{
  "version": 3,
  "sources": ["ssg:https://framerusercontent.com/modules/4YbcEreTIp0bxiaV6tuj/dfhD05HTZyVBuZtM2wMq/tQZ7tM3qa-3.js"],
  "sourcesContent": ["import{jsx as e,jsxs as n}from\"react/jsx-runtime\";import*as t from\"react\";export const richText=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Workflow Execution  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Response Times  \"}),/*#__PURE__*/e(\"p\",{children:\"Increased Error Rates\"})]});export const richText1=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Faster Incident Response  \"}),/*#__PURE__*/e(\"p\",{children:\"Streamlined Task Execution  \"}),/*#__PURE__*/e(\"p\",{children:\"Reduced Human Errors\"})]});export const richText2=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"The AI agent analyzes user requests to determine and execute the most suitable workflows. This replaces manual decision-making and execution, reducing time and errors associated with human intervention.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Device Locking\"}),\": In response to security threats, devices are automatically locked through Crowdstrike. If this task is done manually, it involves multiple steps and potential delays, but automation ensures immediate action, enhancing security posture.\"]})}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Phishing Alert Notification\"}),\": Automatically notifying users of phishing threats ensures timely awareness and response. Manual notification processes are slower and prone to oversight, whereas automation guarantees consistent and prompt communication, improving overall security awareness.\"]})]});export const richText3=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Crowdstrike\"}),\": The Crowdstrike API executes security actions such as locking devices in this use case. It provides the necessary interface to perform these tasks automatically, ensuring a swift response to security threats without manual intervention.\"]})}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Mindflow AI Agent\"}),\": The AI agent analyzes user requests and determines the appropriate workflows to execute. It acts as the decision-making engine, selecting the most relevant actions based on the input, streamlining the workflow selection process, and reducing human error.\"]})]});export const richText4=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Generate impersonated bearer tokens for targeted users using Google IAM and OAuth APIs. This automation flow enables seamless execution of enrichment or remediation tasks, enhancing admin capabilities by eliminating manual token generation. Triggered via webhooks, it integrates smoothly into existing workflows.\"})});export const richText5=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Token Generation Effort  \"}),/*#__PURE__*/e(\"p\",{children:\"Limited Admin Task Scope  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Task Execution\"})]});export const richText6=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Efficient Token Generation  \"}),/*#__PURE__*/e(\"p\",{children:\"Expanded Admin Capabilities  \"}),/*#__PURE__*/e(\"p\",{children:\"Faster Task Completion\"})]});export const richText7=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Token Generation for User Impersonation\"}),\": Impersonated bearer tokens are generated for targeted users, enabling tasks that require user-level access without manual token creation. This automation reduces errors and accelerates task execution, enhancing efficiency compared to manual processes.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"JWT Creation for Authentication\"}),\": JWTs are created and used to request impersonated tokens, streamlining authentication processes. This automation reduces the complexity and time involved in manual JWT creation, improving security and operational efficiency.\"]})]});export const richText8=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google IAM\"}),\" is crucial for managing identities and access in the cloud. In this use case, it facilitates the generation of impersonated tokens, allowing tasks to be performed on behalf of users without manual intervention and ensuring secure and efficient identity management.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google OAuth\"}),\": This integration handles the authentication process, enabling secure token exchanges. It also plays a key role in generating bearer tokens for user impersonation, streamlining authentication tasks that would otherwise require manual token management, and thus enhancing security and operational efficiency.\"]})]});export const richText9=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Integrating Google Admin Directory SDK with Slack can revoke user access and enhance security. This flow lists and deletes all user access tokens signs the user out of sessions and suspends the account. Mindflow's automation capabilities can streamline security management and reduce risks.\"})});export const richText10=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Token Revocation  \"}),/*#__PURE__*/e(\"p\",{children:\"User Session Management Delays  \"}),/*#__PURE__*/e(\"p\",{children:\"Security Breach Risks\"})]});export const richText11=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Efficient Token Management  \"}),/*#__PURE__*/e(\"p\",{children:\"Faster User Sign-Out  \"}),/*#__PURE__*/e(\"p\",{children:\"Improved Security Measures\"})]});export const richText12=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Token Revocation\"}),\": Access tokens issued to users are revoked automatically, a process that would otherwise require manual intervention for each token. This automation reduces the risk of unauthorized access and saves time by eliminating the need for manual token management.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"User Sign-Out\"}),\": Users are signed out from all active sessions across devices, a task that would typically involve manual logout procedures. Automating this ensures immediate session termination and enhances security by preventing unauthorized access to user accounts.\"]})}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"User Suspension\"}),\": The process of suspending a user is automated, which would otherwise involve manual steps to update user status. This automation ensures swift action in response to security incidents, reducing the risk of data breaches and maintaining compliance with security policies.\"]})]});export const richText13=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Admin Directory\"}),\": This tool is central to managing user access and security in the workflow. It lists and deletes user access tokens, signs users out of active sessions, and updates user status to suspend accounts. This orchestration ensures efficient and secure user management.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": Users can trigger the automation from Slack using a \",/*#__PURE__*/e(\"em\",{children:\"slash command\"}),\". It allows the workflow to be initiated through a familiar platform, providing a seamless way for team members to engage with the automation without leaving their communication environment.\"]})]});export const richText14=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Endpoint Management\"})});export const richText15=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Investigate devices' DNS resolvers using Jamf Pro and Slack. This flow, triggered by a Slack command, retrieves device details via Jamf Pro, extracts DNS resolver data, and posts results back to Slack. This automation enhances compliance checks and streamlines DNS management.\"})});export const richText16=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual DNS Resolver Checks  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Compliance Reporting  \"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent Data Retrieval\"})]});export const richText17=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Streamlined DNS Data Collection  \"}),/*#__PURE__*/e(\"p\",{children:\"Faster Compliance Verification  \"}),/*#__PURE__*/e(\"p\",{children:\"Improved Data Consistency\"})]});export const richText18=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"DNS Resolver Investigation\"}),\": Devices' DNS resolver details are retrieved using Jamf Pro, replacing manual checks. This automation ensures accurate and timely data collection, reducing the risk of human error and saving time.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack Notification\"}),\": Results are posted directly to Slack, enhancing collaboration and visibility. This replaces manual reporting methods, ensuring that critical information is shared promptly and efficiently.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Cleaning and Formatting\"}),\": DNS data is cleaned and formatted automatically, ensuring consistency and accuracy. This task, often prone to errors when done manually, is streamlined, improving data reliability and reducing administrative burden.\"]})]});export const richText19=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Jamf Pro\"}),\": In this use case, Jamf Pro retrieves devices' DNS resolver details. It acts as the primary source of information, automating the collection of data that would otherwise require manual checks, ensuring accuracy and efficiency.\"]})}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": Slack serves as the communication platform for delivering DNS resolver information. It facilitates real-time notifications to the relevant team members, enhancing collaboration and ensuring critical data is shared promptly and effectively.\"]})]});export const richText20=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Mindflow's scheduled subdomains enumeration and certificates scan automates vulnerability management by integrating Shodan and Google Sheets. This flow identifies subdomains, checks SSL algorithms, and compiles results into a report. It enhances security oversight, streamlines reporting, and facilitates team collaboration through Jira and Teams notifications.\"})});export const richText21=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Subdomain Enumeration Effort  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed SSL Vulnerability Detection  \"}),/*#__PURE__*/e(\"p\",{children:\"Inefficient Reporting and Collaboration\"})]});export const richText22=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Reduced Manual Workload  \"}),/*#__PURE__*/e(\"p\",{children:\"Faster Vulnerability Detection  \"}),/*#__PURE__*/e(\"p\",{children:\"Improved Team Collaboration\"})]});export const richText23=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Subdomain Enumeration and Analysis\"}),\": Subdomains are identified and analyzed for vulnerabilities, typically requiring manual checks and data compilation. Automation ensures comprehensive coverage and faster identification of potential issues, reducing the risk of oversight and saving time.\"]})}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"SSL Certificate Scanning: \"}),\"SSL certificates are scanned for weak algorithms, involving detailed manual inspection. Automation accelerates this process, ensuring timely detection of vulnerabilities and enhancing security posture without the delays associated with manual reviews.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Report Generation and Distribution\"}),\": Findings are compiled into a report and distributed to relevant teams, a task that often involves manual data entry and communication. Automation streamlines this process, ensuring accurate and timely reporting, improving collaboration, and reducing the administrative burden.\"]})]});export const richText24=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Shodan:\"}),\" Identifies and analyzes subdomains and SSL certificates for vulnerabilities. It provides the necessary data to assess potential security risks, which are crucial for maintaining a secure network environment.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Sheets\"}),\": Google Sheets compiles and organizes the findings from the subdomain and SSL certificate analysis. It serves as a central repository for the data, allowing relevant team members to access and review it quickly.\"]})}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Atlassian Jira\"}),\": Jira tracks and manages the vulnerability management process workflow. It ensures that all tasks are monitored and updated in real time, providing transparency and accountability throughout the process.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Microsoft Teams\"}),\": Microsoft Teams facilitates communication and collaboration among team members by notifying them of updates and findings. It ensures that all stakeholders are informed and can take necessary actions promptly.\"]})]});export const richText25=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Continuous network threat hunting with Darktrace and Mindflow integrates Darktrace, CrowdStrike, and Slack. Mindflow automates malware detection and response, enabling proactive quarantine and remediation. This enhances threat detection, streamlines incident management, and improves collaboration through real-time alerts and actions.\"})});export const richText26=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Threat Detection Efforts  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Incident Response Times  \"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent Collaboration Across Teams\"})]});export const richText27=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Faster Threat Detection  \"}),/*#__PURE__*/e(\"p\",{children:\"Streamlined Incident Management  \"}),/*#__PURE__*/e(\"p\",{children:\"Improved Team Collaboration\"})]});export const richText28=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Malware Detection and Response\"}),\": Darktrace scans the network for malware, identifying threats that would typically require manual monitoring. This automation accelerates threat detection, reducing the time needed to identify and respond to potential security breaches.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Quarantine and Remediation\"}),\": When threats are detected, the system can automatically quarantine affected devices and initiate remediation actions through CrowdStrike. This reduces the manual effort required to isolate and address threats, ensuring faster containment and minimizing potential damage.\"]})}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Real-Time Alerts and Collaboration\"}),\": Alerts are sent to Slack, enabling immediate team collaboration and decision-making. This replaces slower, manual communication methods, ensuring that all stakeholders are informed and can act quickly to mitigate threats.\"]})]});export const richText29=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Darktrace\"}),\": In this use case, Darktrace is responsible for scanning the network to detect potential malware threats. It continuously monitors network activity, identifying anomalies that could indicate security breaches, thus playing a critical role in early threat detection.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"CrowdStrike\"}),\": Once a threat is detected, CrowdStrike executes quarantine and remediation actions. It helps isolate affected devices and initiates necessary remediation processes, ensuring that threats are swiftly addressed to prevent further damage.\"]})}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": Slack facilitates real-time communication and collaboration among team members. Slack sends alerts and updates about detected threats, enabling teams to coordinate their response efforts quickly and efficiently.\"]})]});export const richText30=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Map your network using Shodan and Google Sheets. Schedule scans on specific ports to identify running services. Automatically compile findings into a report, enhancing security oversight and streamlining vulnerability management.\"})});export const richText31=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Network Scanning Time  \"}),/*#__PURE__*/e(\"p\",{children:\"Human Error in Reporting  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Security Response\"})]});export const richText32=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Efficient Network Scanning  \"}),/*#__PURE__*/e(\"p\",{children:\"Accurate Reporting  \"}),/*#__PURE__*/e(\"p\",{children:\"Faster Security Response\"})]});export const richText33=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Network Scanning with Shodan\"}),\": Scheduled scans on predefined ports identify running services across the network. This task, typically manual and time-consuming, is streamlined, reducing the risk of oversight and ensuring timely updates on network configurations.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Compilation in Google Sheets\"}),\": Automatically compiling scan results into a structured report in Google Sheets eliminates manual data entry. This automation enhances accuracy, reduces human error, and provides quick access to organized data for analysis and decision-making.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Security Monitoring and Reporting\"}),\": Continuous monitoring for vulnerabilities and misconfigurations ensures proactive security management. This replaces sporadic manual checks, offering consistent oversight and faster response to potential threats, thereby strengthening the overall network security posture.\"]})]});export const richText34=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Shodan\"}),\": In this use case, Shodan scans the network for services running on specified ports. It gathers data on active services, which is essential for identifying potential vulnerabilities and ensuring network security.\"]})}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Sheets\"}),\": Google Sheets is used to compile and organize the data collected from Shodan scans. It provides a structured format for reporting, allowing for easy analysis and sharing of findings, thus replacing manual data entry and report generation.\"]})]});export const richText35=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate network vulnerability management by integrating Shodan, Google Sheets, and Slack. Perform scheduled Shodan queries to detect network misconfigurations. Log results in Google Sheets and notify teams via Slack. Enhance security by identifying vulnerabilities and streamlining reporting, ensuring continuous network oversight.\"})});export const richText36=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Network Scanning Time  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Vulnerability Reporting  \"}),/*#__PURE__*/e(\"p\",{children:\"Missed Security Threats\"})]});export const richText37=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Efficient Network Monitoring  \"}),/*#__PURE__*/e(\"p\",{children:\"Real-Time Threat Detection  \"}),/*#__PURE__*/e(\"p\",{children:\"Streamlined Reporting Process\"})]});export const richText38=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Shodan Query Execution\"}),\": Shodan queries are executed to identify network misconfigurations. Often done manually, this task involves searching for vulnerabilities across network devices. Automating this process reduces the time spent on manual searches and increases the accuracy of identifying potential security threats.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Logging in Google Sheets\"}),\": Results from Shodan queries are automatically logged into Google Sheets. This replaces manual data entry, which can be error-prone and time-consuming. Automation ensures that data is consistently recorded, providing a reliable source for analysis and reporting.\"]})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Team Notification via Slack\"}),\": When vulnerabilities are detected, Slack sends notifications to teams. Traditionally done through emails or meetings, this task is streamlined by automation, ensuring timely alerts and quicker response times to potential security issues.\"]})})]});export const richText39=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/n(\"span\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Shodan\"}),\": In this use case, Shodan performs queries to identify network misconfigurations. It scans network devices for vulnerabilities, providing critical insights into potential security threats. This tool is essential for automating the detection process, which is traditionally manual and time-consuming.\"]})}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Sheets\"}),\": Google Sheets serves as the repository for logging the results of Shodan queries. It captures and organizes data automatically, ensuring that findings are documented consistently. This integration eliminates the need for manual data entry, providing a structured format for analysis and reporting.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": Slack notifies teams when vulnerabilities are detected. It is the communication channel for sending alerts, ensuring that the relevant team members receive timely updates. This integration streamlines the notification process, replacing slower methods like emails or meetings.\"]})]});export const richText40=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Software Monitoring\"})});export const richText41=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Mindflow integrates Jamf Pro, Google Sheets, and Slack to automate monthly scans of macOS devices. It generates detailed reports on persistent software, scripts, and daemons and stores them in Google Sheets. The process enhances security oversight by notifying teams via Slack, ensuring timely awareness and action.\"})});export const richText42=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Monitoring Efforts  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Security Responses  \"}),/*#__PURE__*/e(\"p\",{children:\"Data Entry Errors\"})]});export const richText43=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Streamlined Security Processes  \"}),/*#__PURE__*/e(\"p\",{children:\"Real-Time Threat Alerts  \"}),/*#__PURE__*/e(\"p\",{children:\"Accurate Data Reporting\"})]});export const richText44=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Device Scanning with Jamf Pro\"}),\": Monthly scans of macOS devices are triggered to detect persistent software, scripts, and daemons. This automation replaces manual scanning efforts, reducing the risk of oversight and ensuring consistent security checks across all devices.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Reporting in Google Sheets\"}),\": Scan results are automatically compiled into structured reports in Google Sheets. This eliminates manual data entry, reduces errors, and ensures that security teams have accurate and up-to-date information for analysis.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Team Notification via Slack\"}),\": Security teams receive real-time notifications of scan results through Slack. This automation ensures immediate awareness and response to potential threats, enhancing the team's ability to act swiftly compared to delayed manual notifications.\"]})]});export const richText45=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Jamf Pro\"}),\": In this use case, Jamf Pro initiates monthly scans on macOS devices. It detects persistent software, scripts, and daemons, ensuring all devices are consistently monitored for potential security threats.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Sheets\"}),\": Google Sheets compiles and stores the scan results in a structured format. It provides a centralized location for data reporting, allowing security teams to access accurate and up-to-date information without manual data entry.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": Slack is the communication platform for notifying security teams of scan results. It ensures that teams receive real-time alerts, enabling them to respond promptly to potential threats and maintain a proactive security posture.\"]})]});export const richText46=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Login Security\"})});export const richText47=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate granting backup verification codes when employees lose their 2FA access. It leverages Slack for notifications and decision-making while integrating with Google Admin Directory to retrieve and distribute new codes, enhancing security response times and user support efficiency.\"})});export const richText48=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual access management delays\"}),/*#__PURE__*/e(\"p\",{children:\"Increased ITOps workload\"}),/*#__PURE__*/e(\"p\",{children:\"Potential human-error risks\"})]});export const richText49=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Automated 2FA resolution\"}),/*#__PURE__*/e(\"p\",{children:\"Streamlined ITOps\"}),/*#__PURE__*/e(\"p\",{children:\"Enhanced incident response\"})]});export const richText50=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack Notification and Decision Making\"}),\": The workflow initiates with a Slack notification to IT SecOps when an employee loses 2FA access. This replaces the traditional email or ticket-based reporting system, providing immediate visibility to the issue. The decision to grant a backup code is made directly within Slack, streamlining the approval process and reducing response time significantly compared to manual methods.