Edit tour

Windows Analysis Report
https://doc.getinvoicesimple.com/v/g2k6rp4/INV0120?utm_swu=1279

Overview

General Information

Sample URL:https://doc.getinvoicesimple.com/v/g2k6rp4/INV0120?utm_swu=1279
Analysis ID:1375967

Detection

Score:1
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Creates files inside the system directory
Stores files to the Windows start menu directory

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64_ra
  • chrome.exe (PID: 2804 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://doc.getinvoicesimple.com/v/g2k6rp4/INV0120?utm_swu=1279 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 5520 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=2080,i,13880196731728676975,16636993390666078607,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: https://app.invoicesimple.com/v/39JVarA80CHTTP Parser: No favicon
Source: https://app.invoicesimple.com/v/39JVarA80CHTTP Parser: No favicon
Source: https://unifiedxp.invoicesimple.com/checkout/39JVarA80CHTTP Parser: No favicon
Source: https://unifiedxp.invoicesimple.com/checkout/39JVarA80CHTTP Parser: No favicon
Source: https://app.invoicesimple.com/v/39JVarA80C?viewType=mobileHTTP Parser: No favicon
Source: https://m.stripe.network/inner.html#url=https%3A%2F%2Funifiedxp.invoicesimple.com%2Fcheckout%2F39JVarA80C&title=Invoice%20Simple%20-%20Checkout&referrer=&muid=NA&sid=NA&version=6&preview=falseHTTP Parser: No favicon
Source: https://js.stripe.com/v3/m-outer-3437aaddcdf6922d623e172c2d6f9278.html#url=https%3A%2F%2Funifiedxp.invoicesimple.com%2Fcheckout%2F39JVarA80C&title=Invoice%20Simple%20-%20Checkout&referrer=&muid=NA&sid=NA&version=6&preview=falseHTTP Parser: No favicon
Source: https://unifiedxp.invoicesimple.com/checkout/39JVarA80CHTTP Parser: No favicon
Source: file:///C:/Users/user/Downloads/INV0120.pdfHTTP Parser: No favicon
Source: file:///C:/Users/user/Downloads/INV0120.pdfHTTP Parser: No favicon
Source: unknownHTTPS traffic detected: 23.1.237.25:443 -> 192.168.2.16:49703 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.16:49763 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.16:49821 version: TLS 1.2
Source: chrome.exeMemory has grown: Private usage: 19MB later: 30MB
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownDNS traffic detected: queries for: doc.getinvoicesimple.com
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
Source: unknownNetwork traffic detected: HTTP traffic on port 49817 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 49789 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49800 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49795 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49812 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49806 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49823 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
Source: unknownNetwork traffic detected: HTTP traffic on port 49790 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49805 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49796 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49811 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49825
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49823
Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49787
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49786
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
Source: unknownNetwork traffic detected: HTTP traffic on port 49813 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49807 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49791 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49802 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49797 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49801 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
Source: unknownNetwork traffic detected: HTTP traffic on port 49818 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49786 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49803 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49798 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49799
Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49798
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49797
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49796
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49795
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49793
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49792
Source: unknownNetwork traffic detected: HTTP traffic on port 49814 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49791
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49790
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49825 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49808 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49789
Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49821
Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49818
Source: unknownNetwork traffic detected: HTTP traffic on port 49799 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49810 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49817
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49816
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49815
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49814
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49813
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49812
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49811
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49810
Source: unknownNetwork traffic detected: HTTP traffic on port 49816 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49809
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49808
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49807
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49806
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49805
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49804
Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49803
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49802
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49801
Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49800
Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49821 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49815 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49809 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49804 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
Source: unknownHTTPS traffic detected: 23.1.237.25:443 -> 192.168.2.16:49703 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.16:49763 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.16:49821 version: TLS 1.2
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_BITS_2804_1741338014
Source: classification engineClassification label: clean1.win@24/183@48/225
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://doc.getinvoicesimple.com/v/g2k6rp4/INV0120?utm_swu=1279
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=2080,i,13880196731728676975,16636993390666078607,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=2080,i,13880196731728676975,16636993390666078607,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpactResource DevelopmentReconnaissance
Valid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
11
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local SystemExfiltration Over Other Network Medium2
Encrypted Channel
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationAbuse Accessibility FeaturesAcquire InfrastructureGather Victim Identity Information
Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
Non-Application Layer Protocol
SIM Card SwapObtain Device Cloud BackupsNetwork Denial of ServiceDomainsCredentials
Domain AccountsAtLogon Script (Windows)1
Extra Window Memory Injection
1
Extra Window Memory Injection
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
Application Layer Protocol
Data Encrypted for ImpactDNS ServerEmail Addresses

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://doc.getinvoicesimple.com/v/g2k6rp4/INV0120?utm_swu=12790%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
doc.getinvoicesimple.com0%VirustotalBrowse
app.invoicesimple.com0%VirustotalBrowse
api.getinvoicesimple.com0%VirustotalBrowse
unifiedxp.invoicesimple.com0%VirustotalBrowse
stripecdn.map.fastly.net0%VirustotalBrowse
services.getinvoicesimple.com0%VirustotalBrowse
pdf2.invoicesimple.com0%VirustotalBrowse
SourceDetectionScannerLabelLink
about:blank0%Avira URL Cloudsafe
file:///C:/Users/user/Downloads/INV0120.pdf0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
d1tcqh4bio8cty.cloudfront.net
13.35.93.3
truefalse
    high
    accounts.google.com
    172.253.122.84
    truefalse
      high
      d28zjh2pk692s7.cloudfront.net
      108.139.46.190
      truefalse
        high
        stripecdn.map.fastly.net
        151.101.128.176
        truefalseunknown
        d1ftdm4q83us3q.cloudfront.net
        18.173.132.101
        truefalse
          high
          script.hotjar.com
          18.164.96.90
          truefalse
            high
            m.stripe.com
            44.236.139.182
            truefalse
              high
              stripe.com
              54.187.159.182
              truefalse
                high
                www.google.com
                142.251.40.228
                truefalse
                  high
                  d3777nhi2110rc.cloudfront.net
                  18.238.55.129
                  truefalse
                    high
                    clients.l.google.com
                    142.250.65.238
                    truefalse
                      high
                      k8s-ingressn-nginxing-39b87de652-021f799ec6c6b0c4.elb.us-east-1.amazonaws.com
                      44.206.147.179
                      truefalse
                        high
                        static-cdn.hotjar.com
                        18.238.80.60
                        truefalse
                          high
                          cdn.rollbar.com
                          unknown
                          unknownfalse
                            high
                            clients1.google.com
                            unknown
                            unknownfalse
                              high
                              pdf2.invoicesimple.com
                              unknown
                              unknownfalseunknown
                              services.getinvoicesimple.com
                              unknown
                              unknownfalseunknown
                              m.stripe.network
                              unknown
                              unknownfalse
                                high
                                api.getinvoicesimple.com
                                unknown
                                unknownfalseunknown
                                unifiedxp.invoicesimple.com
                                unknown
                                unknownfalseunknown
                                clients2.google.com
                                unknown
                                unknownfalse
                                  high
                                  app.invoicesimple.com
                                  unknown
                                  unknownfalseunknown
                                  static.hotjar.com
                                  unknown
                                  unknownfalse
                                    high
                                    js.stripe.com
                                    unknown
                                    unknownfalse
                                      high
                                      doc.getinvoicesimple.com
                                      unknown
                                      unknownfalseunknown
                                      NameMaliciousAntivirus DetectionReputation
                                      https://app.invoicesimple.com/v/39JVarA80Cfalse
                                        unknown
                                        file:///C:/Users/user/Downloads/INV0120.pdffalse
                                        • Avira URL Cloud: safe
                                        low
                                        about:blankfalse
                                        • Avira URL Cloud: safe
                                        low
                                        https://app.invoicesimple.com/v/39JVarA80C?viewType=mobilefalse
                                          unknown
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          151.101.0.176
                                          unknownUnited States
                                          54113FASTLYUSfalse
                                          13.35.93.3
                                          d1tcqh4bio8cty.cloudfront.netUnited States
                                          16509AMAZON-02USfalse
                                          142.251.40.228
                                          www.google.comUnited States
                                          15169GOOGLEUSfalse
                                          172.253.122.84
                                          accounts.google.comUnited States
                                          15169GOOGLEUSfalse
                                          18.164.96.90
                                          script.hotjar.comUnited States
                                          3MIT-GATEWAYSUSfalse
                                          142.251.40.232
                                          unknownUnited States
                                          15169GOOGLEUSfalse
                                          142.251.41.14
                                          unknownUnited States
                                          15169GOOGLEUSfalse
                                          142.250.65.238
                                          clients.l.google.comUnited States
                                          15169GOOGLEUSfalse
                                          44.236.139.182
                                          m.stripe.comUnited States
                                          16509AMAZON-02USfalse
                                          142.250.80.3
                                          unknownUnited States
                                          15169GOOGLEUSfalse
                                          18.238.55.129
                                          d3777nhi2110rc.cloudfront.netUnited States
                                          16509AMAZON-02USfalse
                                          18.238.55.31
                                          unknownUnited States
                                          16509AMAZON-02USfalse
                                          108.139.46.190
                                          d28zjh2pk692s7.cloudfront.netUnited States
                                          16509AMAZON-02USfalse
                                          44.207.183.110
                                          unknownUnited States
                                          14618AMAZON-AESUSfalse
                                          44.206.147.179
                                          k8s-ingressn-nginxing-39b87de652-021f799ec6c6b0c4.elb.us-east-1.amazonaws.comUnited States
                                          14618AMAZON-AESUSfalse
                                          108.139.46.226
                                          unknownUnited States
                                          16509AMAZON-02USfalse
                                          1.1.1.1
                                          unknownAustralia
                                          13335CLOUDFLARENETUSfalse
                                          18.238.80.60
                                          static-cdn.hotjar.comUnited States
                                          16509AMAZON-02USfalse
                                          54.187.159.182
                                          stripe.comUnited States
                                          16509AMAZON-02USfalse
                                          151.101.128.176
                                          stripecdn.map.fastly.netUnited States
                                          54113FASTLYUSfalse
                                          18.173.132.101
                                          d1ftdm4q83us3q.cloudfront.netUnited States
                                          3MIT-GATEWAYSUSfalse
                                          239.255.255.250
                                          unknownReserved
                                          unknownunknownfalse
                                          142.251.40.99
                                          unknownUnited States
                                          15169GOOGLEUSfalse
                                          34.210.100.189
                                          unknownUnited States
                                          16509AMAZON-02USfalse
                                          IP
                                          192.168.2.16
                                          Joe Sandbox version:38.0.0 Ammolite
                                          Analysis ID:1375967
                                          Start date and time:2024-01-17 11:24:08 +01:00
                                          Joe Sandbox product:CloudBasic
                                          Overall analysis duration:
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Cookbook file name:defaultwindowsinteractivecookbook.jbs
                                          Sample URL:https://doc.getinvoicesimple.com/v/g2k6rp4/INV0120?utm_swu=1279
                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                          Number of analysed new started processes analysed:7
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • EGA enabled
                                          Analysis Mode:stream
                                          Analysis stop reason:Timeout
                                          Detection:CLEAN
                                          Classification:clean1.win@24/183@48/225
                                          • Exclude process from analysis (whitelisted): SIHClient.exe
                                          • Excluded IPs from analysis (whitelisted): 142.251.40.99, 34.104.35.123
                                          • Excluded domains from analysis (whitelisted): edgedl.me.gvt1.com, clientservices.googleapis.com
                                          • Not all processes where analyzed, report is missing behavior information
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:SVG Scalable Vector Graphics image
                                          Category:downloaded
                                          Size (bytes):740
                                          Entropy (8bit):4.562715815693575
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:25D81328008199B63B66924D5A6F8A7F
                                          SHA1:13B9FA6402ADB09C426F70ABB2233ABEEBB0DDDC
                                          SHA-256:5B3C473895E2895AA0FF66585466DF783EC509C4ED4E32472FD0E200CD7A1C83
                                          SHA-512:B602AF0631081E8B77D77156A9E07C1A952A597DC94CEA2183ED3C2384A7D4C34534AEA7D91EF832A41AE7E9574E5A1F2E12FF30880696879557F66E8F63F17C
                                          Malicious:false
                                          Reputation:low
                                          URL:https://unifiedxp.invoicesimple.com/download.svg
                                          Preview:<svg width="14" height="16" viewBox="0 0 14 16" fill="none" xmlns="http://www.w3.org/2000/svg">.<path fill-rule="evenodd" clip-rule="evenodd" d="M0 15C-2.41411e-08 14.4477 0.447715 14 1 14H13C13.5523 14 14 14.4477 14 15C14 15.5523 13.5523 16 13 16H1C0.447715 16 2.41411e-08 15.5523 0 15ZM3.29289 7.29289C3.68342 6.90237 4.31658 6.90237 4.70711 7.29289L6 8.58579L6 1C6 0.447716 6.44771 2.41411e-08 7 0C7.55228 -2.41411e-08 8 0.447715 8 1L8 8.58579L9.29289 7.29289C9.68342 6.90237 10.3166 6.90237 10.7071 7.29289C11.0976 7.68342 11.0976 8.31658 10.7071 8.70711L7.70711 11.7071C7.51957 11.8946 7.26522 12 7 12C6.73478 12 6.48043 11.8946 6.29289 11.7071L3.29289 8.70711C2.90237 8.31658 2.90237 7.68342 3.29289 7.29289Z" fill="#6B7280"/>.</svg>.
