{"version":3,"file":"tQZ7tM3qa-4.CeI0GUF5.mjs","names":[],"sources":["https:/framerusercontent.com/modules/4YbcEreTIp0bxiaV6tuj/1US5r89lG7swKlduDJLA/tQZ7tM3qa-4.js"],"sourcesContent":["import{jsx as e,jsxs as t}from\"react/jsx-runtime\";import*as i from\"react\";export const richText=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Jamf Pro:\"}),\" In this use case, Jamf Pro is utilized to gather device inventory data. It serves as the source of truth for device compliance information, ensuring that all relevant data is collected accurately and efficiently without manual intervention.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Sheets:\"}),\" Google Sheets is employed to store and organize the collected compliance data. It acts as a central repository where data is structured and prepared for further processing, facilitating easy access and manipulation of compliance information.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Drive:\"}),\" Google Drive is used to export and store the compliance reports generated from the data in Google Sheets. It provides a secure and accessible location for storing these reports, ensuring they are readily available for review and audit purposes.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Drata:\"}),\" Drata plays a critical role in the compliance management process by receiving the uploaded compliance evidence. It ensures that all compliance documentation is properly stored and associated with the relevant controls, streamlining the audit and compliance verification process.\"]})]});export const richText1=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Threat Management\"})});export const richText2=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"This use case streamlines cybersecurity incident response by automating the killing of active threats detected in CrowdStrike. It integrates CrowdStrike with Slack for efficient communication, enabling rapid threat containment and team notification.\"})});export const richText3=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Threat Response Delays\"}),/*#__PURE__*/e(\"p\",{children:\"Increased Risk of Lateral Movement\"}),/*#__PURE__*/e(\"p\",{children:\"Communication Gaps During Incidents\"})]});export const richText4=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Accelerated Threat Containment\"}),/*#__PURE__*/e(\"p\",{children:\"Enhanced Team Coordination\"}),/*#__PURE__*/e(\"p\",{children:\"Reduced Human Error Risk\"})]});export const richText5=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Threat Detection and Response\"}),\": The workflow automatically identifies active threats in CrowdStrike, immediately initiating the containment process. This rapid response significantly reduces the time between threat detection and action, minimizing potential damage compared to manual monitoring and response.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Process Termination\"}),\": Mindflow automatically executes the command to kill the malicious process in CrowdStrike once a threat is detected. This automation eliminates the need for manual intervention, drastically reducing the time it takes to contain a threat and minimizing the risk of human error.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Team Notification via Slack\"}),\": The workflow instantly notifies the security team through Slack about the detected threat and the action taken. This automated communication ensures all relevant team members are informed in real-time, replacing the need for manual updates and reducing the risk of miscommunication or delayed responses.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Confirmation and Logging\"}),\": After the threat is contained, Mindflow automatically confirms the process's successful termination and logs the action. This automated documentation ensures accurate record-keeping without manual input, providing a reliable audit trail for future analysis and compliance purposes.\"]})]});export const richText6=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"CrowdStrike\"}),\": CrowdStrike is the primary endpoint detection and response (EDR) tool in this use case. It identifies active threats on endpoints and provides information for threat containment. Mindflow leverages CrowdStrike's capabilities to automatically detect malicious processes and execute the termination command, significantly enhancing the speed and efficiency of threat response.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": Slack serves as the communication hub for this workflow. It notifies the security team about detected threats and the actions taken to contain them. By integrating Slack, Mindflow ensures that all relevant team members are instantly informed about security incidents, facilitating quick collaboration and response coordination without requiring manual communication.\"]})]});export const richText7=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Analyze Indicators of Compromise (IOCs) using Mindflow by integrating with Recorded Future. Automate the assessment of hashes, domains, URLs, and IP addresses to enhance threat detection and improve security operations. Streamline workflows and receive detailed reports for actionable insights.\"})});export const richText8=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Threat Analysis Time  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Threat Response  \"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent Threat Assessments\"})]});export const richText9=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Faster Threat Detection  \"}),/*#__PURE__*/e(\"p\",{children:\"Consistent Threat Analysis  \"}),/*#__PURE__*/e(\"p\",{children:\"Improved Security Operations\"})]});export const richText10=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Sending IOCs to Recorded Future\"}),\": Indicators of Compromise (IOCs) such as hashes, domains, URLs, and IP addresses are automatically sent to Recorded Future for analysis. This replaces manual data entry and lookup, providing faster, more accurate threat intelligence and freeing up security teams for higher-priority tasks.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Generating Analysis Reports\"}),\": Automated generation of detailed analysis reports for each IOC provides actionable insights without manual compilation. This ensures consistent, timely information delivery, enhancing decision-making and reducing the time spent on report creation.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Streamlining Threat Detection\"}),\": By automating threat detection processes, Mindflow ensures consistent and rapid identification of potential threats. This reduces the reliance on manual monitoring, allowing security teams to focus on strategic initiatives and improving overall security posture.\"]})]});export const richText11=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Recorded Future: In this use case, Recorded Future is utilized for analyzing Indicators of Compromise (IOCs). It provides comprehensive threat intelligence by evaluating hashes, domains, URLs, and IP addresses. This integration allows for automated, accurate assessments, replacing manual analysis and enhancing the speed and reliability of threat detection.\"}),/*#__PURE__*/t(\"p\",{children:[\"Mindflow webhooks then manage communications such as receiving IOCs and triggering the \",/*#__PURE__*/e(\"em\",{children:\"flow\"}),\". It ensures seamless data transfer between systems, facilitating the initiation of the analysis process without manual intervention, thus streamlining the entire threat intelligence operation.\"]})]});export const richText12=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Monitor and Remediate Uploads on Company's Drive automates file monitoring on Google Drive, deleting unauthorized uploads and notifying teams via Slack. It integrates with Google Pub/Sub, Drive, IAM, OAuth 2, and Slack, enhancing cloud security and insider threat management.\"})});export const richText13=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual File Monitoring Effort  \"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Threat Response Times  \"}),/*#__PURE__*/e(\"p\",{children:\"Increased Risk of Data Breach\"})]});export const richText14=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Real-Time Threat Detection  \"}),/*#__PURE__*/e(\"p\",{children:\"Streamlined File Management  \"}),/*#__PURE__*/e(\"p\",{children:\"Enhanced Team Communication\"})]});export const richText15=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"File Monitoring on Google Drive\"}),\": Unauthorized file uploads are automatically detected and monitored on Google Drive, a task that would typically require continuous manual oversight. This automation ensures immediate identification of potential threats, reducing the risk of data breaches and enhancing security posture.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Notification via Slack\"}),\": Notifications are sent to relevant teams through Slack, replacing manual communication methods. This integration ensures timely alerts and responses, improving team coordination and reducing the time taken to address security incidents.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Unauthorized File Deletion\"}),\": Unauthorized files are automatically deleted from Google Drive, a process that would otherwise require manual intervention and verification. This automation ensures compliance with security policies, reduces the risk of data exposure, and saves significant time and resources.\"]})]});export const richText16=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Drive\"}),\": In this use case, Google Drive is the primary platform where file uploads are monitored. It serves as the repository for company files, and the automation ensures that unauthorized uploads are detected and managed efficiently, maintaining data integrity and security.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Pub/Sub\"}),\": Google Pub/Sub acts as the messaging service that triggers the automation workflow. It captures upload events on Google Drive and initiates the process of monitoring and remediation, ensuring real-time response to potential security threats.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google IAM\"}),\": Google IAM is responsible for managing access permissions within the automation. It ensures that only authorized users can perform specific actions on Google Drive, maintaining strict access control and compliance with security policies.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google OAuth 2\"}),\": Google OAuth 2 provides secure authentication for the automation workflow. It ensures that the integration with Google services is protected, allowing the automation to access necessary resources without compromising security.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": Slack is used for notifying relevant teams about unauthorized uploads. It provides a communication channel for alerts, ensuring that teams are informed promptly and can take necessary actions, enhancing collaboration and response times.\"]})]});export const richText17=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Mindflow streamlines the deactivation of unused AWS IAM Access Keys detected by Wiz, coordinating actions across Wiz, Slack, and ServiceNow for enhanced security and efficient incident resolution.\"})});export const richText18=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Tool Integration Time\"}),/*#__PURE__*/e(\"p\",{children:\"Workflow Configuration\"}),/*#__PURE__*/e(\"p\",{children:\"Process Re-engineering\"})]});export const richText19=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Streamlined Incident Handling\"}),/*#__PURE__*/e(\"p\",{children:\"Immediate Remediation Actions\"}),/*#__PURE__*/e(\"p\",{children:\"Consistent Compliance Posture\"})]});export const richText20=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Issue Detection with Wiz: Mindflow harnesses Wiz to automate the detection of inactive AWS IAM Access Keys, a process that manually can be cumbersome and error-prone. Through this automation, Mindflow ensures immediate identification, enhances security response times, and reduces the window of vulnerability that manual checks might entail.\"}),/*#__PURE__*/e(\"p\",{children:\"Notification through Slack: Mindflow automates sending alerts through Slack, which would otherwise require manual communication efforts. This immediate notification system allows for rapid awareness and action on security issues, bypassing the slower manual emailing or ticket creation methods, thus accelerating the response cycle.\"}),/*#__PURE__*/e(\"p\",{children:\"Incident Ticket Creation in ServiceNow: Mindflow automates the creation of incident tickets in ServiceNow. Manually logging security incidents can be time-consuming and may lead to inconsistent documentation. Automation ensures fast, accurate, and consistent logging, improving the overall incident management process.\"}),/*#__PURE__*/e(\"p\",{children:\"Remediation Workflow Initiation: The automated initiation of the remediation workflow by Mindflow replaces the need for manual intervention to begin the access critical deactivation process. This step significantly reduces the response time, reducing the risk associated with prolonged exposure to stale access keys.\"}),/*#__PURE__*/e(\"p\",{children:\"Access Key Deactivation in AWS: Mindflow automates the deactivation of stale AWS IAM Access Keys directly, which is a detailed and access-sensitive task when done manually. Automation minimizes human error and enforces policy compliance by ensuring that all identified keys are dealt with promptly and consistently.\"}),/*#__PURE__*/e(\"p\",{children:\"Closure and Documentation: Finally, Mindflow automates the closure of the ServiceNow incident and updates the Slack thread. This replaces the manual process of updating tickets and communication threads, which can often lead to oversight or delays, ensuring a clear and timely record of security actions.\"})]});export const richText21=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Wiz: In this scenario, Wiz is pivotal for the initial detection of issues regarding IAM Access Keys within AWS. It acts as the monitoring tool that flags inactive keys, triggering the subsequent automated workflow within Mindflow.\"}),/*#__PURE__*/e(\"p\",{children:\"Slack: Slack is the communication hub where alerts regarding the identified issues are sent. This platform facilitates notification and interaction with the relevant team members, providing a centralized space for receiving alerts and executing remedial actions through automated messages and buttons.\"}),/*#__PURE__*/e(\"p\",{children:\"ServiceNow: ServiceNow comes into play as the incident management system. It is responsible for logging the issues detected by Wiz, creating a structured approach to tracking, auditing, and reporting. This ensures that all incidents are accounted for and can be reviewed or audited formally.\"}),/*#__PURE__*/e(\"p\",{children:\"AWS IAM Roles Anywhere: Mindflow leverages AWS IAM Roles Anywhere to perform the specific task of deactivating the stale AWS IAM Access Keys. It provides the necessary permissions and access control, allowing Mindflow to carry out secure and compliant remediation actions within the AWS environment.\"})]});export const richText22=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automating the detection and remediation of public AWS S3 buckets using JupiterOne and Atlassian Jira. This integration identifies public buckets, creates remediation tasks, and applies necessary access controls, enhancing cloud security and compliance.\"})});export const richText23=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual S3 Bucket Audits\"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Remediation Actions\"}),/*#__PURE__*/e(\"p\",{children:\"High Risk of Data Exposure\"})]});export const richText24=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Faster Threat Detection\"}),/*#__PURE__*/e(\"p\",{children:\"Efficient Issue Management\"}),/*#__PURE__*/e(\"p\",{children:\"Improved Cloud Security\"})]});export const richText25=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Search for Public AWS S3 Buckets: Mindflow automates the search for public AWS S3 buckets using JupiterOne, a task that would typically require manual querying and monitoring. By setting up scheduled searches, Mindflow ensures continuous monitoring, reducing the risk of overlooked vulnerabilities and saving time spent on manual checks.\"}),/*#__PURE__*/e(\"p\",{children:\"Issue Creation in Jira: Mindflow creates issues in Atlassian Jira when public S3 buckets are detected. Manually logging issues involves multiple steps and coordination, which can delay remediation. Automation ensures immediate issue creation with relevant details, speeding up the response time and improving coordination.\"}),/*#__PURE__*/e(\"p\",{children:\"Adding Remediation Prompts: Mindflow adds remediation prompts to Jira issues, guiding teams on necessary actions to secure public S3 buckets. Manually creating these prompts is prone to human error and inconsistencies. Automation provides standardized, accurate instructions, leading to quicker and more effective remediation.\"}),/*#__PURE__*/e(\"p\",{children:\"Setting S3 Public Access Block Policy: Mindflow automates the implementation of the S3 public access block policy using the S3 Control API. Manually applying these policies can be complex and time-consuming, with the potential for errors. Automated execution ensures precise and consistent policy application, enhancing security and compliance.\"}),/*#__PURE__*/e(\"p\",{children:\"Updating Jira with Confirmation: After implementing the block access policy, Mindflow updates the Jira issue with confirmation. Manually tracking and updating the status can lead to delays and miscommunication. Automation provides real-time updates, improving transparency and tracking of remediation actions.\"})]});export const richText26=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"JupiterOne: In this use case, JupiterOne is responsible for continuously searching for public AWS S3 buckets. It sets the search on a regular schedule, ensuring that any public S3 buckets are quickly identified. This replaces the need for manual scanning and monitoring, providing consistent and timely detection of potential security risks.\"}),/*#__PURE__*/e(\"p\",{children:\"Atlassian Jira: Jira is used to create and manage issues when public S3 buckets are detected. It automates the logging of security issues, including detailed prompts for remediation. This integration ensures that security alerts are promptly recorded and assigned, improving response times and coordination among team members.\"}),/*#__PURE__*/e(\"p\",{children:\"S3 Control: S3 Control is utilized to implement the S3 public access block policy automatically. When a public bucket is identified, S3 Control executes the necessary steps to restrict public access, ensuring that security policies are consistently applied without manual intervention. This enhances the security and compliance of AWS S3 buckets.\"})]});export const richText27=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Container Services\"})});export const richText28=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Mindflow automates tagging untagged AWS EC2 instances, ensuring governance compliance by identifying gaps and notifying via Slack, followed by automatic tagging through AWS IAM Roles Anywhere.