<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Malicious traffic blocked by PAN : Virus/Win32.WGeneric.ajbecg(34089754 in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/malicious-traffic-blocked-by-pan-virus-win32-wgeneric-ajbecg/m-p/328056#M825</link>
    <description>&lt;P&gt;The best way to investigate these would be to access the Threat Vault at&amp;nbsp;&lt;A href="https://threatvault.paloaltonetworks.com/" target="_blank"&gt;https://threatvault.paloaltonetworks.com/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Search for the Threat ID's and find the SHA256 hashes of the samples tied to the signatures.&lt;/P&gt;
&lt;P&gt;You can then use the SHA256 hashes to research the samples on the internet. A good place to begin that research is&amp;nbsp;&lt;A href="http://virustotal.com/" target="_blank"&gt;http://virustotal.com&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you believe the signatures are built based on WildFire false positives or potential Signature Collisions you can open a request with Support to investigate.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you know for sure that these triggers are false positives, and they're interrupting critical business tasks, you can opt to create an exception in your Antivirus profile. You can see instructions at&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/threat-prevention/create-threat-exceptions" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/threat-prevention/create-threat-exceptions&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 14 May 2020 20:25:48 GMT</pubDate>
    <dc:creator>mivaldi</dc:creator>
    <dc:date>2020-05-14T20:25:48Z</dc:date>
    <item>
      <title>Malicious traffic blocked by PAN : Virus/Win32.WGeneric.ajbecg(340897548)</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/malicious-traffic-blocked-by-pan-virus-win32-wgeneric-ajbecg/m-p/328047#M824</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi Team,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;These are the below sign identified in our network and want to know the reason for this trigger.&lt;/P&gt;&lt;P&gt;Please provide the related application effected? Why are this signature identified and what the user is trying to access so that PAN blocked the traffic. Any additional information will be appreciated.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Virus/Win32.WGeneric.ajbsuc(341044866) &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Virus/Win32.WGeneric.ajbecg(340897548) &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Virus/Win32.WGeneric.aeqdlm(295866360)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 May 2020 19:59:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/malicious-traffic-blocked-by-pan-virus-win32-wgeneric-ajbecg/m-p/328047#M824</guid>
      <dc:creator>Veerendra</dc:creator>
      <dc:date>2020-05-14T19:59:12Z</dc:date>
    </item>
    <item>
      <title>Re: Malicious traffic blocked by PAN : Virus/Win32.WGeneric.ajbecg(34089754</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/malicious-traffic-blocked-by-pan-virus-win32-wgeneric-ajbecg/m-p/328056#M825</link>
      <description>&lt;P&gt;The best way to investigate these would be to access the Threat Vault at&amp;nbsp;&lt;A href="https://threatvault.paloaltonetworks.com/" target="_blank"&gt;https://threatvault.paloaltonetworks.com/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Search for the Threat ID's and find the SHA256 hashes of the samples tied to the signatures.&lt;/P&gt;
&lt;P&gt;You can then use the SHA256 hashes to research the samples on the internet. A good place to begin that research is&amp;nbsp;&lt;A href="http://virustotal.com/" target="_blank"&gt;http://virustotal.com&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you believe the signatures are built based on WildFire false positives or potential Signature Collisions you can open a request with Support to investigate.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you know for sure that these triggers are false positives, and they're interrupting critical business tasks, you can opt to create an exception in your Antivirus profile. You can see instructions at&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/threat-prevention/create-threat-exceptions" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/threat-prevention/create-threat-exceptions&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 14 May 2020 20:25:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/malicious-traffic-blocked-by-pan-virus-win32-wgeneric-ajbecg/m-p/328056#M825</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2020-05-14T20:25:48Z</dc:date>
