Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://accountsupporthub.es/generate/Login/

Overview

General Information

Sample URL:https://accountsupporthub.es/generate/Login/
Analysis ID:1589405

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected suspicious Javascript
AI detected suspicious URL
Javascript uses Telegram API
HTML body contains low number of good links
HTML body contains password input but no form action
HTML page contains hidden javascript code
Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 3436 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 6776 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1892,i,15390172301612843764,587559999045106460,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 6384 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://accountsupporthub.es/generate/Login/" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

Phishing

barindex
Source: 0.1.id.script.csvJoe Sandbox AI: Detected suspicious JavaScript with source url: https://accountsupporthub.es/generate/Login/... This script demonstrates several high-risk behaviors, including dynamic code execution, data exfiltration, and redirects to potentially malicious domains. The use of an iframe to load additional scripts and the obfuscated nature of the code further increase the risk. While the script may have a legitimate purpose, such as implementing a security challenge, the overall behavior is highly suspicious and indicative of a potential attack vector.
Source: 0.0.id.script.csvJoe Sandbox AI: Detected suspicious JavaScript with source url: https://accountsupporthub.es/generate/Login/... This script demonstrates several high-risk behaviors, including dynamic code execution via `eval()` and obfuscated code. It also sets a cookie with a long expiration date, which could be used for malicious purposes. Additionally, the script checks for the presence of various browser automation and testing frameworks, suggesting an attempt to detect and potentially evade security measures. Overall, this script exhibits a high degree of suspicious and potentially malicious activity.
Source: URLJoe Sandbox AI: AI detected Brand spoofing attempt in URL: https://accountsupporthub.es
Source: URLJoe Sandbox AI: AI detected Typosquatting in URL: https://accountsupporthub.es
Source: https://accountsupporthub.es/generate/Login/HTTP Parser: (function() { // mnemonics is populated as required by getlanguage var mnemonics = { "english": new mnemonic("english") }; var mnemonic = mnemonics["english"]; var seed = null; var bip32rootkey = null; var bip32extendedkey = null; var network = libs.bitcoin.networks.bitcoin; var addressrowtemplate = $("#address-row-template"); var showindex = true; var showaddress = true; var showpubkey = true; var showprivkey = true; var showqr = false; var litecoinuseltub = true; var entropytypeautodetect = true; var entropychangetimeoutevent = null; var phrasechangetimeoutevent = null; var seedchangedtimeoutevent = null; var rootkeychangedtimeoutevent = null; var generationprocesses = []; var dom = {}; dom.privacyscreentoggle = $(".privacy-screen-toggle"); dom.network = $(".network"); dom.bip32client = $("#bip32-client"); dom.phrasenetwork = $("#network-phrase"); d...
Source: https://accountsupporthub.es/generate/Login/HTTP Parser: Number of links: 0
Source: https://accountsupporthub.es/generate/Login/HTTP Parser: <input type="password" .../> found but no <form action="...