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:Unicode text, UTF-8 text, with very long lines (21130), with no line terminators
                                          Category:downloaded
                                          Size (bytes):21249
                                          Entropy (8bit):5.589903540479962
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:19A4C635A1F37D43EDCA486A301F4314
                                          SHA1:2D80A60BA79724163C522C021E017BD9203BA520
                                          SHA-256:6E05A96E213A0BC8FD6D645D7A889F9B2DBB5E551F54EE2863DE38C93A1CA43F
                                          SHA-512:B305F3351643A6C6722BEECCBD37F65E17250B8F413BDFE714E754C289FB85BDF473C7B6A55B9EF24B2A9E0D2B3A972E120D17EBD80964A3EA7A17161CEF7F66
                                          Malicious:false
                                          Reputation:low
                                          URL:https://unifiedxp.invoicesimple.com/_next/static/chunks/693-00e577fe3792fa55.js
                                          Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[693],{9693:function(e,r,t){"use strict";t.d(r,{n4:function(){return v},yl:function(){return R}});var n,i,o,s,a=t(8594),u=t.n(a),l=t(3698),c=t.n(l),f=t(6592),h=t.n(f);u().DP=5,u().RM=1,u()(0),u()(100);var m=function(e){return c()(e).format("0,0.00[0]")};function p(){return(p=Object.assign?Object.assign.bind():function(e){for(var r=1;r<arguments.length;r++){var t=arguments[r];for(var n in t)Object.prototype.hasOwnProperty.call(t,n)&&(e[n]=t[n])}return e}).apply(this,arguments)}var d=/[\u0600-\u06FF\u0750-\u077F\uFDFC]/,b={style:"currency",minimumFractionDigits:2,currencyDisplay:"code"};function g(e){return e.includes("\xa0")?e:e+"\xa0"}function v(e){var r,t,n,i=e.number,o=e.localeCode,s=void 0===o?"en-US":o,a=e.currencyCode,l=void 0===a?"USD":a,c=e.precision,f=void 0===c?2:c,v=(r=({IQD:"...",BHD:"...",SDG:"...",ZWL:"Z$"})[l]||h()(l)||"$",t=d.test(r),n=s.startsWith("ar-"),r+(t?n?"\xa0.":"\xa0.":""));if(!function(){if("obje
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (4999)
                                          Category:downloaded
                                          Size (bytes):5989
                                          Entropy (8bit):5.317667413406714
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:319AD54795D30CE5B4E3C6E5F39FBE0E
                                          SHA1:1780048C4B72581D8AFEA7E4D01B8A2E6D67F034
                                          SHA-256:CA24A6989688CDA8302F079B89C827495F22D2B2462553D05D63F0D1F1A73E5F
                                          SHA-512:94553CC3155D16CD68313B1983FAEFBE8F582C8F91344BB4224E588A26E18B74B4B6101B5FA9C12857E271B4D7567BB8C1A92CC6609B97BD87E0201CEF5FF86A
                                          Malicious:false
                                          Reputation:low
                                          URL:https://unifiedxp.invoicesimple.com/_next/static/chunks/app/checkout/%5BdocumentId%5D/error-964012511eeb5445.js
                                          Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[83],{5360:function(e,t,n){Promise.resolve().then(n.bind(n,6850))},6850:function(e,t,n){"use strict";n.r(t),n.d(t,{default:function(){return u}});var r=n(8599),s=n(5472),i=n(98),c=n(705),a=n(1373),o=n(2920);function u(e){let{error:t,reset:n}=e;return(0,o.useEffect)(()=>{!0!==t.reportedOnServer&&(0,a.e)(t)},[t]),(0,r.jsx)("main",{className:"pt-5 px-[25px]",children:(0,r.jsxs)(r.Fragment,{children:[(0,r.jsx)(c.PK,{}),(0,r.jsx)(s.N,{children:(0,r.jsx)(i.ts,{onClick:()=>n()})})]})})}},5472:function(e,t,n){"use strict";n.d(t,{N:function(){return s}});var r=n(8599);function s(e){let{className:t="",children:n,isEligibleForSecurityMsg:s=!1}=e;return(0,r.jsxs)(r.Fragment,{children:[(0,r.jsx)("div",{className:"fixed sm:static bottom-0 bg-white sm:bg-transparent left-0 right-0 shadow-payments-button-container py-4 px-8 sm:p-0 sm:shadow-none sm:my-5 z-10 ".concat(t),"data-testid":"BottomButtonSection",children:n}),(0,r.jsx)("div",{className:"
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:Web Open Font Format (Version 2), TrueType, length 46552, version 1.0
                                          Category:downloaded
                                          Size (bytes):46552
                                          Entropy (8bit):7.9950795250028674
                                          Encrypted:true
                                          SSDEEP:
                                          MD5:74C3556B9DAD12FB76F84AF53BA69410
                                          SHA1:342EDEF074482299F72F8F7A8862E6F908BD4137
                                          SHA-256:3BCF04CA301E44F13F404C8A04AA4AE707F67A950E12EF30C238F96E784266A1
                                          SHA-512:78AE2A421E6AA394F78200187A13F9B8BB313A85DAC223D2863C46E4F53393033CBC400B40D2044390F3B79105DA41D1A59F81D796561B8DC1C2A7B763BBB9DC
                                          Malicious:false
                                          Reputation:low
                                          URL:https://unifiedxp.invoicesimple.com/_next/static/media/c9a5bc6a7c948fb0-s.p.woff2
                                          Preview:wOF2...................i..........................O......^?HVAR.g.`?STAT.8..4/l.....<..6..f.0..\.6.$..H. ..\..>[Y...Vr.l.8.......Ng..._@.0..~.....g#l..d........$.2L@=.$QU..mk.[...UJ.d..J%.......+.|.03[V.oF.......{J.]X,..:*...BDff..A.t..*.r&#.../.JO.9.......sK...:..0.pE.-..{]N\.......rV.2..L...S2..d4+.:._M...r..+..S].@.G.~.J=DCcM*....t.....t....{M.L)......s.E@.D..G...qR.n^....X..u.?..6..{I.......K.L.v...+.UZ......q?.....R..J." f.w...z>Xqw.....@.*.l.1.M.}o.)...20v...6..{....{~...;....D$!!%..C#F..S".....D.8qJ)...[..z...6..I..$h4.a8h\..........1..~T,...Q%`6......>.PR..y..(K.j}~......3.0..kl..F...9B.s...s4s.P.9..}T.*.~../.........?.V[....>.T.i.0..)..~;w.......b."].h.C,.$..;m.!..........jom.A*.F.0..A)..W.g..A......H.O.t;m.nB.|...t...u.@.?.N..z.A..].flZ~..Gqi..c..a.&a..e.g...I..N...r)..26a.:..|K..`...k%.X.G.|..D&...Cc.N#..>=....^.y..^bX...p.B.b...e..V......&.P.........[...+}.....7.u..-.V..._\....'P.....3.Q#...:..^.=.ki%/.Z^..^.J..FY."..8.Y....!.(....*.%Q\A.FMD...
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (2213)
                                          Category:downloaded
                                          Size (bytes):115648
                                          Entropy (8bit):5.550870156551858
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:C051879F4E0D90EA84C1AB6310AC5324
                                          SHA1:9DC4609DC570A19BF7AE650407230E9788C689DA
                                          SHA-256:E7C9417A98297E7790F3B7AB5DE241C6FC8BAB73E5BEBC99CCB1459B6B3F614C
                                          SHA-512:25796249ACDC2C01C73677D4F3AA9CD4486FDF73FB41610A2C06AF3EABB917FA3E28BA56AF753F8CEA76BB6CC727A86C76064E0D8CB19EC73EF4827C8D8D0AE9
                                          Malicious:false
                                          Reputation:low
                                          URL:https://www.googletagmanager.com/gtag/js?id=undefined
                                          Preview:.// Copyright 2012 Google Inc. All rights reserved.. .(function(){..var data = {."resource": {. "version":"1",. . "macros":[],. "tags":[],. "predicates":[],. "rules":[].},."runtime":[ .]..........};...var aa,ba=function(a){var b=0;return function(){return b<a.length?{done:!1,value:a[b++]}:{done:!0}}},fa=function(a){return a.raw=a},ha=function(a,b){a.raw=b;return a},ia=function(a){var b="undefined"!=typeof Symbol&&Symbol.iterator&&a[Symbol.iterator];if(b)return b.call(a);if("number"==typeof a.length)return{next:ba(a)};throw Error(String(a)+" is not an iterable or ArrayLike");},ja=function(a){for(var b,c=[];!(b=a.next()).done;)c.push(b.value);return c},ka=function(a){return a instanceof Array?a:.ja(ia(a))},la="function"==typeof Object.create?Object.create:function(a){var b=function(){};b.prototype=a;return new b},ma;if("function"==typeof Object.setPrototypeOf)ma=Object.setPrototypeOf;else{var na;a:{var oa={a:!0},pa={};try{pa.__proto__=oa;na=pa.a;break a}catch(a){}na=!1}ma=na?functi
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:Unicode text, UTF-8 text, with very long lines (63933)
                                          Category:downloaded
                                          Size (bytes):115847
                                          Entropy (8bit):5.391547493399264
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:CE3CC80DE0AC27542A2E1E0E5CE5EDD3
                                          SHA1:1971E7F9B3FF3CDCB424E2BCF05BF1A0ED265F80
                                          SHA-256:ADCECEF9AC4C65C7D84B477E4F12ED2E9FE2F8BDC0A8CD60E97244D8E23638FC
                                          SHA-512:E0DB92388656186BC3E42F945D240ED2A114385F43CCAF488A11FF0404EC979DA55AA4F39138590E13F0E1B74E1655111F0BB627EC23A7FB689863DC1D7599E3
                                          Malicious:false
                                          Reputation:low
                                          URL:https://app.invoicesimple.com/_next/static/chunks/8432-e88fee9cbd15555f.js
                                          Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[8432],{83184:function(e,t){"use strict";t.byteLength=function(e){var t=c(e),n=t[0],r=t[1];return(n+r)*3/4-r},t.toByteArray=function(e){var t,n,o=c(e),s=o[0],a=o[1],d=new i((s+a)*3/4-a),u=0,p=a>0?s-4:s;for(n=0;n<p;n+=4)t=r[e.charCodeAt(n)]<<18|r[e.charCodeAt(n+1)]<<12|r[e.charCodeAt(n+2)]<<6|r[e.charCodeAt(n+3)],d[u++]=t>>16&255,d[u++]=t>>8&255,d[u++]=255&t;return 2===a&&(t=r[e.charCodeAt(n)]<<2|r[e.charCodeAt(n+1)]>>4,d[u++]=255&t),1===a&&(t=r[e.charCodeAt(n)]<<10|r[e.charCodeAt(n+1)]<<4|r[e.charCodeAt(n+2)]>>2,d[u++]=t>>8&255,d[u++]=255&t),d},t.fromByteArray=function(e){for(var t,r=e.length,i=r%3,o=[],s=0,a=r-i;s<a;s+=16383)o.push(function(e,t,r){for(var i,o=[],s=t;s<r;s+=3)o.push(n[(i=(e[s]<<16&16711680)+(e[s+1]<<8&65280)+(255&e[s+2]))>>18&63]+n[i>>12&63]+n[i>>6&63]+n[63&i]);return o.join("")}(e,s,s+16383>a?a:s+16383));return 1===i?o.push(n[(t=e[r-1])>>2]+n[t<<4&63]+"=="):2===i&&o.push(n[(t=(e[r-2]<<8)+e[r-1])>>10]+n[t>>4&63]+n
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (7122), with no line terminators
                                          Category:downloaded
                                          Size (bytes):7122
                                          Entropy (8bit):5.266493995568946
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:D026D7BC2114AF256CB727568B17DB6D
                                          SHA1:0AA9C5F3D582CEBF60E7F99F40CBC7EAE36A4F11
                                          SHA-256:3A8F60A8F9F1411C810DA7A61EFB867A159914111CFA843BDFABE1D02586A02C
                                          SHA-512:A6AD2699DFAD20ADC695E4986F17325A2D13EC4DD367F7894B1D8D0ABF189E75C07DB569988592A2A2C651BEBEEC90E799A3B015DA664AE2E4B79ACD0507E8A6
                                          Malicious:false
                                          Reputation:low
                                          URL:https://unifiedxp.invoicesimple.com/_next/static/chunks/app/layout-15f96b50c2fc9a36.js
                                          Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[185],{7538:function(e,t,n){Promise.resolve().then(n.t.bind(n,9597,23)),Promise.resolve().then(n.t.bind(n,2865,23)),Promise.resolve().then(n.t.bind(n,9775,23)),Promise.resolve().then(n.t.bind(n,7368,23))},7264:function(e,t){"use strict";let n;Object.defineProperty(t,"__esModule",{value:!0}),function(e,t){for(var n in t)Object.defineProperty(e,n,{enumerable:!0,get:t[n]})}(t,{DOMAttributeNames:function(){return r},isEqualNode:function(){return o},default:function(){return a}});let r={acceptCharset:"accept-charset",className:"class",htmlFor:"for",httpEquiv:"http-equiv",noModule:"noModule"};function l(e){let{type:t,props:n}=e,l=document.createElement(t);for(let e in n){if(!n.hasOwnProperty(e)||"children"===e||"dangerouslySetInnerHTML"===e||void 0===n[e])continue;let o=r[e]||e.toLowerCase();"script"===t&&("async"===o||"defer"===o||"noModule"===o)?l[o]=!!n[e]:l.setAttribute(o,n[e])}let{children:o,dangerouslySetInnerHTML:a}=n;return a?l.
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (65200)
                                          Category:downloaded
                                          Size (bytes):160634
                                          Entropy (8bit):5.255641022673324
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:BF69824662AD8B896F585CCA624DFEA2
                                          SHA1:B152D218170FB231DFAC25E410A18599DE679F66
                                          SHA-256:AC402CF28AC6502E86DA32536B6AD0B57F810D6D16B31F686939E12B5C0EAF03
                                          SHA-512:AE48A290D16F755FCF6AD068BAC07B684C7FA5AADFB8FF58A97E3C29D15D6E1AB9E0D8DC297ACB90D3DFD3809FFE8449669B8404D6D90C3719A2AB5B4619559D
                                          Malicious:false
                                          Reputation:low
                                          URL:https://unifiedxp.invoicesimple.com/_next/static/chunks/a07a5be3-b72d22036f363b6e.js
                                          Preview:"use strict";(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[944],{5733:function(e,t,n){/**. * @license React. * react-dom.production.min.js. *. * Copyright (c) Meta Platforms, Inc. and affiliates.. *. * This source code is licensed under the MIT license found in the. * LICENSE file in the root directory of this source tree.. */var r,l=n(2920),a=n(3583),o={usingClientEntryPoint:!1,Events:null,Dispatcher:{current:null}};function i(e){for(var t="https://reactjs.org/docs/error-decoder.html?invariant="+e,n=1;n<arguments.length;n++)t+="&args[]="+encodeURIComponent(arguments[n]);return"Minified React error #"+e+"; visit "+t+" for the full message or use the non-minified dev environment for full errors and additional helpful warnings."}var u=Object.assign,s=l.__SECRET_INTERNALS_DO_NOT_USE_OR_YOU_WILL_BE_FIRED,c=[],f=-1;function d(e){return{current:e}}function p(e){0>f||(e.current=c[f],c[f]=null,f--)}function h(e,t){c[++f]=e.current,e.current=t}var m=Symbol.for("react.element"),g=Symb
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (11862), with no line terminators
                                          Category:downloaded
                                          Size (bytes):11862
                                          Entropy (8bit):5.368807532145416
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:7DE545EBCDE6EA9D81AE83F37B679F5D
                                          SHA1:1981F313EEC919B06C2C69AB77B434C9F36B31E9
                                          SHA-256:E7CF9F2E3542032AC5EC22945CB826361C0A51E6A69B8BFF79CDE28C687B43AD
                                          SHA-512:B601742ACB209778E4B193C139C3F03D6AA26DBD38D3C455003E80128CC0EF08E0DCC1B1140565464D4DD464120BE8654C1D52E17448C64C0C6CE23DFCF00366
                                          Malicious:false
                                          Reputation:low
                                          URL:https://unifiedxp.invoicesimple.com/_next/static/chunks/app/checkout/%5BdocumentId%5D/error/page-1a39e4cbacc47063.js
                                          Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[794],{333:function(e,t,n){Promise.resolve().then(n.bind(n,9019)),Promise.resolve().then(n.bind(n,4611)),Promise.resolve().then(n.bind(n,5208))},1036:function(e,t,n){"use strict";n.d(t,{z:function(){return r}});var s=n(8599);function r(e){var t;return(0,s.jsx)("button",{...e,className:"w-full h-12 text-base rounded-md shadow-payments-button ".concat(null!==(t=e.className)&&void 0!==t?t:"")})}},416:function(e,t,n){"use strict";n.r(t),n.d(t,{DownloadPDFButton:function(){return o}});var s=n(8599),r=n(9682),a=n(5619),i=n(1036),c=n(8055);let l="Download as PDF";function o(e){let{documentId:t,requestId:n,installationId:o}=e,u="".concat("https://pdf2.invoicesimple.com","/").concat(t,".pdf"),d=()=>{(0,r._)({action:a.om.DOWNLOAD_AS_PDF,documentId:t,requestId:n,installationId:o}),window.open(u,"_blank")};return(0,s.jsx)("div",{className:"mb-3",children:(0,s.jsx)(i.z,{"data-testid":l,onClick:d,className:"bg-white text-gray-700 border border-
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:SVG Scalable Vector Graphics image
                                          Category:downloaded
                                          Size (bytes):262
                                          Entropy (8bit):5.0549031645671985
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:22A1914D513F3DBCCEF726A4304ED0C3
                                          SHA1:B12C182A2379B3BE15C5A9BEBA2533BAC9B3C5AE
                                          SHA-256:AFE2F65ED0F017BE5CBCFC94A4B4F40246F623EA28219E5989E66B09E45CD95E
                                          SHA-512:3F26872B7F37B49843113FB8DC6E68686B4A329F5A7A76D6A359E5A08F6C27317FAD3B3CDC55EA2DDE879887B54CB13356A20BD17A5C43DD319800E2E8D049A3
                                          Malicious:false
                                          Reputation:low
                                          URL:https://unifiedxp.invoicesimple.com/x.svg
                                          Preview:<svg width="24" height="24" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg">.<g id="hero_icon/outlined/x">.<path id="Icon" d="M6 18L18 6M6 6L18 18" stroke="#111827" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"/>.</g>.</svg>.
