain bannerspot.in - Flame (blacklist.rules)
 * 1:23074 <-> DISABLED <-> BLACKLIST DNS request for known malware domain newstatisticfeeder.com - Flame (blacklist.rules)
 * 1:23075 <-> DISABLED <-> BLACKLIST DNS request for known malware domain newsync.info - Flame (blacklist.rules)
 * 1:23058 <-> ENABLED <-> SPECIFIC-THREATS NeoSploit Malvertising - URI Requested (specific-threats.rules)
 * 1:23078 <-> DISABLED <-> BLACKLIST DNS request for known malware domain serverss.info - Flame (blacklist.rules)
 * 1:23087 <-> ENABLED <-> INDICATOR-OBFUSCATION Obfuscated javascript string - xval (indicator-obfuscation.rules)
 * 1:23083 <-> DISABLED <-> BLACKLIST DNS request for known malware domain syncupdate.info - Flame (blacklist.rules)
 * 1:23057 <-> ENABLED <-> BOTNET-CNC Flame malware connection - /view.php (botnet-cnc.rules)
 * 1:23093 <-> DISABLED <-> FILE-OFFICE EMF corruption attempt (file-office.rules)
 * 1:23086 <-> ENABLED <-> INDICATOR-OBFUSCATION Obfuscated javascript string - push (indicator-obfuscation.rules)
 * 1:23079 <-> DISABLED <-> BLACKLIST DNS request for known malware domain smartservicesite.info - Flame (blacklist.rules)
 * 1:23067 <-> DISABLED <-> BLACKLIST DNS request for known malware domain flashp.webhop.net - Flame (blacklist.rules)
 * 1:23096 <-> ENABLED <-> SPECIFIC-THREATS VERITAS NetBackup java authentication service format string exploit attempt (specific-threats.rules)
 * 1:23091 <-> DISABLED <-> FILE-OFFICE EMF corruption attempt (file-office.rules)
 * 1:23092 <-> DISABLED <-> FILE-OFFICE EMF corruption attempt (file-office.rules)
 * 1:23076 <-> DISABLED <-> BLACKLIST DNS request for known malware domain rsscenter.webhop.info - Flame (blacklist.rules)
 * 1:23071 <-> DISABLED <-> BLACKLIST DNS request for known malware domain micromedia.in - Flame (blacklist.rules)
 * 1:23088 <-> ENABLED <-> INDICATOR-OBFUSCATION Obfuscated javascript string - qweqwe (indicator-obfuscation.rules)
 * 1:23082 <-> DISABLED <-> BLACKLIST DNS request for known malware domain syncsource.info - Flame (blacklist.rules)
 * 1:23095 <-> DISABLED <-> FILE-OFFICE EMF corruption attempt (file-office.rules)
 * 1:23084 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ultrasoft.in - Flame (blacklist.rules)
 * 1:23073 <-> DISABLED <-> BLACKLIST DNS request for known malware domain netsharepoint.info - Flame (blacklist.rules)

Modified Rules:


 * 1:9631 <-> DISABLED <-> WEB-ACTIVEX Citrix.ICAClient ActiveX function call access (web-activex.rules)
 * 1:9415 <-> ENABLED <-> SPECIFIC-THREATS plexus.a smtp propagation detection (specific-threats.rules)
 * 1:6696 <-> DISABLED <-> WEB-CLIENT Microsoft Windows Media Player Malformed PNG detected pHYs overflow attempt (web-client.rules)
 * 1:7539 <-> DISABLED <-> SPYWARE-PUT Keylogger eye spy pro 1.0 runtime detection (spyware-put.rules)
 * 1:9327 <-> ENABLED <-> SPECIFIC-THREATS netsky.af smtp propagation detection (specific-threats.rules)
 * 1:9332 <-> ENABLED <-> SPECIFIC-THREATS mimail.a smtp propagation detection (specific-threats.rules)
 * 1:7880 <-> DISABLED <-> WEB-ACTIVEX AxMetaStream.MetaStreamCtlSecondary ActiveX clsid access (web-activex.rules)
 * 1:4908 <-> DISABLED <-> WEB-ACTIVEX Microsoft Repository Method Definition ActiveX object access (web-activex.rules)
 * 1:8381 <-> DISABLED <-> WEB-ACTIVEX RealNetworks RealPlayer SMIL Download Handler ActiveX clsid access (web-activex.rules)
 * 1:6684 <-> DISABLED <-> WEB-ACTIVEX DXImageTransform.Microsoft.MMSpecialEffect1Input ActiveX clsid access (web-activex.rules)
 * 1:9426 <-> ENABLED <-> SPECIFIC-THREATS mydoom.ap attachment (specific-threats.rules)
 * 1:9425 <-> ENABLED <-> SPECIFIC-THREATS netsky attachment (specific-threats.rules)
 * 1:7492 <-> DISABLED <-> WEB-ACTIVEX WMT Virtual Renderer ActiveX clsid access (web-activex.rules)
 * 1:8792 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DAPoint2.1 ActiveX clsid access (web-activex.rules)
 * 1:6007 <-> DISABLED <-> WEB-ACTIVEX Microsoft DT DDS OrgChart GDD Layout ActiveX object access (web-activex.rules)
 * 1:6207 <-> DISABLED <-> SPYWARE-PUT Keylogger winsession runtime detection - smtp (spyware-put.rules)
 * 1:8779 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DATransform3.1 ActiveX function call access (web-activex.rules)
 * 1:7900 <-> DISABLED <-> WEB-ACTIVEX AOL.UPFCtrl ActiveX clsid access (web-activex.rules)
 * 1:6700 <-> DISABLED <-> WEB-CLIENT Microsoft Multiple Products malformed PNG detected tEXt overflow attempt (web-client.rules)
 * 1:7494 <-> DISABLED <-> WEB-ACTIVEX WMT Virtual Source ActiveX clsid access (web-activex.rules)
 * 1:9384 <-> ENABLED <-> SPECIFIC-THREATS beglur.a smtp propagation detection (specific-threats.rules)
 * 1:8818 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DAJoinStyle.1 ActiveX function call access (web-activex.rules)
 * 1:8839 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DABbox3.1 ActiveX function call access (web-activex.rules)
 * 1:5812 <-> DISABLED <-> SPYWARE-PUT Hacker-Tool stealthredirector runtime detection - email notification (spyware-put.rules)
 * 1:7005 <-> DISABLED <-> WEB-ACTIVEX OutlookExpress.AddressBook ActiveX function call access (web-activex.rules)
 * 1:7948 <-> DISABLED <-> WEB-ACTIVEX Microsoft Common Browser Architecture ActiveX clsid access (web-activex.rules)
 * 1:7866 <-> DISABLED <-> WEB-ACTIVEX ADODB.Connection ActiveX clsid access (web-activex.rules)
 * 1:8037 <-> DISABLED <-> WEB-ACTIVEX Swedish_Default Stemmer ActiveX clsid access (web-activex.rules)
 * 1:581 <-> DISABLED <-> RPC portmap pcnfsd request UDP (rpc.rules)
 * 1:7845 <-> DISABLED <-> SPYWARE-PUT Keylogger clogger 1.0 runtime detection (spyware-put.rules)
 * 1:7954 <-> DISABLED <-> WEB-ACTIVEX Microsoft Forms 2.0 ComboBox ActiveX clsid access (web-activex.rules)
 * 1:7154 <-> DISABLED <-> SPYWARE-PUT Keylogger active keylogger home runtime detection (spyware-put.rules)
 * 1:7006 <-> DISABLED <-> WEB-ACTIVEX ASControls.InstallEngineCtl ActiveX function call access (web-activex.rules)
 * 1:9349 <-> ENABLED <-> SPECIFIC-THREATS plemood smtp propagation detection (specific-threats.rules)
 * 1:9388 <-> ENABLED <-> SPECIFIC-THREATS mimail.g smtp propagation detection (specific-threats.rules)
 * 1:8785 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DAString.1 ActiveX function call access (web-activex.rules)
 * 1:9389 <-> ENABLED <-> SPECIFIC-THREATS bagle.i smtp propagation detection (specific-threats.rules)
 * 1:8377 <-> DISABLED <-> WEB-ACTIVEX RealNetworks RealPlayer Download Handler ActiveX clsid access (web-activex.rules)
 * 1:8782 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DATransform2.1 ActiveX function call access (web-activex.rules)
 * 1:6517 <-> DISABLED <-> WEB-ACTIVEX DXImageTransform.Microsoft.Light ActiveX clsid access (web-activex.rules)
 * 1:6288 <-> DISABLED <-> BACKDOOR fictional daemon 4.4 runtime detection - ftp (backdoor.rules)
 * 1:8789 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DAPoint3.1 ActiveX clsid access (web-activex.rules)
 * 1:7474 <-> DISABLED <-> WEB-ACTIVEX WMT FormatConversion ActiveX clsid access (web-activex.rules)
 * 1:8041 <-> DISABLED <-> WEB-ACTIVEX VFW Capture Class Manager ActiveX clsid access (web-activex.rules)
 * 1:8707 <-> DISABLED <-> FTP WZD-FTPD SITE arbitrary command execution attempt (ftp.rules)
 * 1:544 <-> DISABLED <-> INDICATOR-COMPROMISE FTP 'RETR 1MB' possible warez site (indicator-compromise.rules)
 * 1:9399 <-> ENABLED <-> SPECIFIC-THREATS hanged smtp propagation detection (specific-threats.rules)
 * 1:6002 <-> DISABLED <-> WEB-ACTIVEX Microsoft DT DDS Rectilinear GDD Layout ActiveX object access (web-activex.rules)
 * 1:7926 <-> DISABLED <-> WEB-ACTIVEX DXTFilter ActiveX clsid access (web-activex.rules)
 * 1:8756 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.SpriteControl ActiveX clsid access (web-activex.rules)
 * 1:7914 <-> DISABLED <-> WEB-ACTIVEX DXImageTransform.Microsoft.NDFXArtEffects ActiveX clsid access (web-activex.rules)
 * 1:9359 <-> ENABLED <-> SPECIFIC-THREATS zafi.b smtp propagation detection (specific-threats.rules)
 * 1:8367 <-> DISABLED <-> WEB-ACTIVEX Microsoft.DbgClr.DTE.8.0 ActiveX clsid access (web-activex.rules)
 * 1:7936 <-> DISABLED <-> WEB-ACTIVEX DXImageTransform.Microsoft.Glow ActiveX clsid access (web-activex.rules)
 * 1:7466 <-> DISABLED <-> WEB-ACTIVEX WMT DeInterlace Prop Page ActiveX clsid access (web-activex.rules)
 * 1:9360 <-> ENABLED <-> SPECIFIC-THREATS cult.b smtp propagation detection (specific-threats.rules)
 * 1:4905 <-> DISABLED <-> WEB-ACTIVEX Microsoft Repository Object ActiveX object access (web-activex.rules)
 * 1:7863 <-> DISABLED <-> WEB-ACTIVEX McSubMgr.IsOldAppInstalled ActiveX function call access (web-activex.rules)
 * 1:9368 <-> ENABLED <-> SPECIFIC-THREATS agist.a smtp propagation detection (specific-threats.rules)
 * 1:6690 <-> DISABLED <-> WEB-CLIENT Microsoft Windows Media Player Malformed PNG detected iCCP overflow attempt (web-client.rules)
 * 1:7433 <-> DISABLED <-> WEB-ACTIVEX DirectX Transform Wrapper Property Page ActiveX clsid access (web-activex.rules)
 * 1:7980 <-> DISABLED <-> WEB-ACTIVEX ShockwaveFlash.ShockwaveFlash.9 ActiveX function call access (web-activex.rules)
 * 1:8387 <-> DISABLED <-> WEB-ACTIVEX RealNetworks RealPlayer RNX Download Handler ActiveX clsid access (web-activex.rules)
 * 1:9376 <-> ENABLED <-> SPECIFIC-THREATS fishlet.a smtp propagation detection (specific-threats.rules)
 * 1:8761 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.SequencerControl ActiveX function call access (web-activex.rules)
 * 1:7892 <-> DISABLED <-> WEB-ACTIVEX AOL Phobos Class ActiveX clsid access (web-activex.rules)
 * 1:577 <-> DISABLED <-> RPC portmap bootparam request UDP (rpc.rules)
 * 1:579 <-> DISABLED <-> RPC portmap mountd request UDP (rpc.rules)
 * 1:9408 <-> ENABLED <-> SPECIFIC-THREATS lacrow smtp propagation detection (specific-threats.rules)
 * 1:8063 <-> DISABLED <-> WEB-ACTIVEX ADODB.Stream ActiveX function call access (web-activex.rules)
 * 1:6221 <-> DISABLED <-> SPYWARE-PUT Keylogger computerspy runtime detection (spyware-put.rules)
 * 1:7184 <-> DISABLED <-> SPYWARE-PUT Keylogger 007 spy software runtime detection - smtp (spyware-put.rules)
 * 1:4914 <-> DISABLED <-> WEB-ACTIVEX Microsoft Repository Script Definition ActiveX object access (web-activex.rules)
 * 1:4907 <-> DISABLED <-> WEB-ACTIVEX Microsoft Repository Collection Definition ActiveX object access (web-activex.rules)
 * 1:8816 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DAJoinStyle.1 ActiveX clsid access (web-activex.rules)
 * 1:7439 <-> DISABLED <-> WEB-ACTIVEX HTML Help ActiveX clsid access (web-activex.rules)
 * 1:8797 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DAPath2.1 ActiveX function call access (web-activex.rules)
 * 1:8395 <-> DISABLED <-> WEB-ACTIVEX DX3DTransform.Microsoft.CrShatter ActiveX clsid access (web-activex.rules)
 * 1:9336 <-> ENABLED <-> SPECIFIC-THREATS netsky.t smtp propagation detection (specific-threats.rules)
 * 1:7472 <-> DISABLED <-> WEB-ACTIVEX WMT FormatConversion Prop Page ActiveX clsid access (web-activex.rules)
 * 1:7944 <-> DISABLED <-> WEB-ACTIVEX https Asychronous Pluggable Protocol Handler ActiveX clsid access (web-activex.rules)
 * 1:8066 <-> DISABLED <-> WEB-ACTIVEX Microsoft Windows Scripting Host Shell ActiveX clsid access (web-activex.rules)
 * 1:6142 <-> DISABLED <-> BACKDOOR hellzaddiction v1.0e runtime detection - ftp open (backdoor.rules)
 * 1:9362 <-> ENABLED <-> SPECIFIC-THREATS mimail.m smtp propagation detection (specific-threats.rules)
 * 1:586 <-> DISABLED <-> RPC portmap selection_svc request UDP (rpc.rules)
 * 1:7011 <-> DISABLED <-> WEB-ACTIVEX HtmlDlgSafeHelper.HtmlDlgSafeHelper ActiveX function call access (web-activex.rules)
 * 1:8803 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DANumber.1 ActiveX function call access (web-activex.rules)
 * 1:5742 <-> DISABLED <-> SPYWARE-PUT Keylogger activitylogger runtime detection (spyware-put.rules)
 * 1:9403 <-> ENABLED <-> SPECIFIC-THREATS netsky.aa smtp propagation detection (specific-threats.rules)
 * 1:9400 <-> ENABLED <-> SPECIFIC-THREATS abotus smtp propagation detection (specific-threats.rules)
 * 1:7484 <-> DISABLED <-> WEB-ACTIVEX WMT Sample Info Filter ActiveX clsid access (web-activex.rules)
 * 1:7456 <-> DISABLED <-> WEB-ACTIVEX Wmm2fxa.dll ActiveX clsid access (web-activex.rules)
 * 1:8047 <-> DISABLED <-> WEB-ACTIVEX WaveIn Class Manager ActiveX clsid access (web-activex.rules)
 * 1:588 <-> DISABLED <-> RPC portmap ttdbserv request UDP (rpc.rules)
 * 1:8767 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DAView.1 ActiveX function call access (web-activex.rules)
 * 1:7488 <-> DISABLED <-> WEB-ACTIVEX WMT Screen capture Filter ActiveX clsid access (web-activex.rules)
 * 1:593 <-> DISABLED <-> RPC portmap snmpXdmi request TCP (rpc.rules)
 * 1:7952 <-> DISABLED <-> WEB-ACTIVEX Microsoft DirectAnimation Windowed Control ActiveX clsid access (web-activex.rules)
 * 1:585 <-> DISABLED <-> RPC portmap sadmind request UDP (rpc.rules)
 * 1:8741 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DAFontStyle.1 ActiveX clsid access (web-activex.rules)
 * 1:7922 <-> DISABLED <-> WEB-ACTIVEX DXImageTransform.Microsoft.RevealTrans ActiveX clsid access (web-activex.rules)
 * 1:9379 <-> ENABLED <-> SPECIFIC-THREATS netsky.s smtp propagation detection (specific-threats.rules)
 * 1:7177 <-> DISABLED <-> SPYWARE-PUT Keylogger ab system spy runtime detection - info send through email (spyware-put.rules)
 * 1:8798 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DAPair.1 ActiveX clsid access (web-activex.rules)
 * 1:6005 <-> DISABLED <-> WEB-ACTIVEX Microsoft DT DDS Straight Line Routing Logic 2 ActiveX object access (web-activex.rules)
 * 1:9342 <-> ENABLED <-> SPECIFIC-THREATS paroc.a smtp propagation detection (specific-threats.rules)
 * 1:9343 <-> ENABLED <-> SPECIFIC-THREATS kadra smtp propagation detection (specific-threats.rules)
 * 1:5784 <-> DISABLED <-> SPYWARE-PUT Keylogger runtime detection - hwae urls browsed log (spyware-put.rules)
 * 1:6477 <-> DISABLED <-> SPYWARE-PUT Hacker-Tool beee runtime detection - smtp (spyware-put.rules)
 * 1:8385 <-> DISABLED <-> WEB-ACTIVEX RealNetworks RealPlayer Playback Handler ActiveX clsid access (web-activex.rules)
 * 1:7940 <-> DISABLED <-> WEB-ACTIVEX DXImageTransform.Microsoft.Gradient ActiveX clsid access (web-activex.rules)
 * 1:591 <-> DISABLED <-> RPC portmap ypupdated request TCP (rpc.rules)
 * 1:7531 <-> DISABLED <-> SPYWARE-PUT Trickler mediaseek.pl client runtime detection - login (spyware-put.rules)
 * 1:7836 <-> DISABLED <-> SPYWARE-PUT Hacker-Tool nettracker runtime detection - report send through email (spyware-put.rules)
 * 1:8749 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DAEndStyle.1 ActiveX function call access (web-activex.rules)
 * 1:7462 <-> DISABLED <-> WEB-ACTIVEX WMT Black Frame Generator ActiveX clsid access (web-activex.rules)
 * 1:8043 <-> DISABLED <-> WEB-ACTIVEX Video Effect Class Manager 1 Input ActiveX clsid access (web-activex.rules)
 * 1:4906 <-> DISABLED <-> WEB-ACTIVEX Microsoft Repository Interface Definition ActiveX object access (web-activex.rules)
 * 1:9326 <-> ENABLED <-> SPECIFIC-THREATS netsky.p smtp propagation detection (specific-threats.rules)
 * 1:9404 <-> ENABLED <-> SPECIFIC-THREATS netsky.ac smtp propagation detection (specific-threats.rules)
 * 1:7016 <-> DISABLED <-> WEB-ACTIVEX Object.Microsoft.DXTFilter ActiveX function call access (web-activex.rules)
 * 1:8389 <-> DISABLED <-> WEB-ACTIVEX RealNetworks RealPlayer RMP Download Handler ActiveX clsid access (web-activex.rules)
 * 1:7974 <-> DISABLED <-> WEB-ACTIVEX Rendezvous Class ActiveX clsid access (web-activex.rules)
 * 1:5783 <-> DISABLED <-> SPYWARE-PUT Keylogger runtime detection - hwae keystrokes log (spyware-put.rules)
 * 1:8801 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DANumber.1 ActiveX clsid access (web-activex.rules)
 * 1:6682 <-> DISABLED <-> WEB-ACTIVEX DXImageTransform.Microsoft.MMSpecialEffect2Inputs ActiveX function call access (web-activex.rules)
 * 1:8783 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DAString.1 ActiveX clsid access (web-activex.rules)
 * 1:575 <-> DISABLED <-> RPC portmap admind request UDP (rpc.rules)
 * 1:9367 <-> ENABLED <-> SPECIFIC-THREATS anset.b smtp propagation detection (specific-threats.rules)
 * 1:8780 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DATransform2.1 ActiveX clsid access (web-activex.rules)
 * 1:7928 <-> DISABLED <-> WEB-ACTIVEX file or local Asychronous Pluggable Protocol Handler ActiveX clsid access (web-activex.rules)
 * 1:5874 <-> DISABLED <-> SPYWARE-PUT Snoopware pc acme pro runtime detection (spyware-put.rules)
 * 1:7997 <-> DISABLED <-> WEB-ACTIVEX CLSID_ApprenticeICW ActiveX clsid access (web-activex.rules)
 * 1:9411 <-> ENABLED <-> SPECIFIC-THREATS mimail.f smtp propagation detection (specific-threats.rules)
 * 1:6208 <-> DISABLED <-> SPYWARE-PUT Keylogger winsession runtime detection - ftp (spyware-put.rules)
 * 1:8727 <-> DISABLED <-> WEB-ACTIVEX XMLHTTP 4.0 ActiveX clsid access (web-activex.rules)
 * 1:7009 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.StructuredGraphicsControl ActiveX function call access (web-activex.rules)
 * 1:8721 <-> DISABLED <-> WEB-ACTIVEX Outlook Data Object ActiveX clsid access (web-activex.rules)
 * 1:8051 <-> DISABLED <-> WEB-ACTIVEX WDM Instance Provider ActiveX clsid access (web-activex.rules)
 * 1:6689 <-> DISABLED <-> WEB-CLIENT Microsoft Windows Media Player Malformed PNG detected cHRM overflow attempt (web-client.rules)
 * 1:7437 <-> DISABLED <-> WEB-ACTIVEX Frame Eater ActiveX clsid access (web-activex.rules)
 * 1:590 <-> DISABLED <-> RPC portmap ypserv request UDP (rpc.rules)
 * 1:7008 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DAUserData ActiveX function call access (web-activex.rules)
 * 1:7886 <-> DISABLED <-> WEB-ACTIVEX AolCalSvr.ACDictionary ActiveX clsid access (web-activex.rules)
 * 1:7862 <-> DISABLED <-> WEB-ACTIVEX McSubMgr.IsAppExpired ActiveX function call access (web-activex.rules)
 * 1:8759 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.SequencerControl ActiveX clsid access (web-activex.rules)
 * 1:6694 <-> DISABLED <-> WEB-CLIENT Microsoft Windows Media Player Malformed PNG detected hIST overflow attempt (web-client.rules)
 * 1:9333 <-> ENABLED <-> SPECIFIC-THREATS mimail.e smtp propagation detection (specific-threats.rules)
 * 1:7882 <-> DISABLED <-> WEB-ACTIVEX AccSync.AccSubNotHandler ActiveX clsid access (web-activex.rules)
 * 1:8035 <-> DISABLED <-> WEB-ACTIVEX Spanish_Modern Stemmer ActiveX clsid access (web-activex.rules)
 * 1:7597 <-> DISABLED <-> SPYWARE-PUT Keylogger spy lantern keylogger runtime detection (spyware-put.rules)
 * 1:6698 <-> DISABLED <-> WEB-CLIENT Microsoft Windows Media Player Malformed PNG detected tIME overflow attempt (web-client.rules)
 * 1:7026 <-> DISABLED <-> WEB-ACTIVEX RDS.Dataspace ActiveX function call access (web-activex.rules)
 * 1:8420 <-> DISABLED <-> WEB-ACTIVEX DXImageTransform.Microsoft.Gradient ActiveX function call access (web-activex.rules)
 * 1:8719 <-> DISABLED <-> WEB-ACTIVEX VisualStudio.DTE.8.0 ActiveX clsid access (web-activex.rules)
 * 1:7452 <-> DISABLED <-> WEB-ACTIVEX WM Color Converter Filter ActiveX clsid access (web-activex.rules)
 * 1:7898 <-> DISABLED <-> WEB-ACTIVEX AOL.PicSsvrCtrl ActiveX clsid access (web-activex.rules)
 * 1:9397 <-> ENABLED <-> SPECIFIC-THREATS neysid smtp propagation detection (specific-threats.rules)
 * 1:543 <-> DISABLED <-> INDICATOR-COMPROMISE FTP 'STOR 1MB' possible warez site (indicator-compromise.rules)
 * 1:5873 <-> DISABLED <-> SPYWARE-PUT Snoopware pc acme pro runtime detection (spyware-put.rules)
 * 1:7918 <-> DISABLED <-> WEB-ACTIVEX CoAxTrackVideo Class ActiveX clsid access (web-activex.rules)
 * 1:580 <-> DISABLED <-> RPC portmap nisd request UDP (rpc.rules)
 * 1:587 <-> DISABLED <-> RPC portmap status request UDP (rpc.rules)
 * 1:8806 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DAMontage.1 ActiveX function call access (web-activex.rules)
 * 1:8737 <-> DISABLED <-> WEB-ACTIVEX BOWebAgent.Webagent.1 ActiveX function call access (web-activex.rules)
 * 1:8735 <-> DISABLED <-> WEB-ACTIVEX BOWebAgent.Webagent.1 ActiveX clsid access (web-activex.rules)
 * 1:8064 <-> DISABLED <-> WEB-ACTIVEX Scriptlet.Typelib ActiveX clsid access (web-activex.rules)
 * 1:9334 <-> ENABLED <-> SPECIFIC-THREATS lovgate.c smtp propagation detection (specific-threats.rules)
 * 1:6681 <-> DISABLED <-> WEB-ACTIVEX Microsoft Windows Media Transform Effects ActiveX clsid access (web-activex.rules)
 * 1:8399 <-> DISABLED <-> WEB-ACTIVEX Microsoft.WebCapture ActiveX clsid access (web-activex.rules)
 * 1:7896 <-> DISABLED <-> WEB-ACTIVEX AOL.PicEditCtrl ActiveX clsid access (web-activex.rules)
 * 1:7156 <-> DISABLED <-> SPYWARE-PUT Keylogger win-spy runtime detection - email delivery (spyware-put.rules)
 * 1:7956 <-> DISABLED <-> WEB-ACTIVEX Microsoft Forms 2.0 ListBox ActiveX clsid access (web-activex.rules)
 * 1:7842 <-> DISABLED <-> SPYWARE-PUT Hacker-Tool davps runtime detection (spyware-put.rules)
 * 1:9371 <-> ENABLED <-> SPECIFIC-THREATS bagle.e smtp propagation detection (specific-threats.rules)
 * 1:8743 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DAFontStyle.1 ActiveX function call access (web-activex.rules)
 * 1:8771 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DAVector2.1 ActiveX clsid access (web-activex.rules)
 * 1:8007 <-> DISABLED <-> WEB-ACTIVEX Dutch_Dutch Stemmer ActiveX clsid access (web-activex.rules)
 * 1:9394 <-> ENABLED <-> SPECIFIC-THREATS bagle.n smtp propagation detection (specific-threats.rules)
 * 1:7500 <-> DISABLED <-> WEB-ACTIVEX WM VIH2 Fix ActiveX clsid access (web-activex.rules)
 * 1:7478 <-> DISABLED <-> WEB-ACTIVEX WMT Interlacer ActiveX clsid access (web-activex.rules)
 * 1:582 <-> DISABLED <-> RPC portmap rexd request UDP (rpc.rules)
 * 1:7551 <-> DISABLED <-> SPYWARE-PUT Keylogger ardamax keylogger runtime detection - smtp (spyware-put.rules)
 * 1:8415 <-> DISABLED <-> FTP SIZE overflow attempt (ftp.rules)
 * 1:8397 <-> DISABLED <-> WEB-ACTIVEX Microsoft Office List 11.0 ActiveX clsid access (web-activex.rules)
 * 1:8845 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DAArray.1 ActiveX function call access (web-activex.rules)
 * 1:8813 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DALineStyle.1 ActiveX clsid access (web-activex.rules)
 * 1:7890 <-> DISABLED <-> WEB-ACTIVEX AOL.MemExpWz ActiveX clsid access (web-activex.rules)
 * 1:8836 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DABoolean.1 ActiveX function call access (web-activex.rules)
 * 1:8033 <-> DISABLED <-> WEB-ACTIVEX QC.MessageMover.1 ActiveX clsid access (web-activex.rules)
 * 1:4983 <-> DISABLED <-> WEB-ACTIVEX Adodb.Stream ActiveX Object Access CreateObject Function (web-activex.rules)
 * 1:548 <-> DISABLED <-> INDICATOR-COMPROMISE FTP 'MKD .' possible warez site (indicator-compromise.rules)
 * 1:8027 <-> DISABLED <-> WEB-ACTIVEX Microsoft WBEM Event Subsystem ActiveX clsid access (web-activex.rules)
 * 1:4913 <-> DISABLED <-> WEB-ACTIVEX Microsoft Repository Workspace ActiveX object access (web-activex.rules)
 * 1:7464 <-> DISABLED <-> WEB-ACTIVEX WMT DeInterlace Filter ActiveX clsid access (web-activex.rules)
 * 1:8422 <-> DISABLED <-> WEB-ACTIVEX Outlook View OVCtl ActiveX clsid access (web-activex.rules)
 * 1:7505 <-> DISABLED <-> SPYWARE-PUT Keylogger actualspy runtime detection - smtp (spyware-put.rules)
 * 1:8023 <-> DISABLED <-> WEB-ACTIVEX Italian_Italian Stemmer ActiveX clsid access (web-activex.rules)
 * 1:8842 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DABbox2.1 ActiveX function call access (web-activex.rules)
 * 1:8001 <-> DISABLED <-> WEB-ACTIVEX CommunicationManager ActiveX clsid access (web-activex.rules)
 * 1:7496 <-> DISABLED <-> WEB-ACTIVEX WMT Volume ActiveX clsid access (web-activex.rules)
 * 1:8373 <-> DISABLED <-> WEB-ACTIVEX VsmIDE.DTE ActiveX clsid access (web-activex.rules)
 * 1:8411 <-> DISABLED <-> WEB-ACTIVEX DocFind Command ActiveX clsid access (web-activex.rules)
 * 1:8017 <-> DISABLED <-> WEB-ACTIVEX ICM Class Manager ActiveX clsid access (web-activex.rules)
 * 1:7837 <-> DISABLED <-> SPYWARE-PUT Keylogger spyoutside runtime detection - email delivery (spyware-put.rules)
 * 1:7468 <-> DISABLED <-> WEB-ACTIVEX WMT DirectX Transform Wrapper ActiveX clsid access (web-activex.rules)
 * 1:8800 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DAPair.1 ActiveX function call access (web-activex.rules)
 * 1:576 <-> DISABLED <-> RPC portmap amountd request UDP (rpc.rules)
 * 1:4912 <-> DISABLED <-> WEB-ACTIVEX Microsoft Repository Root ActiveX object access (web-activex.rules)
 * 1:7013 <-> DISABLED <-> WEB-ACTIVEX Microsoft.ISCatAdm ActiveX function call access (web-activex.rules)
 * 1:589 <-> DISABLED <-> RPC portmap yppasswd request UDP (rpc.rules)
 * 1:7934 <-> DISABLED <-> WEB-ACTIVEX ftp Asychronous Pluggable Protocol Handler ActiveX clsid access (web-activex.rules)
 * 1:8807 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DAMicrophone.1 ActiveX clsid access (web-activex.rules)
 * 1:6190 <-> DISABLED <-> SPYWARE-PUT Keylogger eblaster 5.0 runtime detection (spyware-put.rules)