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"User Information Retrieval\"}),\": The workflow automatically fetches the user's email address from Slack upon approval. This eliminates the need for manual lookup in a separate system, reducing the potential for errors and saving valuable time.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Backup Code Generation and Distribution\"}),\": The system interfaces with Google Admin Directory to retrieve backup verification codes. It then extracts a single code and sends it directly to the user via a private Slack message. This automated process replaces the manual tasks of generating a code, securely communicating it to the user, and documenting the action, significantly reducing the workload on IT staff and minimizing the risk of human error.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Notification of Completion\"}),\": The workflow concludes by sending a confirmation message to the IT SecOps Slack channel to the user that the verification code has been sent. This automated notification ensures all relevant team members are informed without requiring manual updates, enhancing team coordination and maintaining a clear audit trail of actions taken.\"]})]});export const richText51=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": In this use case, Slack serves multiple crucial roles. It acts as the initial trigger point for the workflow when an employee reports lost 2FA access. Slack facilitates decision-making by allowing IT SecOps to approve or deny the backup code request directly within the platform. It also serves as the communication channel for sending the backup verification code to the user and notifying the IT team about the process completion. This integration centralizes communication and streamlines the entire workflow.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"GCP Admin Directory\"}),\": Google Admin Directory retrieves the user's backup verification codes. It interfaces with the organization's Google Workspace account, providing secure access to user management functions. By leveraging Google Admin Directory, the workflow can automatically fetch and manage backup codes without requiring manual access to the admin console, ensuring efficiency and security.\"]})]});export const richText52=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Onboarding automation integrates Google Admin, Okta, Slack, Bitwarden, Hubspot, and GitHub to streamline user account creation, group assignments, and tool provisioning. It reduces manual tasks and ensures secure, scalable employee onboarding while maintaining compliance with organizational access controls across systems.\"})});export const richText53=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Account Setup Time  \"}),/*#__PURE__*/e(\"p\",{children:\"Security Risks from Manual Errors  \"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent Policy Compliance\"})]});export const richText54=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Reduced Onboarding Time  \"}),/*#__PURE__*/e(\"p\",{children:\"Consistent Access Control Across Tools\"}),/*#__PURE__*/e(\"p\",{children:\"SMinimized Configuration and Security Risks\"})]});export const richText55=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"User Creation in Google Admin:\"}),\" A new user is automatically created in Google Admin, reducing manual entry and eliminating the risk of human error. This task, often repetitive and time-consuming, is now executed seamlessly, cutting down administrative workload and ensuring the user is added to the directory without delays.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Access Assignment via Okta: \"}),\"Okta automatically assigns the user to the correct identity and access management (IAM) groups. This task traditionally involves manual approval and cross-checking of user roles, which is prone to mistakes. Automating this step ensures proper access control and compliance, while significantly reducing setup time.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Workspace Provisioning in Slack:\"}),\" The new user is invited to the company\u2019s Slack workspace, allowing them to join team channels and communication platforms instantly. This eliminates manual invites and follow-ups, accelerating collaboration and reducing onboarding friction.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Tool Access Setup with GitHub and Bitwarden:\"}),\" Automatically provisioning user access to essential tools like GitHub and Bitwarden reduces the delays often caused by IT handling individual tool access requests. Automation ensures that employees have the necessary tools from day one, improving productivity and security posture by minimizing the risk of misconfigurations.\"]})]});export const richText56=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Admin:\"}),\" In this use case, Google Admin is responsible for creating the new user account in the organization's directory. By automating this step, the process of adding users to the system is streamlined, ensuring accurate and timely entry into the company's primary identity management platform.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Okta: \"}),\"Okta handles the crucial task of assigning the new user to appropriate identity and access management (IAM) groups. This ensures that users receive the correct permissions based on their roles, maintaining security standards and simplifying what would traditionally be a manual, error-prone process.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack: \"}),\"Slack is used to invite the new user to the company\u2019s communication workspace. Automation here allows for immediate inclusion in relevant channels and teams, removing the need for manual onboarding into communication tools, thus improving onboarding efficiency.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"GitHub: \"}),\"GitHub provides the platform for setting up user access to development repositories. The automated process assigns the necessary permissions and team roles, eliminating the manual setup and ensuring that developers have access to the tools they need without delays.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Bitwarden: \"}),\"Bitwarden is responsible for managing the secure creation and storage of the new user\u2019s credentials. By automating this task, it minimizes security risks associated with manual password management and ensures that users can access sensitive data securely from the start.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Hubspot:\"}),\" Hubspot manages the onboarding of users into the company's CRM system, ensuring that sales and marketing teams can immediately begin leveraging new user profiles. This automation prevents delays in CRM access, improving the efficiency of customer relationship management processes.\"]})]});export const richText57=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Scan for breached accounts using HaveIBeenPwned and automatically update passwords in the Google Admin Directory. Notify via Slack. This integration enhances security by swiftly detecting and mitigating breaches, ensuring password integrity, and prompt communication.\"})});export const richText58=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual breach detection\"}),/*#__PURE__*/e(\"p\",{children:\"Time-consuming password updates\"}),/*#__PURE__*/e(\"p\",{children:\"Delayed breach notifications\"})]});export const richText59=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Fast breach detection\"}),/*#__PURE__*/e(\"p\",{children:\"Automated password updates\"}),/*#__PURE__*/e(\"p\",{children:\"Immediate breach notifications\"})]});export const richText60=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Breach Detection with HaveIBeenPwned\"}),\": The task of scanning for domain breaches using HaveIBeenPwned is automated, replacing the manual effort of regularly checking for breaches. This automation ensures timely and consistent breach detection, reducing the risk of missed alerts and improving overall security.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Password Updates in Google Admin Directory\"}),\": Automating the process of updating user passwords in Google Admin Directory following breach detection eliminates the manual steps involved in password management. This automation enhances security by promptly securing breached accounts and reducing IT teams' administrative burden.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Breach Notification via Slack\"}),\": Automatically sending breach notifications to a designated Slack channel streamlines communication. Instead of relying on manual alerts and emails, this automation ensures immediate notification of the concerned teams, enabling faster response and remediation.\"]})]});export const richText61=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Haveibeenpwned\"}),\": In this use case, Have I Been Pwned scans and identifies breached accounts associated with a domain. It plays a critical role in detecting security vulnerabilities by providing a reliable source for breach information.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Admin Directory\"}),\": Google Admin Directory updates user passwords when a breach is detected. This service ensures that any compromised accounts are secured by automatically changing passwords, reducing the risk of further unauthorized access.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": Slack is used to notify the relevant teams about detected breaches and the actions taken. Sending automated messages to a specified Slack channel ensures prompt communication and allows for immediate awareness and response from the concerned parties.\"]})]});export const richText62=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate the cleanup of inactive users in AWS IAM, Azure Entra ID, and Google Admin using Mindflow. This workflow integrates with Slack, Jira, and AWS CloudTrail to streamline user management, enhance security, and ensure compliance by removing dormant accounts based on login activity analysis.\"})});export const richText63=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual User Account Reviews  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Security Threat Detection  \"}),/*#__PURE__*/e(\"p\",{children:\"Increased Compliance Management Efforts\"})]});export const richText64=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Streamlined User Management  \"}),/*#__PURE__*/e(\"p\",{children:\"Faster Security Response  \"}),/*#__PURE__*/e(\"p\",{children:\"Improved Compliance Tracking\"})]});export const richText65=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"User Cleanup in IAM\"}),\": Inactive users are identified and removed from AWS IAM, Azure Entra ID, and Google Admin. This task, typically requiring manual checks and approvals, is automated to prevent security risks and reduce administrative workload, ensuring timely removal of unnecessary accounts.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Admin Approval via Slack\"}),\": Admins are notified and can approve user deletions directly through Slack. This replaces manual email chains and meetings, speeding up decision-making and ensuring that only authorized actions are taken, enhancing security oversight.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Issue Management with Jira\"}),\": Integration with Jira automates the creation of issues for further investigation of concerning accounts. This replaces manual tracking and follow-ups, ensuring that potential security threats are addressed promptly and efficiently, improving overall incident response times.\"]})]});export const richText66=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"AWS IAM:\"}),\" In this use case, AWS IAM is responsible for managing user identities and access permissions. It serves as the primary platform for identifying and removing inactive users, ensuring that only active and necessary accounts have access to resources.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Azure Entra ID\"}),\": Azure Entra ID plays a similar role to AWS IAM, managing user identities within Microsoft's cloud environment. It helps automate the process of identifying inactive users, reducing the risk of unauthorized access and maintaining a secure identity management system.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Admin\"}),\": Google Admin is used to manage user accounts within Google's ecosystem. It facilitates the automation of user cleanup by identifying dormant accounts, ensuring that only active users have access to Google services, thus enhancing security and compliance.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": Slack is utilized for communication and approval processes. It notifies administrators of potential user deletions and allows them to approve or deny actions directly within the platform, streamlining decision-making and reducing the need for lengthy email exchanges.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Jira\"}),\": Jira is integrated for issue tracking and management. It automatically creates tickets for further investigation of concerning accounts, ensuring that potential security threats are documented and addressed efficiently, replacing manual tracking and follow-up processes.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"AWS CloudTrail\"}),\": AWS CloudTrail provides audit logs and tracks user activity within AWS. It is used to analyze the last API calls for concerned accounts, offering detailed insights into user actions and supporting compliance and security investigations.\"]})]});export const richText67=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate CRM Management\"})});export const richText68=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Integrate HubSpot with Mindflow to automatically find or create contacts. This flow streamlines contact management, ensures data accuracy, and reduces manual tasks, allowing your team to focus on meaningful customer interactions.\"})});export const richText69=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Data Entry Errors  \"}),/*#__PURE__*/e(\"p\",{children:\"Time-Consuming Contact Management  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed CRM Updates\"})]});export const richText70=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Efficient Contact Data Management  \"}),/*#__PURE__*/e(\"p\",{children:\"Real-Time CRM Updates  \"}),/*#__PURE__*/e(\"p\",{children:\"Streamlined Workflow Processes\"})]});export const richText71=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Contact Identification and Creation:\"}),\" HubSpot contacts are identified or created automatically, reducing manual data entry and ensuring accurate CRM records. This automation minimizes errors and accelerates the contact management process, enhancing data reliability and operational efficiency.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Webhook Response Handling\"}),\": Webhook responses are processed to determine contact status, eliminating the need for manual checks. This automation ensures timely updates and accurate information flow, improving decision-making and reducing delays in CRM operations.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Condition-Based Workflow Execution\"}),\": Conditions are evaluated to guide workflow execution, replacing manual decision-making. This automation streamlines processes ensures consistent and efficient operations and frees resources for more strategic tasks.\"]})]});export const richText72=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"HubSpot:\"}),\" In this use case, HubSpot CRM manages contact data. It is the repository where contacts are identified or created, ensuring that CRM records are accurate and up-to-date. This integration automates contact management, reducing manual data entry and errors.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Mindflow AI Agent\"}),\": This AI Agent evaluates conditions within the workflow to guide execution paths. It replaces manual decision-making processes, ensuring that workflows are executed consistently and efficiently, optimizing resource allocation, and enhancing operational efficiency.\"]})]});export const richText73=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Slack Recaps\"})});export const richText74=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Mindflow's Slack Recap Digest streamlines team communication by generating daily AI-driven summaries of public channel messages. This automation enhances productivity by keeping team members informed without manual effort, leveraging Slack API integration for seamless updates.\"})});export const richText75=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Daily Slack Message Recap:\"}),\" AI generates summaries of daily Slack messages, reducing the need for manual review and compilation. This automation ensures consistent updates and saves time, allowing team members to focus on core tasks without missing important information.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Summary Distribution\"}),\": Summaries are automatically distributed to relevant channels, ensuring that all team members receive updates without manual intervention. This enhances communication efficiency and ensures that everyone stays informed without the need for manual message forwarding.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Channel Monitoring\"}),\": The system continuously monitors public Slack channels for new messages, eliminating the need for manual checks. This ensures that all relevant information is captured and included in daily summaries, improving team awareness and reducing the risk of missed updates.\"]})]});export const richText76=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": In this use case, Slack is the primary platform where daily communication occurs. It serves as the source of messages that are summarized and distributed. By integrating with Slack, Mindflow captures all relevant public channel messages, ensuring that team updates are comprehensive and timely.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Mindflow AI Agent\"}),\": The AI Recap Agent is responsible for analyzing and summarizing the daily messages from Slack. It processes the information to create concise summaries, reducing the need for manual review. This tool ensures that team members receive clear and relevant updates without sifting through extensive message logs.\"]})]});export const richText77=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Mindflow streamlines cybersecurity operations by automating the selection and execution of workflows. It processes user requests to identify and trigger appropriate actions, such as locking devices or alerting users about phishing threats, enhancing response efficiency and security posture.\"})});export const richText78=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Workflow Execution  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Threat Response  \"}),/*#__PURE__*/e(\"p\",{children:\"Resource Allocation to Routine Tasks\"})]});export const richText79=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Faster Incident Resolution  \"}),/*#__PURE__*/e(\"p\",{children:\"Improved Threat Detection  \"}),/*#__PURE__*/e(\"p\",{children:\"Optimized Resource Utilization\"})]});export const richText80=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Flow Selection and Execution\"}),\": The system identifies the appropriate workflows based on user requests, such as locking a device or warning a user about phishing. This replaces manual decision-making and execution, reducing response time and minimizing human error.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Device Locking via Crowdstrike\"}),\": Automatically locks a compromised device using the Crowdstrike API. This task, typically requiring manual intervention, is executed swiftly, enhancing security by preventing unauthorized access and mitigating potential threats.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Phishing Alert Notification\"}),\": Sends automatic alerts to users about phishing attempts. This task, which would otherwise rely on manual communication, ensures timely warnings, helping users take immediate action to protect their information.\"]})]});export const richText81=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Crowdstrike\"}),\": In this use case, the Crowdstrike is responsible for executing security actions such as locking compromised devices. It interfaces directly with the system to perform these tasks, eliminating the need for manual intervention and ensuring swift response to security threats.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Mindflow AI Agent\"}),\": The AI agent analyzes incoming requests to determine the most suitable workflows to execute. It acts as the decision-making component, ensuring that each request is matched with the correct automated response, thereby optimizing the workflow selection process.\"]})]});export const richText82=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Insight Extraction\"})});export const richText83=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Mindflow streamlines ideation by automating the analysis of meeting transcripts. It extracts key insights like client challenges, tools, and automation maturity. This data is then organized in Notion, enhancing project qualification and sales processes. This boosts efficiency in SecOps, CloudOps, and other operations.\"})});export const richText84=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Data Entry Errors  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Project Insights  \"}),/*#__PURE__*/e(\"p\",{children:\"Inefficient Resource Allocation\"})]});export const richText85=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Faster Data Processing  \"}),/*#__PURE__*/e(\"p\",{children:\"Accurate Project Insights  \"}),/*#__PURE__*/e(\"p\",{children:\"Optimized Resource Management\"})]});export const richText86=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Transcript Analysis\"}),\": The system extracts key insights from meeting transcripts, identifying client challenges, tools, and automation maturity. This replaces manual analysis, reducing errors and speeding up the process, allowing teams to focus on strategic decision-making rather than data gathering.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Organization in Notion\"}),\": Automatically organizing extracted data into Notion ensures seamless project qualification and sales processes. This task, if done manually, would require significant time and effort, but automation ensures accuracy and quick access to information.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Project Insights Generation\"}),\": By automating the generation of project insights, teams receive timely and accurate information, enhancing decision-making and resource allocation. This contrasts with manual methods that often lead to delays and incomplete data analysis.\"]})]});export const richText87=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Notion\"}),\": Notion acts as the repository for organizing and storing extracted insights from the transcripts. It provides a structured format for data, facilitating easy access and retrieval for project qualification and sales processes.\"]})});export const richText88=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"The use case involves integrating Slack, AWS Comprehend, and OpenAI to anonymize PII in Slack messages before sending them to ChatGPT. This ensures data privacy and compliance while leveraging AI insights, enhancing security and productivity in communication workflows.\"})});export const richText89=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual PII Detection Efforts  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed AI Insights Delivery  \"}),/*#__PURE__*/e(\"p\",{children:\"Increased Compliance Risks\"})]});export const richText90=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Efficient PII Anonymization Process  \"}),/*#__PURE__*/e(\"p\",{children:\"Faster AI Response Times  \"}),/*#__PURE__*/e(\"p\",{children:\"Strengthened Data Compliance\"})]});export const richText91=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"PII Detection and Anonymization:\"}),\" AWS Comprehend identifies personally identifiable information in Slack messages, which is then anonymized before processing. This task, typically requiring manual review and redaction, is automated to enhance data privacy, reduce human error, and ensure compliance with data protection regulations.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"AI Integration for Response Generation\"}),\": Anonymized data is sent to ChatGPT for generating responses. This integration automates the response creation process, which would otherwise involve manual input and analysis, leading to faster response times and improved efficiency in handling queries.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Notification and Compliance Alerts\"}),\": Automated notifications are sent to Slack channels when PII is detected and anonymized. This replaces manual alerts and compliance checks, ensuring timely communication and adherence to data privacy standards without the need for constant human oversight.\"]})]});export const richText92=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": In this use case, Slack acts as the communication platform where the initial command is issued and where notifications are sent. It facilitates seamless interaction between team members and the automation process, ensuring that all communications are centralized and easily accessible.