    </item>
    <item>
      <title>Re: Malicious traffic blocked by PAN : Virus/Win32.WGeneric.ajbecg(34089754</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/malicious-traffic-blocked-by-pan-virus-win32-wgeneric-ajbecg/m-p/328060#M826</link>
      <description>&lt;P&gt;Hi Mivaldi,&lt;/P&gt;&lt;P&gt;Appreciated the quick response, I have already tried earlier but don't have access to Threat Vault.&lt;/P&gt;&lt;P&gt;Can you please help me with screenshot/hash or any kind of export from the portal for below mentioned signature.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Signatures&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV class="row"&gt;&lt;DIV class="col-md-12 col-sm-12 col-xs-12 ng-scope"&gt;&lt;DIV class="m-b wordbreak ng-binding"&gt;Virus/Win32.WGeneric.ajbsuc(341044866)&lt;/DIV&gt;&lt;DIV class="m-b wordbreak ng-binding"&gt;Virus/Win32.WGeneric.ajbecg(340897548)&lt;/DIV&gt;&lt;DIV class="m-b wordbreak ng-binding"&gt;Virus/Win32.WGeneric.aeqdlm(295866360)&lt;/DIV&gt;&lt;DIV class="m-b wordbreak ng-binding"&gt;That will be great help for my investigation.&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="row"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="row"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Thu, 14 May 2020 20:33:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/malicious-traffic-blocked-by-pan-virus-win32-wgeneric-ajbecg/m-p/328060#M826</guid>
      <dc:creator>Veerendra</dc:creator>
      <dc:date>2020-05-14T20:33:27Z</dc:date>
    </item>
    <item>
      <title>Re: Malicious traffic blocked by PAN : Virus/Win32.WGeneric.ajbecg(34089754</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/malicious-traffic-blocked-by-pan-virus-win32-wgeneric-ajbecg/m-p/328065#M827</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE id="antivirus-signatures" class="table table-bordered pan-grid table-hover" data-pagination="true" data-toggle="table" data-pagination-v-align="top" data-reactid=".0.1.1:$eU5q8.1"&gt;
&lt;THEAD data-reactid=".0.1.1:$eU5q8.1.0"&gt;
&lt;TR&gt;
&lt;TH tabindex="0" data-field="0"&gt;
&lt;DIV class="th-inner "&gt;Signature&lt;/DIV&gt;
&lt;DIV class="fht-cell"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/TH&gt;
&lt;TH tabindex="0" data-field="1"&gt;
&lt;DIV class="th-inner "&gt;Release&lt;/DIV&gt;
&lt;DIV class="fht-cell"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/TH&gt;
&lt;TH tabindex="0" data-field="2"&gt;
&lt;DIV class="th-inner "&gt;&lt;SPAN data-reactid=".0.1.1:$eU5q8.1.0.0.2.0"&gt;Hashes&lt;BR /&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="fht-cell"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY data-reactid=".0.1.1:$eU5q8.1.1"&gt;
&lt;TR data-index="0" data-reactid=".0.1.1:$eU5q8.1.1.0"&gt;
&lt;TD data-reactid=".0.1.1:$eU5q8.1.1.0.0"&gt;
&lt;P class="" data-reactid=".0.1.1:$eU5q8.1.1.0.0.0"&gt;Name: Virus/Win32.WGeneric.ajbsuc&lt;/P&gt;
&lt;P class="" data-reactid=".0.1.1:$eU5q8.1.1.0.0.1"&gt;Unique Threat ID: 341044866&lt;/P&gt;
&lt;P class="" data-reactid=".0.1.1:$eU5q8.1.1.0.0.2"&gt;Create Time: 2020-04-08 19:03:39 (UTC)&lt;/P&gt;
&lt;/TD&gt;
&lt;TD data-reactid=".0.1.1:$eU5q8.1.1.0.1"&gt;
&lt;P class="" data-reactid=".0.1.1:$eU5q8.1.1.0.1.0"&gt;Threat ID: 2565506&lt;/P&gt;
&lt;P class="" data-reactid=".0.1.1:$eU5q8.1.1.0.1.1"&gt;Current Release: 3348 (2020-05-13 UTC)&lt;/P&gt;
&lt;P class="" data-reactid=".0.1.1:$eU5q8.1.1.0.1.2"&gt;First Release: 3312 (2020-04-08 UTC)&lt;/P&gt;
&lt;/TD&gt;
&lt;TD data-reactid=".0.1.1:$eU5q8.1.1.0.2"&gt;
&lt;DIV data-reactid=".0.1.1:$eU5q8.1.1.0.2.0"&gt;
