Edit tour

Windows Analysis Report
https://doc.getinvoicesimple.com/v/zpqbb3a/INV993?utm_swu=1279

Overview

General Information

Sample URL:https://doc.getinvoicesimple.com/v/zpqbb3a/INV993?utm_swu=1279
Analysis ID:1373207

Detection

Score:1
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Creates files inside the system directory
Stores files to the Windows start menu directory
Uses insecure TLS / SSL version for HTTPS connection

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64_ra
  • chrome.exe (PID: 3040 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://doc.getinvoicesimple.com/v/zpqbb3a/INV993?utm_swu=1279 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 7020 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 --field-trial-handle=1972,i,8420338896291527479,16211231729159579823,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: https://app.invoicesimple.com/v/5XeRY1CpwjHTTP Parser: No favicon
Source: https://app.invoicesimple.com/v/5XeRY1CpwjHTTP Parser: No favicon
Source: unknownHTTPS traffic detected: 23.1.237.25:443 -> 192.168.2.16:49731 version: TLS 1.0
Source: unknownHTTPS traffic detected: 40.127.169.103:443 -> 192.168.2.16:49729 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.16:49781 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.1.237.25:443 -> 192.168.2.16:49731 version: TLS 1.0
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 23.199.71.146
Source: unknownTCP traffic detected without corresponding DNS query: 23.199.71.146
Source: unknownDNS traffic detected: queries for: doc.getinvoicesimple.com
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
Source: unknownHTTPS traffic detected: 40.127.169.103:443 -> 192.168.2.16:49729 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.16:49781 version: TLS 1.2
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_BITS_3040_964286773
Source: classification engineClassification label: clean1.win@15/113@18/142
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://doc.getinvoicesimple.com/v/zpqbb3a/INV993?utm_swu=1279
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 --field-trial-handle=1972,i,8420338896291527479,16211231729159579823,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 --field-trial-handle=1972,i,8420338896291527479,16211231729159579823,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpactResource DevelopmentReconnaissance
Valid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
11
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local SystemExfiltration Over Other Network Medium2
Encrypted Channel
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationAbuse Accessibility FeaturesAcquire InfrastructureGather Victim Identity Information
Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
Non-Application Layer Protocol
SIM Card SwapObtain Device Cloud BackupsNetwork Denial of ServiceDomainsCredentials
Domain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
Application Layer Protocol
Data Encrypted for ImpactDNS ServerEmail Addresses

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://doc.getinvoicesimple.com/v/zpqbb3a/INV993?utm_swu=12790%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
accounts.google.com
142.250.31.84
truefalse
    high
    www.google.com
    172.253.62.147
    truefalse
      high
      k8s-ingressn-nginxing-39b87de652-021f799ec6c6b0c4.elb.us-east-1.amazonaws.com
      44.207.183.110
      truefalse
        high
        clients.l.google.com
        142.250.31.113
        truefalse
          high
          d28zjh2pk692s7.cloudfront.net
          108.139.46.226
          truefalse
            high
            clients1.google.com
            unknown
            unknownfalse
              high
              clients2.google.com
              unknown
              unknownfalse
                high
                app.invoicesimple.com
                unknown
                unknownfalse
                  unknown
                  doc.getinvoicesimple.com
                  unknown
                  unknownfalse
                    unknown
                    NameMaliciousAntivirus DetectionReputation
                    https://app.invoicesimple.com/v/5XeRY1Cpwjfalse
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      44.206.147.179
                      unknownUnited States
                      14618AMAZON-AESUSfalse
                      108.139.46.226
                      d28zjh2pk692s7.cloudfront.netUnited States
                      16509AMAZON-02USfalse
                      1.1.1.1
                      unknownAustralia
                      13335CLOUDFLARENETUSfalse
                      142.250.31.101
                      unknownUnited States
                      15169GOOGLEUSfalse
                      142.250.31.113
                      clients.l.google.comUnited States
                      15169GOOGLEUSfalse
                      172.253.62.94
                      unknownUnited States
                      15169GOOGLEUSfalse
                      18.154.230.81
                      unknownUnited States
                      16509AMAZON-02USfalse
                      239.255.255.250
                      unknownReserved
                      unknownunknownfalse
                      142.251.16.94
                      unknownUnited States
                      15169GOOGLEUSfalse
                      172.253.62.147
                      www.google.comUnited States
                      15169GOOGLEUSfalse
                      172.253.115.97
                      unknownUnited States
                      15169GOOGLEUSfalse
                      44.207.183.110
                      k8s-ingressn-nginxing-39b87de652-021f799ec6c6b0c4.elb.us-east-1.amazonaws.comUnited States
                      14618AMAZON-AESUSfalse
                      142.250.31.84
                      accounts.google.comUnited States
                      15169GOOGLEUSfalse
                      IP
                      192.168.2.17
                      192.168.2.16
                      Joe Sandbox version:38.0.0 Ammolite
                      Analysis ID:1373207
                      Start date and time:2024-01-11 17:15:40 +01:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:defaultwindowsinteractivecookbook.jbs
                      Sample URL:https://doc.getinvoicesimple.com/v/zpqbb3a/INV993?utm_swu=1279
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:7
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • EGA enabled
                      Analysis Mode:stream
                      Analysis stop reason:Timeout
                      Detection:CLEAN
                      Classification:clean1.win@15/113@18/142
                      • Exclude process from analysis (whitelisted): SIHClient.exe
                      • Excluded IPs from analysis (whitelisted): 172.253.62.94, 34.104.35.123
                      • Excluded domains from analysis (whitelisted): edgedl.me.gvt1.com, clientservices.googleapis.com
                      • Not all processes where analyzed, report is missing behavior information
                      • VT rate limit hit for: https://doc.getinvoicesimple.com/v/zpqbb3a/INV993?utm_swu=1279
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jan 11 15:16:12 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                      Category:dropped
                      Size (bytes):2673
                      Entropy (8bit):3.9872960791355316
                      Encrypted:false
                      SSDEEP:
                      MD5:2E9354F088035CDA1C9CA29ED2A6A769
                      SHA1:7F51DEC1A943680FD1DE40FF0A5DCD1E7957609D
                      SHA-256:2DC161027D822B9E378B2A4D4151E91844F360A5D0ADE37245B5747AA656B9F2
                      SHA-512:E4E684D2A4C95D349D7A49F16E6530A5F0196452ED78BCA213255557EF0FA81C34AD62B725D5B2B60244AEF008A6B78DDD100487FCD21D12F08587B97260AD2D
                      Malicious:false
                      Reputation:low
                      Preview:L..................F.@.. ...$+.,.......~.D..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I+X......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V+X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V+X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V+X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V+X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............dh......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jan 11 15:16:12 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                      Category:dropped
                      Size (bytes):2675
                      Entropy (8bit):4.002605906558742
                      Encrypted:false
                      SSDEEP:
                      MD5:D17CE398719933E2DCCC4ECF0F655E20
                      SHA1:BBD6072260E977806B741AF01D572FDDE74A54B2
                      SHA-256:C4C55C17CC218912268448F2013B51E35C5DE8F96964F3BD141FDDD3098634C1
                      SHA-512:35D49C0D810F731C9AD664755A50697752020A047C5D8CD7729AD4D5E75870E6EA05AA3ABB0B8CBC34E4D5CE39CEF4E13B4C14DB426B21AE24E54EA9F6BB56B6
                      Malicious:false
                      Reputation:low
                      Preview:L..................F.@.. ...$+.,....<.~.D..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I+X......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V+X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V+X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V+X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V+X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............dh......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                      Category:dropped
                      Size (bytes):2689
                      Entropy (8bit):4.008223396642903
                      Encrypted:false
                      SSDEEP:
                      MD5:2AC30C7E333C1D32F7DF4540FBBA3094
                      SHA1:EDA2D8F4D8F17F6C9192805BC2C854E423662D19
                      SHA-256:0543185124C715D1B67E4789756F4837C2F2608519D3480FA1B167E07500008A
                      SHA-512:1B13A3E92F2DF95D838653074BAB3662FC68D29DF1472B2EA347257CBA4C1AB6F393BDB87E1AD723BBD993A05F5000D4009224AEB324DF570340E50157049706
                      Malicious:false
                      Reputation:low
                      Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I+X......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V+X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V+X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V+X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............dh......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jan 11 15:16:12 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                      Category:dropped
                      Size (bytes):2677
                      Entropy (8bit):3.999056692288954
                      Encrypted:false
                      SSDEEP:
                      MD5:FBFBF1BF9A81A30CF6DD23C679CC8ACD
                      SHA1:BDE1DA4CC8F87BF9DD4D1CE1ED80CCA14CCD499B
                      SHA-256:0EC9421281E9123BDE179F3D88B2C41E97E9D7F9A7785C2EE787D94638D875A6
                      SHA-512:D1497C8DD064C98066304D7E36C7306BBD78B72291FD341BB6186A3CEB1ADF7122D52838CE158995BEE5DEDF24B2E5B2513A56A5EB445E90DA435EF6E083663B
                      Malicious:false
                      Reputation:low
                      Preview:L..................F.@.. ...$+.,.......~.D..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I+X......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V+X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V+X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V+X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V+X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............dh......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jan 11 15:16:12 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                      Category:dropped