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (30523), with no line terminators
                                          Category:downloaded
                                          Size (bytes):30523
                                          Entropy (8bit):5.180352374153933
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:6358FE7C2B1C75CBF4801947FA4D4983
                                          SHA1:801654F6C6E0295CF87E92440E085399CBD9D85F
                                          SHA-256:A084A36590D2A32FFB92777E4C9252F4206FA884F3918E603BBE2EEFF1081EB8
                                          SHA-512:83A0BC2F481305FC2CE0038080B40C1EF788736C87DE3D34AD3B705F0EBE37BE3B85D68DF2E456D60F9197AD743FA753A70F102BAD741478EF1E9A5392513EEA
                                          Malicious:false
                                          Reputation:low
                                          URL:https://app.invoicesimple.com/_next/static/chunks/9845-199347fd2722f29d.js
                                          Preview:"use strict";(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[9845],{85570:function(t,e,r){r.d(e,{Z:function(){return U}});var i=r(79365),a=r(33198),s=r(1917),n=r(31269),o=r(50973),u=r(762),l=r(62028),c=r(78489);function h(t,e){return Object.keys(t).reduce(function(r,a){return r[a]=(0,i.pi)({timeZone:e},t[a]),r},{})}function d(t,e){return Object.keys((0,i.pi)((0,i.pi)({},t),e)).reduce(function(r,a){return r[a]=(0,i.pi)((0,i.pi)({},t[a]||{}),e[a]||{}),r},{})}function f(t,e){if(!e)return t;var r=u.C.formats;return(0,i.pi)((0,i.pi)((0,i.pi)({},r),t),{date:d(h(r.date,e),h(t.date||{},e)),time:d(h(r.time,e),h(t.time||{},e))})}var m=function(t,e,r,a,s){var n=t.locale,u=t.formats,h=t.messages,d=t.defaultLocale,m=t.defaultFormats,p=t.fallbackOnEmptyString,y=t.onError,v=t.timeZone,g=t.defaultRichTextElements;void 0===r&&(r={id:""});var b=r.id,C=r.defaultMessage;(0,o.kG)(!!b,"[@formatjs/intl] An `id` must be provided to format a message. You can either:\n1. Configure your build toolchain
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (793), with no line terminators
                                          Category:downloaded
                                          Size (bytes):793
                                          Entropy (8bit):5.252930573061686
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:AC746E19184E5DEAA1CDC375473D0BDA
                                          SHA1:890DFDD27E1B97DC47C3EBF266410E7BD832564E
                                          SHA-256:F581A1A10CDD4D0D68A5462193227E2A4AD23FBBF0D46CBD9592F57A86ECC7F6
                                          SHA-512:86FA30CD0ECA8C16B3E0C9A9FC9E8104C63FACDAB7EFADFD172CD2F516329541CAC9F20898A86549C7CB96D5CF44834BEA12A30283538EFE827673691857D387
                                          Malicious:false
                                          Reputation:low
                                          URL:https://app.invoicesimple.com/_next/static/chunks/app/layout-a282f16fbf544152.js
                                          Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[3185],{64394:function(e,n,r){Promise.resolve().then(r.bind(r,39180)),Promise.resolve().then(r.bind(r,65285)),Promise.resolve().then(r.t.bind(r,11698,23)),Promise.resolve().then(r.t.bind(r,59297,23))},39180:function(e,n,r){"use strict";r.r(n),r.d(n,{Providers:function(){return l}});var t=r(17821),i=r(26038),s=r(67777),o=r(17582),u=r(33198),c=r(85570);function l(e){let{children:n,messages:r,locale:l,requestHeaders:f}=e,[d]=(0,u.useState)(()=>new s.S);return(0,i.c)({requestHeaders:f}),(0,t.jsx)(o.QueryClientProvider,{client:d,children:(0,t.jsx)(c.Z,{messages:r,locale:l,children:n})})}},59297:function(){},11698:function(){}},function(e){e.O(0,[3270,8688,9845,6387,7879,4648,6800,1744],function(){return e(e.s=64394)}),_N_E=e.O()}]);
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (65472)
                                          Category:downloaded
                                          Size (bytes):154144
                                          Entropy (8bit):5.115115153295097
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:5E7E65BE76A8D47AFB3DB53A3930DBC9
                                          SHA1:4578F81001ECF12758F4E572A6E26E85BF18A75D
                                          SHA-256:B6CF872D5A9C5C8FF8A1BD51B48322BC0271BF98A26AC5119E5B0F882EF3EA71
                                          SHA-512:3DC0022FF362706CD1A53CBBF7969D2FDFF8E412B7331A050CBB7B85CE21A7F69D694F2519F8BDB039E39BB77BA810B422E6F7DED98E871FD581E4C96C6EA635
                                          Malicious:false
                                          Reputation:low
                                          URL:https://app.invoicesimple.com/_next/static/css/33eb6efee5564b42.css
                                          Preview:/*.! tailwindcss v3.3.3 | MIT License | https://tailwindcss.com.*/*,:after,:before{-webkit-box-sizing:border-box;box-sizing:border-box;border:0 solid #e5e7eb}:after,:before{--tw-content:""}html{line-height:1.5;-webkit-text-size-adjust:100%;-moz-tab-size:4;-o-tab-size:4;tab-size:4;font-family:ui-sans-serif,system-ui,-apple-system,Segoe UI,Roboto,Ubuntu,Cantarell,Noto Sans,sans-serif,BlinkMacSystemFont,Helvetica Neue,Arial,Apple Color Emoji,Segoe UI Emoji,Segoe UI Symbol,Noto Color Emoji;-webkit-font-feature-settings:normal;font-feature-settings:normal;font-variation-settings:normal}body{margin:0;line-height:inherit}hr{height:0;color:inherit;border-top-width:1px}abbr:where([title]){text-decoration:underline;-webkit-text-decoration:underline dotted currentColor;text-decoration:underline dotted currentColor}h1,h2,h3,h4,h5,h6{font-size:inherit;font-weight:inherit}a{color:inherit;text-decoration:inherit}b,strong{font-weight:bolder}code,kbd,pre,samp{font-family:ui-monospace,SFMono-Regular,Men
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (65198)
                                          Category:downloaded
                                          Size (bytes):160775
                                          Entropy (8bit):5.258056795727807
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:CAB85F4F0540B146913B4558A413F0A2
                                          SHA1:8EC4782228A6EAD99B3A4C328F9595AEEADBED13
                                          SHA-256:8A220E2031137A761F8C5A17A8C9E05F5E25EB0D5A0C065E925F08B564A483CD
                                          SHA-512:9D527A2BA185C31C01AE98C9A5836787E96A3443EBAE1D6521CB161653B635280595B33D894AE460FA869BDE9100FD91D2F3C471A76CD721BA4F96EC05CE45A6
                                          Malicious:false
                                          Reputation:low
                                          URL:https://app.invoicesimple.com/_next/static/chunks/d4618404-b7284546ef4652e4.js
                                          Preview:"use strict";(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[4648],{69527:function(e,t,n){/**. * @license React. * react-dom.production.min.js. *. * Copyright (c) Meta Platforms, Inc. and affiliates.. *. * This source code is licensed under the MIT license found in the. * LICENSE file in the root directory of this source tree.. */var r,l=n(33198),a=n(79076),o={usingClientEntryPoint:!1,Events:null,Dispatcher:{current:null}};function i(e){for(var t="https://reactjs.org/docs/error-decoder.html?invariant="+e,n=1;n<arguments.length;n++)t+="&args[]="+encodeURIComponent(arguments[n]);return"Minified React error #"+e+"; visit "+t+" for the full message or use the non-minified dev environment for full errors and additional helpful warnings."}var u=Object.assign,s=l.__SECRET_INTERNALS_DO_NOT_USE_OR_YOU_WILL_BE_FIRED,c=[],f=-1;function d(e){return{current:e}}function p(e){0>f||(e.current=c[f],c[f]=null,f--)}function h(e,t){c[++f]=e.current,e.current=t}var m=Symbol.for("react.element"),g=
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:HTML document, ASCII text, with no line terminators
                                          Category:downloaded
                                          Size (bytes):200
                                          Entropy (8bit):4.942373347667344
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:3437AADDCDF6922D623E172C2D6F9278
                                          SHA1:F69066CF20141AC93418102D3EEE7C0225B8A623
                                          SHA-256:35DCC382EB69D00369D708708CDC545F3968B68FA5BBE3E728D11FEDD04F93BB
                                          SHA-512:2DAE5C5C30C6A0E763D8128F2CE1D467EAD432E582AB4EBB68E23991DB08F57490ABC0EED805FD33FAB5503C1737D9D47D4CC1090AE15D7391593FBB295D66E7
                                          Malicious:false
                                          Reputation:low
                                          URL:https://js.stripe.com/v3/m-outer-3437aaddcdf6922d623e172c2d6f9278.html
                                          Preview:<!doctype html><html><head><meta charset="utf-8"/><script defer="defer" src="https://js.stripe.com/v3/fingerprinted/js/m-outer-15a2b40a058ddff1cffdb63779fe3de1.js"></script></head><body></body></html>
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:PNG image data, 168 x 100, 8-bit grayscale, non-interlaced
                                          Category:downloaded
                                          Size (bytes):2477
                                          Entropy (8bit):7.883472152204366
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:C95ED72051BC31CEE6260A6FD1A33BA7
                                          SHA1:8A98D6D27F968074B75DB6A4B9881066A5C6C107
                                          SHA-256:56AEBAA1480B7617D2624204E3D424EA43D6BBA4341E136EA72D9067421FA923
                                          SHA-512:8EAC31978BA34B0FCB92F3F3D5D8107834513F7F6B7F60CB971687AC625FF43E7991315F67DB89CE880F4F63685DD0FE3D7568D87424429F004CE91CB64615B3
                                          Malicious:false
                                          Reputation:low
                                          URL:"https://d28zjh2pk692s7.cloudfront.net/fetch/b_white,bo_1px_solid_white/e_trim/c_limit,w_200,h_100/https://invoicemaker2-prod.s3.amazonaws.com/account/1RHgEBd7NU/photo/94339290-b4a7-11ee-abca-31776b910da6.jpg"
                                          Preview:.PNG........IHDR.......d.....7.$.....pHYs..........&.?....tIME.....,..RJ.....IDAT.....X.........ZO.3...7...RW..j.!)..t..65.H^r>..%.L.......T....&$..r;..;..y.y.y9.....G.e.|8.S..../.#...c.........l5..>...d.......[.g....eu...}.Q'.Yjp..'..P'...6.pU...2..v.9....(....v..a.x.U..}...[...*..V.d.^F'T.~....<y.,.....r....".O......(.......(._C....0..2..~../....F....9..`E....6R.v.j.?80..,.:..P#.=K.<.J....YF.."..uo.z.H..^...A......w..g..!i.s.r!.Q#..}.P.C...g....6.......G.....Do=...?......]...9....6=...[...O$....1.w.%.s..7..=...c..K.m...B.p..7....z7..5.7....q.'.&..{..F.=.j..Y....#..O.,O..=.xc}g..5:..k.0.<.N^b.[.7.B.Q.2.(...h...-n.....F....L..?..E.`.t..R.Y.1U..:...i./.o.H0.s...7.,.v..........(..d?...^....o.......A.`".o......mgQ...x)...E.g...G..............*...Q%x..".)....xiW.IT..l.`.3Kw.mo~.J..+^......V....~\c.p.U.~./%.[.2..9.0ud..z.F....s....(...bWbne"`m...l_.....Z?2.P....:......N.A/..0."*.l.*x...o..'..`d...}...7..0hA6U.....K..f...#-@......,+.J0..H
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (10835), with no line terminators
                                          Category:downloaded
                                          Size (bytes):10835
                                          Entropy (8bit):5.599500126302777
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:EA739051C7498A59767CF5E0D07EE3B0
                                          SHA1:98FC0D575C5E97EAB25EB7543BD86E5524539529
                                          SHA-256:17FA023DE5CF0D9D09374B030A1A75C21E7158D350B5A7ED7FB3236C514BD23C
                                          SHA-512:5A82CEC0D9F829792BABBB192A96F2EDBB44D51B913E7D84EA617E0EE7116CEA9947C1ADAE9A39C9517364104D632185FB4FBD4C63611C81AEF60105FE1397E2
                                          Malicious:false
                                          Reputation:low
                                          URL:https://app.invoicesimple.com/_next/static/chunks/2619-87e467e7596c1813.js
                                          Preview:"use strict";(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[2619],{60397:function(e,t,n){n.d(t,{D:function(){return a},S:function(){return i}});var r=n(88335);let a=(0,r.Ue)((e,t)=>({account:null,subscriptionStatus:null,user:null,setUser:t=>e({user:t}),setAccount:t=>e({account:t}),setSubscriptionStatus:t=>e({subscriptionStatus:t})})),i=e=>{let{account:t,user:n,subscriptionStatus:r}=e;a.getState().setAccount(t),a.getState().setUser(n),a.getState().setSubscriptionStatus(r)}},6476:function(e,t,n){n.r(t),n.d(t,{AlertBanner:function(){return l}});var r=n(17821);n(33198);var a=n(29806),i=n(66925),o=n(26350);let l=()=>{let{alert:e,hideAlert:t}=(0,o.V)();return e&&e.type===i.N.Banner?(0,r.jsx)(a.j,{...e,onClose:t}):null}},29806:function(e,t,n){n.d(t,{j:function(){return o}});var r=n(17821);n(33198);let a={error:"bg-red-100",success:"bg-green-100",warning:"bg-yellow-100"},i={error:"text-red-800",success:"text-green-800",warning:"text-yellow-800"},o=e=>{let{title:t,bannerType:n,body:o,
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (8266), with no line terminators
                                          Category:downloaded
                                          Size (bytes):8266
                                          Entropy (8bit):5.452931823620278
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:A696EC89B22E4674CDA273595F34AA23
                                          SHA1:8C32BA176652CB4D5CDDB1A820BC45DCD6C10959
                                          SHA-256:C06922E531C7640C4E2BA999AEE1517BC75A67156E3BBA0A9BA23CD5E267055E
                                          SHA-512:F07787EDA83977A3C975F8D2A1831E8E2E1EA26C133E2F83D1A45E8E6DA6FC7E9DF5241FBBB61931D72278075A6CFF60D584E3CE4E2B6D91B64E172B2130ADEF
                                          Malicious:false
                                          Reputation:low
                                          URL:https://app.invoicesimple.com/_next/static/chunks/5550-03a30fa6783dc9d3.js
                                          Preview:"use strict";(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[5550],{38303:function(r,e,o){Object.defineProperty(e,"__esModule",{value:!0}),e.AuthorizationError=void 0;let s=o(83269),t=o(88565),n=o(66955);class E extends s.IsError{constructor(r,e,o){let{message:s,originalError:a,errorArgs:i}=(0,n.readErrorArgs)(r,e,o);super(t.StatusErrorCode.UNAUTHORIZED,E.name,s,(null==i?void 0:i.reasonCode)||t.ErrorGenericReasonCode.UNAUTHORIZED,(null==i?void 0:i.userMessage)||t.ErrorMessage.UNAUTHORIZED,a,i)}}e.AuthorizationError=E},55906:function(r,e,o){Object.defineProperty(e,"__esModule",{value:!0}),e.DataAccessError=void 0;let s=o(83269),t=o(88565),n=o(66955);class E extends s.IsError{constructor(r,e,o){let{message:s,originalError:a,errorArgs:i}=(0,n.readErrorArgs)(r,e,o);super(t.StatusErrorCode.DATA_ACCESS,E.name,s,(null==i?void 0:i.reasonCode)||t.ErrorGenericReasonCode.SERVER_ERROR,(null==i?void 0:i.userMessage)||t.ErrorMessage.SOMETHING_WENT_WRONG,a,i)}}e.DataAccessError=E},57278:func
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (57911), with no line terminators
                                          Category:downloaded
                                          Size (bytes):57911
                                          Entropy (8bit):5.495023047274747
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:0CFCF1D730996124DA9F917F3CC02EEC
                                          SHA1:DA920E255DC24CB2BD8F9E2475BDBE8B43ABC578
                                          SHA-256:04EC60E1472BB8758BE579EB4625ADCE0950D4BF2E4ECEA6C606EB82B5D0B930
                                          SHA-512:2C0A6A4DC6F9E5ED0310D2D09AB7A4EBDD45DBFBD4C42B2F3B3898B5C5B61AFE486A60ABCD7890C7C465DC3A264FD75604F64C27C6BD7E62C2713067F1C4DCE6
                                          Malicious:false
                                          Reputation:low
                                          URL:https://app.invoicesimple.com/_next/static/chunks/6617-513488255c727ef8.js
                                          Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[6617],{25832:function(e,t,n){"use strict";t.LO=void 0;var r,i,o,a,s=n(67824),l=n(447);(r=o||(o={})).NOT_ELIGIBLE="NOT_ELIGIBLE",r.INITIAL="INITIAL",r.PENDING="PENDING",r.PENDING_VERIFICATION="PENDING_VERIFICATION",r.ACCEPTING="ACCEPTING",(i=a||(a={})).ACH="ACH",i.CARD_PAYMENTS="CARD_PAYMENTS",t.LO=function(e){var t=(0,l.calculate)(e);return!e.setting.stripePaymentSuppressed&&!e.deleted&&+t.total>0&&+t.balanceDue>0&&e.docType===s.DocTypes.DOCTYPE_INVOICE}},49659:function(e){"use strict";var t=function(e){var t;return!!e&&"object"==typeof e&&"[object RegExp]"!==(t=Object.prototype.toString.call(e))&&"[object Date]"!==t&&e.$$typeof!==n},n="function"==typeof Symbol&&Symbol.for?Symbol.for("react.element"):60103;function r(e,t){return!1!==t.clone&&t.isMergeableObject(e)?a(Array.isArray(e)?[]:{},e,t):e}function i(e,t,n){return e.concat(t).map(function(e){return r(e,n)})}function o(e){return Object.keys(e).concat(Object.getOwnPropertySym
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (29475)
                                          Category:downloaded
                                          Size (bytes):29691
                                          Entropy (8bit):5.389965325038625
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:C1C645FF1B8CCAD39FB0F0F64BD2A6BB
                                          SHA1:16270D0FDEB47464844F4D6750D2A82004A961C8
                                          SHA-256:DACED4700ADE738279F77FF8DED5AFF582B028DCB6071C3E8A0AC28AB95EC40B
                                          SHA-512:EE4DD313A3CB83184CE4EEE0E01CF79FA552AB5758B78831E5861A095FB70F760F9A6F1518726FF437AB506F64E00B44B24AF9071E9B8E575BE2BDFB12C65D50
                                          Malicious:false
                                          Reputation:low
                                          URL:https://app.invoicesimple.com/_next/static/chunks/3846-8307a49d18a8f1eb.js
                                          Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[3846],{33396:function(t,e){"use strict";/*!. * cookie. * Copyright(c) 2012-2014 Roman Shtylman. * Copyright(c) 2015 Douglas Christopher Wilson. * MIT Licensed. */e.Q=function(t,e){if("string"!=typeof t)throw TypeError("argument str must be a string");for(var n={},o=t.split(";"),i=(e||{}).decode||r,a=0;a<o.length;a++){var u=o[a],c=u.indexOf("=");if(!(c<0)){var s=u.substring(0,c).trim();if(void 0==n[s]){var f=u.substring(c+1,u.length).trim();'"'===f[0]&&(f=f.slice(1,-1)),n[s]=function(t,e){try{return e(t)}catch(e){return t}}(f,i)}}}return n},e.q=function(t,e,r){var i=r||{},a=i.encode||n;if("function"!=typeof a)throw TypeError("option encode is invalid");if(!o.test(t))throw TypeError("argument name is invalid");var u=a(e);if(u&&!o.test(u))throw TypeError("argument val is invalid");var c=t+"="+u;if(null!=i.maxAge){var s=i.maxAge-0;if(isNaN(s)||!isFinite(s))throw TypeError("option maxAge is invalid");c+="; Max-Age="+Math.floor(s)}if(i