Source: https://accountsupporthub.es/generate/Login/HTTP Parser: Base64 decoded: 1736668653.000000
Source: https://accountsupporthub.es/generate/Login/HTTP Parser: <input type="password" .../> found
Source: https://accountsupporthub.es/generate/Login/HTTP Parser: No favicon
Source: https://accountsupporthub.es/generate/Login/HTTP Parser: No favicon
Source: https://accountsupporthub.es/generate/Login/HTTP Parser: No <meta name="author".. found
Source: https://accountsupporthub.es/generate/Login/HTTP Parser: No <meta name="copyright".. found
Source: unknownHTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.16:49745 version: TLS 1.2
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: global trafficDNS traffic detected: DNS query: accountsupporthub.es
Source: global trafficDNS traffic detected: DNS query: a.nel.cloudflare.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
Source: unknownHTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.16:49745 version: TLS 1.2
Source: classification engineClassification label: mal52.phis.win@16/13@8/37
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1892,i,15390172301612843764,587559999045106460,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://accountsupporthub.es/generate/Login/"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1892,i,15390172301612843764,587559999045106460,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation2
Browser Extensions
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
Registry Run Keys / Startup Folder
1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://accountsupporthub.es/generate/Login/0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
a.nel.cloudflare.com
35.190.80.1
truefalse
    high
    accountsupporthub.es
    172.67.199.220
    truetrue
      unknown
      www.google.com
      142.250.185.228
      truefalse
        high
        NameMaliciousAntivirus DetectionReputation
        https://accountsupporthub.es/generate/Login/true
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          172.217.23.110
          unknownUnited States
          15169GOOGLEUSfalse
          142.250.186.106
          unknownUnited States
          15169GOOGLEUSfalse
          172.67.199.220
          accountsupporthub.esUnited States
          13335CLOUDFLARENETUStrue
          142.250.185.228
          www.google.comUnited States
          15169GOOGLEUSfalse
          64.233.167.84
          unknownUnited States
          15169GOOGLEUSfalse
          1.1.1.1
          unknownAustralia
          13335CLOUDFLARENETUSfalse
          239.255.255.250
          unknownReserved
          unknownunknownfalse
          104.21.90.106
          unknownUnited States
          13335CLOUDFLARENETUSfalse
          172.217.18.3
          unknownUnited States
          15169GOOGLEUSfalse
          35.190.80.1
          a.nel.cloudflare.comUnited States
          15169GOOGLEUSfalse
          IP
          192.168.2.16
          Joe Sandbox version:42.0.0 Malachite
          Analysis ID:1589405
          Start date and time:2025-01-12 08:57:02 +01:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:defaultwindowsinteractivecookbook.jbs
          Sample URL:https://accountsupporthub.es/generate/Login/
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:11
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • EGA enabled
          Analysis Mode:stream
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal52.phis.win@16/13@8/37
          • Exclude process from analysis (whitelisted): svchost.exe
          • Excluded IPs from analysis (whitelisted): 172.217.18.3, 172.217.23.110, 64.233.167.84, 142.250.181.238, 142.250.186.110, 142.250.184.206, 199.232.214.172, 142.250.186.106, 142.250.186.138, 142.250.184.234, 172.217.16.138, 216.58.206.74, 142.250.185.74, 142.250.185.106, 142.250.185.234, 172.217.16.202, 172.217.18.10, 142.250.185.138, 142.250.186.170, 142.250.184.202, 142.250.185.202, 142.250.181.234, 216.58.206.42, 2.23.242.162
          • Excluded domains from analysis (whitelisted): clients2.google.com, fs.microsoft.com, accounts.google.com, redirector.gvt1.com, content-autofill.googleapis.com, e16604.g.akamaiedge.net, ctldl.windowsupdate.com, clientservices.googleapis.com, clients.l.google.com, prod.fs.microsoft.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net
          • Not all processes where analyzed, report is missing behavior information
          • VT rate limit hit for: https://accountsupporthub.es/generate/Login/
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Jan 12 06:57:33 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2673
          Entropy (8bit):3.989406882120204
          Encrypted:false
          SSDEEP:
          MD5:95937507349FF9036F814CCB2052EEA0
          SHA1:F4549C1D8A43E1AF5C3EDF6525BC8757EA8B556E
          SHA-256:86095A41B4D7E4270A671460451245B10E80D552686D945582DD4261F8432142
          SHA-512:6EC531635CBEDFA9389F309B40F2A340EAF0EDAF72609C1764300BF13F2E19230553E2A942DF0411159A812F75ACDB7DD66DAE3DCF10B43D8000840F71B96210
          Malicious:false
          Reputation:unknown
          Preview:L..................F.@.. ...$+.,........d..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I,Z(?....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V,Z0?....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V,Z0?....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V,Z0?..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V,Z1?...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........k.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Jan 12 06:57:33 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2675
          Entropy (8bit):4.005109537203388
          Encrypted:false
          SSDEEP:
          MD5:C9849D7E1C3E28886404E4D76DA1878E