                      Size (bytes):2677
                      Entropy (8bit):3.9888024781493496
                      Encrypted:false
                      SSDEEP:
                      MD5:A2A4AE00D05E4F7F033A956304D4B919
                      SHA1:CC358F46DE57E719A3E1268F0AAA649FE97E72FD
                      SHA-256:C8FAB503E8EA341DE6A3F5DB0651B3D8EB258FBD88144EBE5B560EA95FA55ED7
                      SHA-512:95F9218E84D09AAAC4768FFE46CF4EF3076758ADD1BB03FF01C8E8834D9F704A33E680890391250A612F696E44F477CCE27B1D81D9235D47292DF8561E620EED
                      Malicious:false
                      Reputation:low
                      Preview:L..................F.@.. ...$+.,.......~.D..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I+X......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V+X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V+X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V+X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V+X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............dh......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jan 11 15:16:12 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                      Category:dropped
                      Size (bytes):2679
                      Entropy (8bit):4.00000150155527
                      Encrypted:false
                      SSDEEP:
                      MD5:DEFE282B893D6DDC14A8532D1BA1D829
                      SHA1:F00B3855B74AEAF46D7FFFE49C40678A195D1DAA
                      SHA-256:9F1869B1983EFFE6B6D9F8EE3CFAB57D323EEFB4078A1B53E95F69D68ED0C652
                      SHA-512:97AD72B69A0449BF38CC01818518B66B4A8C3ED234E66BC16B6ED4455D1E0A54E068E317D9C46C6D5F04ADDAC6D312F174078F757D9248A7458B825E16DFD623
                      Malicious:false
                      Reputation:low
                      Preview:L..................F.@.. ...$+.,......~.D..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I+X......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V+X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V+X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V+X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V+X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............dh......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (2213)
                      Category:downloaded
                      Size (bytes):115442
                      Entropy (8bit):5.551285633548051
                      Encrypted:false
                      SSDEEP:
                      MD5:9CD86986EC2A8656C1AF923F60E588FC
                      SHA1:1F8DCE9CEE93E984300DDA88F52F725EDC295343
                      SHA-256:92E681673A3491136630ECE4486DC57D6745CF4B6C54986793696E1D0DF83C03
                      SHA-512:77A3C37B88FC8D17BC74FBCE92C189F3657D4868CF97ADFD64255875292EF40411AC9708CF9995DD6F803CF7755A572A69A0C04D6D66800B09975E15B3B3DE7A
                      Malicious:false
                      Reputation:low
                      URL:https://www.googletagmanager.com/gtag/js?id=undefined
                      Preview:.// Copyright 2012 Google Inc. All rights reserved.. .(function(){..var data = {."resource": {. "version":"1",. . "macros":[],. "tags":[],. "predicates":[],. "rules":[].},."runtime":[ .]..........};...var aa,ba=function(a){var b=0;return function(){return b<a.length?{done:!1,value:a[b++]}:{done:!0}}},fa=function(a){return a.raw=a},ha=function(a,b){a.raw=b;return a},ia=function(a){var b="undefined"!=typeof Symbol&&Symbol.iterator&&a[Symbol.iterator];if(b)return b.call(a);if("number"==typeof a.length)return{next:ba(a)};throw Error(String(a)+" is not an iterable or ArrayLike");},ja=function(a){for(var b,c=[];!(b=a.next()).done;)c.push(b.value);return c},ka=function(a){return a instanceof Array?a:.ja(ia(a))},la="function"==typeof Object.create?Object.create:function(a){var b=function(){};b.prototype=a;return new b},ma;if("function"==typeof Object.setPrototypeOf)ma=Object.setPrototypeOf;else{var na;a:{var oa={a:!0},pa={};try{pa.__proto__=oa;na=pa.a;break a}catch(a){}na=!1}ma=na?functi
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 72x72, segment length 16, baseline, precision 8, 300x400, components 3
                      Category:downloaded
                      Size (bytes):15796
                      Entropy (8bit):7.966545383677409
                      Encrypted:false
                      SSDEEP:
                      MD5:3254658CCBD982CDDAA981485AAFC191
                      SHA1:B1B5394B3B252B1E07B09A7444F61A956C398FB8
                      SHA-256:420AC0FDED4D2F651342D4698AE85B57D27DD5866BAD392147414F03D1FB2336
                      SHA-512:538EDFA85C8E5F3D8583D35E596581F4E4C41055DBCE28F7D4C9E52C15FF7CAE3BE04D8FF075DE7E4456AF32F5165C423FA8100B27B74C28040B4069D60B800A
                      Malicious:false
                      Reputation:low
                      URL:"https://d28zjh2pk692s7.cloudfront.net/fetch/c_fit,w_400,h_400/https://invoicemaker2-prod.s3.amazonaws.com/account/NHxHi2ctbw/photo/8758cc50-adba-11ee-87d4-43cef4c7ca05.jpg"
                      Preview:......JFIF.....H.H.....C.....................................%...#... , #&')*)..-0-(0%()(...C...........(...((((((((((((((((((((((((((((((((((((((((((((((((((........,.."........................................F.......................!1..AQ."aq.....2B.....#R..$3Cbr%4D.....5..S..................................'......................!.1.A..Q"2..aq.............?....@.B4.OT'j.........L... /.^...d..|`@.....?B9..4L...hV.wDh.w..u. .#(...9..S.e.7h.2...H.....F..!.07r6T.........<k...v....F.U..$=....lc...a.&.j..-.].I>Z.D.ER.Mz....A.JN......H.,.6......&<s.. ...m....a}..^/..$.cRM&9.4...]...6...H$[.N.4......q$v...SG.....4...S....@4.t$..#.$.S.....+.T....H.M4u..[..I....^......Bt..&.o...T..Q.t......-4..z...$.....7.5..Pu.XJ..T9.h...!..).p$r.R..J....h.....?.....i..,....@....%a.ye..F.3.E.^.<..Gn;...$j.4p....;)S7.Q\/m.a^..<.=..z...m...s.....WB(.V.8....d.....=.Y4....z"5..Am.S...$..H..m.m.z.....9w4....,vK.(/4IA..g...),...h..c@.^.]...A".F#.zP.29F.a.i......B.5]...O.#5...Mj/]..
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:Unicode text, UTF-8 text, with very long lines (63933)
                      Category:downloaded
                      Size (bytes):115860
                      Entropy (8bit):5.391873571073392
                      Encrypted:false
                      SSDEEP:
                      MD5:7E7C26AA1C50D3962FB431AA66E69FCD
                      SHA1:F6E33CEE469639A2607A57BE71A76418C6966CE0
                      SHA-256:7945A94243BBD06C8D3AF2AACB167B8C97424B4E84563276E641F78AFE9A8867
                      SHA-512:1B16F2F0727F648A078E75F9DAC437ECEAFC87886C44F0AA6A9FC8F2AB3AAC40DB6A97935BBE15C5B4CE663BD9C816DA1B7702D38D711DBA5767D8A36A53C24A
                      Malicious:false
                      Reputation:low
                      URL:https://app.invoicesimple.com/_next/static/chunks/8432-0e6648f0b6b9816a.js
                      Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[8432],{83184:function(e,t){"use strict";t.byteLength=function(e){var t=c(e),n=t[0],r=t[1];return(n+r)*3/4-r},t.toByteArray=function(e){var t,n,o=c(e),s=o[0],a=o[1],d=new i((s+a)*3/4-a),u=0,p=a>0?s-4:s;for(n=0;n<p;n+=4)t=r[e.charCodeAt(n)]<<18|r[e.charCodeAt(n+1)]<<12|r[e.charCodeAt(n+2)]<<6|r[e.charCodeAt(n+3)],d[u++]=t>>16&255,d[u++]=t>>8&255,d[u++]=255&t;return 2===a&&(t=r[e.charCodeAt(n)]<<2|r[e.charCodeAt(n+1)]>>4,d[u++]=255&t),1===a&&(t=r[e.charCodeAt(n)]<<10|r[e.charCodeAt(n+1)]<<4|r[e.charCodeAt(n+2)]>>2,d[u++]=t>>8&255,d[u++]=255&t),d},t.fromByteArray=function(e){for(var t,r=e.length,i=r%3,o=[],s=0,a=r-i;s<a;s+=16383)o.push(function(e,t,r){for(var i,o=[],s=t;s<r;s+=3)o.push(n[(i=(e[s]<<16&16711680)+(e[s+1]<<8&65280)+(255&e[s+2]))>>18&63]+n[i>>12&63]+n[i>>6&63]+n[63&i]);return o.join("")}(e,s,s+16383>a?a:s+16383));return 1===i?o.push(n[(t=e[r-1])>>2]+n[t<<4&63]+"=="):2===i&&o.push(n[(t=(e[r-2]<<8)+e[r-1])>>10]+n[t>>4&63]+n
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (30523), with no line terminators
                      Category:downloaded
                      Size (bytes):30523
                      Entropy (8bit):5.180352374153933
                      Encrypted:false
                      SSDEEP:
                      MD5:6358FE7C2B1C75CBF4801947FA4D4983
                      SHA1:801654F6C6E0295CF87E92440E085399CBD9D85F
                      SHA-256:A084A36590D2A32FFB92777E4C9252F4206FA884F3918E603BBE2EEFF1081EB8
                      SHA-512:83A0BC2F481305FC2CE0038080B40C1EF788736C87DE3D34AD3B705F0EBE37BE3B85D68DF2E456D60F9197AD743FA753A70F102BAD741478EF1E9A5392513EEA
                      Malicious:false
                      Reputation:low
                      URL:https://app.invoicesimple.com/_next/static/chunks/9845-199347fd2722f29d.js
                      Preview:"use strict";(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[9845],{85570:function(t,e,r){r.d(e,{Z:function(){return U}});var i=r(79365),a=r(33198),s=r(1917),n=r(31269),o=r(50973),u=r(762),l=r(62028),c=r(78489);function h(t,e){return Object.keys(t).reduce(function(r,a){return r[a]=(0,i.pi)({timeZone:e},t[a]),r},{})}function d(t,e){return Object.keys((0,i.pi)((0,i.pi)({},t),e)).reduce(function(r,a){return r[a]=(0,i.pi)((0,i.pi)({},t[a]||{}),e[a]||{}),r},{})}function f(t,e){if(!e)return t;var r=u.C.formats;return(0,i.pi)((0,i.pi)((0,i.pi)({},r),t),{date:d(h(r.date,e),h(t.date||{},e)),time:d(h(r.time,e),h(t.time||{},e))})}var m=function(t,e,r,a,s){var n=t.locale,u=t.formats,h=t.messages,d=t.defaultLocale,m=t.defaultFormats,p=t.fallbackOnEmptyString,y=t.onError,v=t.timeZone,g=t.defaultRichTextElements;void 0===r&&(r={id:""});var b=r.id,C=r.defaultMessage;(0,o.kG)(!!b,"[@formatjs/intl] An `id` must be provided to format a message. You can either:\n1. Configure your build toolchain
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 72x72, segment length 16, baseline, precision 8, 300x400, components 3
                      Category:downloaded
                      Size (bytes):27958
                      Entropy (8bit):7.97740735164062
                      Encrypted:false
                      SSDEEP:
                      MD5:DF926FE451CFDB17FA0CB34A917C836A
                      SHA1:CD242180C837F6B48F24DCBD085C9C8C21192E1B
                      SHA-256:C4025D479B6DE37BFDE606E4FC65CCEE98440803CC6ABA50DE387DB182AAAA1F
                      SHA-512:7265C83DC1B40EDFCFD4028DC554639B9CF8A4C6FCBEC19D3DB70175456F40E54568B3054A671DB15877D9DEC255E7AC10253BC848BA84CC64F7DD07AE5E75BB
                      Malicious:false
                      Reputation:low
                      URL:"https://d28zjh2pk692s7.cloudfront.net/fetch/c_fit,w_400,h_400/https://invoicemaker2-prod.s3.amazonaws.com/account/NHxHi2ctbw/photo/8582fae0-adba-11ee-87d4-43cef4c7ca05.jpg"
                      Preview:......JFIF.....H.H.....C.....................................%...#... , #&')*)..-0-(0%()(...C...........(...((((((((((((((((((((((((((((((((((((((((((((((((((........,.."........................................E........................!..1A."Qa2q...BR.#b......3$Cr......4Sc.D.................................+......................!.1A.Q."2aq.#B...$.............?....>..!...y...a....g.E.j......Iwu)..].....j..oo.5k..%3.+.f'e..........z.I...I.Cg9.5.i.j.p..t....0...6F.Gn..{.5.(....Gm....k.....x.%.u......P==G..h.n..o.e..........R...;.c.Q\+....2...-......>..C5p.>.<!..y......k.....\............o~E...w.V.C.@....'.m...x...>.....-..ZH....V..n....z.p....qK=.,v..4.......r:.R=j..'..q4.....q.!.....F...s.q...[....P6.w........G<...[....}Ml.ZT:]....1.F2.R.s..&..4..6...V..y-...;.....b.].I.cH.....lt=....A..C#..7.#<.....<..{R..s.7.Wu.xx.L.y|;.{y..A.'.9.mVV..\.1...SM.S6.+..e.e6c.|.....$......:.;...8BO1.'$.rI..X.-).X.;..t.0..P..'.b..+.n.q...~.k)?&..<A..j:{.3..D2!....j.N.J.