&lt;P class="hash sha256" data-reactid=".0.1.1:$eU5q8.1.1.0.2.0.a"&gt;78487e9f4dcd78f24a8b863e5b4cf15b9a4fcb6a78f2a8477ad43fe5639e4a04&lt;/P&gt;
&lt;/DIV&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE id="antivirus-signatures" class="table table-bordered pan-grid table-hover" data-pagination="true" data-toggle="table" data-pagination-v-align="top" data-reactid=".0.1.1:$wuSnA.1"&gt;
&lt;THEAD data-reactid=".0.1.1:$wuSnA.1.0"&gt;
&lt;TR&gt;
&lt;TH tabindex="0" data-field="0"&gt;
&lt;DIV class="th-inner "&gt;Signature&lt;/DIV&gt;
&lt;DIV class="fht-cell"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/TH&gt;
&lt;TH tabindex="0" data-field="1"&gt;
&lt;DIV class="th-inner "&gt;Release&lt;/DIV&gt;
&lt;DIV class="fht-cell"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/TH&gt;
&lt;TH tabindex="0" data-field="2"&gt;
&lt;DIV class="th-inner "&gt;&lt;SPAN data-reactid=".0.1.1:$wuSnA.1.0.0.2.0"&gt;Hashes&lt;BR /&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="fht-cell"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY data-reactid=".0.1.1:$wuSnA.1.1"&gt;
&lt;TR data-index="0" data-reactid=".0.1.1:$wuSnA.1.1.0"&gt;
&lt;TD data-reactid=".0.1.1:$wuSnA.1.1.0.0"&gt;
&lt;P class="" data-reactid=".0.1.1:$wuSnA.1.1.0.0.0"&gt;Name: Virus/Win32.WGeneric.ajbecg&lt;/P&gt;
&lt;P class="" data-reactid=".0.1.1:$wuSnA.1.1.0.0.1"&gt;Unique Threat ID: 340897548&lt;/P&gt;
&lt;P class="" data-reactid=".0.1.1:$wuSnA.1.1.0.0.2"&gt;Create Time: 2020-04-07 20:22:17 (UTC)&lt;/P&gt;
&lt;/TD&gt;
&lt;TD data-reactid=".0.1.1:$wuSnA.1.1.0.1"&gt;
&lt;P class="" data-reactid=".0.1.1:$wuSnA.1.1.0.1.0"&gt;Threat ID: 2005534&lt;/P&gt;
&lt;P class="" data-reactid=".0.1.1:$wuSnA.1.1.0.1.1"&gt;Current Release: 3348 (2020-05-13 UTC)&lt;/P&gt;
&lt;P class="" data-reactid=".0.1.1:$wuSnA.1.1.0.1.2"&gt;First Release: 3311 (2020-04-07 UTC)&lt;/P&gt;
&lt;/TD&gt;
&lt;TD data-reactid=".0.1.1:$wuSnA.1.1.0.2"&gt;
&lt;DIV data-reactid=".0.1.1:$wuSnA.1.1.0.2.0"&gt;
&lt;P class="hash sha256" data-reactid=".0.1.1:$wuSnA.1.1.0.2.0.a"&gt;c39cb7067c3c5c22802bafe4d54b3365b1f24bab864ba6ba75c3e069d96d09b0&lt;/P&gt;
&lt;/DIV&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE id="antivirus-signatures" class="table table-bordered pan-grid table-hover" data-pagination="true" data-toggle="table" data-pagination-v-align="top" data-reactid=".0.1.1:$MvrXK.1"&gt;
&lt;THEAD data-reactid=".0.1.1:$MvrXK.1.0"&gt;
&lt;TR&gt;
&lt;TH tabindex="0" data-field="0"&gt;
&lt;DIV class="th-inner "&gt;Signature&lt;/DIV&gt;
&lt;DIV class="fht-cell"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/TH&gt;
&lt;TH tabindex="0" data-field="1"&gt;
&lt;DIV class="th-inner "&gt;Release&lt;/DIV&gt;
&lt;DIV class="fht-cell"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/TH&gt;
&lt;TH tabindex="0" data-field="2"&gt;
&lt;DIV class="th-inner "&gt;&lt;SPAN data-reactid=".0.1.1:$MvrXK.1.0.0.2.0"&gt;Hashes&lt;BR /&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="fht-cell"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY data-reactid=".0.1.1:$MvrXK.1.1"&gt;
&lt;TR data-index="0" data-reactid=".0.1.1:$MvrXK.1.1.0"&gt;
&lt;TD data-reactid=".0.1.1:$MvrXK.1.1.0.0"&gt;
&lt;P class="" data-reactid=".0.1.1:$MvrXK.1.1.0.0.0"&gt;Name: Virus/Win32.WGeneric.aeqdlm&lt;/P&gt;
&lt;P class="" data-reactid=".0.1.1:$MvrXK.1.1.0.0.1"&gt;Unique Threat ID: 295866360&lt;/P&gt;
&lt;P class="" data-reactid=".0.1.1:$MvrXK.1.1.0.0.2"&gt;Create Time: 2019-08-21 09:26:56 (UTC)&lt;/P&gt;
&lt;/TD&gt;
&lt;TD data-reactid=".0.1.1:$MvrXK.1.1.0.1"&gt;
&lt;P class="" data-reactid=".0.1.1:$MvrXK.1.1.0.1.0"&gt;Threat ID: 2636376&lt;/P&gt;
&lt;P class="" data-reactid=".0.1.1:$MvrXK.1.1.0.1.1"&gt;Current Release: 3348 (2020-05-13 UTC)&lt;/P&gt;
&lt;P class="" data-reactid=".0.1.1:$MvrXK.1.1.0.1.2"&gt;First Release: 3079 (2019-08-22 UTC)&lt;/P&gt;
&lt;/TD&gt;
&lt;TD data-reactid=".0.1.1:$MvrXK.1.1.0.2"&gt;
&lt;DIV data-reactid=".0.1.1:$MvrXK.1.1.0.2.0"&gt;
&lt;P class="hash sha256" data-reactid=".0.1.1:$MvrXK.1.1.0.2.0.9"&gt;2c96ca9abb21a87e0967de6ef78f76083f3917ecf2ba5ed69acd044582b0e3dc&lt;/P&gt;
&lt;P class="hash sha256" data-reactid=".0.1.1:$MvrXK.1.1.0.2.0.r"&gt;9a2fcee13a376a99a0856c226bdce391f357a9ba766236accc4f74a02103a5ba&lt;/P&gt;
