Hi Comodo team ,
I represent the Abuse, Compliance, and Deliverability team with beehiiv. beehiiv is a SaaS company that provides tools for our users to create and send email newsletters to their subscriber audience.
It has come to our attention that one of our click tracking domains has been listed with your service. This domain is used by us to provide engagement and performance data for links in our users emails. With this Domain listed with your service it is preventing our users newsletter readers from accessing the links in the emails they receive.
We believe the cause of this listing is due to a recent spike in bad actors who exploited our platform to send malicious emails. Our team has located and removed the accounts associated with this spam and adjusted our security checks to stop malicious mail from being sent moving forward.
I would like to request a mitigation for the domain listed above and any related IP’s which are included here (104.18.69.40 - 104.18.68.40) that may be causing the blocks our users are reporting to us.
We appreciate your time with reviewing this request and look forward to your response. If any additional information is needed please reach out here and include our abuse ticket system address abuse@beehiiv.com.
Nome do aplicativo: MicrosoftEdgeWebView2RuntimeInstallerX64
MD5
4cff2c1530a0514bbb20a6705dfa42c9
SHA-1
4e302fec14b5b1a5ef2cf00842bbb096ba0d9481
SHA-256
17b5c528cfd5b70f9eeff5cd6cd7bc4b8c6d2b836a51f5ccf394a90c4f197c7e
The file is not being sent and is probably larger than the limit that is accepted by Valkyrie.
Guys, please let the COMODO team increase the file size to 650 equal to virustotal. to make it easier to send files for analysis, this will improve things for everyone.
Nome do aplicativo: MicrosoftEdgeWebView2RuntimeInstallerX64
MD5
7ebd6536bfedb24edcc4cceb4942f800
SHA-1
0fe0f8712b9025df0f1c69e48d70b87bcdf7708d
SHA-256
4368fcd587a41d5138025bf3006bf4c09a506bda3e05df9afc50d4e83702650e
Here’s a collage of screenshots of 150 files that produces the bug check code 0x80072f8f after a CIS scan lists them and then trying to upload unrecognized files to COMODO:
Here is a “File List” logs (trimmed with: New Ratings > Contains > Unrecognized) of 279 unrecognized files detected after a CIS scan including the 150 listed above: File List logs.pdf (431.4 KB)
Manually checking the hash of 150 files and finding the DL links might not be too much time efficient. Any other way to help with pinpointing the files would be much appreciated.
Nevertheless, here are the name of the softwares. (Softwares: 1, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14 and 15 are downloaded via Steam app; softwares: 2, 3 and 16 are downloaded via Battle .net app; software 4 is downloaded via EA app).
Nome do aplicativo: MicrosoftEdgeWebView2RuntimeInstallerX64
MD5
9d7c124d93b06c00628e24cf4702c687
SHA-1
bd708c64a0df4d33135f34aceb322f63854eed11
SHA-256
f19920dd77421e4fb218dac6253653fe7570c8a885154fe821662e7959404d2b
Nome do aplicativo: Dism++x64.exe
MD5
a1a058ff98dc1f9320195b398aa06167
SHA-1
d974136e6dc4b1726b50a770ec8d6f0f4fc859a7
SHA-256
16bbdb339173d25b4332b377da96e80809aabfe6739cf35d5e70484f08cfdc42
Nome do aplicativo: MicrosoftEdgeUpdateSetup.exe
MD5
756c42e069525233984489e441c993f9
SHA-1
85fe16822ac48fd6a94dd6e54567a03fa883fbaa
SHA-256
832a88c93edb2352e361cb36437483af0dbfec3e1e7782e13f120e1a0d14e17a
We have tested the file. The same is not being contained from our side. If possible, could you please share us the containment log or screenshot of the file being contained.