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (793), with no line terminators
                      Category:downloaded
                      Size (bytes):793
                      Entropy (8bit):5.252930573061686
                      Encrypted:false
                      SSDEEP:
                      MD5:AC746E19184E5DEAA1CDC375473D0BDA
                      SHA1:890DFDD27E1B97DC47C3EBF266410E7BD832564E
                      SHA-256:F581A1A10CDD4D0D68A5462193227E2A4AD23FBBF0D46CBD9592F57A86ECC7F6
                      SHA-512:86FA30CD0ECA8C16B3E0C9A9FC9E8104C63FACDAB7EFADFD172CD2F516329541CAC9F20898A86549C7CB96D5CF44834BEA12A30283538EFE827673691857D387
                      Malicious:false
                      Reputation:low
                      URL:https://app.invoicesimple.com/_next/static/chunks/app/layout-a282f16fbf544152.js
                      Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[3185],{64394:function(e,n,r){Promise.resolve().then(r.bind(r,39180)),Promise.resolve().then(r.bind(r,65285)),Promise.resolve().then(r.t.bind(r,11698,23)),Promise.resolve().then(r.t.bind(r,59297,23))},39180:function(e,n,r){"use strict";r.r(n),r.d(n,{Providers:function(){return l}});var t=r(17821),i=r(26038),s=r(67777),o=r(17582),u=r(33198),c=r(85570);function l(e){let{children:n,messages:r,locale:l,requestHeaders:f}=e,[d]=(0,u.useState)(()=>new s.S);return(0,i.c)({requestHeaders:f}),(0,t.jsx)(o.QueryClientProvider,{client:d,children:(0,t.jsx)(c.Z,{messages:r,locale:l,children:n})})}},59297:function(){},11698:function(){}},function(e){e.O(0,[3270,8688,9845,6387,7879,4648,6800,1744],function(){return e(e.s=64394)}),_N_E=e.O()}]);
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (65198)
                      Category:downloaded
                      Size (bytes):160775
                      Entropy (8bit):5.258056795727807
                      Encrypted:false
                      SSDEEP:
                      MD5:CAB85F4F0540B146913B4558A413F0A2
                      SHA1:8EC4782228A6EAD99B3A4C328F9595AEEADBED13
                      SHA-256:8A220E2031137A761F8C5A17A8C9E05F5E25EB0D5A0C065E925F08B564A483CD
                      SHA-512:9D527A2BA185C31C01AE98C9A5836787E96A3443EBAE1D6521CB161653B635280595B33D894AE460FA869BDE9100FD91D2F3C471A76CD721BA4F96EC05CE45A6
                      Malicious:false
                      Reputation:low
                      URL:https://app.invoicesimple.com/_next/static/chunks/d4618404-b7284546ef4652e4.js
                      Preview:"use strict";(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[4648],{69527:function(e,t,n){/**. * @license React. * react-dom.production.min.js. *. * Copyright (c) Meta Platforms, Inc. and affiliates.. *. * This source code is licensed under the MIT license found in the. * LICENSE file in the root directory of this source tree.. */var r,l=n(33198),a=n(79076),o={usingClientEntryPoint:!1,Events:null,Dispatcher:{current:null}};function i(e){for(var t="https://reactjs.org/docs/error-decoder.html?invariant="+e,n=1;n<arguments.length;n++)t+="&args[]="+encodeURIComponent(arguments[n]);return"Minified React error #"+e+"; visit "+t+" for the full message or use the non-minified dev environment for full errors and additional helpful warnings."}var u=Object.assign,s=l.__SECRET_INTERNALS_DO_NOT_USE_OR_YOU_WILL_BE_FIRED,c=[],f=-1;function d(e){return{current:e}}function p(e){0>f||(e.current=c[f],c[f]=null,f--)}function h(e,t){c[++f]=e.current,e.current=t}var m=Symbol.for("react.element"),g=
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:Unicode text, UTF-8 text, with very long lines (65340), with no line terminators
                      Category:downloaded
                      Size (bytes):100177
                      Entropy (8bit):5.386418564583419
                      Encrypted:false
                      SSDEEP:
                      MD5:631B31526A237EB353E54D9BEAA6CB90
                      SHA1:E02F21EA8F71C0F4EEFB6F1AD17096B18FD368D8
                      SHA-256:FE5222229D86763997002BDD5FED6F5493B368C42351F0AA707134AD513D6AF9
                      SHA-512:A2EC12B989E2E7BE81445E0254DD6EB2A0CF7240EAEA659CBBB1FA1203A172B8FE57FB339944F38CA67661823A449B24A7D0F79EEAF237D7A49299AB759D05AF
                      Malicious:false
                      Reputation:low
                      URL:https://app.invoicesimple.com/_next/static/chunks/3608-a9e503d24b6d7e88.js
                      Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[3608],{447:function(t,n,r){"use strict";r.r(n),r.d(n,{calculate:function(){return F},getDepositAmount:function(){return U},getDiscount:function(){return b},getDueDate:function(){return f},getEffectivePaidDate:function(){return S},getInvoiceBalance:function(){return k},getInvoiceNonZeroItemsCount:function(){return z},getInvoicePaidSurchargeSum:function(){return P},getInvoiceSurcharge:function(){return q},getInvoiceTax:function(){return O},getInvoiceTaxableSubtotal:function(){return T},getInvoiceTotal:function(){return A},getInvoiceTotalShipping:function(){return D},getInvoiceTotalWithPaidSurcharge:function(){return L},getItemAmount:function(){return v},getItemDiscount:function(){return h},getItemPaymentFees:function(){return $},getItemRateWithPaymentFees:function(){return H},getItemTax:function(){return g},getItemTotal:function(){return _},getLastPaymentDate:function(){return I},getNonTaxableItems:function(){return m},getPaidAmoun
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (57911), with no line terminators
                      Category:downloaded
                      Size (bytes):57911
                      Entropy (8bit):5.495023047274747
                      Encrypted:false
                      SSDEEP:
                      MD5:0CFCF1D730996124DA9F917F3CC02EEC
                      SHA1:DA920E255DC24CB2BD8F9E2475BDBE8B43ABC578
                      SHA-256:04EC60E1472BB8758BE579EB4625ADCE0950D4BF2E4ECEA6C606EB82B5D0B930
                      SHA-512:2C0A6A4DC6F9E5ED0310D2D09AB7A4EBDD45DBFBD4C42B2F3B3898B5C5B61AFE486A60ABCD7890C7C465DC3A264FD75604F64C27C6BD7E62C2713067F1C4DCE6
                      Malicious:false
                      Reputation:low
                      URL:https://app.invoicesimple.com/_next/static/chunks/6617-513488255c727ef8.js
                      Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[6617],{25832:function(e,t,n){"use strict";t.LO=void 0;var r,i,o,a,s=n(67824),l=n(447);(r=o||(o={})).NOT_ELIGIBLE="NOT_ELIGIBLE",r.INITIAL="INITIAL",r.PENDING="PENDING",r.PENDING_VERIFICATION="PENDING_VERIFICATION",r.ACCEPTING="ACCEPTING",(i=a||(a={})).ACH="ACH",i.CARD_PAYMENTS="CARD_PAYMENTS",t.LO=function(e){var t=(0,l.calculate)(e);return!e.setting.stripePaymentSuppressed&&!e.deleted&&+t.total>0&&+t.balanceDue>0&&e.docType===s.DocTypes.DOCTYPE_INVOICE}},49659:function(e){"use strict";var t=function(e){var t;return!!e&&"object"==typeof e&&"[object RegExp]"!==(t=Object.prototype.toString.call(e))&&"[object Date]"!==t&&e.$$typeof!==n},n="function"==typeof Symbol&&Symbol.for?Symbol.for("react.element"):60103;function r(e,t){return!1!==t.clone&&t.isMergeableObject(e)?a(Array.isArray(e)?[]:{},e,t):e}function i(e,t,n){return e.concat(t).map(function(e){return r(e,n)})}function o(e){return Object.keys(e).concat(Object.getOwnPropertySym
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (29475)
                      Category:downloaded
                      Size (bytes):29691
                      Entropy (8bit):5.389965325038625
                      Encrypted:false
                      SSDEEP:
                      MD5:C1C645FF1B8CCAD39FB0F0F64BD2A6BB
                      SHA1:16270D0FDEB47464844F4D6750D2A82004A961C8
                      SHA-256:DACED4700ADE738279F77FF8DED5AFF582B028DCB6071C3E8A0AC28AB95EC40B
                      SHA-512:EE4DD313A3CB83184CE4EEE0E01CF79FA552AB5758B78831E5861A095FB70F760F9A6F1518726FF437AB506F64E00B44B24AF9071E9B8E575BE2BDFB12C65D50
                      Malicious:false
                      Reputation:low
                      URL:https://app.invoicesimple.com/_next/static/chunks/3846-8307a49d18a8f1eb.js
                      Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[3846],{33396:function(t,e){"use strict";/*!. * cookie. * Copyright(c) 2012-2014 Roman Shtylman. * Copyright(c) 2015 Douglas Christopher Wilson. * MIT Licensed. */e.Q=function(t,e){if("string"!=typeof t)throw TypeError("argument str must be a string");for(var n={},o=t.split(";"),i=(e||{}).decode||r,a=0;a<o.length;a++){var u=o[a],c=u.indexOf("=");if(!(c<0)){var s=u.substring(0,c).trim();if(void 0==n[s]){var f=u.substring(c+1,u.length).trim();'"'===f[0]&&(f=f.slice(1,-1)),n[s]=function(t,e){try{return e(t)}catch(e){return t}}(f,i)}}}return n},e.q=function(t,e,r){var i=r||{},a=i.encode||n;if("function"!=typeof a)throw TypeError("option encode is invalid");if(!o.test(t))throw TypeError("argument name is invalid");var u=a(e);if(u&&!o.test(u))throw TypeError("argument val is invalid");var c=t+"="+u;if(null!=i.maxAge){var s=i.maxAge-0;if(isNaN(s)||!isFinite(s))throw TypeError("option maxAge is invalid");c+="; Max-Age="+Math.floor(s)}if(i
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with no line terminators
                      Category:downloaded
                      Size (bytes):96
                      Entropy (8bit):4.842127826021245
                      Encrypted:false
                      SSDEEP:
                      MD5:F1ED6959C1B2F95E219991BDD4842677
                      SHA1:13B4E9409B01DDBDA6B0F527C6F8AFD1E3775632
                      SHA-256:A51A2674B8B359E7AAE888DC8E9D862B1083EE66601DFCF0A2927E9BA621A99C
                      SHA-512:E36D18BC22CD90344456D46F310DB4CA11EF0DFB7CB56F362F5AE98D9A655168016888B83226723B910BD73D2F27C16646FA53F58B7450255187CB5861A59B74
                      Malicious:false
                      Reputation:low
                      URL:https://app.invoicesimple.com/_next/static/css/b1aef614ebeabfa7.css
                      Preview:body,html{height:100%}body{background-color:#f3f4f6;background-color:var(--bodyBgColor,#f3f4f6)}
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (16036), with no line terminators
                      Category:downloaded
                      Size (bytes):16036
                      Entropy (8bit):5.111323904743624
                      Encrypted:false
                      SSDEEP:
                      MD5:804F0C77141B41EB71BBF4C8D2EBF7C2
                      SHA1:AB9A1BF252744CF183052961F12C7C60E281388C
                      SHA-256:E8E0DD3ADF86448C1283BCBF3DFD67EBD81E4D73DCC3FD19E454315318A47122