\"})});export const richText29=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Configuration Time Investment\"}),/*#__PURE__*/e(\"p\",{children:\"Staff Training Requirements\"}),/*#__PURE__*/e(\"p\",{children:\"Automation Tooling Expenses\"})]});export const richText30=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Increased Tagging Accuracy\"}),/*#__PURE__*/e(\"p\",{children:\"Enhanced Compliance Adherence\"}),/*#__PURE__*/e(\"p\",{children:\"Reduced Manual Oversight\"})]});export const richText31=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Tag Identification with AWS EC2: Mindflow automates the identification of AWS EC2 instances lacking required tags, a meticulous task that is susceptible to human error when done manually. By leveraging AWS EC2 Instance Connect and Container Service, Mindflow systematically scans instances, ensuring no untagged resource goes unnoticed, thereby increasing efficiency and reducing the chance of human oversight.\"}),/*#__PURE__*/e(\"p\",{children:\"Notification via Slack: Mindflow automates alerting administrators about untagged EC2 instances through Slack. This task, if conducted manually, would involve significant communication delays. Automation through Mindflow replaces this with instant, actionable notifications, streamlining the process and enabling faster response times.\"}),/*#__PURE__*/e(\"p\",{children:\"Tag Application with IAM Roles: Mindflow uses AWS IAM Roles Anywhere to apply the necessary tags to the identified EC2 instances automatically. Manually performing this task is time-consuming and prone to inconsistencies. With automation, Mindflow ensures uniformity in tag application and helps maintain organizational tagging standards without manual intervention.\"})]});export const richText32=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"AWS EC2 Instance Connect: This tool is crucial in the initial steps of the use case, as it facilitates the retrieval of all AWS EC2 instances. It is instrumental in identifying cases that need attention in terms of tagging, providing a comprehensive overview that would be labor-intensive to compile manually.\"}),/*#__PURE__*/e(\"p\",{children:\"AWS EC2 Container Service: This service extracts detailed information about EC2 instances. It fetches metadata, including the tags associated with each instance, ensuring that any discrepancies or missing tags are accurately identified for further action.\"}),/*#__PURE__*/e(\"p\",{children:\"Slack: Slack is the communication platform used in this use case. It notifies the relevant personnel when an EC2 instance without the required tags is identified. This replaces slower traditional communication methods such as emails, speeding up the response time for remediation.\"}),/*#__PURE__*/e(\"p\",{children:\"AWS IAM Roles Anywhere: This tool performs the remediation step of actually applying the missing tags to EC2 instances. By using AWS IAM Roles Anywhere, Mindflow ensures that the tagging is done with the right level of access and security, which would be a more complex process if done manually.\"})]});export const richText33=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Compliance Management\"})});export const richText34=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Mindflow automates the uploading of vendor compliance reports to Drata, with Slack notifications streamlining communication throughout the process.\"})});export const richText35=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{style:{\"--framer-line-height\":\"2em\"},children:[\"Manual Report Handling\",/*#__PURE__*/e(\"br\",{}),\"Increased Processing Time\",/*#__PURE__*/e(\"br\",{}),\"Potential for Upload Errors\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]});export const richText36=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{style:{\"--framer-line-height\":\"2em\"},children:[\"Streamlined Report Submission\",/*#__PURE__*/e(\"br\",{}),\"Consistent Document Management\",/*#__PURE__*/e(\"br\",{}),\"Real-Time Status Notifications\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]});export const richText37=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Document Upload to Drata\"}),/*#__PURE__*/e(\"br\",{}),\"Mindflow automates the process of uploading vendor compliance reports to Drata, which traditionally requires manual file selection and submission. This automation ensures accuracy and saves considerable time by eliminating repetitive manual uploads.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Slack Notifications\"}),/*#__PURE__*/e(\"br\",{}),\"Upon each upload action, Mindflow automatically sends a message to a designated Slack channel. This replaces the need for manual communication and confirmation, which can be prone to delays and oversights, thereby keeping the team promptly informed.\"]})});export const richText38=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"strong\",{children:[\"Drata\",/*#__PURE__*/e(\"br\",{})]}),\"Drata acts as the central repository for compliance documentation in this use case. It automates the storage and management of vendor reports, ensuring they are easily accessible and securely archived as per compliance requirements.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"strong\",{children:[\"Slack\",/*#__PURE__*/e(\"br\",{})]}),\"Slack is used as the communication platform to notify relevant personnel about the status of report uploads. It ensures that all team members are immediately informed when a report is uploaded, enhancing collaboration and transparency in the compliance process.\"]})]});export const richText39=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Receive and update notable event statuses in Splunk Enterprise Security. By integrating Splunk with automated actions, Mindflow efficiently manages and tracks the status of remarkable events, ensuring timely updates and notifications for improved security incident response.\"})});export const richText40=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Event Tracking\"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Status Updates\"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent Notifications\"})]});export const richText41=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Faster Incident Resolution\"}),/*#__PURE__*/e(\"p\",{children:\"Consistent Event Management\"}),/*#__PURE__*/e(\"p\",{children:\"Improved Security Response\"})]});export const richText42=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Receive Splunk Enterprise Security Notable Events\"}),\": Mindflow automates the reception of notable events in Splunk Enterprise Security, which traditionally requires manual monitoring and logging. Automation ensures real-time event capture, reducing the risk of missed incidents and enabling faster incident awareness.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Create Search to Retrieve Notable Event ID Details\"}),\": Instead of manually initiating searches for notable event details, Mindflow automates the search creation process. This speeds up data retrieval and ensures consistent and accurate information collection, reducing the likelihood of human error and significantly saving time.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Retrieve Splunk Search Status:\"}),\" Mindflow automates the retrieval of the search status in Splunk, a task that typically requires continuous manual checking. This automation ensures timely updates and allows IT teams to focus on higher-priority tasks rather than routine monitoring.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Get Search Results in Splunk Enterprise\"}),\": Mindflow automates the extraction of search results in Splunk and eliminates the manual steps involved in data gathering. This ensures that results are quickly and accurately compiled, facilitating prompt analysis and decision-making.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Update Notable Status and Add Comments in Splunk\"}),\": Mindflow automates updating notable statuses and adding comments within Splunk. This task, usually done manually and can be time-consuming, is streamlined, ensuring all updates are consistently applied and reducing administrative burden.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Send Email Notification\"}),\": Mindflow automates sending email notifications regarding search results and status updates. This replaces the manual task of composing and sending emails, ensuring timely and consistent communication with relevant stakeholders, and enhancing the overall efficiency of incident response.\"]})]});export const richText43=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Splunk Enterprise Security: In this use case, Splunk Enterprise Security is the primary tool for monitoring and managing notable events. It receives security-related data and generates notable events that require further investigation. Mindflow integrates with Splunk to automate these notable events' reception, search creation, and status updates, ensuring a seamless flow of information and prompt action.\"})});export const richText44=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"This use case simplifies vulnerability management by integrating CrowdStrike Falcon Spotlight with Drata. It automates the extraction of vulnerability data from CrowdStrike and seamlessly uploads it to Drata, improving security compliance documentation and reducing manual effort in vulnerability tracking and reporting.\"})});export const richText45=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Vulnerability Data Transfer\"}),/*#__PURE__*/e(\"p\",{children:\"Time-Consuming Compliance Documentation\"}),/*#__PURE__*/e(\"p\",{children:\"Potential for Human Error\"})]});export const richText46=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Accelerated Vulnerability Management\"}),/*#__PURE__*/e(\"p\",{children:\"Enhanced Compliance Reporting\"}),/*#__PURE__*/e(\"p\",{children:\"Improved Security Team Efficiency\"})]});export const richText47=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Vulnerability data extraction from CrowdStrike:\"}),\" The workflow automatically pulls vulnerability data from CrowdStrike Spotlight, replacing manual data retrieval processes. This automation consistently gathers up-to-date and accurate vulnerability information, eliminating time-consuming manual searches and potential oversights.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data transformation and formatting:\"}),\" Extracted vulnerability data is automatically transformed and formatted to meet Drata's requirements. This task, typically requiring manual data manipulation and formatting, is executed instantly and accurately, reducing the risk of errors and inconsistencies in compliance documentation.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Drata evidence upload\"}),\": The vulnerability data is formatted and automatically uploaded to Drata as compliance evidence, eliminating the need to manually log into Drata, find the right section, and input or upload the data. Automation guarantees that compliance documentation is consistently and promptly updated without human intervention.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Vulnerability management context creation:\"}),\" The workflow automatically creates a vulnerability management context in Drata, linking the uploaded evidence to the appropriate compliance controls. This task, often requiring manual association and contextualization, is now performed systematically, ensuring comprehensive and properly organized compliance documentation.\"]})]});export const richText48=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"CrowdStrike Falcon Spotlight\"}),\": In this use case, CrowdStrike Spotlight serves as the primary source of vulnerability data. It provides comprehensive information about potential security weaknesses within the organization's network. The integration allows for automatic extraction of this critical vulnerability data, ensuring that the most up-to-date security information is always available for compliance and risk management purposes.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Drata\"}),\": Drata plays a crucial role in this workflow as the compliance and security automation platform. It acts as the central repository for compliance evidence and documentation. The integration with Drata allows for the automatic uploading of formatted vulnerability data from CrowdStrike, creating vulnerability management contexts, and linking evidence to appropriate compliance controls. This automation significantly streamlines the compliance documentation process and ensures that security posture information is always current and organized adequately within the compliance framework.\"]})]});export const richText49=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Mindflow facilitates tracking and adding background check evidence to Drata for regulatory compliance. By integrating Drata, Mindflow automates the identification of personnel lacking background checks and ensures evidence is uploaded, maintaining continuous compliance.\"})});export const richText50=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Compliance Tracking\"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent Background Check Documentation\"}),/*#__PURE__*/e(\"p\",{children:\"Time-Consuming Evidence Upload\"})]});export const richText51=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Continuous Compliance Monitoring\"}),/*#__PURE__*/e(\"p\",{children:\"Consistent Documentation\"}),/*#__PURE__*/e(\"p\",{children:\"Time-Saving Evidence Upload\"})]});export const richText52=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Get List of Personnel in Drata:\"}),\" Mindflow automates retrieving the list of personnel in Drata who lack a background check. Traditionally, this task involves manually querying the database, filtering records, and compiling lists, which is time-consuming and prone to errors. Automation ensures accurate, real-time data retrieval, reducing administrative burden and improving efficiency.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Filter Personnel Without Background Checks:\"}),\" The next task is filtering out personnel from the retrieved list without background checks. Manually, this involves checking each record against compliance criteria, a tedious and error-prone process. Mindflow's automation swiftly identifies non-compliant personnel, ensuring no one is overlooked, enhancing regulatory adherence, and saving time.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Upload Background Check Evidence:\"}),\" Finally, Mindflow automates uploading background check evidence for flagged personnel. Manually uploading documents involves repetitive data entry and significant time investment. Automation streamlines this process, ensuring timely and consistent evidence submission, maintaining compliance, and freeing up valuable resources for more strategic tasks.\"]})]});export const richText53=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Drata\"}),\": In this use case, Drata can access and manage personnel records. It allows Mindflow to retrieve the list of personnel, filter those without background checks, and upload necessary compliance evidence. The Drata API ensures seamless integration with Drata's compliance management system, automating data retrieval and submission processes.\"]})});export const richText54=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"This use case streamlines email security by automating attachment analysis with GLIMPS malware detection. It integrates Gmail for email retrieval and deletion and Slack for instant notifications, enhancing cybersecurity workflows and reducing manual intervention in threat assessment.\"})});export const richText55=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual analysis slows threat response\"}),/*#__PURE__*/e(\"p\",{children:\"Delayed malware detection increases risk\"}),/*#__PURE__*/e(\"p\",{children:\"Inefficient use of security resources\"})]});export const richText56=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Accelerated threat detection and remediation\"}),/*#__PURE__*/e(\"p\",{children:\"Enhanced email security workflow efficiency\"}),/*#__PURE__*/e(\"p\",{children:\"Real-time team notifications via Slack\"})]});export const richText57=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Email Attachment Analysis\"}),\": GLIMPS Malware Finder automatically scans forwarded email attachments, replacing time-consuming manual checks. This automation significantly reduces the risk of overlooking threats and accelerates the overall security response time.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Notification via Slack\"}),\": The process automatically notifies relevant team members about the analysis results through Slack. This instant communication eliminates threat awareness and response delays, enabling quicker decision-making compared to traditional email or manual reporting methods.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Gmail Integration for Cleanup\"}),\": If no threat is detected, the workflow automatically deletes the analyzed email from the user's Gmail inbox. This seamless cleanup process maintains inbox hygiene without manual intervention, saving time and reducing the risk of accidental exposure to potential threats.\"]})]});export const richText58=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"GLIMPS\"}),\": GLIMPS Malware Finder is the primary security tool in this workflow. It analyzes forwarded email attachments for potential threats, automating a critical step in email security. This integration enables rapid and accurate malware detection, significantly enhancing the organization's defense against email-borne threats.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Gmail\"}),\": In this use case, Gmail serves as both the source and destination for email management. It allows for retrieving forwarded emails with attachments and deleting processed messages. This integration streamlines email handling, ensuring that potentially harmful emails are promptly addressed and removed from user inboxes.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": Slack acts as the communication hub for this automated workflow. It receives and disseminates analysis results to relevant team members, enabling quick notifications about potential threats or all-clear signals. This integration ensures that security teams are promptly informed, facilitating rapid response to detected malware.\"]})]});export const richText59=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Device Security\"})});export const richText60=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/t(\"p\",{children:[\"This use case streamlines updating JAMF Pro's \",/*#__PURE__*/e(\"code\",{children:\"ExtensionInstallBlocklist\"}),\" for Chrome extensions. It automates user authorization, fetches configuration profiles, updates the blocklist, and notifies teams via Slack, enhancing security management efficiency for macOS devices.