          SHA1:8F94252334456282C11D60D68D53734BF2DD933A
          SHA-256:CF9B2447E42702851D744D32D99CF599C64B3C9771F750A3EDFA36FAA4F072F5
          SHA-512:46829A37BB789439E5630FF22F179D8C3791CCA89BF1A93D1594DE22D7222FDDB1790F06650FEC1F8E3BE813A4D8D44E610B383BE08E9E837A2ADF48B4ADF5DF
          Malicious:false
          Reputation:unknown
          Preview:L..................F.@.. ...$+.,........d..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I,Z(?....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V,Z0?....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V,Z0?....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V,Z0?..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V,Z1?...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........k.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2689
          Entropy (8bit):4.012160717348386
          Encrypted:false
          SSDEEP:
          MD5:4D8C8763878B94B700AE4F66A8226E74
          SHA1:86A3E84FC0D52AF92D92AD32853F5F8A74993779
          SHA-256:1079C960A065D709371258121E8F44A9414C1914915CFB35AB392E148F1A3A1B
          SHA-512:D908D82353842A47CF5ED6741C15075A353AF451439D9E863638413B8E8414C56C85B60E008E51FAEC94A4D691E8BCA7E43819C4FF2002A7997AEB27B831930D
          Malicious:false
          Reputation:unknown
          Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I,Z(?....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V,Z0?....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V,Z0?....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V,Z0?..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........k.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Jan 12 06:57:33 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2677
          Entropy (8bit):4.0012269257726745
          Encrypted:false
          SSDEEP:
          MD5:649CC9FC521FC2FA387241C1BA5C7652
          SHA1:D361C93526FB1DD77E8C538023B179702BBFFDF1
          SHA-256:D56414A8E9CDAE08AEBDA298C70CAD7531D4F67071CBF577B3FE7F5C7055BDDB
          SHA-512:823D45E284B79BD9064A0175E8E140ECA40A91E5B867D8865E98570C62684D2FB9E7BAB10BB2D12B284FF79DBFE3403BD004EC7A1A1171FE7B8609AFC3D40F63
          Malicious:false
          Reputation:unknown
          Preview:L..................F.@.. ...$+.,....^%..d..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I,Z(?....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V,Z0?....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V,Z0?....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V,Z0?..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V,Z1?...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........k.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Jan 12 06:57:33 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2677
          Entropy (8bit):3.9900505298643894
          Encrypted:false
          SSDEEP:
          MD5:DD180754B7E59E8CCC6796079163FB02
          SHA1:E909BC743585E1025243F4566E30C36354F17B17
          SHA-256:402DE6C1E92C17BA79420725AF9BEA4FF7CE2DE3E4A7B550FD3EAE9A3DFBF885
          SHA-512:308D47198D6A5963B2EFFAB823002ECAD50C8F44916668B8FB1DD707A91FBFD27D7B2250DC0A70977034F0840B39A72456CD5BD54F1CD8E1DA2A2E298D359904
          Malicious:false
          Reputation:unknown
          Preview:L..................F.@.. ...$+.,....5...d..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I,Z(?....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V,Z0?....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V,Z0?....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V,Z0?..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V,Z1?...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........k.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Jan 12 06:57:33 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2679
          Entropy (8bit):4.0004980787035525
          Encrypted:false
          SSDEEP:
          MD5:8CF1D94F8C2862FBDBE00D360E78D9C4
          SHA1:DD5169246C0FAB3582D3EA9D4CE097D14BE2F552
          SHA-256:5701BD73D2BEAC33E19F9EEA335E4CA108E246026963C3AAF66E6CF4CF9679D8
          SHA-512:087D6F1D00F6D0B4B748FC797447E8CB6843747DA38752E89AB25E837DE5CBACB6BD10194E42ECFF0642D7AB2E7BEE86DB7AA83482FE267661208115653E3286
          Malicious:false
          Reputation:unknown
          Preview:L..................F.@.. ...$+.,........d..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I,Z(?....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V,Z0?....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V,Z0?....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V,Z0?..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V,Z1?...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........k.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:GIF image data, version 89a, 364 x 364
          Category:dropped
          Size (bytes):82210
          Entropy (8bit):7.369013272765698
          Encrypted:false
          SSDEEP:
          MD5:C868FE1EAC316BAAE99B52EE50FAE44F
          SHA1:E69A198375D4F9C6469D8AF9969C40726AB274B3
          SHA-256:7BB73ED7FFAB9CED34D672CA49477FB4210CB72FCCDB4E8A9B075C52C3D838C6
          SHA-512:2A4E7A31DDB4BE0B48D786CEEA70C5E741FD8236D5F1C147C9A1C97D8B1449BE38D9853279B2B783547F860A56BEEB49D27C72C77ECAE0CC997F9AD6D120A7F8
          Malicious:false
          Reputation:unknown
          Preview:GIF89al.l....... "5;G.4E./@.-?.,=.);.%7. 2..-..+..+..-. 2.->.3D.8I.=M.BQ.FU.JY.N\.Q_.Vd.Zg.]j._l.an.cp.fr.ht.jv.lx.nz.p}.s..v..y..{..}.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................!..NETSCAPE2.0.....!.....t.,....l.l........H......*\....#J.H....3j.... C..I...(S.\...0c.I...8s.....@...J...H.*]...P.J.J...X.j....`..K...h.]...p..K...x..........L.....+^....#K.L....3k.....