&lt;P class="hash sha256" data-reactid=".0.1.1:$MvrXK.1.1.0.2.0.19"&gt;214f934a95dc68bf17aba4acd7f66babc692c544a1fa848e80eb7d4fc7c4e3c1&lt;/P&gt;
&lt;P class="hash sha256" data-reactid=".0.1.1:$MvrXK.1.1.0.2.0.1r"&gt;0cfdb09b489b7003577bd905a541b514a74232b2e4d3f51b0bf62998106e5fec&lt;/P&gt;
&lt;/DIV&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
      <pubDate>Thu, 14 May 2020 21:01:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/malicious-traffic-blocked-by-pan-virus-win32-wgeneric-ajbecg/m-p/328065#M827</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2020-05-14T21:01:09Z</dc:date>
    </item>
    <item>
      <title>Re: Malicious traffic blocked by PAN : Virus/Win32.WGeneric.ajbecg(34089754</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/malicious-traffic-blocked-by-pan-virus-win32-wgeneric-ajbecg/m-p/328070#M828</link>
      <description>&lt;P&gt;Thanks for the support,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried searching the hash values on Open Threat Intel, including Virus Total: Hash value not in DB.&lt;/P&gt;&lt;P&gt;Is that possible to tell, the reason for this signature. Like user tried accessing the XYZ (onedrive.exe) what caused the alert.&lt;/P&gt;</description>
      <pubDate>Thu, 14 May 2020 21:12:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/malicious-traffic-blocked-by-pan-virus-win32-wgeneric-ajbecg/m-p/328070#M828</guid>
      <dc:creator>Veerendra</dc:creator>
      <dc:date>2020-05-14T21:12:57Z</dc:date>
    </item>
    <item>
      <title>Re: Malicious traffic blocked by PAN : Virus/Win32.WGeneric.ajbecg(34089754</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/malicious-traffic-blocked-by-pan-virus-win32-wgeneric-ajbecg/m-p/328089#M829</link>
      <description>&lt;P&gt;There should be a lot of information in correlated log entries.&lt;/P&gt;
&lt;P&gt;At the very left of the threat log entry, you will see a magnifying glass icon. Click it and that will open the detailed log view. On the lower panel, you will see correlated log entries. You can see correlated traffic log entries, URL filtering log entries, and wildfire submissions as well as other possible entries. These other entries will exist if these additional features were properly configured to log an event.&lt;/P&gt;</description>
      <pubDate>Thu, 14 May 2020 22:58:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/malicious-traffic-blocked-by-pan-virus-win32-wgeneric-ajbecg/m-p/328089#M829</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2020-05-14T22:58:51Z</dc:date>
    </item>
    <item>
      <title>Re: Malicious traffic blocked by PAN : Virus/Win32.WGeneric.ajbecg(34089754</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/malicious-traffic-blocked-by-pan-virus-win32-wgeneric-ajbecg/m-p/328100#M830</link>
      <description>&lt;P&gt;Thanks for the input, However was not able to identify any of the correlated event in URL filtering and wildfire.&lt;/P&gt;&lt;P&gt;Just want to know the basis of these signature or the application/file/user activity to trigger this PAN signature.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Appreciated the support &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 15 May 2020 02:29:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/malicious-traffic-blocked-by-pan-virus-win32-wgeneric-ajbecg/m-p/328100#M830</guid>
      <dc:creator>Veerendra</dc:creator>
      <dc:date>2020-05-15T02:29:42Z</dc:date>
    </item>
    <item>
      <title>Re: Malicious traffic blocked by PAN : Virus/Win32.WGeneric.ajbecg(34089754</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/malicious-traffic-blocked-by-pan-virus-win32-wgeneric-ajbecg/m-p/328251#M831</link>
      <description>&lt;P&gt;Please open a Support case to have us take a closer look.&lt;/P&gt;</description>
      <pubDate>Fri, 15 May 2020 16:54:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/malicious-traffic-blocked-by-pan-virus-win32-wgeneric-ajbecg/m-p/328251#M831</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2020-05-15T16:54:38Z</dc:date>
    </item>
  </channel>
</rss>