\"]})});export const richText61=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual blocklist updates\"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent extension blocking\"}),/*#__PURE__*/e(\"p\",{children:\"Delayed security response\"})]});export const richText62=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Rapid extension blocklist\"}),/*#__PURE__*/e(\"p\",{children:\"Unified device security \"}),/*#__PURE__*/e(\"p\",{children:\"Enhanced IT productivity\"})]});export const richText63=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"User Authorization\"}),\": The workflow begins by verifying user authorization, a critical security step typically requiring manual checks. This automation ensures that only authorized personnel can initiate changes to the \",/*#__PURE__*/e(\"code\",{children:\"ExtensionInstallBlocklist\"}),\", reducing the risk of unauthorized modifications and saving time on security validations.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Configuration Profile Retrieval\"}),\": The process automatically fetches OS X configuration profiles from JAMF Pro. This task would generally involve navigating through the JAMF Pro interface and manually searching for the correct profiles, but it is streamlined to retrieve the necessary information quickly and accurately.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Blocklist Update\"}),\": The workflow updates the \",/*#__PURE__*/e(\"code\",{children:\"ExtensionInstallBlocklist\"}),\" on JAMF Pro with new Chrome extension IDs. This automation replaces the manual process of editing configuration profiles, which is prone to errors and time-consuming. By automating this step, the system ensures rapid and accurate updates to the blocklist across all managed devices.\"]})]});export const richText64=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Jamf Pro\"}),\": This integration is central to the workflow, enabling direct interaction with JAMF Pro's management system. It's used to retrieve OS X configuration profiles, access the current \",/*#__PURE__*/e(\"code\",{children:\"ExtensionInstallBlocklist\"}),\", and update it with new Chrome extension IDs. This integration eliminates manual navigation through the JAMF Pro interface, significantly speeding up the process.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"OpenAI\"}),\": The OpenAI is utilized to create a completion for the chat message. This suggests that natural language processing is employed, possibly to interpret user inputs or generate human-readable descriptions of the changes being made. This addition enhances the workflow's ability to handle complex requests and provide clear, contextual information.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": After the workflow, Slack sends a notification message to a specified channel. This automated communication ensures that all relevant team members are immediately informed about the updates to the ExtensionInstallBlocklist, enhancing team coordination and awareness without requiring manual status updates.\"]})]});export const richText65=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"This use case automates the containment of devices flagged by CrowdStrike Falcon Overwatch, integrating with Jira for incident tracking. It streamlines threat response, enabling rapid device isolation and creating a detailed audit trail for security teams.\"})});export const richText66=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Delayed Threat Containment\"}),/*#__PURE__*/e(\"p\",{children:\"Manual Tracking Inefficiencies\"}),/*#__PURE__*/e(\"p\",{children:\"Increased Risk of Spread\"})]});export const richText67=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Rapid Device Isolation\"}),/*#__PURE__*/e(\"p\",{children:\"Streamlined Incident Documentation\"}),/*#__PURE__*/e(\"p\",{children:\"Enhanced Team Collaboration\"})]});export const richText68=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Detection and Containment in CrowdStrike\"}),\": The workflow automatically identifies devices flagged by CrowdStrike Falcon Overwatch and initiates containment. This rapid response significantly reduces the time between threat detection and isolation, minimizing potential damage compared to manual monitoring and response processes.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Jira Ticket Creation\"}),\": Upon detection of a flagged device, a Jira ticket is automatically created. This eliminates manual ticket creation, ensuring all incidents are promptly documented and tracked. The automation reduces the risk of oversight and provides a centralized platform for incident management.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Device Containment Confirmation\"}),\": The workflow automatically confirms the successful containment of the flagged device in CrowdStrike. This verification step, typically requiring manual checking, ensures that the containment action was executed successfully, providing immediate assurance to the security team.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Jira Ticket Update\"}),\": After containment is confirmed, the Jira ticket is automatically updated with the latest status. This automated documentation ensures accurate, real-time incident tracking without manual input, facilitating better coordination among team members and providing a reliable audit trail.\"]})]});export const richText69=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"CrowdStrike Falcon\"}),\": CrowdStrike Falcon Overwatch is the primary threat detection and response tool in this use case. It identifies potentially compromised devices and triggers the automated containment process. By integrating with CrowdStrike, Mindflow enables rapid response to threats. When a device is flagged, Mindflow automatically initiates containment procedures, significantly reducing the time between detection and action.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Atlassian Jira\"}),\": Jira is crucial in incident tracking and management within this workflow. It automatically creates and updates tickets for each flagged device, providing a centralized platform for tracking the status of containment actions and any subsequent investigations. This integration ensures that all incidents are properly documented, allowing for better coordination among security team members and creating a comprehensive audit trail for each event.\"]})]});export const richText70=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Malware Detection\"})});export const richText71=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"This use case integrates Google Drive, GLIMPS, and Slack to detect and remediate malware in uploaded files automatically. It enhances cloud storage security by analyzing file metadata, conducting real-time threat assessments, alerting teams via Slack, and streamlining cybersecurity workflows for Google Workspace environments.\"})});export const richText72=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual file scanning slows productivity\"}),/*#__PURE__*/e(\"p\",{children:\"Delayed threat detection increases risk\"}),/*#__PURE__*/e(\"p\",{children:\"Resource-intensive security monitoring processes\"})]});export const richText73=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Real-time threat detection and remediation\"}),/*#__PURE__*/e(\"p\",{children:\"Streamlined Google Workspace security \"}),/*#__PURE__*/e(\"p\",{children:\"Enhanced instant notifications\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]});export const richText74=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"File Monitoring on Google Drive\"}),\": The workflow constantly monitors Google Drive for new file uploads, eliminating the need for manual checks. This automated vigilance ensures immediate detection of potential threats, significantly reducing the window of vulnerability compared to periodic manual reviews.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"File Analysis with GLIMPS\"}),\": Newly uploaded files are automatically submitted to GLIMPS Malware Finder for analysis. This replaces time-consuming manual malware scans, providing rapid and consistent threat assessment without human intervention and enhancing security response times and accuracy.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Automated Remediation\"}),\": Upon malware detection, the system automatically deletes the infected file from Google Drive. This swift action prevents the spread of threats across the organization, which could take hours or days if performed manually, dramatically improving overall security posture.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack Notifications\"}),\": The workflow sends instant notifications to relevant team members via Slack about analysis results and actions taken. This automated communication eliminates threat awareness and response delays, enabling quicker decision-making compared to traditional email or manual reporting methods.\"]})]});export const richText75=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Drive:\"}),\" Google Drive functions as the primary file storage and sharing platform in this workflow. It triggers the automation process when new files are uploaded, allowing for real-time monitoring and analysis of incoming data. This integration enables proactive security measures for cloud-stored files.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"GLIMPS:\"}),\" GLIMPS serves as the core security analysis tool in this workflow. It examines files uploaded to Google Drive for potential malware threats. By automating this critical security check, GLIMPS significantly enhances the organization's ability to detect and prevent malware infiltration through cloud storage.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Workspace\"}),\": Google Workspace integration allows the workflow to access and manage file metadata and content. It provides essential information about uploaded files, enabling more comprehensive security analysis and facilitating automated remediation actions when threats are detected.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": Slack acts as the communication hub for this automated security workflow. It receives and disseminates analysis results and remediation actions to relevant team members. This integration ensures that security teams are promptly informed of potential threats or successful remediations, facilitating rapid response and maintaining team awareness.\"]})]});export const richText76=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Mindflow automates the analysis and triage of suspicious emails using Atlassian Jira, VirusTotal, EmailRep, NextDNS Denylist, CrowdStrike, and URLScan.io. This integration facilitates rapid identification and response to email threats, enhancing organizational cybersecurity.\"})});export const richText77=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"ClickOps for multiple tools\"}),/*#__PURE__*/e(\"p\",{children:\"Manual data correlation\"}),/*#__PURE__*/e(\"p\",{children:\"Increased response times\"})]});export const richText78=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Instant threat identification\"}),/*#__PURE__*/e(\"p\",{children:\"Streamlined incident response\"}),/*#__PURE__*/e(\"p\",{children:\"Enhanced email security\"})]});export const richText79=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Receiving and processing emails: Mindflow automates the reception and initial processing of emails, tasks that require significant manual effort to sift through large volumes of emails daily. By automating these processes with tools like EmailRep and Atlassian Jira, Mindflow effectively reduces the time spent on manual sorting and preliminary analysis, ensuring that only relevant communications require human intervention. This significantly decreases the risk of overlooking critical emails, enhancing overall productivity and response accuracy.\"}),/*#__PURE__*/e(\"p\",{children:\"Attachment and URL analysis: Mindflow automates the scrutiny of attachments and URLs within emails, a crucial step that manually demands thorough, time-consuming examination to avoid security breaches. Utilizing tools like VirusTotal, URLScan.io, and CrowdStrike, the platform conducts comprehensive scans that swiftly identify potentially malicious content. Automation here speeds up the analysis process and enhances the accuracy and consistency of threat detection, reducing the likelihood of security incidents.\"}),/*#__PURE__*/e(\"p\",{children:\"Incident response and ticketing: Automatically creating incident tickets in response to suspicious emails through Mindflow, using Atlassian Jira, replaces the manual task of logging and categorizing incidents. This automation facilitates a faster, more organized response to threats and streamlines communication among response teams. By integrating detailed analyses from EmailRep and other tools directly into the ticketing system, teams can access all relevant information in one place, which expedites resolution times and boosts the overall efficiency of the cybersecurity response efforts.\"})]});export const richText80=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Atlassian Jira: In this use case, Atlassian Jira functions as a management tool for incident response. It automatically creates and updates tickets based on analysis results from other integrated services. This facilitates a streamlined approach to tracking and resolving issues the automated email analysis raises, ensuring that all actionable insights are documented and addressed promptly within an organized system.\"}),/*#__PURE__*/e(\"p\",{children:\"VirusTotal: A key player in our automated workflow, VirusTotal is more than just a scanner. It's a real-time threat detection powerhouse. By scanning attachments and URLs within emails for malicious content, it helps us rapidly identify potential threats. This service is a game-changer, enhancing our security measures by ensuring that any suspicious elements in the emails are thoroughly vetted before they can cause harm.\"}),/*#__PURE__*/e(\"p\",{children:\"EmailRep: EmailRep assesses the reputation of the email sender. It analyzes sender details to determine if the source can be trusted or has been associated with previous security incidents or spam activities. This insight is crucial for the initial screening of incoming emails, helping to prioritize and triage emails based on the risk associated with the sender.\"}),/*#__PURE__*/e(\"p\",{children:\"NextDNS Denylist: The NextDNS Denylist is integrated into the workflow to check if any of the domains or IP addresses associated with the email or its contents are on known denylists. This helps quickly identify and block potential threats from sources already recognized as harmful, thereby enhancing the overall security posture against known malicious entities.\"}),/*#__PURE__*/e(\"p\",{children:\"CrowdStrike: CrowdStrike is involved in its advanced threat intelligence capabilities. This scenario provides deep analysis and contextual information about the endpoints that could be affected by the malicious emails or their contents. This tool supports proactive threat mitigation strategies by offering detailed insights into possible vulnerabilities and attack vectors.\"}),/*#__PURE__*/e(\"p\",{children:\"URLScan.io: URLScan.io analyzes URLs within the emails for malicious content. It performs a safe, real-time rendering of web pages to identify harmful scripts or redirects. This tool plays a pivotal role in preventing phishing and other web-based attacks by ensuring that links embedded in emails are safe to access, adding a layer of security to the email triage process. Analyze sender details to determine if the source can be trusted or\"})]});export const richText81=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Run a CrowdStrike Real-Time Response command to manage endpoint security. Using CrowdStrike Falcon, this automation initializes sessions, executes commands, and monitors their status, ensuring efficient, real-time threat response and mitigation.\"})});export const richText82=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Threat response delays\"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent endpoint security management\"}),/*#__PURE__*/e(\"p\",{children:\"High risk of human error\"})]});export const richText83=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Rapid threat mitigation\"}),/*#__PURE__*/e(\"p\",{children:\"Consistent SecOps\"}),/*#__PURE__*/e(\"p\",{children:\"Reduced error rates\"})]});export const richText84=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Session Initialization with CrowdStrike Falcon\"}),\": Trigger-based starting of a new session with the CrowdStrike Falcon Real-Time Response (RTR) tool. This process usually involves manual intervention and oversight. By automating this task, Mindflow ensures that sessions are initiated promptly and accurately, reducing administrative workload and minimizing delays.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Command Execution in RTR\"}),\": Executing administrator commands within the CrowdStrike RTR environment. This eliminates the need for manual command input and execution, which can be time-consuming and prone to human error. The automation ensures that commands are executed quickly and accurately, improving operational efficiency and response times.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Status Monitoring and Verification\"}),\": The next step is continuously verifying the status of executed RTR commands. Instead of relying on manual checks and follow-ups, this automation allows for real-time status updates, ensuring that responses are tracked accurately and any issues are identified immediately. This leads to faster resolution times and improved reliability in threat response activities.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Session File Management\"}),\": Finally, deleting RTR session files once commands are completed. Typically done manually, this task ensures that session data is managed efficiently and securely, reducing the risk of data retention issues and maintaining a clean and organized system. This automation enhances data management practices and overall system performance.\"]})]});export const richText85=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"CrowdStrike Falcon:\"}),\" In this use case, CrowdStrike Falcon is the primary tool for executing Real-Time Response (RTR) commands. It initializes sessions, executes administrator commands, and monitors their status. Integrating with Mindflow enhances CrowdStrike Falcon's capabilities, allowing for automated and efficient threat response and endpoint management.\"]})});export const richText86=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"This use case streamlines the restarting of computers managed by Check Point Harmony Endpoint. It automates device identification, restart initiation, and status tracking, enhancing IT efficiency and reducing downtime during necessary system maintenance or troubleshooting.\"})});export const richText87=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Device Restart Delays\"}),/*#__PURE__*/e(\"p\",{children:\"Increased IT Support Workload\"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent Restart Documentation\"})]});export const richText88=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Streamlined Device Management Process\"}),/*#__PURE__*/e(\"p\",{children:\"Reduced System Downtime\"}),/*#__PURE__*/e(\"p\",{children:\"Enhanced IT Operational Efficiency\"})]});export const richText89=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Device Identification\"}),\": The workflow automatically identifies computers managed by Check Point Harmony Endpoint that match specified criteria. This eliminates the need for manual device lookup, saves time, and reduces the risk of targeting incorrect machines for restart.