 * 1:8029 <-> DISABLED <-> WEB-ACTIVEX MidiOut Class Manager ActiveX clsid access (web-activex.rules)
 * 1:8843 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DAArray.1 ActiveX clsid access (web-activex.rules)
 * 1:6691 <-> DISABLED <-> WEB-CLIENT Microsoft Windows Media Player Malformed PNG detected sBIT overflow attempt (web-client.rules)
 * 1:8758 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.SpriteControl ActiveX function call access (web-activex.rules)
 * 1:7910 <-> DISABLED <-> WEB-ACTIVEX DXImageTransform.Microsoft.DropShadow ActiveX clsid access (web-activex.rules)
 * 1:7427 <-> DISABLED <-> WEB-ACTIVEX Allocator Fix ActiveX clsid access (web-activex.rules)
 * 1:8755 <-> DISABLED <-> WEB-ACTIVEX LM.AutoEffectBvr.1 ActiveX function call access (web-activex.rules)
 * 1:8786 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DASound.1 ActiveX clsid access (web-activex.rules)
 * 1:7978 <-> DISABLED <-> WEB-ACTIVEX ShockwaveFlash.ShockwaveFlash ActiveX clsid access (web-activex.rules)
 * 1:8810 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DAMatte.1 ActiveX clsid access (web-activex.rules)
 * 1:8753 <-> DISABLED <-> WEB-ACTIVEX LM.AutoEffectBvr.1 ActiveX clsid access (web-activex.rules)
 * 1:546 <-> DISABLED <-> INDICATOR-COMPROMISE FTP 'CWD  ' possible warez site (indicator-compromise.rules)
 * 1:595 <-> DISABLED <-> RPC portmap espd request TCP (rpc.rules)
 * 1:7970 <-> DISABLED <-> WEB-ACTIVEX PostBootReminder object ActiveX clsid access (web-activex.rules)
 * 1:8846 <-> DISABLED <-> WEB-ACTIVEX Microsoft Agent Character Custom Proxy Class ActiveX clsid access (web-activex.rules)
 * 1:9392 <-> ENABLED <-> SPECIFIC-THREATS bagle.j smtp propagation detection (specific-threats.rules)
 * 1:8840 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DABbox2.1 ActiveX clsid access (web-activex.rules)
 * 1:8479 <-> DISABLED <-> FTP HELP overflow attempt (ftp.rules)
 * 1:9329 <-> ENABLED <-> BOTNET-CNC yarner.b smtp propagation detection (botnet-cnc.rules)
 * 1:545 <-> DISABLED <-> INDICATOR-COMPROMISE FTP 'CWD / ' possible warez site (indicator-compromise.rules)
 * 1:8794 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DAPoint2.1 ActiveX function call access (web-activex.rules)
 * 1:9352 <-> ENABLED <-> SPECIFIC-THREATS lovgate.a smtp propagation detection (specific-threats.rules)
 * 1:7938 <-> DISABLED <-> WEB-ACTIVEX gopher Asychronous Pluggable Protocol Handler ActiveX clsid access (web-activex.rules)
 * 1:7981 <-> DISABLED <-> WEB-ACTIVEX Snapshot Viewer General Property Page Object ActiveX clsid access (web-activex.rules)
 * 1:8762 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.Sequence ActiveX clsid access (web-activex.rules)
 * 1:8821 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DAImage.1 ActiveX function call access (web-activex.rules)
 * 1:5777 <-> DISABLED <-> SPYWARE-PUT Keylogger gurl watcher runtime detection (spyware-put.rules)
 * 1:7015 <-> DISABLED <-> WEB-ACTIVEX NMSA.MediaDescription ActiveX function call access (web-activex.rules)
 * 1:4910 <-> DISABLED <-> WEB-ACTIVEX Microsoft Repository Relationship Definition ActiveX object access (web-activex.rules)
 * 1:7902 <-> DISABLED <-> WEB-ACTIVEX CDDBControlAOL.CDDBAOLControl ActiveX clsid access (web-activex.rules)
 * 1:8788 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DASound.1 ActiveX function call access (web-activex.rules)
 * 1:5780 <-> DISABLED <-> SPYWARE-PUT Keylogger runtime detection - hwpe word filtered echelon log (spyware-put.rules)
 * 1:7460 <-> DISABLED <-> WEB-ACTIVEX WMT Audio Analyzer ActiveX clsid access (web-activex.rules)
 * 1:8747 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DAEndStyle.1 ActiveX clsid access (web-activex.rules)
 * 1:8021 <-> DISABLED <-> WEB-ACTIVEX ISSimpleCommandCreator.1 ActiveX clsid access (web-activex.rules)
 * 1:5882 <-> ENABLED <-> SPYWARE-PUT Keylogger spyagent runtime detect - alert notification (spyware-put.rules)
 * 1:7012 <-> DISABLED <-> WEB-ACTIVEX Internet.PopupMenu.1 ActiveX function call access (web-activex.rules)
 * 1:7983 <-> DISABLED <-> WEB-ACTIVEX SuperBuddy Class ActiveX clsid access (web-activex.rules)
 * 1:8776 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DAUserData.1 ActiveX function call access (web-activex.rules)
 * 1:7482 <-> DISABLED <-> WEB-ACTIVEX WMT MuxDeMux Filter ActiveX clsid access (web-activex.rules)
 * 1:9410 <-> ENABLED <-> SPECIFIC-THREATS netsky.z smtp propagation detection (specific-threats.rules)
 * 1:6693 <-> DISABLED <-> WEB-CLIENT Microsoft Windows Media Player Malformed PNG detected bKGD overflow attempt (web-client.rules)
 * 1:7498 <-> DISABLED <-> WEB-ACTIVEX WM TV Out Smooth Picture Filter ActiveX clsid access (web-activex.rules)
 * 1:8717 <-> DISABLED <-> WEB-ACTIVEX VsaIDE.DTE ActiveX clsid access (web-activex.rules)
 * 1:7436 <-> DISABLED <-> WEB-ACTIVEX Dynamic Casts ActiveX function call (web-activex.rules)
 * 1:8005 <-> DISABLED <-> WEB-ACTIVEX DiskManagement.Connection ActiveX clsid access (web-activex.rules)
 * 1:4909 <-> DISABLED <-> WEB-ACTIVEX Microsoft Repository Property Definition ActiveX object access (web-activex.rules)
 * 1:8809 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DAMicrophone.1 ActiveX function call access (web-activex.rules)
 * 1:7932 <-> DISABLED <-> WEB-ACTIVEX FolderItems3 ActiveX clsid access (web-activex.rules)
 * 1:554 <-> DISABLED <-> INDICATOR-COMPROMISE FTP 'MKD / ' possible warez site (indicator-compromise.rules)
 * 1:553 <-> DISABLED <-> POLICY-OTHER FTP anonymous login attempt (policy-other.rules)
 * 1:9331 <-> ENABLED <-> SPECIFIC-THREATS mydoom.m smtp propagation detection (specific-threats.rules)
 * 1:8831 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DACamera.1 ActiveX clsid access (web-activex.rules)
 * 1:8822 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DAGeometry.1 ActiveX clsid access (web-activex.rules)
 * 1:8425 <-> DISABLED <-> WEB-ACTIVEX DXImageTransform.Microsoft.NDFXArtEffects ActiveX function call access (web-activex.rules)
 * 1:578 <-> DISABLED <-> RPC portmap cmsd request UDP (rpc.rules)
 * 1:9414 <-> ENABLED <-> SPECIFIC-THREATS lovelorn.a smtp propagation detection (specific-threats.rules)
 * 1:7916 <-> DISABLED <-> WEB-ACTIVEX CLSID_IMimeInternational ActiveX clsid access (web-activex.rules)
 * 1:9344 <-> ENABLED <-> SPECIFIC-THREATS kindal smtp propagation detection (specific-threats.rules)
 * 1:6701 <-> DISABLED <-> WEB-CLIENT Microsoft Windows Media Player Malformed PNG detected zTXt overflow attempt (web-client.rules)
 * 1:8770 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DAVector3.1 ActiveX function call access (web-activex.rules)
 * 1:8744 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DAEvent.1 ActiveX clsid access (web-activex.rules)
 * 1:5880 <-> ENABLED <-> SPYWARE-PUT Keylogger spyagent runtime detect - smtp delivery (spyware-put.rules)
 * 1:7950 <-> DISABLED <-> WEB-ACTIVEX Microsoft DirectAnimation Control ActiveX clsid access (web-activex.rules)
 * 1:8401 <-> DISABLED <-> WEB-ACTIVEX Microsoft Windows Media Services DRM Storage ActiveX clsid access (web-activex.rules)
 * 1:4915 <-> DISABLED <-> WEB-ACTIVEX Shortcut Handler ActiveX object access (web-activex.rules)
 * 1:7425 <-> DISABLED <-> WEB-ACTIVEX 9x8Resize ActiveX clsid access (web-activex.rules)
 * 1:8409 <-> DISABLED <-> WEB-ACTIVEX RealNetworks RealPlayer Stream Handler ActiveX clsid access (web-activex.rules)
 * 1:9378 <-> ENABLED <-> SPECIFIC-THREATS netsky.q smtp propagation detection (specific-threats.rules)
 * 1:9328 <-> ENABLED <-> SPECIFIC-THREATS zhangpo smtp propagation detection (specific-threats.rules)
 * 1:7476 <-> DISABLED <-> WEB-ACTIVEX WMT Import Filter ActiveX clsid access (web-activex.rules)
 * 1:8371 <-> DISABLED <-> WEB-ACTIVEX Outlook.Application ActiveX clsid access (web-activex.rules)
 * 1:8830 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DAColor.1 ActiveX function call access (web-activex.rules)
 * 1:7874 <-> DISABLED <-> WEB-ACTIVEX Microsoft Office PivotTable 10.0 ActiveX clsid access (web-activex.rules)
 * 1:7429 <-> DISABLED <-> WEB-ACTIVEX Bitmap ActiveX clsid access (web-activex.rules)
 * 1:8740 <-> DISABLED <-> WEB-ACTIVEX Macrovision InstallShield Update Service ActiveX function call access (web-activex.rules)
 * 1:8824 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DAGeometry.1 ActiveX function call access (web-activex.rules)
 * 1:9391 <-> ENABLED <-> SPECIFIC-THREATS mimail.i smtp propagation detection (specific-threats.rules)
 * 1:8750 <-> DISABLED <-> WEB-ACTIVEX LM.LMBehaviorFactory.1 ActiveX clsid access (web-activex.rules)
 * 1:8828 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DAColor.1 ActiveX clsid access (web-activex.rules)
 * 1:7545 <-> DISABLED <-> SPYWARE-PUT Keylogger PerfectKeylogger runtime detection - flowbit set 2 (spyware-put.rules)
 * 1:8827 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DADashStyle.1 ActiveX function call access (web-activex.rules)
 * 1:8773 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DAVector2.1 ActiveX function call access (web-activex.rules)
 * 1:6009 <-> DISABLED <-> WEB-ACTIVEX RDS.Dataspace ActiveX object access (web-activex.rules)
 * 1:8777 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DATransform3.1 ActiveX clsid access (web-activex.rules)
 * 1:7017 <-> DISABLED <-> WEB-ACTIVEX RDS.DataControl ActiveX function call access (web-activex.rules)
 * 1:8815 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DALineStyle.1 ActiveX function call access (web-activex.rules)
 * 1:8852 <-> DISABLED <-> WEB-ACTIVEX Microsoft Agent v2.0 ActiveX clsid access (web-activex.rules)
 * 1:8795 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DAPath2.1 ActiveX clsid access (web-activex.rules)
 * 1:7448 <-> DISABLED <-> WEB-ACTIVEX ShotDetect ActiveX clsid access (web-activex.rules)
 * 1:6686 <-> DISABLED <-> WEB-ACTIVEX DXImageTransform.Microsoft.MMSpecialEffect2Inputs ActiveX clsid access (web-activex.rules)
 * 1:7502 <-> DISABLED <-> WEB-ACTIVEX tsuserex.ADsTSUserEx.1 ActiveX clsid access (web-activex.rules)
 * 1:8480 <-> DISABLED <-> FTP PORT overflow attempt (ftp.rules)
 * 1:8055 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.PathControl ActiveX function call access (web-activex.rules)
 * 1:5778 <-> DISABLED <-> SPYWARE-PUT Keylogger runtime detection - hwpe windows activity logs (spyware-put.rules)
 * 1:8850 <-> DISABLED <-> WEB-ACTIVEX Microsoft Agent Custom Proxy Class ActiveX clsid access (web-activex.rules)
 * 1:8746 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DAEvent.1 ActiveX function call access (web-activex.rules)
 * 1:8405 <-> DISABLED <-> WEB-ACTIVEX  ActiveX clsid access (web-activex.rules)
 * 1:7976 <-> DISABLED <-> WEB-ACTIVEX ShellFolder for CD Burning ActiveX clsid access (web-activex.rules)
 * 1:7470 <-> DISABLED <-> WEB-ACTIVEX WMT DV Extract Filter ActiveX clsid access (web-activex.rules)
 * 1:9330 <-> ENABLED <-> SPECIFIC-THREATS mydoom.e smtp propagation detection (specific-threats.rules)
 * 1:7999 <-> DISABLED <-> WEB-ACTIVEX CLSID_CDIDeviceActionConfigPage ActiveX clsid access (web-activex.rules)
 * 1:8854 <-> DISABLED <-> WEB-ACTIVEX Microsoft Agent v2.0 ActiveX function call access (web-activex.rules)
 * 1:8039 <-> DISABLED <-> WEB-ACTIVEX syncui.dll ActiveX clsid access (web-activex.rules)
 * 1:9350 <-> ENABLED <-> SPECIFIC-THREATS mimail.k smtp propagation detection (specific-threats.rules)
 * 1:8015 <-> DISABLED <-> WEB-ACTIVEX German_German Stemmer ActiveX clsid access (web-activex.rules)
 * 1:7003 <-> DISABLED <-> WEB-ACTIVEX ADODB.Recordset ActiveX function call access (web-activex.rules)
 * 1:8791 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DAPoint3.1 ActiveX function call access (web-activex.rules)
 * 1:7454 <-> DISABLED <-> WEB-ACTIVEX Wmm2ae.dll ActiveX clsid access (web-activex.rules)
 * 1:598 <-> DISABLED <-> RPC portmap listing TCP 111 (rpc.rules)
 * 1:7592 <-> DISABLED <-> SPYWARE-PUT Keylogger keylogger pro runtime detection (spyware-put.rules)
 * 1:8856 <-> DISABLED <-> WEB-ACTIVEX Microsoft Agent v1.5 ActiveX function call access (web-activex.rules)
 * 1:6695 <-> DISABLED <-> WEB-CLIENT Microsoft Windows Media Player Malformed PNG detected tRNS overflow attempt (web-client.rules)
 * 1:9370 <-> ENABLED <-> SPECIFIC-THREATS bagle.b smtp propagation detection (specific-threats.rules)
 * 1:8363 <-> DISABLED <-> WEB-ACTIVEX Business Object Factory ActiveX clsid access (web-activex.rules)
 * 1:8407 <-> DISABLED <-> WEB-ACTIVEX VisualExec Control ActiveX clsid access (web-activex.rules)
 * 1:9381 <-> ENABLED <-> SPECIFIC-THREATS lara smtp propagation detection (specific-threats.rules)
 * 1:4911 <-> DISABLED <-> WEB-ACTIVEX Microsoft Repository Type Library ActiveX object access (web-activex.rules)
 * 1:8418 <-> DISABLED <-> WEB-ACTIVEX DXImageTransform.Microsoft.RevealTrans ActiveX function call access (web-activex.rules)
 * 1:7870 <-> DISABLED <-> WEB-ACTIVEX Microsoft Office Data Source Control 9.0 ActiveX clsid access (web-activex.rules)
 * 1:9385 <-> ENABLED <-> SPECIFIC-THREATS collo.a smtp propagation detection (specific-threats.rules)
 * 1:7446 <-> DISABLED <-> WEB-ACTIVEX Record Queue ActiveX clsid access (web-activex.rules)
 * 1:7018 <-> DISABLED <-> WEB-ACTIVEX Sysmon ActiveX function call access (web-activex.rules)
 * 1:5782 <-> DISABLED <-> SPYWARE-PUT Keylogger runtime detection - hwae word filtered echelon log (spyware-put.rules)
 * 1:4982 <-> DISABLED <-> WEB-ACTIVEX Adodb.Stream ActiveX object access (web-activex.rules)
 * 1:8417 <-> DISABLED <-> WEB-ACTIVEX TriEditDocument.TriEditDocument ActiveX function call access (web-activex.rules)
 * 1:8710 <-> DISABLED <-> DNS Microsoft Windows NAT helper components udp denial of service attempt (dns.rules)
 * 1:9348 <-> ENABLED <-> SPECIFIC-THREATS morbex smtp propagation detection (specific-threats.rules)
 * 1:7186 <-> DISABLED <-> SPYWARE-PUT Keylogger kgb Keylogger runtime detection (spyware-put.rules)
 * 1:7490 <-> DISABLED <-> WEB-ACTIVEX WMT Switch Filter ActiveX clsid access (web-activex.rules)
 * 1:8774 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DAUserData.1 ActiveX clsid access (web-activex.rules)
 * 1:7958 <-> DISABLED <-> WEB-ACTIVEX mk Asychronous Pluggable Protocol Handler ActiveX clsid access (web-activex.rules)
 * 1:7991 <-> DISABLED <-> WEB-ACTIVEX ACM Class Manager ActiveX clsid access (web-activex.rules)
 * 1:7888 <-> DISABLED <-> WEB-ACTIVEX AOLFlash.AOLFlash ActiveX clsid access (web-activex.rules)
 * 1:9393 <-> ENABLED <-> SPECIFIC-THREATS bagle.k smtp propagation detection (specific-threats.rules)
 * 1:7546 <-> DISABLED <-> SPYWARE-PUT Keylogger PerfectKeylogger runtime detection (spyware-put.rules)
 * 1:9369 <-> ENABLED <-> SPECIFIC-THREATS atak.a smtp propagation detection (specific-threats.rules)
 * 1:8383 <-> DISABLED <-> WEB-ACTIVEX RealNetworks RealPlayer RAM Download Handler ActiveX clsid access (web-activex.rules)
 * 1:7884 <-> DISABLED <-> WEB-ACTIVEX AolCalSvr.ACCalendarListCtrl ActiveX clsid access (web-activex.rules)
 * 1:7458 <-> DISABLED <-> WEB-ACTIVEX Wmm2fxb.dll ActiveX clsid access (web-activex.rules)
 * 1:8834 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DABoolean.1 ActiveX clsid access (web-activex.rules)
 * 1:8848 <-> DISABLED <-> WEB-ACTIVEX Microsoft Agent Notify Sink Custom Proxy Class ActiveX clsid access (web-activex.rules)
 * 1:584 <-> DISABLED <-> RPC portmap rusers request UDP (rpc.rules)
 * 1:8709 <-> DISABLED <-> DNS Microsoft Windows NAT helper components tcp denial of service attempt (dns.rules)
 * 1:7014 <-> DISABLED <-> WEB-ACTIVEX NMSA.ASFSourceMediaDescription.1 ActiveX function call access (web-activex.rules)
 * 1:9413 <-> ENABLED <-> SPECIFIC-THREATS ganda smtp propagation detection (specific-threats.rules)
 * 1:6516 <-> DISABLED <-> WEB-ACTIVEX DXImageTransform.Microsoft.Light ActiveX function call access (web-activex.rules)
 * 1:8013 <-> DISABLED <-> WEB-ACTIVEX French_French Stemmer ActiveX clsid access (web-activex.rules)
 * 1:8393 <-> DISABLED <-> WEB-ACTIVEX WebDetectFrm ActiveX clsid access (web-activex.rules)
 * 1:8011 <-> DISABLED <-> WEB-ACTIVEX English_US Stemmer ActiveX clsid access (web-activex.rules)
 * 1:9338 <-> ENABLED <-> SPECIFIC-THREATS mydoom.i smtp propagation detection (specific-threats.rules)
 * 1:547 <-> DISABLED <-> INDICATOR-COMPROMISE FTP 'MKD  ' possible warez site (indicator-compromise.rules)
 * 1:8837 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DABbox3.1 ActiveX clsid access (web-activex.rules)
 * 1:8003 <-> DISABLED <-> WEB-ACTIVEX Content.mbcontent.1 ActiveX clsid access (web-activex.rules)
 * 1:6008 <-> DISABLED <-> WEB-ACTIVEX Microsoft DT DDS OrgChart GDD Route ActiveX object access (web-activex.rules)
 * 1:9345 <-> ENABLED <-> SPECIFIC-THREATS kipis.a smtp propagation detection (specific-threats.rules)
 * 1:8025 <-> DISABLED <-> WEB-ACTIVEX Microsoft HTML Window Security Proxy ActiveX clsid access (web-activex.rules)
 * 1:6692 <-> DISABLED <-> WEB-CLIENT Microsoft Windows Media Player Malformed PNG detected sRGB overflow attempt (web-client.rules)
 * 1:7183 <-> DISABLED <-> BOTNET-CNC Snoopware barok runtime detection (botnet-cnc.rules)
 * 1:7480 <-> DISABLED <-> WEB-ACTIVEX WMT Log Filter ActiveX clsid access (web-activex.rules)
 * 1:9409 <-> ENABLED <-> SPECIFIC-THREATS atak.b smtp propagation detection (specific-threats.rules)
 * 1:7486 <-> DISABLED <-> WEB-ACTIVEX WMT Screen Capture Filter Task Page ActiveX clsid access (web-activex.rules)
 * 1:8764 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.Sequence ActiveX function call access (web-activex.rules)
 * 1:9335 <-> ENABLED <-> SPECIFIC-THREATS netsky.b smtp propagation detection (specific-threats.rules)
 * 1:9358 <-> ENABLED <-> SPECIFIC-THREATS fizzer smtp propagation detection (specific-threats.rules)
 * 1:8424 <-> DISABLED <-> WEB-ACTIVEX Microsoft Forms 2.0 ListBox ActiveX function call access (web-activex.rules)
 * 1:7868 <-> DISABLED <-> WEB-ACTIVEX ADODB.Recordset ActiveX clsid access (web-activex.rules)
 * 1:8819 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DAImage.1 ActiveX clsid access (web-activex.rules)
 * 1:7942 <-> DISABLED <-> WEB-ACTIVEX http Asychronous Pluggable Protocol Handler ActiveX clsid access (web-activex.rules)
 * 1:7544 <-> DISABLED <-> SPYWARE-PUT Keylogger PerfectKeylogger runtime detection - flowbit set 1 (spyware-put.rules)
 * 1:7906 <-> DISABLED <-> WEB-ACTIVEX CDO.KnowledgeSearchFolder ActiveX clsid access (web-activex.rules)
 * 1:7574 <-> DISABLED <-> SPYWARE-PUT Keylogger proagent 2.0 runtime detection (spyware-put.rules)
 * 1:6699 <-> DISABLED <-> WEB-CLIENT Microsoft Windows Media Player Malformed PNG detected iTXt overflow attempt (web-client.rules)
 * 1:6006 <-> DISABLED <-> WEB-ACTIVEX Microsoft DT Icon Control ActiveX object access (web-activex.rules)
 * 1:7185 <-> DISABLED <-> SPYWARE-PUT Keylogger 007 spy software runtime detection - ftp (spyware-put.rules)
 * 1:6004 <-> DISABLED <-> WEB-ACTIVEX Microsoft DT DDS Circular Auto Layout Logic 2 ActiveX object access (web-activex.rules)
 * 1:8403 <-> DISABLED <-> WEB-ACTIVEX XML Schema Cache 6.0 ActiveX clsid access (web-activex.rules)
 * 1:7993 <-> DISABLED <-> WEB-ACTIVEX clbcatex.dll ActiveX clsid access (web-activex.rules)
 * 1:5881 <-> ENABLED <-> SPYWARE-PUT Keylogger spyagent runtime detect - ftp delivery (spyware-put.rules)
 * 1:7924 <-> DISABLED <-> WEB-ACTIVEX DXImageTransform.Microsoft.Shadow ActiveX clsid access (web-activex.rules)
 * 1:7912 <-> DISABLED <-> WEB-ACTIVEX DX3DTransform.Microsoft.Shapes ActiveX clsid access (web-activex.rules)
 * 1:8825 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DADashStyle.1 ActiveX clsid access (web-activex.rules)
 * 1:8009 <-> DISABLED <-> WEB-ACTIVEX English_UK Stemmer ActiveX clsid access (web-activex.rules)
 * 1:8391 <-> DISABLED <-> WEB-ACTIVEX RFXInstMgr Class ActiveX clsid access (web-activex.rules)
 * 1:7987 <-> DISABLED <-> WEB-ACTIVEX WebViewFolderIcon.WebViewFolderIcon.2 ActiveX clsid access (web-activex.rules)
 * 1:8379 <-> DISABLED <-> WEB-ACTIVEX Xml2Dex ActiveX clsid access (web-activex.rules)
 * 1:8045 <-> DISABLED <-> WEB-ACTIVEX Video Effect Class Manager 2 Input ActiveX clsid access (web-activex.rules)
 * 1:7591 <-> DISABLED <-> SPYWARE-PUT Keylogger keylogger pro runtime detection - flowbit set (spyware-put.rules)
 * 1:7450 <-> DISABLED <-> WEB-ACTIVEX Stetch ActiveX clsid access (web-activex.rules)
 * 1:9131 <-> DISABLED <-> WEB-ACTIVEX WinZip FileView 6.1 ActiveX function call access (web-activex.rules)
 * 1:8804 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DAMontage.1 ActiveX clsid access (web-activex.rules)
 * 1:7444 <-> DISABLED <-> WEB-ACTIVEX Mmedia.AsyncMHandler.1 ActiveX clsid access (web-activex.rules)
 * 1:8481 <-> DISABLED <-> FTP Microsoft NLST * dos attempt (ftp.rules)
 * 1:7541 <-> DISABLED <-> SPYWARE-PUT Keylogger starlogger runtime detection (spyware-put.rules)
 * 1:8752 <-> DISABLED <-> WEB-ACTIVEX LM.LMBehaviorFactory.1 ActiveX function call access (web-activex.rules)
 * 1:7431 <-> DISABLED <-> WEB-ACTIVEX DirectFrame.DirectControl.1 ActiveX clsid access (web-activex.rules)
 * 1:8031 <-> DISABLED <-> WEB-ACTIVEX Mslablti.MarshalableTI.1 ActiveX clsid access (web-activex.rules)
 * 1:7930 <-> DISABLED <-> WEB-ACTIVEX FolderItem2 ActiveX clsid access (web-activex.rules)
 * 1:583 <-> DISABLED <-> RPC portmap rstatd request UDP (rpc.rules)
 * 1:5779 <-> DISABLED <-> SPYWARE-PUT Keylogger runtime detection - hwpe shell file logs (spyware-put.rules)
 * 1:9337 <-> ENABLED <-> SPECIFIC-THREATS netsky.x smtp propagation detection (specific-threats.rules)
 * 1:5759 <-> DISABLED <-> SPYWARE-PUT Keylogger fearlesskeyspy runtime detection (spyware-put.rules)
 * 1:7946 <-> DISABLED <-> WEB-ACTIVEX DXImageTransform.Microsoft.MaskFilter ActiveX clsid access (web-activex.rules)
 * 1:8833 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DACamera.1 ActiveX function call access (web-activex.rules)
 * 1:491 <-> DISABLED <-> FTP Bad login (ftp.rules)
 * 1:6340 <-> DISABLED <-> SPYWARE-PUT Keylogger handy keylogger runtime detection (spyware-put.rules)
 * 1:9398 <-> ENABLED <-> SPECIFIC-THREATS totilix.a smtp propagation detection (specific-threats.rules)
 * 1:7995 <-> DISABLED <-> WEB-ACTIVEX clbcatq.dll ActiveX clsid access (web-activex.rules)
 * 1:7596 <-> DISABLED <-> SPYWARE-PUT Keylogger spy lantern keylogger runtime detection - flowbit set (spyware-put.rules)
 * 1:8768 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DAVector3.1 ActiveX clsid access (web-activex.rules)
 * 1:8375 <-> DISABLED <-> WEB-ACTIVEX QuickTime Object ActiveX clsid access (web-activex.rules)
 * 1:9382 <-> ENABLED <-> SPECIFIC-THREATS fearso.c smtp propagation detection (specific-threats.rules)
 * 1:8049 <-> DISABLED <-> WEB-ACTIVEX WaveOut and DSound Class Manager ActiveX clsid access (web-activex.rules)
 * 1:6220 <-> DISABLED <-> SPYWARE-PUT Keylogger boss everyware runtime detection (spyware-put.rules)
 * 1:5790 <-> DISABLED <-> SPYWARE-PUT Keylogger pc actmon pro runtime detection - smtp (spyware-put.rules)
 * 1:7989 <-> DISABLED <-> WEB-ACTIVEX WIA FileSystem USD ActiveX clsid access (web-activex.rules)
 * 1:7908 <-> DISABLED <-> WEB-ACTIVEX DXImageTransform.Microsoft.Chroma ActiveX clsid access (web-activex.rules)
 * 1:7920 <-> DISABLED <-> WEB-ACTIVEX DsPropertyPages.OU ActiveX clsid access (web-activex.rules)
 * 1:7846 <-> DISABLED <-> SPYWARE-PUT Keylogger clogger 1.0 runtime detection (spyware-put.rules)
 * 1:7007 <-> DISABLED <-> WEB-ACTIVEX AxDebugger.Document.1 ActiveX function call access (web-activex.rules)
 * 1:6687 <-> DISABLED <-> WEB-ACTIVEX DXImageTransform.Microsoft.MMSpecialEffect1Input ActiveX function call access (web-activex.rules)
 * 1:6003 <-> DISABLED <-> WEB-ACTIVEX Microsoft DT DDS Rectilinear GDD Route ActiveX object access (web-activex.rules)
 * 1:8725 <-> DISABLED <-> WEB-ACTIVEX System Monitor ActiveX clsid access (web-activex.rules)
 * 1:8765 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DAView.1 ActiveX clsid access (web-activex.rules)
 * 1:7878 <-> DISABLED <-> WEB-ACTIVEX AxMetaStream.MetaStreamCtl ActiveX clsid access (web-activex.rules)
 * 1:7894 <-> DISABLED <-> WEB-ACTIVEX AOL.PicDownloadCtrl ActiveX clsid access (web-activex.rules)
 * 1:8812 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DAMatte.1 ActiveX function call access (web-activex.rules)
 * 1:7010 <-> DISABLED <-> WEB-ACTIVEX HtmlDlgSafeHelper.HtmlDlgSafeHelper.1 ActiveX function call access (web-activex.rules)
 * 1:9406 <-> ENABLED <-> SPECIFIC-THREATS lovgate.e smtp propagation detection (specific-threats.rules)
 * 1:8365 <-> DISABLED <-> WEB-ACTIVEX DExplore.AppObj.8.0 ActiveX clsid access (web-activex.rules)
 * 1:9383 <-> ENABLED <-> SPECIFIC-THREATS netsky.y smtp propagation detection (specific-threats.rules)
 * 1:6697 <-> DISABLED <-> WEB-CLIENT Microsoft Windows Media Player Malformed PNG detected sPLT overflow attempt (web-client.rules)
 * 1:5781 <-> DISABLED <-> SPYWARE-PUT Keylogger runtime detection - hwae windows activity logs (spyware-put.rules)
 * 1:8019 <-> DISABLED <-> WEB-ACTIVEX Internet Explorer Address Bar ActiveX clsid access (web-activex.rules)
 * 1:7442 <-> DISABLED <-> WEB-ACTIVEX mmAEPlugIn.AEPlugIn.1 ActiveX clsid access (web-activex.rules)
 * 1:5797 <-> DISABLED <-> POLICY Kontiki runtime detection (policy.rules)