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:HTML document, ASCII text, with very long lines (7783)
                                          Category:dropped
                                          Size (bytes):2262318
                                          Entropy (8bit):5.131162958603515
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:2972EEF695DCBFBF41189E6A1C253A0F
                                          SHA1:C629C86B2437EC4982461F6813E1A19913A944B6
                                          SHA-256:A4EC4A88640BCCD210E9007224861CE74113EBFE444CE085DB5215F7A0D5209D
                                          SHA-512:11D03DDF3C9EB115650AC5EA43DD7F93C6756493E77665A4D3C4DCA76466B7F7AC3073817D97E505248387D15B7FAE90798C67901C5C8D3134B1953CEF59A156
                                          Malicious:false
                                          Reputation:low
                                          Preview:<!DOCTYPE html>.<html. class="MktRoot". lang="en-us". data-js-controller="Page". data-page-id="Home". data-page-title="Stripe | Financial Infrastructure for the Internet". data-experiments-loading. data-loading.>. <head>. <script>window.__capturedErrors = [];.window.onerror = function (message, url, line, column, error) { __capturedErrors.push(error); };.window.onunhandledrejection = function(evt) { __capturedErrors.push(evt.reason); }.</script>.<meta. name="sentry-config". data-js-dsn="https://7cd38b0eb2b348b39a6002cc768f91c7@errors.stripe.com/376". data-js-release="c268952f64da4bc96305dc2e2bea65967d1f4c15". data-js-environment="production". data-js-project="mkt".>.. <meta name="experiment-treatments" content="wpp_a_a_smoke_test_home_2.control_test.ursula.39a009fd-86a6-447c-b4f3-099fc69a3240,wpp_site_header_product_nav_redesign.control.ursula.5191ac06-3d81-484e-bbca-0b4eab59c081">.. . .. <template class="TrackingSandboxTemplate">. <iframe. class="Tracki
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:downloaded
                                          Size (bytes):96
                                          Entropy (8bit):4.842127826021245
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:F1ED6959C1B2F95E219991BDD4842677
                                          SHA1:13B4E9409B01DDBDA6B0F527C6F8AFD1E3775632
                                          SHA-256:A51A2674B8B359E7AAE888DC8E9D862B1083EE66601DFCF0A2927E9BA621A99C
                                          SHA-512:E36D18BC22CD90344456D46F310DB4CA11EF0DFB7CB56F362F5AE98D9A655168016888B83226723B910BD73D2F27C16646FA53F58B7450255187CB5861A59B74
                                          Malicious:false
                                          Reputation:low
                                          URL:https://app.invoicesimple.com/_next/static/css/b1aef614ebeabfa7.css
                                          Preview:body,html{height:100%}body{background-color:#f3f4f6;background-color:var(--bodyBgColor,#f3f4f6)}
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (4838), with no line terminators
                                          Category:downloaded
                                          Size (bytes):4838
                                          Entropy (8bit):5.444743307690571
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:5FEB22D77F5A692469D77D824B3506B2
                                          SHA1:AA01086DC6A7059CC9F125F7F3C56BFCE5FEFA1B
                                          SHA-256:043E59C2B93F9F07B41A83D4AEDC8134D080310526AD7254B345800E8E0570DB
                                          SHA-512:5B0743AFD760DC405BECFB714842F5249FFD346E1E5CCC113FECDDBEAF5E5F57F33744B8365AF8EA52D0171906AF18CA6D769B32DBB978BA25FDF1E2DA44D03F
                                          Malicious:false
                                          Reputation:low
                                          URL:https://app.invoicesimple.com/_next/static/chunks/webpack-5631a267d74e3bc3.js
                                          Preview:!function(){"use strict";var e,t,n,r,o,c,u,d,f,a={},i={};function l(e){var t=i[e];if(void 0!==t)return t.exports;var n=i[e]={id:e,loaded:!1,exports:{}},r=!0;try{a[e].call(n.exports,n,n.exports,l),r=!1}finally{r&&delete i[e]}return n.loaded=!0,n.exports}l.m=a,l.amdO={},e=[],l.O=function(t,n,r,o){if(n){o=o||0;for(var c=e.length;c>0&&e[c-1][2]>o;c--)e[c]=e[c-1];e[c]=[n,r,o];return}for(var u=1/0,c=0;c<e.length;c++){for(var n=e[c][0],r=e[c][1],o=e[c][2],d=!0,f=0;f<n.length;f++)u>=o&&Object.keys(l.O).every(function(e){return l.O[e](n[f])})?n.splice(f--,1):(d=!1,o<u&&(u=o));if(d){e.splice(c--,1);var a=r();void 0!==a&&(t=a)}}return t},l.n=function(e){var t=e&&e.__esModule?function(){return e.default}:function(){return e};return l.d(t,{a:t}),t},n=Object.getPrototypeOf?function(e){return Object.getPrototypeOf(e)}:function(e){return e.__proto__},l.t=function(e,r){if(1&r&&(e=this(e)),8&r||"object"==typeof e&&e&&(4&r&&e.__esModule||16&r&&"function"==typeof e.then))return e;var o=Object.create(null)
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (16036), with no line terminators
                                          Category:downloaded
                                          Size (bytes):16036
                                          Entropy (8bit):5.111323904743624
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:804F0C77141B41EB71BBF4C8D2EBF7C2
                                          SHA1:AB9A1BF252744CF183052961F12C7C60E281388C
                                          SHA-256:E8E0DD3ADF86448C1283BCBF3DFD67EBD81E4D73DCC3FD19E454315318A47122
                                          SHA-512:B1B5FDC86DF51230ADF7AE7670CBCAE1185531D70415C1687B11A5DF2FACC694BAAB4CB3CCA19D2D8EAC880BA74359D1F8D6B6A72F43714C90EDA506A31B4D67
                                          Malicious:false
                                          Reputation:low
                                          URL:https://app.invoicesimple.com/_next/static/chunks/4665-d11b485163be7c4f.js
                                          Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[4665],{49032:function(t,e,s){t.exports=s(85310)},74381:function(t,e,s){"use strict";function i(){return{onFetch:t=>{t.fetchFn=()=>{var e,s,i,a,u,o;let l;let c=null==(e=t.fetchOptions)?void 0:null==(s=e.meta)?void 0:s.refetchPage,h=null==(i=t.fetchOptions)?void 0:null==(a=i.meta)?void 0:a.fetchMore,d=null==h?void 0:h.pageParam,f=(null==h?void 0:h.direction)==="forward",v=(null==h?void 0:h.direction)==="backward",p=(null==(u=t.state.data)?void 0:u.pages)||[],b=(null==(o=t.state.data)?void 0:o.pageParams)||[],m=b,g=!1,y=e=>{Object.defineProperty(e,"signal",{enumerable:!0,get:()=>{var e,s;return null!=(e=t.signal)&&e.aborted?g=!0:null==(s=t.signal)||s.addEventListener("abort",()=>{g=!0}),t.signal}})},P=t.options.queryFn||(()=>Promise.reject("Missing queryFn")),O=(t,e,s,i)=>(m=i?[e,...m]:[...m,e],i?[s,...t]:[...t,s]),C=(e,s,i,r)=>{if(g)return Promise.reject("Cancelled");if(void 0===i&&!s&&e.length)return Promise.resolve(e);let n={quer
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (28404), with no line terminators
                                          Category:downloaded
                                          Size (bytes):28404
                                          Entropy (8bit):5.183412708589426
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:EFA9C47D7FBCE84FB812D50665C255E9
                                          SHA1:530653D0A9869676FA29A74A62944B4142D594DB
                                          SHA-256:1AC65CDFC703753AB3F952F5316D5F32F34417106C64A7D7713CBF6DAAEADAD1
                                          SHA-512:2CD7DBA46C9716283466D39D6BE8813660CA965A00BE1875FC76A89979CACD03258FE8C3A6842B023CB2A795573ACE70109F3449BD39CF814BF94DA208631EDF
                                          Malicious:false
                                          Reputation:low
                                          URL:https://app.invoicesimple.com/_next/static/chunks/7182-2e5d9904ca793800.js
                                          Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[7182],{25272:function(t,e,n){!function(t){"use strict";var e={};Object.defineProperty(e,"__esModule",{value:!0});var r,i,a=function(t,e){if(Array.isArray(t))return t;if(Symbol.iterator in Object(t))return function(t,e){var n=[],r=!0,i=!1,a=void 0;try{for(var o,s=t[Symbol.iterator]();!(r=(o=s.next()).done)&&(n.push(o.value),!e||n.length!==e);r=!0);}catch(t){i=!0,a=t}finally{try{!r&&s.return&&s.return()}finally{if(i)throw a}}return n}(t,e);throw TypeError("Invalid attempt to destructure non-iterable instance")},o={getItem:function(t,e){return o.multiGet([t]).then(function(t){return t[0][1]}).then(function(t){return e&&e(null,t),t}).catch(function(t){return e&&e(t,null),t})},setItem:function(t,e,n){return o.multiSet([[t,e]]).then(function(t){return n&&n(null,t),t}).catch(function(t){return n&&n(t,null),t})},getAllKeys:function(t){return Promise.resolve(Object.keys(localStorage)).then(function(e){return t&&t(null,e),e}).catch(functio
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:MS Windows icon resource - 3 icons, 48x48, 8 bits/pixel, 32x32, 8 bits/pixel
                                          Category:downloaded
                                          Size (bytes):7406
                                          Entropy (8bit):2.869464097310577
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:C1AC8E60349D32B430CA47D40044E152
                                          SHA1:C1F4B89260A54409BBD88FA9906402F5FA7EF6C2
                                          SHA-256:FABFAE9CA8F285F1341B50973FF8307760E30876877BB38C158A6BAD52D739E8
                                          SHA-512:737D688AC6678A86855B8525392EE31DD140F7015C6E850576D9076C7EB4F1230407796A4B99F4DA62B77336BFC6C6680292BFF49CAA0C4CDD346118E51702F6
                                          Malicious:false
                                          Reputation:low
                                          URL:https://unifiedxp.invoicesimple.com/favicon.ico
                                          Preview:......00..........6... ......................h.......(...0...`.......................................T~..........Y.......:j......]...........a...............$Y......d...........Jv......+_....../b......4e......8h..........Z...;k......................!W......b.......Cq..Dq..$Z..%Z..........)]......j.......Lw......-`..........1c..........r...S}..5f..........W...........9i..z...........}..............."X..#X..Er..................*^......+^......Mx...a..........Q{........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:Unicode text, UTF-8 text, with very long lines (65534), with no line terminators
                                          Category:downloaded
                                          Size (bytes):167706
                                          Entropy (8bit):5.429768897076069
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:B94B02C214AB456E7380DE3EC4058606
                                          SHA1:273096A6454D1D0D7FB946C7FEECEB03E114857C
                                          SHA-256:9CE804E80B603BA87DEFA355F73EE8168669BCBBBF5B5D5AA22778C81DC883F7
                                          SHA-512:62E8D6C752F1C8028922EFACF2116540B7180887C8660350DBF657D622BF764144C42DDD98A76AC17B7980274C590148D3C6FC00570449FB404BA5D8B6C704A0
                                          Malicious:false
                                          Reputation:low
                                          URL:https://unifiedxp.invoicesimple.com/_next/static/chunks/638-9e78fa04094e014c.js
                                          Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[638],{3885:function(e,t,n){"use strict";n.d(t,{RV:function(){return x},oB:function(){return D},ks:function(){return F},oD:function(){return ew},be:function(){return eC},Ok:function(){return eL},HH:function(){return eS},MW:function(){return ex},$j:function(){return eO},iA:function(){return eK},GV:function(){return eG},PZ:function(){return ej}});var r,o,a,i,l,c,u,s,d,f,p=function(e,t){return(p=Object.setPrototypeOf||({__proto__:[]})instanceof Array&&function(e,t){e.__proto__=t}||function(e,t){for(var n in t)Object.prototype.hasOwnProperty.call(t,n)&&(e[n]=t[n])})(e,t)};function h(e,t){if("function"!=typeof t&&null!==t)throw TypeError("Class extends value "+String(t)+" is not a constructor or null");function n(){this.constructor=e}p(e,t),e.prototype=null===t?Object.create(t):(n.prototype=t.prototype,new n)}var m=function(){return(m=Object.assign||function(e){for(var t,n=1,r=arguments.length;n<r;n++)for(var o in t=arguments[n])Object
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (526), with no line terminators
                                          Category:downloaded
                                          Size (bytes):526
                                          Entropy (8bit):4.844995662196588
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:D96C709017743C0759CF3853D1806BA5
                                          SHA1:72E21587610C49C8305A55E71F73FA88ED618205
                                          SHA-256:BA2338AA6670580269C762F51C4291DAEF913201AA8F4D4FD166C1A878262652
                                          SHA-512:974E260ED8BD1D99628FC3248F07179F6EA228E37A6B9D3EF906DBA57571F2DF54D73F93D1F3460902D28A90BD4793BCA35477B2EF8FBF424B9112147F04BCCF
                                          Malicious:false
                                          Reputation:low
                                          URL:https://js.stripe.com/v3/fingerprinted/js/m-outer-15a2b40a058ddff1cffdb63779fe3de1.js
                                          Preview:!function(){"use strict";var e="https://m.stripe.network",n=window.location.hash,t=/preview=true/.test(n)?"inner-preview.html":"inner.html",o=document.createElement("iframe");o.src="".concat(e,"/").concat(t).concat(n);var i=function(n){if(n.origin===e){var t=window.opener||window.parent||window;if(!t)return;t.postMessage(n.data,"*")}else o.contentWindow.postMessage(n.data,"*")};window.addEventListener?window.addEventListener("message",i,!1):window.attachEvent("onMessage",i),document.body&&document.body.appendChild(o)}();
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:Unicode text, UTF-8 text, with very long lines (36264), with no line terminators
                                          Category:downloaded
                                          Size (bytes):36268
                                          Entropy (8bit):5.483212043229737
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:334DE2D5EB8108409E1D8D6F74AEF692
                                          SHA1:7FEBC8E911F7AAFB14E684379786B1BECC78D031
                                          SHA-256:6B286E77E96DC8341E17970D1A001BBBD31659DDA068FDB18991CEB9D34E36B3
                                          SHA-512:4C725B5E14C0779202F748F671975A45262E295E4E8D4C1982C9842A8E2EA03C06DC306DEFF70B55C20EAD784B4B78858166DC4E4374FB2F2F1EA2AE0F44FC78
                                          Malicious:false
                                          Reputation:low
                                          URL:https://unifiedxp.invoicesimple.com/_next/static/chunks/app/checkout/%5BdocumentId%5D/page-7b8fde0ea6c79b54.js
                                          Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[927],{970:function(e,t,n){Promise.resolve().then(n.bind(n,9019)),Promise.resolve().then(n.t.bind(n,7368,23)),Promise.resolve().then(n.t.bind(n,2317,23)),Promise.resolve().then(n.bind(n,808)),Promise.resolve().then(n.bind(n,2948)),Promise.resolve().then(n.bind(n,7164)),Promise.resolve().then(n.t.bind(n,6527,23)),Promise.resolve().then(n.t.bind(n,8556,23)),Promise.resolve().then(n.t.bind(n,2435,23)),Promise.resolve().then(n.bind(n,416)),Promise.resolve().then(n.bind(n,127)),Promise.resolve().then(n.bind(n,8705)),Promise.resolve().then(n.bind(n,7073)),Promise.resolve().then(n.bind(n,1450)),Promise.resolve().then(n.bind(n,1530)),Promise.resolve().then(n.bind(n,4611))},5472:function(e,t,n){"use strict";n.d(t,{N:function(){return s}});var r=n(8599);function s(e){let{className:t="",children:n,isEligibleForSecurityMsg:s=!1}=e;return(0,r.jsxs)(r.Fragment,{children:[(0,r.jsx)("div",{className:"fixed sm:static bottom-0 bg-white sm:bg-transp
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:JSON data
                                          Category:dropped
                                          Size (bytes):42
                                          Entropy (8bit):4.136248672727249
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:905B1FBB26E082557FF0B3B3553CDA6C
                                          SHA1:8FE0790D6026998BDB2C9FFA3B915952E613E1B4
                                          SHA-256:F249B63CB2FCB66B47E86F906C98F8FD912E82DD035B4E53D7E72FC1960CFD16
                                          SHA-512:284567E83A5C15761498249B27B4B700AA081A65B858F29458E5D0F3DEBDEA93DD5CFAD94EEFAEB43837E70CC288B2A34EA168D2771CB57C993E269C287097CE
                                          Malicious:false
                                          Reputation:low
                                          Preview:{"message":"Missing Authentication Token"}
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:SVG Scalable Vector Graphics image
                                          Category:dropped
                                          Size (bytes):482
                                          Entropy (8bit):5.124307215412433
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:C9ADE0226E23661F5F165E77BA9B1069
                                          SHA1:7CBC31F63F16B852BDEE0916F0C4533122A20269
                                          SHA-256:43095976C80EF7512C375C746E9FD29C4839D7EEFFFDF3E0EA2AE2603FEFDE6E
                                          SHA-512:6EEE32379F9ADEEE56D3EE37442FB6D14E5915AF9CE34D2282ECE75C6EF7B0A63F219C55B8962B060DC6C451A147E3FDC6B67B26994B79607ED802D171BE4AC4
                                          Malicious:false
                                          Reputation:low
                                          Preview:<svg width="21" height="20" viewBox="0 0 21 20" fill="none" xmlns="http://www.w3.org/2000/svg">.<circle opacity="0.5" cx="10.5" cy="10" r="8.5" stroke="white" stroke-width="3"/>.<mask id="mask0_423_5220" style="mask-type:alpha" maskUnits="userSpaceOnUse" x="10" y="0" width="11" height="12">.<path d="M10.5 11.5V0H20.5V11.5H10.5Z" fill="#D9D9D9"/>.</mask>.<g mask="url(#mask0_423_5220)">.<circle opacity="0.5" cx="10.5" cy="10" r="8.5" stroke="white" stroke-width="3"/>.</g>.</svg>.