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Restart Initiation\"}),\": The system automatically starts the restart process after identifying the target devices, removing the need for IT personnel to manually initiate restarts. This allows them to focus on more complex tasks while ensuring consistent and timely system maintenance.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Status Tracking\"}),\": The workflow continuously monitors the restart process, automatically retrieving status updates and results. This replaces manual checking and logging, providing real-time visibility into the restart progress and ensuring accurate documentation of the maintenance action.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Job Completion Notification\"}),\": Upon the restart process's completion, the system automatically generates a notification with relevant details such as \",/*#__PURE__*/e(\"code\",{children:\"computerID\"}),\", \",/*#__PURE__*/e(\"code\",{children:\"computerOwner\"}),\", and \",/*#__PURE__*/e(\"code\",{children:\"timestamp\"}),\". This eliminates the need for manual reporting, ensuring all stakeholders are promptly and consistently informed of the maintenance action's outcome.\"]})]});export const richText90=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Check Point Harmony Endpoint\"}),\": In this use case, the Check Point Harmony Endpoint is the primary tool for managing and interacting with the target computers. It provides the necessary APIs for device identification, initiating restarts, and retrieving status updates. By integrating with Harmony Endpoint, Mindflow leverages its capabilities to perform remote system management tasks efficiently and securely.\"]}),/*#__PURE__*/e(\"p\",{children:\"Mindflow handles the response from the restart process and sends the information back to Check Point. It automatically receives and processes the status updates and results of the restart operation. This automation ensures that the workflow can respond dynamically to the restart progress, enabling efficient tracking and reporting of the maintenance action.\"})]});export const richText91=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"This use case streamlines the authentication process for Check Point Harmony Endpoint API access. It automates token retrieval and API work-session creation, enhancing security and efficiency for users interacting with the Harmony Endpoint ecosystem.\"})});export const richText92=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Token Retrieval Delays\"}),/*#__PURE__*/e(\"p\",{children:\"Increased Risk of Human Error\"}),/*#__PURE__*/e(\"p\",{children:\"Time-Consuming API Authentication Processes\"})]});export const richText93=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Streamlined API Access Workflow\"}),/*#__PURE__*/e(\"p\",{children:\"Enhanced Security Through Consistency\"}),/*#__PURE__*/e(\"p\",{children:\"Improved Developer Productivity\"})]});export const richText94=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Bearer Token Retrieval\"}),\": The workflow automatically requests and obtains the bearer token from the Check Point Harmony Endpoint. This eliminates the need for manual token retrieval, significantly reducing the time and potential for errors associated with manually obtaining and managing authentication tokens.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"API Work-Session Creation\"}),\": Upon receiving the bearer token, the system automatically creates a new API work session. This streamlines the establishment of a secure connection for API interactions, removing the manual steps typically required to initiate an API session and reducing the risk of session setup errors.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Token Distribution\"}),\": The workflow automatically posts the bearer token and x-mgm-api-token back to the principal. This ensures that users can populate their request headers automatically, eliminating the manual task of token insertion and reducing the risk of unauthorized access due to improperly handled tokens.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Webhook Response Handling\"}),\": The system manages the webhook response automatically, ensuring that the authentication flow is completed seamlessly. This automates the final step of the authentication process, immediately confirming successful authentication and readiness for API interactions without manual verification.\"]})]});export const richText95=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Check Point Harmony Endpoint\"}),\": In this use case, the Check Point Harmony Endpoint is the primary authentication service. It is responsible for issuing the bearer token necessary for API access. By integrating with Harmony Endpoint, Mindflow automates retrieving and managing these authentication tokens, eliminating the need for manual token requests and reducing the risk of expired or invalid tokens.\"]}),/*#__PURE__*/e(\"p\",{children:\"Mindflow ensures consistent and secure communication with the Harmony Endpoint service, reducing the likelihood of errors that could occur during manual token management.\"}),/*#__PURE__*/e(\"p\",{children:\"After receiving and processing the authentication results, including the bearer token and x-mgm-api-token, this automation ensures that the tokens are immediately available in subsequent workflows, streamlining the entire authentication flow and reducing delays in API access.\"})]});export const richText96=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"This use case streamlines user lifecycle management in Acronis by automating creation, updating, and deletion processes. It integrates Slack for real-time notifications, enhancing efficiency in user administration while reducing manual errors and improving communication across IT teams.\"})});export const richText97=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Access Management Overhead\"}),/*#__PURE__*/e(\"p\",{children:\"Delayed User Access Provisioning\"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent Communication Across Teams\"})]});export const richText98=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Streamlined User Lifecycle Processes\"}),/*#__PURE__*/e(\"p\",{children:\"Reduced Administrative Error Rates\"}),/*#__PURE__*/e(\"p\",{children:\"Enhanced Cross-Team Collaboration\"})]});export const richText99=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"User Creation in Acronis\"}),\": The workflow automatically creates new user accounts in Acronis based on the provided information. This replaces manual user creation processes, significantly reducing the time and potential for errors associated with manual data entry and ensuring consistent and accurate user provisioning.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"User Update in Acronis\"}),\": When changes are required, existing user information is automatically updated in Acronis. This eliminates the need for manual updates across potentially complex user management interfaces, ensuring that user data remains current and accurate with minimal administrative effort.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"User Deletion in Acronis\"}),\": The system automatically deletes user accounts from Acronis when necessary. This streamlines offboarding procedures, reducing the risk of orphaned accounts and ensuring prompt removal of access rights, thereby enhancing the overall security posture.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack Notifications\"}),\": At key points in the user management process, real-time notifications are automatically sent to relevant Slack channels. This replaces manual communication methods, ensuring all team members are promptly informed of user account changes, improving coordination, and reducing the risk of miscommunication.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"User Existence Verification\"}),\": The workflow automatically checks for existing user accounts before attempting creation or deletion. This prevents duplicate accounts or erroneous deletions, tasks typically requiring careful manual verification, thus saving time and reducing administrative errors.\"]})]});export const richText100=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Acronis\"}),\": In this workflow, Acronis serves as the primary platform for user management. It is responsible for the core operations of creating, updating, and deleting user accounts. The integration with Acronis allows for automated execution of these tasks, ensuring consistency in user lifecycle management and reducing the need for manual intervention in routine administrative processes.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": Slack functions as the communication hub for this workflow. It sends real-time notifications about user management actions to relevant team channels. This integration ensures that all stakeholders are promptly informed about account creations, updates, and deletions, facilitating better coordination among IT teams and enhancing overall transparency in user management processes.\"]})]});export const richText101=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Enterprise 2FA\"})});export const richText102=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"This use case streamlines 2FA compliance by automatically checking user activation status across tenant accounts. It integrates Acronis for user data retrieval and email systems for notifications, enhancing security posture and reducing manual oversight in multi-factor authentication management.\"})});export const richText103=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual 2FA Activation Verification\"}),/*#__PURE__*/e(\"p\",{children:\"Time-Consuming Compliance Tracking \"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent 2FA Enforcement\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]});export const richText104=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Streamlined 2FA Compliance Monitoring \"}),/*#__PURE__*/e(\"p\",{children:\"Reduced SecOps & Compliance Overhead \"}),/*#__PURE__*/e(\"p\",{children:\"Improved Authentication\"})]});export const richText105=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"User Data Retrieval\"}),\": The workflow automatically fetches user data from Acronis for all tenant users. This replaces manual data extraction processes, significantly reducing the time and effort required to gather user information and eliminating the risk of overlooking accounts.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"2FA Activation Status Check\"}),\": The system automatically verifies each user's 2FA activation status. This eliminates the need for manual checks across potentially hundreds or thousands of user accounts, ensuring consistent and thorough compliance monitoring.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Automated Email Notifications\"}),\": When a user is identified as not having 2FA activated, an email prompting them to enable it is automatically sent. This replaces manual follow-ups, ensuring timely and consistent communication with non-compliant users and reducing the workload on IT and security teams.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"MFA Status Management\"}),\": For users with activated accounts without 2FA, the system automatically manages their Multi-Factor Authentication status. This streamlines the enforcement of security policies, reduces the manual intervention required, and ensures the consistent application of 2FA requirements.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Compliance Reporting\"}),\": The workflow generates comprehensive reports on 2FA compliance status across the organization. This replaces manual data compilation and analysis, providing real-time insights into the security posture and enabling quick identification of compliance gaps.\"]})]});export const richText106=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Acronis\"}),\": In this workflow, Acronis serves as the primary data source for user information. It provides comprehensive details about tenant users, including their account status and authentication settings. Integrating with Acronis, the workflow can efficiently retrieve and process user data, enabling automated checks and actions based on up-to-date information.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Email (Gmail, Outlook, etc.):\"}),\" The email system plays a crucial role in the communication aspect of this workflow. It automatically sends activation emails to users who haven't enabled 2FA. This integration ensures timely and consistent outreach to non-compliant users, prompting them to activate 2FA and improve the organization's security posture. The email system transforms what would typically be a manual follow-up process into an automated, scalable solution.\"]})]});export const richText107=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Secrets Management\"})});export const richText108=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"This use case streamlines secret incident management by integrating GitGuardian, GitHub, and Slack. It automates detection, notification, and remediation of exposed secrets, enhancing security posture and reducing response times for development and security teams.\"})});export const richText109=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Delayed Incident Response\"}),/*#__PURE__*/e(\"p\",{children:\"Manual GitHub Repository Scanning\"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent Notifications\"})]});export const richText110=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Accelerated Remediation \"}),/*#__PURE__*/e(\"p\",{children:\"Enhanced DevOps Security \"}),/*#__PURE__*/e(\"p\",{children:\"Streamlined Cross-Platform Notifications\"})]});export const richText111=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Secret Incident Detection\"}),\": GitGuardian alerts are automatically processed, extracting critical information about exposed secrets. This eliminates manual monitoring and initial triage, significantly reducing the time between secret exposure and detection and minimizing the window of vulnerability.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"GitHub Repository Analysis\"}),\": The affected GitHub repository is automatically analyzed to retrieve relevant details such as the owner, commit information, and file location. This replaces manual repository investigation, accelerating the incident context-gathering process and enabling faster, more informed remediation decisions.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack Notification and Collaboration\"}),\": Relevant team members are instantly notified via Slack with comprehensive incident details. This automated communication replaces ad-hoc alerting methods, ensuring consistent and timely dissemination of critical security information across development and security teams.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Automated Secret Revocation\"}),\": The workflow can initiate automated revocation processes based on the severity of the incident and the type of secret exposed. This eliminates manual secret management tasks, significantly reducing the time secrets remain exposed and minimizing potential security risks.\"]})]});export const richText112=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"GitGuardian\"}),\": GitGuardian serves as the primary security scanning tool in this workflow. It monitors code repositories for exposed secrets, such as API keys or passwords. When a secret is detected, GitGuardian triggers an alert, initiating Mindflow's automated incident response process.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"GitHub\"}),\": GitHub is the version control platform where the code repositories reside. In this workflow, GitHub's API retrieves detailed information about the repository where a secret was exposed, including commit details, file locations, and repository ownership. This integration allows for precise identification and remediation of security issues.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": Slack functions as the central communication hub for this workflow. It receives automated notifications about detected secrets, disseminates this information to relevant team members, and facilitates real-time collaboration on incident response. Slack's integration ensures that security alerts are promptly addressed and all stakeholders are informed throughout the remediation process.\"]})]});export const richText113=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Credential Security\"})});export const richText114=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Check for leaked credentials using Digital Shadows, create tickets in Freshservice, and reset passwords in Google Workspace. Integrating these tools ensures swift identification and remediation of security threats, maintaining account security through automated responses.\"})});export const richText115=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual credential monitoring\"}),/*#__PURE__*/e(\"p\",{children:\"Delayed threat response\"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent remediation actions\"})]});export const richText116=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Faster threat detection\"}),/*#__PURE__*/e(\"p\",{children:\"Consistent security measures\"}),/*#__PURE__*/e(\"p\",{children:\"Streamlined incident response\"})]});export const richText117=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Get Alert in Digital Shadows SearchLight:\"}),\" Automatically retrieves alerts from Digital Shadows SearchLight, eliminating the need for manual monitoring. This ensures timely identification of potential security threats, reducing the risk of overlooked incidents.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Get Alert Screenshot in Digital Shadows SearchLight:\"}),\" This task captures and stores screenshots of alerts directly from Digital Shadows. Automating this task provides a visual record of alerts without manual intervention, enhancing documentation and facilitating quicker threat analysis.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Create a Ticket in Freshservice:\"}),\" Upon alert detection, a ticket is automatically created in Freshservice, streamlining the incident management process. This automation reduces administrative workload, ensuring that all alerts are promptly tracked and addressed without delay.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"HTTP Request to Test Credentials:\"}),\" Executes HTTP requests to verify the validity of credentials, replacing manual testing. Automated credential testing speeds up the validation process, enabling faster identification of compromised credentials and reducing potential security gaps.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reset Password for a User:\"}),\" This feature automatically resets user passwords if credentials are found to be compromised. This proactive approach prevents unauthorized access and ensures immediate remediation, enhancing overall account security compared to manual password reset processes.\"]})]});export const richText118=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Digital Shadows SearchLight:\"}),\" Identifies and generates alerts for potential security threats. It plays a crucial role in continuously monitoring the digital environment for signs of credential leaks and other vulnerabilities, ensuring early detection of security issues.