 * 1:9673 <-> DISABLED <-> WEB-ACTIVEX RealNetworks RealPlayer AutoStream.AutoStream.1 ActiveX function call access (web-activex.rules)
 * 1:9670 <-> DISABLED <-> WEB-ACTIVEX Outlook Recipient Control ActiveX function call access (web-activex.rules)
 * 1:9668 <-> DISABLED <-> WEB-ACTIVEX Outlook Recipient Control ActiveX clsid access (web-activex.rules)
 * 1:9798 <-> DISABLED <-> WEB-ACTIVEX Panda ActiveScan PAVPZ.SOS.1 ActiveX clsid access (web-activex.rules)
 * 1:9797 <-> DISABLED <-> WEB-ACTIVEX Panda ActiveScan ActiveScan.1 ActiveX function call access (web-activex.rules)
 * 1:9416 <-> ENABLED <-> SPECIFIC-THREATS bagle.at smtp propagation detection (specific-threats.rules)
 * 1:9626 <-> DISABLED <-> WEB-ACTIVEX AcroPDF.PDF ActiveX clsid access (web-activex.rules)
 * 1:9427 <-> DISABLED <-> WEB-ACTIVEX Acer LunchApp.APlunch ActiveX clsid access (web-activex.rules)
 * 1:9671 <-> DISABLED <-> WEB-ACTIVEX RealNetworks RealPlayer AutoStream.AutoStream.1 ActiveX clsid access (web-activex.rules)
 * 1:9795 <-> DISABLED <-> WEB-ACTIVEX Panda ActiveScan ActiveScan.1 ActiveX clsid access (web-activex.rules)
 * 1:9792 <-> DISABLED <-> FTP PASV overflow attempt (ftp.rules)
 * 1:9793 <-> DISABLED <-> WEB-ACTIVEX Yahoo Messenger YMMAPI.YMailAttach ActiveX clsid access (web-activex.rules)
 * 1:10013 <-> DISABLED <-> WEB-ACTIVEX CCRP FolderTreeView ActiveX clsid access (web-activex.rules)
 * 1:10017 <-> DISABLED <-> WEB-ACTIVEX Oracle ORADC ActiveX function call access (web-activex.rules)
 * 1:10084 <-> DISABLED <-> WEB-ACTIVEX NCTAudioFile2 ActiveX clsid access (web-activex.rules)
 * 1:10086 <-> DISABLED <-> WEB-ACTIVEX NCTAudioFile2 ActiveX function call access (web-activex.rules)
 * 1:10128 <-> DISABLED <-> WEB-ACTIVEX Aliplay ActiveX clsid access (web-activex.rules)
 * 1:10132 <-> DISABLED <-> RPC portmap BrightStor ARCserve denial of service attempt (rpc.rules)
 * 1:10133 <-> DISABLED <-> RPC portmap BrightStor ARCserve denial of service attempt (rpc.rules)
 * 1:10137 <-> DISABLED <-> WEB-ACTIVEX Microsoft Input Method Editor ActiveX clsid access (web-activex.rules)
 * 1:10139 <-> DISABLED <-> WEB-ACTIVEX Microsoft Input Method Editor ActiveX function call access (web-activex.rules)
 * 1:10140 <-> DISABLED <-> WEB-ACTIVEX Microsoft Input Method Editor 2 ActiveX clsid access (web-activex.rules)
 * 1:10142 <-> DISABLED <-> WEB-ACTIVEX LexRefBilingualTextContext ActiveX clsid access (web-activex.rules)
 * 1:10144 <-> DISABLED <-> WEB-ACTIVEX LexRefBilingualTextContext ActiveX function call access (web-activex.rules)
 * 1:10145 <-> DISABLED <-> WEB-ACTIVEX HTML Inline Sound Control ActiveX clsid access (web-activex.rules)
 * 1:10147 <-> DISABLED <-> WEB-ACTIVEX HTML Inline Sound Control ActiveX function call access (web-activex.rules)
 * 1:10148 <-> DISABLED <-> WEB-ACTIVEX HTML Inline Movie Control ActiveX clsid access (web-activex.rules)
 * 1:10150 <-> DISABLED <-> WEB-ACTIVEX HTML Inline Movie Control ActiveX function call access (web-activex.rules)
 * 1:10151 <-> DISABLED <-> WEB-ACTIVEX BlnSetUser Proxy ActiveX clsid access (web-activex.rules)
 * 1:10153 <-> DISABLED <-> WEB-ACTIVEX BlnSetUser Proxy ActiveX function call access (web-activex.rules)
 * 1:10154 <-> DISABLED <-> WEB-ACTIVEX BlnSetUser Proxy 2 ActiveX clsid access (web-activex.rules)
 * 1:10156 <-> DISABLED <-> WEB-ACTIVEX ActiveX Soft DVD Tools ActiveX clsid access (web-activex.rules)
 * 1:10162 <-> DISABLED <-> WEB-ACTIVEX BrowseDialog ActiveX clsid access (web-activex.rules)
 * 1:10170 <-> DISABLED <-> WEB-ACTIVEX Verisign ConfigCHK ActiveX clsid access (web-activex.rules)
 * 1:10173 <-> DISABLED <-> WEB-ACTIVEX Trend Micro OfficeScan Client ActiveX clsid access (web-activex.rules)
 * 1:10175 <-> DISABLED <-> WEB-ACTIVEX Trend Micro OfficeScan Client ActiveX function call access (web-activex.rules)
 * 1:10176 <-> DISABLED <-> WEB-ACTIVEX Microsoft Windows Shell User Enumeration Object ActiveX clsid access (web-activex.rules)
 * 1:10178 <-> DISABLED <-> WEB-ACTIVEX Microsoft Windows Shell User Enumeration Object ActiveX function call access (web-activex.rules)
 * 1:10188 <-> DISABLED <-> FTP Ipswitch Ws_ftp XMD5 overflow attempt (ftp.rules)
 * 1:10189 <-> DISABLED <-> WEB-ACTIVEX DivXBrowserPlugin ActiveX clsid access (web-activex.rules)
 * 1:10191 <-> DISABLED <-> WEB-ACTIVEX DivXBrowserPlugin ActiveX function call access (web-activex.rules)
 * 1:10193 <-> DISABLED <-> WEB-ACTIVEX RealNetworks RealPlayer Ierpplug.dll ActiveX function call access (web-activex.rules)
 * 1:10194 <-> DISABLED <-> WEB-ACTIVEX RealNetworks RealPlayer Ierpplug.dll ActiveX function call access (web-activex.rules)
 * 1:10214 <-> DISABLED <-> WEB-ACTIVEX Shockwave ActiveX Control ActiveX clsid access (web-activex.rules)
 * 1:10216 <-> DISABLED <-> WEB-ACTIVEX Shockwave ActiveX Control ActiveX function call access (web-activex.rules)
 * 1:10390 <-> DISABLED <-> WEB-ACTIVEX Symantec Support Controls SmartIssue ActiveX clsid access (web-activex.rules)
 * 1:10392 <-> DISABLED <-> WEB-ACTIVEX Symantec Support Controls SmartIssue ActiveX function call access (web-activex.rules)
 * 1:10404 <-> DISABLED <-> WEB-ACTIVEX SignKorea SKCommAX ActiveX clsid access (web-activex.rules)
 * 1:10406 <-> DISABLED <-> WEB-ACTIVEX SignKorea SKCommAX ActiveX function call access (web-activex.rules)
 * 1:10408 <-> DISABLED <-> RPC portmap HP-UX Single Logical Screen SLSD tcp request (rpc.rules)
 * 1:10409 <-> DISABLED <-> RPC portmap HP-UX Single Logical Screen SLSD udp request (rpc.rules)
 * 1:10410 <-> DISABLED <-> RPC portmap HP-UX Single Logical Screen SLSD tcp request (rpc.rules)
 * 1:10411 <-> DISABLED <-> RPC portmap HP-UX Single Logical Screen SLSD udp request (rpc.rules)
 * 1:10412 <-> DISABLED <-> WEB-ACTIVEX IBM Lotus SameTime STJNILoader Alt CLSID ActiveX clsid access (web-activex.rules)
 * 1:10414 <-> DISABLED <-> WEB-ACTIVEX IBM Lotus SameTime STJNILoader Alt CLSID ActiveX function call access (web-activex.rules)
 * 1:10415 <-> DISABLED <-> WEB-ACTIVEX IBM Lotus SameTime STJNILoader ActiveX clsid access (web-activex.rules)
 * 1:10417 <-> DISABLED <-> WEB-ACTIVEX IBM Lotus SameTime STJNILoader ActiveX function call access (web-activex.rules)
 * 1:10419 <-> DISABLED <-> WEB-ACTIVEX HP Mercury Quality Center SPIDERLib ActiveX clsid access (web-activex.rules)
 * 1:10421 <-> DISABLED <-> WEB-ACTIVEX HP Mercury Quality Center SPIDERLib ActiveX function call access (web-activex.rules)
 * 1:10423 <-> DISABLED <-> WEB-ACTIVEX Yahoo Audio Conferencing ActiveX clsid access (web-activex.rules)
 * 1:10425 <-> DISABLED <-> WEB-ACTIVEX Yahoo Audio Conferencing ActiveX function call access (web-activex.rules)
 * 1:10427 <-> DISABLED <-> WEB-ACTIVEX Kaspersky AntiVirus SysInfo ActiveX clsid access (web-activex.rules)
 * 1:10429 <-> DISABLED <-> WEB-ACTIVEX Kaspersky AntiVirus SysInfo ActiveX function call access (web-activex.rules)
 * 1:10431 <-> DISABLED <-> WEB-ACTIVEX Kaspersky AntiVirus KAV60Info ActiveX clsid access (web-activex.rules)
 * 1:10433 <-> DISABLED <-> WEB-ACTIVEX Kaspersky AntiVirus KAV60Info ActiveX function call access (web-activex.rules)
 * 1:10466 <-> DISABLED <-> WEB-ACTIVEX iPIX Image Well ActiveX clsid access (web-activex.rules)
 * 1:10470 <-> DISABLED <-> WEB-ACTIVEX iPIX Media Send Class ActiveX clsid access (web-activex.rules)
 * 1:10472 <-> DISABLED <-> WEB-ACTIVEX iPIX Media Send Class ActiveX function call access (web-activex.rules)
 * 1:10476 <-> DISABLED <-> WEB-ACTIVEX MarkAny MaPrintModule_WORK ActiveX clsid access (web-activex.rules)
 * 1:10478 <-> DISABLED <-> WEB-ACTIVEX MarkAny MaPrintModule_WORK ActiveX function call access (web-activex.rules)
 * 1:10482 <-> DISABLED <-> RPC portmap CA BrightStor ARCserve tcp request (rpc.rules)
 * 1:10483 <-> DISABLED <-> RPC portmap CA BrightStor ARCserve udp request (rpc.rules)
 * 1:10978 <-> DISABLED <-> WEB-ACTIVEX Second Sight Software ActiveGS ActiveX clsid access (web-activex.rules)
 * 1:10980 <-> DISABLED <-> WEB-ACTIVEX Second Sight Software ActiveGS ActiveX function call access (web-activex.rules)
 * 1:10982 <-> DISABLED <-> WEB-ACTIVEX Second Sight Software ActiveMod ActiveX clsid access (web-activex.rules)
 * 1:10984 <-> DISABLED <-> WEB-ACTIVEX Second Sight Software ActiveMod ActiveX function call access (web-activex.rules)
 * 1:10986 <-> DISABLED <-> WEB-ACTIVEX GraceNote CDDB ActiveX clsid access (web-activex.rules)
 * 1:10988 <-> DISABLED <-> WEB-ACTIVEX GraceNote CDDB ActiveX function call access (web-activex.rules)
 * 1:10991 <-> DISABLED <-> WEB-ACTIVEX Microgaming Download Helper ActiveX clsid access (web-activex.rules)
 * 1:10993 <-> DISABLED <-> WEB-ACTIVEX Microgaming Download Helper ActiveX function call access (web-activex.rules)
 * 1:11178 <-> DISABLED <-> WEB-ACTIVEX Microsoft Office PowerPoint Viewer ActiveX function call access (web-activex.rules)
 * 1:11189 <-> DISABLED <-> WEB-ACTIVEX Microsoft Office Word Viewer ActiveX function call access (web-activex.rules)
 * 1:11197 <-> DISABLED <-> WEB-ACTIVEX ActiveX Soft DVD Tools ActiveX function call access (web-activex.rules)
 * 1:11206 <-> DISABLED <-> WEB-ACTIVEX East Wind Software ADVDAUDIO ActiveX clsid access (web-activex.rules)
 * 1:11208 <-> DISABLED <-> WEB-ACTIVEX East Wind Software ADVDAUDIO ActiveX function call access (web-activex.rules)
 * 1:11210 <-> DISABLED <-> WEB-ACTIVEX Sienzo Digital Music Mentor ActiveX clsid access (web-activex.rules)
 * 1:11212 <-> DISABLED <-> WEB-ACTIVEX Sienzo Digital Music Mentor ActiveX function call access (web-activex.rules)
 * 1:11214 <-> DISABLED <-> WEB-ACTIVEX VeralSoft HTTP File Uploader ActiveX clsid access (web-activex.rules)
 * 1:11216 <-> DISABLED <-> WEB-ACTIVEX VeralSoft HTTP File Uploader ActiveX function call access (web-activex.rules)
 * 1:11218 <-> DISABLED <-> WEB-ACTIVEX SmartCode VNC Manager ActiveX clsid access (web-activex.rules)
 * 1:11220 <-> DISABLED <-> WEB-ACTIVEX SmartCode VNC Manager ActiveX function call access (web-activex.rules)
 * 1:11224 <-> DISABLED <-> WEB-ACTIVEX MSAuth ActiveX clsid access (web-activex.rules)
 * 1:11226 <-> DISABLED <-> WEB-ACTIVEX MSAuth ActiveX function call access (web-activex.rules)
 * 1:11230 <-> DISABLED <-> WEB-ACTIVEX Microsoft Cryptographic API COM 1 ActiveX clsid access (web-activex.rules)
 * 1:11232 <-> DISABLED <-> WEB-ACTIVEX Microsoft Cryptographic API COM 1 ActiveX function call access (web-activex.rules)
 * 1:11234 <-> DISABLED <-> WEB-ACTIVEX Microsoft Cryptographic API COM 2 ActiveX clsid access (web-activex.rules)
 * 1:11236 <-> DISABLED <-> WEB-ACTIVEX OutlookExpress.AddressBook ActiveX clsid access (web-activex.rules)
 * 1:11239 <-> DISABLED <-> WEB-ACTIVEX DXImageTransform.Microsoft.Redirect ActiveX clsid access (web-activex.rules)
 * 1:11241 <-> DISABLED <-> WEB-ACTIVEX DXImageTransform.Microsoft.Redirect ActiveX function call access (web-activex.rules)
 * 1:11243 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DAstatics ActiveX clsid access (web-activex.rules)
 * 1:11245 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation.DAstatics ActiveX function call access (web-activex.rules)
 * 1:11247 <-> DISABLED <-> WEB-ACTIVEX Research In Motion TeamOn Import ActiveX clsid access (web-activex.rules)
 * 1:11250 <-> DISABLED <-> WEB-ACTIVEX Sony Rootkit Uninstaller ActiveX clsid access (web-activex.rules)
 * 1:11252 <-> DISABLED <-> WEB-ACTIVEX IE Address ActiveX clsid access (web-activex.rules)
 * 1:11253 <-> DISABLED <-> WEB-ACTIVEX Microsoft MciWndx ActiveX clsid access (web-activex.rules)
 * 1:11255 <-> DISABLED <-> WEB-ACTIVEX Microsoft MciWndx ActiveX function call access (web-activex.rules)
 * 1:11268 <-> DISABLED <-> WEB-ACTIVEX Symantec Norton AntiVirus ActiveX clsid access (web-activex.rules)
 * 1:11270 <-> DISABLED <-> WEB-ACTIVEX Symantec Norton AntiVirus ActiveX function call access (web-activex.rules)
 * 1:11274 <-> DISABLED <-> WEB-ACTIVEX RControl ActiveX clsid access (web-activex.rules)
 * 1:11276 <-> DISABLED <-> WEB-ACTIVEX GDivX Zenith Player AVI Fixer ActiveX clsid access (web-activex.rules)
 * 1:11278 <-> DISABLED <-> WEB-ACTIVEX GDivX Zenith Player AVI Fixer ActiveX function call access (web-activex.rules)
 * 1:11280 <-> DISABLED <-> WEB-ACTIVEX FlexLabel ActiveX clsid access (web-activex.rules)
 * 1:11282 <-> DISABLED <-> WEB-ACTIVEX FlexLabel ActiveX function call access (web-activex.rules)
 * 1:11284 <-> DISABLED <-> WEB-ACTIVEX AudioCDRipper ActiveX clsid access (web-activex.rules)
 * 1:11286 <-> DISABLED <-> WEB-ACTIVEX AudioCDRipper ActiveX function call access (web-activex.rules)
 * 1:11288 <-> DISABLED <-> RPC portmap mountd tcp request (rpc.rules)
 * 1:11291 <-> DISABLED <-> WEB-ACTIVEX Hewlett Packard HPQVWOCX.DL ActiveX clsid access (web-activex.rules)
 * 1:11293 <-> DISABLED <-> WEB-ACTIVEX IDAutomation Linear Bar Code ActiveX clsid access (web-activex.rules)
 * 1:11295 <-> DISABLED <-> WEB-ACTIVEX IDAutomation Linear Bar Code ActiveX function call access (web-activex.rules)
 * 1:11297 <-> DISABLED <-> WEB-ACTIVEX Clever Database Comparer ActiveX clsid access (web-activex.rules)
 * 1:11299 <-> DISABLED <-> WEB-ACTIVEX Clever Database Comparer ActiveX function call access (web-activex.rules)
 * 1:11301 <-> DISABLED <-> WEB-ACTIVEX DB Software Laboratory DeWizardX ActiveX clsid access (web-activex.rules)
 * 1:11303 <-> DISABLED <-> WEB-ACTIVEX DB Software Laboratory DeWizardX ActiveX function call access (web-activex.rules)
 * 1:11324 <-> DISABLED <-> WEB-ACTIVEX Microsoft Input Method Editor 3 ActiveX function call access (web-activex.rules)
 * 1:11823 <-> DISABLED <-> WEB-ACTIVEX Yahoo Webcam Upload ActiveX clsid unicode access (web-activex.rules)
 * 1:11824 <-> DISABLED <-> WEB-ACTIVEX Yahoo Webcam Upload ActiveX function call access (web-activex.rules)
 * 1:11825 <-> DISABLED <-> WEB-ACTIVEX Yahoo Webcam Upload ActiveX function call unicode access (web-activex.rules)
 * 1:12010 <-> DISABLED <-> WEB-ACTIVEX RKD Software BarCode ActiveX clsid access (web-activex.rules)
 * 1:12012 <-> DISABLED <-> WEB-ACTIVEX RKD Software BarCode ActiveX function call access (web-activex.rules)
 * 1:12185 <-> DISABLED <-> RPC portmap 2112 tcp request (rpc.rules)
 * 1:12186 <-> DISABLED <-> RPC portmap 2112 udp request (rpc.rules)
 * 1:12256 <-> DISABLED <-> FILE-OFFICE Microsoft Office Excel malformed FBI record (file-office.rules)
 * 1:12270 <-> DISABLED <-> WEB-ACTIVEX Microsoft Visual Basic 6 TLIApplication ActiveX function call (web-activex.rules)
 * 1:12283 <-> DISABLED <-> FILE-IDENTIFY Microsoft Office Excel xlw file magic detected (file-identify.rules)
 * 1:12284 <-> DISABLED <-> FILE-OFFICE Microsoft Office Excel rtWnDesk record memory corruption exploit attempt (file-office.rules)
 * 1:1229 <-> DISABLED <-> FTP CWD ... (ftp.rules)
 * 1:12382 <-> DISABLED <-> WEB-ACTIVEX Oracle EasyMail Objects ActiveX clsid access (web-activex.rules)
 * 1:12393 <-> DISABLED <-> WEB-ACTIVEX Intuit QuickBooks Online Edition 1 ActiveX clsid access (web-activex.rules)
 * 1:12395 <-> DISABLED <-> WEB-ACTIVEX Intuit QuickBooks Online Edition 2 ActiveX clsid access (web-activex.rules)
 * 1:12397 <-> DISABLED <-> WEB-ACTIVEX Intuit QuickBooks Online Edition 3 ActiveX clsid access (web-activex.rules)
 * 1:12399 <-> DISABLED <-> WEB-ACTIVEX Intuit QuickBooks Online Edition 4 ActiveX clsid access (web-activex.rules)
 * 1:12401 <-> DISABLED <-> WEB-ACTIVEX Intuit QuickBooks Online Edition 5 ActiveX clsid access (web-activex.rules)
 * 1:12403 <-> DISABLED <-> WEB-ACTIVEX Intuit QuickBooks Online Edition 6 ActiveX clsid access (web-activex.rules)
 * 1:12405 <-> DISABLED <-> WEB-ACTIVEX Intuit QuickBooks Online Edition 7 ActiveX clsid access (web-activex.rules)
 * 1:12407 <-> DISABLED <-> WEB-ACTIVEX Intuit QuickBooks Online Edition 8 ActiveX clsid access (web-activex.rules)
 * 1:12409 <-> DISABLED <-> WEB-ACTIVEX Intuit QuickBooks Online Edition 9 ActiveX clsid access (web-activex.rules)
 * 1:12411 <-> DISABLED <-> WEB-ACTIVEX Intuit QuickBooks Online Edition 10 ActiveX clsid access (web-activex.rules)
 * 1:12417 <-> DISABLED <-> WEB-ACTIVEX Microsoft Visual FoxPro ActiveX clsid access (web-activex.rules)
 * 1:12419 <-> DISABLED <-> WEB-ACTIVEX Microsoft Visual FoxPro ActiveX function call access (web-activex.rules)
 * 1:12458 <-> DISABLED <-> RPC portmap Solaris sadmin port query tcp request (rpc.rules)
 * 1:12466 <-> DISABLED <-> WEB-ACTIVEX MW6 Technologies QRCode ActiveX clsid access (web-activex.rules)
 * 1:12474 <-> DISABLED <-> WEB-ACTIVEX Oracle Java Web Start ActiveX function call access (web-activex.rules)
 * 1:12608 <-> DISABLED <-> RPC portmap walld udp request (rpc.rules)
 * 1:12612 <-> DISABLED <-> WEB-ACTIVEX Microsoft Windows MFC Library ActiveX clsid access (web-activex.rules)
 * 1:12616 <-> DISABLED <-> WEB-ACTIVEX Microsoft Visual Studio 6 PDWizard.ocx ActiveX function call access (web-activex.rules)
 * 1:1262 <-> DISABLED <-> RPC portmap admind request TCP (rpc.rules)
 * 1:12626 <-> DISABLED <-> RPC portmap Solaris sadmin port query udp request (rpc.rules)
 * 1:1263 <-> DISABLED <-> RPC portmap amountd request TCP (rpc.rules)
 * 1:1264 <-> DISABLED <-> RPC portmap bootparam request TCP (rpc.rules)
 * 1:1265 <-> DISABLED <-> RPC portmap cmsd request TCP (rpc.rules)
 * 1:1267 <-> DISABLED <-> RPC portmap nisd request TCP (rpc.rules)
 * 1:1268 <-> DISABLED <-> RPC portmap pcnfsd request TCP (rpc.rules)
 * 1:1269 <-> DISABLED <-> RPC portmap rexd request TCP (rpc.rules)
 * 1:1270 <-> DISABLED <-> RPC portmap rstatd request TCP (rpc.rules)
 * 1:1271 <-> DISABLED <-> RPC portmap rusers request TCP (rpc.rules)
 * 1:1272 <-> DISABLED <-> RPC portmap sadmind request TCP (rpc.rules)
 * 1:1273 <-> DISABLED <-> RPC portmap selection_svc request TCP (rpc.rules)
 * 1:1274 <-> DISABLED <-> RPC portmap ttdbserv request TCP (rpc.rules)
 * 1:12746 <-> DISABLED <-> EXPLOIT Apple QuickTime STSD atom overflow attempt (exploit.rules)
 * 1:1275 <-> DISABLED <-> RPC portmap yppasswd request TCP (rpc.rules)
 * 1:12751 <-> DISABLED <-> WEB-ACTIVEX RichFX Basic Player ActiveX clsid access (web-activex.rules)
 * 1:12753 <-> DISABLED <-> WEB-ACTIVEX RichFX Basic Player ActiveX function call access (web-activex.rules)
 * 1:12755 <-> DISABLED <-> WEB-ACTIVEX PPStream PowerList ActiveX clsid access (web-activex.rules)
 * 1:1276 <-> DISABLED <-> RPC portmap ypserv request TCP (rpc.rules)
 * 1:12762 <-> DISABLED <-> WEB-ACTIVEX Yahoo Toolbar Helper Class ActiveX clsid access (web-activex.rules)
 * 1:12764 <-> DISABLED <-> WEB-ACTIVEX Yahoo Toolbar Helper Class ActiveX function call access (web-activex.rules)
 * 1:12767 <-> DISABLED <-> WEB-ACTIVEX RealNetworks RealPlayer RMOC3260.DLL ActiveX function call access (web-activex.rules)
 * 1:12768 <-> DISABLED <-> WEB-ACTIVEX RealNetworks RealPlayer RMOC3260.DLL ActiveX function call access (web-activex.rules)
 * 1:1277 <-> DISABLED <-> RPC portmap ypupdated request UDP (rpc.rules)
 * 1:1279 <-> DISABLED <-> RPC portmap snmpXdmi request UDP (rpc.rules)
 * 1:1280 <-> DISABLED <-> RPC portmap listing UDP 111 (rpc.rules)
 * 1:12803 <-> DISABLED <-> WEB-ACTIVEX VideoLAN VLC ActiveX clsid access (web-activex.rules)
 * 1:12805 <-> DISABLED <-> WEB-ACTIVEX VideoLAN VLC ActiveX function call access (web-activex.rules)
 * 1:12948 <-> DISABLED <-> WEB-ACTIVEX Vantage Linguistics 1 ActiveX clsid access (web-activex.rules)
 * 1:12950 <-> DISABLED <-> WEB-ACTIVEX Vantage Linguistics 2 ActiveX clsid access (web-activex.rules)
 * 1:12952 <-> DISABLED <-> WEB-ACTIVEX Vantage Linguistics 3 ActiveX clsid access (web-activex.rules)
 * 1:12954 <-> DISABLED <-> WEB-ACTIVEX DXLTPI.DLL ActiveX clsid access (web-activex.rules)
 * 1:12957 <-> DISABLED <-> WEB-ACTIVEX MSN Heartbeat 2 ActiveX clsid access (web-activex.rules)
 * 1:12959 <-> DISABLED <-> WEB-ACTIVEX MSN Heartbeat 3 ActiveX clsid access (web-activex.rules)
 * 1:12961 <-> DISABLED <-> WEB-ACTIVEX Intuit QuickBooks Online Import 1 ActiveX clsid access (web-activex.rules)
 * 1:12963 <-> DISABLED <-> WEB-ACTIVEX Intuit QuickBooks Online Import 2 ActiveX clsid access (web-activex.rules)
 * 1:12965 <-> DISABLED <-> WEB-ACTIVEX Intuit QuickBooks Online Import 3 ActiveX clsid access (web-activex.rules)
 * 1:12967 <-> DISABLED <-> WEB-ACTIVEX Intuit QuickBooks Online Import 4 ActiveX clsid access (web-activex.rules)
 * 1:12969 <-> DISABLED <-> WEB-ACTIVEX Intuit QuickBooks Online Import 5 ActiveX clsid access (web-activex.rules)
 * 1:13216 <-> DISABLED <-> WEB-ACTIVEX ShockwaveFlash.ShockwaveFlash ActiveX function call access (web-activex.rules)
 * 1:13226 <-> DISABLED <-> WEB-ACTIVEX Yahoo Toolbar YShortcut ActiveX function call access (web-activex.rules)
 * 1:13258 <-> DISABLED <-> WEB-ACTIVEX IBM Lotus Domino Web Access 6 ActiveX clsid access (web-activex.rules)
 * 1:13260 <-> DISABLED <-> WEB-ACTIVEX IBM Lotus Domino Web Access 6 ActiveX function call access (web-activex.rules)
 * 1:13264 <-> DISABLED <-> WEB-ACTIVEX IBM Lotus Domino Web Access 7 ActiveX function call access (web-activex.rules)
 * 1:13266 <-> DISABLED <-> WEB-ACTIVEX SkyFex Client ActiveX clsid access (web-activex.rules)
 * 1:13273 <-> DISABLED <-> WEB-ACTIVEX DivX Web Player ActiveX clsid access (web-activex.rules)
 * 1:13275 <-> DISABLED <-> WEB-ACTIVEX DivX Web Player ActiveX function call access (web-activex.rules)
 * 1:13289 <-> DISABLED <-> WEB-ACTIVEX Gatway CWebLaunchCtl ActiveX clsid access (web-activex.rules)
 * 1:13296 <-> DISABLED <-> WEB-ACTIVEX Microsoft Rich TextBox ActiveX clsid access (web-activex.rules)
 * 1:13298 <-> DISABLED <-> WEB-ACTIVEX Microsoft Rich TextBox ActiveX function call access (web-activex.rules)
 * 1:13305 <-> DISABLED <-> WEB-ACTIVEX Microsoft Visual FoxPro 2 ActiveX function call access (web-activex.rules)
 * 1:13312 <-> DISABLED <-> WEB-ACTIVEX StreamAudio ProxyManager ActiveX clsid access (web-activex.rules)
 * 1:13314 <-> DISABLED <-> WEB-ACTIVEX StreamAudio ProxyManager ActiveX function call access (web-activex.rules)
 * 1:13323 <-> DISABLED <-> WEB-ACTIVEX Microsoft Package and Deployment Wizard ActiveX function call access (web-activex.rules)
 * 1:13325 <-> DISABLED <-> WEB-ACTIVEX Macrovision FLEXnet Connect ActiveX clsid access (web-activex.rules)
 * 1:13327 <-> DISABLED <-> WEB-ACTIVEX Macrovision FLEXnet Connect ActiveX function call access (web-activex.rules)
 * 1:13329 <-> DISABLED <-> WEB-ACTIVEX Toshiba Surveillance Surveillix DVR ActiveX clsid access (web-activex.rules)
 * 1:13331 <-> DISABLED <-> WEB-ACTIVEX Toshiba Surveillance Surveillix DVR ActiveX function call access (web-activex.rules)
 * 1:13333 <-> DISABLED <-> WEB-ACTIVEX HP Virtual Rooms ActiveX clsid access (web-activex.rules)
 * 1:13335 <-> DISABLED <-> WEB-ACTIVEX Lycos File Upload Component ActiveX clsid access (web-activex.rules)
 * 1:13337 <-> DISABLED <-> WEB-ACTIVEX Comodo AntiVirus ActiveX clsid access (web-activex.rules)
 * 1:13348 <-> DISABLED <-> WEB-ACTIVEX Move Networks Media Player ActiveX clsid access (web-activex.rules)
 * 1:13350 <-> DISABLED <-> WEB-ACTIVEX Move Networks Media Player ActiveX function call access (web-activex.rules)
 * 1:13352 <-> DISABLED <-> WEB-ACTIVEX Lycos File Upload Component ActiveX function call access (web-activex.rules)
 * 1:13354 <-> DISABLED <-> WEB-ACTIVEX HP Virtual Rooms ActiveX function call access (web-activex.rules)
 * 1:13360 <-> DISABLED <-> POLICY failed FTP login attempt (policy.rules)
 * 1:13423 <-> DISABLED <-> WEB-ACTIVEX SwiftView ActiveX clsid access (web-activex.rules)
 * 1:13426 <-> DISABLED <-> WEB-ACTIVEX Yahoo Music JukeBox DataGrid ActiveX clsid access (web-activex.rules)
 * 1:13428 <-> DISABLED <-> WEB-ACTIVEX Yahoo Music JukeBox DataGrid ActiveX function call access (web-activex.rules)
 * 1:13430 <-> DISABLED <-> WEB-ACTIVEX Yahoo Music JukeBox MediaGrid ActiveX clsid access (web-activex.rules)
 * 1:13432 <-> DISABLED <-> WEB-ACTIVEX Yahoo Music JukeBox MediaGrid ActiveX function call access (web-activex.rules)
 * 1:13446 <-> DISABLED <-> WEB-ACTIVEX GlobalLink HanGamePlugin ActiveX clsid access (web-activex.rules)
 * 1:13517 <-> DISABLED <-> EXPLOIT Apple QTIF malformed idsc atom (exploit.rules)
 * 1:13525 <-> DISABLED <-> WEB-ACTIVEX Novell iPrint ActiveX function call access (web-activex.rules)
 * 1:13527 <-> DISABLED <-> WEB-ACTIVEX D-Link MPEG4 SHM Audio Control ActiveX clsid access (web-activex.rules)
 * 1:13529 <-> DISABLED <-> WEB-ACTIVEX D-Link MPEG4 SHM Audio Control ActiveX function call access (web-activex.rules)
 * 1:13531 <-> DISABLED <-> WEB-ACTIVEX 4xem VatCtrl ActiveX clsid access (web-activex.rules)
 * 1:13533 <-> DISABLED <-> WEB-ACTIVEX 4xem VatCtrl ActiveX function call access (web-activex.rules)
 * 1:13535 <-> DISABLED <-> WEB-ACTIVEX Vivotek RTSP MPEG4 SP Control ActiveX clsid access (web-activex.rules)
 * 1:13537 <-> DISABLED <-> WEB-ACTIVEX Vivotek RTSP MPEG4 SP Control ActiveX function call access (web-activex.rules)
 * 1:13541 <-> DISABLED <-> WEB-ACTIVEX Symantec Backup Exec ActiveX function call access (web-activex.rules)
 * 1:13543 <-> DISABLED <-> WEB-ACTIVEX Learn2 STRunner ActiveX clsid access (web-activex.rules)
 * 1:13545 <-> DISABLED <-> WEB-ACTIVEX Learn2 STRunner ActiveX function call access (web-activex.rules)
 * 1:13547 <-> DISABLED <-> WEB-ACTIVEX Sony ImageStation ActiveX clsid access (web-activex.rules)
 * 1:13549 <-> DISABLED <-> WEB-ACTIVEX Sony ImageStation ActiveX function call access (web-activex.rules)