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:ASCII text, with no line terminators
          Category:downloaded
          Size (bytes):160
          Entropy (8bit):4.711155509762129
          Encrypted:false
          SSDEEP:
          MD5:057A8F1CDA4F39B6939D4CC35574A3FA
          SHA1:E068642A13D543B8B4735A5961FB75E55006336C
          SHA-256:65353D2B34B5C02E80DE3AE4AB3036A2E39EAFE2E3763612D5BADA648F6B8964
          SHA-512:F16267D24B888819566060EA4F54394FC3FFA349172EF994E8FB623FCD25134A4651A4EA285A4E67197CFA322F3C72B33C2F32D05BF95CDC52C62BD278E5183D
          Malicious:false
          Reputation:unknown
          URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISZAnRlR4NAPVEUBIFDZPY4DASBQ0RO5C1EgUN-GcC7hIFDTLUnCoSBQ30yAJcEgUNu3kLnhIFDZWTl8sSBQ3foYjDEgUNqEHesxIFDdhWLMcSBQ1G3owuEgUNDGCb-xIFDRxVZ7Q=?alt=proto
          Preview:CnUKBw2T2OAwGgAKBw0RO5C1GgAKBw34ZwLuGgAKBw0y1JwqGgAKBw30yAJcGgAKBw27eQueGgAKBw2Vk5fLGgAKBw3foYjDGgAKBw2oQd6zGgAKBw3YVizHGgAKBw1G3owuGgAKBw0MYJv7GgAKBw0cVWe0GgA=
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:ASCII text, with very long lines (8794), with no line terminators
          Category:dropped
          Size (bytes):8794
          Entropy (8bit):5.755778680761384
          Encrypted:false
          SSDEEP:
          MD5:297AD23936FAB0B4A4DA437F1FC242C7
          SHA1:8863B018A0552A0878348099EF0FE136FD27CC43
          SHA-256:183329FF2B28BE8F6BE4DD85AF409EE5BD37AA5EE52E8A1AE867030BDA022BA0
          SHA-512:3A399267D53973801EDA232525070FDE51E4292186E35EFB8E4FB9AC521C1470DD595F42D6739D7D4E8FCFD7A9B7C8049419EF0C06133298D2015A0B301856C3
          Malicious:false
          Reputation:unknown
          Preview:window._cf_chl_opt={cFPWv:'b'};~function(W,h,i,j,o,s,z,A){W=b,function(c,d,V,e,f){for(V=b,e=c();!![];)try{if(f=parseInt(V(460))/1+parseInt(V(527))/2*(parseInt(V(476))/3)+parseInt(V(477))/4*(-parseInt(V(537))/5)+-parseInt(V(485))/6*(-parseInt(V(432))/7)+parseInt(V(492))/8+-parseInt(V(447))/9*(parseInt(V(457))/10)+-parseInt(V(522))/11*(parseInt(V(517))/12),f===d)break;else e.push(e.shift())}catch(E){e.push(e.shift())}}(a,722285),h=this||self,i=h[W(503)],j=function(X,d,e,f){return X=W,d=String[X(441)],e={'h':function(E){return null==E?'':e.g(E,6,function(F,Y){return Y=b,Y(435)[Y(524)](F)})},'g':function(E,F,G,Z,H,I,J,K,L,M,N,O,P,Q,R,S,T,U){if(Z=X,E==null)return'';for(I={},J={},K='',L=2,M=3,N=2,O=[],P=0,Q=0,R=0;R<E[Z(451)];R+=1)if(S=E[Z(524)](R),Object[Z(525)][Z(427)][Z(420)](I,S)||(I[S]=M++,J[S]=!0),T=K+S,Object[Z(525)][Z(427)][Z(420)](I,T))K=T;else{if(Object[Z(525)][Z(427)][Z(420)](J,K)){if(256>K[Z(510)](0)){for(H=0;H<N;P<<=1,Q==F-1?(Q=0,O[Z(436)](G(P)),P=0):Q++,H++);for(U=K[Z(510)](0),H