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Freshservice\"}),\": Freshservice is utilized for incident management by creating tickets automatically when an alert is detected. This tool ensures that every security alert is logged and tracked systematically, facilitating organized and efficient incident response workflows.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Workspace\"}),\": In this use case, Google Workspace handles the automatic reset of user passwords if credentials are found to be compromised. This immediately mitigates potential security threats, protecting user accounts from unauthorized access without manual intervention.\"]})]});export const richText119=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Data Management\"})});export const richText120=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automatically configure Google Sheets by adding sheets, rows, and columns and adjusting widths. This use case streamlines spreadsheet setup by integrating Google Sheets and Google Admin Directory, enhancing efficiency and accuracy in managing and organizing data.\"})});export const richText121=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual spreadsheet configuration\"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent data management\"}),/*#__PURE__*/e(\"p\",{children:\"Time-consuming setup process\"})]});export const richText122=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Efficient spreadsheet setup\"}),/*#__PURE__*/e(\"p\",{children:\"Consistent data formatting\"}),/*#__PURE__*/e(\"p\",{children:\"Saved administrative time\"})]});export const richText123=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Retrieving User List:\"}),\" The Google Admin Directory SDK retrieves a list of users within the organization. Manually gathering this data involves accessing the admin console, navigating through menus, and exporting user data, which is time-consuming and prone to errors. Automating this ensures a quick, accurate, and up-to-date user list.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Adding Sheets and Rows\"}),\": Google Sheets API adds new sheets and rows for each user. Traditionally, this task requires manually creating sheets and inputting rows for each user, which can be labor-intensive and inconsistent. Automation ensures that sheets and rows are added uniformly, saving significant time and reducing errors.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Setting Column Colors and Widths\"}),\": The process of setting column colors and adjusting column widths in Google Sheets is automated. Manually formatting these columns involves repetitive tasks and is susceptible to inconsistencies. Automating this ensures consistent formatting across all sheets, enhancing readability and organization.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Updating Spreadsheet Layout\"}),\": The layout of spreadsheets, including adding headers and adjusting column widths, is automatically updated. Updating the layout can be tedious and error-prone, especially with large datasets. Automation ensures that the layout is updated efficiently and uniformly, improving the overall usability of the spreadsheets.\"]})]});export const richText124=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Admin Directory:\"}),\" The Google Admin Directory retrieves a list of users within the organization. This tool ensures that the user data is gathered quickly and accurately, forming the basis for subsequent spreadsheet configurations.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Sheets\"}),\": The Google Sheets API is crucial for adding new sheets, inserting rows, setting column colors, and adjusting column widths. This tool automates the formatting and setup of spreadsheets, ensuring consistency and saving significant time compared to manual configuration.\"]})]});export const richText125=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Analyze phishing email senders, URLs, and attachments to identify potential threats. By integrating VirusTotal, URLScan.io, and emailrep.io, this use case ensures efficient detection and response, enhancing cybersecurity with automated and accurate analysis.\"})});export const richText126=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual threat identification\"}),/*#__PURE__*/e(\"p\",{children:\"Delayed phishing response\"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent email security checks\"})]});export const richText127=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Swift threat detection\"}),/*#__PURE__*/e(\"p\",{children:\"Timely phishing mitigation\"}),/*#__PURE__*/e(\"p\",{children:\"Consistent security monitoring\"})]});export const richText128=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Analyzing Email Content\"}),\": Email content analysis to identify potential threats is automated. Traditionally, this involves manually reading and examining each email for suspicious elements, which is time-consuming and prone to human error. Automation ensures that emails are consistently and accurately analyzed, enhancing threat detection.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Extracting and Checking Email Addresses\"}),\": Emailrep.io automates extracting email addresses from emails and checking their reputation. Manually performing this task involves copying email addresses, searching for reputation data, and cross-referencing sources, which is labor-intensive. Automation streamlines this process, providing quick and reliable reputation checks and reducing the risk of missing malicious senders.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Scanning URLs\"}),\": The task of extracting URLs from emails and submitting them to URLScan.io for analysis is automated. Manually, this would require opening each email, copying URLs, and pasting them into a scanning tool, which is inefficient and can result in oversight. Automation ensures all URLs are scanned promptly, providing a thorough and timely analysis of potential threats.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Analyzing Attachments\"}),\": VirusTotal automatically extracts attachments from emails and scans them. Manually handling and scanning attachments involves downloading files, uploading them to scanning tools, and reviewing the results, which can be tedious and error-prone. Automation ensures all attachments are consistently scanned, improving detection rates and response times.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Compiling and Sending Reports\"}),\": Compiling analysis results and sending reports to the relevant stakeholders is automated. Gathering data from various tools and formatting it into a report requires significant effort and time. Automation ensures comprehensive reports are generated and distributed quickly, keeping the team informed and enabling swift action.\"]})]});export const richText129=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"VirusTotal\"}),\": VirusTotal scans email attachments for malware and other threats. By automating the submission and analysis of attachments, VirusTotal ensures comprehensive and consistent scanning, providing reliable threat detection and enhancing email security.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"URLScan.io:\"}),\" URLScan.io plays a critical role in analyzing URLs extracted from emails. This tool automates checking URLs for malicious content, ensuring timely and thorough analysis that helps prevent phishing attacks and other cyber threats.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Emailrep.io\"}),\": emailrep.io is used to check the reputation of email senders. This tool automates the verification process, quickly identifying potentially malicious senders and enhancing the overall security posture by providing real-time reputation data for email addresses.\"]})]});export const richText130=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Collect and organize new form responses in Google Sheets for streamlined data management. By integrating Google Sheets, this use case ensures efficient and accurate handling of form submissions, enhancing data accessibility and analysis.\"})});export const richText131=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual data entry errors\"}),/*#__PURE__*/e(\"p\",{children:\"Time-consuming form processing\"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent data organization\"})]});export const richText132=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Accurate data entry\"}),/*#__PURE__*/e(\"p\",{children:\"Faster form processing\"}),/*#__PURE__*/e(\"p\",{children:\"Consistent data organization\"})]});export const richText133=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Retrieving Data from Forms\"}),\": The task of retrieving data from submitted forms is automated. Traditionally, this would involve manually logging into the form platform, exporting the data, and verifying its accuracy. Automation ensures that form data is collected promptly and accurately, eliminating the risk of human error and saving time.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Appending Values to Google Sheets\"}),\": Adding a new form response to a Google Sheet is automated. Manually, this would require opening the spreadsheet, navigating to the correct location, and inputting the data row by row. Automation ensures that data is appended consistently and quickly, enhancing the efficiency and accuracy of data management.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Organization and Formatting\"}),\": The task of organizing and formatting data within the spreadsheet is automated. Manually formatting data to ensure consistency and readability can be tedious and time-consuming. Automation ensures that all new data entries adhere to a predefined format, maintaining a clean and organized spreadsheet without manual intervention.\"]})]});export const richText134=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Forms\"}),\": In this use case, Google Forms collects data from users through online forms. The data is then retrieved automatically, ensuring that all responses are captured without manual intervention.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Sheets\"}),\": Google Sheets is essential for organizing and storing form responses. The retrieved data is added to a Google Sheet, where it is stored, organized, and formatted. This automation ensures that the data is consistently updated in the spreadsheet.\"]})]});export const richText135=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Regularly scan for open ports using Shodan to identify potential vulnerabilities. By integrating Shodan, this use case ensures continuous monitoring and immediate reporting of exposed ports, enhancing network security and proactive threat management.\"})});export const richText136=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual port scanning\"}),/*#__PURE__*/e(\"p\",{children:\"Delayed vulnerability detection\"}),/*#__PURE__*/e(\"p\",{children:\"High labor costs\"})]});export const richText137=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Real-time port monitoring\"}),/*#__PURE__*/e(\"p\",{children:\"Immediate vulnerability alerts\"}),/*#__PURE__*/e(\"p\",{children:\"Improved network security\"})]});export const richText138=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Scanning IPs with Shodan\"}),\": Shodan automates the task of scanning IP addresses for open ports. Manually performing this task involves logging into Shodan, entering each IP address, and reviewing the results, which is time-consuming and repetitive. Automation ensures that all relevant IPs are scanned regularly and consistently, providing timely and accurate detection of exposed ports.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Assessing Port Exposure\"}),\": The scanned IPs are automatically evaluated to determine whether any ports are exposed. Manually checking each result to determine port exposure can lead to delays and potential oversight. Automation quickly assesses the scan results, immediately identifying IPs with exposed ports for further action.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reporting Port Exposure\"}),\": Compiling and sending reports on exposed ports is automated. Gathering and formatting this data into a report requires significant effort and time. Automation ensures that detailed reports are generated and sent to the appropriate channels, such as Slack, in real-time, keeping the security team informed and able to respond promptly.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Notifying via Slack\"}),\": Slack automatically sends notifications when exposed ports are detected. Manually sending these alerts can result in delays and inconsistencies. Automation ensures that notifications are sent immediately and reliably, enhancing the security team's responsiveness and coordination.\"]})]});export const richText139=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Shodan\"}),\": Shodan scans IP addresses for open ports, identifying potential security vulnerabilities. This tool automates checking each IP against a vast database of known port exposures, providing comprehensive and accurate results that inform security decisions.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": Slack is a communication platform for sending notifications about exposed ports. This tool ensures the security team receives immediate alerts and detailed reports, facilitating prompt response and coordination to address identified vulnerabilities.\"]})]});export const richText140=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Analyze URLs for potential threats using VirusTotal and create tickets in Freshservice for detected issues. By integrating VirusTotal and Freshservice, this use case ensures efficient threat detection and prompt incident management, enhancing overall cybersecurity response.\"})});export const richText141=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual URL analysis\"}),/*#__PURE__*/e(\"p\",{children:\"Delayed threat detection\"}),/*#__PURE__*/e(\"p\",{children:\"High administrative workload\"})]});export const richText142=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Faster threat identification\"}),/*#__PURE__*/e(\"p\",{children:\"Immediate incident response\"}),/*#__PURE__*/e(\"p\",{children:\"Reduced manual effort\"})]});export const richText143=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"URL Analysis with VirusTotal\"}),\": VirusTotal automates URL analysis to identify potential threats. Manually performing this task involves individually checking each URL, which can be time-consuming and prone to human error. Automation ensures that every URL is swiftly and accurately analyzed for malicious content, enhancing threat detection and response times.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Creating Tickets in Freshservice\"}),\": Creating tickets in Freshservice for detected malicious URLs is automated. Manually generating tickets involves several steps, including logging into the ticketing system, entering details, and assigning tasks, which can delay incident response. Automation streamlines this process, ensuring tickets are created immediately when a threat is identified, facilitating prompt incident management.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Adding Comments to Freshservice Tickets\"}),\": Adding comments to Freshservice tickets when a malicious URL is found in an email is automated. Updating tickets with relevant information requires continuous monitoring and manual entry, which can lead to delays and inconsistencies. Automation ensures that comments are added promptly and accurately, providing up-to-date information for effective incident handling.\"]})]});export const richText144=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"VirusTotal\"}),\": VirusTotal analyzes URLs for potential threats. It automates checking URLs against a vast database of known threats, providing swift and accurate analysis. This ensures that malicious URLs are identified quickly, enhancing the overall security posture.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Freshservice\"}),\": Freshservice is used for incident management. It creates and updates tickets when threats are detected. It automates the creation of tickets for each identified malicious URL and updates them with relevant information. This ensures that the incident response team is immediately informed and can act promptly to mitigate any threats.\"]})]});export const richText145=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Project Management\"})});export const richText146=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Delete a project in Google Cloud Resource Manager with authorization checks and confirmation via Slack. This ensures secure, verified, and efficient project deletions, reducing the risk of accidental data loss and improving overall project management.\"})});export const richText147=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual project deletion\"}),/*#__PURE__*/e(\"p\",{children:\"Risk of accidental deletions\"}),/*#__PURE__*/e(\"p\",{children:\"Time-consuming authorization checks\"})]});export const richText148=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Efficient project deletion\"}),/*#__PURE__*/e(\"p\",{children:\"Reduced accidental deletions\"}),/*#__PURE__*/e(\"p\",{children:\"Streamlined authorization process\"})]});export const richText149=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Authorization Checks\"}),\": Ensuring that only authorized users can initiate the project deletion process is automated. Manually verifying user permissions can be tedious and prone to errors. Automation ensures that authorization checks are performed accurately and efficiently, preventing unauthorized deletions and enhancing security.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Project Retrieval\"}),\": The task of retrieving project details from Google Cloud Resource Manager is automated. Manually searching for and verifying project details can be time-consuming and error-prone. Automation ensures that project information is retrieved swiftly and accurately, improving the efficiency of the deletion process.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Confirmation via Slack\"}),\": Requesting and confirming deletion actions via Slack is automated. Traditionally, this would involve multiple steps of communication and verification, leading to potential delays and miscommunication. Automation streamlines this process, ensuring that confirmations are received and acted upon promptly, improving coordination and reducing the risk of mistakes.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Project Deletion\"}),\": The actual deletion of the project in Google Cloud Resource Manager is automated. Manually deleting projects involves several steps that can be prone to human error, risking accidental data loss. Automation ensures that the deletion process is carried out accurately and efficiently, minimizing the risk of mistakes and enhancing overall project management.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Notification of Task Completion\"}),\": Slack automatically sends notifications to the relevant stakeholders once the project deletion is complete. Manually updating stakeholders about the status of the deletion process can be time-consuming and lead to communication gaps. Automation ensures that all parties are promptly informed, maintaining transparency and enhancing workflow efficiency.