 * 1:13595 <-> DISABLED <-> WEB-ACTIVEX ICQ Toolbar toolbaru.dll ActiveX clsid access (web-activex.rules)
 * 1:13597 <-> DISABLED <-> WEB-ACTIVEX ICQ Toolbar toolbaru.dll ActiveX function call access (web-activex.rules)
 * 1:13599 <-> DISABLED <-> WEB-ACTIVEX Kingsoft Antivirus Online Update Module ActiveX clsid access (web-activex.rules)
 * 1:13601 <-> DISABLED <-> WEB-ACTIVEX Kingsoft Antivirus Online Update Module ActiveX function call access (web-activex.rules)
 * 1:13605 <-> DISABLED <-> WEB-ACTIVEX RealNetworks RealPlayer RAM Download Handler ActiveX function call access (web-activex.rules)
 * 1:13607 <-> DISABLED <-> WEB-ACTIVEX RealNetworks RealPlayer RMOC3260.DLL Vulnerble Property ActiveX clsid access (web-activex.rules)
 * 1:13609 <-> DISABLED <-> WEB-ACTIVEX RealNetworks RealPlayer RMOC3260.DLL Vulnerble Property ActiveX function call access (web-activex.rules)
 * 1:13613 <-> DISABLED <-> SPECIFIC-THREATS Solaris username overflow authentication bypass attempt (specific-threats.rules)
 * 1:13619 <-> DISABLED <-> SPECIFIC-THREATS Microsoft Windows getBulkRequest memory corruption attempt (specific-threats.rules)
 * 1:13623 <-> DISABLED <-> WEB-ACTIVEX CA BrightStor ListCtrl ActiveX function call access (web-activex.rules)
 * 1:13657 <-> DISABLED <-> WEB-ACTIVEX BusinessObjects RptViewerAx ActiveX clsid access (web-activex.rules)
 * 1:13659 <-> DISABLED <-> WEB-ACTIVEX BusinessObjects RptViewerAx ActiveX function call access (web-activex.rules)
 * 1:13661 <-> DISABLED <-> WEB-ACTIVEX VeralSoft HTTP File Upload ActiveX clsid access (web-activex.rules)
 * 1:13679 <-> DISABLED <-> WEB-ACTIVEX IBiz EBanking Integrator ActiveX clsid access (web-activex.rules)
 * 1:13681 <-> DISABLED <-> WEB-ACTIVEX CDNetworks Nefficient Download ActiveX clsid access (web-activex.rules)
 * 1:13683 <-> DISABLED <-> WEB-ACTIVEX CDNetworks Nefficient Download ActiveX function call access (web-activex.rules)
 * 1:13685 <-> DISABLED <-> WEB-ACTIVEX Chilkat HTTP 1 ActiveX clsid access (web-activex.rules)
 * 1:13687 <-> DISABLED <-> WEB-ACTIVEX Chilkat HTTP 1 ActiveX function call access (web-activex.rules)
 * 1:13689 <-> DISABLED <-> WEB-ACTIVEX Chilkat HTTP 2 ActiveX clsid access (web-activex.rules)
 * 1:13691 <-> DISABLED <-> WEB-ACTIVEX Chilkat HTTP 2 ActiveX function call access (web-activex.rules)
 * 1:13699 <-> DISABLED <-> WEB-ACTIVEX CA DSM gui_cm_ctrls ActiveX clsid access (web-activex.rules)
 * 1:13720 <-> DISABLED <-> WEB-ACTIVEX HP eSupportDiagnostics 3 ActiveX clsid access (web-activex.rules)
 * 1:13722 <-> DISABLED <-> WEB-ACTIVEX HP eSupportDiagnostics 4 ActiveX clsid access (web-activex.rules)
 * 1:13724 <-> DISABLED <-> WEB-ACTIVEX HP eSupportDiagnostics 5 ActiveX clsid access (web-activex.rules)
 * 1:13726 <-> DISABLED <-> WEB-ACTIVEX HP eSupportDiagnostics 6 ActiveX clsid access (web-activex.rules)
 * 1:13728 <-> DISABLED <-> WEB-ACTIVEX HP eSupportDiagnostics 7 ActiveX clsid access (web-activex.rules)
 * 1:13730 <-> DISABLED <-> WEB-ACTIVEX HP eSupportDiagnostics 8 ActiveX clsid access (web-activex.rules)
 * 1:13732 <-> DISABLED <-> WEB-ACTIVEX HP eSupportDiagnostics 9 ActiveX clsid access (web-activex.rules)
 * 1:13736 <-> DISABLED <-> WEB-ACTIVEX HP eSupportDiagnostics 11 ActiveX clsid access (web-activex.rules)
 * 1:13738 <-> DISABLED <-> WEB-ACTIVEX HP eSupportDiagnostics 12 ActiveX clsid access (web-activex.rules)
 * 1:13740 <-> DISABLED <-> WEB-ACTIVEX HP eSupportDiagnostics 13 ActiveX clsid access (web-activex.rules)
 * 1:13742 <-> DISABLED <-> WEB-ACTIVEX HP eSupportDiagnostics 14 ActiveX clsid access (web-activex.rules)
 * 1:13744 <-> DISABLED <-> WEB-ACTIVEX HP eSupportDiagnostics 15 ActiveX clsid access (web-activex.rules)
 * 1:13746 <-> DISABLED <-> WEB-ACTIVEX HP eSupportDiagnostics 16 ActiveX clsid access (web-activex.rules)
 * 1:13748 <-> DISABLED <-> WEB-ACTIVEX HP eSupportDiagnostics 17 ActiveX clsid access (web-activex.rules)
 * 1:13750 <-> DISABLED <-> WEB-ACTIVEX HP eSupportDiagnostics 18 ActiveX clsid access (web-activex.rules)
 * 1:13752 <-> DISABLED <-> WEB-ACTIVEX HP eSupportDiagnostics 19 ActiveX clsid access (web-activex.rules)
 * 1:13754 <-> DISABLED <-> WEB-ACTIVEX HP eSupportDiagnostics 20 ActiveX clsid access (web-activex.rules)
 * 1:13756 <-> DISABLED <-> WEB-ACTIVEX HP eSupportDiagnostics 21 ActiveX clsid access (web-activex.rules)
 * 1:13758 <-> DISABLED <-> WEB-ACTIVEX Microsoft HeartbeatCtl ActiveX clsid access (web-activex.rules)
 * 1:13760 <-> DISABLED <-> WEB-ACTIVEX Microsoft HeartbeatCtl ActiveX function call access (web-activex.rules)
 * 1:1377 <-> DISABLED <-> FTP wu-ftp bad file completion attempt (ftp.rules)
 * 1:1378 <-> DISABLED <-> FTP wu-ftp bad file completion attempt (ftp.rules)
 * 1:13783 <-> DISABLED <-> WEB-ACTIVEX Yahoo Assistant ActiveX clsid access (web-activex.rules)
 * 1:13785 <-> DISABLED <-> WEB-ACTIVEX Ourgame GLWorld ActiveX clsid access (web-activex.rules)
 * 1:13787 <-> DISABLED <-> WEB-ACTIVEX Ourgame GLWorld ActiveX function call access (web-activex.rules)
 * 1:1379 <-> DISABLED <-> FTP STAT overflow attempt (ftp.rules)
 * 1:13857 <-> DISABLED <-> WEB-ACTIVEX HP Instant Support DataManager ActiveX clsid access (web-activex.rules)
 * 1:13859 <-> DISABLED <-> WEB-ACTIVEX HP Instant Support DataManager ActiveX function call access (web-activex.rules)
 * 1:13864 <-> DISABLED <-> POLICY-OTHER Microsoft Watson error reporting attempt (policy-other.rules)
 * 1:13883 <-> DISABLED <-> WEB-ACTIVEX UUSee UUUpgrade ActiveX clsid access (web-activex.rules)
 * 1:13885 <-> DISABLED <-> WEB-ACTIVEX UUSee UUUpgrade ActiveX function call access (web-activex.rules)
 * 1:13903 <-> DISABLED <-> WEB-ACTIVEX Microsoft Access Snapshot Viewer 1 ActiveX clsid access (web-activex.rules)
 * 1:13907 <-> DISABLED <-> WEB-ACTIVEX Microsoft Access Snapshot Viewer 2 ActiveX clsid access (web-activex.rules)
 * 1:13965 <-> DISABLED <-> WEB-ACTIVEX Microsoft Message System ActiveX clsid access (web-activex.rules)
 * 1:13967 <-> DISABLED <-> WEB-ACTIVEX Microsoft Message System ActiveX function call access (web-activex.rules)
 * 1:14015 <-> DISABLED <-> WEB-ACTIVEX WebEx Meeting Manager atucfobj ActiveX function call access (web-activex.rules)
 * 1:14023 <-> DISABLED <-> WEB-ACTIVEX Microsoft Visual Studio Msmask32 ActiveX function call access (web-activex.rules)
 * 1:14027 <-> DISABLED <-> WEB-ACTIVEX CA DSM gui_cm_ctrls ActiveX function call access (web-activex.rules)
 * 1:14029 <-> DISABLED <-> WEB-ACTIVEX Computer Associates gui_cm_ctrls ActiveX clsid access (web-activex.rules)
 * 1:14031 <-> DISABLED <-> WEB-ACTIVEX Computer Associates gui_cm_ctrls ActiveX function call access (web-activex.rules)
 * 1:14042 <-> DISABLED <-> WEB-ACTIVEX RealNetworks RealPlayer General Property Page ActiveX clsid access (web-activex.rules)
 * 1:14044 <-> DISABLED <-> WEB-ACTIVEX RealNetworks RealPlayer Playback Handler ActiveX function call access (web-activex.rules)
 * 1:14046 <-> DISABLED <-> WEB-ACTIVEX RealNetworks RealPlayer RMP Download Handler ActiveX function call access (web-activex.rules)
 * 1:14048 <-> DISABLED <-> WEB-ACTIVEX RealNetworks RealPlayer RNX Download Handler ActiveX function call access (web-activex.rules)
 * 1:14050 <-> DISABLED <-> WEB-ACTIVEX RealNetworks RealPlayer SMIL Download Handler ActiveX function call access (web-activex.rules)
 * 1:14052 <-> DISABLED <-> WEB-ACTIVEX RealNetworks RealPlayer Stream Handler ActiveX function call access (web-activex.rules)
 * 1:14088 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 1 ActiveX clsid access (web-activex.rules)
 * 1:14090 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 2 ActiveX clsid access (web-activex.rules)
 * 1:14092 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 3 ActiveX clsid access (web-activex.rules)
 * 1:14094 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 4 ActiveX clsid access (web-activex.rules)
 * 1:14096 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 5 ActiveX clsid access (web-activex.rules)
 * 1:14098 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 6 ActiveX clsid access (web-activex.rules)
 * 1:14100 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 7 ActiveX clsid access (web-activex.rules)
 * 1:14102 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 8 ActiveX clsid access (web-activex.rules)
 * 1:14104 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 9 ActiveX clsid access (web-activex.rules)
 * 1:14106 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 10 ActiveX clsid access (web-activex.rules)
 * 1:14108 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 11 ActiveX clsid access (web-activex.rules)
 * 1:14110 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 12 ActiveX clsid access (web-activex.rules)
 * 1:14112 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 13 ActiveX clsid access (web-activex.rules)
 * 1:14114 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 14 ActiveX clsid access (web-activex.rules)
 * 1:14116 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 15 ActiveX clsid access (web-activex.rules)
 * 1:14118 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 16 ActiveX clsid access (web-activex.rules)
 * 1:14120 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 17 ActiveX clsid access (web-activex.rules)
 * 1:14122 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 18 ActiveX clsid access (web-activex.rules)
 * 1:14124 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 19 ActiveX clsid access (web-activex.rules)
 * 1:14126 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 20 ActiveX clsid access (web-activex.rules)
 * 1:14128 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 21 ActiveX clsid access (web-activex.rules)
 * 1:14130 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 22 ActiveX clsid access (web-activex.rules)
 * 1:14132 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 23 ActiveX clsid access (web-activex.rules)
 * 1:14134 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 24 ActiveX clsid access (web-activex.rules)
 * 1:14136 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 25 ActiveX clsid access (web-activex.rules)
 * 1:14138 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 26 ActiveX clsid access (web-activex.rules)
 * 1:14140 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 27 ActiveX clsid access (web-activex.rules)
 * 1:14142 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 28 ActiveX clsid access (web-activex.rules)
 * 1:14144 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 29 ActiveX clsid access (web-activex.rules)
 * 1:14146 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 30 ActiveX clsid access (web-activex.rules)
 * 1:14150 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 32 ActiveX clsid access (web-activex.rules)
 * 1:14152 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 33 ActiveX clsid access (web-activex.rules)
 * 1:14154 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 34 ActiveX clsid access (web-activex.rules)
 * 1:14156 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 35 ActiveX clsid access (web-activex.rules)
 * 1:14158 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 36 ActiveX clsid access (web-activex.rules)
 * 1:14160 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 37 ActiveX clsid access (web-activex.rules)
 * 1:14162 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 38 ActiveX clsid access (web-activex.rules)
 * 1:14164 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 39 ActiveX clsid access (web-activex.rules)
 * 1:14166 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 40 ActiveX clsid access (web-activex.rules)
 * 1:14168 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 41 ActiveX clsid access (web-activex.rules)
 * 1:14172 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 43 ActiveX clsid access (web-activex.rules)
 * 1:14174 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 44 ActiveX clsid access (web-activex.rules)
 * 1:14176 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 45 ActiveX clsid access (web-activex.rules)
 * 1:14178 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 46 ActiveX clsid access (web-activex.rules)
 * 1:14180 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 47 ActiveX clsid access (web-activex.rules)
 * 1:14182 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 48 ActiveX clsid access (web-activex.rules)
 * 1:14184 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 49 ActiveX clsid access (web-activex.rules)
 * 1:14186 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 50 ActiveX clsid access (web-activex.rules)
 * 1:14188 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 51 ActiveX clsid access (web-activex.rules)
 * 1:14190 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 52 ActiveX clsid access (web-activex.rules)
 * 1:14192 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 53 ActiveX clsid access (web-activex.rules)
 * 1:14194 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 54 ActiveX clsid access (web-activex.rules)
 * 1:14196 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 55 ActiveX clsid access (web-activex.rules)
 * 1:14198 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 56 ActiveX clsid access (web-activex.rules)
 * 1:14200 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 57 ActiveX clsid access (web-activex.rules)
 * 1:14202 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 58 ActiveX clsid access (web-activex.rules)
 * 1:14204 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 59 ActiveX clsid access (web-activex.rules)
 * 1:14206 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 60 ActiveX clsid access (web-activex.rules)
 * 1:14208 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 61 ActiveX clsid access (web-activex.rules)
 * 1:14210 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 62 ActiveX clsid access (web-activex.rules)
 * 1:14212 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 63 ActiveX clsid access (web-activex.rules)
 * 1:14214 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 64 ActiveX clsid access (web-activex.rules)
 * 1:14216 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 65 ActiveX clsid access (web-activex.rules)
 * 1:14218 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 66 ActiveX clsid access (web-activex.rules)
 * 1:14220 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 67 ActiveX clsid access (web-activex.rules)
 * 1:14222 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 68 ActiveX clsid access (web-activex.rules)
 * 1:14224 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 69 ActiveX clsid access (web-activex.rules)
 * 1:14226 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 70 ActiveX clsid access (web-activex.rules)
 * 1:14228 <-> DISABLED <-> WEB-ACTIVEX Aurigma unspecified 71 ActiveX clsid access (web-activex.rules)
 * 1:14231 <-> DISABLED <-> WEB-ACTIVEX SoftArtisans XFile FileManager ActiveX clsid access (web-activex.rules)
 * 1:14233 <-> DISABLED <-> WEB-ACTIVEX SoftArtisans XFile FileManager ActiveX function call access (web-activex.rules)
 * 1:14235 <-> DISABLED <-> WEB-ACTIVEX Microsoft Windows Media Services ActiveX clsid access (web-activex.rules)
 * 1:14237 <-> DISABLED <-> WEB-ACTIVEX Microsoft Windows Media Services ActiveX function call access (web-activex.rules)
 * 1:14239 <-> DISABLED <-> WEB-ACTIVEX Friendly Technologies fwRemoteConfig ActiveX clsid access (web-activex.rules)
 * 1:14241 <-> DISABLED <-> WEB-ACTIVEX Friendly Technologies fwRemoteConfig ActiveX function call access (web-activex.rules)
 * 1:14243 <-> DISABLED <-> WEB-ACTIVEX Najdi.si Toolbar ActiveX clsid access (web-activex.rules)
 * 1:14245 <-> DISABLED <-> WEB-ACTIVEX Najdi.si Toolbar ActiveX function call access (web-activex.rules)
 * 1:14247 <-> DISABLED <-> WEB-ACTIVEX Eyeball MessengerSDK ActiveX clsid access (web-activex.rules)
 * 1:14249 <-> DISABLED <-> WEB-ACTIVEX Eyeball MessengerSDK ActiveX function call access (web-activex.rules)
 * 1:14266 <-> DISABLED <-> WEB-ACTIVEX Microsoft Windows Image Acquisition Logger ActiveX clsid access (web-activex.rules)
 * 1:14268 <-> DISABLED <-> WEB-ACTIVEX Microsoft Windows Image Acquisition Logger ActiveX function call access (web-activex.rules)
 * 1:14270 <-> DISABLED <-> WEB-ACTIVEX VieLib2.Vie2Locator ActiveX clsid access (web-activex.rules)
 * 1:14272 <-> DISABLED <-> WEB-ACTIVEX VieLib2.Vie2Locator ActiveX function call access (web-activex.rules)
 * 1:14274 <-> DISABLED <-> WEB-ACTIVEX Vie2Lib.Vie2LinuxVolume ActiveX clsid access (web-activex.rules)
 * 1:14276 <-> DISABLED <-> WEB-ACTIVEX Vie2Lib.Vie2LinuxVolume ActiveX function call access (web-activex.rules)
 * 1:14278 <-> DISABLED <-> WEB-ACTIVEX VieLib2.Vie2Process ActiveX clsid access (web-activex.rules)
 * 1:14280 <-> DISABLED <-> WEB-ACTIVEX VieLib2.Vie2Process ActiveX function call access (web-activex.rules)
 * 1:14282 <-> DISABLED <-> WEB-ACTIVEX IntraProcessLogging.Logger ActiveX clsid access (web-activex.rules)
 * 1:14284 <-> DISABLED <-> WEB-ACTIVEX IntraProcessLogging.Logger ActiveX function call access (web-activex.rules)
 * 1:14286 <-> DISABLED <-> WEB-ACTIVEX VMClientHosts Class ActiveX clsid access (web-activex.rules)
 * 1:14288 <-> DISABLED <-> WEB-ACTIVEX VMClientHosts Class ActiveX function call access (web-activex.rules)
 * 1:14290 <-> DISABLED <-> WEB-ACTIVEX VhdCvtCom.DiskLibCreateParamObj ActiveX clsid access (web-activex.rules)
 * 1:14292 <-> DISABLED <-> WEB-ACTIVEX VhdCvtCom.DiskLibCreateParamObj ActiveX function call access (web-activex.rules)
 * 1:14294 <-> DISABLED <-> WEB-ACTIVEX RemoteDirDlg Class ActiveX clsid access (web-activex.rules)
 * 1:14296 <-> DISABLED <-> WEB-ACTIVEX RemoteDirDlg Class ActiveX function call access (web-activex.rules)
 * 1:14298 <-> DISABLED <-> WEB-ACTIVEX TeamListViewWnd Class ActiveX clsid access (web-activex.rules)
 * 1:14300 <-> DISABLED <-> WEB-ACTIVEX TeamListViewWnd Class ActiveX function call access (web-activex.rules)
 * 1:14302 <-> DISABLED <-> WEB-ACTIVEX VMStatusbarCtl Class ActiveX clsid access (web-activex.rules)
 * 1:14304 <-> DISABLED <-> WEB-ACTIVEX VMStatusbarCtl Class ActiveX function call access (web-activex.rules)
 * 1:14306 <-> DISABLED <-> WEB-ACTIVEX Vmc2vmx.CoVPCConfiguration ActiveX clsid access (web-activex.rules)
 * 1:14308 <-> DISABLED <-> WEB-ACTIVEX Vmc2vmx.CoVPCConfiguration ActiveX function call access (web-activex.rules)
 * 1:14310 <-> DISABLED <-> WEB-ACTIVEX VmdbUpdate Class ActiveX clsid access (web-activex.rules)
 * 1:14312 <-> DISABLED <-> WEB-ACTIVEX VmdbUpdate Class ActiveX function call access (web-activex.rules)
 * 1:14314 <-> DISABLED <-> WEB-ACTIVEX VMWare unspecified 1 ActiveX clsid access (web-activex.rules)
 * 1:14316 <-> DISABLED <-> WEB-ACTIVEX VmdbExecuteError Class ActiveX clsid access (web-activex.rules)
 * 1:14318 <-> DISABLED <-> WEB-ACTIVEX VmdbExecuteError Class ActiveX function call access (web-activex.rules)
 * 1:14320 <-> DISABLED <-> WEB-ACTIVEX VMWare unspecified 2 ActiveX clsid access (web-activex.rules)
 * 1:14322 <-> DISABLED <-> WEB-ACTIVEX reconfig.SysImageUti ActiveX clsid access (web-activex.rules)
 * 1:14324 <-> DISABLED <-> WEB-ACTIVEX reconfig.SysImageUti ActiveX function call access (web-activex.rules)
 * 1:14326 <-> DISABLED <-> WEB-ACTIVEX Microsoft Visual Database Tools Query Designer V7.0 ActiveX clsid access (web-activex.rules)
 * 1:14328 <-> DISABLED <-> WEB-ACTIVEX Microsoft Visual Database Tools Query Designer V7.0 ActiveX function call access (web-activex.rules)
 * 1:14330 <-> DISABLED <-> WEB-ACTIVEX VmdbContext Class ActiveX clsid access (web-activex.rules)
 * 1:14332 <-> DISABLED <-> WEB-ACTIVEX VmdbContext Class ActiveX function call access (web-activex.rules)
 * 1:14334 <-> DISABLED <-> WEB-ACTIVEX VMClientVMs Class ActiveX clsid access (web-activex.rules)
 * 1:14336 <-> DISABLED <-> WEB-ACTIVEX VMClientVMs Class ActiveX function call access (web-activex.rules)
 * 1:14338 <-> DISABLED <-> WEB-ACTIVEX vmappPropObj Class ActiveX clsid access (web-activex.rules)
 * 1:14340 <-> DISABLED <-> WEB-ACTIVEX vmappPropObj Class ActiveX function call access (web-activex.rules)
 * 1:14342 <-> DISABLED <-> WEB-ACTIVEX VMWare unspecified 3 ActiveX clsid access (web-activex.rules)
 * 1:14344 <-> DISABLED <-> WEB-ACTIVEX VMMsg Class ActiveX clsid access (web-activex.rules)
 * 1:14346 <-> DISABLED <-> WEB-ACTIVEX VMMsg Class ActiveX function call access (web-activex.rules)
 * 1:14348 <-> DISABLED <-> WEB-ACTIVEX VMWare unspecified 4 ActiveX clsid access (web-activex.rules)
 * 1:14350 <-> DISABLED <-> WEB-ACTIVEX reconfig.PopulatedDi ActiveX clsid access (web-activex.rules)
 * 1:14352 <-> DISABLED <-> WEB-ACTIVEX reconfig.PopulatedDi ActiveX function call access (web-activex.rules)
 * 1:14354 <-> DISABLED <-> WEB-ACTIVEX Elevated.ElevMgr ActiveX clsid access (web-activex.rules)
 * 1:14356 <-> DISABLED <-> WEB-ACTIVEX Elevated.ElevMgr ActiveX function call access (web-activex.rules)
 * 1:14358 <-> DISABLED <-> WEB-ACTIVEX VMWare unspecified 5 ActiveX clsid access (web-activex.rules)
 * 1:14360 <-> DISABLED <-> WEB-ACTIVEX HardwareCtl Class ActiveX clsid access (web-activex.rules)
 * 1:14362 <-> DISABLED <-> WEB-ACTIVEX HardwareCtl Class ActiveX function call access (web-activex.rules)
 * 1:14364 <-> DISABLED <-> WEB-ACTIVEX VMWare unspecified 6 ActiveX clsid access (web-activex.rules)
 * 1:14366 <-> DISABLED <-> WEB-ACTIVEX VmdbQuery Class ActiveX clsid access (web-activex.rules)
 * 1:14368 <-> DISABLED <-> WEB-ACTIVEX VmdbQuery Class ActiveX function call access (web-activex.rules)
 * 1:14370 <-> DISABLED <-> WEB-ACTIVEX vmappPropObj2 Class ActiveX clsid access (web-activex.rules)
 * 1:14372 <-> DISABLED <-> WEB-ACTIVEX vmappPropObj2 Class ActiveX function call access (web-activex.rules)
 * 1:14374 <-> DISABLED <-> WEB-ACTIVEX VmappPoll Class ActiveX clsid access (web-activex.rules)
 * 1:14376 <-> DISABLED <-> WEB-ACTIVEX VmappPoll Class ActiveX function call access (web-activex.rules)
 * 1:14378 <-> DISABLED <-> WEB-ACTIVEX VMClient Class ActiveX clsid access (web-activex.rules)
 * 1:14380 <-> DISABLED <-> WEB-ACTIVEX VMClient Class ActiveX function call access (web-activex.rules)
 * 1:14382 <-> DISABLED <-> WEB-ACTIVEX Pq2vcom.Pq2v ActiveX clsid access (web-activex.rules)
 * 1:14384 <-> DISABLED <-> WEB-ACTIVEX Pq2vcom.Pq2v ActiveX function call access (web-activex.rules)
 * 1:14386 <-> DISABLED <-> WEB-ACTIVEX VmdbSchema Class ActiveX clsid access (web-activex.rules)
 * 1:14388 <-> DISABLED <-> WEB-ACTIVEX VmdbSchema Class ActiveX function call access (web-activex.rules)
 * 1:14394 <-> DISABLED <-> WEB-ACTIVEX VixCOM.VixLib ActiveX clsid access (web-activex.rules)
 * 1:14396 <-> DISABLED <-> WEB-ACTIVEX VixCOM.VixLib ActiveX function call access (web-activex.rules)
 * 1:14398 <-> DISABLED <-> WEB-ACTIVEX vmappsdk.CuiObj ActiveX clsid access (web-activex.rules)
 * 1:144 <-> DISABLED <-> FTP ADMw0rm ftp login attempt (ftp.rules)
 * 1:14400 <-> DISABLED <-> WEB-ACTIVEX vmappsdk.CuiObj ActiveX function call access (web-activex.rules)
 * 1:14402 <-> DISABLED <-> WEB-ACTIVEX RemoteBrowseDlg Class ActiveX clsid access (web-activex.rules)
 * 1:14404 <-> DISABLED <-> WEB-ACTIVEX RemoteBrowseDlg Class ActiveX function call access (web-activex.rules)
 * 1:14406 <-> DISABLED <-> WEB-ACTIVEX RegVmsCtl Class ActiveX clsid access (web-activex.rules)
 * 1:14408 <-> DISABLED <-> WEB-ACTIVEX RegVmsCtl Class ActiveX function call access (web-activex.rules)
 * 1:14410 <-> DISABLED <-> WEB-ACTIVEX VmdbEnumTags Class ActiveX clsid access (web-activex.rules)
 * 1:14412 <-> DISABLED <-> WEB-ACTIVEX VmdbEnumTags Class ActiveX function call access (web-activex.rules)
 * 1:14414 <-> DISABLED <-> WEB-ACTIVEX VMWare unspecified 7 ActiveX clsid access (web-activex.rules)
 * 1:14420 <-> DISABLED <-> WEB-ACTIVEX VmdbDatabase Class ActiveX clsid access (web-activex.rules)
 * 1:14422 <-> DISABLED <-> WEB-ACTIVEX VmdbDatabase Class ActiveX function call access (web-activex.rules)
 * 1:14424 <-> DISABLED <-> WEB-ACTIVEX VMAppSdkUtil Class ActiveX clsid access (web-activex.rules)
 * 1:14426 <-> DISABLED <-> WEB-ACTIVEX VMAppSdkUtil Class ActiveX function call access (web-activex.rules)
 * 1:14428 <-> DISABLED <-> WEB-ACTIVEX VMWare unspecified 8 ActiveX clsid access (web-activex.rules)
 * 1:14430 <-> DISABLED <-> WEB-ACTIVEX VMEnumStrings Class ActiveX clsid access (web-activex.rules)
 * 1:14432 <-> DISABLED <-> WEB-ACTIVEX VMEnumStrings Class ActiveX function call access (web-activex.rules)
 * 1:14434 <-> DISABLED <-> WEB-ACTIVEX VMWare unspecified 9 ActiveX clsid access (web-activex.rules)
 * 1:14436 <-> DISABLED <-> WEB-ACTIVEX VMClientHost Class ActiveX clsid access (web-activex.rules)
 * 1:14438 <-> DISABLED <-> WEB-ACTIVEX VMClientHost Class ActiveX function call access (web-activex.rules)
 * 1:14440 <-> DISABLED <-> WEB-ACTIVEX VMWare unspecified 10 ActiveX clsid access (web-activex.rules)
 * 1:14442 <-> DISABLED <-> WEB-ACTIVEX VMWare unspecified 11 ActiveX clsid access (web-activex.rules)
 * 1:14444 <-> DISABLED <-> WEB-ACTIVEX VMWare unspecified 12 ActiveX clsid access (web-activex.rules)
 * 1:14446 <-> DISABLED <-> WEB-ACTIVEX VMWare unspecified 13 ActiveX clsid access (web-activex.rules)
 * 1:14448 <-> DISABLED <-> WEB-ACTIVEX reconfig.SystemReconfigur ActiveX clsid access (web-activex.rules)