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
          Category:downloaded
          Size (bytes):1702917
          Entropy (8bit):5.108940360971968
          Encrypted:false
          SSDEEP:
          MD5:E830E078C233EEBE6DA37C9F2F2BC6B1
          SHA1:0EB3CF2FAB4B1DEE29507E89C0383DAB2268007B
          SHA-256:4FAD776E072A9C68A0C367E60285E295F876FF988A438A4083D597CC627AB419
          SHA-512:DAE87D6CDC28F565781E7E720C29933CA8D3DF5388E91D45A986345BA8EAA0A900ACB5AF44CEDBBF974C7521665B46141800E3AFFDC93B9C34CFE2FFE0EBD1FF
          Malicious:false
          Reputation:unknown
          URL:https://accountsupporthub.es/generate/Export/css/index.css
          Preview:.@charset "UTF-8";../*.. MetaMask design system imports.. The variables declared here should take precedence... They are included first because they will be used to replace bad variable names in itcss.. prior to it being fully removed from the system...*/../* http://meyerweb.com/eric/tools/css/reset/.. v2.0 | 20110126.. License: none (public domain).... .. This file has been updated from the original copy. ....*/..@import "./react-gallery/carousel.min.css";..html,..body,..div,..span,..applet,..object,..iframe,..h1,..h2,..h3,..h4,..h5,..h6,..p,..blockquote,..pre,..a,..abbr,..acronym,..address,..big,..cite,..code,..del,..dfn,..em,..img,..ins,..kbd,..q,..s,..samp,..small,..strike,..strong,..sub,..sup,..tt,..var,..u,..i,..center,..dl,..dt,..dd,..ol,..ul,..li,..fieldset,..form,..label,..legend,..table,..caption,..tbody,..tfoot,..thead,..tr,..th,..td,..article,..aside,..canvas,..details,..embed,..figure,..figcaption,..footer,..header,..hgroup,..menu,..nav,..output,..ruby,
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:ASCII text, with very long lines (8722), with no line terminators
          Category:downloaded
          Size (bytes):8722
          Entropy (8bit):5.750839973791139
          Encrypted:false
          SSDEEP:
          MD5:6D87022A03CD2578A1B2DFFCF4E7DE49
          SHA1:3370C16F2A869EAC85AA8CCF7379209DFB079FB3
          SHA-256:7EAF3400CEA05190FEA2181064DD321DD47FC3EDC8439D524B09B3DE71F05DB6
          SHA-512:D05186E099F3447FEAFFAB704F02DA7C28EADB46980585A337D74CFF302C4960AED6C526E2CDD8748FCAB519CA9673C7EA478A06BCF94EB300793731606CDB77
          Malicious:false
          Reputation:unknown
          URL:https://accountsupporthub.es/cdn-cgi/challenge-platform/h/b/scripts/jsd/e0c90b6a3ed1/main.js?