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"AWS Comprehend\"}),\": AWS Comprehend is responsible for detecting personally identifiable information within Slack messages. It analyzes the text to identify sensitive data, which is then anonymized. This tool plays a critical role in maintaining data privacy and compliance with regulations.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"OpenAI\"}),\": OpenAI processes the anonymized data to generate AI-driven responses. It provides the intelligence needed to interpret and respond to queries, enhancing the workflow by delivering insights and answers that would otherwise require manual analysis.\"]})]});export const richText93=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Threat Remediation\"})});export const richText94=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Ingest notifications from ESET Protect to trigger automated incident management. This flow handles ESET alerts, performs device queries, and executes remediation actions. It enhances productivity by automating alert analysis and resolution, integrating with Slack for notifications and follow-ups.\"})});export const richText95=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Alert Handling  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Incident Resolution  \"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent Follow-up Actions\"})]});export const richText96=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Streamlined Alert Management  \"}),/*#__PURE__*/e(\"p\",{children:\"Faster Incident Resolution  \"}),/*#__PURE__*/e(\"p\",{children:\"Consistent Follow-up Actions\"})]});export const richText97=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Notification Ingestion from ESET Protect\"}),\": Notifications from ESET Protect are ingested automatically, reducing the need for manual monitoring and ensuring timely responses to potential threats. This automation minimizes human error and accelerates the incident response process.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Device Query Execution\"}),\": Automated queries to user devices gather necessary information for incident analysis, eliminating the manual effort required to collect data. This speeds up the decision-making process and enhances the accuracy of the response.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Remediation Action Execution\"}),\": Remediation actions are executed based on predefined criteria, ensuring consistent and effective responses to incidents. This automation reduces the time and effort required for manual intervention, improving overall incident management efficiency.\"]})]});export const richText98=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"ESET Protect\"}),\": ESET Protect acts as the source of security notifications, providing alerts about potential threats. It triggers the automation workflow, ensuring that incidents are addressed promptly without manual oversight.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": Slack is used for communication and alerting within the workflow. It sends notifications and updates to the relevant teams, facilitating quick responses and collaboration on incident resolution.\"]})]});export const richText99=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate ICP Generation\"})});export const richText100=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Mindflow streamlines job title categorization by integrating AI to classify LinkedIn profiles into Cyber, IT&Cloud, or None. This automation enhances recruitment efficiency by quickly identifying relevant candidates, leveraging AI capabilities for precise categorization, and reducing manual effort in sorting through job titles.\"})});export const richText101=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Job Title Sorting  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Candidate Identification  \"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent Profile Categorization\"})]});export const richText102=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Faster Candidate Categorization  \"}),/*#__PURE__*/e(\"p\",{children:\"Streamlined Recruitment Process  \"}),/*#__PURE__*/e(\"p\",{children:\"Accurate Profile Matching\"})]});export const richText103=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Job Title Categorization:\"}),\" AI classifies job titles into Cyber, IT&Cloud, or None, reducing manual sorting and ensuring quick, consistent categorization. This automation minimizes errors and accelerates candidate identification, enhancing recruitment efficiency.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Profile Analysis\"}),\": AI analyzes LinkedIn profiles to determine the appropriate category, eliminating the need for manual review. This process ensures accurate matching and speeds up the recruitment cycle, allowing teams to focus on strategic tasks rather than repetitive evaluations.\"]})]});export const richText104=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Mindflow AI Agent\"}),\": In this use case, the AI Agent is responsible for analyzing job titles and LinkedIn profiles. It categorizes profiles into Cyber, IT&Cloud, or None, streamlining the recruitment process by automating what would otherwise be a manual and time-consuming task.\"]})});export const richText105=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Perform weekly scans on quarantined objects using ESET and Mindflow. This automation retrieves quarantined files, analyzes them with Threat Intelligence tools, and posts results on Slack. Users can then purge or restore files, enhancing security management efficiency.\"})});export const richText106=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Quarantine Management  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Threat Response  \"}),/*#__PURE__*/e(\"p\",{children:\"Resource-Intensive Analysis\"})]});export const richText107=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Streamlined Threat Analysis  \"}),/*#__PURE__*/e(\"p\",{children:\"Faster Incident Resolution  \"}),/*#__PURE__*/e(\"p\",{children:\"Optimized Resource Allocation\"})]});export const richText108=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Quarantine Object Retrieval:\"}),\" Quarantined objects are automatically retrieved from ESET, eliminating the need for manual checks. This automation reduces the time spent identifying and collecting files, allowing teams to focus on more critical tasks.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Threat Analysis:\"}),\" Quarantined files are analyzed using multiple Threat Intelligence tools. This automated analysis provides comprehensive insights faster than manual methods, enhancing decision-making and reducing the risk of oversight.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack Notification and Action\"}),\": Results are posted on Slack, enabling quick team collaboration and decision-making. This automation streamlines communication, ensuring that all stakeholders are informed promptly, accelerating response times compared to manual notifications.\"]})]});export const richText109=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"ESET Incident Management\"}),\": In this use case, ESET Incident Management retrieves quarantined objects. It acts as the primary source for identifying files that require further analysis, streamlining the initial step of the threat management process.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Threat Intelligence Tools\"}),\": Tools like VirusTotal, Hybrid Analysis, MalwareBazaar, and HashLookUp CIRCL are used to analyze quarantined files. They provide detailed insights into the potential threats posed by these files, enabling informed decision-making and enhancing the overall security posture.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": Slack is the platform for posting the threat analysis results. It facilitates team collaboration by allowing members to quickly review findings and decide on actions, ensuring a timely and coordinated response.\"]})]});export const richText110=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Notification Ingestion from ESET Protect:\"}),\" Notifications from ESET Protect are ingested automatically, reducing the need for manual monitoring and ensuring timely responses to potential threats. This automation minimizes human error and accelerates the incident response process.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Device Query Execution: \"}),\"Automated queries to user devices gather necessary information for incident analysis, eliminating the manual effort required to collect data. This speeds up the decision-making process and enhances the accuracy of the response.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Remediation Action Execution:\"}),\" Remediation actions are executed based on predefined criteria, ensuring consistent and effective incident response. This automation reduces the time and effort required for manual intervention, improving overall incident management efficiency.\"]})]});export const richText111=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"ESET Protect:\"}),\" ESET Protect is the source of security notifications, providing alerts about potential threats. It triggers the automation workflow, ensuring incidents are promptly addressed without manual oversight. This flow uses Incident Management and Device Management in the ESET Protect suite.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"ESET Incident Management\"}),\": This system tracks and manages incidents throughout their lifecycle. It ensures that each incident is documented, monitored, and resolved efficiently, replacing manual tracking and follow-up processes.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"ESET Device Management\"}),\": Device Management handles automated queries to user devices, gathering necessary data for incident analysis. It streamlines the data collection process, reducing the time and effort required for manual data retrieval.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": Slack is used for communication and alerting within the workflow. It sends notifications and updates to the relevant teams, facilitating quick responses and collaboration on incident resolution.\"]})]});export const richText112=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Manage Google Workspace users with Mindflow by integrating Slack and Google Admin Directory SDK. This automation allows authorized users to delete or suspend users and groups via Slack commands, ensuring efficient user management and real-time notifications in Slack channels.\"})});export const richText113=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual User Management Efforts  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed User Status Updates  \"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent Notification Delivery\"})]});export const richText114=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Streamlined User Management Processes  \"}),/*#__PURE__*/e(\"p\",{children:\"Real-Time Status Notifications  \"}),/*#__PURE__*/e(\"p\",{children:\"Consistent Communication Channels\"})]});export const richText115=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"User Deletion in Google Workspace\"}),\": Authorized users can delete a user from Google Workspace directly through Slack commands. This automation reduces the need for manual intervention, minimizes errors, and accelerates the process, ensuring user accounts are managed efficiently and securely.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"User Suspension and Unsuspension\"}),\": Users can be suspended or unsuspended using Slack commands, streamlining the process and reducing the time spent on manual status updates. This ensures quick response to security needs and maintains user account integrity without manual delays.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Group Management in Google Workspace\"}),\": Groups can be deleted via Slack commands, simplifying group management tasks. This automation reduces administrative overhead and ensures that group structures are kept up-to-date without manual effort, enhancing organizational efficiency.\"]})]});export const richText116=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": In this use case, Slack acts as the interface for executing user management commands. It allows authorized users to initiate actions like user deletion or suspension directly from a communication platform, streamlining the process and enhancing accessibility.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Workspace Admin Directory\"}),\": This tool interfaces with Google Workspace to perform user and group management tasks. It executes commands received from Slack, such as deleting users or groups, ensuring that changes are applied directly to the Google Workspace environment efficiently and accurately.\"]})]});export const richText117=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"The use case involves granting Just in Time (JIT) access to sensitive AWS resources using Mindflow. It integrates AWS SSO and Slack to automate temporary access requests, enhancing cloud security and operational efficiency. This process minimizes manual intervention and reduces security risks.\"})});export const richText118=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Access Management  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Access Revocation  \"}),/*#__PURE__*/e(\"p\",{children:\"Increased Security Risks\"})]});export const richText119=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Streamlined Access Management  \"}),/*#__PURE__*/e(\"p\",{children:\"Real-Time Access Revocation  \"}),/*#__PURE__*/e(\"p\",{children:\"Enhanced Security Controls\"})]});export const richText120=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Access Authorization for AWS Resources\"}),\": Temporary access to AWS resources is granted automatically, reducing the need for manual approvals and minimizing the risk of unauthorized access. This automation ensures timely access for users while maintaining strict security protocols.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Notification via Slack\"}),\": Notifications about access status are sent through Slack, replacing manual communication methods. This integration ensures that users receive real-time updates on their access requests, improving communication efficiency and reducing delays.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Access Revocation\"}),\": Access is automatically revoked after a set period, eliminating the need for manual intervention. This ensures that access is limited to the necessary timeframe, enhancing security and reducing the risk of lingering permissions.\"]})]});export const richText121=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"AWS Single Sign-On (SSO)\"}),\": AWS SSO is central to managing access permissions in this use case through AWS IAM. It handles the assignment and revocation of access to AWS resources, ensuring that users receive the appropriate permissions for a specified duration, thereby enhancing security and compliance.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": Slack acts as the communication channel for notifying users about their access status. It delivers real-time updates on access requests and revocations, ensuring that users are informed promptly, which improves communication efficiency and reduces the need for manual follow-ups.\"]})]});export const richText122=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Compliance\"})});export const richText123=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"This use case automates access review across multiple platforms, generating a comprehensive report for compliance. It collects user data from Google, Slack, BitWarden, Jamf, HubSpot, and Notion, consolidates information in Google Sheets, and uploads to Drata for control assignment.\"})});export const richText124=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Data Collection Time\"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent Access Control Practices\"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Compliance Reporting Process\"})]});export const richText125=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Streamlined Multi-Platform Data Collection\"}),/*#__PURE__*/e(\"p\",{children:\"Enhanced Compliance Reporting Accuracy\"}),/*#__PURE__*/e(\"p\",{children:\"Improved Security Risk Management\"})]});export const richText126=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"User Data Collection\"}),\": Automated gathering of user information from Google, Slack, BitWarden, Jamf, HubSpot, and Notion replaces manual data retrieval from multiple platforms. This consolidation drastically reduces time spent on data collection and eliminates errors associated with manual entry.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Report Generation\"}),\": Creation of a comprehensive access review report in Google Sheets is automated, replacing manual data compilation and formatting. This automation ensures consistency in reporting, reduces human error, and significantly decreases the time required to produce compliance reports.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Compliance Integration\"}),\": Automated upload of the generated report to Drata and assignment to relevant controls streamlines the compliance process. This task replaces manual file uploads and control associations, reducing administrative burden and ensuring timely compliance updates.\"]})]});export const richText127=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google\"}),\" \",/*#__PURE__*/e(\"strong\",{children:\"Admin Directory\"}),\": Google Admin Directory is used to retrieve a list of active users in the organization. It provides essential information about user accounts, including their administrative status and two-factor authentication enrollment.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": Slack is utilized to gather user information, particularly regarding user status (suspended or active) and administrative privileges. This data contributes to a comprehensive view of user access across platforms.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"BitWarden\"}),\": BitWarden provides data on user roles and two-factor authentication status within the password management system. This information is crucial for assessing the security posture of user accounts.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Jamf Pro\"}),\": Jamf Pro supplies device information associated with users, including device models and serial numbers. This data helps in maintaining an inventory of company-issued devices and their association with user accounts.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"HubSpot\"}),\": HubSpot is queried to retrieve user membership and administrative status within the CRM system. This information is vital for understanding user access levels in customer relationship management tools.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Notion\"}),\": Notion is used to verify user membership, contributing to the overall picture of user access across various collaboration and productivity tools.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Sheets\"}),\": Google Sheets serves as the platform for compiling and formatting the collected data into a comprehensive access review report. It provides a structured and easily shareable format for the gathered information.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Drive\"}),\": Google Drive is used to export the generated report, facilitating easy download and sharing of the access review document.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Drata\"}),\": Drata is the final destination for the generated report, where it is uploaded and assigned to relevant compliance controls. This integration streamlines the process of maintaining up-to-date compliance documentation.\"]})]});export const richText128=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Incident Response\"})});export const richText129=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Mindflow integrates Slack with CrowdStrike to swiftly manage and push indicators of compromise to enhance incident response.\"})});export const richText130=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/n(\"p\",{style:{\"--framer-line-height\":\"2em\"},children:[\"Configuration of Automation Workflows\",/*#__PURE__*/e(\"br\",{}),\"Manual Process Proficiency Requirements\",/*#__PURE__*/e(\"br\",{}),\"Adjustment to Automation Tools\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})});export const richText131=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/n(\"p\",{style:{\"--framer-line-height\":\"2em\"},children:[\"Reduced Time to Respond to Threats\",/*#__PURE__*/e(\"br\",{}),\"Enhanced Threat Detection and Management\",/*#__PURE__*/e(\"br\",{}),\"Streamlined Security Processes\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})});export const richText132=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack Command Reception\"}),/*#__PURE__*/e(\"br\",{}),\"Mindflow automates the reception of commands in Slack, which triggers the search for indicators of compromise (IOCs). This immediate response replaces such searches' slower, manual initiation, accelerating the incident response time.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"IOC Extraction and Management\"}),/*#__PURE__*/e(\"br\",{}),\"The automation takes charge of extracting and managing IOCs within Crowdstrike, a process that typically requires manual intervention. Mindflow's integration ensures that IOCs are promptly identified and handled, which is crucial for maintaining robust cybersecurity measures.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Indicator Push to Endpoints\"}),/*#__PURE__*/e(\"br\",{}),\"Mindflow automates the distribution of IOCs to endpoints, which is essential for preventing and mitigating threats. This task, when performed manually, can be slow and prone to errors, especially under the pressure of an active security incident.</p>\"]})});export const richText133=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/n(\"strong\",{children:[\"Slack\",/*#__PURE__*/e(\"br\",{})]}),\"In this use case, Slack is the platform where incident response teams receive and issue commands. Mindflow utilizes Slack's interactive capabilities to initiate and control the workflow, making it accessible right from the team's communication hub.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/n(\"strong\",{children:[\"Crowdstrike\",/*#__PURE__*/e(\"br\",{})]}),\"Crowdstrike is a security tool that provides indicators of compromise (IOCs). Integrated with Mindflow, it ensures that IOCs are automatically managed and pushed to endpoints without manual intervention, thereby speeding up the threat response process.\"]})]});export const richText134=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Credential Management\"})});export const richText135=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Rotate Azure cloud credentials using Microsoft Graph. Automatically generate new passwords and revoke sessions, enhancing security. Streamline service principal configuration management to ensure secure and efficient credential updates.\"})});export const richText136=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual credential updates\"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent security practices\"}),/*#__PURE__*/e(\"p\",{children:\"High risk of breaches\"})]});export const richText137=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Streamlined credential rotation\"}),/*#__PURE__*/e(\"p\",{children:\"Consistent security enforcement\"}),/*#__PURE__*/e(\"p\",{children:\"Reduced breach risk\"})]});export const richText138=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Rotating Service Principal Credentials:\"}),\" Mindflow automates the process of rotating service principal credentials in Azure, which is typically a manual and error-prone task. By integrating with Microsoft Graph, Mindflow ensures that new passwords are generated and added seamlessly. This automation eliminates the need for manual updates, reducing the risk of human error and enhancing security by ensuring credentials are updated regularly and securely.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Revoking Sessions:\"}),\" Mindflow automates session revocation for Azure users, requiring meticulous manual intervention to ensure no unauthorized access remains. Using Microsoft Graph, Mindflow swiftly revokes sessions as needed, ensuring access control policies are strictly enforced. This automation significantly reduces the time and effort required for manual session management, enhancing overall security.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Generating and Resetting Passwords:\"}),\" Mindflow automates Azure password generation and reset processes, which traditionally involve multiple steps and manual coordination. By integrating web apps for password generation and lab services for password resets, Mindflow ensures that these processes are executed swiftly and accurately. Automation saves time and ensures that passwords are managed consistently and securely, reducing the potential for security lapses.