\"]})]});export const richText150=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Cloud Resource Manager\"}),\": Google Cloud Resource Manager retrieves project details and manages project deletions. It automates fetching project information and executing deletion commands, ensuring the deletion process is accurate and efficient.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": Slack is utilized for communication and confirmation throughout the project deletion workflow. It sends messages to the relevant channels to request confirmation before the deletion and notifies stakeholders once it is complete. This ensures precise and prompt communication, reducing the risk of errors and improving coordination.\"]})]});export const richText151=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Compliance Monitoring\"})});export const richText152=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Integrate Drata to monitor and verify compliance statuses and ensure employee compliance. Alerts for non-compliance are sent via Slack, enabling quick action and improved adherence to company policies.\"})});export const richText153=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Compliance Tracking\"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Non-compliance Detection\"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent Policy Enforcement\"}),/*#__PURE__*/e(\"p\",{children:\"Manual Compliance Checks\"}),/*#__PURE__*/e(\"p\",{children:\"Human Error in Reporting\"}),/*#__PURE__*/e(\"p\",{children:\"Time-Consuming Verification Process\"})]});export const richText154=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Consistent Compliance Monitoring\"}),/*#__PURE__*/e(\"p\",{children:\"Real-Time Reporting\"}),/*#__PURE__*/e(\"p\",{children:\"Reduced Manual Work\"}),/*#__PURE__*/e(\"p\",{children:\"Instant Compliance Verification\"}),/*#__PURE__*/e(\"p\",{children:\"Timely Non-compliance Alerts\"}),/*#__PURE__*/e(\"p\",{children:\"Consistent Policy Adherence\"})]});export const richText155=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Employee Compliance Verification\"}),\": This task involves retrieving personnel data from Drata and checking for compliance with specified criteria. Compared to manual execution, this automation ensures accurate and consistent compliance checks, significantly reducing the likelihood of human error and ensuring compliance data is always up to date.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Status Reporting to Slack\"}),\": After completing the compliance checks, the results are sent to a designated Slack channel. This replaces the manual process of compiling and communicating compliance statuses, ensuring timely and transparent updates for the team, and enhancing overall efficiency and accountability.\"]})]});export const richText156=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Drata\"}),\": In this use case, Drata retrieves personnel data and checks for compliance with specified criteria. It ensures accurate and up-to-date compliance information, replacing manual checks and minimizing the risk of human error.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": Slack is utilized to report the results of compliance checks to a designated channel. This ensures timely and transparent updates for the team, replacing the manual process of compiling and communicating compliance statuses, thereby enhancing overall efficiency and accountability.\"]})]});export const richText157=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Correlate failed login attempts in Okta and alerted via Slack. This use case monitors multiple failed logins, verifies the user, and sends alerts to enhance security, leveraging Okta's webhook verification and Slack for immediate notification.\"})});export const richText158=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual event correlation\"}),/*#__PURE__*/e(\"p\",{children:\"Delayed security responses\"}),/*#__PURE__*/e(\"p\",{children:\"High risk of missed alerts\"})]});export const richText159=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Swift threat detection\"}),/*#__PURE__*/e(\"p\",{children:\"Instant alerting via Slack\"}),/*#__PURE__*/e(\"p\",{children:\"Enhanced security oversight\"})]});export const richText160=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Exploding Okta Events\"}),\": Mindflow extracts individual login attempts from Okta event logs, typically involving time-consuming manual analysis. By automating this step, Mindflow quickly identifies each login event, enabling faster identification of patterns such as multiple failed attempts, which enhances the security team's efficiency.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Failed Login Detection\"}),\": Mindflow checks each exploded event for failed logins, a process that can be error-prone and labor-intensive when done manually. Automation ensures consistent and accurate detection of failed login attempts, significantly reducing the chance of human error and improving the reliability of security monitoring.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"User Verification\"}),\": Mindflow verifies the user's profuser's Okta when multiple failed logins are detected. Manually, this step requires accessing user data and cross-referencing details, which is time-consuming. Automating user verification accelerates the process, ensuring that security teams can quickly confirm whether login attempts are legitimate or potentially malicious.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Alerting via Slack\"}),\": Mindflow sends an alert to a designated Slack channel once a threshold of failed logins is reached. This replaces the manual process of composing and sending alerts, ensuring that notifications are immediate and accurately formatted, allowing security teams to respond promptly to potential threats.\"]})]});export const richText161=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Okta\"}),\": In this use case, Okta is the primary source of authentication event data. It provides the necessary event hooks and logs that Mindflow uses to monitor sign-in attempts. By integrating with Okta, Mindflow can automatically extract and analyze login events, identifying patterns of failed attempts that may indicate security issues.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": Slack serves as the notification platform for this workflow. Once Mindflow detects multiple failed login attempts, it sends an alert to a specified Slack channel. This integration ensures that security teams receive real-time notifications, allowing them to respond quickly to potential threats and enhancing overall security response times and coordination.\"]})]});export const richText162=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Check IP addresses through Google Sheets and VirusTotal to ensure network security. Remediate issues by automating responses with Jamf, OpenAI, and Slack. This use case integrates multiple tools for efficient MDM IP checks and remediation.\"})});export const richText163=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual IP address verification\"}),/*#__PURE__*/e(\"p\",{children:\"Delayed security threat response\"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent remediation actions\"})]});export const richText164=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Faster threat detection\"}),/*#__PURE__*/e(\"p\",{children:\"Consistent remediation processes\"}),/*#__PURE__*/e(\"p\",{children:\"Improved network security\"})]});export const richText165=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"IP Address Verification with Google Sheets and VirusTotal\"}),\": IP address verification is traditionally a manual task requiring extensive time and effort to cross-reference data. This process is streamlined by integrating Google Sheets and VirusTotal, enabling automated extraction and analysis. This automation reduces the likelihood of human error and significantly accelerates the verification process.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Malicious IP Address Detection\"}),\": Manually identifying malicious IP addresses can be inconsistent and slow. With automation using VirusTotal, each IP is systematically checked for threats. This ensures a faster, more reliable detection process, enhancing overall network security and allowing for timely interventions.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Remediation Actions with Jamf and OpenAI\"}),\": Once a threat is detected, remediation traditionally involves several manual steps, which can lead to delays and inconsistencies. Automating these actions through Jamf and OpenAI ensures prompt, uniform responses, reducing potential damage from security threats and more effectively maintaining network integrity.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Communication through Slack\"}),\": Informing the team about detected threats and remediation actions manually can be slow and fragmented. Automating notifications through Slack ensures immediate, consistent communication, keeps the team informed in real-time, and enables faster decision-making and coordination.\"]})]});export const richText166=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Workspace Admin\"}),\": Google Workspace provides the necessary input for the automation process, ensuring that all required data for IP address verification and subsequent actions are readily available and accessible.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Sheets\"}),\": In this use case, Google Sheetsstores manages the list of IP addresses to be verified. It is a centralized database from which the automation workflow extracts IP addresses for verification, facilitating organized and efficient data handling.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"VirusTotal\"}),\": VirusTotal is leveraged to perform automated checks on the extracted IP addresses for any malicious activity. It provides real-time threat intelligence, enabling the detection of potentially harmful IP addresses quickly and reliably, enhancing the security analysis process.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Jamf\"}),\": Jamf is used to take remediation actions once a threat is identified. It automates locking or controlling devices associated with malicious IP addresses, ensuring swift and consistent responses to security threats.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"OpenAI\"}),\": OpenAI generates the verification process's output. It generates readable and actionable insights from the raw data, making the remediation process more efficient by providing precise, clear, and concise information.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": Slack is used for communication and alerting within this automation workflow. It sends notifications to the relevant team members about detected threats and remediation actions, ensuring that the team stays informed and can act promptly on security updates.\"]})]});export const richText167=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Using IPinfo, detect unauthorized WordPress admin logins from unknown IP addresses. Automate user verification and incident management with Google Workspace, Airtable, and Slack, ensuring swift security actions and notifications.\"})});export const richText168=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual incident identification\"}),/*#__PURE__*/e(\"p\",{children:\"Delayed response times\"}),/*#__PURE__*/e(\"p\",{children:\"Human error in alerts\"})]});export const richText169=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Faster incident resolution\"}),/*#__PURE__*/e(\"p\",{children:\"Accurate IP address verification\"}),/*#__PURE__*/e(\"p\",{children:\"Streamlined communication and actions\"})]});export const richText170=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Identifying Unauthorized Login Attempts\"}),\": Using IPinfo, the system detects unauthorized login attempts to WordPress from unknown IP addresses. This replaces the manual monitoring and analyzing login attempts, ensuring quicker identification and reducing the risk of missing a potential security breach.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"User Verification via Google Workspace\"}),\": The system automatically verifies if the user is legitimate by cross-referencing with Google Workspace. This eliminates the need for manual user verification, providing a more efficient and accurate validation process and thus speeding up incident response time.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Incident Management with Airtable\"}),\": Automated creation and updating of incident records in Airtable streamlines the incident management process. This reduces the manual effort required to document and track incidents, ensuring consistent and accurate records while freeing up valuable time for security teams.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Notification and Communication through Slack\"}),\": Automated notifications and updates are sent via Slack, ensuring that relevant team members are promptly informed about the incident and any required actions. This replaces the slower, manual method of emailing or messaging team members individually, enhancing the speed and effectiveness of the communication process.\"]})]});export const richText171=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"WordPress\"}),\": In this use case, WordPress is the platform being monitored for unauthorized admin login attempts. Its role is to serve as the source of the login data that triggers the security automation process.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"IPinfo\"}),\": IPinfo gathers detailed information about the IP addresses of those attempting to access the WordPress admin area. It helps identify whether an IP address is suspicious or known, quickly assessing potential security threats.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Workspace\"}),\": Google Workspace verifies the legitimacy of a user's attempt to log in. It cross-references the login attempt with existing user data, ensuring that only authorized users can proceed, enhancing security.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Airtable\"}),\": In this use case, Airtable functions as the incident management system. It automatically logs incidents, updates records, and tracks the status of each security event, providing a structured and accessible way to manage security incidents.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": Slack is employed for real-time notifications and communication. It ensures the security team is promptly informed about unauthorized login attempts and any subsequent actions required, facilitating rapid response and coordination.\"]})]});export const richText172=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Security Management\"})});export const richText173=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Ensure weekly signout from all web devices and reset cookies for Google Workspace users. This process enhances security by automatically logging out users and clearing sign-in data, reducing the risk of unauthorized access.\"})});export const richText174=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual signout processes\"}),/*#__PURE__*/e(\"p\",{children:\"Security risks from stale sessions\"}),/*#__PURE__*/e(\"p\",{children:\"Time spent on user management\"})]});export const richText175=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Enhanced user security\"}),/*#__PURE__*/e(\"p\",{children:\"Time-saving user management\"}),/*#__PURE__*/e(\"p\",{children:\"Reduced manual intervention\"})]});export const richText176=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Retrieve List of Users\"}),\": Using the Admin Directory SDK, this task involves retrieving a list of all active users. This process is typically done manually and is prone to errors and delays. Automating this step ensures accuracy and efficiency, quickly providing a comprehensive list without requiring manual compilation.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Sign Out User and Reset Cookies\"}),\": For each user, the system executes the sign-out operation using the Admin Directory SDK, which logs the user out of all web and device sessions and resets their sign-in cookies. Manually, this task is time-consuming and requires meticulous attention to detail to ensure each user is properly signed out. Automation eliminates the risk of oversight, ensuring that every user’s session is securely terminated and their cookies reset, enhancing overall security.\"]})]});export const richText177=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Admin Directory\"}),\": Admin Directory retrieves a list of all active users within the domain. This tool automates the process of compiling user information, ensuring accuracy and efficiency compared to manual methods, which are often time-consuming and prone to errors.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Workspace\"}),\": Google Workspace is integral to executing this use case, as it is the platform from which users are signed out and their cookies reset. By automating the sign-out process, Google Workspace ensures that all user sessions are securely terminated and cookies are cleared, enhancing overall security and reducing the risk of unauthorized access.\"]})]});export const richText178=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"This workflow identifies compromised passwords in Azure AD and enforces immediate password changes via Microsoft Graph. Successful updates trigger a confirmation email; failures result in automatic account locking, enhancing security and compliance.\"})});export const richText179=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Decentralized Password Management\"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Breach Response\"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent Security Practices\"})]});export const richText180=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Swift Breach Mitigation\"}),/*#__PURE__*/e(\"p\",{children:\"Enhanced Account Security\"}),/*#__PURE__*/e(\"p\",{children:\"Automated Compliance\"})]});export const richText181=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Enforcing Password Change: Updating user passwords in Azure Active Directory is typically a manual process involving multiple steps and coordination among IT personnel. Automating this task through integration with Microsoft Graph significantly reduces the risk of human error, speeds up the response to identified breaches, and ensures immediate action is taken to secure compromised accounts. This rapid and consistent enforcement minimizes potential security vulnerabilities and enhances overall system integrity.\"}),/*#__PURE__*/e(\"p\",{children:\"Confirmation Email: Sending confirmation emails manually requires dedicated effort from IT teams, often leading to delays and inconsistencies. Automating this task ensures that users promptly receive notifications about password updates, providing them with immediate confirmation and instructions if needed. This not only improves communication efficiency but also enhances user experience by providing timely and accurate information.