                      SHA-512:B1B5FDC86DF51230ADF7AE7670CBCAE1185531D70415C1687B11A5DF2FACC694BAAB4CB3CCA19D2D8EAC880BA74359D1F8D6B6A72F43714C90EDA506A31B4D67
                      Malicious:false
                      Reputation:low
                      URL:https://app.invoicesimple.com/_next/static/chunks/4665-d11b485163be7c4f.js
                      Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[4665],{49032:function(t,e,s){t.exports=s(85310)},74381:function(t,e,s){"use strict";function i(){return{onFetch:t=>{t.fetchFn=()=>{var e,s,i,a,u,o;let l;let c=null==(e=t.fetchOptions)?void 0:null==(s=e.meta)?void 0:s.refetchPage,h=null==(i=t.fetchOptions)?void 0:null==(a=i.meta)?void 0:a.fetchMore,d=null==h?void 0:h.pageParam,f=(null==h?void 0:h.direction)==="forward",v=(null==h?void 0:h.direction)==="backward",p=(null==(u=t.state.data)?void 0:u.pages)||[],b=(null==(o=t.state.data)?void 0:o.pageParams)||[],m=b,g=!1,y=e=>{Object.defineProperty(e,"signal",{enumerable:!0,get:()=>{var e,s;return null!=(e=t.signal)&&e.aborted?g=!0:null==(s=t.signal)||s.addEventListener("abort",()=>{g=!0}),t.signal}})},P=t.options.queryFn||(()=>Promise.reject("Missing queryFn")),O=(t,e,s,i)=>(m=i?[e,...m]:[...m,e],i?[s,...t]:[...t,s]),C=(e,s,i,r)=>{if(g)return Promise.reject("Cancelled");if(void 0===i&&!s&&e.length)return Promise.resolve(e);let n={quer
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (4885), with no line terminators
                      Category:downloaded
                      Size (bytes):4885
                      Entropy (8bit):5.450527016446138
                      Encrypted:false
                      SSDEEP:
                      MD5:4642B09081A0CE2D5F185A5777289F3E
                      SHA1:81D419FB95565E93F0FE3C8FCADAA72A4C60FBF3
                      SHA-256:CFD7F40DF526131E560969F1B5D91A73C1C6B9CF5DCB3549C50A8D3E361C9795
                      SHA-512:EC00080D44A9C0575C913E302B3FDC374A896EE919D94CF1F5AE823ADEFF7B0C7E72E725687D1134B6F7B7BD4DA9C0AE52D8BCC78839E02E67EC653E9CB89A9F
                      Malicious:false
                      Reputation:low
                      URL:https://app.invoicesimple.com/_next/static/chunks/webpack-bc11431b98a2e250.js
                      Preview:!function(){"use strict";var e,t,n,r,o,c,d,u,f,a={},i={};function l(e){var t=i[e];if(void 0!==t)return t.exports;var n=i[e]={id:e,loaded:!1,exports:{}},r=!0;try{a[e].call(n.exports,n,n.exports,l),r=!1}finally{r&&delete i[e]}return n.loaded=!0,n.exports}l.m=a,l.amdO={},e=[],l.O=function(t,n,r,o){if(n){o=o||0;for(var c=e.length;c>0&&e[c-1][2]>o;c--)e[c]=e[c-1];e[c]=[n,r,o];return}for(var d=1/0,c=0;c<e.length;c++){for(var n=e[c][0],r=e[c][1],o=e[c][2],u=!0,f=0;f<n.length;f++)d>=o&&Object.keys(l.O).every(function(e){return l.O[e](n[f])})?n.splice(f--,1):(u=!1,o<d&&(d=o));if(u){e.splice(c--,1);var a=r();void 0!==a&&(t=a)}}return t},l.n=function(e){var t=e&&e.__esModule?function(){return e.default}:function(){return e};return l.d(t,{a:t}),t},n=Object.getPrototypeOf?function(e){return Object.getPrototypeOf(e)}:function(e){return e.__proto__},l.t=function(e,r){if(1&r&&(e=this(e)),8&r||"object"==typeof e&&e&&(4&r&&e.__esModule||16&r&&"function"==typeof e.then))return e;var o=Object.create(null)
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (28404), with no line terminators
                      Category:downloaded
                      Size (bytes):28404
                      Entropy (8bit):5.183412708589426
                      Encrypted:false
                      SSDEEP:
                      MD5:EFA9C47D7FBCE84FB812D50665C255E9
                      SHA1:530653D0A9869676FA29A74A62944B4142D594DB
                      SHA-256:1AC65CDFC703753AB3F952F5316D5F32F34417106C64A7D7713CBF6DAAEADAD1
                      SHA-512:2CD7DBA46C9716283466D39D6BE8813660CA965A00BE1875FC76A89979CACD03258FE8C3A6842B023CB2A795573ACE70109F3449BD39CF814BF94DA208631EDF
                      Malicious:false
                      Reputation:low
                      URL:https://app.invoicesimple.com/_next/static/chunks/7182-2e5d9904ca793800.js
                      Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[7182],{25272:function(t,e,n){!function(t){"use strict";var e={};Object.defineProperty(e,"__esModule",{value:!0});var r,i,a=function(t,e){if(Array.isArray(t))return t;if(Symbol.iterator in Object(t))return function(t,e){var n=[],r=!0,i=!1,a=void 0;try{for(var o,s=t[Symbol.iterator]();!(r=(o=s.next()).done)&&(n.push(o.value),!e||n.length!==e);r=!0);}catch(t){i=!0,a=t}finally{try{!r&&s.return&&s.return()}finally{if(i)throw a}}return n}(t,e);throw TypeError("Invalid attempt to destructure non-iterable instance")},o={getItem:function(t,e){return o.multiGet([t]).then(function(t){return t[0][1]}).then(function(t){return e&&e(null,t),t}).catch(function(t){return e&&e(t,null),t})},setItem:function(t,e,n){return o.multiSet([[t,e]]).then(function(t){return n&&n(null,t),t}).catch(function(t){return n&&n(t,null),t})},getAllKeys:function(t){return Promise.resolve(Object.keys(localStorage)).then(function(e){return t&&t(null,e),e}).catch(functio
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (14707), with no line terminators
                      Category:downloaded
                      Size (bytes):14707
                      Entropy (8bit):5.5468733333531715
                      Encrypted:false
                      SSDEEP:
                      MD5:DC810CB044FE56422CFEBA6DD992FE22
                      SHA1:C1C393DE614146EE8A4E167588B2FA9B80E058D1
                      SHA-256:DB3737BF941A0CAC6917763008461CA5A04AF87D2EE0265255BBCD74F76FBA9C
                      SHA-512:5D563E6025DF6D7600B7FDED204C076BA83E9DC5FCBEBE4AE7DBE6D869F8251226A6BBCCBE076634CCDEEAAB357983404D3E56A076A2AEF2B3BC41547AC837C6
                      Malicious:false
                      Reputation:low
                      URL:https://app.invoicesimple.com/_next/static/chunks/app/(public)/v/%5BdocumentId%5D/page-dca4e840a7071ec4.js
                      Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[7836],{51926:function(e,t,i){Promise.resolve().then(i.t.bind(i,88210,23)),Promise.resolve().then(i.bind(i,97353))},97353:function(e,t,i){"use strict";i.r(t),i.d(t,{PublicDocumentFeature:function(){return _}});var n=i(17821),r=i(67824),a=i(92449),s=i(49032),l=i(26449),o=i.n(l),c=i(82156),d=i(77813),u=i(33198),m=i(86074),x=i(92414),p=i(61375),f=i(57703),h=i(27255),v=i(82025),g=i(51268);let y=async e=>{let{accountId:t,estimateId:i,estimateNo:n,estimateUrl:a,toEmail:s,toName:l}=e;await (0,g.K)("/api/v2/email-estimate-signed",{headers:{"Content-Type":r.ContentTypes.APP_JSON},body:JSON.stringify({accountId:t,estimateId:i,estimateNo:n,estimateUrl:a,toEmail:s,toName:l}),cache:"no-cache",method:"POST",isPublic:!0})};var b=i(78359);let j=e=>{let{accountId:t,documentId:i,estimateNo:r,toEmail:a,toName:l,prefilledName:o}=e,{isOpen:g,close:j}=(0,f.d)(),[E,F]=(0,u.useState)(null!=o?o:""),T=0===E.length,k=(0,u.useRef)(null),[P,R]=(0,u.useState)(
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 72x72, segment length 16, baseline, precision 8, 300x400, components 3
                      Category:dropped
                      Size (bytes):16195
                      Entropy (8bit):7.962050049171603
                      Encrypted:false
                      SSDEEP:
                      MD5:D9D09AC2B183AA12086CF4BA015855BD
                      SHA1:25DBBF2C86F74B6056D93EAFB0E28706B0A072BB
                      SHA-256:FFDF25032B4CE21269CEE85903D2D74EB55C214D4BB21EA7B379850016396CA3
                      SHA-512:75DAED40A0D4C7295A8C31F0E1DD81D881290582D2F680F00F331C3A1E197DCEB5B0D8AF29A6036467DF7AD93374FE2CAC9F106BC10A2C818A4BA06B3057CE10
                      Malicious:false
                      Reputation:low
                      Preview:......JFIF.....H.H.....C.....................................%...#... , #&')*)..-0-(0%()(...C...........(...((((((((((((((((((((((((((((((((((((((((((((((((((........,.."........................................D........................!1.AQ.."aq.2....#B..R....3br.C.$....%4..................................!.......................!1.AQ."a............?..}..d...F.$....fu.#.n...H.p.Bq.-48j....O4..'.J......N.vQ.1...d........B.j.\.7...K@..:...->......7]...g.%.@.....H.X.l.BJ.v..t.J..e&..D..e...k[% ]...}S.8.....'7.T.......A....,...2.....H.w.4.U..rF..^..9..$a.$L...o..Dk.z....i...6...i@..$.&....F...z....9......./0.>.]...........Mk...p.]F..@8.<.4.6N..GD.....0.(.tOp.4....OTR..3u...)..h."........0uO-..L..=.Y..C.i.O6..D.9.-.j.';RR4e.`..:=M.p..l.W.m..F....,.m.R.,.1r6..hx.........Qu.....n....G5.'....i.tH....Sh..Nu.W6....'...'4_.W.R..%G..BBt6.."..iI.Q...2..Qj..E##F.D/.a..6.Eh.-4..;Rpg0.....<.$E.&.KM.....4..T...]uE!.i.4......)|..n.....4;.B...`A+\.c.|.+.x5L...a.@Z.E.)..O.q
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 72x72, segment length 16, baseline, precision 8, 300x400, components 3
                      Category:downloaded
                      Size (bytes):24121
                      Entropy (8bit):7.976466416754981
                      Encrypted:false
                      SSDEEP:
                      MD5:B47986287C0F9A402C1E6339A6CC0150
                      SHA1:B6A7E60660B7DA639B70F33921DECE2348157832
                      SHA-256:A063740840CE63A3DAE5784EAF582851F5321D3A89DAD8D72FAFB47241B2C02E
                      SHA-512:6CCED5251B710901BADD44BCF129B6E6419E30B23AA8CFECBD98F547EA74BDBE364E81B9D955B34FDE4BED11D6D20393BE12515319F139D5B4C471F3C73D8052
                      Malicious:false
                      Reputation:low
                      URL:"https://d28zjh2pk692s7.cloudfront.net/fetch/c_fit,w_400,h_400/https://invoicemaker2-prod.s3.amazonaws.com/account/NHxHi2ctbw/photo/87bfcb80-adba-11ee-baee-8dc5999235ba.jpg"
                      Preview:......JFIF.....H.H.....C.....................................%...#... , #&')*)..-0-(0%()(...C...........(...((((((((((((((((((((((((((((((((((((((((((((((((((........,.."........................................J........................!.1.."AQaq......2B..#Rb...$3Cr.....%c...&DSTs4d.................................0........................!1A.."Q..2aq....B....R............?../.Q.ek`..XMG.k`+u..V.'.L(...^Q...,...9..*...C....[...E...q1.j2[.h..(.I.s.Op......4.n@'....{..,}.^d....x..&s.&....R.:gQ.^....e;Q..B9. ._.^.3.-.....7.H..5..B.q.Y...1@.Eg. .5....).....5.|..Q..;.9..f.K8.T...Q...)B...dBI.F...r{47..4....]..........[..Oh...3......yT ...6....dlnN)g...A..0...>mR..D..;..R^..G./..@M.H4.8[qY.UV^.DO..N(-........E..*.....x...%.......QN(.....^.".[..V......g..f.......$.D..g............*j.uQ.*.N(..j.-..i.r....D. ..'......Nub..... .....@.......7.d...u.."....'...B.1).....q...*.f..K.....,...u.[./ss.),....E.f...@r.....nO..Y..`j>.v......Z...c...*..E.M..A.c...