\"]})]});export const richText139=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Microsoft Graph for Applications:\"}),\" In this use case, Microsoft Graph for Applications manages service principal configurations. It fetches service principal details and adds new passwords to them. By automating these steps, Mindflow ensures service principals are consistently updated with minimal manual intervention, enhancing security and efficiency.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Microsoft Graph for Users: \"}),\"Microsoft Graph for Users is employed to revoke user sessions in Azure. This tool is crucial in maintaining access control by automatically terminating sessions that should no longer be active. This automation helps prevent unauthorized access and ensures compliance with security policies.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Azure Web Apps\"}),\": Web Apps generate new passwords during the credential rotation. This ensures that the passwords generated meet the required security standards and are created without manual input. Automating this task reduces the likelihood of weak or reused passwords, bolstering overall system security.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Azure ML Lab Services: \"}),\"Lab Services are responsible for resetting passwords in Azure. This service ensures that password reset requests are handled quickly and accurately. By automating this process, Mindflow minimizes the downtime associated with password resets and reduces the administrative burden on IT staff, allowing them to focus on more strategic tasks.\"]})]});export const richText140=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"This use case focuses on automating the investigation and remediation of CSPM alerts through Mindflow. Integrating tools such as Lacework, Jira, AWS S3, IAM, and EC2 Container Registry streamlines the incident management process. This approach reduces manual effort, enhances security posture, and ensures efficient compliance and response to threats.\"})});export const richText141=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Alert Investigation Time  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Threat Remediation  \"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent Compliance Management\"})]});export const richText142=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Reduced Manual Investigation Effort  \"}),/*#__PURE__*/e(\"p\",{children:\"Faster Threat Remediation  \"}),/*#__PURE__*/e(\"p\",{children:\"Consistent Compliance Management\"})]});export const richText143=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Alert Investigation and Categorization:\"}),\" Alerts from Lacework are automatically investigated and categorized, reducing the time spent on manual analysis. This automation ensures that alerts are prioritized correctly, enhancing response efficiency and minimizing the risk of overlooking critical issues.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Incident Ticket Creation in Jira\"}),\": Automatically creating incident tickets in Jira for each alert ensures that all alerts are documented and tracked. This replaces manual ticket creation, streamlining incident management and ensuring no missed alerts, leading to faster resolution times.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Policy Enforcement in AWS:\"}),\" AWS policies, such as S3 bucket policies and IAM roles, are automatically enforced. This automation ensures compliance with security standards, reduces the risk of human error, and maintains a consistent security posture across the organization.\"]})]});export const richText144=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Lacework\"}),\": In this use case, Lacework generates security alerts that trigger the automation workflow. It provides detailed insights into potential security issues, allowing Mindflow to initiate the investigation and remediation process efficiently.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Atlassian Jira\"}),\": Jira creates and manages incident tickets for each alert. It ensures that all security incidents are documented and tracked, provides a centralized platform for incident management, and facilitates communication among team members.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"AWS S3:\"}),\" AWS S3 Control enforces bucket policies, such as public access blocks, to maintain data security. This integration ensures that security policies are consistently applied across all S3 buckets, reducing the risk of unauthorized access.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"AWS IAM\"}),\": AWS IAM manages user access and credentials, ensuring only authorized users can access AWS resources. This integration automates the enforcement of IAM policies, maintaining a secure environment by preventing unauthorized access.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"AWS EC2\"}),\": The EC2 Container Registry manages container images, ensuring they are stored securely. This integration automates the application of security policies to container images, reducing the risk of vulnerabilities in containerized applications.\"]})]});export const richText145=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate CloudOps\"})});export const richText146=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Streamline static website deployment using GitLab and Jira. This use case integrates GitLab for code management and deployment with Jira for issue tracking, enabling teams to automate deployment workflows. It reduces manual effort, accelerates delivery, and ensures consistent updates.\"})});export const richText147=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual website deployment errors\"}),/*#__PURE__*/e(\"p\",{children:\"Delayed updates and fixes\"}),/*#__PURE__*/e(\"p\",{children:\"Inefficient issue tracking and syncing \"})]});export const richText148=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Faster deployment cycles\"}),/*#__PURE__*/e(\"p\",{children:\"Seamless tool integration\"}),/*#__PURE__*/e(\"p\",{children:\"Improved team productivity\"})]});export const richText149=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Static Website Deployment:\"}),\" The workflow automates the deployment of static websites directly from GitLab repositories. Manual deployment often requires repetitive commands and configuration steps, which can introduce errors and delays. Automation ensures a consistent, error-free process and drastically accelerates deployment time.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Issue Tracking with Jira\"}),\": Automated issue tracking in Jira links deployment-related tasks directly to relevant tickets. Manually updating and following up on issues is time-consuming and prone to oversight. Automation streamlines task management improves collaboration and ensures transparency throughout the deployment lifecycle.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Code Update Synchronization\"}),\": The integration synchronizes GitLab code updates with deployment processes. Manual synchronization can lead to miscommunication and version control problems. Automation guarantees that the latest code changes are deployed accurately, enhancing operational efficiency and reducing downtime.\"]})]});export const richText150=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"GitLab\"}),\": In this use case, GitLab acts as the repository and deployment tool for static websites. It handles the storage, versioning, and deployment of code changes. Automation leverages GitLab\u2019s capabilities to streamline the process, ensuring rapid and consistent website updates.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Jira\"}),\": Jira is utilized to track deployment-related tasks and manage any issues that arise during the process. It provides a centralized platform for logging and monitoring progress, replacing manual task management with an organized, transparent workflow that keeps teams aligned and informed.\"]})]});export const richText151=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Cloud Cost Optimization\"})});export const richText152=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"This use case optimizes AWS EC2 costs by automating instance management based on working hours. It leverages Slack for notifications, enabling teams to control cloud resources and efficiently reduce unnecessary expenses during off-hours.\"})});export const richText153=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{style:{\"--framer-line-height\":\"2em\"},children:[\"Initial Setup and Integration\",/*#__PURE__*/e(\"br\",{}),\"Learning Curve for Automation Tools\",/*#__PURE__*/e(\"br\",{}),\"Upfront Investment in Tooling\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]});export const richText154=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{style:{\"--framer-line-height\":\"2em\"},children:[\"Reduced Operational Costs\",/*#__PURE__*/e(\"br\",{}),\"Improved Resource Efficiency\",/*#__PURE__*/e(\"br\",{}),\"Enhanced Security Posture\",/*#__PURE__*/e(\"br\",{}),\"Streamlined Communication\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]});export const richText155=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"AWS EC2 Instance Management\"})}),/*#__PURE__*/n(\"p\",{children:[\"The process automates starting and stopping EC2 instances according to predetermined working hours. This replaces the manual task of turning instances on and off, which can be time-consuming and prone to oversight, potentially leading to unnecessary costs during off-hours.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Automated Reporting in Slack\"})]}),/*#__PURE__*/e(\"p\",{children:\"Sending automated status reports to a Slack channel on the operation and security status of EC2 instances replaces manual compilation and communication of reports. This approach saves time, reduces the risk of oversight, and ensures that all team members are promptly informed about the environment's status, facilitating immediate action when necessary.\"})]});export const richText156=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"AWS EC2\"})}),/*#__PURE__*/e(\"p\",{children:\"Amazon Elastic Compute Cloud (EC2) is the primary service managed in this use case. It provides scalable computing capacity in the cloud. The workflow automatically starts and stops EC2 instances based on defined working hours, optimizing resource usage and costs by ensuring instances are only running when needed.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Slack\"})}),/*#__PURE__*/e(\"p\",{children:\"Slack serves as the communication platform in this workflow. It sends notifications about the status of EC2 instances, including successful starts and stops and any failures encountered during the process. This keeps the team informed without requiring manual checks or updates.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]});export const richText157=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate AWS Management\"})});export const richText158=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Mindflow leverages AWS Config notifications to drive immediate responses in Jira while employing Slack for real-time verification, ensuring swift and accurate remediation actions for AWS infrastructure events.\"})});export const richText159=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{style:{\"--framer-line-height\":\"2em\"},children:[\"Complex Workflow Configuration\",/*#__PURE__*/e(\"br\",{}),\"Training on Automated Procedures\",/*#__PURE__*/e(\"br\",{}),\"System Interoperability Setup\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]});export const richText160=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{style:{\"--framer-line-height\":\"2em\"},children:[\"Decreased Response Time to Incidents\",/*#__PURE__*/e(\"br\",{}),\"Continuous Compliance Enforcement\",/*#__PURE__*/e(\"br\",{}),\"Proactive Infrastructure Remediation\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]});export const richText161=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Receiving AWS Config Notifications\"}),/*#__PURE__*/e(\"br\",{}),\"Mindflow automates the capture of SNS notifications from AWS Config, a process that traditionally might require manual monitoring of AWS Console. This ensures that all changes and compliance statuses are immediately reported without human delay.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Creating Jira Tickets\"}),/*#__PURE__*/e(\"br\",{}),\"On receiving a notification, Mindflow automatically creates a Jira issue detailing the alert. This replaces the manual task of logging issues based on AWS notifications, which can be slow and inconsistent, depending on the workload and availability of the personnel.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/n(\"strong\",{children:[/*#__PURE__*/e(\"br\",{}),\"Slack Verification Messages\"]}),/*#__PURE__*/e(\"br\",{}),\"Mindflow sends verification messages via Slack to confirm the legitimacy of actions reported by AWS Config. Automating this verification process significantly reduces the time taken to confirm incidents, which is crucial for a timely response to potential security or compliance issues.\"]})});export const richText162=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/n(\"strong\",{children:[\"AWS Config\",/*#__PURE__*/e(\"br\",{})]}),\"AWS Config monitors AWS resources and triggers SNS notifications for configuration changes or compliance deviations, serving as the detection mechanism for infrastructure anomalies.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/n(\"strong\",{children:[\"Slack\",/*#__PURE__*/e(\"br\",{})]}),\"Slack acts as the immediate communication platform for verifying and acknowledging the legitimacy of the AWS Config alerts, facilitating quick human intervention when needed.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/n(\"strong\",{children:[\"Atlassian Jira\",/*#__PURE__*/e(\"br\",{})]}),\"Jira serves as the issue tracking system where AWS Config notifications are converted into tickets, providing a structured workflow for addressing and archiving infrastructure issues.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/n(\"strong\",{children:[\"AWS EC2\",/*#__PURE__*/e(\"br\",{})]}),\"AWS EC2 is the service under monitoring, with potential actions taken upon it based on the received notifications and verifications, ensuring the infrastructure is managed proactively.\"]})]});export const richText163=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/n(\"p\",{children:[\"Mindflow automates the management of suspicious login activities in \",/*#__PURE__*/e(\"strong\",{children:\"Okta\"}),\". It enriches security events by checking IP reputations with AbuseIPDB and VirusTotal, geolocates IPs, and provides swift remediation options through Slack for enhanced incident response.\"]})});export const richText164=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{style:{\"--framer-line-height\":\"2em\"},children:[\"Manual Investigation Time\",/*#__PURE__*/e(\"br\",{}),\"Analyst Workload\",/*#__PURE__*/e(\"br\",{}),\"Repetitive Task Frequency\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]});export const richText165=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{style:{\"--framer-line-height\":\"2em\"},children:[\"Streamlined Incident Response\",/*#__PURE__*/e(\"br\",{}),\"Rapid Remediation Actions\",/*#__PURE__*/e(\"br\",{}),\"Enhanced Communication Efficiency\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]});export const richText166=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Okta Login Investigation\"}),/*#__PURE__*/e(\"br\",{}),\"Mindflow automates the initial investigation of suspicious login reports in Okta, traditionally a manual and time-intensive task. By seamlessly integrating with Okta's API, Mindflow immediately ends any active sessions for the reported account, enhancing security posture without the delay of manual intervention.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"IP Reputation Checks\"}),/*#__PURE__*/e(\"br\",{}),\"Utilizing AbuseIPDB and VirusTotal, Mindflow automates the reputation check of the IP associated with the suspicious login. This automatic enrichment process replaces the need for security analysts to manually investigate each IP, thus accelerating the decision-making process for potential threats.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"IP Geolocation\"}),/*#__PURE__*/e(\"br\",{}),\"Mindflow leverages IPinfo to automatically geolocate the suspicious IP address. This task, if performed manually, would add to the response time during a security incident. Automated geolocation provides immediate context, aiding in the swift assessment of the incident's nature and potential impact.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Communication via Slack\"}),/*#__PURE__*/e(\"br\",{}),\"The integration with Slack allows Mindflow to send detailed notifications and await user responses within a familiar communication tool. This automation replaces manual email chains or calls, thereby streamlining the incident response process and ensuring rapid action can be taken.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Remediation Actions\"}),/*#__PURE__*/e(\"br\",{}),\"Mindflow's ability to interact with Okta for updating network zones or adding IPs to a blocklist further automates the remediation steps. This immediate response capability replaces slower, manual update processes that could potentially allow further unauthorized access or compromise.\"]})});export const richText167=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Okta\"})}),/*#__PURE__*/e(\"p\",{children:\"Okta acts as the security gatekeeper in this use case. It reports suspicious logins, allowing Mindflow to automate the process of terminating any active sessions and triggering the security workflow. This integration ensures a proactive stance against potential security breaches.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"AbuseIPDB\"})}),/*#__PURE__*/e(\"p\",{children:\"AbuseIPDB is utilized for checking the reputation of the IP address associated with a suspicious login. It provides valuable data on whether the IP has been reported for malicious activity, enabling Mindflow to automatically assess the threat level.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"VirusTotal\"})}),/*#__PURE__*/e(\"p\",{children:\"VirusTotal complements IP reputation checks by scanning the IP against multiple databases for any related security threats. Its role in the workflow is to further validate the safety or risk of the IP, contributing to an informed decision-making process.\"}),/*#__PURE__*/n(\"p\",{children:[\"I\",/*#__PURE__*/e(\"strong\",{children:\"Pinfo\"})]}),/*#__PURE__*/e(\"p\",{children:\"IPinfo is leveraged to geolocate the IP address in question, providing geographical context to the security event. This information can be pivotal in determining the nature of the suspicious login and is obtained automatically through Mindflow's integration.\"}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/n(\"strong\",{children:[\"Slack\",/*#__PURE__*/e(\"br\",{})]}),\"Slack serves as the communication hub for this use case. It is where alerts are sent, and users can interact directly with the workflow to take further action. This integration centralizes communication, allowing for quick responses and decision-making within a familiar tool.\"]})]});export const richText168=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Optimize AWS EC2 disk space by automating volume size adjustments with Mindflow. Monitor Elastic Block Store usage, identify disks exceeding 90% capacity, and modify volumes to ensure efficient resource management. This streamlined process enhances cloud performance and reduces manual intervention.\"})});export const richText169=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Disk Space Monitoring  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Volume Adjustments  \"}),/*#__PURE__*/e(\"p\",{children:\"Increased Risk of Downtime\"})]});export const richText170=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Efficient Disk Space Management  \"}),/*#__PURE__*/e(\"p\",{children:\"Real-time Volume Adjustments  \"}),/*#__PURE__*/e(\"p\",{children:\"Reduced Downtime Risk\"})]});export const richText171=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Volume Size Modification:\"}),\" This task automatically adjusts the size of AWS EC2 Elastic Block Store volumes when disk usage exceeds 90%. If done manually, this task requires constant monitoring and timely action, which can lead to delays and potential downtime. Automation ensures timely adjustments, optimizing resource use, and minimizing risks.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Disk Usage Monitoring:\"}),\" Monitor disk usage on AWS EC2 instances to identify when usage exceeds a critical threshold. Manual monitoring is prone to oversight and delays, whereas automation provides real-time insights, enabling proactive management and reducing the likelihood of performance issues.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Instance Information Retrieval:\"}),\" Automatically retrieving information about AWS EC2 instances to assess their disk usage and status. Manual retrieval can be time-consuming and error-prone, but automation ensures accurate and up-to-date data, facilitating informed decision-making and efficient resource management.\"]})]});export const richText172=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"AWS EC2:\"}),\" In this use case, AWS EC2 is the primary platform for disk space management. It hosts the instances whose disk usage is monitored and adjusted. EC2 provides the infrastructure that Mindflow interacts with to automate volume size modifications and ensure optimal resource utilization.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Elastic Block Store (EBS):\"}),\" EBS is the storage service used by AWS EC2 instances. It plays a critical role in this use case by providing the volumes whose sizes are adjusted based on usage thresholds. Mindflow automates modifying EBS volume sizes to maintain efficient storage management and prevent capacity issues.\"]})]});export const richText173=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Integrate VMware Carbon Black with PagerDuty, VirusTotal, and Jira to enhance incident response. Automate alert investigation, host isolation, and incident creation. This workflow improves threat detection and response efficiency by streamlining data processing and communication across security tools.\"})});export const richText174=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Alert Investigation Time  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Incident Response  \"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent Incident Documentation\"})]});export const richText175=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Faster Incident Resolution  \"}),/*#__PURE__*/e(\"p\",{children:\"Consistent Alert Documentation  \"}),/*#__PURE__*/e(\"p\",{children:\"Improved Threat Detection\"})]});export const richText176=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Alert Investigation in Carbon Black:\"}),\" Alerts are automatically retrieved and investigated in VMware Carbon Black, which typically requires manual effort to analyze and respond to threats. Automation ensures timely and accurate threat assessment, reducing response times and enhancing security posture.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Incident Creation in PagerDuty:\"}),\" Incidents are created in PagerDuty based on alerts from Carbon Black, eliminating the need for manual incident reporting. This automation streamlines the incident management process, ensuring that critical alerts are promptly escalated and addressed.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Threat Analysis with VirusTotal:\"}),\" File hashes are automatically checked against VirusTotal to determine potential threats, a task that would otherwise involve manual verification. Automation accelerates threat intelligence gathering, providing security teams with actionable insights to mitigate risks effectively.\"]})]});export const richText177=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"VMware Carbon Black:\"}),\" In this use case, VMware Carbon Black detects and alerts about potential security threats. It provides the initial data for investigation, enabling security teams to identify and respond to incidents efficiently.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"PagerDuty:\"}),\" PagerDuty manages incidents triggered by Carbon Black alerts. It facilitates the escalation and notification process, ensuring that incidents are addressed promptly and by the appropriate personnel.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"VirusTotal:\"}),\" VirusTotal is critical in analyzing file hashes to determine potential threats. It provides threat intelligence that helps security teams assess the severity of alerts and take appropriate action.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Jira\"}),\": Jira is used to document and track incident progress. It ensures that all relevant information is recorded and accessible, providing a clear overview of the incident management process and facilitating communication among team members.\"]})]});export const richText178=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Streamline temporary access management for AWS account access using Slack and AWS SSO. It automates user identification, permission assignment, and notification, enhancing security and efficiency by reducing manual intervention and potential errors in access management.