 * 1:1445 <-> DISABLED <-> INDICATOR-COMPROMISE FTP file_id.diz access possible warez site (indicator-compromise.rules)
 * 1:14450 <-> DISABLED <-> WEB-ACTIVEX reconfig.SystemReconfigur ActiveX function call access (web-activex.rules)
 * 1:14452 <-> DISABLED <-> WEB-ACTIVEX vmhwcfg.NwzCompleted ActiveX clsid access (web-activex.rules)
 * 1:14454 <-> DISABLED <-> WEB-ACTIVEX vmhwcfg.NwzCompleted ActiveX function call access (web-activex.rules)
 * 1:14456 <-> DISABLED <-> WEB-ACTIVEX MksCompatCtl Class ActiveX clsid access (web-activex.rules)
 * 1:14458 <-> DISABLED <-> WEB-ACTIVEX MksCompatCtl Class ActiveX function call access (web-activex.rules)
 * 1:14460 <-> DISABLED <-> WEB-ACTIVEX VMWare unspecified 14 ActiveX clsid access (web-activex.rules)
 * 1:14466 <-> DISABLED <-> WEB-ACTIVEX VMWare unspecified 15 ActiveX clsid access (web-activex.rules)
 * 1:14468 <-> DISABLED <-> WEB-ACTIVEX Elevated.HostDeviceInfos ActiveX clsid access (web-activex.rules)
 * 1:14470 <-> DISABLED <-> WEB-ACTIVEX Elevated.HostDeviceInfos ActiveX function call access (web-activex.rules)
 * 1:14472 <-> DISABLED <-> WEB-ACTIVEX VMWare unspecified 16 ActiveX clsid access (web-activex.rules)
 * 1:14474 <-> DISABLED <-> WEB-ACTIVEX VMWare unspecified 17 ActiveX clsid access (web-activex.rules)
 * 1:14476 <-> DISABLED <-> WEB-ACTIVEX reconfig.GuestInfo ActiveX clsid access (web-activex.rules)
 * 1:14478 <-> DISABLED <-> WEB-ACTIVEX reconfig.GuestInfo ActiveX function call access (web-activex.rules)
 * 1:14480 <-> DISABLED <-> WEB-ACTIVEX VmappPropFrame Class ActiveX clsid access (web-activex.rules)
 * 1:14482 <-> DISABLED <-> WEB-ACTIVEX VmappPropFrame Class ActiveX function call access (web-activex.rules)
 * 1:14484 <-> DISABLED <-> WEB-ACTIVEX VhdCvtCom.VhdConverter ActiveX clsid access (web-activex.rules)
 * 1:14486 <-> DISABLED <-> WEB-ACTIVEX VhdCvtCom.VhdConverter ActiveX function call access (web-activex.rules)
 * 1:14488 <-> DISABLED <-> WEB-ACTIVEX VMSwitchCtl Class ActiveX clsid access (web-activex.rules)
 * 1:14490 <-> DISABLED <-> WEB-ACTIVEX VMSwitchCtl Class ActiveX function call access (web-activex.rules)
 * 1:14492 <-> DISABLED <-> WEB-ACTIVEX VMWare unspecified 18 ActiveX clsid access (web-activex.rules)
 * 1:14494 <-> DISABLED <-> WEB-ACTIVEX VmdbUtil Class ActiveX clsid access (web-activex.rules)
 * 1:14496 <-> DISABLED <-> WEB-ACTIVEX VmdbUtil Class ActiveX function call access (web-activex.rules)
 * 1:14498 <-> DISABLED <-> WEB-ACTIVEX VMWare unspecified 19 ActiveX clsid access (web-activex.rules)
 * 1:14500 <-> DISABLED <-> WEB-ACTIVEX VMwareVpcCvt.VpcC ActiveX clsid access (web-activex.rules)
 * 1:14502 <-> DISABLED <-> WEB-ACTIVEX VMwareVpcCvt.VpcC ActiveX function call access (web-activex.rules)
 * 1:14504 <-> DISABLED <-> WEB-ACTIVEX VmdbCnxUtil Class ActiveX clsid access (web-activex.rules)
 * 1:14506 <-> DISABLED <-> WEB-ACTIVEX VmdbCnxUtil Class ActiveX function call access (web-activex.rules)
 * 1:14508 <-> DISABLED <-> WEB-ACTIVEX Vmc2vmx.CoVPCDrive ActiveX clsid access (web-activex.rules)
 * 1:14510 <-> DISABLED <-> WEB-ACTIVEX Vmc2vmx.CoVPCDrive ActiveX function call access (web-activex.rules)
 * 1:14512 <-> DISABLED <-> WEB-ACTIVEX VMWare unspecified 20 ActiveX clsid access (web-activex.rules)
 * 1:14514 <-> DISABLED <-> WEB-ACTIVEX VMClientVM Class ActiveX clsid access (web-activex.rules)
 * 1:14516 <-> DISABLED <-> WEB-ACTIVEX VMClientVM Class ActiveX function call access (web-activex.rules)
 * 1:14518 <-> DISABLED <-> WEB-ACTIVEX VMWare unspecified 21 ActiveX clsid access (web-activex.rules)
 * 1:14520 <-> DISABLED <-> WEB-ACTIVEX Elevated.VMXCreator ActiveX clsid access (web-activex.rules)
 * 1:14522 <-> DISABLED <-> WEB-ACTIVEX Elevated.VMXCreator ActiveX function call access (web-activex.rules)
 * 1:14524 <-> DISABLED <-> WEB-ACTIVEX VMWare unspecified 22 ActiveX clsid access (web-activex.rules)
 * 1:14526 <-> DISABLED <-> WEB-ACTIVEX HotfixWz Class ActiveX clsid access (web-activex.rules)
 * 1:14528 <-> DISABLED <-> WEB-ACTIVEX HotfixWz Class ActiveX function call access (web-activex.rules)
 * 1:14530 <-> DISABLED <-> WEB-ACTIVEX VmdbUpdates Class ActiveX clsid access (web-activex.rules)
 * 1:14532 <-> DISABLED <-> WEB-ACTIVEX VmdbUpdates Class ActiveX function call access (web-activex.rules)
 * 1:14534 <-> DISABLED <-> WEB-ACTIVEX VMListCtl Class ActiveX clsid access (web-activex.rules)
 * 1:14536 <-> DISABLED <-> WEB-ACTIVEX VMListCtl Class ActiveX function call access (web-activex.rules)
 * 1:14538 <-> DISABLED <-> WEB-ACTIVEX CheckedListViewWnd Class ActiveX clsid access (web-activex.rules)
 * 1:14540 <-> DISABLED <-> WEB-ACTIVEX CheckedListViewWnd Class ActiveX function call access (web-activex.rules)
 * 1:14542 <-> DISABLED <-> WEB-ACTIVEX VMWare unspecified 23 ActiveX clsid access (web-activex.rules)
 * 1:14544 <-> DISABLED <-> WEB-ACTIVEX VmdbTreeCtl Class ActiveX clsid access (web-activex.rules)
 * 1:14546 <-> DISABLED <-> WEB-ACTIVEX VmdbTreeCtl Class ActiveX function call access (web-activex.rules)
 * 1:14548 <-> DISABLED <-> WEB-ACTIVEX Nwz Class ActiveX clsid access (web-activex.rules)
 * 1:14550 <-> DISABLED <-> WEB-ACTIVEX Nwz Class ActiveX function call access (web-activex.rules)
 * 1:14552 <-> DISABLED <-> WEB-ACTIVEX Vmc2vmx.CoVPCDrives ActiveX clsid access (web-activex.rules)
 * 1:14554 <-> DISABLED <-> WEB-ACTIVEX Vmc2vmx.CoVPCDrives ActiveX function call access (web-activex.rules)
 * 1:14556 <-> DISABLED <-> WEB-ACTIVEX MksCtl Class ActiveX clsid access (web-activex.rules)
 * 1:14558 <-> DISABLED <-> WEB-ACTIVEX MksCtl Class ActiveX function call access (web-activex.rules)
 * 1:14560 <-> DISABLED <-> WEB-ACTIVEX VmappPropPath Class ActiveX clsid access (web-activex.rules)
 * 1:14562 <-> DISABLED <-> WEB-ACTIVEX VmappPropPath Class ActiveX function call access (web-activex.rules)
 * 1:14564 <-> DISABLED <-> WEB-ACTIVEX VMWare unspecified 24 ActiveX clsid access (web-activex.rules)
 * 1:14566 <-> DISABLED <-> WEB-ACTIVEX PolicyCtl Class ActiveX clsid access (web-activex.rules)
 * 1:14568 <-> DISABLED <-> WEB-ACTIVEX PolicyCtl Class ActiveX function call access (web-activex.rules)
 * 1:14570 <-> DISABLED <-> WEB-ACTIVEX VmdbParseError Class ActiveX clsid access (web-activex.rules)
 * 1:14572 <-> DISABLED <-> WEB-ACTIVEX VmdbParseError Class ActiveX function call access (web-activex.rules)
 * 1:14574 <-> DISABLED <-> WEB-ACTIVEX NavigationCtl Class ActiveX clsid access (web-activex.rules)
 * 1:14576 <-> DISABLED <-> WEB-ACTIVEX NavigationCtl Class ActiveX function call access (web-activex.rules)
 * 1:14578 <-> DISABLED <-> WEB-ACTIVEX VMList Class ActiveX clsid access (web-activex.rules)
 * 1:14580 <-> DISABLED <-> WEB-ACTIVEX VMList Class ActiveX function call access (web-activex.rules)
 * 1:14582 <-> DISABLED <-> WEB-ACTIVEX VMWare unspecified 25 ActiveX clsid access (web-activex.rules)
 * 1:14584 <-> DISABLED <-> WEB-ACTIVEX VMWare unspecified 26 ActiveX clsid access (web-activex.rules)
 * 1:14586 <-> DISABLED <-> WEB-ACTIVEX CurrentVMCtl Class ActiveX clsid access (web-activex.rules)
 * 1:14588 <-> DISABLED <-> WEB-ACTIVEX CurrentVMCtl Class ActiveX function call access (web-activex.rules)
 * 1:14590 <-> DISABLED <-> WEB-ACTIVEX VhdCvtCom.DiskLibHelper ActiveX clsid access (web-activex.rules)
 * 1:14592 <-> DISABLED <-> WEB-ACTIVEX VhdCvtCom.DiskLibHelper ActiveX function call access (web-activex.rules)
 * 1:14594 <-> DISABLED <-> WEB-ACTIVEX Peachtree Accounting 2004 ActiveX clsid access (web-activex.rules)
 * 1:14596 <-> DISABLED <-> WEB-ACTIVEX ComponentOne VSFlexGrid ActiveX clsid access (web-activex.rules)
 * 1:14598 <-> DISABLED <-> WEB-ACTIVEX ComponentOne VSFlexGrid ActiveX function call access (web-activex.rules)
 * 1:14603 <-> DISABLED <-> WEB-ACTIVEX Data Dynamics ActiveReport ARViewer2 ActiveX clsid access (web-activex.rules)
 * 1:14605 <-> DISABLED <-> WEB-ACTIVEX Data Dynamics ActiveReport ARViewer2 ActiveX function call access (web-activex.rules)
 * 1:14613 <-> DISABLED <-> WEB-ACTIVEX VMWare VMCtl Class ActiveX function call access (web-activex.rules)
 * 1:14631 <-> DISABLED <-> WEB-ACTIVEX SystemRequirementsLab ActiveX clsid access (web-activex.rules)
 * 1:14633 <-> DISABLED <-> WEB-ACTIVEX PhotoStockPlus ActiveX clsid access (web-activex.rules)
 * 1:14635 <-> DISABLED <-> WEB-ACTIVEX Microsoft RSClientPrint ActiveX clsid access (web-activex.rules)
 * 1:14637 <-> DISABLED <-> WEB-ACTIVEX Microsoft PicturePusher ActiveX clsid access (web-activex.rules)
 * 1:14639 <-> DISABLED <-> WEB-ACTIVEX Microsoft PicturePusher ActiveX function call access (web-activex.rules)
 * 1:14743 <-> DISABLED <-> FTP RNTO directory traversal attempt (ftp.rules)
 * 1:14744 <-> DISABLED <-> WEB-ACTIVEX Hummingbird HostExplorer ActiveX clsid access (web-activex.rules)
 * 1:14746 <-> DISABLED <-> WEB-ACTIVEX Autodesk DWF Viewer ActiveX clsid access (web-activex.rules)
 * 1:14750 <-> DISABLED <-> WEB-ACTIVEX Autodesk LiveUpdate ActiveX function call access (web-activex.rules)
 * 1:14752 <-> DISABLED <-> WEB-ACTIVEX Novell ZENworks Desktop Management ActiveX clsid access (web-activex.rules)
 * 1:14754 <-> DISABLED <-> WEB-ACTIVEX Novell ZENworks Desktop Management ActiveX function call access (web-activex.rules)
 * 1:14758 <-> DISABLED <-> WEB-ACTIVEX Microsoft SQL Server 2000 Client Components ActiveX function call access (web-activex.rules)
 * 1:14760 <-> DISABLED <-> WEB-ACTIVEX iseemedia LPViewer ActiveX clsid access (web-activex.rules)
 * 1:14762 <-> DISABLED <-> WEB-ACTIVEX iseemedia LPViewer ActiveX function call access (web-activex.rules)
 * 1:14770 <-> DISABLED <-> FTP Ipswitch WS_FTP client format string attempt (ftp.rules)
 * 1:14778 <-> DISABLED <-> WEB-ACTIVEX Dart Communications PowerTCP FTP ActiveX clsid access (web-activex.rules)
 * 1:14780 <-> DISABLED <-> WEB-ACTIVEX Dart Communications PowerTCP FTP ActiveX function call access (web-activex.rules)
 * 1:14897 <-> DISABLED <-> WEB-ACTIVEX HP Software Update RulesEngine.dll ActiveX function call access (web-activex.rules)
 * 1:14993 <-> DISABLED <-> WEB-ACTIVEX Visagesoft eXPert PDF Viewer ActiveX clsid access (web-activex.rules)
 * 1:14995 <-> DISABLED <-> WEB-ACTIVEX Visagesoft eXPert PDF Viewer ActiveX function call access (web-activex.rules)
 * 1:14997 <-> DISABLED <-> WEB-ACTIVEX DjVu MSOffice Converter ActiveX clsid access (web-activex.rules)
 * 1:14999 <-> DISABLED <-> WEB-ACTIVEX Microsoft Debug Diagnostic Tool ActiveX clsid access (web-activex.rules)
 * 1:15001 <-> DISABLED <-> WEB-ACTIVEX Microsoft Debug Diagnostic Tool ActiveX function call access (web-activex.rules)
 * 1:15003 <-> DISABLED <-> WEB-ACTIVEX Chilkat Crypt 2 ActiveX clsid access (web-activex.rules)
 * 1:15005 <-> DISABLED <-> WEB-ACTIVEX Chilkat Crypt 2 ActiveX function call access (web-activex.rules)
 * 1:15007 <-> DISABLED <-> WEB-ACTIVEX NOS Microsystems / Adobe getPlus Download Manager ActiveX clsid access (web-activex.rules)
 * 1:15069 <-> DISABLED <-> WEB-ACTIVEX SAP AG SAPgui mdrmsap ActiveX clsid access (web-activex.rules)
 * 1:15088 <-> DISABLED <-> WEB-ACTIVEX Microsoft Visual Basic Charts ActiveX clsid access (web-activex.rules)
 * 1:15090 <-> DISABLED <-> WEB-ACTIVEX Microsoft Visual Basic Charts ActiveX function call access (web-activex.rules)
 * 1:15092 <-> DISABLED <-> WEB-ACTIVEX Microsoft Visual Basic DataGrid ActiveX clsid access (web-activex.rules)
 * 1:15094 <-> DISABLED <-> WEB-ACTIVEX Microsoft Visual Basic DataGrid ActiveX function call access (web-activex.rules)
 * 1:15109 <-> DISABLED <-> WEB-ACTIVEX Shell.Explorer 1 ActiveX clsid access (web-activex.rules)
 * 1:15112 <-> DISABLED <-> WEB-ACTIVEX Shell.Explorer 2 ActiveX function call access (web-activex.rules)
 * 1:15159 <-> DISABLED <-> WEB-ACTIVEX Evans FTP ActiveX clsid access (web-activex.rules)
 * 1:15161 <-> DISABLED <-> WEB-ACTIVEX Evans FTP ActiveX function call access (web-activex.rules)
 * 1:15173 <-> DISABLED <-> WEB-ACTIVEX Phoenician Casino ActiveX clsid access (web-activex.rules)
 * 1:15175 <-> DISABLED <-> WEB-ACTIVEX Phoenician Casino ActiveX function call access (web-activex.rules)
 * 1:15177 <-> DISABLED <-> WEB-ACTIVEX Trend Micro HouseCall ActiveX clsid access (web-activex.rules)
 * 1:15179 <-> DISABLED <-> WEB-ACTIVEX Trend Micro HouseCall ActiveX function call access (web-activex.rules)
 * 1:15181 <-> DISABLED <-> WEB-ACTIVEX SaschArt SasCam Webcam Server ActiveX clsid access (web-activex.rules)
 * 1:15194 <-> DISABLED <-> WEB-ACTIVEX SizerOne ActiveX function call access (web-activex.rules)
 * 1:15228 <-> DISABLED <-> WEB-ACTIVEX Ciansoft PDFBuilderX ActiveX clsid access (web-activex.rules)
 * 1:15232 <-> DISABLED <-> WEB-ACTIVEX Easy Grid ActiveX clsid access (web-activex.rules)
 * 1:15234 <-> DISABLED <-> WEB-ACTIVEX Easy Grid ActiveX function call access (web-activex.rules)
 * 1:15245 <-> DISABLED <-> WEB-ACTIVEX AXIS Camera ActiveX function call access (web-activex.rules)
 * 1:15247 <-> DISABLED <-> WEB-ACTIVEX JamDTA ActiveX clsid access (web-activex.rules)
 * 1:15249 <-> DISABLED <-> WEB-ACTIVEX SmartVMD ActiveX clsid access (web-activex.rules)
 * 1:15251 <-> DISABLED <-> WEB-ACTIVEX MetaProducts MetaTreeX ActiveX clsid access (web-activex.rules)
 * 1:15253 <-> DISABLED <-> WEB-ACTIVEX MetaProducts MetaTreeX ActiveX function call access (web-activex.rules)
 * 1:15268 <-> DISABLED <-> WEB-ACTIVEX MW6 Technologies Barcode ActiveX function call access (web-activex.rules)
 * 1:15270 <-> DISABLED <-> WEB-ACTIVEX MW6 Technologies PDF417 ActiveX clsid access (web-activex.rules)
 * 1:15272 <-> DISABLED <-> WEB-ACTIVEX MW6 Technologies PDF417 ActiveX function call access (web-activex.rules)
 * 1:15274 <-> DISABLED <-> WEB-ACTIVEX MW6 Technologies DataMatrix ActiveX clsid access (web-activex.rules)
 * 1:15276 <-> DISABLED <-> WEB-ACTIVEX MW6 Technologies DataMatrix ActiveX function call access (web-activex.rules)
 * 1:15278 <-> DISABLED <-> WEB-ACTIVEX MW6 Technologies Aztec ActiveX clsid access (web-activex.rules)
 * 1:15280 <-> DISABLED <-> WEB-ACTIVEX MW6 Technologies Aztec ActiveX function call access (web-activex.rules)
 * 1:15282 <-> DISABLED <-> WEB-ACTIVEX FlexCell Grid ActiveX clsid access (web-activex.rules)
 * 1:15284 <-> DISABLED <-> WEB-ACTIVEX NCTAudioGrabber2 ActiveX clsid access (web-activex.rules)
 * 1:15286 <-> DISABLED <-> WEB-ACTIVEX NCTAudioGrabber2 ActiveX function call access (web-activex.rules)
 * 1:15288 <-> DISABLED <-> WEB-ACTIVEX NCTAudioInformation2 ActiveX clsid access (web-activex.rules)
 * 1:1529 <-> DISABLED <-> FTP SITE overflow attempt (ftp.rules)
 * 1:15290 <-> DISABLED <-> WEB-ACTIVEX NCTAudioInformation2 ActiveX function call access (web-activex.rules)
 * 1:15307 <-> DISABLED <-> WEB-ACTIVEX Microsoft Animation Control ActiveX clsid access (web-activex.rules)
 * 1:15309 <-> DISABLED <-> WEB-ACTIVEX Microsoft Animation Control ActiveX function call access (web-activex.rules)
 * 1:15313 <-> DISABLED <-> WEB-ACTIVEX Research In Motion AxLoader ActiveX function call access (web-activex.rules)
 * 1:15315 <-> DISABLED <-> WEB-ACTIVEX Akamai DownloadManager ActiveX clsid access (web-activex.rules)
 * 1:15317 <-> DISABLED <-> WEB-ACTIVEX Akamai DownloadManager ActiveX function call access (web-activex.rules)
 * 1:15330 <-> DISABLED <-> WEB-ACTIVEX Nokia Phoenix Service 1 ActiveX clsid access (web-activex.rules)
 * 1:15332 <-> DISABLED <-> WEB-ACTIVEX Nokia Phoenix Service 2 ActiveX clsid access (web-activex.rules)
 * 1:15334 <-> DISABLED <-> WEB-ACTIVEX GeoVision LiveX 7000 ActiveX clsid access (web-activex.rules)
 * 1:15336 <-> DISABLED <-> WEB-ACTIVEX GeoVision LiveX 7000 ActiveX function call access (web-activex.rules)
 * 1:15338 <-> DISABLED <-> WEB-ACTIVEX GeoVision LiveX 8120 ActiveX clsid access (web-activex.rules)
 * 1:15340 <-> DISABLED <-> WEB-ACTIVEX GeoVision LiveX 8120 ActiveX function call access (web-activex.rules)
 * 1:15342 <-> DISABLED <-> WEB-ACTIVEX GeoVision LiveX 8200 ActiveX clsid access (web-activex.rules)
 * 1:15344 <-> DISABLED <-> WEB-ACTIVEX GeoVision LiveX 8200 ActiveX function call access (web-activex.rules)
 * 1:15346 <-> DISABLED <-> WEB-ACTIVEX Synactis ALL In-The-Box ActiveX clsid access (web-activex.rules)
 * 1:15348 <-> DISABLED <-> WEB-ACTIVEX Synactis ALL In-The-Box ActiveX function call access (web-activex.rules)
 * 1:15350 <-> DISABLED <-> WEB-ACTIVEX Web on Windows ActiveX clsid access (web-activex.rules)
 * 1:15352 <-> DISABLED <-> WEB-ACTIVEX Web on Windows ActiveX function call access (web-activex.rules)
 * 1:15368 <-> DISABLED <-> WEB-ACTIVEX FathFTP ActiveX clsid access (web-activex.rules)
 * 1:15370 <-> DISABLED <-> WEB-ACTIVEX FathFTP ActiveX function call access (web-activex.rules)
 * 1:15372 <-> DISABLED <-> WEB-ACTIVEX iDefense COMRaider ActiveX clsid access (web-activex.rules)
 * 1:15374 <-> DISABLED <-> WEB-ACTIVEX iDefense COMRaider ActiveX function call access (web-activex.rules)
 * 1:15376 <-> DISABLED <-> WEB-ACTIVEX Sopcast SopCore ActiveX clsid access (web-activex.rules)
 * 1:15378 <-> DISABLED <-> WEB-ACTIVEX Sopcast SopCore ActiveX function call access (web-activex.rules)
 * 1:15380 <-> DISABLED <-> WEB-ACTIVEX HP Virtual Rooms v7 ActiveX clsid access (web-activex.rules)
 * 1:15416 <-> DISABLED <-> CONTENT-REPLACE ICQ deny http proxy login (content-replace.rules)
 * 1:15464 <-> ENABLED <-> FILE-IDENTIFY Microsoft Office Excel file download request (file-identify.rules)
 * 1:15517 <-> DISABLED <-> WEB-CLIENT Microsoft Windows AVI DirectShow QuickTime parsing overflow attempt (web-client.rules)
 * 1:15543 <-> DISABLED <-> WEB-ACTIVEX Microsoft Communications Control v6 ActiveX clsid access (web-activex.rules)
 * 1:15545 <-> DISABLED <-> WEB-ACTIVEX Microsoft Communications Control v6 ActiveX function call access (web-activex.rules)
 * 1:15547 <-> DISABLED <-> WEB-ACTIVEX eBay Picture Uploads control 1 ActiveX clsid access (web-activex.rules)
 * 1:15549 <-> DISABLED <-> WEB-ACTIVEX eBay Picture Uploads control 1 ActiveX function call access (web-activex.rules)
 * 1:15551 <-> DISABLED <-> WEB-ACTIVEX eBay Picture Uploads control 2 ActiveX clsid access (web-activex.rules)
 * 1:15557 <-> DISABLED <-> WEB-ACTIVEX SAP AG SAPgui EnjoySAP ActiveX clsid access (web-activex.rules)
 * 1:15588 <-> DISABLED <-> WEB-ACTIVEX Microsoft Video 1 ActiveX clsid access (web-activex.rules)
 * 1:15590 <-> DISABLED <-> WEB-ACTIVEX Microsoft Video 10 ActiveX clsid access (web-activex.rules)
 * 1:15592 <-> DISABLED <-> WEB-ACTIVEX Microsoft Video 11 ActiveX clsid access (web-activex.rules)
 * 1:15594 <-> DISABLED <-> WEB-ACTIVEX Microsoft Video 12 ActiveX clsid access (web-activex.rules)
 * 1:15596 <-> DISABLED <-> WEB-ACTIVEX Microsoft Video 13 ActiveX clsid access (web-activex.rules)
 * 1:15598 <-> DISABLED <-> WEB-ACTIVEX Microsoft Video 14 ActiveX clsid access (web-activex.rules)
 * 1:15600 <-> DISABLED <-> WEB-ACTIVEX Microsoft Video 15 ActiveX clsid access (web-activex.rules)
 * 1:15602 <-> DISABLED <-> WEB-ACTIVEX Microsoft Video 16 ActiveX clsid access (web-activex.rules)
 * 1:15604 <-> DISABLED <-> WEB-ACTIVEX Microsoft Video 17 ActiveX clsid access (web-activex.rules)
 * 1:15606 <-> DISABLED <-> WEB-ACTIVEX Microsoft Video 18 ActiveX clsid access (web-activex.rules)
 * 1:15608 <-> DISABLED <-> WEB-ACTIVEX Microsoft Video 19 ActiveX clsid access (web-activex.rules)
 * 1:15610 <-> DISABLED <-> WEB-ACTIVEX Microsoft Video 2 ActiveX clsid access (web-activex.rules)
 * 1:15612 <-> DISABLED <-> WEB-ACTIVEX Microsoft Video 20 ActiveX clsid access (web-activex.rules)
 * 1:15614 <-> DISABLED <-> WEB-ACTIVEX Microsoft Video 21 ActiveX clsid access (web-activex.rules)
 * 1:15616 <-> DISABLED <-> WEB-ACTIVEX Microsoft Video 22 ActiveX clsid access (web-activex.rules)
 * 1:15618 <-> DISABLED <-> WEB-ACTIVEX Microsoft Video 23 ActiveX clsid access (web-activex.rules)
 * 1:1562 <-> DISABLED <-> FTP SITE CHOWN overflow attempt (ftp.rules)
 * 1:15620 <-> DISABLED <-> WEB-ACTIVEX Microsoft Video 24 ActiveX clsid access (web-activex.rules)
 * 1:15622 <-> DISABLED <-> WEB-ACTIVEX Microsoft Video 25 ActiveX clsid access (web-activex.rules)
 * 1:15624 <-> DISABLED <-> WEB-ACTIVEX Microsoft Video 26 ActiveX clsid access (web-activex.rules)
 * 1:15626 <-> DISABLED <-> WEB-ACTIVEX Microsoft Video 27 ActiveX clsid access (web-activex.rules)
 * 1:15628 <-> DISABLED <-> WEB-ACTIVEX Microsoft Video 28 ActiveX clsid access (web-activex.rules)
 * 1:15630 <-> DISABLED <-> WEB-ACTIVEX Microsoft Video 29 ActiveX clsid access (web-activex.rules)
 * 1:15632 <-> DISABLED <-> WEB-ACTIVEX Microsoft Video 3 ActiveX clsid access (web-activex.rules)
 * 1:15634 <-> DISABLED <-> WEB-ACTIVEX Microsoft Video 30 ActiveX clsid access (web-activex.rules)
 * 1:15636 <-> DISABLED <-> WEB-ACTIVEX Microsoft Video 31 ActiveX clsid access (web-activex.rules)
 * 1:15640 <-> DISABLED <-> WEB-ACTIVEX Microsoft Video 33 ActiveX clsid access (web-activex.rules)
 * 1:15642 <-> DISABLED <-> WEB-ACTIVEX Microsoft Video 34 ActiveX clsid access (web-activex.rules)
 * 1:15644 <-> DISABLED <-> WEB-ACTIVEX Microsoft Video 35 ActiveX clsid access (web-activex.rules)
 * 1:15646 <-> DISABLED <-> WEB-ACTIVEX Microsoft Video 36 ActiveX clsid access (web-activex.rules)
 * 1:15648 <-> DISABLED <-> WEB-ACTIVEX Microsoft Video 37 ActiveX clsid access (web-activex.rules)
 * 1:15650 <-> DISABLED <-> WEB-ACTIVEX Microsoft Video 38 ActiveX clsid access (web-activex.rules)
 * 1:15652 <-> DISABLED <-> WEB-ACTIVEX Microsoft Video 39 ActiveX clsid access (web-activex.rules)
 * 1:15654 <-> DISABLED <-> WEB-ACTIVEX Microsoft Video 4 ActiveX clsid access (web-activex.rules)
 * 1:15656 <-> DISABLED <-> WEB-ACTIVEX Microsoft Video 40 ActiveX clsid access (web-activex.rules)
 * 1:15658 <-> DISABLED <-> WEB-ACTIVEX Microsoft Video 41 ActiveX clsid access (web-activex.rules)
 * 1:15660 <-> DISABLED <-> WEB-ACTIVEX Microsoft Video 42 ActiveX clsid access (web-activex.rules)
 * 1:15662 <-> DISABLED <-> WEB-ACTIVEX Microsoft Video 43 ActiveX clsid access (web-activex.rules)
 * 1:15664 <-> DISABLED <-> WEB-ACTIVEX Microsoft Video 44 ActiveX clsid access (web-activex.rules)
 * 1:15666 <-> DISABLED <-> WEB-ACTIVEX Microsoft Video 45 ActiveX clsid access (web-activex.rules)
 * 1:15668 <-> DISABLED <-> WEB-ACTIVEX Microsoft Video 5 ActiveX clsid access (web-activex.rules)
 * 1:15671 <-> DISABLED <-> WEB-ACTIVEX Microsoft Video 6 ActiveX function call (web-activex.rules)
 * 1:15674 <-> DISABLED <-> WEB-ACTIVEX Microsoft Video 8 ActiveX clsid access (web-activex.rules)
 * 1:15676 <-> DISABLED <-> WEB-ACTIVEX Microsoft Video 9 ActiveX clsid access (web-activex.rules)
 * 1:15852 <-> DISABLED <-> WEB-ACTIVEX Microsoft Office Web Components Datasource ActiveX clsid access (web-activex.rules)
 * 1:15878 <-> DISABLED <-> WEB-ACTIVEX AcerCtrls.APlunch ActiveX clsid access (web-activex.rules)
 * 1:15924 <-> DISABLED <-> WEB-ACTIVEX DHTML Editing ActiveX function call access (web-activex.rules)
 * 1:15926 <-> DISABLED <-> WEB-ACTIVEX PPStream PPSMediaList ActiveX clsid access (web-activex.rules)
 * 1:15928 <-> DISABLED <-> WEB-ACTIVEX PPStream PPSMediaList ActiveX function call access (web-activex.rules)
 * 1:15932 <-> DISABLED <-> FTP LIST globbing denial of service attack (ftp.rules)
 * 1:15964 <-> DISABLED <-> SERVER-MAIL Microsoft Windows Exchange OWA XSS and spoofing attempt (server-mail.rules)
 * 1:15988 <-> DISABLED <-> SPECIFIC-THREATS Microsoft ISA Server DNS spoofing attempt (specific-threats.rules)
 * 1:15993 <-> ENABLED <-> SPECIFIC-THREATS Adobe Flash Player ActionScript intrf_count integer overflow attempt (specific-threats.rules)
 * 1:16025 <-> DISABLED <-> SPECIFIC-THREATS MailEnable SMTP service SPF lookup buffer overflow attempt (specific-threats.rules)
 * 1:16029 <-> DISABLED <-> SPECIFIC-THREATS Microsoft Windows DNS client ATMA buffer overrun attempt (specific-threats.rules)
 * 1:16030 <-> DISABLED <-> SPECIFIC-THREATS Microsoft Windows DNS client TXT buffer overrun attempt (specific-threats.rules)
 * 1:16077 <-> DISABLED <-> SPECIFIC-THREATS Tripwire format string vulnerability ftp exploit attempt (specific-threats.rules)
 * 1:16083 <-> DISABLED <-> RPC portmap 395650 tcp request (rpc.rules)
 * 1:16084 <-> DISABLED <-> RPC portmap 395650 udp request (rpc.rules)
 * 1:16125 <-> DISABLED <-> SPYWARE-PUT Keylogger spyyahoo v2.2 runtime detection (spyware-put.rules)
 * 1:16159 <-> DISABLED <-> WEB-ACTIVEX Microsoft Office Excel Add-in for SQL Analysis Services 1 ActiveX clsid access (web-activex.rules)
 * 1:16161 <-> DISABLED <-> WEB-ACTIVEX Microsoft Office Excel Add-in for SQL Analysis Services 2 ActiveX clsid access (web-activex.rules)
 * 1:16163 <-> DISABLED <-> WEB-ACTIVEX Microsoft Office Excel Add-in for SQL Analysis Services 3 ActiveX clsid access (web-activex.rules)
 * 1:16165 <-> DISABLED <-> WEB-ACTIVEX Microsoft Office Excel Add-in for SQL Analysis Services 4 ActiveX clsid access (web-activex.rules)
 * 1:16183 <-> DISABLED <-> WEB-CLIENT Microsoft Windows .NET MSIL CombineImpl suspicious usage attempt (web-client.rules)
 * 1:1621 <-> DISABLED <-> FTP CMD overflow attempt (ftp.rules)
 * 1:1622 <-> DISABLED <-> FTP RNFR ././ attempt (ftp.rules)
 * 1:1623 <-> DISABLED <-> FTP invalid MODE (ftp.rules)
 * 1:1624 <-> DISABLED <-> FTP PWD overflow attempt (ftp.rules)
 * 1:1625 <-> DISABLED <-> FTP SYST overflow attempt (ftp.rules)
 * 1:16305 <-> DISABLED <-> WEB-ACTIVEX Symantec Altiris Deployment Solution ActiveX clsid access (web-activex.rules)