\"}),/*#__PURE__*/e(\"p\",{children:\"Account Locking: Manual account locking in case of a failed password update can be a slow and error-prone process, leaving compromised accounts vulnerable for extended periods. Automating account locking ensures that any failure in the password update process results in immediate action, preventing unauthorized access and maintaining a high level of security. This automation brings a significant improvement in safeguarding sensitive information and reducing the window of opportunity for potential threats.\"})]});export const richText182=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Azure Active Directory\"}),\": In this use case, Azure Active Directory is the primary service that manages user accounts. It is responsible for storing and updating user credentials. By automating the password change process in Azure AD, the workflow ensures that any compromised passwords are promptly updated, maintaining the security of user accounts.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Microsoft Graph\"}),\": Microsoft Graph acts as the interface for interacting with Azure Active Directory. It is utilized to update user passwords and enforce password changes programmatically. This tool replaces the need for manual updates, ensuring the process is quick, accurate, and consistent, reducing the risk of human error.\"]})]});export const richText183=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Monitor file-sharing activities in Google Drive to detect visibility changes. This use case integrates Google Workspace, Slack, and Airtable to ensure prompt notifications and actions, enhancing file security and compliance within the organization.\"})});export const richText184=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Irregular File Visibility Checks\"}),/*#__PURE__*/e(\"p\",{children:\"Delayed Security Responses\"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent Sharing Policies\"})]});export const richText185=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Real-Time Sharing Alerts\"}),/*#__PURE__*/e(\"p\",{children:\"Enhanced Data Security\"}),/*#__PURE__*/e(\"p\",{children:\"Streamlined Compliance Monitoring\"})]});export const richText186=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Monitoring File Visibility\"}),\": Regularly checking file visibility in Google Drive is essential to ensure that sensitive documents are not exposed to unauthorized users. Automating this task reduces the burden on IT staff and ensures timely detection of visibility changes, significantly decreasing the risk of data breaches compared to manual monitoring.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Notification via Slack\"}),\": Manually sending notifications when file visibility changes are detected can lead to delays and overlooked alerts. By integrating with Slack, automated notifications ensure that the security team is immediately informed of any changes, enabling faster response times and better protection of sensitive information.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Recording Changes in Airtable\"}),\": Manually recording file visibility changes for audit purposes can be tedious and prone to errors. Automating this process with Airtable ensures accurate and up-to-date records, facilitating easier audits and compliance checks while freeing up valuable time for IT personnel.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Remediation Actions\"}),\": Manually identifying and resolving unauthorized file visibility changes can be slow and inconsistent. Automating these remediation actions ensures that any unauthorized changes are swiftly addressed, maintaining the security of shared files and enhancing overall data protection efforts.\"]})]});export const richText187=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Drive\"}),\": In this use case, Google Drive is the primary repository where files are stored and shared. The system monitors file visibility within Google Drive to detect changes, ensuring that sensitive documents are not exposed to unauthorized users. This tool is crucial for maintaining the security and privacy of stored files.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Workspace\"}),\": Google Workspace provides the necessary infrastructure and tools to manage and monitor file sharing and access permissions. It facilitates the integration with Google Drive to automate the detection of visibility changes and ensure compliance with organizational policies regarding file sharing.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": Slack is a communication platform for notifying the security team about changes in file visibility. Automated notifications in Slack ensure that any detected changes are promptly communicated to the relevant team members, allowing for immediate action and reducing the risk of data breaches.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Airtable\"}),\": Airtable records and tracks changes in file visibility. By automating the documentation process, Airtable ensures that all changes are accurately logged, providing a reliable audit trail for compliance purposes. This tool enhances transparency and accountability within the file management process.\"]})]});export const richText188=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Domain Security\"})});export const richText189=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"This use case streamlines domain blocking in FireEye Endpoint Security. It checks for domain input and, if provided, automatically blocks the domain using FireEye's API. This automation enhances security response times and reduces manual intervention in threat mitigation.\"})});export const richText190=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual domain blocking delays\"}),/*#__PURE__*/e(\"p\",{children:\"Increased risk of security breaches\"}),/*#__PURE__*/e(\"p\",{children:\"Time-consuming threat response\"})]});export const richText191=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Rapid threat mitigation \"}),/*#__PURE__*/e(\"p\",{children:\"Enhanced productivity\"}),/*#__PURE__*/e(\"p\",{children:\"Streamlined endpoint security\"})]});export const richText192=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Domain Input Verification\"}),\": The workflow automatically checks if a domain input has been provided. This replaces the manual step of reviewing and validating inputs, reducing the risk of human error and saving valuable time for security analysts who can focus on more complex tasks.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Domain Blocking in FireEye\"}),\": Upon confirming the domain input, the workflow seamlessly interacts with the FireEye Endpoint Security API to block the specified domain. This automation eliminates the need for manual login to the FireEye console, navigation through multiple interfaces, and manual execution of the blocking action, significantly accelerating the threat response process.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Completion Confirmation\"}),': The workflow concludes by marking the task as \"Done\" once the domain is successfully blocked or if no input was provided. This automatic status update ensures clear visibility of task completion without requiring manual logging or follow-up, streamlining the overall incident management process and improving team coordination.']})]});export const richText193=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"FireEye Endpoint Security\"}),\": This integration is the core tool in this use case, providing the functionality to block malicious domains. It allows Mindflow to programmatically interact with FireEye's security infrastructure, enabling rapid and automated domain blocking without manual intervention in the FireEye console.\"]})});export const richText194=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Streamline daily app inventory management for Jamf Pro environments. It retrieves computer inventory records, processes application data for each user, updates Google Sheets with the information, and notifies teams via Slack. This automation enhances visibility into app usage and simplifies IT asset tracking.\"})});export const richText195=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual application management\"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent device data management\"}),/*#__PURE__*/e(\"p\",{children:\"Delayed security decisions\"})]});export const richText196=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Real-time app visibility\"}),/*#__PURE__*/e(\"p\",{children:\"Streamlined IT management\"}),/*#__PURE__*/e(\"p\",{children:\"Enhanced tool compliance\"})]});export const richText197=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Computer Inventory Retrieval\"}),\": The workflow automatically fetches paginated computer inventory records from Jamf Pro. This task, which typically requires manual navigation through the Jamf Pro interface and multiple queries, is streamlined into a single, efficient operation. This automation ensures comprehensive data collection across all managed devices without the risk of overlooking any systems.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Application Data Processing\"}),\": The workflow processes application data for each user, including identifying and handling com. Apple bundles. This replaces the manual, time-consuming task of sifting through application lists for each user and device. The automation ensures consistent data extraction and processing, eliminating human error and significantly reducing the time required for analysis.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Sheets Integration\"}),\": The processed application data is automatically appended or updated in Google Sheets. This integration eliminates the need for manual data entry or file uploads, which are prone to errors and delays. By automating this step, the workflow ensures that the inventory data is always up-to-date and readily available for analysis or reporting.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack Notification\"}),\": Upon completion of the data update, the workflow sends a notification to a designated Slack channel. This automated communication replaces the need for manual status updates or emails, ensuring that all relevant team members are immediately informed about the latest inventory data. This improves team coordination and allows quick action on any notable changes in the app inventory.\"]})]});export const richText198=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Jamf Pro\"}),\": Jamf Pro plays a central role in this workflow by providing the source of computer inventory data. It allows the retrieval of detailed information about managed devices and their installed applications. By interfacing with Jamf Pro, the workflow can efficiently collect comprehensive app inventory data across the entire fleet of managed devices, eliminating manual data extraction.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Sheets\"}),\": Google Sheets serves as the primary data storage and visualization tool in this workflow. It receives and organizes the processed application data from Jamf Pro. The integration with Google Sheets allows for automatic updating and appending of inventory information, creating a living document that reflects the current state of app deployment across the organization. This eliminates manual data entry and provides a centralized, easily accessible data analysis and reporting platform.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\": Slack acts as the communication hub for this workflow. After completing the daily app retrieval and data update process, Slack sends automated notifications to a designated channel. This ensures that relevant team members are immediately informed about the completion of the inventory update, facilitating quick action on any notable changes or trends in app usage. The integration with Slack streamlines communication and enhances team awareness without requiring manual status updates.\"]})]});export const richText199=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Orchestrates account enrichment across multiple identity and access management platforms. Integrating Azure AD, SailPoint, AWS, and Ping Identity streamlines user data collection and analysis, enhancing security posture and providing comprehensive user insights for improved identity governance and risk management.\"})});export const richText200=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Cross-platform clickops inefficiencies\"}),/*#__PURE__*/e(\"p\",{children:\"Delayed identity governance\"}),/*#__PURE__*/e(\"p\",{children:\"Access misconfiguration risk\"})]});export const richText201=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Multi-platform identity management\"}),/*#__PURE__*/e(\"p\",{children:\"Real-time risk assessment\"}),/*#__PURE__*/e(\"p\",{children:\"Automated compliance and security\"})]});export const richText202=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Multi-Platform Account Retrieval\"}),\": The workflow seamlessly retrieves account information from various identity platforms, including Azure Active Directory, SailPoint, AWS, and Ping Identity. This task, which typically requires manual logins to multiple systems and individual queries, is consolidated into a single automated process. The impact is significant time savings and reduced risk of overlooking accounts across different platforms.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Enrichment and Correlation\"}),\": The workflow enriches user profiles with comprehensive information by pulling data from multiple sources. This process, which would be highly time-consuming and error-prone if done manually, now happens in near real-time. The impact is a more holistic view of user identities, enabling better-informed access management and risk assessment decisions.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Risk Analysis Integration\"}),\": The workflow incorporates SailPoint's Access Risk Management capabilities, automatically analyzing the enriched user data for potential risks. This replaces manual risk assessments that could be inconsistent or outdated. The impact is a more proactive and consistent approach to risk management, allowing for quicker identification and mitigation of potential security threats.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Cross-Platform Synchronization\"}),\": The workflow ensures that user information is consistent across all integrated platforms. This task, typically involving manual updates in multiple systems, is now handled automatically. The impact is improved data accuracy, reduced administrative overhead, and enhanced compliance with identity governance policies.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Automated Reporting\"}),\": The workflow culminates in generating comprehensive reports on user accounts and associated risks. This replaces manual report compilation, which can be time-consuming and prone to errors. The impact is readily available, with up-to-date insights for stakeholders, facilitating quicker decision-making and more effective identity governance.\"]})]});export const richText203=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Azure Active Directory\"}),\": Azure AD is this workflow's primary source of user identity information. It provides comprehensive data about user accounts, including roles, group memberships, and authentication methods. By integrating Azure AD, the workflow ensures that the most up-to-date Microsoft ecosystem user data is incorporated into the account enrichment process.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"SailPoint Suite (Access Risk Management, IdentityNow, IdentityIQ)\"}),\": The SailPoint tools are crucial in identity governance and risk assessment. Access Risk Management analyzes the enriched user data to identify potential security risks. IdentityNow and IdentityIQ contribute additional identity and access management data, providing a holistic view of user entitlements across various systems. This integration enables advanced risk analysis and compliance monitoring.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"AWS API Gateway\"}),\": AWS API Gateway acts as an intermediary, facilitating secure communication between the workflow and AWS services. It allows user account information to be retrieved from AWS environments, ensuring that cloud-based identities are included in the enrichment process. This integration extends the scope of account analysis to include cloud infrastructure access.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Ping Identity\"}),\": Ping Identity provides additional user authentication and authorization data. It contributes information about single sign-on (SSO) usage, multi-factor authentication (MFA) status, and other identity verification details. Incorporating Ping Identity gives the workflow a more complete picture of user authentication practices across the organization.\"]})]});export const richText204=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate User Management\"})});export const richText205=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Create or suspend roles in CrowdStrike seamlessly. By integrating with CrowdStrike, Mindflow automates the role management process, ensuring quick and efficient updates to user permissions, enhancing security, and reducing IT teams' manual workload.\"})});export const richText206=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual Role Management\"}),/*#__PURE__*/e(\"p\",{children:\"Human Error in Permissions\"}),/*#__PURE__*/e(\"p\",{children:\"Time-Consuming Administrative Tasks\"})]});export const richText207=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Enhanced Security Controls\"}),/*#__PURE__*/e(\"p\",{children:\"Efficient Role Updates\"}),/*#__PURE__*/e(\"p\",{children:\"Reduced Administrative Burden\"})]});export const richText208=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Role Creation in CrowdStrike\"}),\": Mindflow automates the creation of new roles in CrowdStrike, a process traditionally managed manually by IT administrators. This automation reduces the risk of errors associated with manual data entry and speeds up the role assignment process, ensuring that users have the correct permissions swiftly and accurately.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Role Suspension in CrowdStrike\"}),\": Manually suspending roles in CrowdStrike can be tedious and error-prone. Mindflow automates this process, ensuring that roles are suspended quickly and correctly. This reduces the time taken to revoke access for users who no longer need it, enhancing security by minimizing the window of unauthorized access.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Task Initiation and Management\"}),\": Mindflow integrates with CrowdStrike to streamline the initiation and management of role creation and suspension tasks. By automating these workflows, Mindflow eliminates the need for manual request handling and follow-up, ensuring tasks are completed promptly and efficiently. This leads to a more organized and transparent process, reducing the administrative burden on IT teams and improving overall operational efficiency.\"]})]});export const richText209=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"CrowdStrike\"}),\": CrowdStrike is used for role management. Mindflow interfaces directly with CrowdStrike to automate the creation and suspension of user roles. This integration ensures that role assignments and revocations are handled swiftly and accurately, enhancing the organization's security posture by reducing the likelihood of errors and delays associated with manual processes.