\"})});export const richText179=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Access Management \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Access Revocation \"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent Permission Tracking\"})]});export const richText180=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Enhanced Security Compliance \"}),/*#__PURE__*/e(\"p\",{children:\"Faster Access Provisioning \"}),/*#__PURE__*/e(\"p\",{children:\"Streamlined Permission Management\"})]});export const richText181=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Access Provisioning\"}),\": Temporary access to AWS accounts is granted automatically, reducing the time and effort required for manual approval processes. This ensures timely user access while maintaining security protocols, eliminating delays and potential errors associated with manual provisioning.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Permission Assignment\"}),\": Permissions are assigned based on predefined roles and policies, ensuring consistent and accurate access control. This automation minimizes the risk of granting incorrect permissions, enhancing security and compliance with organizational policies.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Notification and Revocation\"}),\": Users are notified of access changes via Slack, and access is revoked automatically after a set duration. This ensures that temporary access does not extend beyond its intended period, maintaining security and reducing the administrative burden of manual revocation.\"]})]});export const richText182=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"AWS SSO:\"}),\" In this use case, AWS SSO manages user identities and access permissions for AWS accounts. It provides a centralized way to assign and revoke temporary access, ensuring users have the appropriate permissions for their roles and streamlining identity management.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": Slack is the communication platform that notifies users about access changes. It delivers real-time updates on access provisioning and revocation, ensuring that users are informed promptly. This integration enhances communication efficiency and reduces the need for manual notifications.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"AWS IAM\"}),\": AWS IAM enforces access control policies and permissions within AWS accounts. It ensures that only authorized users can access specific resources, maintaining security and compliance with organizational policies. This orchestration automates the enforcement of access rules, reducing manual oversight.\"]})]});export const richText183=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Scheduled Domain Scanning and Remediation enhances email security by automating domain scans and breach detection using tools like Have I Been Pwned and Google Admin Directory. It identifies compromised accounts and automates password resets, reducing manual workload and improving incident response times.\"})});export const richText184=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Breach Detection Effort  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Password Reset Actions  \"}),/*#__PURE__*/e(\"p\",{children:\"Increased Security Vulnerability\"})]});export const richText185=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Real-Time Breach Detection  \"}),/*#__PURE__*/e(\"p\",{children:\"Automated Password Resets  \"}),/*#__PURE__*/e(\"p\",{children:\"Enhanced Security Measures\"})]});export const richText186=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Domain Scanning\"}),\": The company's domain is regularly scanned to identify breaches using tools like Have I Been Pwned. This automation replaces manual checks, ensuring timely detection of compromised accounts and reducing the risk of undetected breaches.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Password Reset\"}),\": Automatically resets passwords for breached accounts, minimizing the window of vulnerability. This task, traditionally manual, becomes more efficient, ensuring immediate incident response and enhancing security posture.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Breach Notification\"}),\": This automation sends real-time alerts to designated Slack channels about detected breaches and actions taken. It ensures prompt communication, replacing delayed manual notifications and improving the incident response process.\"]})]});export const richText187=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Have I Been Pwned: \"}),\"This tool scans the company's domain for breaches. It identifies compromised accounts, provides critical data that triggers further actions in the workflow, and replaces manual breach detection efforts.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Admin Directory\"}),\": Google Admin Directory manages user accounts and facilitates automated password resets for breached accounts. This integration ensures that security measures are promptly applied, reducing the risk of unauthorized access.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": Slack is a communication platform for sending real-time alerts about detected breaches and remediation actions. It ensures that relevant stakeholders are immediately informed, enhancing the incident response process.\"]})]});export const richText188=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Perform scheduled Application-Specific Password (ASPs) reviews using Google Admin and Slack. Enhance security posture by efficiently managing ASPs, reducing manual oversight, and ensuring timely updates and deletions.\"})});export const richText189=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual ASP Review Process  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Security Updates  \"}),/*#__PURE__*/e(\"p\",{children:\"Increased Risk of Breaches\"})]});export const richText190=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Streamlined ASP Management  \"}),/*#__PURE__*/e(\"p\",{children:\"Timely Security Updates  \"}),/*#__PURE__*/e(\"p\",{children:\"Reduced Breach Risks\"})]});export const richText191=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"User Data Retrieval:\"}),\" Automatically gather active user data from Google Admin, eliminating the need for manual data collection. This automation ensures accuracy and saves time, allowing teams to focus on more critical tasks rather than routine data gathering.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"ASP Listing:\"}),\" Generate a list of Application-Specific Passwords issued by users, streamlining the identification and management of ASPs. If done manually, this task can be time-consuming and prone to errors, whereas automation ensures comprehensive and up-to-date listings.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Notification Process:\"}),\" Send automated notifications via Slack to alert teams about ASP reviews. This replaces manual communication efforts, ensuring timely and consistent updates, enhancing team responsiveness, and reducing oversight risks.\"]})]});export const richText192=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Admin:\"}),\" In this use case, Google Admin is utilized to retrieve active user data and manage Application-Specific Passwords (ASPs). It serves as the primary source for user information, enabling automated data collection and ASP management, which reduces manual administrative tasks and enhances data accuracy.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack:\"}),\" Slack sends automated notifications to teams regarding ASP reviews. It acts as the communication channel, ensuring that updates are delivered promptly and consistently. This integration facilitates timely alerts and enhances team collaboration by replacing manual notification processes.\"]})]});export const richText193=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Phishing email analysis with Mindflow integrates EmailRep, UrlScan.io, and VirusTotal to automate threat detection. It extracts URLs and attachments from emails, assesses the sender's reputation, and scans for malicious content. The results are compiled into a report and shared via Slack to inform the team and prompt necessary actions.\"})});export const richText194=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Email Threat Analysis  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Incident Response  \"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent Security Reporting\"})]});export const richText195=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Faster Threat Detection  \"}),/*#__PURE__*/e(\"p\",{children:\"Consistent Security Reporting  \"}),/*#__PURE__*/e(\"p\",{children:\"Improved Incident Response\"})]});export const richText196=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"URL Extraction and Analysis\"}),\": URLs embedded in emails are automatically extracted and analyzed for potential threats. If done manually, this task requires significant time and effort to identify and assess each link, whereas automation ensures rapid and consistent threat detection.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Attachment Scanning\"}),\": Email attachments are scanned for malicious content using integrated tools. Manual scanning is prone to oversight and delays, but automation provides thorough and immediate analysis, enhancing security posture by quickly identifying threats.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Email Reputation Check:\"}),\" To identify potential phishing attempts, email senders' reputations are checked. Manual checks are labor-intensive and inconsistent, while automation delivers swift and reliable assessments, improving response times and reducing the risk of phishing attacks.\"]})]});export const richText197=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"EmailRep\"}),\": In this use case, EmailRep is responsible for checking the reputation of email senders. It helps identify potential phishing attempts by assessing the sender's credibility, which is crucial for preventing attacks and ensuring email security.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"UrlScan.io:\"}),\" UrlScan.io scans and analyzes URLs found in emails. It plays a vital role in detecting malicious links, providing a detailed analysis of the URLs to identify threats, and enhancing the overall security posture.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"VirusTotal:\"}),\" VirusTotal scans email attachments for malicious content. It ensures that any files attached to emails are thoroughly checked for threats, reducing the risk of malware infections and improving security measures.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack:\"}),\" Slack serves as the communication channel for sharing the analysis results. It ensures the security team is promptly informed about potential threats, facilitating quick response and action to mitigate risks.\"]})]});export const richText198=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Integrate Noname Security with Splunk to streamline issue management. Fetch issues and evidence from Noname Security, process them, and create events in Splunk. This automation enhances security operations by ensuring timely data processing and efficient incident response.\"})});export const richText199=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Data Processing Time  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Incident Response  \"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent Data Handling\"})]});export const richText200=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Faster Incident Resolution  \"}),/*#__PURE__*/e(\"p\",{children:\"Consistent Data Processing  \"}),/*#__PURE__*/e(\"p\",{children:\"Improved Security Operations\"})]});export const richText201=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Fetching Issues from Noname Security:\"}),\" Issues are automatically retrieved from Noname Security, which typically requires manual effort to gather and review data. Automation ensures timely and accurate data collection, reducing the risk of oversight and enhancing response times.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Processing Evidence in Splunk:\"}),\" Evidence associated with issues is processed in Splunk, eliminating the need for manual data entry and analysis. This automation accelerates the incident response process, ensuring that relevant data is available for analysis without delay.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Creating Events in Splunk: \"}),\"Events are created in Splunk using the processed evidence, a task that would otherwise involve manual input and configuration. Automation streamlines this process, ensuring consistent and accurate event creation and enhancing security operations' overall efficiency.\"]})]});export const richText202=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Noname Security\"}),\": In this use case, Noname Security is responsible for providing the issues and evidence that need to be processed. It acts as the source of security data, crucial for identifying and addressing potential threats. Automation ensures that this data is fetched efficiently and accurately.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Splunk\"}),\": Splunk processes and analyzes the evidence retrieved from Noname Security. It is key in transforming raw data into actionable insights, enabling security teams to respond to incidents effectively. Automation in Splunk ensures that data is processed consistently and events are created without manual intervention.\"]})]});export const richText203=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate CRM\"})});export const richText204=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Integrate Slack and HubSpot to streamline contact management. Automatically create new HubSpot contacts from Slack messages. Ensure seamless updates and notifications to enhance team collaboration and data accuracy. This automation optimizes workflows, reducing manual data entry and improving efficiency.\"})});export const richText205=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Data Entry Errors  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Contact Updates  \"}),/*#__PURE__*/e(\"p\",{children:\"Inefficient Team Collaboration\"})]});export const richText206=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Streamlined Contact Creation  \"}),/*#__PURE__*/e(\"p\",{children:\"Real-Time Updates  \"}),/*#__PURE__*/e(\"p\",{children:\"Improved Team Coordination\"})]});export const richText207=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Contact Creation in HubSpot:\"}),\" New contacts are automatically created in HubSpot from Slack messages. This replaces the manual process of entering contact details, reducing errors and saving time while ensuring the CRM is always up-to-date with the latest information.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Notification via Slack:\"}),\" When new contacts are added, notifications are sent to Slack channels. This replaces manual updates and ensures that team members are promptly informed, enhancing communication and collaboration within the team.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Validation and Duplication Check:\"}),\" The system checks for existing contacts in HubSpot before adding new ones. This prevents duplicate entries and maintains data integrity, which would otherwise require manual verification and correction, saving significant time and effort.\"]})]});export const richText208=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"HubSpot:\"}),\" In this use case, HubSpot acts as the central CRM platform for creating new contacts. It stores and manages contact information, ensuring all customer data is organized and easily accessible for sales and marketing teams.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack:\"}),\" Slack is a communication channel for notifications and updates. It informs team members about new contact additions in real time, facilitating immediate awareness and collaboration. This integration ensures that all relevant parties are kept in the loop without manual intervention.\"]})]});export const richText209=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate AWS Workflows\"})});export const richText210=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Mindflow ensures secure S3 bucket configurations by automating alerts for public access incidents and rectifying the permissions to protect against unintended data exposure.\"})});export const richText211=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/n(\"p\",{style:{\"--framer-line-height\":\"2em\"},children:[\"Delayed Response Times\",/*#__PURE__*/e(\"br\",{}),\"Manual Monitoring Efforts\",/*#__PURE__*/e(\"br\",{}),\"Increased Incident Response\"]})});export const richText212=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{style:{\"--framer-line-height\":\"2em\"},children:[\"Real-Time Alerting\",/*#__PURE__*/e(\"br\",{}),\"Immediate Exposure Remediation\",/*#__PURE__*/e(\"br\",{}),\"Automated Security Enforcement\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]});export const richText213=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"CloudTrail Alert Monitoring\"}),/*#__PURE__*/e(\"br\",{}),\"Mindflow automates the monitoring of AWS CloudTrail for specific events, such as \",/*#__PURE__*/e(\"em\",{children:\"PutBucketPublicAccessBlock\"}),\", indicating a change in S3 bucket accessibility. This task, if done manually, would require constant vigilance and could lead to delays in identifying public buckets, increasing the risk of data exposure.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Slack Notification Dispatch\"}),/*#__PURE__*/e(\"br\",{}),\"Upon detection of a public S3 bucket event, Mindflow automatically triggers an alert to a Slack channel. Manual notification would typically involve a slower, more labor-intensive process, potentially causing critical communication delays in addressing security issues.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Public Access Remediation\"}),/*#__PURE__*/e(\"br\",{}),\"If a bucket is made public, Mindflow can be set to automate the application of a block policy to revert the bucket to private. This replaces a manual, error-prone process that could lead to unprotected data if not addressed promptly and accurately.\"]})});export const richText214=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/n(\"strong\",{children:[\"AWS CloudTrail\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{})]}),\"AWS CloudTrail is integral to this use case as it captures detailed logs of AWS events. It specifically tracks and logs the \",/*#__PURE__*/e(\"em\",{children:\"PutBucketPublicAccessBlock\"}),\" event, which signals that an S3 bucket has been made publicly accessible, serving as the trigger for the automation workflow.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/n(\"strong\",{children:[\"Slack\",/*#__PURE__*/e(\"br\",{})]}),\"Slack functions as the immediate notification system in this workflow. When an S3 bucket is made public, an alert is automatically sent to a designated Slack channel. This allows for quick dissemination of information, ensuring that the team is promptly informed about potential security issues.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/n(\"strong\",{children:[\"AWS S3 (Bucket Block Policy Application)\",/*#__PURE__*/e(\"br\",{})]}),\"This part of the flow involves automatically applying a block policy to make the S3 bucket private again, if necessary. This quick response is vital to mitigate risks and secure data, which would otherwise require a manual intervention and could lead to delayed responses.\"]})]});export const richText215=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Threat Analysis\"})});export const richText216=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Mindflow automates the assessment of AWS GuardDuty findings for malicious intent with URLScan, Slack notifications, and Jira integration.\"})});export const richText217=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/n(\"p\",{style:{\"--framer-line-height\":\"2em\"},children:[\"Delayed Threat Response \",/*#__PURE__*/e(\"br\",{}),\"Increased Analyst Workload \",/*#__PURE__*/e(\"br\",{}),\"Manual Data Correlation \",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})});export const richText218=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/n(\"p\",{style:{\"--framer-line-height\":\"2em\"},children:[\"Instantaneous Alert Analysis \",/*#__PURE__*/e(\"br\",{}),\"Streamlined Incident Management \",/*#__PURE__*/e(\"br\",{}),\"Automated Threat Intelligence \",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})});export const richText219=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"GuardDuty Findings Retrieval\"}),/*#__PURE__*/e(\"br\",{}),\"Mindflow automates the retrieval of new findings from AWS GuardDuty, which typically involves manual monitoring and extraction. This automation ensures immediate attention to potential security threats, significantly reducing the response time.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"URLScan Analysis\"}),/*#__PURE__*/e(\"br\",{}),\"The workflow includes an automated process to check the maliciousness of a domain via URLScan. Compared to manual submissions, this saves valuable time and allows for rapid determination of threat levels.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/n(\"strong\",{children:[/*#__PURE__*/e(\"br\",{}),\"Email Notification\"]}),/*#__PURE__*/e(\"br\",{}),\"Mindflow automates sending detailed analysis results via email, which would otherwise be a manual process of compiling and dispatching reports. This ensures that stakeholders are promptly informed about potential threats.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Jira Ticket Creation\"}),/*#__PURE__*/e(\"br\",{}),\"For tracking and resolution, Mindflow creates Jira issues for each finding deemed malicious. This replaces manual ticket entry, streamlines the workflow, and ensures consistent record-keeping for incident response.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Looped Process for Multiple Findings\"}),/*#__PURE__*/e(\"br\",{}),\"Mindflow can iterate through multiple findings using loops, a task that would be repetitively and time-consumingly manual, ensuring no finding is missed and all are processed with equal precision and speed.\"]})});export const richText220=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/n(\"strong\",{children:[\"AWS GuardDuty\",/*#__PURE__*/e(\"br\",{})]}),\"AWS GuardDuty functions as the threat detection service that continuously monitors for malicious activity and unauthorized behavior. In this workflow, GuardDuty automatically detects and gathers findings, initiating the automated security review process.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/n(\"strong\",{children:[\"URLScan\",/*#__PURE__*/e(\"br\",{})]}),\"URLScan is utilized to automatically analyze and assess the security of domains found in GuardDuty findings. This tool replaces the manual process of checking URLs, saving time, and providing rapid threat assessments.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/n(\"strong\",{children:[\"Email Service\",/*#__PURE__*/e(\"br\",{})]}),\"The email service in this workflow is used to automatically disseminate threat findings. It ensures that the relevant personnel are promptly informed, compared to the slower manual compilation and dissemination of reports.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/n(\"strong\",{children:[\"Atlassian Jira\",/*#__PURE__*/e(\"br\",{})]}),\"Jira is incorporated to automatically log and track issues related to the GuardDuty findings. This ensures organized tracking of potential threats, facilitating efficient issue resolution and accountability which would be laborious to manage manually.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/n(\"strong\",{children:[\"Elastic Compute Cloud (EC2)\",/*#__PURE__*/e(\"br\",{})]}),\"While not directly mentioned in the task, EC2 instances may be involved as the infrastructure hosting the webhook and automation scripts. EC2 provides the scalable computing capacity needed to run these automation workflows effectively.\"]})]});export const richText221=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"This use case automates the investigation and remediation of Lacework security alerts. It integrates Lacework with AWS services and Jira to quickly identify, assess, and resolve potential security threats, enhancing cloud security posture and compliance.\"})});export const richText222=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Alert Investigation Time\"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Threat Response\"}),/*#__PURE__*/e(\"p\",{children:\"Increased Risk of Misconfigurations\"})]});export const richText223=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Faster Incident Resolution\"}),/*#__PURE__*/e(\"p\",{children:\"Enhanced Cloud Security Posture\"}),/*#__PURE__*/e(\"p\",{children:\"Improved Compliance Management\"})]});export const richText224=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Alert Reception from Lacework\"}),\": The workflow automatically receives and processes Lacework security alerts. This eliminates the need for manual monitoring and initial triage, reducing response time from hours to minutes and ensuring no critical alerts are missed.