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (65536), with no line terminators
                                          Category:downloaded
                                          Size (bytes):96484
                                          Entropy (8bit):5.2809201346424866
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:C989E0FC53F9D08E77868A19B131D766
                                          SHA1:F54D8FA6BFD8187974B9D42B52F8B6CBCFAA2EF4
                                          SHA-256:4DB7E8CEF46FE655EBA0F9D8FB04DBF9864A861F2C554DF3B9C9F1BB440DAFDA
                                          SHA-512:D8DF22582804A9A9A59BC92D6251170AE8338F899C8116A21B9F2DFCFDECE00233A03DAB07A2EC226DC7E9B6912179C483D839E2C0645932AC8BCEF5AD9338D4
                                          Malicious:false
                                          Reputation:low
                                          URL:https://unifiedxp.invoicesimple.com/_next/static/chunks/611-e7a2e2094b1fb211.js
                                          Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[611],{3998:function(){"trimStart"in String.prototype||(String.prototype.trimStart=String.prototype.trimLeft),"trimEnd"in String.prototype||(String.prototype.trimEnd=String.prototype.trimRight),"description"in Symbol.prototype||Object.defineProperty(Symbol.prototype,"description",{configurable:!0,get:function(){var e=/\((.*)\)/.exec(this.toString());return e?e[1]:void 0}}),Array.prototype.flat||(Array.prototype.flat=function(e,t){return t=this.concat.apply([],this),e>1&&t.some(Array.isArray)?t.flat(e-1):t},Array.prototype.flatMap=function(e,t){return this.map(e,t).flat()}),Promise.prototype.finally||(Promise.prototype.finally=function(e){if("function"!=typeof e)return this.then(e,e);var t=this.constructor||Promise;return this.then(function(r){return t.resolve(e()).then(function(){return r})},function(r){return t.resolve(e()).then(function(){throw r})})}),Object.fromEntries||(Object.fromEntries=function(e){return Array.from(e).redu
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (9180), with no line terminators
                                          Category:downloaded
                                          Size (bytes):9180
                                          Entropy (8bit):5.511029256965085
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:318F1C0D2D379EF706FE1DD8295140AC
                                          SHA1:3D6088D002F7E37B4C82D1620C8A432675FFE26A
                                          SHA-256:1730D34E997B0D8532B2C5FC3CD08A44DEB7989B6005BD60159299604E8F06FD
                                          SHA-512:828D96CF247CD521E35ECDA6F4DC5B4AA069141B1A521BB82AC31E634186AFB4E989AFF6986FA17E68EEB6A6CDAE08E17D9CF6A6A581CC9683C9D4DF4643A45D
                                          Malicious:false
                                          Reputation:low
                                          URL:https://app.invoicesimple.com/_next/static/css/ee5dd79df2167581.css
                                          Preview:@font-face{font-family:__Marck_Script_ec8c2c;font-style:normal;font-weight:400;font-display:swap;src:url(/_next/static/media/595df8d2a48e75c6-s.woff2) format("woff2");unicode-range:U+0301,U+0400-045f,U+0490-0491,U+04b0-04b1,U+2116}@font-face{font-family:__Marck_Script_ec8c2c;font-style:normal;font-weight:400;font-display:swap;src:url(/_next/static/media/1718b36b58c2b8cb-s.woff2) format("woff2");unicode-range:U+0100-02af,U+0304,U+0308,U+0329,U+1e00-1e9f,U+1ef2-1eff,U+2020,U+20a0-20ab,U+20ad-20cf,U+2113,U+2c60-2c7f,U+a720-a7ff}@font-face{font-family:__Marck_Script_ec8c2c;font-style:normal;font-weight:400;font-display:swap;src:url(/_next/static/media/1d15866986031c98-s.p.woff2) format("woff2");unicode-range:U+00??,U+0131,U+0152-0153,U+02bb-02bc,U+02c6,U+02da,U+02dc,U+0304,U+0308,U+0329,U+2000-206f,U+2074,U+20ac,U+2122,U+2191,U+2193,U+2212,U+2215,U+feff,U+fffd}@font-face{font-family:__Marck_Script_Fallback_ec8c2c;src:local("Arial");ascent-override:92.12%;descent-override:41.05%;line-gap-ov
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:Unicode text, UTF-8 text, with very long lines (65413), with no line terminators
                                          Category:downloaded
                                          Size (bytes):78558
                                          Entropy (8bit):5.4797946303051175
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:C1BC2530C39035C594702078D837A59E
                                          SHA1:9A42A0F0E187BBDD01F5712C3CCB597D4781DAEA
                                          SHA-256:2F3F52EF15FFF3BDA84A616DEEAA52DC6FB3B38D69672997D1D08BE15445AD4F
                                          SHA-512:510ABF69CA8F7B13FE78440CB0BF5BDD0C21E778CDD1FC1BB65DF3CA05BD0D76257D88BE17AF38FDE8AF11AB9A0896F419EFE048223A7A18CCF0BF77B1C68E7B
                                          Malicious:false
                                          Reputation:low
                                          URL:https://app.invoicesimple.com/_next/static/chunks/3377-36c6e853e66d9aba.js
                                          Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[3377],{67824:function(t,e,n){"use strict";n.r(e),n.d(e,{Big:function(){return c.a},ConsentStatus:function(){return $},ConsentType:function(){return K},ContentTypes:function(){return ti},DepositAmounts:function(){return tr},DepositRates:function(){return te},DepositTypes:function(){return tn},DiscountTypes:function(){return V},DocTypes:function(){return ta},InvoiceTermTypes:function(){return Q},ItemDiscountTypes:function(){return z},LEFT_TO_RIGHT_OVERRIDE_CHAR:function(){return U},NON_BREAK_SPACE:function(){return R},ONE_HUNDRED:function(){return T},PassingFeesType:function(){return X},PhotoTypes:function(){return tt},Platform:function(){return I},RIGHT_TO_LEFT_OVERRIDE_CHAR:function(){return L},SettingKeys:function(){return to},SubscriptionTier:function(){return W},TaxTypes:function(){return J},TemplateCodes:function(){return j},ZERO:function(){return w},bigAmount:function(){return y},bigQuantity:function(){return g},bigRate:func
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (12118), with no line terminators
                                          Category:downloaded
                                          Size (bytes):12118
                                          Entropy (8bit):5.450672808095913
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:3099A553A29BC17FB5600369B3A60EE1
                                          SHA1:A3E78E9DCEC0435366FE41E4E32B7E35B1486387
                                          SHA-256:1C276B99448137A0B624791A149EF5F1840EEC6FF7D8C7DF385CED8FBA61F499
                                          SHA-512:5728A84B79C51E9F4774D23BF95E076F60F0BE3E06C99A34C9B710F12F0D2AF9A39E9D0E0AB85E45C7B4BDDA8474006263FAB5960A238AF086576F636C3DCDA3
                                          Malicious:false
                                          Reputation:low
                                          URL:https://unifiedxp.invoicesimple.com/_next/static/chunks/368-c0c03f849cf44d84.js
                                          Preview:"use strict";(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[368],{7368:function(e,t,n){Object.defineProperty(t,"__esModule",{value:!0}),Object.defineProperty(t,"default",{enumerable:!0,get:function(){return y}});let r=n(931),i=n(6733),o=i._(n(2920)),a=r._(n(6898)),l=n(8371),u=n(5038),d=n(7129);n(264);let s=r._(n(4969)),f={deviceSizes:[640,750,828,1080,1200,1920,2048,3840],imageSizes:[16,32,48,64,96,128,256,384],path:"/_next/image",loader:"default",dangerouslyAllowSVG:!1,unoptimized:!1};function c(e){return void 0!==e.default}function p(e){return void 0===e?e:"number"==typeof e?Number.isFinite(e)?e:NaN:"string"==typeof e&&/^[0-9]+$/.test(e)?parseInt(e,10):NaN}function m(e,t,n,r,i,o,a){if(!e||e["data-loaded-src"]===t)return;e["data-loaded-src"]=t;let l="decode"in e?e.decode():Promise.resolve();l.catch(()=>{}).then(()=>{if(e.parentElement&&e.isConnected){if("blur"===n&&o(!0),null==r?void 0:r.current){let t=new Event("load");Object.defineProperty(t,"target",{writable:!1,value:e})
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:Unicode text, UTF-8 text, with very long lines (65530), with no line terminators
                                          Category:downloaded
                                          Size (bytes):598174
                                          Entropy (8bit):5.358486830645653
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:26FB4E6EA0538DF0A70835FF27BCCA6B
                                          SHA1:5BC54E0D68E97D42FF9799E149210D48B2C59A04
                                          SHA-256:2E5F2016DEF030ACFE984093F945627D23ECAA14E1F8E1BD017BBCD600BF3358
                                          SHA-512:1C22DCBF299B4C143FF8A878720CAB66B1546C696CC3D356D432E79A0449C1BBCA80034ABEB71E932F2167DC102A6D5EB6A3F5DB48F46E98F167C1B1242EC6B3
                                          Malicious:false
                                          Reputation:low
                                          URL:https://js.stripe.com/v3
                                          Preview:!function(){function e(t){var n=o[t];if(void 0!==n)return n.exports;var a=o[t]={id:t,loaded:!1,exports:{}};return r[t](a,a.exports,e),a.loaded=!0,a.exports}var t,n,r={723:function(e,t,n){"use strict";function r(e){l.length||(i(),!0),l[l.length]=e}function o(){for(;d<l.length;){var e=d;if(d+=1,l[e].call(),d>1024){for(var t=0,n=l.length-d;t<n;t++)l[t]=l[t+d];l.length-=d,d=0}}l.length=0,d=0,!1}function a(e){return function(){function t(){clearTimeout(n),clearInterval(r),e()}var n=setTimeout(t,0),r=setInterval(t,50)}}e.exports=r;var i,c,s,u,l=[],d=0,p=void 0!==n.g?n.g:self,m=p.MutationObserver||p.WebKitMutationObserver;"function"==typeof m?(c=1,s=new m(o),u=document.createTextNode(""),s.observe(u,{characterData:!0}),i=function(){c=-c,u.data=c}):i=a(o),r.requestFlush=i,r.makeRequestCallFromTimer=a},5937:function(e,t,n){e.exports=n.p+"fingerprinted/img/abnamro-4445e65420800f96f68cfc67a273f66b.svg"},1520:function(e,t,n){e.exports=n.p+"fingerprinted/img/asn-3d9b1bbff2f8f12105510992dbb37ae8.svg
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (26500)
                                          Category:downloaded
                                          Size (bytes):27446
                                          Entropy (8bit):5.164831317561959
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:E37D4BDCD90F4C47CBC2BB2D5B301FB7
                                          SHA1:1245887879B8FA0E12C7EB70C620D18DA4C7097D
                                          SHA-256:CAAAA1E51E12CA154A7FA0401B2871A660BFE5A0C88D74143734CF4E601BA017
                                          SHA-512:862CBAD8DB093C734D215C92D86B647686BB2826639B3D20BF41BF503C12DAFEA532C392B461A8FFB4CCFEF012C95983BDCADD7C0FC23577388F93F60128A706
                                          Malicious:false
                                          Reputation:low
                                          URL:https://unifiedxp.invoicesimple.com/_next/static/chunks/app/checkout/%5BdocumentId%5D/layout-91c1b973544cd36b.js
                                          Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[977],{1401:function(t,e,n){!function(t){"use strict";var e={};Object.defineProperty(e,"__esModule",{value:!0});var r,i,a=function(t,e){if(Array.isArray(t))return t;if(Symbol.iterator in Object(t))return function(t,e){var n=[],r=!0,i=!1,a=void 0;try{for(var o,s=t[Symbol.iterator]();!(r=(o=s.next()).done)&&(n.push(o.value),!e||n.length!==e);r=!0);}catch(t){i=!0,a=t}finally{try{!r&&s.return&&s.return()}finally{if(i)throw a}}return n}(t,e);throw TypeError("Invalid attempt to destructure non-iterable instance")},o={getItem:function(t,e){return o.multiGet([t]).then(function(t){return t[0][1]}).then(function(t){return e&&e(null,t),t}).catch(function(t){return e&&e(t,null),t})},setItem:function(t,e,n){return o.multiSet([[t,e]]).then(function(t){return n&&n(null,t),t}).catch(function(t){return n&&n(t,null),t})},getAllKeys:function(t){return Promise.resolve(Object.keys(localStorage)).then(function(e){return t&&t(null,e),e}).catch(function(
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (430), with no line terminators
                                          Category:downloaded
                                          Size (bytes):430
                                          Entropy (8bit):5.108748436215146
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:EAA0FB36F53C75A89B712A6670AEED95
                                          SHA1:EBC2E73909D5C406B8F53BA91616C9C9796D0BE5
                                          SHA-256:D41FA3E234CD37DADC5F0FB64915B966459F9BF5885ADF0F2AFF84AE461D9AA2
                                          SHA-512:DFB3B21D236F23F1532B0B73AB3552C6561ECFC6C8A0EB19981CCDB566CE798EE52BE89736F719E70DF6E3A731AC4D293B077803B94CB010ED101F3C16E902C0
                                          Malicious:false
                                          Reputation:low
                                          URL:https://app.invoicesimple.com/_next/static/chunks/main-app-725abfaac2b249ed.js
                                          Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[1744],{28847:function(e,n,t){Promise.resolve().then(t.t.bind(t,94673,23)),Promise.resolve().then(t.t.bind(t,99404,23)),Promise.resolve().then(t.t.bind(t,63710,23)),Promise.resolve().then(t.t.bind(t,95453,23)),Promise.resolve().then(t.t.bind(t,14004,23))}},function(e){var n=function(n){return e(e.s=n)};e.O(0,[4648,6800],function(){return n(93166),n(28847)}),_N_E=e.O()}]);
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (10100), with no line terminators
                                          Category:downloaded
                                          Size (bytes):10100
                                          Entropy (8bit):5.5134119305832145
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:D4509EF46D703B2B2B0E6B6BC6528001
                                          SHA1:468C86509268359380073D15541CD9FD1E40C752
                                          SHA-256:DC1A9EC0F8B4905BC465884A15FE68D0B6A4D27B1D44EBCE6E586A28E30F9F9A
                                          SHA-512:2EFBD84782DCED588D811F8EB5984CEECFDA91A862344CFA875A5815822809870191857609CD4E95FDA3883FF9B8D599AFB833C024507AF61A8853EE781920E8
                                          Malicious:false
                                          Reputation:low
                                          URL:https://app.invoicesimple.com/_next/static/chunks/app/(authenticated)/layout-4ca06cf6a692089a.js
                                          Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[2760],{43475:function(e,t,r){Promise.resolve().then(r.bind(r,65601)),Promise.resolve().then(r.bind(r,47443)),Promise.resolve().then(r.bind(r,17934)),Promise.resolve().then(r.bind(r,81633)),Promise.resolve().then(r.bind(r,17582)),Promise.resolve().then(r.bind(r,40498)),Promise.resolve().then(r.bind(r,92931)),Promise.resolve().then(r.bind(r,33563)),Promise.resolve().then(r.bind(r,55413)),Promise.resolve().then(r.bind(r,77813)),Promise.resolve().then(r.bind(r,97598)),Promise.resolve().then(r.bind(r,90948)),Promise.resolve().then(r.bind(r,33753)),Promise.resolve().then(r.bind(r,15812)),Promise.resolve().then(r.bind(r,65285)),Promise.resolve().then(r.bind(r,6476))},33753:function(e,t,r){"use strict";r.r(t),r.d(t,{Navbar:function(){return k}});var n,s,i=r(17821),a=r(42153),l=r.n(a),o=r(49032),c=r(60282),d=r(61375),u=r(33198);let m=u.forwardRef((e,t)=>(0,i.jsx)("svg",{...e,ref:t,width:"32",height:"32",viewBox:"0 0 21 19",fill:"none",xml
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:Unicode text, UTF-8 text, with very long lines (65529), with no line terminators
                                          Category:downloaded
                                          Size (bytes):88751
                                          Entropy (8bit):5.414296471740167
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:69CB7809B5011312E716F29B3D19DCE6
                                          SHA1:833DABFB546D57065AEBA7190B5EE5A2428DFA47
                                          SHA-256:E039E607C78306C7E029A7FD0ECDB14F86456F16E1A5CE65AA26B4FDF1D38A3C
                                          SHA-512:4259C8F940CFE4B7EC384E5ABD855713DA7792A955A7B737B75E45E6559A90292ADE59D7CCAB381EA4C2D0FA5109B4ABD9BFA0887C05C9FB1A27469D5E198A69