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 72x72, segment length 16, baseline, precision 8, 300x400, components 3
                      Category:dropped
                      Size (bytes):18162
                      Entropy (8bit):7.967312215867952
                      Encrypted:false
                      SSDEEP:
                      MD5:464BAF21FC91AA1F09B74D7BB00CC93B
                      SHA1:10187EEC5255B81227C5EA86B2D48A85669E02CA
                      SHA-256:175A511CBE96EAEAF223DC8D2C23CBB5A44E77AE2BFE4F7B9A07E257CB477529
                      SHA-512:9B78218A52F31937053D947B893AE37A302B8D11D57DE2CE0143C0E4B767E8084BC2BCD9F111B25DFD6979B9259D0E927D35B8CD31145476B24189C27A1156A0
                      Malicious:false
                      Reputation:low
                      Preview:......JFIF.....H.H.....C.....................................%...#... , #&')*)..-0-(0%()(...C...........(...((((((((((((((((((((((((((((((((((((((((((((((((((........,.."........................................E........................!.1AQ.."aq...#2....BR..34br..$..%S..Dcs.................................".......................!1A..Q"2a............?..../...U......h#d..w..........1.MGj..&.....+.....e........@.j.8.N.P.0....[...mP....R?MU....*........Wq..26.V...[F..u./..........elv.../j..W....i%F.:e....l.P....;S..M.z...r.P..LE.....T.84.BF}...Q.z......J.......s......-..NyS.!*.S..0w..).j......d..H.E{-...`.M.8.u+..o'.M.I...%?W...S.[m...Z(#.........H.Y....RB..~.%....L.:..2....v4......k."l..7...z....Uk..{.....w....?.H...?.Y....1.....|....?.8.../.Awe{....`.0..u...x.....)....#...n>cz]#.?.<A...n.y...... ..>.C...vS..D.F...].2...[.c....`.67.x.....a.;.a...n.......9C....88R.w....H.Y..}.U.:..JCQX.22zQB..z..A..*;.....~Tm...H...)..6.($...f.o5...VQ@.\.?...@..<.yS.V{
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (65472)
                      Category:downloaded
                      Size (bytes):153806
                      Entropy (8bit):5.114818182459109
                      Encrypted:false
                      SSDEEP:
                      MD5:56330B6453E425CBCAFE1B9920EF6916
                      SHA1:5C66FC172885035F12663A3399396FBDB54157F1
                      SHA-256:614DBF0D50FE08438BAF5B0D83C49F37B8D66F96FB5601BA4A1CB6ACA1CE9E89
                      SHA-512:DE4B314936354624358DA8B31B34AA6BBCFEA2955703BB1528D17581DA3E15A8BFCAC67EB69703E72D100E2F384F1165BC391F746C4CC6E2C6BFA9F377C3EEC6
                      Malicious:false
                      Reputation:low
                      URL:https://app.invoicesimple.com/_next/static/css/abfd0f39f5a4011b.css
                      Preview:/*.! tailwindcss v3.3.3 | MIT License | https://tailwindcss.com.*/*,:after,:before{-webkit-box-sizing:border-box;box-sizing:border-box;border:0 solid #e5e7eb}:after,:before{--tw-content:""}html{line-height:1.5;-webkit-text-size-adjust:100%;-moz-tab-size:4;-o-tab-size:4;tab-size:4;font-family:ui-sans-serif,system-ui,-apple-system,Segoe UI,Roboto,Ubuntu,Cantarell,Noto Sans,sans-serif,BlinkMacSystemFont,Helvetica Neue,Arial,Apple Color Emoji,Segoe UI Emoji,Segoe UI Symbol,Noto Color Emoji;-webkit-font-feature-settings:normal;font-feature-settings:normal;font-variation-settings:normal}body{margin:0;line-height:inherit}hr{height:0;color:inherit;border-top-width:1px}abbr:where([title]){text-decoration:underline;-webkit-text-decoration:underline dotted currentColor;text-decoration:underline dotted currentColor}h1,h2,h3,h4,h5,h6{font-size:inherit;font-weight:inherit}a{color:inherit;text-decoration:inherit}b,strong{font-weight:bolder}code,kbd,pre,samp{font-family:ui-monospace,SFMono-Regular,Men
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (9180), with no line terminators
                      Category:downloaded
                      Size (bytes):9180
                      Entropy (8bit):5.511029256965085
                      Encrypted:false
                      SSDEEP:
                      MD5:318F1C0D2D379EF706FE1DD8295140AC
                      SHA1:3D6088D002F7E37B4C82D1620C8A432675FFE26A
                      SHA-256:1730D34E997B0D8532B2C5FC3CD08A44DEB7989B6005BD60159299604E8F06FD
                      SHA-512:828D96CF247CD521E35ECDA6F4DC5B4AA069141B1A521BB82AC31E634186AFB4E989AFF6986FA17E68EEB6A6CDAE08E17D9CF6A6A581CC9683C9D4DF4643A45D
                      Malicious:false
                      Reputation:low
                      URL:https://app.invoicesimple.com/_next/static/css/ee5dd79df2167581.css
                      Preview:@font-face{font-family:__Marck_Script_ec8c2c;font-style:normal;font-weight:400;font-display:swap;src:url(/_next/static/media/595df8d2a48e75c6-s.woff2) format("woff2");unicode-range:U+0301,U+0400-045f,U+0490-0491,U+04b0-04b1,U+2116}@font-face{font-family:__Marck_Script_ec8c2c;font-style:normal;font-weight:400;font-display:swap;src:url(/_next/static/media/1718b36b58c2b8cb-s.woff2) format("woff2");unicode-range:U+0100-02af,U+0304,U+0308,U+0329,U+1e00-1e9f,U+1ef2-1eff,U+2020,U+20a0-20ab,U+20ad-20cf,U+2113,U+2c60-2c7f,U+a720-a7ff}@font-face{font-family:__Marck_Script_ec8c2c;font-style:normal;font-weight:400;font-display:swap;src:url(/_next/static/media/1d15866986031c98-s.p.woff2) format("woff2");unicode-range:U+00??,U+0131,U+0152-0153,U+02bb-02bc,U+02c6,U+02da,U+02dc,U+0304,U+0308,U+0329,U+2000-206f,U+2074,U+20ac,U+2122,U+2191,U+2193,U+2212,U+2215,U+feff,U+fffd}@font-face{font-family:__Marck_Script_Fallback_ec8c2c;src:local("Arial");ascent-override:92.12%;descent-override:41.05%;line-gap-ov
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:Unicode text, UTF-8 text, with very long lines (65413), with no line terminators
                      Category:downloaded
                      Size (bytes):78558
                      Entropy (8bit):5.4797946303051175
                      Encrypted:false
                      SSDEEP:
                      MD5:C1BC2530C39035C594702078D837A59E
                      SHA1:9A42A0F0E187BBDD01F5712C3CCB597D4781DAEA
                      SHA-256:2F3F52EF15FFF3BDA84A616DEEAA52DC6FB3B38D69672997D1D08BE15445AD4F
                      SHA-512:510ABF69CA8F7B13FE78440CB0BF5BDD0C21E778CDD1FC1BB65DF3CA05BD0D76257D88BE17AF38FDE8AF11AB9A0896F419EFE048223A7A18CCF0BF77B1C68E7B
                      Malicious:false
                      Reputation:low
                      URL:https://app.invoicesimple.com/_next/static/chunks/3377-36c6e853e66d9aba.js
                      Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[3377],{67824:function(t,e,n){"use strict";n.r(e),n.d(e,{Big:function(){return c.a},ConsentStatus:function(){return $},ConsentType:function(){return K},ContentTypes:function(){return ti},DepositAmounts:function(){return tr},DepositRates:function(){return te},DepositTypes:function(){return tn},DiscountTypes:function(){return V},DocTypes:function(){return ta},InvoiceTermTypes:function(){return Q},ItemDiscountTypes:function(){return z},LEFT_TO_RIGHT_OVERRIDE_CHAR:function(){return U},NON_BREAK_SPACE:function(){return R},ONE_HUNDRED:function(){return T},PassingFeesType:function(){return X},PhotoTypes:function(){return tt},Platform:function(){return I},RIGHT_TO_LEFT_OVERRIDE_CHAR:function(){return L},SettingKeys:function(){return to},SubscriptionTier:function(){return W},TaxTypes:function(){return J},TemplateCodes:function(){return j},ZERO:function(){return w},bigAmount:function(){return y},bigQuantity:function(){return g},bigRate:func
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (430), with no line terminators
                      Category:downloaded
                      Size (bytes):430
                      Entropy (8bit):5.108748436215146
                      Encrypted:false
                      SSDEEP:
                      MD5:EAA0FB36F53C75A89B712A6670AEED95
                      SHA1:EBC2E73909D5C406B8F53BA91616C9C9796D0BE5
                      SHA-256:D41FA3E234CD37DADC5F0FB64915B966459F9BF5885ADF0F2AFF84AE461D9AA2
                      SHA-512:DFB3B21D236F23F1532B0B73AB3552C6561ECFC6C8A0EB19981CCDB566CE798EE52BE89736F719E70DF6E3A731AC4D293B077803B94CB010ED101F3C16E902C0
                      Malicious:false
                      Reputation:low
                      URL:https://app.invoicesimple.com/_next/static/chunks/main-app-725abfaac2b249ed.js
                      Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[1744],{28847:function(e,n,t){Promise.resolve().then(t.t.bind(t,94673,23)),Promise.resolve().then(t.t.bind(t,99404,23)),Promise.resolve().then(t.t.bind(t,63710,23)),Promise.resolve().then(t.t.bind(t,95453,23)),Promise.resolve().then(t.t.bind(t,14004,23))}},function(e){var n=function(n){return e(e.s=n)};e.O(0,[4648,6800],function(){return n(93166),n(28847)}),_N_E=e.O()}]);
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 72x72, segment length 16, baseline, precision 8, 300x400, components 3
                      Category:downloaded
                      Size (bytes):18945
                      Entropy (8bit):7.969491443571208
                      Encrypted:false
                      SSDEEP:
                      MD5:BC08209BF9D2033B20FD66B8B22A0259
                      SHA1:E526D86EA82C1D60DA399B32911AF915D5C654A6