 * 1:16307 <-> DISABLED <-> WEB-ACTIVEX Symantec Altiris Deployment Solution ActiveX function call access (web-activex.rules)
 * 1:16316 <-> ENABLED <-> WEB-CLIENT Adobe Flash Player malformed getPropertyLate actioncode attempt (web-client.rules)
 * 1:16317 <-> DISABLED <-> EXPLOIT Microsoft Internet Explorer mouse move during refresh memory corruption attempt (exploit.rules)
 * 1:16326 <-> DISABLED <-> EXPLOIT Microsoft Internet Explorer 8 DOM memory corruption attempt (exploit.rules)
 * 1:16357 <-> ENABLED <-> FTP multiple extension code execution attempt (ftp.rules)
 * 1:16363 <-> DISABLED <-> POLICY potentially executable file upload via FTP (policy.rules)
 * 1:16366 <-> DISABLED <-> EXPLOIT Microsoft Windows embedded OpenType font engine LZX decompression buffer overflow attempt (exploit.rules)
 * 1:16379 <-> DISABLED <-> WEB-ACTIVEX SAP AG SAPgui sapirrfc ActiveX clsid access (web-activex.rules)
 * 1:16432 <-> DISABLED <-> WEB-ACTIVEX Trend Micro Web Deployment ActiveX clsid access (web-activex.rules)
 * 1:16434 <-> ENABLED <-> FILE-IDENTIFY Ultimate Packer for Executables/UPX v0.51-v0.61 packed file magic detected (file-identify.rules)
 * 1:16435 <-> ENABLED <-> FILE-IDENTIFY Ultimate Packer for Executables/UPX v0.62-v1.22 packed file magic detected (file-identify.rules)
 * 1:16436 <-> DISABLED <-> FILE-IDENTIFY Ultimate Packer for Executables/UPX v2.90 v2.93-v3.00 packed file magic detected (file-identify.rules)
 * 1:16446 <-> DISABLED <-> RPC portmap Solaris sadmin tcp request (rpc.rules)
 * 1:16447 <-> DISABLED <-> RPC portmap Solaris sadmin udp request (rpc.rules)
 * 1:16503 <-> DISABLED <-> EXPLOIT Microsoft Internet Explorer event handling remote code execution attempt (exploit.rules)
 * 1:16565 <-> DISABLED <-> WEB-ACTIVEX Ultra Shareware Office ActiveX clsid access (web-activex.rules)
 * 1:16566 <-> DISABLED <-> WEB-ACTIVEX Tumbleweed SecureTransport ActiveX clsid access (web-activex.rules)
 * 1:16568 <-> DISABLED <-> WEB-ACTIVEX Altnet Download Manager ADM4 ActiveX clsid access (web-activex.rules)
 * 1:16569 <-> DISABLED <-> WEB-ACTIVEX EnjoySAP kweditcontrol ActiveX clsid access (web-activex.rules)
 * 1:16571 <-> DISABLED <-> WEB-ACTIVEX EnjoySAP kweditcontrol ActiveX function call access (web-activex.rules)
 * 1:16573 <-> DISABLED <-> WEB-ACTIVEX obfuscated ActiveX object instantiation via unescape (web-activex.rules)
 * 1:16574 <-> DISABLED <-> WEB-ACTIVEX obfuscated ActiveX object instantiation via fromCharCode (web-activex.rules)
 * 1:16636 <-> DISABLED <-> MISC Microsoft Windows .NET framework XMLDsig data tampering attempt  (misc.rules)
 * 1:16687 <-> DISABLED <-> WEB-ACTIVEX Juniper Networks SSL-VPN Client JuniperSetup ActiveX control buffer overflow attempt (web-activex.rules)
 * 1:16697 <-> DISABLED <-> FTP httpdx USER null byte denial of service (ftp.rules)
 * 1:16698 <-> DISABLED <-> FTP httpdx PASS null byte denial of service (ftp.rules)
 * 1:16711 <-> DISABLED <-> WEB-ACTIVEX E-Book Systems FlipViewer FlipViewerX.dll activex clsid access ActiveX clsid access (web-activex.rules)
 * 1:16718 <-> DISABLED <-> EXPLOIT Skype URI handler input validation exploit attempt (exploit.rules)
 * 1:1672 <-> DISABLED <-> FTP CWD ~ attempt (ftp.rules)
 * 1:16748 <-> DISABLED <-> WEB-ACTIVEX IBM Access Support ActiveX function call access (web-activex.rules)
 * 1:16767 <-> DISABLED <-> WEB-ACTIVEX AwingSoft Web3D Player ActiveX clsid access (web-activex.rules)
 * 1:16769 <-> DISABLED <-> WEB-ACTIVEX AwingSoft Web3D Player ActiveX function call access (web-activex.rules)
 * 1:16774 <-> DISABLED <-> WEB-ACTIVEX EMC Captiva QuickScan Pro ActiveX function call access (web-activex.rules)
 * 1:16779 <-> DISABLED <-> WEB-ACTIVEX EasyMail IMAP4 ActiveX clsid access (web-activex.rules)
 * 1:16781 <-> DISABLED <-> WEB-ACTIVEX EasyMail IMAP4 ActiveX function call access (web-activex.rules)
 * 1:16783 <-> DISABLED <-> WEB-ACTIVEX Autodesk iDrop ActiveX clsid access (web-activex.rules)
 * 1:16784 <-> DISABLED <-> WEB-ACTIVEX Autodesk iDrop ActiveX function call access (web-activex.rules)
 * 1:16791 <-> DISABLED <-> WEB-ACTIVEX SAP AG SAPgui EAI WebViewer3D ActiveX clsid access (web-activex.rules)
 * 1:16793 <-> DISABLED <-> WEB-ACTIVEX SAP AG SAPgui EAI WebViewer3D ActiveX function call access (web-activex.rules)
 * 1:16795 <-> DISABLED <-> DOS Google Chrome FTP handling out-of-bounds array index denial of service attempt (dos.rules)
 * 1:16802 <-> DISABLED <-> WEB-ACTIVEX WinDVD IASystemInfo.dll ActiveX clsid access (web-activex.rules)
 * 1:16806 <-> DISABLED <-> BACKDOOR Win32.Qakbot.E - FTP upload seclog (backdoor.rules)
 * 1:16807 <-> DISABLED <-> BACKDOOR Win32.Qakbot.E - FTP Upload ps_dump (backdoor.rules)
 * 1:16834 <-> DISABLED <-> BLACKLIST DNS request for known malware domain qd.netkill.com.cn - Trojan-Downloader.Win32.Adload.rzx (blacklist.rules)
 * 1:16835 <-> DISABLED <-> BLACKLIST DNS request for known malware domain exe.146843.com - Trojan.Win32.Opeg.a (blacklist.rules)
 * 1:16836 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ra03.e5732.com - Trojan-Clicker.Win32.Small.afg (blacklist.rules)
 * 1:16837 <-> DISABLED <-> BLACKLIST DNS request for known malware domain dangercheats.com.br - Trojan.Win32.Refroso.arnq (blacklist.rules)
 * 1:16838 <-> DISABLED <-> BLACKLIST DNS request for known malware domain xlm.ppvsr.com - Trojan-GameThief.Win32.OnLineGames.wwcf (blacklist.rules)
 * 1:16839 <-> DISABLED <-> BLACKLIST DNS request for known malware domain sh16.e8753.com - Trojan.Win32.Scar.ccqb (blacklist.rules)
 * 1:16840 <-> DISABLED <-> BLACKLIST DNS request for known malware domain rx11.e6532.com - Trojan.Win32.Opeg.a (blacklist.rules)
 * 1:16841 <-> DISABLED <-> BLACKLIST DNS request for known malware domain podgorz.org - Trojan-Spy.Win32.Zbot.gen (blacklist.rules)
 * 1:16842 <-> DISABLED <-> BLACKLIST DNS request for known malware domain sp19.e4578.com - Trojan-Downloader.Win32.Genome.njz (blacklist.rules)
 * 1:16843 <-> DISABLED <-> BLACKLIST DNS request for known malware domain 1.7zsm.com - Trojan-Downloader.Win32.Agent.dtuo (blacklist.rules)
 * 1:16844 <-> DISABLED <-> BLACKLIST DNS request for known malware domain rm08.e4562.com - Trojan-Downloader.Win32.Agent.dngx (blacklist.rules)
 * 1:16845 <-> DISABLED <-> BLACKLIST DNS request for known malware domain rc04.e6532.com - Trojan-Downloader.Win32.Genome.awld (blacklist.rules)
 * 1:16846 <-> DISABLED <-> BLACKLIST DNS request for known malware domain bedayton.com - Trojan-Downloader.Win32.Agent.dlhe (blacklist.rules)
 * 1:16847 <-> DISABLED <-> BLACKLIST DNS request for known malware domain rz12.e6805.com - Trojan-Downloader.Win32.Genome.awld (blacklist.rules)
 * 1:16849 <-> DISABLED <-> BLACKLIST DNS request for known malware domain re05.e6532.com - Trojan-Downloader.Win32.Genome.awld (blacklist.rules)
 * 1:16850 <-> DISABLED <-> BLACKLIST DNS request for known malware domain kldmten.net - Trojan-Spy.Win32.Zbot.akra (blacklist.rules)
 * 1:16851 <-> DISABLED <-> BLACKLIST DNS request for known malware domain forelc.cc - Trojan-Ransom.Win32.XBlocker.ahe (blacklist.rules)
 * 1:16852 <-> DISABLED <-> BLACKLIST DNS request for known malware domain v.yao63.com - Trojan-Downloader.Win32.Agent.dqns (blacklist.rules)
 * 1:16853 <-> DISABLED <-> BLACKLIST DNS request for known malware domain vh26.e4578.com - Trojan.Win32.Opeg.a (blacklist.rules)
 * 1:16854 <-> DISABLED <-> BLACKLIST DNS request for known malware domain up1.give2sms.com - Trojan-Downloader.Win32.Genome.est (blacklist.rules)
 * 1:16855 <-> DISABLED <-> BLACKLIST DNS request for known malware domain d.123kuaihuo.com - Trojan.Win32.Scar.clbx (blacklist.rules)
 * 1:16856 <-> DISABLED <-> BLACKLIST DNS request for known malware domain andy.cd - Backdoor.Win32.Agent.auto (blacklist.rules)
 * 1:16858 <-> DISABLED <-> BLACKLIST DNS request for known malware domain charter-x.biz - Packed.Win32.Krap.ae (blacklist.rules)
 * 1:16859 <-> DISABLED <-> BLACKLIST DNS request for known malware domain gerherber.com - Trojan-Spy.Win32.Zbot.akdw (blacklist.rules)
 * 1:16860 <-> DISABLED <-> BLACKLIST DNS request for known malware domain urodinam.net - Trojan.Win32.TDSS.azsj (blacklist.rules)
 * 1:16861 <-> DISABLED <-> BLACKLIST DNS request for known malware domain gite-eguisheim.com - Trojan-Downloader.Win32.Piker.clp (blacklist.rules)
 * 1:16862 <-> DISABLED <-> BLACKLIST DNS request for known malware domain phaizeipeu.ru - Packed.Win32.Krap.gx (blacklist.rules)
 * 1:16863 <-> DISABLED <-> BLACKLIST DNS request for known malware domain teendx.com - Trojan-Spy.Win32.Zbot.gen (blacklist.rules)
 * 1:16864 <-> DISABLED <-> BLACKLIST DNS request for known malware domain taiping2033.2288.org - Trojan-Downloader.Win32.Selvice.afy (blacklist.rules)
 * 1:16865 <-> DISABLED <-> BLACKLIST DNS request for known malware domain cnfg.maxsitesrevenues.net - Trojan.Win32.BHO.afke (blacklist.rules)
 * 1:16868 <-> DISABLED <-> BLACKLIST DNS request for known malware domain hostshack.net - Trojan.Win32.Buzus.empl (blacklist.rules)
 * 1:16869 <-> DISABLED <-> BLACKLIST DNS request for known malware domain tt.vv49.com - Trojan-GameThief.Win32.OnLineGames.bnkb (blacklist.rules)
 * 1:16870 <-> DISABLED <-> BLACKLIST DNS request for known malware domain search.sidegreen.com - Backdoor.Win32.Agent.arqi (blacklist.rules)
 * 1:16871 <-> DISABLED <-> BLACKLIST DNS request for known malware domain parfaitpournous.com - Trojan-Spy.Win32.Zbot.gen (blacklist.rules)
 * 1:16872 <-> DISABLED <-> BLACKLIST DNS request for known malware domain postmetoday.ru - Packed.Win32.Katusha.j (blacklist.rules)
 * 1:16873 <-> DISABLED <-> BLACKLIST DNS request for known malware domain youword.cn - Trojan.Win32.Scar.bvgu (blacklist.rules)
 * 1:16874 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ophaeghaev.ru - Trojan-Spy.Win32.Zbot.akmi (blacklist.rules)
 * 1:16875 <-> DISABLED <-> BLACKLIST DNS request for known malware domain up1.free-sms.co.kr - Trojan.Win32.Vilsel.akp (blacklist.rules)
 * 1:16876 <-> DISABLED <-> BLACKLIST DNS request for known malware domain c.softdowns.info - Trojan.BAT.Agent.yn (blacklist.rules)
 * 1:16877 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ddkom.biz - Trojan.Win32.Scar.ckhr (blacklist.rules)
 * 1:16878 <-> DISABLED <-> BLACKLIST DNS request for known malware domain vopret.ru - Trojan.Win32.FraudPack.axwn (blacklist.rules)
 * 1:16879 <-> DISABLED <-> BLACKLIST DNS request for known malware domain dnfpomo.dnfranran.com - Trojan-GameThief.Win32.OnLineGames.bnkx (blacklist.rules)
 * 1:16881 <-> DISABLED <-> BLACKLIST DNS request for known malware domain sex-gifts.ru - Trojan-Spy.Win32.Zbot.gen (blacklist.rules)
 * 1:16882 <-> DISABLED <-> BLACKLIST DNS request for known malware domain 111.168lala.com - Backdoor.Win32.Popwin.cyn (blacklist.rules)
 * 1:16883 <-> DISABLED <-> BLACKLIST DNS request for known malware domain mcafee-registry.ru - Trojan-Spy.Win32.Zbot.akgb (blacklist.rules)
 * 1:16884 <-> DISABLED <-> BLACKLIST DNS request for known malware domain bits4ever.ru - Trojan-Spy.Win32.Zbot.aknt (blacklist.rules)
 * 1:16885 <-> DISABLED <-> BLACKLIST DNS request for known malware domain monicaecarlos.com - Trojan-Downloader.Win32.Genome.awxv (blacklist.rules)
 * 1:16887 <-> DISABLED <-> BLACKLIST DNS request for known malware domain hesneclimi.ru - Packed.Win32.Krap.ae (blacklist.rules)
 * 1:16888 <-> DISABLED <-> BLACKLIST DNS request for known malware domain dbtte.com - Trojan-Banker.Win32.Banz.crk (blacklist.rules)
 * 1:16890 <-> DISABLED <-> BLACKLIST DNS request for known malware domain in6cs.com - Trojan.Win32.Tdss.beea (blacklist.rules)
 * 1:16891 <-> DISABLED <-> BLACKLIST DNS request for known malware domain solo1928.ru - Trojan-Spy.Win32.Zbot.gen (blacklist.rules)
 * 1:16892 <-> DISABLED <-> BLACKLIST DNS request for known malware domain fg545633.host.zgridc.com - Trojan.Win32.Pincav.abub (blacklist.rules)
 * 1:16893 <-> DISABLED <-> BLACKLIST DNS request for known malware domain primusdns.ru - Backdoor.Win32.Havar.eh (blacklist.rules)
 * 1:16895 <-> DISABLED <-> BLACKLIST DNS request for known malware domain alodh.in - Backdoor.Win32.Delf.vde (blacklist.rules)
 * 1:16896 <-> DISABLED <-> BLACKLIST DNS request for known malware domain reward.pnshop.co.kr - Backdoor.Win32.Agent.ahra (blacklist.rules)
 * 1:16898 <-> DISABLED <-> BLACKLIST DNS request for known malware domain sx21.e4578.com - Trojan.Win32.Scar.ccqb (blacklist.rules)
 * 1:16900 <-> DISABLED <-> BLACKLIST DNS request for known malware domain reportes201.com - Trojan-Downloader.Win32.Genome.ashe (blacklist.rules)
 * 1:16901 <-> DISABLED <-> BLACKLIST DNS request for known malware domain local.1140.co.kr - Trojan-Downloader.Win32.Genome.aobm (blacklist.rules)
 * 1:16902 <-> DISABLED <-> BLACKLIST DNS request for known malware domain promojoy.net - Packed.Win32.Krap.gx (blacklist.rules)
 * 1:16903 <-> DISABLED <-> BLACKLIST DNS request for known malware domain gpwg.ws - Worm.Win32.AutoRun.bjca (blacklist.rules)
 * 1:16906 <-> DISABLED <-> BLACKLIST DNS request for known malware domain down.p2pplay.com - Trojan-GameThief.Win32.OnLineGames.wgkv (blacklist.rules)
 * 1:16907 <-> DISABLED <-> BLACKLIST DNS request for known malware domain livetrust.info - Trojan-Spy.Win32.Zbot.akku (blacklist.rules)
 * 1:16908 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ootaivilei.ru - Trojan-Spy.Win32.Zbot.akme (blacklist.rules)
 * 1:16909 <-> DISABLED <-> BLACKLIST DNS request for known malware domain babah20122012.com - Trojan-Spy.Win32.Zbot.akbb (blacklist.rules)
 * 1:16910 <-> DISABLED <-> BLACKLIST DNS request for known malware domain pattern - 0-0-0-0-0-0-0.info (blacklist.rules)
 * 1:17052 <-> DISABLED <-> WEB-ACTIVEX Symantec AppStream Client LaunchObj ActiveX clsid unicode access (web-activex.rules)
 * 1:17053 <-> DISABLED <-> WEB-ACTIVEX Symantec AppStream Client LaunchObj ActiveX function call access (web-activex.rules)
 * 1:17054 <-> DISABLED <-> WEB-ACTIVEX Symantec AppStream Client LaunchObj ActiveX function call unicode access (web-activex.rules)
 * 1:17061 <-> DISABLED <-> WEB-ACTIVEX Symantec Norton Personal Firewall 2004 ActiveX clsid access (web-activex.rules)
 * 1:17063 <-> DISABLED <-> WEB-ACTIVEX Logitech Video Call 1 ActiveX clsid access (web-activex.rules)
 * 1:17065 <-> DISABLED <-> WEB-ACTIVEX Logitech Video Call 2 ActiveX clsid access (web-activex.rules)
 * 1:17067 <-> DISABLED <-> WEB-ACTIVEX Logitech Video Call 3 ActiveX clsid access (web-activex.rules)
 * 1:17069 <-> DISABLED <-> WEB-ACTIVEX Logitech Video Call 4 ActiveX clsid access (web-activex.rules)
 * 1:17071 <-> DISABLED <-> WEB-ACTIVEX Logitech Video Call 5 ActiveX clsid access (web-activex.rules)
 * 1:17073 <-> DISABLED <-> WEB-ACTIVEX Ask Toolbar AskJeevesToolBar.SettingsPlugin ActiveX clsid access (web-activex.rules)
 * 1:17075 <-> DISABLED <-> WEB-ACTIVEX Ask Toolbar AskJeevesToolBar.SettingsPlugin ActiveX function call access (web-activex.rules)
 * 1:17078 <-> DISABLED <-> WEB-ACTIVEX GOM Player GomWeb ActiveX clsid access (web-activex.rules)
 * 1:17080 <-> DISABLED <-> WEB-ACTIVEX GOM Player GomWeb ActiveX function call access (web-activex.rules)
 * 1:17082 <-> DISABLED <-> WEB-ACTIVEX SonicWALL SSL-VPN NeLaunchCtrl ActiveX clsid access (web-activex.rules)
 * 1:17084 <-> DISABLED <-> WEB-ACTIVEX Creative Software AutoUpdate Engine ActiveX clsid access (web-activex.rules)
 * 1:17089 <-> DISABLED <-> WEB-ACTIVEX VeryDOC PDF Viewer ActiveX function call access (web-activex.rules)
 * 1:17096 <-> DISABLED <-> WEB-ACTIVEX AOL WinAmpX ActiveX clsid access (web-activex.rules)
 * 1:17099 <-> DISABLED <-> WEB-ACTIVEX CommuniCrypt Mail ANSMTP.dll/AOSMTP.dll ActiveX clsid access (web-activex.rules)
 * 1:17101 <-> DISABLED <-> WEB-ACTIVEX CommuniCrypt Mail ANSMTP.dll/AOSMTP.dll ActiveX function call access (web-activex.rules)
 * 1:17132 <-> DISABLED <-> EXPLOIT Microsoft Internet Explorer invalid object access attempt (exploit.rules)
 * 1:17155 <-> DISABLED <-> SPECIFIC-THREATS Multiple vendors OPIE off-by-one stack buffer overflow attempt (specific-threats.rules)
 * 1:17161 <-> DISABLED <-> WEB-ACTIVEX Liquid XML Studio ActiveX clsid access (web-activex.rules)
 * 1:17163 <-> DISABLED <-> WEB-ACTIVEX Liquid XML Studio ActiveX function call access (web-activex.rules)
 * 1:17167 <-> DISABLED <-> WEB-ACTIVEX Oracle Siebel Option Pack 1 ActiveX clsid access (web-activex.rules)
 * 1:17169 <-> DISABLED <-> WEB-ACTIVEX Oracle Siebel Option Pack 2 ActiveX clsid access (web-activex.rules)
 * 1:17171 <-> DISABLED <-> WEB-ACTIVEX Oracle Siebel Option Pack 3 ActiveX clsid access (web-activex.rules)
 * 1:17173 <-> DISABLED <-> WEB-ACTIVEX Oracle Siebel Option Pack 4 ActiveX clsid access (web-activex.rules)
 * 1:17175 <-> DISABLED <-> WEB-ACTIVEX Oracle Siebel Option Pack 5 ActiveX clsid access (web-activex.rules)
 * 1:17177 <-> DISABLED <-> WEB-ACTIVEX Oracle Siebel Option Pack 6 ActiveX clsid access (web-activex.rules)
 * 1:17205 <-> DISABLED <-> RPC Multiple vendors librpc.dll stack buffer overflow attempt - udp (rpc.rules)
 * 1:17226 <-> DISABLED <-> WEB-ACTIVEX AXIS Camera ActiveX initialization via script (web-activex.rules)
 * 1:17257 <-> ENABLED <-> SPECIFIC-THREATS Adobe Flash Player and Reader remote code execution attempt (specific-threats.rules)
 * 1:1732 <-> DISABLED <-> RPC portmap rwalld request UDP (rpc.rules)
 * 1:17329 <-> DISABLED <-> FTP EPRT overflow attempt (ftp.rules)
 * 1:1733 <-> DISABLED <-> RPC portmap rwalld request TCP (rpc.rules)
 * 1:17334 <-> DISABLED <-> SPECIFIC-THREATS RealNetworks RealPlayer SWF Flash File buffer overflow attempt (specific-threats.rules)
 * 1:1734 <-> DISABLED <-> FTP USER overflow attempt (ftp.rules)
 * 1:17367 <-> DISABLED <-> FTP Microsoft Internet Explorer FTP Response Parsing Memory Corruption (ftp.rules)
 * 1:17446 <-> DISABLED <-> SPECIFIC-THREATS Microsoft Internet Explorer FTP client directory traversal attempt (specific-threats.rules)
 * 1:1746 <-> DISABLED <-> RPC portmap cachefsd request UDP (rpc.rules)
 * 1:17464 <-> DISABLED <-> WEB-ACTIVEX AOL Radio AmpX ActiveX clsid access (web-activex.rules)
 * 1:1747 <-> DISABLED <-> RPC portmap cachefsd request TCP (rpc.rules)
 * 1:17495 <-> DISABLED <-> SPECIFIC-THREATS Squid proxy DNS response spoofing attempt (specific-threats.rules)
 * 1:17518 <-> DISABLED <-> FTP FlashGet PWD command stack buffer overflow attempt (ftp.rules)
 * 1:17575 <-> DISABLED <-> WEB-ACTIVEX SizerOne 2 ActiveX clsid access (web-activex.rules)
 * 1:17579 <-> DISABLED <-> FILE-OFFICE Microsoft Office Drawing Record msofbtOPT Code Execution attempt (file-office.rules)
 * 1:17592 <-> DISABLED <-> WEB-ACTIVEX Microsoft MyInfo.dll ActiveX clsid access (web-activex.rules)
 * 1:17633 <-> ENABLED <-> WEB-CLIENT RealNetworks RealPlayer SWF frame handling buffer overflow attempt (web-client.rules)
 * 1:17658 <-> ENABLED <-> SPECIFIC-THREATS Adobe Flash frame type identifier memory corruption attempt (specific-threats.rules)
 * 1:17670 <-> DISABLED <-> WEB-ACTIVEX BigAnt Office Manager ActiveX clsid access (web-activex.rules)
 * 1:17672 <-> DISABLED <-> WEB-ACTIVEX BigAnt Office Manager ActiveX function call access (web-activex.rules)
 * 1:17674 <-> DISABLED <-> WEB-ACTIVEX Skype Extras Manager ActiveX clsid access (web-activex.rules)
 * 1:17676 <-> DISABLED <-> WEB-ACTIVEX Skype Extras Manager ActiveX function call access (web-activex.rules)
 * 1:17680 <-> DISABLED <-> SPECIFIC-THREATS ISC BIND DNSSEC Validation Multiple RRsets DoS (specific-threats.rules)
 * 1:17732 <-> ENABLED <-> FILE-IDENTIFY TIFF file download request (file-identify.rules)
 * 1:17766 <-> DISABLED <-> EXPLOIT Microsoft Internet Explorer 8 XSS in toStaticHTML API attempt (exploit.rules)
 * 1:1777 <-> DISABLED <-> FTP EXPLOIT STAT * dos attempt (ftp.rules)
 * 1:1778 <-> DISABLED <-> FTP EXPLOIT STAT ? dos attempt (ftp.rules)
 * 1:17819 <-> DISABLED <-> BLACKLIST DNS request for known malware domain motuh.com (blacklist.rules)
 * 1:17821 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ketsymbol.com (blacklist.rules)
 * 1:17824 <-> DISABLED <-> BLACKLIST DNS request for known malware domain teenxmovs.net (blacklist.rules)
 * 1:17826 <-> DISABLED <-> BLACKLIST DNS request for known malware domain cheaps1.info (blacklist.rules)
 * 1:17827 <-> DISABLED <-> BLACKLIST DNS request for known malware domain sexmoviesland.net (blacklist.rules)
 * 1:17828 <-> DISABLED <-> BLACKLIST DNS request for known malware domain 67.201.36.16 (blacklist.rules)
 * 1:17830 <-> DISABLED <-> BLACKLIST DNS request for known malware domain dickvsclit.net (blacklist.rules)
 * 1:17831 <-> DISABLED <-> BLACKLIST DNS request for known malware domain edrichfinearts.com (blacklist.rules)
 * 1:17834 <-> DISABLED <-> BLACKLIST DNS request for known malware domain 343.boolans.com (blacklist.rules)
 * 1:17835 <-> DISABLED <-> BLACKLIST DNS request for known malware domain xpresdnet.com (blacklist.rules)
 * 1:17836 <-> DISABLED <-> BLACKLIST DNS request for known malware domain gbsup.com (blacklist.rules)
 * 1:17837 <-> DISABLED <-> BLACKLIST DNS request for known malware domain xxsmovies.com (blacklist.rules)
 * 1:17838 <-> DISABLED <-> BLACKLIST DNS request for known malware domain vc.iwriteweb.com (blacklist.rules)
 * 1:17839 <-> DISABLED <-> BLACKLIST DNS request for known malware domain js.222233.com (blacklist.rules)
 * 1:17840 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.grannyplanet.com (blacklist.rules)
 * 1:17842 <-> DISABLED <-> BLACKLIST DNS request for known malware domain extrahotx.net (blacklist.rules)
 * 1:17843 <-> DISABLED <-> BLACKLIST DNS request for known malware domain extralargevideos.com (blacklist.rules)
 * 1:17844 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.derquda.com (blacklist.rules)
 * 1:17845 <-> DISABLED <-> BLACKLIST DNS request for known malware domain aahydrogen.com (blacklist.rules)
 * 1:17846 <-> DISABLED <-> BLACKLIST DNS request for known malware domain trumpetlicks.com (blacklist.rules)
 * 1:17847 <-> DISABLED <-> BLACKLIST DNS request for known malware domain mskla.com (blacklist.rules)
 * 1:17849 <-> DISABLED <-> BLACKLIST DNS request for known malware domain fuckersucker.com (blacklist.rules)
 * 1:17850 <-> DISABLED <-> BLACKLIST DNS request for known malware domain pornfucklist.com (blacklist.rules)
 * 1:17851 <-> DISABLED <-> BLACKLIST DNS request for known malware domain game.685faiudeme.com (blacklist.rules)
 * 1:17853 <-> DISABLED <-> BLACKLIST DNS request for known malware domain dommonview.com (blacklist.rules)
 * 1:17854 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.lamiaexragazza.com (blacklist.rules)
 * 1:17855 <-> DISABLED <-> BLACKLIST DNS request for known malware domain acofinder.com (blacklist.rules)
 * 1:17856 <-> DISABLED <-> BLACKLIST DNS request for known malware domain fuckfuckvids.com (blacklist.rules)
 * 1:17857 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.cnhack.cn (blacklist.rules)
 * 1:17858 <-> DISABLED <-> BLACKLIST DNS request for known malware domain kingsizematures.com (blacklist.rules)
 * 1:17859 <-> DISABLED <-> BLACKLIST DNS request for known malware domain promotds.com (blacklist.rules)
 * 1:17860 <-> DISABLED <-> BLACKLIST DNS request for known malware domain mejac.com (blacklist.rules)
 * 1:17863 <-> DISABLED <-> BLACKLIST DNS request for known malware domain rpt2.21civ.com (blacklist.rules)
 * 1:17864 <-> DISABLED <-> BLACKLIST DNS request for known malware domain tubexxxmatures.com (blacklist.rules)
 * 1:17866 <-> DISABLED <-> BLACKLIST DNS request for known malware domain aebankonline.com (blacklist.rules)
 * 1:17870 <-> DISABLED <-> BLACKLIST DNS request for known malware domain trojan8.com (blacklist.rules)
 * 1:17871 <-> DISABLED <-> BLACKLIST DNS request for known malware domain brutalxvideos.com (blacklist.rules)
 * 1:17872 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www3.sexown.com (blacklist.rules)
 * 1:17873 <-> DISABLED <-> BLACKLIST DNS request for known malware domain mummimpegs.com (blacklist.rules)
 * 1:17874 <-> DISABLED <-> BLACKLIST DNS request for known malware domain f19dd4abb8b8bdf2.cn (blacklist.rules)
 * 1:17875 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.very-young-boys.com (blacklist.rules)
 * 1:17876 <-> DISABLED <-> BLACKLIST DNS request for known malware domain 91629.com (blacklist.rules)
 * 1:17878 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ayb.host127-0-0-1.com (blacklist.rules)
 * 1:17879 <-> DISABLED <-> BLACKLIST DNS request for known malware domain cfg.353wanwan.com (blacklist.rules)
 * 1:17881 <-> DISABLED <-> BLACKLIST DNS request for known malware domain fucktosky.com (blacklist.rules)
 * 1:17882 <-> DISABLED <-> BLACKLIST DNS request for known malware domain procca.com (blacklist.rules)
 * 1:17883 <-> DISABLED <-> BLACKLIST DNS request for known malware domain autouploaders.net (blacklist.rules)
 * 1:17884 <-> DISABLED <-> BLACKLIST DNS request for known malware domain gimmemyporn.com (blacklist.rules)
 * 1:17885 <-> DISABLED <-> BLACKLIST DNS request for known malware domain waytoall.com (blacklist.rules)
 * 1:17886 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.spamature.com (blacklist.rules)
 * 1:17887 <-> DISABLED <-> BLACKLIST DNS request for known malware domain info.collectionerrorreport.com (blacklist.rules)
 * 1:17889 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.ajie520.com (blacklist.rules)