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"AWS Environment Assessment\"}),\": Upon receiving an alert, Mindflow automatically queries relevant AWS services (S3, IAM, EC2) to gather contextual information. This task, which typically requires manual investigation across multiple AWS consoles, is completed in seconds, providing a comprehensive view of the affected resources.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Jira Ticket Creation and Update\"}),\": The workflow creates a Jira ticket with all pertinent information from Lacework and AWS, and updates it as the investigation progresses. This automation replaces manual ticket creation and updates, ensuring consistent documentation and freeing up security analysts to focus on complex decision-making rather than administrative tasks.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Automated Remediation Actions\"}),\": Based on predefined criteria, Mindflow can execute automated remediation actions in AWS, such as modifying security groups or revoking IAM permissions. This immediate response capability significantly reduces the window of vulnerability compared to manual intervention, which often involves multiple approval steps and manual execution.\"]})]});export const richText225=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Lacework\"}),\": Lacework serves as the primary security monitoring tool in this workflow. It detects and alerts on potential security threats or compliance violations in the cloud environment. Lacework's integration with Mindflow enables immediate processing of these alerts, initiating the automated investigation and remediation process.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"AWS S3\"}),\": Amazon S3 is queried to gather information about the storage buckets related to the alert. Mindflow interacts with S3 to check bucket configurations, access policies, and recent activities, providing crucial context for the security investigation without manual API calls or console checks.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"AWS IAM\"}),\": In this workflow, AWS Identity and Access Management (IAM) is used to assess and potentially modify user or role permissions. Mindflow automates the process of reviewing IAM policies and making necessary adjustments to mitigate security risks, a task that typically requires careful manual intervention.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"AWS EC2\"}),\": Amazon EC2 instances are examined as part of the alert investigation. Mindflow queries EC2 to gather details about the affected instances, including security group configurations and recent activities, streamlining what would otherwise be a manual review process across multiple EC2 dashboards.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Jira\"}),\": Atlassian Jira is utilized for ticket creation and management throughout the investigation and remediation process. It serves as the central repository for all information related to the alert, automating documentation that would typically require manual entry and updates by security analysts.\"]})]});export const richText226=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"This automation handles unusual login alerts from a SIEM system, integrating tools like Panther, Slack, Google Admin, and AbuseIPDB for data enrichment and alert management. It automates incident response, saving time and improving security by allowing SOC teams to remediate threats faster and with better context.\"})});export const richText227=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual IP Reputation Checks\"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Account Suspension Actions\"}),/*#__PURE__*/e(\"p\",{children:\"Time Spent on Data Enrichment\"})]});export const richText228=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Faster Incident Response\"}),/*#__PURE__*/e(\"p\",{children:\"Real-Time Alert Enrichment\"}),/*#__PURE__*/e(\"p\",{children:\"Reduced Analyst Fatigue\"})]});export const richText229=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Suspicious Login Detection and Notification: \"}),\"When a suspicious login is detected, the system automatically identifies the alert, a process that traditionally requires manual monitoring and alert assessment. This automation ensures that high-risk events are detected in real-time, improving response times and minimizing potential threats.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Account Suspension in Google Admin:\"}),\" Automatically suspending accounts with unusual login activity significantly reduces the time taken compared to manual interventions. This proactive approach mitigates the risk of further security breaches by rapidly addressing compromised accounts.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"IP Reputation Lookup with Abuse IPDB:\"}),\" The process of checking the reputation of an IP address is automated, removing the need for manual lookups. This reduces delays in verifying whether the login attempt is from a suspicious source, allowing for faster decision-making on the appropriate remediation actions.\"]})]});export const richText230=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Panther: In this use case, Panther serves as the SIEM (Security Information and Event Management) tool responsible for detecting suspicious login activities. It generates alerts when unusual behavior is identified, triggering the automation process that handles investigation and remediation.\"}),/*#__PURE__*/e(\"p\",{children:\"Slack: Slack is the communication platform where alerts and notifications are sent. It notifies security teams of suspicious login events and allows them to receive updates on actions being taken, facilitating real-time communication and collaboration throughout the remediation process.\"}),/*#__PURE__*/e(\"p\",{children:\"Google Admin: Google Admin plays a critical role in managing user accounts. In this case, it is used to automatically suspend accounts involved in suspicious login activities, significantly reducing response times compared to manual interventions.\"}),/*#__PURE__*/e(\"p\",{children:\"Abuse IPDB: Abuse IPDB is used to automatically check the reputation of IP addresses associated with suspicious login attempts. It helps determine if an IP is linked to malicious activity, speeding up the decision-making process for remediation.\"}),/*#__PURE__*/e(\"p\",{children:\"Google Admin Directory: The Google Admin Directory is utilized to retrieve information about users. This integration ensures that all actions, such as user suspension, are applied to the correct accounts, streamlining the investigation and remediation workflow.\"})]});export const richText231=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"This use case streamlines security incident response by integrating Panther SIEM alerts with Okta identity management. It automates revoking user sessions in Okta following a security event detected by Panther, enhancing rapid threat mitigation and access control.\"})});export const richText232=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Delayed Incident Response Times\"}),/*#__PURE__*/e(\"p\",{children:\"Manual Session Revocation Process\"}),/*#__PURE__*/e(\"p\",{children:\"Increased Risk of Unauthorized Access\"})]});export const richText233=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Accelerated Threat Containment\"}),/*#__PURE__*/e(\"p\",{children:\"Improved Security Team Efficiency\"}),/*#__PURE__*/e(\"p\",{children:\"Enhanced Access Control Management\"})]});export const richText234=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Alert Processing from Panther:\"}),\" Panther alerts are automatically received and processed, triggering immediate action. This replaces manual alert monitoring and initial triage, significantly reducing the time between threat detection and response initiation.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack Notifications\"}),\": Security teams are notified about the Panther alert and subsequent actions. This automation eliminates manual communication, ensuring rapid team awareness and swift collaboration on potential security incidents.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Okta Session Revocation\"}),\": Upon receiving a critical Panther alert, user sessions in Okta are automatically revoked. This task, typically requiring manual intervention, is now executed instantly, dramatically reducing the window of potential unauthorized access and enhancing the overall security posture.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"User Access Listing in Okta\"}),\": After session revocation, the system automatically lists all grants for the affected user in Okta. This provides immediate visibility into the user's access rights, facilitating quick assessment and further action without manually querying user permissions.\"]})]});export const richText235=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Panther: In this use case, Panther is the primary alert system for detecting security events. It initiates the workflow by sending webhook alerts about potential threats, enabling rapid response to suspicious activities and ensuring that critical security incidents are immediately addressed.\"}),/*#__PURE__*/e(\"p\",{children:\"Slack: Slack is the real-time communication channel for notifying security teams about the Panther alert and subsequent actions. It ensures that relevant team members are promptly informed about the security event, facilitating quick awareness and immediate collaboration on incident response.\"}),/*#__PURE__*/e(\"p\",{children:\"Okta: Okta plays a crucial role in access management within this workflow. It's responsible for two key actions: revoking all active identity provider sessions for the affected user and listing all grants associated with that user. This integration allows for immediate containment of potential threats by cutting off access and providing a comprehensive view of the user's permissions for further analysis.\"})]});export const richText236=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Compliance and Reporting\"})});export const richText237=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate device compliance reporting by integrating Jamf Pro, Google Sheets, Google Drive, and Drata. Generate, upload, and assign compliance evidence reports, enhancing security and efficiency. This workflow reduces manual effort, ensuring timely compliance management and streamlined operations.\"})});export const richText238=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Compliance Data Entry  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Compliance Reporting  \"}),/*#__PURE__*/e(\"p\",{children:\"Increased Risk of Non-Compliance\"})]});export const richText239=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Efficient Compliance Data Management  \"}),/*#__PURE__*/e(\"p\",{children:\"Timely Compliance Reporting  \"}),/*#__PURE__*/e(\"p\",{children:\"Reduced Non-Compliance Risk\"})]});export const richText240=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Scheduled Device Compliance Reporting:\"}),\" Compliance reports are generated and scheduled for regular intervals, reducing the need for manual report preparation. This automation ensures consistent and timely reporting, minimizing the risk of human error and freeing up resources for more strategic tasks.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Collection from Jamf Pro:\"}),\" Device inventory data is automatically collected from Jamf Pro, eliminating the need for manual data gathering. This automation ensures comprehensive and up-to-date compliance data, enhancing the accuracy and reliability of compliance assessments.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Evidence Upload to Drata:\"}),\" Compliance evidence is uploaded directly to Drata, streamlining the process of evidence submission. This automation reduces the administrative burden of manual uploads, ensuring that compliance documentation is consistently maintained and easily accessible for audits.\"]})]});export const richText241=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Jamf Pro:\"}),\" In this use case, Jamf Pro is utilized to gather device inventory data. It serves as the source of truth for device compliance information, ensuring that all relevant data is collected accurately and efficiently without manual intervention.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Sheets:\"}),\" Google Sheets is employed to store and organize the collected compliance data. It acts as a central repository where data is structured and prepared for further processing, facilitating easy access and manipulation of compliance information.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Drive:\"}),\" Google Drive is used to export and store the compliance reports generated from the data in Google Sheets. It provides a secure and accessible location for storing these reports, ensuring they are readily available for review and audit purposes.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Drata:\"}),\" Drata plays a critical role in the compliance management process by receiving the uploaded compliance evidence. It ensures that all compliance documentation is properly stored and associated with the relevant controls, streamlining the audit and compliance verification process.\"]})]});export const richText242=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Threat Management\"})});export const richText243=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"This use case streamlines cybersecurity incident response by automating the killing of active threats detected in CrowdStrike. It integrates CrowdStrike with Slack for efficient communication, enabling rapid threat containment and team notification.\"})});export const richText244=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Threat Response Delays\"}),/*#__PURE__*/e(\"p\",{children:\"Increased Risk of Lateral Movement\"}),/*#__PURE__*/e(\"p\",{children:\"Communication Gaps During Incidents\"})]});export const richText245=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Accelerated Threat Containment\"}),/*#__PURE__*/e(\"p\",{children:\"Enhanced Team Coordination\"}),/*#__PURE__*/e(\"p\",{children:\"Reduced Human Error Risk\"})]});export const richText246=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Threat Detection and Response\"}),\": The workflow automatically identifies active threats in CrowdStrike, immediately initiating the containment process. This rapid response significantly reduces the time between threat detection and action, minimizing potential damage compared to manual monitoring and response.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Process Termination\"}),\": Mindflow automatically executes the command to kill the malicious process in CrowdStrike once a threat is detected. This automation eliminates the need for manual intervention, drastically reducing the time it takes to contain a threat and minimizing the risk of human error.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Team Notification via Slack\"}),\": The workflow instantly notifies the security team through Slack about the detected threat and the action taken. This automated communication ensures all relevant team members are informed in real-time, replacing the need for manual updates and reducing the risk of miscommunication or delayed responses.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Confirmation and Logging\"}),\": After the threat is contained, Mindflow automatically confirms the process's successful termination and logs the action. This automated documentation ensures accurate record-keeping without manual input, providing a reliable audit trail for future analysis and compliance purposes.\"]})]});export const richText247=/*#__PURE__*/n(t.Fragment,{children:[/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"CrowdStrike\"}),\": CrowdStrike is the primary endpoint detection and response (EDR) tool in this use case. It identifies active threats on endpoints and provides information for threat containment. Mindflow leverages CrowdStrike's capabilities to automatically detect malicious processes and execute the termination command, significantly enhancing the speed and efficiency of threat response.\"]}),/*#__PURE__*/n(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": Slack serves as the communication hub for this workflow. It notifies the security team about detected threats and the actions taken to contain them. By integrating Slack, Mindflow ensures that all relevant team members are instantly informed about security incidents, facilitating quick collaboration and response coordination without requiring manual communication.\"]})]});export const richText248=/*#__PURE__*/e(t.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Analyze Indicators of Compromise (IOCs) using Mindflow by integrating with Recorded Future. Automate the assessment of hashes, domains, URLs, and IP addresses to enhance threat detection and improve security operations. Streamline workflows and receive detailed reports for actionable insights.\"})});\nexport const __FramerMetadata__ = {\"exports\":{\"richText190\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText90\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText53\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText183\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText143\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText191\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText188\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText130\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText127\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText170\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText121\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText137\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText226\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText25\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText94\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText44\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText148\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText157\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText232\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText63\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText247\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText54\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText19\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText116\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText229\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText129\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText234\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText228\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText58\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText92\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText151\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText66\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText3\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText216\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText62\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText225\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText103\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText210\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText52\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText84\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText114\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText68\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText72\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText145\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText205\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText238\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText236\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText48\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText203\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText40\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText80\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText9\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText45\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText244\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText2\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText168\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText200\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText163\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText86\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText198\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText56\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText117\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText67\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText179\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText108\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText240\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText134\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText142\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText113\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText115\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText223\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText138\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText79\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText156\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText219\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText16\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText204\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText195\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText6\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText76\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText206\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText18\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText178\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText119\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText21\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText182\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText194\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText160\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText55\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText131\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText196\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText38\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText74\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText135\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText64\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText22\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText1\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText12\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText161\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText241\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText82\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText42\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText231\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText174\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText75\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText35\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText180\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText172\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText118\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText83\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText28\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText214\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText85\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText73\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText106\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText133\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText93\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText111\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText158\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText128\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText71\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText69\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText107\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText176\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText124\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText193\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText78\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText87\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText185\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText8\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText112\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText154\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText192\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText173\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText150\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText57\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText61\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText227\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText217\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText17\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText46\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText51\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText235\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText101\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText41\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText147\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText187\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText96\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText242\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText149\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText10\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText141\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText43\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText30\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText11\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText233\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText171\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText77\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText152\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText213\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText27\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText24\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText175\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText7\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText208\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText202\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText50\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText98\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText209\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText70\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText189\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText89\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText125\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText88\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText155\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText224\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText207\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText139\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText100\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText32\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText159\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText26\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText166\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText123\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText37\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText177\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText13\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText144\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText97\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText239\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText164\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText169\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText105\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText165\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText65\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText197\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText199\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText167\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText95\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText237\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText184\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText212\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText222\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText59\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText60\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText211\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText36\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText181\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText15\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText122\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText146\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText140\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText33\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText14\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText132\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText153\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText215\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText201\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText245\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText126\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText221\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText186\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText230\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText81\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText29\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText248\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText162\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText5\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText91\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText136\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText110\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText31\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText49\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText120\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText220\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText34\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText109\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText243\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText4\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText99\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText23\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText104\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText20\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText218\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText39\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText102\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText47\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText246\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"__FramerMetadata__\":{\"type\":\"variable\"}}}"],
  "mappings": "oFAAiF,IAAMA,EAAsBC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,CAAC,EAAeC,EAAuBH,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,CAAC,EAAeE,EAAuBJ,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,4MAA4M,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBF,EAAE,OAAO,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,+OAA+O,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,sQAAsQ,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAuBL,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAsBF,EAAE,OAAO,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,gPAAgP,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,kQAAkQ,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeI,EAAuBJ,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,0TAA0T,CAAC,CAAC,CAAC,EAAeK,EAAuBP,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,CAAC,EAAeM,EAAuBR,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,CAAC,EAAeO,EAAuBT,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yCAAyC,CAAC,EAAE,+PAA+P,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iCAAiC,CAAC,EAAE,oOAAoO,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeQ,EAAuBV,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,2QAA2Q,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,sTAAsT,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeS,EAAuBT,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,oSAAoS,CAAC,CAAC,CAAC,EAAeU,EAAwBZ,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,CAAC,EAAeW,EAAwBb,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wBAAwB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,CAAC,EAAeY,EAAwBd,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,mQAAmQ,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBF,EAAE,OAAO,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,+PAA+P,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,kRAAkR,CAAC,CAAC,CAAC,CAAC,CAAC,EAAea,EAAwBf,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,yQAAyQ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,EAAE,yDAAsEA,EAAE,KAAK,CAAC,SAAS,eAAe,CAAC,EAAE,gMAAgM,CAAC,CAAC,CAAC,CAAC,CAAC,EAAec,EAAwBd,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,CAAC,CAAC,EAAee,EAAwBf,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,sRAAsR,CAAC,CAAC,CAAC,EAAegB,EAAwBlB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,CAAC,EAAeiB,EAAwBnB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,CAAC,EAAekB,EAAwBpB,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,uMAAuM,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,gMAAgM,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,2NAA2N,CAAC,CAAC,CAAC,CAAC,CAAC,EAAemB,EAAwBrB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAsBF,EAAE,OAAO,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,qOAAqO,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,EAAE,mPAAmP,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeoB,EAAwBpB,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,2WAA2W,CAAC,CAAC,CAAC,EAAeqB,EAAwBvB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yCAAyC,CAAC,CAAC,CAAC,CAAC,EAAesB,EAAwBxB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,CAAC,EAAeuB,EAAwBzB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAsBF,EAAE,OAAO,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oCAAoC,CAAC,EAAE,gQAAgQ,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,6PAA6P,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oCAAoC,CAAC,EAAE,wRAAwR,CAAC,CAAC,CAAC,CAAC,CAAC,EAAewB,EAAwB1B,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,SAAS,CAAC,EAAE,kNAAkN,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBF,EAAE,OAAO,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,sNAAsN,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,8MAA8M,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,oNAAoN,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeyB,EAAwBzB,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,iVAAiV,CAAC,CAAC,CAAC,EAAe0B,EAAwB5B,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yCAAyC,CAAC,CAAC,CAAC,CAAC,EAAe2B,EAAwB7B,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,CAAC,EAAe4B,EAAwB9B,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gCAAgC,CAAC,EAAE,+OAA+O,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBF,EAAE,OAAO,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,kRAAkR,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oCAAoC,CAAC,EAAE,iOAAiO,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe6B,EAAwB/B,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,4QAA4Q,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBF,EAAE,OAAO,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,+OAA+O,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,EAAE,uNAAuN,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe8B,EAAwB9B,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,uOAAuO,CAAC,CAAC,CAAC,EAAe+B,EAAwBjC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,CAAC,EAAegC,EAAwBlC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0BAA0B,CAAC,CAAC,CAAC,CAAC,EAAeiC,EAAwBnC,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,2OAA2O,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mCAAmC,CAAC,EAAE,sPAAsP,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mCAAmC,CAAC,EAAE,oRAAoR,CAAC,CAAC,CAAC,CAAC,CAAC,EAAekC,EAAwBpC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAsBF,EAAE,OAAO,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,uNAAuN,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,kPAAkP,CAAC,CAAC,CAAC,CAAC,CAAC,EAAemC,EAAwBnC,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,8UAA8U,CAAC,CAAC,CAAC,EAAeoC,EAAwBtC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,CAAC,EAAeqC,EAAwBvC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+BAA+B,CAAC,CAAC,CAAC,CAAC,EAAesC,EAAwBxC,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,4SAA4S,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBF,EAAE,OAAO,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+BAA+B,CAAC,EAAE,yQAAyQ,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBF,EAAE,OAAO,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,iPAAiP,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeuC,EAAwBzC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAsBF,EAAE,OAAO,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,8SAA8S,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,6SAA6S,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,EAAE,wRAAwR,CAAC,CAAC,CAAC,CAAC,CAAC,EAAewC,EAAwBxC,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,CAAC,CAAC,EAAeyC,EAAwBzC,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,6TAA6T,CAAC,CAAC,CAAC,EAAe0C,EAAwB5C,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,CAAC,EAAe2C,EAAwB7C,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,CAAC,EAAe4C,EAAwB9C,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+BAA+B,CAAC,EAAE,kPAAkP,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iCAAiC,CAAC,EAAE,+NAA+N,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,sPAAsP,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe6C,EAAwB/C,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,8MAA8M,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,sOAAsO,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,EAAE,uOAAuO,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe8C,GAAwB9C,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,EAAe+C,GAAwB/C,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,+RAA+R,CAAC,CAAC,CAAC,EAAegD,GAAwBlD,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,CAAC,EAAeiD,GAAwBnD,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,CAAC,EAAekD,GAAwBpD,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wCAAwC,CAAC,EAAE,iYAAiY,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,sNAAsN,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yCAAyC,CAAC,EAAE,4ZAA4Z,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,gVAAgV,CAAC,CAAC,CAAC,CAAC,CAAC,EAAemD,GAAwBrD,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,EAAE,ogBAAogB,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,2XAA2X,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeoD,GAAwBpD,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,qUAAqU,CAAC,CAAC,CAAC,EAAeqD,GAAwBvD,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gCAAgC,CAAC,CAAC,CAAC,CAAC,EAAesD,GAAwBxD,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6CAA6C,CAAC,CAAC,CAAC,CAAC,EAAeuD,GAAwBzD,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gCAAgC,CAAC,EAAE,uSAAuS,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,4TAA4T,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kCAAkC,CAAC,EAAE,wPAAmP,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8CAA8C,CAAC,EAAE,wUAAwU,CAAC,CAAC,CAAC,CAAC,CAAC,EAAewD,GAAwB1D,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,kSAAkS,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,6SAA6S,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,SAAS,CAAC,EAAE,4QAAuQ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,2QAA2Q,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,qRAAgR,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,4RAA4R,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeyD,GAAwBzD,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,6QAA6Q,CAAC,CAAC,CAAC,EAAe0D,GAAwB5D,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,CAAC,CAAC,CAAC,EAAe2D,GAAwB7D,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,uBAAuB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gCAAgC,CAAC,CAAC,CAAC,CAAC,EAAe4D,GAAwB9D,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,EAAE,kRAAkR,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4CAA4C,CAAC,EAAE,8RAA8R,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+BAA+B,CAAC,EAAE,wQAAwQ,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe6D,GAAwB/D,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,8NAA8N,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,kOAAkO,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,EAAE,8PAA8P,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe8D,GAAwB9D,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,ySAAyS,CAAC,CAAC,CAAC,EAAe+D,GAAwBjE,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yCAAyC,CAAC,CAAC,CAAC,CAAC,EAAegE,GAAwBlE,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,CAAC,CAAC,CAAC,EAAeiE,GAAwBnE,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,qRAAqR,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,6OAA6O,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,sRAAsR,CAAC,CAAC,CAAC,CAAC,CAAC,EAAekE,GAAwBpE,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,0PAA0P,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,6QAA6Q,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,kQAAkQ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,EAAE,+QAA+Q,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,MAAM,CAAC,EAAE,kRAAkR,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,gPAAgP,CAAC,CAAC,CAAC,CAAC,CAAC,EAAemE,GAAwBnE,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,EAAeoE,GAAwBpE,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,uOAAuO,CAAC,CAAC,CAAC,EAAeqE,GAAwBvE,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,CAAC,EAAesE,GAAwBxE,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gCAAgC,CAAC,CAAC,CAAC,CAAC,EAAeuE,GAAwBzE,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,EAAE,kQAAkQ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,+OAA+O,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oCAAoC,CAAC,EAAE,2NAA2N,CAAC,CAAC,CAAC,CAAC,CAAC,EAAewE,GAAwB1E,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,kQAAkQ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,2QAA2Q,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeyE,GAAwBzE,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAe0E,GAAwB1E,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,uRAAuR,CAAC,CAAC,CAAC,EAAe2E,GAAwB7E,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,sPAAsP,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,6QAA6Q,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,8QAA8Q,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe4E,GAAwB9E,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,EAAE,0SAA0S,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,wTAAwT,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe6E,GAAwB7E,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,qSAAqS,CAAC,CAAC,CAAC,EAAe8E,GAAwBhF,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sCAAsC,CAAC,CAAC,CAAC,CAAC,EAAe+E,GAAwBjF,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gCAAgC,CAAC,CAAC,CAAC,CAAC,EAAegF,GAAwBlF,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,6OAA6O,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gCAAgC,CAAC,EAAE,uOAAuO,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,sNAAsN,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeiF,GAAwBnF,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,qRAAqR,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,wQAAwQ,CAAC,CAAC,CAAC,CAAC,CAAC,EAAekF,GAAwBlF,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,EAAemF,GAAwBnF,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,iUAAiU,CAAC,CAAC,CAAC,EAAeoF,GAAwBtF,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iCAAiC,CAAC,CAAC,CAAC,CAAC,EAAeqF,GAAwBvF,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+BAA+B,CAAC,CAAC,CAAC,CAAC,EAAesF,GAAwBxF,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,0RAA0R,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,4PAA4P,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,kPAAkP,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeuF,GAAwBvF,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,qOAAqO,CAAC,CAAC,CAAC,CAAC,EAAewF,GAAwBxF,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,+QAA+Q,CAAC,CAAC,CAAC,EAAeyF,GAAwB3F,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,CAAC,EAAe0F,GAAwB5F,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,CAAC,CAAC,CAAC,EAAe2F,GAAwB7F,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kCAAkC,CAAC,EAAE,6SAA6S,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wCAAwC,CAAC,EAAE,iQAAiQ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oCAAoC,CAAC,EAAE,mQAAmQ,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe4F,GAAwB9F,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,EAAE,iSAAiS,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,kRAAkR,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,0PAA0P,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe6F,GAAwB7F,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,EAAe8F,GAAwB9F,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,2SAA2S,CAAC,CAAC,CAAC,EAAe+F,GAAwBjG,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gCAAgC,CAAC,CAAC,CAAC,CAAC,EAAegG,GAAwBlG,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,CAAC,CAAC,CAAC,EAAeiG,GAAwBnG,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0CAA0C,CAAC,EAAE,gPAAgP,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,uOAAuO,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,4PAA4P,CAAC,CAAC,CAAC,CAAC,CAAC,EAAekG,GAAwBpG,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,sNAAsN,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,EAAE,sMAAsM,CAAC,CAAC,CAAC,CAAC,CAAC,EAAemG,GAAwBnG,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,EAAeoG,GAAyBpG,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,2UAA2U,CAAC,CAAC,CAAC,EAAeqG,GAAyBvG,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,CAAC,EAAesG,GAAyBxG,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,CAAC,EAAeuG,GAAyBzG,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,8OAA8O,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,2QAA2Q,CAAC,CAAC,CAAC,CAAC,CAAC,EAAewG,GAAyBxG,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,qQAAqQ,CAAC,CAAC,CAAC,CAAC,EAAeyG,GAAyBzG,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,8QAA8Q,CAAC,CAAC,CAAC,EAAe0G,GAAyB5G,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,CAAC,EAAe2G,GAAyB7G,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+BAA+B,CAAC,CAAC,CAAC,CAAC,EAAe4G,GAAyB9G,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,8NAA8N,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,6NAA6N,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+BAA+B,CAAC,EAAE,sPAAsP,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe6G,GAAyB/G,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,gOAAgO,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,oRAAoR,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,EAAE,sNAAsN,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe8G,GAAyBhH,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2CAA2C,CAAC,EAAE,+OAA+O,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,qOAAqO,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+BAA+B,CAAC,EAAE,sPAAsP,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe+G,GAAyBjH,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,+RAA+R,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,6MAA6M,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,6NAA6N,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,EAAE,sMAAsM,CAAC,CAAC,CAAC,CAAC,CAAC,EAAegH,GAAyBhH,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,sRAAsR,CAAC,CAAC,CAAC,EAAeiH,GAAyBnH,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,CAAC,EAAekH,GAAyBpH,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mCAAmC,CAAC,CAAC,CAAC,CAAC,EAAemH,GAAyBrH,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mCAAmC,CAAC,EAAE,mQAAmQ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kCAAkC,CAAC,EAAE,wPAAwP,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,EAAE,mPAAmP,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeoH,GAAyBtH,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,EAAE,uQAAuQ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kCAAkC,CAAC,EAAE,iRAAiR,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeqH,GAAyBrH,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,wSAAwS,CAAC,CAAC,CAAC,EAAesH,GAAyBxH,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0BAA0B,CAAC,CAAC,CAAC,CAAC,EAAeuH,GAAyBzH,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,CAAC,EAAewH,GAAyB1H,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wCAAwC,CAAC,EAAE,mPAAmP,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,qPAAqP,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,wOAAwO,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeyH,GAAyB3H,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,yRAAyR,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,EAAE,2RAA2R,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe0H,GAAyB1H,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAe2H,GAAyB3H,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,4RAA4R,CAAC,CAAC,CAAC,EAAe4H,GAAyB9H,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sCAAsC,CAAC,CAAC,CAAC,CAAC,EAAe6H,GAAyB/H,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mCAAmC,CAAC,CAAC,CAAC,CAAC,EAAe8H,GAAyBhI,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,qRAAqR,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,yRAAyR