          Preview:window._cf_chl_opt={cFPWv:'b'};~function(W,h,i,j,k,l,s,v){W=b,function(c,e,V,f,g){for(V=b,f=c();!![];)try{if(g=parseInt(V(358))/1*(-parseInt(V(416))/2)+-parseInt(V(371))/3*(-parseInt(V(360))/4)+parseInt(V(386))/5+-parseInt(V(440))/6*(-parseInt(V(402))/7)+parseInt(V(427))/8+-parseInt(V(391))/9+-parseInt(V(403))/10,g===e)break;else f.push(f.shift())}catch(E){f.push(f.shift())}}(a,267329),h=this||self,i=h[W(435)],j=function(X,e,f,g){return X=W,e=String[X(432)],f={'h':function(E){return E==null?'':f.g(E,6,function(F,Y){return Y=b,Y(408)[Y(378)](F)})},'g':function(E,F,G,Z,H,I,J,K,L,M,N,O,P,Q,R,S,T,U){if(Z=X,E==null)return'';for(I={},J={},K='',L=2,M=3,N=2,O=[],P=0,Q=0,R=0;R<E[Z(429)];R+=1)if(S=E[Z(378)](R),Object[Z(374)][Z(404)][Z(418)](I,S)||(I[S]=M++,J[S]=!0),T=K+S,Object[Z(374)][Z(404)][Z(418)](I,T))K=T;else{if(Object[Z(374)][Z(404)][Z(418)](J,K)){if(256>K[Z(439)](0)){for(H=0;H<N;P<<=1,F-1==Q?(Q=0,O[Z(424)](G(P)),P=0):Q++,H++);for(U=K[Z(439)](0),H=0;8>H;P=1&U|P<<1.23,F-1==Q?(Q=0,O[Z(424)]
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:HTML document, ASCII text
          Category:downloaded
          Size (bytes):315
          Entropy (8bit):5.0572271090563765
          Encrypted:false
          SSDEEP:
          MD5:A34AC19F4AFAE63ADC5D2F7BC970C07F
          SHA1:A82190FC530C265AA40A045C21770D967F4767B8
          SHA-256:D5A89E26BEAE0BC03AD18A0B0D1D3D75F87C32047879D25DA11970CB5C4662A3
          SHA-512:42E53D96E5961E95B7A984D9C9778A1D3BD8EE0C87B8B3B515FA31F67C2D073C8565AFC2F4B962C43668C4EFA1E478DA9BB0ECFFA79479C7E880731BC4C55765
          Malicious:false
          Reputation:unknown
          URL:https://accountsupporthub.es/favicon.ico
          Preview:<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">.<html><head>.<title>404 Not Found</title>.</head><body>.<h1>Not Found</h1>.<p>The requested URL was not found on this server.</p>.<p>Additionally, a 404 Not Found.error was encountered while trying to use an ErrorDocument to handle the request.</p>.</body></html>.
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:HTML document, ASCII text, with CRLF line terminators
          Category:downloaded
          Size (bytes):3035
          Entropy (8bit):4.62034021293514
          Encrypted:false
          SSDEEP:
          MD5:3A00F82520F544328930D71A9CED996F
          SHA1:43CF543208498D382B92732B74C8C0CE3628EF04
          SHA-256:6BC59810EE5F045AA2DB83A98BCC28608B7AADFCD1464120F4F6295055FCB926
          SHA-512:A4E059DD57CC6CF77390F3EAAF74C2AC03732B61D36548036E5D81C219DDD613F3AE6E17B4E4BAFF406CF1538CD3F968A14A6B9D9973C20025B48689275E77EE
          Malicious:false
          Reputation:unknown
          URL:https://accountsupporthub.es/generate/Export/css/index-rtl.css
          Preview:<!doctype html>..<html>.. <head>.. <meta charset="utf-8">.. <meta name="viewport" content="width=device-width, initial-scale=1 user-scalable=no">.. <title>MetaMask</title>.. <link rel="stylesheet" type="text/css" href="./index.css" title="ltr">.. <link rel="stylesheet" type="text/css" href="./index-rtl.css" title="rtl" disabled>.. </head>.. <body>.. <div id="app-content">.. <img class="loading-logo" src="./images/logo/metamask-fox.svg" alt="" />.. <img class="loading-spinner" src="./images/spinner.gif" alt="" />.. </div>.. <div id="popover-content"></div>.. <script src="./snow.js" type="text/javascript" charset="utf-8"></script>.. <script src="./use-snow.js" type="text/javascript" charset="utf-8"></script>.. <script src="./globalthis.js" type="text/javascript" charset="utf-8"></script>.. <script src="./sentry-install.js" type="text/javascript" charset="utf-8"></script>.. <script src="./runtime-lavamoat.js" type="text/javascr
          No static file info