 * 1:17891 <-> DISABLED <-> BLACKLIST DNS request for known malware domain bestkind.ru (blacklist.rules)
 * 1:17893 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.zxc0001.com (blacklist.rules)
 * 1:17894 <-> DISABLED <-> BLACKLIST DNS request for known malware domain streq.cn (blacklist.rules)
 * 1:17895 <-> DISABLED <-> BLACKLIST DNS request for known malware domain pyow.prixi-soft.ir (blacklist.rules)
 * 1:17897 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.moneytw8.com (blacklist.rules)
 * 1:18082 <-> DISABLED <-> BLACKLIST DNS request for known malware domain 3q.sbwanwan.com (blacklist.rules)
 * 1:18083 <-> DISABLED <-> BLACKLIST DNS request for known malware domain 863.dclsba.com (blacklist.rules)
 * 1:18086 <-> DISABLED <-> BLACKLIST DNS request for known malware domain qq.sbwanwan.com (blacklist.rules)
 * 1:18089 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.auto328.com (blacklist.rules)
 * 1:18090 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.comstelecom.com (blacklist.rules)
 * 1:18091 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.goodfriends.or.kr (blacklist.rules)
 * 1:18092 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.hao1345.com (blacklist.rules)
 * 1:18093 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.opusgame.com (blacklist.rules)
 * 1:18094 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.theoffstage.com (blacklist.rules)
 * 1:18095 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.wwmei.com (blacklist.rules)
 * 1:18103 <-> DISABLED <-> BLACKLIST DNS request for known malware domain 5yvod.net (blacklist.rules)
 * 1:18104 <-> DISABLED <-> BLACKLIST DNS request for known malware domain b.9s3.info (blacklist.rules)
 * 1:18106 <-> DISABLED <-> BLACKLIST DNS request for known malware domain e.msssm.com (blacklist.rules)
 * 1:18108 <-> DISABLED <-> BLACKLIST DNS request for known malware domain phoroshop.es (blacklist.rules)
 * 1:18114 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.5fqq.com (blacklist.rules)
 * 1:18115 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.ajs2002.com (blacklist.rules)
 * 1:18116 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.bnbsoft.co.kr (blacklist.rules)
 * 1:18117 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.cineseoul.com (blacklist.rules)
 * 1:18118 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.hao1345.com (blacklist.rules)
 * 1:18119 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.ilbondrama.net (blacklist.rules)
 * 1:18120 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.iwebdy.net (blacklist.rules)
 * 1:18121 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.linzhiling123.com (blacklist.rules)
 * 1:18122 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.opusgame.com (blacklist.rules)
 * 1:18123 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.phoroshop.es (blacklist.rules)
 * 1:18124 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.sijianfeng.com (blacklist.rules)
 * 1:18125 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.tpydb.com (blacklist.rules)
 * 1:18127 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.univus.co.kr (blacklist.rules)
 * 1:18128 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.uwonderfull.com (blacklist.rules)
 * 1:18129 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.w22rt.com (blacklist.rules)
 * 1:18130 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.wwmei.com (blacklist.rules)
 * 1:18133 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.001zs.com (blacklist.rules)
 * 1:18134 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.551sf.com (blacklist.rules)
 * 1:18135 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.555hd.com (blacklist.rules)
 * 1:18136 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.66xihu.com (blacklist.rules)
 * 1:18137 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.9292cs.cn (blacklist.rules)
 * 1:18138 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.chateaulegend.com (blacklist.rules)
 * 1:18139 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.china-aoben.com (blacklist.rules)
 * 1:18140 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.cqtjg.com (blacklist.rules)
 * 1:18141 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.dspenter.com (blacklist.rules)
 * 1:18142 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.eastadmin.com (blacklist.rules)
 * 1:18143 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.fp0755.cn (blacklist.rules)
 * 1:18144 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.fp0769.com (blacklist.rules)
 * 1:18145 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.fp360.net (blacklist.rules)
 * 1:18146 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.gdfp365.cn (blacklist.rules)
 * 1:18147 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.gev.cn (blacklist.rules)
 * 1:18148 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.haoleyou.com (blacklist.rules)
 * 1:18149 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.haosf08.com (blacklist.rules)
 * 1:18150 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.jxbaike.com (blacklist.rules)
 * 1:18151 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.kingsoftduba2009.com (blacklist.rules)
 * 1:18152 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.mainhu.com (blacklist.rules)
 * 1:18154 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.nc57.com (blacklist.rules)
 * 1:18155 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.pplog.cn (blacklist.rules)
 * 1:18156 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.pxflm.com (blacklist.rules)
 * 1:18157 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.quyou365.com (blacklist.rules)
 * 1:18158 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.shzhaotian.cn (blacklist.rules)
 * 1:18159 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.soanala.com (blacklist.rules)
 * 1:18160 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.stony-skunk.com (blacklist.rules)
 * 1:18161 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.street08.com (blacklist.rules)
 * 1:18162 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.weilingcy.com (blacklist.rules)
 * 1:18163 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.yisaa.com (blacklist.rules)
 * 1:18164 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.yx240.com (blacklist.rules)
 * 1:18165 <-> DISABLED <-> BLACKLIST DNS request for known malware domain e.mssm.com (blacklist.rules)
 * 1:18182 <-> DISABLED <-> SPECIFIC-THREATS ProFTPd 1.3.3c backdoor help access attempt (specific-threats.rules)
 * 1:18184 <-> DISABLED <-> BLACKLIST DNS request for known malware domain dnf.gametime.co.kr (blacklist.rules)
 * 1:18185 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.dd0415.net (blacklist.rules)
 * 1:18198 <-> DISABLED <-> WEB-ACTIVEX Microsoft COleSite ActiveX memory corruption attempt (web-activex.rules)
 * 1:18199 <-> DISABLED <-> WEB-ACTIVEX Microsoft COleSite ActiveX memory corruption attempt (web-activex.rules)
 * 1:18251 <-> DISABLED <-> BLACKLIST DNS request for known malware domain vcxde.com (blacklist.rules)
 * 1:18252 <-> DISABLED <-> BLACKLIST DNS request for known malware domain protectyourpc-11.com (blacklist.rules)
 * 1:18253 <-> DISABLED <-> BLACKLIST DNS request for known malware domain blogsmonitoringservice.com (blacklist.rules)
 * 1:18254 <-> DISABLED <-> BLACKLIST DNS request for known malware domain checkserverstux.com (blacklist.rules)
 * 1:18255 <-> DISABLED <-> BLACKLIST DNS request for known malware domain gopheisstoo.cc (blacklist.rules)
 * 1:18256 <-> DISABLED <-> BLACKLIST DNS request for known malware domain tutubest.com (blacklist.rules)
 * 1:18257 <-> DISABLED <-> BLACKLIST DNS request for known malware domain dns-check.biz (blacklist.rules)
 * 1:18258 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ftuny.com (blacklist.rules)
 * 1:18259 <-> DISABLED <-> BLACKLIST DNS request for known malware domain whysohardx.com (blacklist.rules)
 * 1:18260 <-> DISABLED <-> BLACKLIST DNS request for known malware domain freenetgameonline.com (blacklist.rules)
 * 1:18269 <-> DISABLED <-> BLACKLIST DNS request for known malware domain dnf.6bom.com (blacklist.rules)
 * 1:18270 <-> DISABLED <-> BLACKLIST DNS request for known malware domain koonol.com (blacklist.rules)
 * 1:18272 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.886.com (blacklist.rules)
 * 1:18321 <-> DISABLED <-> WEB-ACTIVEX SonicWall Aventail EPInterrogator ActiveX clsid access (web-activex.rules)
 * 1:18322 <-> DISABLED <-> WEB-ACTIVEX SonicWall Aventail EPInterrogator ActiveX function call access (web-activex.rules)
 * 1:18323 <-> DISABLED <-> WEB-ACTIVEX SonicWall Aventail EPInstaller ActiveX clsid access (web-activex.rules)
 * 1:18324 <-> DISABLED <-> WEB-ACTIVEX SonicWall Aventail EPInstaller ActiveX function call access (web-activex.rules)
 * 1:18325 <-> DISABLED <-> WEB-ACTIVEX Image Viewer CP Gold 6 ActiveX clsid access (web-activex.rules)
 * 1:18326 <-> DISABLED <-> FTP ProFTPD mod_site_misc module directory traversal attempt (ftp.rules)
 * 1:18413 <-> ENABLED <-> EXPLOIT Microsoft Windows WMI tracing api integer truncation attempt (exploit.rules)
 * 1:18418 <-> ENABLED <-> SPECIFIC-THREATS Adobe Flash player ActionScript apply function memory corruption attempt (specific-threats.rules)
 * 1:18490 <-> DISABLED <-> WEB-ACTIVEX Whale Client Components ActiveX clsid access (web-activex.rules)
 * 1:18491 <-> DISABLED <-> WEB-ACTIVEX Whale Client Components ActiveX ProgID access (web-activex.rules)
 * 1:18492 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ilo.brenz.pl (blacklist.rules)
 * 1:18580 <-> DISABLED <-> FTP ACCT overflow attempt (ftp.rules)
 * 1:18588 <-> DISABLED <-> FTP Ipswitch Ws_ftp XCRC overflow attempt (ftp.rules)
 * 1:18634 <-> DISABLED <-> FILE-OFFICE Microsoft Office Excel Workspace file FontCount record memory corruption attempt (file-office.rules)
 * 1:1864 <-> DISABLED <-> FTP SITE NEWER attempt (ftp.rules)
 * 1:1888 <-> DISABLED <-> FTP SITE CPWD overflow attempt (ftp.rules)
 * 1:18904 <-> DISABLED <-> WEB-ACTIVEX KingView ActiveX clsid access (web-activex.rules)
 * 1:18963 <-> DISABLED <-> SPECIFIC-THREATS Adobe ActionScript 3 addEventListener exploit attempt (specific-threats.rules)
 * 1:18964 <-> DISABLED <-> SPECIFIC-THREATS Adobe Flash file DefineFont4 remote code execution attempt (specific-threats.rules)
 * 1:18965 <-> DISABLED <-> SPECIFIC-THREATS Adobe Flash file ActionScript 2 ActionJump remote code execution attempt (specific-threats.rules)
 * 1:18966 <-> DISABLED <-> SPECIFIC-THREATS Adobe Flash file DefineFont4 remote code execution attempt (specific-threats.rules)
 * 1:18967 <-> DISABLED <-> SPECIFIC-THREATS Adobe ActionScript argumentCount download attempt (specific-threats.rules)
 * 1:18968 <-> DISABLED <-> SPECIFIC-THREATS Adobe Flash ActionScript3 stack integer overflow attempt (specific-threats.rules)
 * 1:18969 <-> DISABLED <-> SPECIFIC-THREATS Adobe Flash Player ActionScript ActionIf integer overflow attempt (specific-threats.rules)
 * 1:18970 <-> DISABLED <-> SPECIFIC-THREATS Adobe Flash Player null pointer dereference attempt (specific-threats.rules)
 * 1:18971 <-> DISABLED <-> SPECIFIC-THREATS Adobe Flash beginGradientfill improper color validation attempt (specific-threats.rules)
 * 1:18975 <-> DISABLED <-> WEB-ACTIVEX SAP Crystal Reports PrintControl.dll ActiveX function call access (web-activex.rules)
 * 1:19080 <-> ENABLED <-> SPECIFIC-THREATS Adobe Flash Player memory corruption attempt (specific-threats.rules)
 * 1:19086 <-> DISABLED <-> WEB-ACTIVEX LEADTOOLS Raster Twain LtocxTwainu.dll ActiveX function call (web-activex.rules)
 * 1:19103 <-> DISABLED <-> WEB-ACTIVEX Symantec CLIProxy.dll ActiveX function call access (web-activex.rules)
 * 1:19109 <-> DISABLED <-> WEB-ACTIVEX SonicWall Aventail EPInstaller ActiveX function call access (web-activex.rules)
 * 1:19152 <-> DISABLED <-> WEB-ACTIVEX Trend Micro HouseCall ActiveX function call access (web-activex.rules)
 * 1:1919 <-> DISABLED <-> FTP CWD overflow attempt (ftp.rules)
 * 1:19194 <-> DISABLED <-> WEB-ACTIVEX Oracle Document Capture ActiveX function call access (web-activex.rules)
 * 1:19197 <-> DISABLED <-> WEB-ACTIVEX CA Internet Security Suite XMLSecDB ActiveX clsid access (web-activex.rules)
 * 1:1920 <-> DISABLED <-> FTP SITE NEWER overflow attempt (ftp.rules)
 * 1:1921 <-> DISABLED <-> FTP SITE ZIPCHK overflow attempt (ftp.rules)
 * 1:1922 <-> DISABLED <-> RPC portmap proxy attempt TCP (rpc.rules)
 * 1:1923 <-> DISABLED <-> RPC portmap proxy attempt UDP (rpc.rules)
 * 1:19257 <-> DISABLED <-> WEB-CLIENT Adobe Flash ActionScript float index memory corruption (web-client.rules)
 * 1:19262 <-> DISABLED <-> SPECIFIC-THREATS Adobe Flash ActionScript float index array memory corruption (specific-threats.rules)
 * 1:19263 <-> DISABLED <-> SPECIFIC-THREATS Adobe Flash ActionScript float index array memory corruption (specific-threats.rules)
 * 1:19264 <-> DISABLED <-> SPECIFIC-THREATS Adobe Flash ActionScript float index array memory corruption (specific-threats.rules)
 * 1:1927 <-> DISABLED <-> FTP authorized_keys (ftp.rules)
 * 1:1928 <-> DISABLED <-> FTP shadow retrieval attempt (ftp.rules)
 * 1:19305 <-> DISABLED <-> WEB-ACTIVEX Oracle EasyMail ActiveX function call access (web-activex.rules)
 * 1:19392 <-> DISABLED <-> SPYWARE-PUT Keylogger Monitor.win32.perflogger (spyware-put.rules)
 * 1:19393 <-> DISABLED <-> SPYWARE-PUT Keylogger Monitor.win32.perflogger (spyware-put.rules)
 * 1:19415 <-> DISABLED <-> BACKDOOR vsFTPd 2.3.4 backdoor connection attempt (backdoor.rules)
 * 1:1942 <-> DISABLED <-> FTP RMDIR overflow attempt (ftp.rules)
 * 1:19470 <-> DISABLED <-> BLACKLIST DNS request for known malware domain antispydot.com - Win32/Cybot.B (blacklist.rules)
 * 1:19480 <-> ENABLED <-> BLACKLIST USER-AGENT known malicious user-agent string STORMDDOS - Backdoor.Win32.Inject.ctt (blacklist.rules)
 * 1:19482 <-> ENABLED <-> BLACKLIST USER-AGENT known malicious user-agent string ErrorFix (blacklist.rules)
 * 1:1949 <-> DISABLED <-> RPC portmap SET attempt TCP 111 (rpc.rules)
 * 1:19496 <-> DISABLED <-> BLACKLIST DNS request for known malware domain 01n02n4cx00.cc - TDL4 (blacklist.rules)
 * 1:19497 <-> DISABLED <-> BLACKLIST DNS request for known malware domain 01n02n4cx00.com - TDL4 (blacklist.rules)
 * 1:19498 <-> DISABLED <-> BLACKLIST DNS request for known malware domain 01n20n4cx00.com - TDL4 (blacklist.rules)
 * 1:19499 <-> DISABLED <-> BLACKLIST DNS request for known malware domain 0imh17agcla.com - TDL4 (blacklist.rules)
 * 1:1950 <-> DISABLED <-> RPC portmap SET attempt UDP 111 (rpc.rules)
 * 1:19500 <-> DISABLED <-> BLACKLIST DNS request for known malware domain 10n02n4cx00.com - TDL4 (blacklist.rules)
 * 1:19501 <-> DISABLED <-> BLACKLIST DNS request for known malware domain 1il1il1il.com - TDL4 (blacklist.rules)
 * 1:19502 <-> DISABLED <-> BLACKLIST DNS request for known malware domain 1l1i16b0.com - TDL4 (blacklist.rules)
 * 1:19503 <-> DISABLED <-> BLACKLIST DNS request for known malware domain 34jh7alm94.asia - TDL4 (blacklist.rules)
 * 1:19504 <-> DISABLED <-> BLACKLIST DNS request for known malware domain 4gat16ag100.com - TDL4 (blacklist.rules)
 * 1:19505 <-> DISABLED <-> BLACKLIST DNS request for known malware domain 4tag16ag100.com - TDL4 (blacklist.rules)
 * 1:19506 <-> DISABLED <-> BLACKLIST DNS request for known malware domain 68b6b6b6.com - TDL4 (blacklist.rules)
 * 1:19507 <-> DISABLED <-> BLACKLIST DNS request for known malware domain 69b69b6b96b.com - TDL4 (blacklist.rules)
 * 1:19508 <-> DISABLED <-> BLACKLIST DNS request for known malware domain 7gaur15eb71.com - TDL4 (blacklist.rules)
 * 1:19509 <-> DISABLED <-> BLACKLIST DNS request for known malware domain 7uagr15eb71.com - TDL4 (blacklist.rules)
 * 1:19510 <-> DISABLED <-> BLACKLIST DNS request for known malware domain 86b6b6b6.com - TDL4 (blacklist.rules)
 * 1:19511 <-> DISABLED <-> BLACKLIST DNS request for known malware domain 86b6b96b.com - TDL4 (blacklist.rules)
 * 1:19512 <-> DISABLED <-> BLACKLIST DNS request for known malware domain 9669b6b96b.com - TDL4 (blacklist.rules)
 * 1:19513 <-> DISABLED <-> BLACKLIST DNS request for known malware domain cap01tchaa.com - TDL4 (blacklist.rules)
 * 1:19514 <-> DISABLED <-> BLACKLIST DNS request for known malware domain cap0itchaa.com - TDL4 (blacklist.rules)
 * 1:19515 <-> DISABLED <-> BLACKLIST DNS request for known malware domain countri1l.com - TDL4 (blacklist.rules)
 * 1:19516 <-> DISABLED <-> BLACKLIST DNS request for known malware domain dg6a51ja813.com - TDL4 (blacklist.rules)
 * 1:19517 <-> DISABLED <-> BLACKLIST DNS request for known malware domain gd6a15ja813.com - TDL4 (blacklist.rules)
 * 1:19518 <-> DISABLED <-> BLACKLIST DNS request for known malware domain i0m71gmak01.com - TDL4 (blacklist.rules)
 * 1:19519 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ikaturi11.com - TDL4 (blacklist.rules)
 * 1:19520 <-> DISABLED <-> BLACKLIST DNS request for known malware domain jna0-0akq8x.com - TDL4 (blacklist.rules)
 * 1:19521 <-> DISABLED <-> BLACKLIST DNS request for known malware domain ka18i7gah10.com - TDL4 (blacklist.rules)
 * 1:19522 <-> DISABLED <-> BLACKLIST DNS request for known malware domain kai817hag10.com - TDL4 (blacklist.rules)
 * 1:19523 <-> DISABLED <-> BLACKLIST DNS request for known malware domain kangojim1.com - TDL4 (blacklist.rules)
 * 1:19524 <-> DISABLED <-> BLACKLIST DNS request for known malware domain kangojjm1.com - TDL4 (blacklist.rules)
 * 1:19525 <-> DISABLED <-> BLACKLIST DNS request for known malware domain kur1k0nona.com - TDL4 (blacklist.rules)
 * 1:19526 <-> DISABLED <-> BLACKLIST DNS request for known malware domain l04undreyk.com - TDL4 (blacklist.rules)
 * 1:19527 <-> DISABLED <-> BLACKLIST DNS request for known malware domain li1i16b0.com - TDL4 (blacklist.rules)
 * 1:19528 <-> DISABLED <-> BLACKLIST DNS request for known malware domain lj1i16b0.com - TDL4 (blacklist.rules)
 * 1:19529 <-> DISABLED <-> BLACKLIST DNS request for known malware domain lkaturi71.com - TDL4 (blacklist.rules)
 * 1:19530 <-> DISABLED <-> BLACKLIST DNS request for known malware domain lkaturl11.com - TDL4 (blacklist.rules)
 * 1:19531 <-> DISABLED <-> BLACKLIST DNS request for known malware domain lkaturl71.com - TDL4 (blacklist.rules)
 * 1:19532 <-> DISABLED <-> BLACKLIST DNS request for known malware domain lo4undreyk.com - TDL4 (blacklist.rules)
 * 1:19533 <-> DISABLED <-> BLACKLIST DNS request for known malware domain n16fa53.com - TDL4 (blacklist.rules)
 * 1:19534 <-> DISABLED <-> BLACKLIST DNS request for known malware domain neywrika.in - TDL4 (blacklist.rules)
 * 1:19535 <-> DISABLED <-> BLACKLIST DNS request for known malware domain nichtadden.in - TDL4 (blacklist.rules)
 * 1:19536 <-> DISABLED <-> BLACKLIST DNS request for known malware domain nl6fa53.com - TDL4 (blacklist.rules)
 * 1:19537 <-> DISABLED <-> BLACKLIST DNS request for known malware domain nyewrika.in - TDL4 (blacklist.rules)
 * 1:19538 <-> DISABLED <-> BLACKLIST DNS request for known malware domain rukkeianno.com - TDL4 (blacklist.rules)
 * 1:19539 <-> DISABLED <-> BLACKLIST DNS request for known malware domain rukkeianno.in - TDL4 (blacklist.rules)
 * 1:19540 <-> DISABLED <-> BLACKLIST DNS request for known malware domain rukkieanno.in - TDL4 (blacklist.rules)
 * 1:19541 <-> DISABLED <-> BLACKLIST DNS request for known malware domain sh01cilewk.com - TDL4 (blacklist.rules)
 * 1:19542 <-> DISABLED <-> BLACKLIST DNS request for known malware domain sho1cilewk.com - TDL4 (blacklist.rules)
 * 1:19543 <-> DISABLED <-> BLACKLIST DNS request for known malware domain u101mnay2k.com - TDL4 (blacklist.rules)
 * 1:19544 <-> DISABLED <-> BLACKLIST DNS request for known malware domain u101mnuy2k.com - TDL4 (blacklist.rules)
 * 1:19545 <-> DISABLED <-> BLACKLIST DNS request for known malware domain xx87lhfda88.com - TDL4 (blacklist.rules)
 * 1:19546 <-> DISABLED <-> BLACKLIST DNS request for known malware domain zna61udha01.com - TDL4 (blacklist.rules)
 * 1:19547 <-> DISABLED <-> BLACKLIST DNS request for known malware domain zna81udha01.com - TDL4 (blacklist.rules)
 * 1:19548 <-> DISABLED <-> BLACKLIST DNS request for known malware domain zz87ihfda88.com - TDL4 (blacklist.rules)
 * 1:19549 <-> DISABLED <-> BLACKLIST DNS request for known malware domain zz87jhfda88.com - TDL4 (blacklist.rules)
 * 1:19550 <-> DISABLED <-> BLACKLIST DNS request for known malware domain zz87lhfda88.com - TDL4 (blacklist.rules)
 * 1:19561 <-> DISABLED <-> WEB-ACTIVEX RealNetworks RealPlayer ieframe.dll ActiveX clsid access (web-activex.rules)
 * 1:19562 <-> DISABLED <-> WEB-ACTIVEX RealNetworks RealGames InstallerDlg.dll ActiveX clsid access (web-activex.rules)
 * 1:19563 <-> DISABLED <-> WEB-ACTIVEX RealNetworks RealGames InstallerDlg.dll ActiveX function call access (web-activex.rules)
 * 1:19564 <-> DISABLED <-> WEB-ACTIVEX RealNetworks RealGames InstallerDlg.dll ActiveX clsid access (web-activex.rules)
 * 1:19565 <-> DISABLED <-> WEB-ACTIVEX RealNetworks RealGames InstallerDlg.dll ActiveX function call access (web-activex.rules)
 * 1:1959 <-> DISABLED <-> RPC portmap NFS request UDP (rpc.rules)
 * 1:1960 <-> DISABLED <-> RPC portmap NFS request TCP (rpc.rules)
 * 1:1961 <-> DISABLED <-> RPC portmap RQUOTA request UDP (rpc.rules)
 * 1:1962 <-> DISABLED <-> RPC portmap RQUOTA request TCP (rpc.rules)
 * 1:19639 <-> DISABLED <-> BLACKLIST DNS request for known malware domain s0pp0rtdesk.com (blacklist.rules)
 * 1:19640 <-> DISABLED <-> BLACKLIST DNS request for known malware domain mendi38.com (blacklist.rules)
 * 1:19643 <-> DISABLED <-> BLACKLIST DNS request for known malware domain www.java119.com (blacklist.rules)
 * 1:19644 <-> DISABLED <-> BLACKLIST DNS request for known malware domain lysyfyj.com (blacklist.rules)
 * 1:19662 <-> DISABLED <-> BLACKLIST DNS request for known malware domain keshmoney.biz (blacklist.rules)
 * 1:19663 <-> DISABLED <-> BLACKLIST DNS request for known malware domain tinaivanovic.sexy-serbian-girls.info (blacklist.rules)
 * 1:19664 <-> DISABLED <-> BLACKLIST DNS request for known malware domain smellypussy.info (blacklist.rules)
 * 1:19682 <-> ENABLED <-> WEB-CLIENT Adobe Flash Player ActionScript 3 integer overflow attempt (web-client.rules)
 * 1:19683 <-> ENABLED <-> WEB-CLIENT Adobe Flash Player ActionScript 3 buffer overflow attempt (web-client.rules)
 * 1:19684 <-> DISABLED <-> SPECIFIC-THREATS Adobe CFF font storage memory corruption attempt (specific-threats.rules)
 * 1:19687 <-> DISABLED <-> WEB-CLIENT Adobe Flash ActionStoreRegister instruction length invalidation attempt (web-client.rules)
 * 1:19688 <-> DISABLED <-> SPECIFIC-THREATS Adobe Flash Actionscript BitmapData buffer overflow attempt (specific-threats.rules)
 * 1:19689 <-> DISABLED <-> SPECIFIC-THREATS Adobe Flash Actionscript dynamic calculation double-free attempt (specific-threats.rules)
 * 1:19690 <-> DISABLED <-> SPECIFIC-THREATS Adobe Flash Actionscript duplicateDoorInputArguments stack overwrite (specific-threats.rules)
 * 1:19691 <-> DISABLED <-> SPECIFIC-THREATS Adobe Flash Actionscript File reference buffer overflow attempt (specific-threats.rules)
 * 1:1971 <-> DISABLED <-> FTP SITE EXEC format string attempt (ftp.rules)
 * 1:1972 <-> DISABLED <-> FTP PASS overflow attempt (ftp.rules)
 * 1:1973 <-> DISABLED <-> FTP MKD overflow attempt (ftp.rules)
 * 1:19734 <-> DISABLED <-> BLACKLIST DNS request for known malware domain 770304123.cn (blacklist.rules)
 * 1:19738 <-> DISABLED <-> BLACKLIST DNS request for known malware domain xzrw0q.com (blacklist.rules)
 * 1:1974 <-> DISABLED <-> FTP REST overflow attempt (ftp.rules)
 * 1:19741 <-> DISABLED <-> SPYWARE-PUT PWS.Win32.Scofted keylogger runtime detection (spyware-put.rules)
 * 1:1975 <-> DISABLED <-> FTP DELE overflow attempt (ftp.rules)
 * 1:1976 <-> DISABLED <-> FTP RMD overflow attempt (ftp.rules)
 * 1:19766 <-> DISABLED <-> BOTNET-CNC Worm Win32.Autorun.hi outbound connection (botnet-cnc.rules)
 * 1:19768 <-> DISABLED <-> BLACKLIST DNS request for known malware domain sxzyong.com (blacklist.rules)
 * 1:19874 <-> DISABLED <-> BLACKLIST DNS request for known malware domain qfsl.net - Win32/Morto.A (blacklist.rules)
 * 1:19875 <-> DISABLED <-> BLACKLIST DNS request for known malware domain jaifr.com - Win32/Morto.A (blacklist.rules)
 * 1:19876 <-> DISABLED <-> BLACKLIST DNS request for known malware domain jifr.info - Win32/Morto.A (blacklist.rules)
 * 1:19879 <-> DISABLED <-> BLACKLIST DNS request for known malware domain jifr.net - Win32/Morto.A (blacklist.rules)
 * 1:19918 <-> DISABLED <-> BOTNET-CNC Worm Win32.Ganelp.B outbound connection (botnet-cnc.rules)
 * 1:1992 <-> DISABLED <-> FTP LIST directory traversal attempt (ftp.rules)
 * 1:19925 <-> DISABLED <-> WEB-ACTIVEX Novell iPrint ActiveX client browser plugin call-back-url buffer overflow attempt (web-activex.rules)
 * 1:20027 <-> DISABLED <-> BLACKLIST DNS request for known malware domain sb.degreesbuy.com (blacklist.rules)
 * 1:20031 <-> DISABLED <-> SPECIFIC-THREATS Adobe Flash ActionScript float index array memory corruption (specific-threats.rules)
 * 1:20044 <-> DISABLED <-> WEB-ACTIVEX F-Secure Anti-Virus fsresh.dll clsid access (web-activex.rules)
 * 1:2005 <-> DISABLED <-> RPC portmap kcms_server request UDP (rpc.rules)
