501 tries to a file 502 tries to files 503 tries to rename a file 504 creates files on different machines 505 deletes and recreates an existing file 506 creates and then executes a file 507 tries to copy itself 508 tries to write to the ini file 509 tries to write to the registry 510 tries to call in 511 tries to write to the address space of another running process 512 tries to create a thread in the address space of another running process 513 monitors key strokes 514 creates a COM object 515 tries to send a HTTP request 516 performs a HTTP download 517 creates network connections 518 listens for network connections 519 sends pings 520 downloads an email containing a suspicious link 521 named 522 in 523 that looks like an executable 524 containing executable code 525 with a suspicious double extension 526 within seconds 527 from 528 to 529 so it has a suspicious double extension 530 having 531 within seconds 532 to 533 to 534 to 535 with 536 with a URL longer than bytes 537 with a header longer than bytes 538 to 539 retrieving 540 retrieving a file of type 541 from the 542 on port 543 to the same domain or IP 544 kill the source process 545 inform the local user 546 write event to the system log 547 send an administarative alert 548 prevent the file access 549 prevent the file rename 550 prevent the copy 551 prevent the file write 552 prevent the registry write 553 prevent the memory write 554 prevent the thread creation 555 prevent the object creation 556 block the request 557 disable the link 558 prevent the connection 559 prevent the listen 560 no options available 561 Error 562 read 563 write 564 delete 565 create 566 execute 567 INI Files (*.ini)*.ini 568 DLL Files (*.dll)*.dll 569 All Files (*.*)*.* 570 When 571 or 572 then 573 When any process \n 574 When any non-interactive process \n 575 When and email program or web browser \n 576 process list 577 Functions 578 You must click on the underlined items and configure them before continuing 579 and 580 the source process is in the system process list 581 the source process is in the trusted process list 582 the source process is 583 the target file is 584 the target file is in 585 the target files are 586 the target files are in 587 the target file is originally named 588 the target file is renamed to 589 the target ini file is 590 the target ini section is
591 the target value is 592 the target registry key is 593 the downloaded file is 594 the downloaded file type is 595 the port is 596 except when 597 delete the file 598 Registry Keys 599 Registry Values 600 Domains or IP Addresses 601 Ports