                      SHA-256:F837263144080DB3A17A1D220CA623CB0E5F3297796739BE046A7F08C34A9F0C
                      SHA-512:482479BA9B127A7967210D5D4DCC8C802BD4F685539CFE40F77ECCDAB1FD4666525A75BB98CFD04A19900904F9DD49EB5AB1819DEB67AD36C45D910DDEE5BBAE
                      Malicious:false
                      Reputation:low
                      URL:"https://d28zjh2pk692s7.cloudfront.net/fetch/c_fit,w_400,h_400/https://invoicemaker2-prod.s3.amazonaws.com/account/NHxHi2ctbw/photo/866e9360-adba-11ee-8c61-f10901a24b3e.jpg"
                      Preview:......JFIF.....H.H.....C.....................................%...#... , #&')*)..-0-(0%()(...C...........(...((((((((((((((((((((((((((((((((((((((((((((((((((........,.."........................................F........................!.1A.."Qa2q.........#BR...$br.3C.%c.46sd..................................".......................!1A.Q."a.............?..H.{..-.[D..@...U....:.(`.".t.6......l.#..]QR......5'<...+n....e>O..+.N..J..(....8.-...H.o!K..An.s]..f..rV.Q..i.C.<.?.4t...W....!v.....4..4.z..:Q.!...<;....}..A..n....t....JP0j@.........|I.)u.p.G#I;.}2.8r.x.a..p..+...1.)j.....6w."o.s...B..4j..d.^.)..w1...i....A.Ey......0G*X...d.].2..JP9.4..^.L.f...H.).:...U!v.4.h".+jmM(...S7.X..Lw.9..u;.. .v'...MSo.e...).U..y..<........4..=......U.....r..&..g....I.=>N/.iI_A..CT..U/..U...]zYa.....\*.x....A..\..g$.1..b....+..J....J;.J7.OJ....#.'..8..8...j7.;......U..qL...,.sI.....s.Y...yo._..?:...@>-B...~.......E...3.]."....p...J.v.Fw./....[?.2.N.....q<.........;`.8"
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (10100), with no line terminators
                      Category:downloaded
                      Size (bytes):10100
                      Entropy (8bit):5.5134119305832145
                      Encrypted:false
                      SSDEEP:
                      MD5:D4509EF46D703B2B2B0E6B6BC6528001
                      SHA1:468C86509268359380073D15541CD9FD1E40C752
                      SHA-256:DC1A9EC0F8B4905BC465884A15FE68D0B6A4D27B1D44EBCE6E586A28E30F9F9A
                      SHA-512:2EFBD84782DCED588D811F8EB5984CEECFDA91A862344CFA875A5815822809870191857609CD4E95FDA3883FF9B8D599AFB833C024507AF61A8853EE781920E8
                      Malicious:false
                      Reputation:low
                      URL:https://app.invoicesimple.com/_next/static/chunks/app/(authenticated)/layout-4ca06cf6a692089a.js
                      Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[2760],{43475:function(e,t,r){Promise.resolve().then(r.bind(r,65601)),Promise.resolve().then(r.bind(r,47443)),Promise.resolve().then(r.bind(r,17934)),Promise.resolve().then(r.bind(r,81633)),Promise.resolve().then(r.bind(r,17582)),Promise.resolve().then(r.bind(r,40498)),Promise.resolve().then(r.bind(r,92931)),Promise.resolve().then(r.bind(r,33563)),Promise.resolve().then(r.bind(r,55413)),Promise.resolve().then(r.bind(r,77813)),Promise.resolve().then(r.bind(r,97598)),Promise.resolve().then(r.bind(r,90948)),Promise.resolve().then(r.bind(r,33753)),Promise.resolve().then(r.bind(r,15812)),Promise.resolve().then(r.bind(r,65285)),Promise.resolve().then(r.bind(r,6476))},33753:function(e,t,r){"use strict";r.r(t),r.d(t,{Navbar:function(){return k}});var n,s,i=r(17821),a=r(42153),l=r.n(a),o=r(49032),c=r(60282),d=r(61375),u=r(33198);let m=u.forwardRef((e,t)=>(0,i.jsx)("svg",{...e,ref:t,width:"32",height:"32",viewBox:"0 0 21 19",fill:"none",xml
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:MS Windows icon resource - 3 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
                      Category:downloaded
                      Size (bytes):15406
                      Entropy (8bit):2.4513361307603745
                      Encrypted:false
                      SSDEEP:
                      MD5:F3AC307F429C4D126023888739E20854
                      SHA1:47890F12AB63F5F77A55C499700BEB439105011A
                      SHA-256:61C1FDF59B77FA389A553B2B110989123EAF6D7002AEC009CCF9884B834D8235
                      SHA-512:F5E02C6C7D88F877678FD00449C432871C818CAB5302881C73EECBA0DF26B3661784288CD7520AF5904EEB99F67750D4B399514144B0D89D4F7DD511CD950917
                      Malicious:false
                      Reputation:low
                      URL:https://app.invoicesimple.com/favicon.ico
                      Preview:............ .h...6... .... .(.......00.... .h&......(....... ..... ........................."X.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."X.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W..$X..%Y.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.........."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W..^...........a..."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W..5e..................0b.."W.."W.."W.."W.."W.."W.."W.."W.."W..#X.........................."W.."W.."W.."W.."W.."W.."W.."W.."W..............U~..l...........d..."W.."W.."W.."W.."W.."W.."W..&Z..q...-_.."W.."W.."W..Lw..........1c.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W..:j.........."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W..-`......g..."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W..&Z......3d.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W..<k.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (10350)
                      Category:downloaded
                      Size (bytes):21591
                      Entropy (8bit):5.403411125345964
                      Encrypted:false
                      SSDEEP:
                      MD5:3A71BBB8A76ACCCA7177F4B0FFA49124
                      SHA1:D52DFFFFE19DAA24F695863A0EC9C7DA299C2A9C
                      SHA-256:E810B838C06BF90210584DF07EDA888035E69562E3383BB65C47B55DB76E55D1
                      SHA-512:679C6565356E2AB9EA173EE20CFAA8DF545BD5E736D6C738BC2BE14ED184F86B589AA46640844E572DF6DF17E3AB99E95EBEB32100F093C75F77C59EC03E7AA9
                      Malicious:false
                      Reputation:low
                      URL:https://app.invoicesimple.com/_next/static/chunks/app/error-436720edeb91b894.js
                      Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[7601],{69981:function(e,t,n){Promise.resolve().then(n.bind(n,97479))},60397:function(e,t,n){"use strict";n.d(t,{D:function(){return o},S:function(){return a}});var r=n(88335);let o=(0,r.Ue)((e,t)=>({account:null,subscriptionStatus:null,user:null,setUser:t=>e({user:t}),setAccount:t=>e({account:t}),setSubscriptionStatus:t=>e({subscriptionStatus:t})})),a=e=>{let{account:t,user:n,subscriptionStatus:r}=e;o.getState().setAccount(t),o.getState().setUser(n),o.getState().setSubscriptionStatus(r)}},97479:function(e,t,n){"use strict";n.r(t),n.d(t,{default:function(){return p}});var r=n(17821),o=n(33198),a=n(42204),i=n(60397),u=n(53291);let s=()=>{let{boot:e}=(0,a.o)(),{account:t,user:n}=(0,i.D)();(0,o.useEffect)(()=>{let r=null==n?void 0:n.objectId,o=null==t?void 0:t.objectId,a=o?"".concat("https://admin.staging.getinvoicesimple.com","/account/").concat(o):"unknown";e({actionColor:"rgba(255, 87, 33, 1)",verticalPadding:20,alignment:"right",
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (12301), with no line terminators
                      Category:downloaded
                      Size (bytes):12301
                      Entropy (8bit):5.4209034390717115
                      Encrypted:false
                      SSDEEP:
                      MD5:C627BADA3A1A5FA130597D1C30FF6CAD
                      SHA1:0422F28439B48E75A6C035FDEBEC6507A231D455
                      SHA-256:73BF24F8B71248B66002C99CF611D6E98CA65BF518B9354C10ADAD58ECB4E9F2
                      SHA-512:5E36C136D72741383A3FB557568490C8DF9DC452FF8845108D9E4A646474E3B276FF490A3D87AB9A1920BA8401D63473A332C8C2BE07AB398330C845E2B8C487
                      Malicious:false
                      Reputation:low
                      URL:https://app.invoicesimple.com/_next/static/chunks/6387-15032ff40ad389f8.js
                      Preview:"use strict";(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[6387],{65285:function(e,t,n){n.r(t),n.d(t,{AlertModal:function(){return u}});var l=n(17821),i=n(33198),s=n(66925),r=n(26350),o=n(57703),a=n(65616),d=n(82156),c=n(92414);let u=()=>{let{alert:e,hideAlert:t}=(0,r.V)(),n=(0,i.useRef)(null),{f:u}=(0,c.Y)();return(0,l.jsx)(o.u,{ref:n,open:!!e&&e.type===s.N.Modal,onClose:()=>{let n=e.onCancel;n&&n(),t()},children:(0,l.jsxs)("section",{className:"sm:p-6 px-4 pb-4 pt-5",children:[(0,l.jsxs)("div",{className:"sm:flex sm:items-start",children:[(0,l.jsx)("div",{className:"mx-auto flex h-12 w-12 flex-shrink-0 items-center justify-center rounded-full bg-red-100 sm:mx-0 sm:h-10 sm:w-10",children:(0,l.jsx)(a.FC,{className:"h-6 w-6 text-red-600","aria-hidden":"true"})}),(0,l.jsxs)("div",{className:"mt-3 text-center sm:ml-4 sm:mt-0 sm:text-left",children:[(0,l.jsx)(d.V.Title,{as:"h3",className:"text-base font-semibold leading-6 text-gray-900",children:null==e?void 0:e.title}),(0,l.jsx
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (17539), with no line terminators
                      Category:downloaded
                      Size (bytes):17539
                      Entropy (8bit):5.363842985022791
                      Encrypted:false
                      SSDEEP:
                      MD5:600AD2201F59D0611965B570A8C2D01F
                      SHA1:4CF253E08713E8C55F55ADE6ED0C9D65D1C8BCBD
                      SHA-256:4F4E3265E397B6D9C22662B7060E8AB552A685FCB752083600058F400077125D
                      SHA-512:9FA09DE203C0811F98B7ACD34C15F3B815D5AC106E239FBBA7578F277693463285FA40046A010E25D47D2A5A2D8F6A300539E3DFEA6387C6D3CC319D67E22680
                      Malicious:false
                      Reputation:low
                      URL:https://app.invoicesimple.com/_next/static/chunks/2449-1f7199864d38d746.js
                      Preview:"use strict";(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[2449],{51188:function(e,t,n){Object.defineProperty(t,"__esModule",{value:!0}),Object.defineProperty(t,"addLocale",{enumerable:!0,get:function(){return r}}),n(68753);let r=function(e){for(var t=arguments.length,n=Array(t>1?t-1:0),r=1;r<t;r++)n[r-1]=arguments[r];return e};("function"==typeof t.default||"object"==typeof t.default&&null!==t.default)&&void 0===t.default.__esModule&&(Object.defineProperty(t.default,"__esModule",{value:!0}),Object.assign(t.default,t),e.exports=t.default)},92066:function(e,t,n){function r(e,t,n,r){return!1}Object.defineProperty(t,"__esModule",{value:!0}),Object.defineProperty(t,"getDomainLocale",{enumerable:!0,get:function(){return r}}),n(68753),("function"==typeof t.default||"object"==typeof t.default&&null!==t.default)&&void 0===t.default.__esModule&&(Object.defineProperty(t.default,"__esModule",{value:!0}),Object.assign(t.default,t),e.exports=t.default)},13523:function(e,t,n){Object.defin
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:Web Open Font Format (Version 2), TrueType, length 13388, version 1.0
                      Category:downloaded
                      Size (bytes):13388
                      Entropy (8bit):7.983307567011099
                      Encrypted:false
                      SSDEEP:
                      MD5:D47016044A01EBBBEE97AAE820A7CCB4
                      SHA1:B1D4B90D800FC5FCAE1D8F7071016D4104497422
                      SHA-256:D71F9B389DE1203D4ADCD9F4F33120707D3048A9E8939AEEE51FC31D7059747D
                      SHA-512:830017136FC7D35BD39E399224DDB1870EC8293256145D65E8F090C6EFC826F2A3C04097DFA1A6A968089B92802D852447D9BA27C8252D97D79879FC7BFCCF42
                      Malicious:false
                      Reputation:low
                      URL:https://app.invoicesimple.com/_next/static/media/1d15866986031c98-s.p.woff2
                      Preview:wOF2......4L......|,..3.............................2...`..l.....D..y.....6.$..,. ..:..E..eE!.q@`.5...6.....GQ.8..o.Z.......U....2h[..d...z;.q...Ea..W.26.".E.......`..x..,X8..;...!.L.y22...).Ghr.......}./.$ME,..^'.+U4.?.9U.$;,...).N%.a0..~i.d..[k...."..t.....70.P7z.B.E.L.x.Gzp.'x..`..f!.".(...M... "&.8+.b.6s.(Wn.H..[..s.....#......p............`..UW...UYnD.n.}.^.l........""".=....e...=.o.Z6....6{.T....(.....<$..I..........j?c. ..I.!....2.qf....e....{.....4A....v..[u..U.U...g..3......B......j...&.O....\~.......6....m..O.@..!G"$M._n.".Q[H.P..............,\..).0.......7'....Z..).....c.$B.d...^..Z..^...Z...*.s..j..../W.e.....!4.D..G.cet..!.....P-.l?.....b..,..cld.Qm..zdlw...........$.Rx........$q.=^...|).4..}...K.~....?._d.B .....\.C.. ...At......c..Z.......g-..S"b..?......{....|...?.)h.j..aD.._......c../f.SL...:..'.`L]'....#?......@..2Q.*...R.e...F. .S.?.d...).....@..qk.....1._3A.u4.X..M.....Z.......9.%...{..._....y&..n.l.m.....4.....G..Fm..-
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (36038)
                      Category:downloaded
                      Size (bytes):37613
                      Entropy (8bit):5.277472759301077
                      Encrypted:false
                      SSDEEP:
                      MD5:2DC39CA2DC611835E3797F9E06C43680
                      SHA1:CDE2E523E649CACBA3061E61F927D229E7A8AC36
                      SHA-256:0E3392775685A3CB55E5D460B20D104F6092D32E5798A1B10A3ABA5A9E835A35
                      SHA-512:B27C14C59F86044F29F533F00582854F2C3D38D3A22C529D4D652CCA8114DA705711CFB394B12EAE8AEB3AA238656AC5A878D46BA36A0D7C0DBF62A896C2434D
                      Malicious:false
                      Reputation:low
                      URL:https://app.invoicesimple.com/_next/static/chunks/8688-1a30ccb8d279bece.js
                      Preview:"use strict";(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[8688],{82156:function(e,t,n){let r,o;n.d(t,{V:function(){return eD}});var l,i,u,a,s,c,d,f,p,m,v,h,g,E,b=n(33198),w=n.t(b,2),y=n(99676),T=n(32420),S=n(15079),L=((l=L||{}).Space=" ",l.Enter="Enter",l.Escape="Escape",l.Backspace="Backspace",l.Delete="Delete",l.ArrowLeft="ArrowLeft",l.ArrowUp="ArrowUp",l.ArrowRight="ArrowRight",l.ArrowDown="ArrowDown",l.Home="Home",l.End="End",l.PageUp="PageUp",l.PageDown="PageDown",l.Tab="Tab",l),P=n(3372),C=n(63495),F=n(90793);let O=null!=(E=b.useId)?E:function(){let e=(0,C.H)(),[t,n]=b.useState(e?()=>F.O.nextId():null);return(0,P.e)(()=>{null===t&&n(F.O.nextId())},[t]),null!=t?""+t:void 0};var M=((i=M||{})[i.None=1]="None",i[i.Focusable=2]="Focusable",i[i.Hidden=4]="Hidden",i);let A=(0,T.yV)(function(e,t){let{features:n=1,...r}=e,o={ref:t,"aria-hidden":(2&n)==2||void 0,style:{position:"fixed",top:1,left:1,width:1,height:0,padding:0,margin:-1,overflow:"hidden",clip:"rect(0, 0, 0, 0)",w
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (42390), with no line terminators
                      Category:downloaded
                      Size (bytes):42390
                      Entropy (8bit):5.352103178112662
                      Encrypted:false
                      SSDEEP:
                      MD5:A171E038FE2E53B85208B275933E38A8
                      SHA1:2C996F7E3F247CC8F1772C2D3AA8B6AC314C4EF5
                      SHA-256:D95B91CFE2CE14D628DD5F077648CA33C032E25343AA7D22283A3917E568275E
                      SHA-512:6667A952246CD4D87E3FD3BEF521A6A8CFF567CB35C46DA593F7BB5DA732C0E7A3367DA0E03A2873F7B1EF7D8016E49257B6EB8194E7E57E225AAEDA446C719B
                      Malicious:false
                      Reputation:low
                      URL:https://app.invoicesimple.com/_next/static/chunks/3226-2fd78a80a59f168b.js
                      Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[3226],{43247:function(e,t,n){"use strict";n.d(t,{Z:function(){return B}});var o=function(){function e(e){var t=this;this._insertTag=function(e){var n;n=0===t.tags.length?t.insertionPoint?t.insertionPoint.nextSibling:t.prepend?t.container.firstChild:t.before:t.tags[t.tags.length-1].nextSibling,t.container.insertBefore(e,n),t.tags.push(e)},this.isSpeedy=void 0===e.speedy||e.speedy,this.tags=[],this.ctr=0,this.nonce=e.nonce,this.key=e.key,this.container=e.container,this.prepend=e.prepend,this.insertionPoint=e.insertionPoint,this.before=null}var t=e.prototype;return t.hydrate=function(e){e.forEach(this._insertTag)},t.insert=function(e){if(this.ctr%(this.isSpeedy?65e3:1)==0){var t;this._insertTag(((t=document.createElement("style")).setAttribute("data-emotion",this.key),void 0!==this.nonce&&t.setAttribute("nonce",this.nonce),t.appendChild(document.createTextNode("")),t.setAttribute("data-s",""),t))}var n=this.tags[this.tags.length-1];
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (10654), with no line terminators
                      Category:downloaded
                      Size (bytes):10654
                      Entropy (8bit):5.0573516434541
                      Encrypted:false
                      SSDEEP:
                      MD5:2A975AF0307E7AAEAEA19ADF7F830F21
                      SHA1:7A0046D480BAF2075907ACDF0CF19C89AB3107E5
                      SHA-256:FBBF2EE7A2B49E30337FC7145935332715941D44EF6006D2DDA3EDC630140F8E
                      SHA-512:924AC45B0E025B4CE99B8B4A009762ABE6E7627C5B2EE62E285D5D930609160A827ABE3803F699A9500A83E686AA9875D0EA6DC6B5225D9D8291E636F078F26C
                      Malicious:false
                      Reputation:low
                      URL:https://app.invoicesimple.com/_next/static/chunks/2360-33b9d8391113479e.js
                      Preview:"use strict";(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[2360],{46699:function(t,e,r){r.d(e,{z:function(){return l}});var s=r(48162),i=r(16337),n=r(99574),u=r(18560),o=r(14978);class l extends u.l{constructor(t,e){super(),this.client=t,this.options=e,this.trackedProps=new Set,this.selectError=null,this.bindMethods(),this.setOptions(e)}bindMethods(){this.remove=this.remove.bind(this),this.refetch=this.refetch.bind(this)}onSubscribe(){1===this.listeners.size&&(this.currentQuery.addObserver(this),c(this.currentQuery,this.options)&&this.executeFetch(),this.updateTimers())}onUnsubscribe(){this.hasListeners()||this.destroy()}shouldFetchOnReconnect(){return a(this.currentQuery,this.options,this.options.refetchOnReconnect)}shouldFetchOnWindowFocus(){return a(this.currentQuery,this.options,this.options.refetchOnWindowFocus)}destroy(){this.listeners=new Set,this.clearStaleTimeout(),this.clearRefetchInterval(),this.currentQuery.removeObserver(this)}setOptions(t,e){let r=this.options,
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (65536), with no line terminators
                      Category:downloaded
                      Size (bytes):230416