 * 1:20050 <-> DISABLED <-> SPECIFIC-THREATS Adobe Flash Player memory consumption vulnerability (specific-threats.rules)
 * 1:2006 <-> DISABLED <-> RPC portmap kcms_server request TCP (rpc.rules)
 * 1:20071 <-> DISABLED <-> WEB-ACTIVEX WMIScriptUtils.WMIObjectBroker2.1 ActiveX CLSID access (web-activex.rules)
 * 1:20098 <-> DISABLED <-> BOTNET-CNC Trojan.Win32.KeyLogger.wav outbound connection (botnet-cnc.rules)
 * 1:20115 <-> DISABLED <-> EXPLOIT Microsoft Sharepoint XML external entity exploit attempt (exploit.rules)
 * 1:2014 <-> DISABLED <-> RPC portmap UNSET attempt TCP 111 (rpc.rules)
 * 1:2015 <-> DISABLED <-> RPC portmap UNSET attempt UDP 111 (rpc.rules)
 * 1:2016 <-> DISABLED <-> RPC portmap status request TCP (rpc.rules)
 * 1:20168 <-> DISABLED <-> WEB-ACTIVEX ChemView SaveAsMolFile vulnerability ActiveX clsid access (web-activex.rules)
 * 1:2017 <-> DISABLED <-> RPC portmap espd request UDP (rpc.rules)
 * 1:20183 <-> DISABLED <-> SPECIFIC-THREATS Adobe Flash Player setInterval use attempt (specific-threats.rules)
 * 1:20206 <-> DISABLED <-> SPECIFIC-THREATS Adobe Flash Player pcre ActionScript under allocation (specific-threats.rules)
 * 1:20211 <-> DISABLED <-> WEB-CLIENT Adobe Flash Player recursive stack overflow attempt (web-client.rules)
 * 1:20270 <-> ENABLED <-> WEB-CLIENT Microsoft Windows afd.sys kernel-mode memory corruption attempt (web-client.rules)
 * 1:20285 <-> DISABLED <-> WEB-ACTIVEX Black Ice Barcode SDK ActiveX clsid access (web-activex.rules)
 * 1:20286 <-> DISABLED <-> WEB-ACTIVEX Black Ice Barcode SDK ActiveX function call access (web-activex.rules)
 * 1:2035 <-> DISABLED <-> RPC portmap network-status-monitor request UDP (rpc.rules)
 * 1:2036 <-> DISABLED <-> RPC portmap network-status-monitor request TCP (rpc.rules)
 * 1:20493 <-> ENABLED <-> FILE-IDENTIFY jarpack file magic detected (file-identify.rules)
 * 1:20495 <-> ENABLED <-> FILE-IDENTIFY compressed Adobe Shockwave Flash file magic detected (file-identify.rules)
 * 1:20536 <-> DISABLED <-> WEB-ACTIVEX Moxa MediaDBPlayback.DLL ActiveX clsid access (web-activex.rules)
 * 1:20545 <-> DISABLED <-> SPECIFIC-THREATS Adobe Flash Player SWF embedded font null pointer attempt (specific-threats.rules)
 * 1:20547 <-> DISABLED <-> SPECIFIC-THREATS Adobe Flash Player overlapping record overflow attempt (specific-threats.rules)
 * 1:20548 <-> DISABLED <-> SPECIFIC-THREATS Adobe Flash Player recursive doaction stack exhaustion (specific-threats.rules)
 * 1:20549 <-> DISABLED <-> SPECIFIC-THREATS Adobe Flash Player ActionScript bytecode type confusion attempt (specific-threats.rules)
 * 1:20550 <-> DISABLED <-> SPECIFIC-THREATS Adobe Flash Player Mover3D clipping exploit (specific-threats.rules)
 * 1:20551 <-> DISABLED <-> SPECIFIC-THREATS Adobe Flash Player Stage 3D texture format overflow attempt (specific-threats.rules)
 * 1:20555 <-> DISABLED <-> SPECIFIC-THREATS Adobe Flash MP4 ref_frame allocated buffer overflow attempt (specific-threats.rules)
 * 1:20556 <-> DISABLED <-> SPECIFIC-THREATS Adobe Flash Player PlaceObjectX null pointer dereference attempt (specific-threats.rules)
 * 1:20557 <-> DISABLED <-> SPECIFIC-THREATS Adobe Flash Player ActionDefineFunction2 length overflow attempt (specific-threats.rules)
 * 1:20567 <-> DISABLED <-> SPECIFIC-THREATS Adobe Flash SWF AVM2 namespace lookup deref exploit (specific-threats.rules)
 * 1:20568 <-> DISABLED <-> SPECIFIC-THREATS Adobe Flash SWF ActionScript 3 ByteArray class vulnerability (specific-threats.rules)
 * 1:20591 <-> DISABLED <-> WEB-ACTIVEX Flexera InstallShield ISGrid2.dll DoFindReplace heap buffer overlow ActiveX clsid access (web-activex.rules)
 * 1:20592 <-> DISABLED <-> WEB-ACTIVEX Flexera InstallShield ISGrid2.dll DoFindReplace heap buffer overlow ActiveX function call access (web-activex.rules)
 * 1:20667 <-> DISABLED <-> EXPLOIT Mozilla Thunderbird / SeaMonkey Content-Type header buffer overflow attempt (exploit.rules)
 * 1:20705 <-> DISABLED <-> WEB-ACTIVEX Microsoft Time DATIME.DLL ActiveX clsid access (web-activex.rules)
 * 1:20706 <-> DISABLED <-> WEB-ACTIVEX Microsoft Time DATIME.DLL ActiveX clsid access (web-activex.rules)
 * 1:20707 <-> DISABLED <-> WEB-ACTIVEX Dell IT Assistant ActiveX clsid access (web-activex.rules)
 * 1:20708 <-> DISABLED <-> WEB-ACTIVEX HP Easy Printer Care Software ActiveX clsid access (web-activex.rules)
 * 1:20709 <-> DISABLED <-> WEB-ACTIVEX HP Photo Creative ActiveX clsid access (web-activex.rules)
 * 1:20710 <-> DISABLED <-> WEB-ACTIVEX HP Photo Creative ActiveX clsid access (web-activex.rules)
 * 1:20711 <-> DISABLED <-> WEB-ACTIVEX HP Photo Creative ActiveX clsid access (web-activex.rules)
 * 1:20712 <-> DISABLED <-> WEB-ACTIVEX HP Photo Creative ActiveX clsid access (web-activex.rules)
 * 1:20713 <-> DISABLED <-> WEB-ACTIVEX HP Photo Creative ActiveX clsid access (web-activex.rules)
 * 1:20714 <-> DISABLED <-> WEB-ACTIVEX HP Photo Creative ActiveX clsid access (web-activex.rules)
 * 1:20715 <-> DISABLED <-> WEB-ACTIVEX HP Photo Creative ActiveX clsid access (web-activex.rules)
 * 1:20716 <-> DISABLED <-> WEB-ACTIVEX Yahoo!  CD Player ActiveX clsid access (web-activex.rules)
 * 1:20767 <-> DISABLED <-> SPECIFIC-THREATS Adobe Flash ActionScript float index array memory corruption (specific-threats.rules)
 * 1:20777 <-> DISABLED <-> SPECIFIC-THREATS Adobe Flash ActionScript float index array memory corruption attempt (specific-threats.rules)
 * 1:2079 <-> DISABLED <-> RPC portmap nlockmgr request UDP (rpc.rules)
 * 1:2080 <-> DISABLED <-> RPC portmap nlockmgr request TCP (rpc.rules)
 * 1:2081 <-> DISABLED <-> RPC portmap rpc.xfsmd request UDP (rpc.rules)
 * 1:2082 <-> DISABLED <-> RPC portmap rpc.xfsmd request TCP (rpc.rules)
 * 1:20833 <-> DISABLED <-> BLACKLIST DNS request for known malware domain lilupophilupop.com (blacklist.rules)
 * 1:20834 <-> DISABLED <-> WEB-ACTIVEX Novell ZENworks LaunchHelp.dll LaunchProcess Code Execution ActiveX clsid access (web-activex.rules)
 * 1:20835 <-> DISABLED <-> WEB-ACTIVEX Novell ZENworks LaunchHelp.dll LaunchProcess Code Execution ActiveX function call access (web-activex.rules)
 * 1:20846 <-> DISABLED <-> WEB-ACTIVEX Oracle Hyperion strategic finance client SetDevNames heap buffer overflow ActiveX clsid access (web-activex.rules)
 * 1:20847 <-> DISABLED <-> WEB-ACTIVEX Oracle Hyperion strategic finance client SetDevNames heap buffer overflow ActiveX function call access (web-activex.rules)
 * 1:2092 <-> DISABLED <-> RPC portmap proxy integer overflow attempt UDP (rpc.rules)
 * 1:2093 <-> DISABLED <-> RPC portmap proxy integer overflow attempt TCP (rpc.rules)
 * 1:20949 <-> DISABLED <-> WEB-ACTIVEX Autodesk iDrop ActiveX clsid access (web-activex.rules)
 * 1:21022 <-> DISABLED <-> WEB-ACTIVEX Viscom Software Image Viewer ActiveX clsid access (web-activex.rules)
 * 1:21023 <-> DISABLED <-> WEB-ACTIVEX Viscom Software Image Viewer ActiveX function call access (web-activex.rules)
 * 1:21029 <-> DISABLED <-> WEB-ACTIVEX Bennet-Tec TList saveData arbitrary file creation ActiveX clsid access (web-activex.rules)
 * 1:21030 <-> DISABLED <-> WEB-ACTIVEX Bennet-Tec TList saveData arbitrary file creation ActiveX function call access (web-activex.rules)
 * 1:21031 <-> DISABLED <-> WEB-ACTIVEX Bennet-Tec TList saveData arbitrary file creation ActiveX clsid access (web-activex.rules)
 * 1:21032 <-> DISABLED <-> WEB-ACTIVEX Bennet-Tec TList saveData arbitrary file creation ActiveX function call access (web-activex.rules)
 * 1:21033 <-> DISABLED <-> WEB-ACTIVEX Bennet-Tec TList saveData arbitrary file creation ActiveX clsid access (web-activex.rules)
 * 1:21034 <-> DISABLED <-> WEB-ACTIVEX Bennet-Tec TList saveData arbitrary file creation ActiveX function call access (web-activex.rules)
 * 1:21048 <-> DISABLED <-> BLACKLIST DNS request for known malware domain prettylikeher.com - Sykipot (blacklist.rules)
 * 1:21049 <-> DISABLED <-> BLACKLIST DNS request for known malware domain mysundayparty.com - Sykipot (blacklist.rules)
 * 1:21063 <-> DISABLED <-> WEB-ACTIVEX HP Easy Printer Care Software ActiveX clsid access (web-activex.rules)
 * 1:21064 <-> DISABLED <-> WEB-ACTIVEX HP Easy Printer Care Software ActiveX function call access (web-activex.rules)
 * 1:21081 <-> DISABLED <-> WEB-ACTIVEX RDS.Dataspace ActiveX object code execution attempt (web-activex.rules)
 * 1:21224 <-> DISABLED <-> BOTNET-CNC Trojan.MacOS.DevilRobber.A outbound connection (botnet-cnc.rules)
 * 1:2125 <-> DISABLED <-> FTP CWD Root directory transversal attempt (ftp.rules)
 * 1:21255 <-> ENABLED <-> BLACKLIST known malicious FTP login banner - 0wns j0 (blacklist.rules)
 * 1:21256 <-> ENABLED <-> BLACKLIST known malicious FTP quit banner - Goodbye happy r00ting (blacklist.rules)
 * 1:21299 <-> ENABLED <-> EXPLOIT Microsoft Silverlight privilege escalation attempt (exploit.rules)
 * 1:21325 <-> DISABLED <-> SPECIFIC-THREATS Adobe Flash Player cross site request forgery attempt (specific-threats.rules)
 * 1:21338 <-> ENABLED <-> SPECIFIC-THREATS Adobe Flash Player MP4 zero length atom attempt (specific-threats.rules)
 * 1:21380 <-> DISABLED <-> BLACKLIST USER-AGENT Win.32.Sramler.A runtime traffic detected (blacklist.rules)
 * 1:21406 <-> DISABLED <-> WEB-ACTIVEX McAfee Security Center ActiveX clsid access (web-activex.rules)
 * 1:21444 <-> DISABLED <-> BOTNET-CNC TDSS outbound connection (botnet-cnc.rules)
 * 1:21445 <-> DISABLED <-> DOS vsFTPd denial of service attempt (dos.rules)
 * 1:21446 <-> DISABLED <-> POLICY ActiveX FileSystemObject clsid access (policy.rules)
 * 1:21457 <-> DISABLED <-> SPECIFIC-THREATS Adobe Flash ActionScript float index array memory corruption (specific-threats.rules)
 * 1:21458 <-> DISABLED <-> SPECIFIC-THREATS Adobe Flash ActionScript float index array memory corruption (specific-threats.rules)
 * 1:21493 <-> DISABLED <-> WEB-ACTIVEX Microsoft DRM technology msnetobj.dll ActiveX clsid access (web-activex.rules)
 * 1:21654 <-> ENABLED <-> SPECIFIC-THREATS Adobe Flash Video invalid tag type attempt (specific-threats.rules)
 * 1:21699 <-> DISABLED <-> FILE-IDENTIFY Microsoft Office Excel xlw file attachment detected (file-identify.rules)
 * 1:21700 <-> DISABLED <-> FILE-IDENTIFY Microsoft Office Excel xlw file attachment detected (file-identify.rules)
 * 1:2178 <-> DISABLED <-> FTP USER format string attempt (ftp.rules)
 * 1:2179 <-> DISABLED <-> FTP PASS format string attempt (ftp.rules)
 * 1:21928 <-> DISABLED <-> FILE-OFFICE Microsoft Office Excel malformed FBI record (file-office.rules)
 * 1:22069 <-> ENABLED <-> SPECIFIC-THREATS Adobe Flash Player object confusion attempt (specific-threats.rules)
 * 1:22070 <-> ENABLED <-> SPECIFIC-THREATS Adobe Flash Player object confusion attempt (specific-threats.rules)
 * 1:22090 <-> ENABLED <-> SPECIFIC-THREATS Microsoft .NET framework malicious XBAP attempt (specific-threats.rules)
 * 1:2272 <-> DISABLED <-> FTP LIST integer overflow attempt (ftp.rules)
 * 1:22915 <-> ENABLED <-> SPECIFIC-THREATS Adobe Flash Player object confusion attempt (specific-threats.rules)
 * 1:22916 <-> ENABLED <-> SPECIFIC-THREATS Adobe Flash Player object confusion attempt (specific-threats.rules)
 * 1:22957 <-> DISABLED <-> BLACKLIST DNS request for known malware domain murik.portal-protection.net.ru - Mal/Rimecud-R (blacklist.rules)
 * 1:22958 <-> DISABLED <-> BLACKLIST DNS request for known malware domain slade.safehousenumber.com - Mal/Rimecud-R (blacklist.rules)
 * 1:22959 <-> DISABLED <-> BLACKLIST DNS request for known malware domain world.rickstudio.ru - Mal/Rimecud-R (blacklist.rules)
 * 1:22960 <-> DISABLED <-> BLACKLIST DNS request for known malware domain portal.roomshowerbord.com - Mal/EncPk-ADU (blacklist.rules)
 * 1:2332 <-> DISABLED <-> FTP MKD format string attempt (ftp.rules)
 * 1:2333 <-> DISABLED <-> FTP RENAME format string attempt (ftp.rules)
 * 1:2340 <-> DISABLED <-> FTP SITE CHMOD overflow attempt (ftp.rules)
 * 1:2343 <-> DISABLED <-> FTP STOR overflow attempt (ftp.rules)
 * 1:2344 <-> DISABLED <-> FTP XCWD overflow attempt (ftp.rules)
 * 1:2373 <-> DISABLED <-> FTP XMKD overflow attempt (ftp.rules)
 * 1:2389 <-> DISABLED <-> FTP RNTO overflow attempt (ftp.rules)
 * 1:2390 <-> DISABLED <-> FTP STOU overflow attempt (ftp.rules)
 * 1:2391 <-> DISABLED <-> FTP APPE overflow attempt (ftp.rules)
 * 1:2392 <-> DISABLED <-> FTP RETR overflow attempt (ftp.rules)
 * 1:2416 <-> DISABLED <-> FTP invalid MDTM command attempt (ftp.rules)
 * 1:2417 <-> DISABLED <-> FTP format string attempt (ftp.rules)
 * 1:2449 <-> DISABLED <-> FTP ALLO overflow attempt (ftp.rules)
 * 1:2546 <-> DISABLED <-> FTP MDTM overflow attempt (ftp.rules)
 * 1:2574 <-> DISABLED <-> FTP RETR format string attempt (ftp.rules)
 * 1:3077 <-> DISABLED <-> FTP RNFR overflow attempt (ftp.rules)
 * 1:308 <-> DISABLED <-> EXPLOIT NextFTP client overflow (exploit.rules)
 * 1:334 <-> DISABLED <-> FTP .forward (ftp.rules)
 * 1:335 <-> DISABLED <-> FTP .rhosts (ftp.rules)
 * 1:336 <-> DISABLED <-> FTP CWD ~root attempt (ftp.rules)
 * 1:337 <-> DISABLED <-> FTP CEL overflow attempt (ftp.rules)
 * 1:3441 <-> DISABLED <-> FTP PORT bounce attempt (ftp.rules)
 * 1:3460 <-> DISABLED <-> FTP REST with numeric argument (ftp.rules)
 * 1:3523 <-> DISABLED <-> FTP SITE INDEX format string attempt (ftp.rules)
 * 1:353 <-> DISABLED <-> FTP adm scan (ftp.rules)
 * 1:354 <-> DISABLED <-> FTP iss scan (ftp.rules)
 * 1:355 <-> DISABLED <-> FTP pass wh00t (ftp.rules)
 * 1:356 <-> DISABLED <-> FTP passwd retrieval attempt (ftp.rules)
 * 1:357 <-> DISABLED <-> FTP piss scan (ftp.rules)
 * 1:358 <-> DISABLED <-> FTP saint scan (ftp.rules)
 * 1:359 <-> DISABLED <-> FTP satan scan (ftp.rules)
 * 1:360 <-> DISABLED <-> FTP serv-u directory transversal (ftp.rules)
 * 1:361 <-> DISABLED <-> FTP SITE EXEC attempt (ftp.rules)
 * 1:362 <-> DISABLED <-> FTP tar parameters (ftp.rules)
 * 1:4145 <-> DISABLED <-> WEB-ACTIVEX Microsoft Windows Trouble Shooter ActiveX object access (web-activex.rules)
 * 1:4146 <-> DISABLED <-> WEB-ACTIVEX Share Point Portal Services Log Sink ActiveX object access (web-activex.rules)
 * 1:4147 <-> DISABLED <-> WEB-ACTIVEX ActiveLabel ActiveX object access (web-activex.rules)
 * 1:4150 <-> DISABLED <-> WEB-ACTIVEX Outlook View OVCtl ActiveX function call access (web-activex.rules)
 * 1:4151 <-> DISABLED <-> WEB-ACTIVEX System Monitor Source Properties ActiveX object access (web-activex.rules)
 * 1:4152 <-> DISABLED <-> WEB-ACTIVEX Microsoft Windows Media Player 6.4 ActiveX object access (web-activex.rules)
 * 1:4153 <-> DISABLED <-> WEB-ACTIVEX Eyedog ActiveX object access (web-activex.rules)
 * 1:4154 <-> DISABLED <-> WEB-ACTIVEX Active Setup ActiveX object access (web-activex.rules)
 * 1:4156 <-> DISABLED <-> WEB-ACTIVEX Microsoft Windows Media Player 7+ ActiveX object access (web-activex.rules)
 * 1:4157 <-> DISABLED <-> WEB-ACTIVEX MSN Setup BBS 4.71.0.10 ActiveX object access (web-activex.rules)
 * 1:4158 <-> DISABLED <-> WEB-ACTIVEX Microsoft Windows Media Player Active Movie ActiveX object access (web-activex.rules)
 * 1:4159 <-> DISABLED <-> WEB-ACTIVEX Multimedia File Property Sheet ActiveX object access (web-activex.rules)
 * 1:4160 <-> DISABLED <-> WEB-ACTIVEX Microsoft Windows Reporting Tool ActiveX object access (web-activex.rules)
 * 1:4161 <-> DISABLED <-> WEB-ACTIVEX DigWebX MSN ActiveX object access (web-activex.rules)
 * 1:4162 <-> DISABLED <-> WEB-ACTIVEX DigWebX MSN ActiveX object access (web-activex.rules)
 * 1:4163 <-> DISABLED <-> WEB-ACTIVEX DigWebX MSN ActiveX object access (web-activex.rules)
 * 1:4164 <-> DISABLED <-> WEB-ACTIVEX DigWebX MSN ActiveX object access (web-activex.rules)
 * 1:4165 <-> DISABLED <-> WEB-ACTIVEX Image Control 1.0 ActiveX object access (web-activex.rules)
 * 1:4167 <-> DISABLED <-> WEB-ACTIVEX MSN Heartbeat ActiveX clsid access (web-activex.rules)
 * 1:4168 <-> DISABLED <-> WEB-ACTIVEX Shell Automation Service ActiveX object access (web-activex.rules)
 * 1:4169 <-> DISABLED <-> WEB-ACTIVEX Internet Explorer Active Setup ActiveX object access (web-activex.rules)
 * 1:4171 <-> DISABLED <-> WEB-ACTIVEX Registration Wizard ActiveX object access (web-activex.rules)
 * 1:4173 <-> DISABLED <-> WEB-ACTIVEX MsnPUpld ActiveX object access (web-activex.rules)
 * 1:4174 <-> DISABLED <-> WEB-ACTIVEX Symantec RuFSI registry Information Class ActiveX object access (web-activex.rules)
 * 1:4175 <-> DISABLED <-> WEB-ACTIVEX Microsoft Office 2000/2002 Web Components PivotTable ActiveX object access (web-activex.rules)
 * 1:4176 <-> DISABLED <-> WEB-ACTIVEX Microsoft Office 2000 and 2002 Web Components Chart ActiveX object access (web-activex.rules)
 * 1:4178 <-> DISABLED <-> WEB-ACTIVEX Microsoft Office 2000 and 2002 Web Components Record Navigation Control ActiveX object access (web-activex.rules)
 * 1:4179 <-> DISABLED <-> WEB-ACTIVEX DirectX Files Viewer ActiveX object access (web-activex.rules)
 * 1:4180 <-> DISABLED <-> WEB-ACTIVEX Kodak Image Scan Control ActiveX object access (web-activex.rules)
 * 1:4181 <-> DISABLED <-> WEB-ACTIVEX Smartcard Enrollment ActiveX object access (web-activex.rules)
 * 1:4182 <-> DISABLED <-> WEB-ACTIVEX MSN Chat v4.5, 4.6 ActiveX object access (web-activex.rules)
 * 1:4183 <-> DISABLED <-> WEB-ACTIVEX HTML Help ActiveX object access (web-activex.rules)
 * 1:4184 <-> DISABLED <-> WEB-ACTIVEX Certificate Enrollment ActiveX object access (web-activex.rules)
 * 1:4185 <-> DISABLED <-> WEB-ACTIVEX Terminal Services Advanced Client ActiveX object access (web-activex.rules)
 * 1:4186 <-> DISABLED <-> WEB-ACTIVEX Kodak Image Editing ActiveX object access (web-activex.rules)
 * 1:4187 <-> DISABLED <-> WEB-ACTIVEX Terminal Services Advanced Client ActiveX object access (web-activex.rules)
 * 1:4188 <-> DISABLED <-> WEB-ACTIVEX RAV Online Scanner ActiveX object access (web-activex.rules)
 * 1:4189 <-> DISABLED <-> WEB-ACTIVEX Third-Party Plugin ActiveX object access (web-activex.rules)
 * 1:4190 <-> DISABLED <-> WEB-ACTIVEX Kodak Thumbnail Image ActiveX object access (web-activex.rules)
 * 1:4191 <-> DISABLED <-> WEB-ACTIVEX MsnPUpld ActiveX object access (web-activex.rules)
 * 1:4192 <-> DISABLED <-> WEB-ACTIVEX HHOpen ActiveX object access (web-activex.rules)
 * 1:4193 <-> DISABLED <-> WEB-ACTIVEX Kodak Image Editing ActiveX object access (web-activex.rules)
 * 1:4197 <-> DISABLED <-> WEB-ACTIVEX DigWebX MSN ActiveX object access (web-activex.rules)
 * 1:4198 <-> DISABLED <-> WEB-ACTIVEX Internet Explorer Blnmgrps.dll ActiveX object access (web-activex.rules)
 * 1:4199 <-> DISABLED <-> WEB-ACTIVEX Internet Explorer Blnmgrps.dll ActiveX object access (web-activex.rules)
 * 1:4200 <-> DISABLED <-> WEB-ACTIVEX Index Server Scope Administration ActiveX object access (web-activex.rules)
 * 1:4201 <-> DISABLED <-> WEB-ACTIVEX Queued Components Recorder ActiveX object access (web-activex.rules)
 * 1:4202 <-> DISABLED <-> WEB-ACTIVEX DirectAnimation ActiveX object access (web-activex.rules)
 * 1:4203 <-> DISABLED <-> WEB-ACTIVEX Microsoft Marquee Control ActiveX object access (web-activex.rules)
 * 1:4204 <-> DISABLED <-> WEB-ACTIVEX Microsoft DT PolyLine Control 2 ActiveX object access (web-activex.rules)
 * 1:4205 <-> DISABLED <-> WEB-ACTIVEX Microsoft Visual Database Tools Database Designer v7.0 ActiveX object access (web-activex.rules)
 * 1:4206 <-> DISABLED <-> WEB-ACTIVEX Microsoft MPEG-4 Video Decompressor Property Page ActiveX object access (web-activex.rules)
 * 1:4207 <-> DISABLED <-> WEB-ACTIVEX Microsoft MS Audio Decompressor Control Property Page ActiveX object access (web-activex.rules)
 * 1:4208 <-> DISABLED <-> WEB-ACTIVEX LexRefStEsObject Class ActiveX object access (web-activex.rules)
 * 1:4209 <-> DISABLED <-> WEB-ACTIVEX LexRefStFrObject Class ActiveX object access (web-activex.rules)
 * 1:4210 <-> DISABLED <-> WEB-ACTIVEX Internet Explorer Msb1geen.dll ActiveX object access (web-activex.rules)
 * 1:4211 <-> DISABLED <-> WEB-ACTIVEX Microsoft DDS Library Shape Control ActiveX object access (web-activex.rules)
 * 1:4212 <-> DISABLED <-> WEB-ACTIVEX Microsoft DDS Generic Class ActiveX object access (web-activex.rules)
 * 1:4213 <-> DISABLED <-> WEB-ACTIVEX Microsoft DDS Picture Shape Control ActiveX object access (web-activex.rules)
 * 1:4214 <-> DISABLED <-> WEB-ACTIVEX Microsoft TipGW Init ActiveX object access (web-activex.rules)
 * 1:4215 <-> DISABLED <-> WEB-ACTIVEX Microsoft HTML Popup Window ActiveX object access (web-activex.rules)
 * 1:4216 <-> DISABLED <-> WEB-ACTIVEX CLSID_CComAcctImport ActiveX object access (web-activex.rules)
 * 1:4217 <-> DISABLED <-> WEB-ACTIVEX Microsoft Office Services on the Web Free/Busy ActiveX object access (web-activex.rules)
 * 1:4218 <-> DISABLED <-> WEB-ACTIVEX Microsoft Visual Basic WebClass ActiveX object access (web-activex.rules)
 * 1:4219 <-> DISABLED <-> WEB-ACTIVEX Microsoft Network Connections Tray ActiveX object access (web-activex.rules)
 * 1:4220 <-> DISABLED <-> WEB-ACTIVEX Microsoft Network and Dial-Up Connections ActiveX object access (web-activex.rules)
 * 1:4221 <-> DISABLED <-> WEB-ACTIVEX Microsoft ProxyStub Dispatch ActiveX object access (web-activex.rules)
 * 1:4222 <-> DISABLED <-> WEB-ACTIVEX Internet Explorer Outllib.dll ActiveX object access (web-activex.rules)
 * 1:4223 <-> DISABLED <-> WEB-ACTIVEX Microsoft OpenCable Class ActiveX object access (web-activex.rules)
 * 1:4224 <-> DISABLED <-> WEB-ACTIVEX Microsoft VideoPort ActiveX object access (web-activex.rules)
 * 1:4225 <-> DISABLED <-> WEB-ACTIVEX Microsoft Repository ActiveX object access (web-activex.rules)
 * 1:4226 <-> DISABLED <-> WEB-ACTIVEX Microsoft DocHost User Interface Handler ActiveX object access (web-activex.rules)
 * 1:4227 <-> DISABLED <-> WEB-ACTIVEX Microsoft Network Connections ActiveX object access (web-activex.rules)
 * 1:4228 <-> DISABLED <-> WEB-ACTIVEX Microsoft Windows Start Menu ActiveX object access (web-activex.rules)
 * 1:4229 <-> DISABLED <-> WEB-ACTIVEX MSAPP Export Support for Microsoft Access ActiveX object access (web-activex.rules)
 * 1:4230 <-> DISABLED <-> WEB-ACTIVEX Search Assistant UI ActiveX object access (web-activex.rules)
 * 1:4231 <-> DISABLED <-> WEB-ACTIVEX Microsoft SysTray ActiveX object access (web-activex.rules)
 * 1:4232 <-> DISABLED <-> WEB-ACTIVEX Microsoft SysTray Invoker ActiveX object access (web-activex.rules)
 * 1:4233 <-> DISABLED <-> WEB-ACTIVEX Microsoft Visual Database Tools Query Designer v7.0 ActiveX object access (web-activex.rules)
 * 1:4234 <-> DISABLED <-> WEB-ACTIVEX Microsoft MSVTDGridCtrl7 ActiveX object access (web-activex.rules)
 * 1:4235 <-> DISABLED <-> WEB-ACTIVEX Helper Object for Java ActiveX object access (web-activex.rules)
 * 1:4236 <-> DISABLED <-> WEB-ACTIVEX WMI ASDI Extension ActiveX object access (web-activex.rules)
 * 1:4648 <-> DISABLED <-> WEB-ACTIVEX wang image admin activex object access (web-activex.rules)
 * 1:489 <-> DISABLED <-> FTP no password (ftp.rules)
 * 1:4890 <-> DISABLED <-> WEB-ACTIVEX IAVIStream & IAVIFile Proxy ActiveX object access (web-activex.rules)
 * 1:4891 <-> DISABLED <-> WEB-ACTIVEX cfw Class ActiveX object access (web-activex.rules)
 * 1:4892 <-> DISABLED <-> WEB-ACTIVEX MTSEvents Class ActiveX object access (web-activex.rules)
 * 1:4893 <-> DISABLED <-> WEB-ACTIVEX Trident HTMLEditor ActiveX object access (web-activex.rules)
 * 1:4894 <-> DISABLED <-> WEB-ACTIVEX PSEnumVariant ActiveX object access (web-activex.rules)
 * 1:4895 <-> DISABLED <-> WEB-ACTIVEX PSTypeInfo ActiveX object access (web-activex.rules)
 * 1:4896 <-> DISABLED <-> WEB-ACTIVEX PSTypeLib ActiveX object access (web-activex.rules)
 * 1:4897 <-> DISABLED <-> WEB-ACTIVEX PSOAInterface ActiveX object access (web-activex.rules)
 * 1:4898 <-> DISABLED <-> WEB-ACTIVEX PSTypeComp ActiveX object access (web-activex.rules)
 * 1:4900 <-> DISABLED <-> WEB-ACTIVEX Outlook Progress Ctl ActiveX object access (web-activex.rules)
 * 1:4901 <-> DISABLED <-> WEB-ACTIVEX VMR Allocator Presenter 9 ActiveX object access (web-activex.rules)
 * 1:4902 <-> DISABLED <-> WEB-ACTIVEX Video Mixing Renderer 9 ActiveX object access (web-activex.rules)
 * 1:4903 <-> DISABLED <-> WEB-ACTIVEX VMR ImageSync 9 ActiveX object access (web-activex.rules)
 * 1:9800 <-> DISABLED <-> WEB-ACTIVEX Panda ActiveScan PAVPZ.SOS.1 ActiveX function call access (web-activex.rules)
 * 1:9812 <-> DISABLED <-> WEB-ACTIVEX Yahoo Messenger YMMAPI.YMailAttach ActiveX function call access (web-activex.rules)
 * 1:9816 <-> DISABLED <-> WEB-ACTIVEX ICQPhone.SipxPhoneManager ActiveX function call access (web-activex.rules)
 * 1:9817 <-> DISABLED <-> WEB-ACTIVEX CEnroll.CEnroll.2 ActiveX clsid access (web-activex.rules)
 * 1:9821 <-> DISABLED <-> WEB-ACTIVEX TriEditDocument.TriEditDocument ActiveX clsid access (web-activex.rules)
 * 1:9824 <-> DISABLED <-> WEB-ACTIVEX Rediff Bol Downloader ActiveX clsid access (web-activex.rules)
 * 1:9826 <-> DISABLED <-> WEB-ACTIVEX Rediff Bol Downloader ActiveX function call access (web-activex.rules)
 * 1:4904 <-> DISABLED <-> WEB-ACTIVEX Microsoft Repository Alias ActiveX object access (web-activex.rules)
 * 3:21354 <-> ENABLED <-> BAD-TRAFFIC dns query - storing query and txid (bad-traffic.rules)
 * 3:21355 <-> ENABLED <-> BAD-TRAFFIC potential dns cache poisoning attempt - mismatched txid (bad-traffic.rules)
 * 3:20825 <-> ENABLED <-> DOS generic web server hashing collision attack (dos.rules)