,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,qQAAqQ,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe+H,GAAyBjI,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,IAAiBA,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,iOAAiO,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,EAAE,wNAAwN,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,sMAAsM,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,2NAA2N,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,SAAS,CAAC,EAAE,6MAA6M,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,qJAAqJ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,sNAAsN,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,8HAA8H,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,EAAE,4NAA4N,CAAC,CAAC,CAAC,CAAC,CAAC,EAAegI,GAAyBhI,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,EAAeiI,GAAyBjI,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,8HAA8H,CAAC,CAAC,CAAC,EAAekI,GAAyBlI,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,MAAM,CAAC,uBAAuB,KAAK,EAAE,SAAS,CAAC,wCAAqDE,EAAE,KAAK,CAAC,CAAC,EAAE,0CAAuDA,EAAE,KAAK,CAAC,CAAC,EAAE,iCAA8CA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAemI,GAAyBnI,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,MAAM,CAAC,uBAAuB,KAAK,EAAE,SAAS,CAAC,qCAAkDE,EAAE,KAAK,CAAC,CAAC,EAAE,2CAAwDA,EAAE,KAAK,CAAC,CAAC,EAAE,iCAA8CA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeoI,GAAyBpI,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,4OAAyPA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,uRAAoSA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,4PAA4P,CAAC,CAAC,CAAC,CAAC,EAAeqI,GAAyBvI,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,QAAqBE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,0PAA0P,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,cAA2BE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,8PAA8P,CAAC,CAAC,CAAC,CAAC,CAAC,EAAesI,GAAyBtI,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,gCAAgC,CAAC,CAAC,CAAC,EAAeuI,GAAyBvI,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,8OAA8O,CAAC,CAAC,CAAC,EAAewI,GAAyB1I,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,CAAC,EAAeyI,GAAyB3I,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,CAAC,EAAe0I,GAAyB5I,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yCAAyC,CAAC,EAAE,gaAAga,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,sYAAsY,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qCAAqC,CAAC,EAAE,6aAA6a,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe2I,GAAyB7I,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mCAAmC,CAAC,EAAE,iUAAiU,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,oSAAoS,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,qSAAqS,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,qVAAqV,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe4I,GAAyB5I,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,iWAAiW,CAAC,CAAC,CAAC,EAAe6I,GAAyB/I,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,CAAC,EAAe8I,GAAyBhJ,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,CAAC,EAAe+I,GAAyBjJ,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yCAAyC,CAAC,EAAE,wQAAwQ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kCAAkC,CAAC,EAAE,gQAAgQ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,wPAAwP,CAAC,CAAC,CAAC,CAAC,CAAC,EAAegJ,GAAyBlJ,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,iPAAiP,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,2OAA2O,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,SAAS,CAAC,EAAE,8OAA8O,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,SAAS,CAAC,EAAE,yOAAyO,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,SAAS,CAAC,EAAE,oPAAoP,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeiJ,GAAyBjJ,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,EAAekJ,GAAyBlJ,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,+RAA+R,CAAC,CAAC,CAAC,EAAemJ,GAAyBrJ,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yCAAyC,CAAC,CAAC,CAAC,CAAC,EAAeoJ,GAAyBtJ,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,CAAC,EAAeqJ,GAAyBvJ,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,oTAAoT,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,oTAAoT,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,qSAAqS,CAAC,CAAC,CAAC,CAAC,CAAC,EAAesJ,GAAyBxJ,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,0RAAqR,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,MAAM,CAAC,EAAE,mSAAmS,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeuJ,GAAyBvJ,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,EAAewJ,GAAyBxJ,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,+OAA+O,CAAC,CAAC,CAAC,EAAeyJ,GAAyB3J,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,MAAM,CAAC,uBAAuB,KAAK,EAAE,SAAS,CAAC,gCAA6CE,EAAE,KAAK,CAAC,CAAC,EAAE,sCAAmDA,EAAE,KAAK,CAAC,CAAC,EAAE,+BAA+B,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe0J,GAAyB5J,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,MAAM,CAAC,uBAAuB,KAAK,EAAE,SAAS,CAAC,4BAAyCE,EAAE,KAAK,CAAC,CAAC,EAAE,+BAA4CA,EAAE,KAAK,CAAC,CAAC,EAAE,4BAAyCA,EAAE,KAAK,CAAC,CAAC,EAAE,2BAA2B,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe2J,GAAyB7J,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oRAAiSE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oWAAoW,CAAC,CAAC,CAAC,CAAC,EAAe4J,GAAyB9J,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6TAA6T,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wRAAwR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe6J,GAAyB7J,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,EAAe8J,GAAyB9J,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,mNAAmN,CAAC,CAAC,CAAC,EAAe+J,GAAyBjK,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,MAAM,CAAC,uBAAuB,KAAK,EAAE,SAAS,CAAC,iCAA8CE,EAAE,KAAK,CAAC,CAAC,EAAE,mCAAgDA,EAAE,KAAK,CAAC,CAAC,EAAE,+BAA+B,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAegK,GAAyBlK,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,MAAM,CAAC,uBAAuB,KAAK,EAAE,SAAS,CAAC,uCAAoDE,EAAE,KAAK,CAAC,CAAC,EAAE,oCAAiDA,EAAE,KAAK,CAAC,CAAC,EAAE,sCAAsC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeiK,GAAyBjK,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,wPAAqQA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,6QAA0RA,EAAE,KAAK,CAAC,CAAC,EAAeF,EAAE,SAAS,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,CAAC,EAAE,6BAA6B,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,gSAAgS,CAAC,CAAC,CAAC,CAAC,EAAekK,GAAyBpK,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,aAA0BE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,uLAAuL,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,QAAqBE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,gLAAgL,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,iBAA8BE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,yLAAyL,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,UAAuBE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,0LAA0L,CAAC,CAAC,CAAC,CAAC,CAAC,EAAemK,GAAyBnK,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,SAAS,CAAC,uEAAoFE,EAAE,SAAS,CAAC,SAAS,MAAM,CAAC,EAAE,8LAA8L,CAAC,CAAC,CAAC,CAAC,EAAeoK,GAAyBtK,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,MAAM,CAAC,uBAAuB,KAAK,EAAE,SAAS,CAAC,4BAAyCE,EAAE,KAAK,CAAC,CAAC,EAAE,mBAAgCA,EAAE,KAAK,CAAC,CAAC,EAAE,2BAA2B,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeqK,GAAyBvK,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,MAAM,CAAC,uBAAuB,KAAK,EAAE,SAAS,CAAC,gCAA6CE,EAAE,KAAK,CAAC,CAAC,EAAE,4BAAyCA,EAAE,KAAK,CAAC,CAAC,EAAE,mCAAmC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAesK,GAAyBtK,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,4TAAyUA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,8SAA2TA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,+SAA4TA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,6RAA0SA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,+RAA+R,CAAC,CAAC,CAAC,CAAC,EAAeuK,GAAyBzK,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0RAA0R,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2PAA2P,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gQAAgQ,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,IAAiBE,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oQAAoQ,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,QAAqBE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,sRAAsR,CAAC,CAAC,CAAC,CAAC,CAAC,EAAewK,GAAyBxK,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,6SAA6S,CAAC,CAAC,CAAC,EAAeyK,GAAyB3K,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,CAAC,EAAe0K,GAAyB5K,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,CAAC,EAAe2K,GAAyB7K,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,kUAAkU,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,oRAAoR,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iCAAiC,CAAC,EAAE,4RAA4R,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe4K,GAAyB9K,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,8RAA8R,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,mSAAmS,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe6K,GAAyB7K,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,gTAAgT,CAAC,CAAC,CAAC,EAAe8K,GAAyBhL,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,CAAC,EAAe+K,GAAyBjL,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,CAAC,EAAegL,GAAyBlL,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,EAAE,0QAA0Q,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iCAAiC,CAAC,EAAE,6PAA6P,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kCAAkC,CAAC,EAAE,2RAA2R,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeiL,GAAyBnL,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,uNAAuN,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,yMAAyM,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,uMAAuM,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,MAAM,CAAC,EAAE,+OAA+O,CAAC,CAAC,CAAC,CAAC,CAAC,EAAekL,GAAyBlL,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,gRAAgR,CAAC,CAAC,CAAC,EAAemL,GAAyBrL,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,CAAC,EAAeoL,GAAyBtL,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mCAAmC,CAAC,CAAC,CAAC,CAAC,EAAeqL,GAAyBvL,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,sRAAsR,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,2PAA2P,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,8QAA8Q,CAAC,CAAC,CAAC,CAAC,CAAC,EAAesL,GAAyBxL,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,wQAAwQ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,EAAE,mSAAmS,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,SAAS,CAAC,EAAE,iTAAiT,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeuL,GAAyBvL,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,oTAAoT,CAAC,CAAC,CAAC,EAAewL,GAAyB1L,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,CAAC,EAAeyL,GAAyB3L,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,CAAC,EAAe0L,GAAyB5L,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,8OAA8O,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,+NAA+N,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,uOAAuO,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe2L,GAAyB7L,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,4MAA4M,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,iOAAiO,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,EAAE,4NAA4N,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe4L,GAAyB5L,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,2NAA2N,CAAC,CAAC,CAAC,EAAe6L,GAAyB/L,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,CAAC,EAAe8L,GAAyBhM,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,CAAC,EAAe+L,GAAyBjM,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,gPAAgP,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,sQAAsQ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,4NAA4N,CAAC,CAAC,CAAC,CAAC,CAAC,EAAegM,GAAyBlM,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,+SAA+S,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,kSAAkS,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeiM,GAAyBjM,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,mVAAmV,CAAC,CAAC,CAAC,EAAekM,GAAyBpM,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iCAAiC,CAAC,CAAC,CAAC,CAAC,EAAemM,GAAyBrM,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,CAAC,EAAeoM,GAAyBtM,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,gQAAgQ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,qPAAqP,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,qQAAqQ,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeqM,GAAyBvM,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,qPAAqP,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,qNAAqN,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,sNAAsN,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,mNAAmN,CAAC,CAAC,CAAC,CAAC,CAAC,EAAesM,GAAyBtM,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,mRAAmR,CAAC,CAAC,CAAC,EAAeuM,GAAyBzM,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,CAAC,EAAewM,GAAyB1M,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,CAAC,CAAC,CAAC,EAAeyM,GAAyB3M,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uCAAuC,CAAC,EAAE,kPAAkP,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gCAAgC,CAAC,EAAE,mPAAmP,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,4QAA4Q,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe0M,GAAyB5M,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,gSAAgS,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,6TAA6T,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe2M,GAAyB3M,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,cAAc,CAAC,CAAC,CAAC,EAAe4M,GAAyB5M,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,mTAAmT,CAAC,CAAC,CAAC,EAAe6M,GAAyB/M,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gCAAgC,CAAC,CAAC,CAAC,CAAC,EAAe8M,GAAyBhN,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qBAAqB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,CAAC,EAAe+M,GAAyBjN,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,gPAAgP,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,sNAAsN,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wCAAwC,CAAC,EAAE,iPAAiP,CAAC,CAAC,CAAC,CAAC,CAAC,EAAegN,GAAyBlN,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,gOAAgO,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,6RAA6R,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeiN,GAAyBjN,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,EAAekN,GAAyBlN,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,+KAA+K,CAAC,CAAC,CAAC,EAAemN,GAAyBnN,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,MAAM,CAAC,uBAAuB,KAAK,EAAE,SAAS,CAAC,yBAAsCE,EAAE,KAAK,CAAC,CAAC,EAAE,4BAAyCA,EAAE,KAAK,CAAC,CAAC,EAAE,6BAA6B,CAAC,CAAC,CAAC,CAAC,EAAeoN,GAAyBtN,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,MAAM,CAAC,uBAAuB,KAAK,EAAE,SAAS,CAAC,qBAAkCE,EAAE,KAAK,CAAC,CAAC,EAAE,iCAA8CA,EAAE,KAAK,CAAC,CAAC,EAAE,gCAAgC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeqN,GAAyBrN,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,oFAAiGA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAE,gNAA6NA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,gRAA6RA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,0PAA0P,CAAC,CAAC,CAAC,CAAC,EAAesN,GAAyBxN,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,iBAA8BE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,+HAA4IA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAE,gIAAgI,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,QAAqBE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,ySAAyS,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,2CAAwDE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,kRAAkR,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeuN,GAAyBvN,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,0BAA0B,CAAC,CAAC,CAAC,EAAewN,GAAyBxN,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,2IAA2I,CAAC,CAAC,CAAC,EAAeyN,GAAyBzN,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,MAAM,CAAC,uBAAuB,KAAK,EAAE,SAAS,CAAC,2BAAwCE,EAAE,KAAK,CAAC,CAAC,EAAE,8BAA2CA,EAAE,KAAK,CAAC,CAAC,EAAE,2BAAwCA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe0N,GAAyB1N,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,MAAM,CAAC,uBAAuB,KAAK,EAAE,SAAS,CAAC,gCAA6CE,EAAE,KAAK,CAAC,CAAC,EAAE,mCAAgDA,EAAE,KAAK,CAAC,CAAC,EAAE,iCAA8CA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe2N,GAAyB3N,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,uPAAoQA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,+MAA4NA,EAAE,KAAK,CAAC,CAAC,EAAeF,EAAE,SAAS,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,CAAC,EAAE,oBAAoB,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,gOAA6OA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,yNAAsOA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,gNAAgN,CAAC,CAAC,CAAC,CAAC,EAAe4N,GAAyB9N,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,gBAA6BE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,gQAAgQ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,UAAuBE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,2NAA2N,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,gBAA6BE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,gOAAgO,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,iBAA8BE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,6PAA6P,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,8BAA2CE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,8OAA8O,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe6N,GAAyB7N,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,gQAAgQ,CAAC,CAAC,CAAC,EAAe8N,GAAyBhO,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,CAAC,EAAe+N,GAAyBjO,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gCAAgC,CAAC,CAAC,CAAC,CAAC,EAAegO,GAAyBlO,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+BAA+B,CAAC,EAAE,2OAA2O,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,4SAA4S,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iCAAiC,CAAC,EAAE,kVAAkV,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+BAA+B,CAAC,EAAE,oVAAoV,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeiO,GAAyBnO,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,uUAAuU,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,sSAAsS,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,SAAS,CAAC,EAAE,mTAAmT,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,SAAS,CAAC,EAAE,0SAA0S,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,MAAM,CAAC,EAAE,0SAA0S,CAAC,CAAC,CAAC,CAAC,CAAC,EAAekO,GAAyBlO,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,6TAA6T,CAAC,CAAC,CAAC,EAAemO,GAAyBrO,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+BAA+B,CAAC,CAAC,CAAC,CAAC,EAAeoO,GAAyBtO,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,CAAC,EAAeqO,GAAyBvO,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+CAA+C,CAAC,EAAE,uSAAuS,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qCAAqC,CAAC,EAAE,2PAA2P,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uCAAuC,CAAC,EAAE,kRAAkR,CAAC,CAAC,CAAC,CAAC,CAAC,EAAesO,GAAyBxO,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,sSAAsS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iSAAiS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yPAAyP,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uPAAuP,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uQAAuQ,CAAC,CAAC,CAAC,CAAC,EAAeuO,GAAyBvO,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,0QAA0Q,CAAC,CAAC,CAAC,EAAewO,GAAyB1O,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uCAAuC,CAAC,CAAC,CAAC,CAAC,EAAeyO,GAAyB3O,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,CAAC,EAAe0O,GAAyB5O,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gCAAgC,CAAC,EAAE,oOAAoO,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,uNAAuN,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,0RAA0R,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,qQAAqQ,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe2O,GAAyB7O,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,sSAAsS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uSAAuS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yZAAyZ,CAAC,CAAC,CAAC,CAAC,EAAe4O,GAAyB5O,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,mCAAmC,CAAC,CAAC,CAAC,EAAe6O,GAAyB7O,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,2SAA2S,CAAC,CAAC,CAAC,EAAe8O,GAAyBhP,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,CAAC,EAAe+O,GAAyBjP,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,CAAC,EAAegP,GAAyBlP,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wCAAwC,CAAC,EAAE,wQAAwQ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gCAAgC,CAAC,EAAE,0PAA0P,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,+QAA+Q,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeiP,GAAyBnP,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,mPAAmP,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,oPAAoP,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,uPAAuP,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,yRAAyR,CAAC,CAAC,CAAC,CAAC,CAAC,EAAekP,GAAyBlP,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,EAAemP,GAAyBnP,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,2PAA2P,CAAC,CAAC,CAAC,EAAeoP,GAAyBtP,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,CAAC,EAAeqP,GAAyBvP,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0BAA0B,CAAC,CAAC,CAAC,CAAC,EAAesP,GAAyBxP,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+BAA+B,CAAC,EAAE,wRAAwR,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,uRAAuR,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,mTAAmT,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,6RAA6R,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeuP,GAAyBzP,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,0XAA0X,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,EAAE,kXAAkX,CAAC,CAAC,CAAC,CAAC,CAAC,EAAewP,GAAyBxP,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,wSAAwS,CAAC,CAAC,CAAC,EAC5juJyP,GAAqB,CAAC,QAAU,CAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,SAAW,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,mBAAqB,CAAC,KAAO,UAAU,CAAC,CAAC",
  "names": ["richText", "u", "x", "p", "richText1", "richText2", "richText3", "richText4", "richText5", "richText6", "richText7", "richText8", "richText9", "richText10", "richText11", "richText12", "richText13", "richText14", "richText15", "richText16", "richText17", "richText18", "richText19", "richText20", "richText21", "richText22", "richText23", "richText24", "richText25", "richText26", "richText27", "richText28", "richText29", "richText30", "richText31", "richText32", "richText33", "richText34", "richText35", "richText36", "richText37", "richText38", "richText39", "richText40", "richText41", "richText42", "richText43", "richText44", "richText45", "richText46", "richText47", "richText48", "richText49", "richText50", "richText51", "richText52", "richText53", "richText54", "richText55", "richText56", "richText57", "richText58", "richText59", "richText60", "richText61", "richText62", "richText63", "richText64", "richText65", "richText66", "richText67", "richText68", "richText69", "richText70", "richText71", "richText72", "richText73", "richText74", "richText75", "richText76", "richText77", "richText78", "richText79", "richText80", "richText81", "richText82", "richText83", "richText84", "richText85", "richText86", "richText87", "richText88", "richText89", "richText90", "richText91", "richText92", "richText93", "richText94", "richText95", "richText96", "richText97", "richText98", "richText99", "richText100", "richText101", "richText102", "richText103", "richText104", "richText105", "richText106", "richText107", "richText108", "richText109", "richText110", "richText111", "richText112", "richText113", "richText114", "richText115", "richText116", "richText117", "richText118", "richText119", "richText120", "richText121", "richText122", "richText123", "richText124", "richText125", "richText126", "richText127", "richText128", "richText129", "richText130", "richText131", "richText132", "richText133", "richText134", "richText135", "richText136", "richText137", "richText138", "richText139", "richText140", "richText141", "richText142", "richText143", "richText144", "richText145", "richText146", "richText147", "richText148", "richText149", "richText150", "richText151", "richText152", "richText153", "richText154", "richText155", "richText156", "richText157", "richText158", "richText159", "richText160", "richText161", "richText162", "richText163", "richText164", "richText165", "richText166", "richText167", "richText168", "richText169", "richText170", "richText171", "richText172", "richText173", "richText174", "richText175", "richText176", "richText177", "richText178", "richText179", "richText180", "richText181", "richText182", "richText183", "richText184", "richText185", "richText186", "richText187", "richText188", "richText189", "richText190", "richText191", "richText192", "richText193", "richText194", "richText195", "richText196", "richText197", "richText198", "richText199", "richText200", "richText201", "richText202", "richText203", "richText204", "richText205", "richText206", "richText207", "richText208", "richText209", "richText210", "richText211", "richText212", "richText213", "richText214", "richText215", "richText216", "richText217", "richText218", "richText219", "richText220", "richText221", "richText222", "richText223", "richText224", "richText225", "richText226", "richText227", "richText228", "richText229", "richText230", "richText231", "richText232", "richText233", "richText234", "richText235", "richText236", "richText237", "richText238", "richText239", "richText240", "richText241", "richText242", "richText243", "richText244", "richText245", "richText246", "richText247", "richText248", "__FramerMetadata__"]
}