                                          Malicious:false
                                          Reputation:low
                                          URL:https://m.stripe.network/out-4.5.43.js
                                          Preview:var StripeM=function(e){var t={};function n(r){if(t[r])return t[r].exports;var _=t[r]={i:r,l:!1,exports:{}};return e[r].call(_.exports,_,_.exports,n),_.l=!0,_.exports}return n.m=e,n.c=t,n.d=function(e,t,r){n.o(e,t)||Object.defineProperty(e,t,{enumerable:!0,get:r})},n.r=function(e){"undefined"!=typeof Symbol&&Symbol.toStringTag&&Object.defineProperty(e,Symbol.toStringTag,{value:"Module"}),Object.defineProperty(e,"__esModule",{value:!0})},n.t=function(e,t){if(1&t&&(e=n(e)),8&t)return e;if(4&t&&"object"==typeof e&&e&&e.__esModule)return e;var r=Object.create(null);if(n.r(r),Object.defineProperty(r,"default",{enumerable:!0,value:e}),2&t&&"string"!=typeof e)for(var _ in e)n.d(r,_,function(t){return e[t]}.bind(null,_));return r},n.n=function(e){var t=e&&e.__esModule?function(){return e.default}:function(){return e};return n.d(t,"a",t),t},n.o=function(e,t){return Object.prototype.hasOwnProperty.call(e,t)},n.p="",n(n.s=30)}([function(e,t,n){"use strict";(function(e){n.d(t,"a",(function(){retur
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:MS Windows icon resource - 3 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
                                          Category:downloaded
                                          Size (bytes):15406
                                          Entropy (8bit):2.4513361307603745
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:F3AC307F429C4D126023888739E20854
                                          SHA1:47890F12AB63F5F77A55C499700BEB439105011A
                                          SHA-256:61C1FDF59B77FA389A553B2B110989123EAF6D7002AEC009CCF9884B834D8235
                                          SHA-512:F5E02C6C7D88F877678FD00449C432871C818CAB5302881C73EECBA0DF26B3661784288CD7520AF5904EEB99F67750D4B399514144B0D89D4F7DD511CD950917
                                          Malicious:false
                                          Reputation:low
                                          URL:https://app.invoicesimple.com/favicon.ico
                                          Preview:............ .h...6... .... .(.......00.... .h&......(....... ..... ........................."X.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."X.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W..$X..%Y.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.........."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W..^...........a..."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W..5e..................0b.."W.."W.."W.."W.."W.."W.."W.."W.."W..#X.........................."W.."W.."W.."W.."W.."W.."W.."W.."W..............U~..l...........d..."W.."W.."W.."W.."W.."W.."W..&Z..q...-_.."W.."W.."W..Lw..........1c.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W..:j.........."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W..-`......g..."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W..&Z......3d.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W..<k.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W.."W
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 164x150, components 3
                                          Category:downloaded
                                          Size (bytes):5212
                                          Entropy (8bit):7.8666087124322575
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:701B1CE9EF7A5917FA27D3EA1BFA2CFD
                                          SHA1:798DF3230A98E8A2C61D347F0AE5C2D7B60804A6
                                          SHA-256:84F3A87933FE0DAB88466BC75A4309B1173FABB9D90D9CC0DF5A8B9D3F8E0D56
                                          SHA-512:FEC47683FC86C66D84395EB7B9C51CECE4DC299E02CB01A4A8F3B71D6472765BE5036F85CE42D7F246183165A4EB0B5A19096F507248A552A4CB521BD3B8E82B
                                          Malicious:false
                                          Reputation:low
                                          URL:"https://d28zjh2pk692s7.cloudfront.net/fetch/b_white,bo_1px_solid_white/e_trim:1/e_sharpen:15,q_auto,c_limit,w_200,h_150/https://invoicemaker2-prod.s3.amazonaws.com/account/1RHgEBd7NU/photo/b3267590-649c-11eb-b6b8-49d50e07dc8b.jpg"
                                          Preview:......JFIF.......................................................... .... %...%-))-969KKd......................"....."3 % % 3-7,),7-Q@88@Q^OJO^qeeq............................4.................................................................c........_..........A.f@...... . .......d.....O.KG..4...Jv;`...6d.`..z:..m......W$.M..u...t=M.+...M.....8.<.....4....u=..fZ[.......5).t.;..j...6d....~.......h..T..pE.=.G.ue.3.<.a_.....j.........A.f@(.9<.U....h.ip...).k...Z.#......<.....~.FEp.2l.......m..DEs...y..V....g...........e.A.f@..RV.)...h.8....o...7z...L...6d..!s..h...Y......&..iy+.q..Y+9.]......w.ji='h..o.~..c2.....&.S._So..8.KI.?;..K..x6F.E._.qW..-....xGdA.f@...........2l.........6d.........2...................?...(............................4T. ..@.!0...........:..Xqlv...j..v...j..v...j..v...j..v...j..v...j..v...j..v...j..v...j..v...6..'...^$o.5.c.^$o.5.c.^$o.5.c.^$o....jq.Hlz..e?.#s.Ns..q.q....n ....<E._)Db.s^f8..F..8.3..g..F)..X.s.....I.(p.u.Rp...?eJs.K!..c..
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:HTML document, ASCII text, with very long lines (930), with no line terminators
                                          Category:downloaded
                                          Size (bytes):930
                                          Entropy (8bit):5.12292712843304
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:06BFCD88AF438673A8BF9B845A11AA6E
                                          SHA1:D024A745032CBE115526ABE648D9FA0F0A10A681
                                          SHA-256:947AC0903521F5ECEEFC90637C066306A8CA67466CCC188BB0107FB7CFB532D1
                                          SHA-512:6A37EA27F3AD16DE6BCB4C386D9F09962902AE2F2FDF76B6723CFF8155CD0B9D4504D1EA6ED3C4D5C9D49BE9C636EB9386BB13C9A787A71F02640A8EC939D180
                                          Malicious:false
                                          Reputation:low
                                          URL:https://m.stripe.network/inner.html
                                          Preview:<!doctype html><html><head><meta charset="utf-8"><title>StripeM-Inner</title></head><body><script>!function(){var e=document.createElement("script");e.defer=!0,e.src="out-4.5.43.js",e.onload=function(){var e;window.StripeM&&(e=window.location.hash,/ping=false/.test(e)||(e=(e=e.match(/version=(4|6)/))?e[1]:"4",window.StripeM.p({t:!0,v:e})),e=function(e){if(window.opener||window.parent||window)try{var i=((t=JSON.parse(e.data)).message||t).action,t=t.message?t.message.payload:t;switch(i){case"ping":window.StripeM.p({t:!0,o:{muid:t.muid,sid:t.sid,referrer:t.referrer,url:t.url,title:t.title,v2:t.v2},v:t.version||"4"});break;case"track":if(!t.source||!t.data)return;window.StripeM.b({muid:t.muid,sid:t.sid,url:t.url,source:t.source,data:t.data},t.version||"4")}}catch(e){}},window.addEventListener?window.addEventListener("message",e,!1):window.attachEvent("onMessage",e))},document.body.appendChild(e)}()</script></body></html>
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (10350)
                                          Category:downloaded
                                          Size (bytes):21591
                                          Entropy (8bit):5.403411125345964
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:3A71BBB8A76ACCCA7177F4B0FFA49124
                                          SHA1:D52DFFFFE19DAA24F695863A0EC9C7DA299C2A9C
                                          SHA-256:E810B838C06BF90210584DF07EDA888035E69562E3383BB65C47B55DB76E55D1
                                          SHA-512:679C6565356E2AB9EA173EE20CFAA8DF545BD5E736D6C738BC2BE14ED184F86B589AA46640844E572DF6DF17E3AB99E95EBEB32100F093C75F77C59EC03E7AA9
                                          Malicious:false
                                          Reputation:low
                                          URL:https://app.invoicesimple.com/_next/static/chunks/app/error-436720edeb91b894.js
                                          Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[7601],{69981:function(e,t,n){Promise.resolve().then(n.bind(n,97479))},60397:function(e,t,n){"use strict";n.d(t,{D:function(){return o},S:function(){return a}});var r=n(88335);let o=(0,r.Ue)((e,t)=>({account:null,subscriptionStatus:null,user:null,setUser:t=>e({user:t}),setAccount:t=>e({account:t}),setSubscriptionStatus:t=>e({subscriptionStatus:t})})),a=e=>{let{account:t,user:n,subscriptionStatus:r}=e;o.getState().setAccount(t),o.getState().setUser(n),o.getState().setSubscriptionStatus(r)}},97479:function(e,t,n){"use strict";n.r(t),n.d(t,{default:function(){return p}});var r=n(17821),o=n(33198),a=n(42204),i=n(60397),u=n(53291);let s=()=>{let{boot:e}=(0,a.o)(),{account:t,user:n}=(0,i.D)();(0,o.useEffect)(()=>{let r=null==n?void 0:n.objectId,o=null==t?void 0:t.objectId,a=o?"".concat("https://admin.staging.getinvoicesimple.com","/account/").concat(o):"unknown";e({actionColor:"rgba(255, 87, 33, 1)",verticalPadding:20,alignment:"right",
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (34420)
                                          Category:downloaded
                                          Size (bytes):34763
                                          Entropy (8bit):5.552024717631589
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:6C53ADC6AE42C7ED45B6F183CE28CA5B
                                          SHA1:48506223F7152CE2D64E414D74D9F79B9492DAEF
                                          SHA-256:4D9EC6D98094AB9A6305F396502484737E737E474568063ED83441340F21F307
                                          SHA-512:7EFCC1AF4FD3660D430D4335F6D708FA4E08C565FD9EE827A2FDAD29B2A9BAB98DD7FF54012E7D149637EBC9144CFF7BB6002E9CE1E29AF6DE47F15DAB7A4E28
                                          Malicious:false
                                          Reputation:low
                                          URL:https://unifiedxp.invoicesimple.com/_next/static/chunks/68-6abdf494e3dda5a4.js
                                          Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[68],{1020:function(e,t,i){"use strict";/**. * @license React. * react-jsx-runtime.production.min.js. *. * Copyright (c) Meta Platforms, Inc. and affiliates.. *. * This source code is licensed under the MIT license found in the. * LICENSE file in the root directory of this source tree.. */var n=i(2920),r=Symbol.for("react.element"),o=Symbol.for("react.fragment"),a=Object.prototype.hasOwnProperty,s=n.__SECRET_INTERNALS_DO_NOT_USE_OR_YOU_WILL_BE_FIRED.ReactCurrentOwner,u={key:!0,ref:!0,__self:!0,__source:!0};function l(e,t,i){var n,o={},l=null,c=null;for(n in void 0!==i&&(l=""+i),void 0!==t.key&&(l=""+t.key),void 0!==t.ref&&(c=t.ref),t)a.call(t,n)&&!u.hasOwnProperty(n)&&(o[n]=t[n]);if(e&&e.defaultProps)for(n in t=e.defaultProps)void 0===o[n]&&(o[n]=t[n]);return{$$typeof:r,type:e,key:l,ref:c,props:o,_owner:s.current}}t.Fragment=o,t.jsx=l,t.jsxs=l},8599:function(e,t,i){"use strict";e.exports=i(1020)},8456:function(e,t,i){e.exports=i(7
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (12301), with no line terminators
                                          Category:downloaded
                                          Size (bytes):12301
                                          Entropy (8bit):5.4209034390717115
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:C627BADA3A1A5FA130597D1C30FF6CAD
                                          SHA1:0422F28439B48E75A6C035FDEBEC6507A231D455
                                          SHA-256:73BF24F8B71248B66002C99CF611D6E98CA65BF518B9354C10ADAD58ECB4E9F2
                                          SHA-512:5E36C136D72741383A3FB557568490C8DF9DC452FF8845108D9E4A646474E3B276FF490A3D87AB9A1920BA8401D63473A332C8C2BE07AB398330C845E2B8C487
                                          Malicious:false
                                          Reputation:low
                                          URL:https://app.invoicesimple.com/_next/static/chunks/6387-15032ff40ad389f8.js
                                          Preview:"use strict";(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[6387],{65285:function(e,t,n){n.r(t),n.d(t,{AlertModal:function(){return u}});var l=n(17821),i=n(33198),s=n(66925),r=n(26350),o=n(57703),a=n(65616),d=n(82156),c=n(92414);let u=()=>{let{alert:e,hideAlert:t}=(0,r.V)(),n=(0,i.useRef)(null),{f:u}=(0,c.Y)();return(0,l.jsx)(o.u,{ref:n,open:!!e&&e.type===s.N.Modal,onClose:()=>{let n=e.onCancel;n&&n(),t()},children:(0,l.jsxs)("section",{className:"sm:p-6 px-4 pb-4 pt-5",children:[(0,l.jsxs)("div",{className:"sm:flex sm:items-start",children:[(0,l.jsx)("div",{className:"mx-auto flex h-12 w-12 flex-shrink-0 items-center justify-center rounded-full bg-red-100 sm:mx-0 sm:h-10 sm:w-10",children:(0,l.jsx)(a.FC,{className:"h-6 w-6 text-red-600","aria-hidden":"true"})}),(0,l.jsxs)("div",{className:"mt-3 text-center sm:ml-4 sm:mt-0 sm:text-left",children:[(0,l.jsx)(d.V.Title,{as:"h3",className:"text-base font-semibold leading-6 text-gray-900",children:null==e?void 0:e.title}),(0,l.jsx
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (417), with no line terminators
                                          Category:downloaded
                                          Size (bytes):417
                                          Entropy (8bit):5.077641948023847
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:ACEDDBBD4D30D0D485D34D850B51F9F8
                                          SHA1:5E5CFC8DF36D8BEF3D6C2FB9BB8F2D3D8BD440B4
                                          SHA-256:66D8A7D8938D3CC0637C85DB9FB6D0536FD37B00EED6C35BA2A94E5BE369C224
                                          SHA-512:29DB9FBE31821982B33E53A6494604CCAE651D2EC9B022360F6CEC2D199949C5984AF6F00C43788DE9C44A5BB4958622AE0ED67A512EAA19FCD12A1AF649721C
                                          Malicious:false
                                          Reputation:low
                                          URL:https://unifiedxp.invoicesimple.com/_next/static/chunks/main-app-aa930dccb9570273.js
                                          Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[744],{385:function(e,n,t){Promise.resolve().then(t.t.bind(t,6611,23)),Promise.resolve().then(t.t.bind(t,9295,23)),Promise.resolve().then(t.t.bind(t,7441,23)),Promise.resolve().then(t.t.bind(t,9430,23)),Promise.resolve().then(t.t.bind(t,5918,23))}},function(e){var n=function(n){return e(e.s=n)};e.O(0,[944,611],function(){return n(2040),n(385)}),_N_E=e.O()}]);
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (3773), with no line terminators
                                          Category:downloaded
                                          Size (bytes):3773
                                          Entropy (8bit):5.2025504672792104
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:06E56ED3924CE500C434965B069E6CD7
                                          SHA1:B76E3DB9CE4477A48CA58E93DBF8BB37BC963759
                                          SHA-256:95183B4ECB6BF4822CFA68AA406694E5128C6A134D70FFAB6BA9C0CCDB3E6F6C
                                          SHA-512:115CDAE929F15F75CF0DA2C6A023E66CF0116BE5A14646EBD4DB4C2346EE398D417B9BB6C804B7869D33B2A7752313066017ACB8AC415B8B9A4A8420062A4BE5
                                          Malicious:false
                                          Reputation:low
                                          URL:https://unifiedxp.invoicesimple.com/_next/static/chunks/webpack-ecb6bbb316e459a5.js
                                          Preview:!function(){"use strict";var e,t,n,r,o,u,i,c,f,a={},l={};function s(e){var t=l[e];if(void 0!==t)return t.exports;var n=l[e]={exports:{}},r=!0;try{a[e].call(n.exports,n,n.exports,s),r=!1}finally{r&&delete l[e]}return n.exports}s.m=a,s.amdO={},e=[],s.O=function(t,n,r,o){if(n){o=o||0;for(var u=e.length;u>0&&e[u-1][2]>o;u--)e[u]=e[u-1];e[u]=[n,r,o];return}for(var i=1/0,u=0;u<e.length;u++){for(var n=e[u][0],r=e[u][1],o=e[u][2],c=!0,f=0;f<n.length;f++)i>=o&&Object.keys(s.O).every(function(e){return s.O[e](n[f])})?n.splice(f--,1):(c=!1,o<i&&(i=o));if(c){e.splice(u--,1);var a=r();void 0!==a&&(t=a)}}return t},s.n=function(e){var t=e&&e.__esModule?function(){return e.default}:function(){return e};return s.d(t,{a:t}),t},n=Object.getPrototypeOf?function(e){return Object.getPrototypeOf(e)}:function(e){return e.__proto__},s.t=function(e,r){if(1&r&&(e=this(e)),8&r||"object"==typeof e&&e&&(4&r&&e.__esModule||16&r&&"function"==typeof e.then))return e;var o=Object.create(null);s.r(o);var u={};t=t||[null