                      Entropy (8bit):5.800868592829604
                      Encrypted:false
                      SSDEEP:
                      MD5:7EC8C7BBA01EFB0FDB40B22DF1D04D84
                      SHA1:AF120BF024BC4B44434BD4DA63D7A9F64151149C
                      SHA-256:09E094F7DCB353A989E7BBC42750A8675B22415F8BCF596880AF2B279CAA3BEC
                      SHA-512:4C35824DA915BF9E35DC3CC621C9A2586079442FA4A38D1A483DF2BACC3014B7AD83AE506B976D905738810BE3CD5AF3BF8BC12AAC52B45CE3C34BFD8DBA9D68
                      Malicious:false
                      Reputation:low
                      URL:https://app.invoicesimple.com/_next/static/chunks/f0728476-82a58bbad1df200f.js
                      Preview:"use strict";(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[9769],{92449:function(e,t,n){n.d(t,{bW:function(){return f},mw:function(){return aE}});var r=n(33198),l=n(67824),a=n(61289),i=n(51255),m=n(49659),c=n.n(m),o=n(96113),u=n(447),h=n(62111),v=n(28088),s=n(4105),d=n(25832);function p(){return(p=Object.assign?Object.assign.bind():function(e){for(var t=1;t<arguments.length;t++){var n=arguments[t];for(var r in n)Object.prototype.hasOwnProperty.call(n,r)&&(e[r]=n[r])}return e}).apply(this,arguments)}function g(e,t){if(null==e)return{};var n,r,l={},a=Object.keys(e);for(r=0;r<a.length;r++)t.indexOf(n=a[r])>=0||(l[n]=e[n]);return l}var f,E={black:"#000000",white:"#ffffff",lightergray:"#efefef",lightgray:"#bfbfbf",darkgray:"#999999",444:"#444444",333:"#333333"},b={media:{small:"@media screen and (max-width: 599px)",medium:"@media screen and (min-width: 600px) and (max-width: 899px)",large:"@media screen and (min-width: 900px)"},public:{documentShadow:"0 3px 10px rgba(0, 0, 0, 0.1
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (65536), with no line terminators
                      Category:downloaded
                      Size (bytes):98244
                      Entropy (8bit):5.307503179341072
                      Encrypted:false
                      SSDEEP:
                      MD5:932B489FE99C98EAB8589C689D5B01B6
                      SHA1:69045915E1F86C31F15C8B41451B163AF2D45DF7
                      SHA-256:046EE0CB1FDB5597B26EB974C0830F03FB3820B55F41EC7A71E00F237B07C90B
                      SHA-512:EB08121C656392AC6F8E96D219313120B428431848FAAC23D907DAD34570374A75838E05C896C7A9959A1187F183281B76EF17182F04B2D75114E6A39E75944F
                      Malicious:false
                      Reputation:low
                      URL:https://app.invoicesimple.com/_next/static/chunks/6800-85794ae0a22648d6.js
                      Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[6800],{48840:function(){"trimStart"in String.prototype||(String.prototype.trimStart=String.prototype.trimLeft),"trimEnd"in String.prototype||(String.prototype.trimEnd=String.prototype.trimRight),"description"in Symbol.prototype||Object.defineProperty(Symbol.prototype,"description",{configurable:!0,get:function(){var e=/\((.*)\)/.exec(this.toString());return e?e[1]:void 0}}),Array.prototype.flat||(Array.prototype.flat=function(e,t){return t=this.concat.apply([],this),e>1&&t.some(Array.isArray)?t.flat(e-1):t},Array.prototype.flatMap=function(e,t){return this.map(e,t).flat()}),Promise.prototype.finally||(Promise.prototype.finally=function(e){if("function"!=typeof e)return this.then(e,e);var t=this.constructor||Promise;return this.then(function(r){return t.resolve(e()).then(function(){return r})},function(r){return t.resolve(e()).then(function(){throw r})})}),Object.fromEntries||(Object.fromEntries=function(e){return Array.from(e).re
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (10795), with no line terminators
                      Category:downloaded
                      Size (bytes):10795
                      Entropy (8bit):5.595927906673482
                      Encrypted:false
                      SSDEEP:
                      MD5:2B0541EC7D6C05E8F4375316433FD107
                      SHA1:FC2C0065181B958EA7C697E19E8ECAAEF980E8B2
                      SHA-256:64EC10A3835236555C40235957EB2DF83201CD7F989E5F2DEA68F8651F74ACB9
                      SHA-512:04B5E26373D6C0094A7D62747107D603B06CDC906820E2E116BFBEF321CA1CAC745537D4AEE2939CE754F0560200AAAFFBC95069080CBFC13EEC8DA602632651
                      Malicious:false
                      Reputation:low
                      URL:https://app.invoicesimple.com/_next/static/chunks/2619-d1bf4900c3c1ef11.js
                      Preview:"use strict";(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[2619],{60397:function(e,t,n){n.d(t,{D:function(){return a},S:function(){return i}});var r=n(88335);let a=(0,r.Ue)((e,t)=>({account:null,subscriptionStatus:null,user:null,setUser:t=>e({user:t}),setAccount:t=>e({account:t}),setSubscriptionStatus:t=>e({subscriptionStatus:t})})),i=e=>{let{account:t,user:n,subscriptionStatus:r}=e;a.getState().setAccount(t),a.getState().setUser(n),a.getState().setSubscriptionStatus(r)}},6476:function(e,t,n){n.r(t),n.d(t,{AlertBanner:function(){return l}});var r=n(17821);n(33198);var a=n(29806),i=n(66925),o=n(26350);let l=()=>{let{alert:e,hideAlert:t}=(0,o.V)();return e&&e.type===i.N.Banner?(0,r.jsx)(a.j,{...e,onClose:t}):null}},29806:function(e,t,n){n.d(t,{j:function(){return o}});var r=n(17821);n(33198);let a={error:"bg-red-100",success:"bg-green-100",warning:"bg-yellow-100"},i={error:"text-red-800",success:"text-green-800",warning:"text-yellow-800"},o=e=>{let{title:t,bannerType:n,body:o,
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (47866)
                      Category:downloaded
                      Size (bytes):62103
                      Entropy (8bit):5.56462465037535
                      Encrypted:false
                      SSDEEP:
                      MD5:FAE97BC44766895D4DAFEC2C90F2C5AE
                      SHA1:EE4B1005C541AFAC545EFF2FDD2DA3B02A6BF934
                      SHA-256:F90BAA0398E32292689F9333E344B6853F439482753D244730C611313CA212C7
                      SHA-512:ACC19474BE7189B92DF83B64E9A7DB703114DF5881FE4C6C08F17F38F82A9B9F7352654B22B39EDC77D1CE02C972C41358C9B40322B4D3D69D054744543DA9A1
                      Malicious:false
                      Reputation:low
                      URL:https://app.invoicesimple.com/_next/static/chunks/3270-2d366ff12f2d57a0.js
                      Preview:"use strict";(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[3270],{50973:function(t,e,r){r.d(e,{kG:function(){return n}});function n(t,e,r){if(void 0===r&&(r=Error),!t)throw new r(e)}},28084:function(t,e,r){function n(t,e){var r=e&&e.cache?e.cache:c,n=e&&e.serializer?e.serializer:u;return(e&&e.strategy?e.strategy:s)(t,{cache:r,serializer:n})}function i(t,e,r,n){var i=null==n||"number"==typeof n||"boolean"==typeof n?n:r(n),o=e.get(i);return void 0===o&&(o=t.call(this,n),e.set(i,o)),o}function o(t,e,r){var n=Array.prototype.slice.call(arguments,3),i=r(n),o=e.get(i);return void 0===o&&(o=t.apply(this,n),e.set(i,o)),o}function s(t,e){var r,n,s=1===t.length?i:o;return r=e.cache.create(),n=e.serializer,s.bind(this,t,r,n)}r.d(e,{A:function(){return h},H:function(){return n}});var u=function(){return JSON.stringify(arguments)};function a(){this.cache=Object.create(null)}a.prototype.get=function(t){return this.cache[t]},a.prototype.set=function(t,e){this.cache[t]=e};var c={create:func
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (22651), with no line terminators
                      Category:downloaded
                      Size (bytes):22651
                      Entropy (8bit):5.334479358847236
                      Encrypted:false
                      SSDEEP:
                      MD5:7B5E8E2BEA64A122286F549CDBFC8F56
                      SHA1:41648FEE184C8AABE5885F137B275DC80F8E8DCB
                      SHA-256:52D726EE5713332146BCCD04BD1B9535A4E5EAF8AD4E317F9FE847620C6466B2
                      SHA-512:0E771651E3AE9566707F91BC12F2F50D4E0C24A63FAD7F0B22DC76E3B651A31CB27BABCD04E17CCA4CADE35F36AB8FB6E97B7975F484925C767C3635D9BAFD01
                      Malicious:false
                      Reputation:low
                      URL:https://app.invoicesimple.com/_next/static/chunks/2478-f17987ab7a6300f3.js
                      Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[2478],{38303:function(e,t,r){"use strict";Object.defineProperty(t,"__esModule",{value:!0}),t.AuthorizationError=void 0;let s=r(83269),o=r(88565),n=r(66955);class i extends s.IsError{constructor(e,t,r){let{message:s,originalError:a,errorArgs:u}=(0,n.readErrorArgs)(e,t,r);super(o.StatusErrorCode.UNAUTHORIZED,i.name,s,(null==u?void 0:u.reasonCode)||o.ErrorGenericReasonCode.UNAUTHORIZED,(null==u?void 0:u.userMessage)||o.ErrorMessage.UNAUTHORIZED,a,u)}}t.AuthorizationError=i},55906:function(e,t,r){"use strict";Object.defineProperty(t,"__esModule",{value:!0}),t.DataAccessError=void 0;let s=r(83269),o=r(88565),n=r(66955);class i extends s.IsError{constructor(e,t,r){let{message:s,originalError:a,errorArgs:u}=(0,n.readErrorArgs)(e,t,r);super(o.StatusErrorCode.DATA_ACCESS,i.name,s,(null==u?void 0:u.reasonCode)||o.ErrorGenericReasonCode.SERVER_ERROR,(null==u?void 0:u.userMessage)||o.ErrorMessage.SOMETHING_WENT_WRONG,a,u)}}t.DataAccessError=
                      No static file info