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (7580)
                                          Category:downloaded
                                          Size (bytes):8759
                                          Entropy (8bit):5.366321508143131
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:A3E9B239F620C91092708A76601B8999
                                          SHA1:8F90376935E9150E43171ED68077002D5A0B5F30
                                          SHA-256:6D6FEFBEF7383F5D67D2DB36157CB3914C32FC594D7C34FDC950D83CD54BCB8D
                                          SHA-512:FF19093B0299C07578242534B925A5E9D1037597468F78F5C884E27B8C8157965FE917E49D03F3198283AAF0463D2765855B379DFB37B603975A583C0BF197DE
                                          Malicious:false
                                          Reputation:low
                                          URL:https://static.hotjar.com/c/hotjar-3709745.js?sv=6
                                          Preview:window.hjSiteSettings = window.hjSiteSettings || {"site_id":3709745,"rec_value":0.27999999999999997,"state_change_listen_mode":"automatic","record":true,"continuous_capture_enabled":true,"recording_capture_keystrokes":true,"session_capture_console_consent":true,"anonymize_digits":true,"anonymize_emails":true,"suppress_all":false,"suppress_all_on_specific_pages":[],"suppress_text":false,"suppress_location":false,"user_attributes_enabled":false,"legal_name":null,"privacy_policy_url":null,"deferred_page_contents":[],"record_targeting_rules":[],"feedback_widgets":[],"heatmaps":[],"polls":[],"integrations":{"optimizely":{"tag_recordings":false},"abtasty":{"tag_recordings":false},"kissmetrics":{"send_user_id":false},"mixpanel":{"send_events":false},"unbounce":{"tag_recordings":false},"hubspot":{"enabled":false,"send_recordings":false,"send_surveys":false}},"features":["feedback.embeddable_widget","error_reporting","survey.image_question","feedback.widget_telemetry","feedback.widgetV2","ask.p
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (28915), with no line terminators
                                          Category:downloaded
                                          Size (bytes):28915
                                          Entropy (8bit):5.426400815727363
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:817275D3EBEE7CD78442661B38A16094
                                          SHA1:144BE0E30C75EF571FBE84499DDEA3F4619D8CE6
                                          SHA-256:FF6243DC25EAD29B07182AA3D80A62B4DED681D223989D7D21E10B53876EE1C2
                                          SHA-512:191333138CCFC8FAF5ED9EB97BB124DC038E1644328E0B7758911625C94E05B9B7C9DE5ACBCEA5818A3DF6D45F1D4A7508EB5F3D04D4C0EABCC84E670699F8CD
                                          Malicious:false
                                          Reputation:low
                                          URL:https://app.invoicesimple.com/_next/static/chunks/app/(public)/v/%5BdocumentId%5D/page-7ccc80a9d74b3dd2.js
                                          Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[7836],{90134:function(t,e,i){Promise.resolve().then(i.bind(i,97353)),Promise.resolve().then(i.t.bind(i,88210,23))},97353:function(t,e,i){"use strict";i.r(e),i.d(e,{PublicDocumentFeature:function(){return P}});var n=i(17821),s=i(67824),r=i(92449),a=i(49032),o=i(26449),l=i.n(o),c=i(82156),u=i(77813),d=i(33198),h=i(86074),p=i(92414),f=i(61375),m=i(57703),v=i(27255),x=i(82025),y=i(51268);let b=async t=>{let{accountId:e,estimateId:i,estimateNo:n,estimateUrl:r,toEmail:a,toName:o}=t;await (0,y.K)("/api/v2/email-estimate-signed",{headers:{"Content-Type":s.ContentTypes.APP_JSON},body:JSON.stringify({accountId:e,estimateId:i,estimateNo:n,estimateUrl:r,toEmail:a,toName:o}),cache:"no-cache",method:"POST",isPublic:!0})};var g=i(78359);let w=t=>{let{accountId:e,documentId:i,estimateNo:s,toEmail:r,toName:o,prefilledName:l}=t,{isOpen:y,close:w}=(0,m.d)(),[E,M]=(0,d.useState)(null!=l?l:""),O=0===E.length,S=(0,d.useRef)(null),[T,I]=(0,d.useState)(
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (65536), with no line terminators
                                          Category:downloaded
                                          Size (bytes):80302
                                          Entropy (8bit):5.195605632321911
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:DDF66D492E77FC149633A129F1F09C40
                                          SHA1:233268A822798C5BA360B36C5EEC56574F03B070
                                          SHA-256:41764F6CF1CFA99FAD12F1EE265EA0BB292761F6B15D1F5432756524854CD77F
                                          SHA-512:2E3662E9F6D5B230FF08613E0C4E2C80497950639FFD126D0437D84FDEAB2EA618E42A75434465A4978BBE863F26AEA5739AAED26DA97EEA26DC70D713A730AB
                                          Malicious:false
                                          Reputation:low
                                          URL:https://cdn.rollbar.com/rollbarjs/refs/tags/v2.26.1/rollbar.min.js
                                          Preview:!function(t){var e={};function r(n){if(e[n])return e[n].exports;var o=e[n]={i:n,l:!1,exports:{}};return t[n].call(o.exports,o,o.exports,r),o.l=!0,o.exports}r.m=t,r.c=e,r.d=function(t,e,n){r.o(t,e)||Object.defineProperty(t,e,{enumerable:!0,get:n})},r.r=function(t){"undefined"!=typeof Symbol&&Symbol.toStringTag&&Object.defineProperty(t,Symbol.toStringTag,{value:"Module"}),Object.defineProperty(t,"__esModule",{value:!0})},r.t=function(t,e){if(1&e&&(t=r(t)),8&e)return t;if(4&e&&"object"==typeof t&&t&&t.__esModule)return t;var n=Object.create(null);if(r.r(n),Object.defineProperty(n,"default",{enumerable:!0,value:t}),2&e&&"string"!=typeof t)for(var o in t)r.d(n,o,function(e){return t[e]}.bind(null,o));return n},r.n=function(t){var e=t&&t.__esModule?function(){return t.default}:function(){return t};return r.d(e,"a",e),e},r.o=function(t,e){return Object.prototype.hasOwnProperty.call(t,e)},r.p="",r(r.s=6)}([function(t,e,r){"use strict";var n=r(11),o={};function i(t,e){return e===s(t)}function s
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (17539), with no line terminators
                                          Category:downloaded
                                          Size (bytes):17539
                                          Entropy (8bit):5.363842985022791
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:600AD2201F59D0611965B570A8C2D01F
                                          SHA1:4CF253E08713E8C55F55ADE6ED0C9D65D1C8BCBD
                                          SHA-256:4F4E3265E397B6D9C22662B7060E8AB552A685FCB752083600058F400077125D
                                          SHA-512:9FA09DE203C0811F98B7ACD34C15F3B815D5AC106E239FBBA7578F277693463285FA40046A010E25D47D2A5A2D8F6A300539E3DFEA6387C6D3CC319D67E22680
                                          Malicious:false
                                          Reputation:low
                                          URL:https://app.invoicesimple.com/_next/static/chunks/2449-1f7199864d38d746.js
                                          Preview:"use strict";(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[2449],{51188:function(e,t,n){Object.defineProperty(t,"__esModule",{value:!0}),Object.defineProperty(t,"addLocale",{enumerable:!0,get:function(){return r}}),n(68753);let r=function(e){for(var t=arguments.length,n=Array(t>1?t-1:0),r=1;r<t;r++)n[r-1]=arguments[r];return e};("function"==typeof t.default||"object"==typeof t.default&&null!==t.default)&&void 0===t.default.__esModule&&(Object.defineProperty(t.default,"__esModule",{value:!0}),Object.assign(t.default,t),e.exports=t.default)},92066:function(e,t,n){function r(e,t,n,r){return!1}Object.defineProperty(t,"__esModule",{value:!0}),Object.defineProperty(t,"getDomainLocale",{enumerable:!0,get:function(){return r}}),n(68753),("function"==typeof t.default||"object"==typeof t.default&&null!==t.default)&&void 0===t.default.__esModule&&(Object.defineProperty(t.default,"__esModule",{value:!0}),Object.assign(t.default,t),e.exports=t.default)},13523:function(e,t,n){Object.defin
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:Web Open Font Format (Version 2), TrueType, length 13388, version 1.0
                                          Category:downloaded
                                          Size (bytes):13388
                                          Entropy (8bit):7.983307567011099
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:D47016044A01EBBBEE97AAE820A7CCB4
                                          SHA1:B1D4B90D800FC5FCAE1D8F7071016D4104497422
                                          SHA-256:D71F9B389DE1203D4ADCD9F4F33120707D3048A9E8939AEEE51FC31D7059747D
                                          SHA-512:830017136FC7D35BD39E399224DDB1870EC8293256145D65E8F090C6EFC826F2A3C04097DFA1A6A968089B92802D852447D9BA27C8252D97D79879FC7BFCCF42
                                          Malicious:false
                                          Reputation:low
                                          URL:https://app.invoicesimple.com/_next/static/media/1d15866986031c98-s.p.woff2
                                          Preview:wOF2......4L......|,..3.............................2...`..l.....D..y.....6.$..,. ..:..E..eE!.q@`.5...6.....GQ.8..o.Z.......U....2h[..d...z;.q...Ea..W.26.".E.......`..x..,X8..;...!.L.y22...).Ghr.......}./.$ME,..^'.+U4.?.9U.$;,...).N%.a0..~i.d..[k...."..t.....70.P7z.B.E.L.x.Gzp.'x..`..f!.".(...M... "&.8+.b.6s.(Wn.H..[..s.....#......p............`..UW...UYnD.n.}.^.l........""".=....e...=.o.Z6....6{.T....(.....<$..I..........j?c. ..I.!....2.qf....e....{.....4A....v..[u..U.U...g..3......B......j...&.O....\~.......6....m..O.@..!G"$M._n.".Q[H.P..............,\..).0.......7'....Z..).....c.$B.d...^..Z..^...Z...*.s..j..../W.e.....!4.D..G.cet..!.....P-.l?.....b..,..cld.Qm..zdlw...........$.Rx........$q.=^...|).4..}...K.~....?._d.B .....\.C.. ...At......c..Z.......g-..S"b..?......{....|...?.)h.j..aD.._......c../f.SL...:..'.`L]'....#?......@..2Q.*...R.e...F. .S.?.d...).....@..qk.....1._3A.u4.X..M.....Z.......9.%...{..._....y&..n.l.m.....4.....G..Fm..-
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (36038)
                                          Category:downloaded
                                          Size (bytes):37613
                                          Entropy (8bit):5.277472759301077
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:2DC39CA2DC611835E3797F9E06C43680
                                          SHA1:CDE2E523E649CACBA3061E61F927D229E7A8AC36
                                          SHA-256:0E3392775685A3CB55E5D460B20D104F6092D32E5798A1B10A3ABA5A9E835A35
                                          SHA-512:B27C14C59F86044F29F533F00582854F2C3D38D3A22C529D4D652CCA8114DA705711CFB394B12EAE8AEB3AA238656AC5A878D46BA36A0D7C0DBF62A896C2434D
                                          Malicious:false
                                          Reputation:low
                                          URL:https://app.invoicesimple.com/_next/static/chunks/8688-1a30ccb8d279bece.js
                                          Preview:"use strict";(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[8688],{82156:function(e,t,n){let r,o;n.d(t,{V:function(){return eD}});var l,i,u,a,s,c,d,f,p,m,v,h,g,E,b=n(33198),w=n.t(b,2),y=n(99676),T=n(32420),S=n(15079),L=((l=L||{}).Space=" ",l.Enter="Enter",l.Escape="Escape",l.Backspace="Backspace",l.Delete="Delete",l.ArrowLeft="ArrowLeft",l.ArrowUp="ArrowUp",l.ArrowRight="ArrowRight",l.ArrowDown="ArrowDown",l.Home="Home",l.End="End",l.PageUp="PageUp",l.PageDown="PageDown",l.Tab="Tab",l),P=n(3372),C=n(63495),F=n(90793);let O=null!=(E=b.useId)?E:function(){let e=(0,C.H)(),[t,n]=b.useState(e?()=>F.O.nextId():null);return(0,P.e)(()=>{null===t&&n(F.O.nextId())},[t]),null!=t?""+t:void 0};var M=((i=M||{})[i.None=1]="None",i[i.Focusable=2]="Focusable",i[i.Hidden=4]="Hidden",i);let A=(0,T.yV)(function(e,t){let{features:n=1,...r}=e,o={ref:t,"aria-hidden":(2&n)==2||void 0,style:{position:"fixed",top:1,left:1,width:1,height:0,padding:0,margin:-1,overflow:"hidden",clip:"rect(0, 0, 0, 0)",w
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (42390), with no line terminators
                                          Category:downloaded
                                          Size (bytes):42390
                                          Entropy (8bit):5.352103178112662
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:A171E038FE2E53B85208B275933E38A8
                                          SHA1:2C996F7E3F247CC8F1772C2D3AA8B6AC314C4EF5
                                          SHA-256:D95B91CFE2CE14D628DD5F077648CA33C032E25343AA7D22283A3917E568275E
                                          SHA-512:6667A952246CD4D87E3FD3BEF521A6A8CFF567CB35C46DA593F7BB5DA732C0E7A3367DA0E03A2873F7B1EF7D8016E49257B6EB8194E7E57E225AAEDA446C719B
                                          Malicious:false
                                          Reputation:low
                                          URL:https://app.invoicesimple.com/_next/static/chunks/3226-2fd78a80a59f168b.js
                                          Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[3226],{43247:function(e,t,n){"use strict";n.d(t,{Z:function(){return B}});var o=function(){function e(e){var t=this;this._insertTag=function(e){var n;n=0===t.tags.length?t.insertionPoint?t.insertionPoint.nextSibling:t.prepend?t.container.firstChild:t.before:t.tags[t.tags.length-1].nextSibling,t.container.insertBefore(e,n),t.tags.push(e)},this.isSpeedy=void 0===e.speedy||e.speedy,this.tags=[],this.ctr=0,this.nonce=e.nonce,this.key=e.key,this.container=e.container,this.prepend=e.prepend,this.insertionPoint=e.insertionPoint,this.before=null}var t=e.prototype;return t.hydrate=function(e){e.forEach(this._insertTag)},t.insert=function(e){if(this.ctr%(this.isSpeedy?65e3:1)==0){var t;this._insertTag(((t=document.createElement("style")).setAttribute("data-emotion",this.key),void 0!==this.nonce&&t.setAttribute("nonce",this.nonce),t.appendChild(document.createTextNode("")),t.setAttribute("data-s",""),t))}var n=this.tags[this.tags.length-1];
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (31508)
                                          Category:downloaded
                                          Size (bytes):31735
                                          Entropy (8bit):5.167410644555465
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:8E92188F599B3CED0D26A2414A4B5559
                                          SHA1:0CB7388A25D433F4480D3B226CAEED8187672BA6
                                          SHA-256:DACB80B661144697879B6F60DFCA53EF3116D309EF7BF33CA77717050BAD8043
                                          SHA-512:57249DCA59BD9FDADCD6AE37D1110A3394CD050CD7C841A0A4B076FFEB2ACADBEE2521D149F4D131B2812E6709AC8FB69A7979EB29C0A0164BBF4991FBA32824
                                          Malicious:false
                                          Reputation:low
                                          URL:https://unifiedxp.invoicesimple.com/_next/static/css/eb33d2a86b596fcf.css
                                          Preview:.is-paypal-checkout .credit-card-logos{display:flex;font-size:.75rem;gap:.25rem;line-height:1rem}.is-paypal-checkout .credit-card-logos svg{height:21px;width:35px}/*.! tailwindcss v3.3.2 | MIT License | https://tailwindcss.com.*/.is-paypal-checkout :is(.pc-fixed){position:fixed}.is-paypal-checkout :is(.pc-inset-0){inset:0}.is-paypal-checkout :is(.pc-mx-auto){margin-left:auto;margin-right:auto}.is-paypal-checkout :is(.pc-my-2){margin-bottom:.5rem;margin-top:.5rem}.is-paypal-checkout :is(.pc-mb-4){margin-bottom:1rem}.is-paypal-checkout :is(.pc-ml-1){margin-left:.25rem}.is-paypal-checkout :is(.pc-mr-1){margin-right:.25rem}.is-paypal-checkout :is(.pc-mt-2){margin-top:.5rem}.is-paypal-checkout :is(.pc-mt-3){margin-top:.75rem}.is-paypal-checkout :is(.pc-mt-4){margin-top:1rem}.is-paypal-checkout :is(.pc-inline-block){display:inline-block}.is-paypal-checkout :is(.pc-flex){display:flex}.is-paypal-checkout :is(.pc-inline-flex){display:inline-flex}.is-paypal-checkout :is(.pc-h-10){height:2.5rem}.
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (10654), with no line terminators
                                          Category:downloaded
                                          Size (bytes):10654
                                          Entropy (8bit):5.0573516434541
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:2A975AF0307E7AAEAEA19ADF7F830F21
                                          SHA1:7A0046D480BAF2075907ACDF0CF19C89AB3107E5
                                          SHA-256:FBBF2EE7A2B49E30337FC7145935332715941D44EF6006D2DDA3EDC630140F8E
                                          SHA-512:924AC45B0E025B4CE99B8B4A009762ABE6E7627C5B2EE62E285D5D930609160A827ABE3803F699A9500A83E686AA9875D0EA6DC6B5225D9D8291E636F078F26C
                                          Malicious:false
                                          Reputation:low
                                          URL:https://app.invoicesimple.com/_next/static/chunks/2360-33b9d8391113479e.js
                                          Preview:"use strict";(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[2360],{46699:function(t,e,r){r.d(e,{z:function(){return l}});var s=r(48162),i=r(16337),n=r(99574),u=r(18560),o=r(14978);class l extends u.l{constructor(t,e){super(),this.client=t,this.options=e,this.trackedProps=new Set,this.selectError=null,this.bindMethods(),this.setOptions(e)}bindMethods(){this.remove=this.remove.bind(this),this.refetch=this.refetch.bind(this)}onSubscribe(){1===this.listeners.size&&(this.currentQuery.addObserver(this),c(this.currentQuery,this.options)&&this.executeFetch(),this.updateTimers())}onUnsubscribe(){this.hasListeners()||this.destroy()}shouldFetchOnReconnect(){return a(this.currentQuery,this.options,this.options.refetchOnReconnect)}shouldFetchOnWindowFocus(){return a(this.currentQuery,this.options,this.options.refetchOnWindowFocus)}destroy(){this.listeners=new Set,this.clearStaleTimeout(),this.clearRefetchInterval(),this.currentQuery.removeObserver(this)}setOptions(t,e){let r=this.options,
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:SVG Scalable Vector Graphics image
                                          Category:downloaded
                                          Size (bytes):701
                                          Entropy (8bit):4.545816652381617
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:1A29B4DA4050D6B0E430B96A119D1815
                                          SHA1:484272DD61486644BD9CC3C208211FC501FF243C
                                          SHA-256:BE86FA09BC5890A71459FBB90B58D9AA71141309FCD996577041624A4CF861BD
                                          SHA-512:313A669202915A80DFAECD6E6390027D0D2813803B3232CD7AA1F89317AAC62D8929E613B4C295573B47E757929FE80BA90B94575DAFDAE1037AEAB7C812E4C7
                                          Malicious:false
                                          Reputation:low
                                          URL:https://unifiedxp.invoicesimple.com/is_logo.svg
                                          Preview:<svg width="30" height="30" viewBox="0 0 30 30" fill="none" xmlns="http://www.w3.org/2000/svg">.<path d="M30 0H0V30H30V0Z" fill="#FF5721"/>.<path d="M25.5257 6.36694L14.1809 16.1489L13.8626 16.3805L13.7063 16.4673L13.6079 16.502L13.4921 16.5425L13.4342 16.5599L13.3648 16.5715L13.278 16.5772H13.1159H12.9191L12.8207 16.5715L12.7339 16.5599L12.6528 16.5425L12.5892 16.5252L5.7302 13.8915L5.57971 13.8568L5.50447 13.88L5.42922 13.9552L5.40607 14.0073V14.0768L5.42922 14.1867L5.7302 14.5745L12.786 24.3392L12.8612 24.4028L12.9538 24.4781L13.0985 24.5186L13.2374 24.5244L13.3821 24.4897L13.5095 24.4144L13.6079 24.3218L13.741 24.1771L25.6588 6.50586V6.4364L25.6241 6.36694H25.5257Z" fill="white"/>.</svg>.
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (65536), with no line terminators
                                          Category:downloaded
                                          Size (bytes):230416
                                          Entropy (8bit):5.800868592829604
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:7EC8C7BBA01EFB0FDB40B22DF1D04D84
                                          SHA1:AF120BF024BC4B44434BD4DA63D7A9F64151149C
                                          SHA-256:09E094F7DCB353A989E7BBC42750A8675B22415F8BCF596880AF2B279CAA3BEC
                                          SHA-512:4C35824DA915BF9E35DC3CC621C9A2586079442FA4A38D1A483DF2BACC3014B7AD83AE506B976D905738810BE3CD5AF3BF8BC12AAC52B45CE3C34BFD8DBA9D68
                                          Malicious:false
                                          Reputation:low
                                          URL:https://app.invoicesimple.com/_next/static/chunks/f0728476-82a58bbad1df200f.js
                                          Preview:"use strict";(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[9769],{92449:function(e,t,n){n.d(t,{bW:function(){return f},mw:function(){return aE}});var r=n(33198),l=n(67824),a=n(61289),i=n(51255),m=n(49659),c=n.n(m),o=n(96113),u=n(447),h=n(62111),v=n(28088),s=n(4105),d=n(25832);function p(){return(p=Object.assign?Object.assign.bind():function(e){for(var t=1;t<arguments.length;t++){var n=arguments[t];for(var r in n)Object.prototype.hasOwnProperty.call(n,r)&&(e[r]=n[r])}return e}).apply(this,arguments)}function g(e,t){if(null==e)return{};var n,r,l={},a=Object.keys(e);for(r=0;r<a.length;r++)t.indexOf(n=a[r])>=0||(l[n]=e[n]);return l}var f,E={black:"#000000",white:"#ffffff",lightergray:"#efefef",lightgray:"#bfbfbf",darkgray:"#999999",444:"#444444",333:"#333333"},b={media:{small:"@media screen and (max-width: 599px)",medium:"@media screen and (min-width: 600px) and (max-width: 899px)",large:"@media screen and (min-width: 900px)"},public:{documentShadow:"0 3px 10px rgba(0, 0, 0, 0.1
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (65536), with no line terminators
                                          Category:downloaded
                                          Size (bytes):98244
                                          Entropy (8bit):5.307503179341072
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:932B489FE99C98EAB8589C689D5B01B6
                                          SHA1:69045915E1F86C31F15C8B41451B163AF2D45DF7
                                          SHA-256:046EE0CB1FDB5597B26EB974C0830F03FB3820B55F41EC7A71E00F237B07C90B
                                          SHA-512:EB08121C656392AC6F8E96D219313120B428431848FAAC23D907DAD34570374A75838E05C896C7A9959A1187F183281B76EF17182F04B2D75114E6A39E75944F
                                          Malicious:false
                                          Reputation:low
                                          URL:https://app.invoicesimple.com/_next/static/chunks/6800-85794ae0a22648d6.js
                                          Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[6800],{48840:function(){"trimStart"in String.prototype||(String.prototype.trimStart=String.prototype.trimLeft),"trimEnd"in String.prototype||(String.prototype.trimEnd=String.prototype.trimRight),"description"in Symbol.prototype||Object.defineProperty(Symbol.prototype,"description",{configurable:!0,get:function(){var e=/\((.*)\)/.exec(this.toString());return e?e[1]:void 0}}),Array.prototype.flat||(Array.prototype.flat=function(e,t){return t=this.concat.apply([],this),e>1&&t.some(Array.isArray)?t.flat(e-1):t},Array.prototype.flatMap=function(e,t){return this.map(e,t).flat()}),Promise.prototype.finally||(Promise.prototype.finally=function(e){if("function"!=typeof e)return this.then(e,e);var t=this.constructor||Promise;return this.then(function(r){return t.resolve(e()).then(function(){return r})},function(r){return t.resolve(e()).then(function(){throw r})})}),Object.fromEntries||(Object.fromEntries=function(e){return Array.from(e).re
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:Unicode text, UTF-8 text, with very long lines (65340), with no line terminators
                                          Category:downloaded
                                          Size (bytes):100179
                                          Entropy (8bit):5.386419400548329
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:AE9D951A4F6ED64476BA6B17076B6626
                                          SHA1:6D0A8EC6A483C5736EA9F8CB79F0385727421F39
                                          SHA-256:0F635E220BE351D8766D0B1F53BAC5D7FDAC45992301969C44BB950D63ADBF28
                                          SHA-512:083BF4C20743EE4871683CA7169166560A46779832BA4E49B61AB114D591A301AFD77E06A7B028EC4484404345AB34BE52A531A00ABC97D9A4714E6F64CF0E8F
                                          Malicious:false
                                          Reputation:low
                                          URL:https://app.invoicesimple.com/_next/static/chunks/3608-c7de9a843d33e917.js
                                          Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[3608],{447:function(t,n,r){"use strict";r.r(n),r.d(n,{calculate:function(){return F},getDepositAmount:function(){return U},getDiscount:function(){return b},getDueDate:function(){return f},getEffectivePaidDate:function(){return S},getInvoiceBalance:function(){return k},getInvoiceNonZeroItemsCount:function(){return z},getInvoicePaidSurchargeSum:function(){return P},getInvoiceSurcharge:function(){return q},getInvoiceTax:function(){return O},getInvoiceTaxableSubtotal:function(){return T},getInvoiceTotal:function(){return A},getInvoiceTotalShipping:function(){return D},getInvoiceTotalWithPaidSurcharge:function(){return L},getItemAmount:function(){return v},getItemDiscount:function(){return h},getItemPaymentFees:function(){return $},getItemRateWithPaymentFees:function(){return H},getItemTax:function(){return g},getItemTotal:function(){return _},getLastPaymentDate:function(){return I},getNonTaxableItems:function(){return m},getPaidAmoun
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (47866)
                                          Category:downloaded
                                          Size (bytes):62103
                                          Entropy (8bit):5.56462465037535
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:FAE97BC44766895D4DAFEC2C90F2C5AE
                                          SHA1:EE4B1005C541AFAC545EFF2FDD2DA3B02A6BF934
                                          SHA-256:F90BAA0398E32292689F9333E344B6853F439482753D244730C611313CA212C7
                                          SHA-512:ACC19474BE7189B92DF83B64E9A7DB703114DF5881FE4C6C08F17F38F82A9B9F7352654B22B39EDC77D1CE02C972C41358C9B40322B4D3D69D054744543DA9A1
                                          Malicious:false
                                          Reputation:low
                                          URL:https://app.invoicesimple.com/_next/static/chunks/3270-2d366ff12f2d57a0.js
                                          Preview:"use strict";(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[3270],{50973:function(t,e,r){r.d(e,{kG:function(){return n}});function n(t,e,r){if(void 0===r&&(r=Error),!t)throw new r(e)}},28084:function(t,e,r){function n(t,e){var r=e&&e.cache?e.cache:c,n=e&&e.serializer?e.serializer:u;return(e&&e.strategy?e.strategy:s)(t,{cache:r,serializer:n})}function i(t,e,r,n){var i=null==n||"number"==typeof n||"boolean"==typeof n?n:r(n),o=e.get(i);return void 0===o&&(o=t.call(this,n),e.set(i,o)),o}function o(t,e,r){var n=Array.prototype.slice.call(arguments,3),i=r(n),o=e.get(i);return void 0===o&&(o=t.apply(this,n),e.set(i,o)),o}function s(t,e){var r,n,s=1===t.length?i:o;return r=e.cache.create(),n=e.serializer,s.bind(this,t,r,n)}r.d(e,{A:function(){return h},H:function(){return n}});var u=function(){return JSON.stringify(arguments)};function a(){this.cache=Object.create(null)}a.prototype.get=function(t){return this.cache[t]},a.prototype.set=function(t,e){this.cache[t]=e};var c={create:func
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (65450)
                                          Category:downloaded
                                          Size (bytes):224764
                                          Entropy (8bit):5.379647370757842
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:2A8085A6E35DF0D52338B3148CF33F20
                                          SHA1:0CE3CC2A29BE11C04DF4E53CBDACD17F404907CC
                                          SHA-256:5BDAA2D2FAC01A05DEE8737EC7B70AD184651961D3A3998C1EFA7CF147AE1BA1
                                          SHA-512:22A4710DB6CD83DC6DD0F5BFACB7062AC26FB6597279FF32FE52726B26B804387DFEA7EC3FD842720BD2D77DD6AD9C71B96348AACFEB175F51B271C2B5C423ED
                                          Malicious:false
                                          Reputation:low
                                          URL:https://script.hotjar.com/modules.2472296d2d26f0040059.js
                                          Preview:/*! For license information please see modules.2472296d2d26f0040059.js.LICENSE.txt */.!function(){var e={4788:function(e,t,n){"use strict";n.d(t,{s:function(){return r}});const r=Object.freeze({IDENTIFY_USER:"identify_user",AUTOTAG_RECORDING:"autotag_recording",TAG_RECORDING:"tag_recording",HEATMAP_HELO:"heatmap_helo",RECORDING_HELO:"recording_helo",REPORT_USER_ID:"report_user_id",MUTATION:"mutation",MOUSE_CLICK:"mouse_click",INPUT_CHOICE_CHANGE:"input_choice_change",KEY_PRESS:"key_press",MOUSE_MOVE:"mouse_move",RELATIVE_MOUSE_MOVE:"relative_mouse_move",CLIPBOARD:"clipboard",PAGE_VISIBILITY:"page_visibility",SCROLL_REACH:"scroll_reach",SCROLL:"scroll",SELECT_CHANGE:"select_change",VIEWPORT_RESIZE:"viewport_resize",SCRIPT_PERFORMANCE:"script_performance",REPORT_CONTENT:"report_content",INSERTED_RULE:"inserted_rule",DELETED_RULE:"deleted_rule"})},6939:function(e,t,n){"use strict";n.d(t,{f:function(){return f},W:function(){return g}});const r=Object.freeze({LIVE:"LIVE",REVIEW_WEBAPP:"REVI
                                          No static file info