\"]})});export const richText210=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Pull existing WordPress subscribers and append their details to a Google Sheets spreadsheet. This automation enables efficient data management and streamlined subscriber tracking, leveraging WordPress and Google Sheets integration for optimal workflow.\"})});export const richText211=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual data extraction\"}),/*#__PURE__*/e(\"p\",{children:\"Human error risks\"}),/*#__PURE__*/e(\"p\",{children:\"Time-consuming updates\"})]});export const richText212=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Efficient data management\"}),/*#__PURE__*/e(\"p\",{children:\"Accurate subscriber tracking\"}),/*#__PURE__*/e(\"p\",{children:\"Time-saving workflows\"})]});export const richText213=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Extraction from WordPress\"}),\": Mindflow automates the extraction of subscriber data from WordPress, a process that typically requires manual effort and time. By using HTTP requests to fetch user details, this automation eliminates the need for repetitive manual data collection, reducing the risk of errors and significantly speeding up the process.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Entry into Google Sheets\"}),\": Mindflow automatically appends the extracted subscriber data into a Google Sheets spreadsheet. Traditionally, this task would involve manual copying and pasting, which is prone to errors and highly time-consuming. Automation ensures accurate data entry, maintains data integrity, and saves substantial time, allowing teams to focus on more critical tasks.\"]})]});export const richText214=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"WordPress\"}),\": In this use case, WordPress is the subscriber data source. It provides the necessary user details that need to be extracted and managed. Mindflow interfaces with WordPress to fetch this data automatically, removing the need for manual data collection and ensuring the information is accurate and up-to-date.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Sheets\"}),\": Google Sheets is the destination for the subscriber data extracted from WordPress. Mindflow automates the process of appending this data to a spreadsheet. By leveraging Google Sheets, the workflow ensures that the data is organized, easily accessible, and can be shared or analyzed further without manual intervention.\"]})]});export const richText215=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Email Management\"})});export const richText216=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Using Google Workspace, creating a forwarding address in Gmail streamlines email management. This flow automates setting POP and IMAP settings, generating tokens, and updating auto-forwarding rules, ensuring efficient handling of user emails with minimal manual intervention.\"})});export const richText217=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Manual email management\"}),/*#__PURE__*/e(\"p\",{children:\"Inconsistent forwarding rules\"}),/*#__PURE__*/e(\"p\",{children:\"Time-consuming setup process\"})]});export const richText218=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Consistent email settings\"}),/*#__PURE__*/e(\"p\",{children:\"Time-saving processes\"}),/*#__PURE__*/e(\"p\",{children:\"Efficient email management\"})]});export const richText219=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Token Generation for Scope Setting\"}),\": Mindflow automates the generation of tokens necessary for setting the scope in Gmail. This task, which requires precise handling of credentials and permissions, is seamlessly executed without manual intervention, ensuring accuracy and saving significant administrative time.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Updating POP and IMAP Settings\"}),\": Mindflow streamlines the process of updating POP and IMAP settings for Gmail accounts. Traditionally, this would involve manual configuration and verification, which is prone to errors and time delays. Automation ensures consistent and correct settings application across multiple accounts, reducing the risk of misconfigurations.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Creating a Forwarding Address\"}),\": Creating a forwarding address in Gmail is automated, eliminating the need for manual entry and validation. By systematically handling each step, Mindflow ensures that forwarding addresses are set up accurately and promptly, enhancing email management efficiency and minimizing the chances of human error.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Updating Auto-Forwarding Rules\"}),\": Mindflow automates the update of auto-forwarding rules in Gmail. Manual updates can be tedious and error-prone, mainly when dealing with large volumes of email accounts. Automation ensures that regulations are applied uniformly and correctly, improving the reliability of email forwarding and guaranteeing seamless communication flow.\"]})]});export const richText220=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Workspace\"}),\": Mindflow automates Google Workspace actions to create an email forwarding address for a given user. It handles the configuration of POP and IMAP settings, the creation of forwarding addresses, and the update of auto-forwarding rules. By integrating Google Workspace, Mindflow automates these administrative tasks, ensuring consistent and error-free execution.\"]})});export const richText221=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Device Management\"})});\nexport const __FramerMetadata__ = {\"exports\":{\"richText22\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText210\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText187\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText138\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText135\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText120\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText28\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText53\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText25\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText13\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText180\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText203\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText204\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText81\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText165\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText159\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText23\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText55\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText177\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText140\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText158\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText199\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText110\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText82\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText170\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText134\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText146\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText9\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText37\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText54\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText18\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText107\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText87\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText29\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText50\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText30\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText72\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText38\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText64\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText111\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText201\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText151\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText171\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText20\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText195\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText59\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText108\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText116\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText93\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText3\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText144\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText219\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText200\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText44\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText104\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText117\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText91\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText149\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText115\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText12\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText123\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText154\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText168\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText46\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText26\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText192\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText153\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText62\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText208\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText166\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText136\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText65\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText105\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText172\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText191\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText169\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText35\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText190\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText69\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText96\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText189\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText211\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText2\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText98\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText106\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText113\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText31\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText125\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText36\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText80\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText220\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText160\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText127\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText5\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText103\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText67\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText194\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText77\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText206\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText109\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText196\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText174\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText167\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText63\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText182\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText164\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText47\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText173\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText101\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText76\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText1\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText186\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText147\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText100\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText40\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText48\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText24\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText14\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText10\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText179\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText33\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText90\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText75\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText45\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText121\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText61\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText122\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText183\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText112\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText205\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText216\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText16\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText126\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText84\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText27\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText7\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText218\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText42\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText17\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText78\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText119\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText185\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText152\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText217\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText162\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText49\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText66\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText207\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText157\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText102\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText68\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText94\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText21\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText155\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText99\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText141\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText92\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText197\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText97\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText215\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText181\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText85\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText70\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText131\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText58\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText175\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText161\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText176\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText74\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText178\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText188\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText43\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText193\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText184\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText8\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText143\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText41\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText88\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText79\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText212\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText133\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText73\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText148\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText15\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText128\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText198\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText56\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText221\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText86\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText118\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText32\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText150\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText6\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText202\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText124\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText39\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText142\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText89\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText95\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText114\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText145\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText83\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText19\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText57\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText51\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText139\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText214\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText209\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText137\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText34\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText4\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText130\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText11\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText129\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText132\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText60\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText71\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText213\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText163\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText52\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText156\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"__FramerMetadata__\":{\"type\":\"variable\"}}}"],"mappings":"6xBACa,AADb,IAAkD,KAAwB,CAAa,EAAsB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,WAAY,EAAC,CAAC,mPAAoP,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,gBAAiB,EAAC,CAAC,oPAAqP,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,eAAgB,EAAC,CAAC,uPAAwP,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,QAAS,EAAC,CAAC,yRAA0R,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAuB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,4BAA6B,EAAC,AAAC,EAAC,CAAc,EAAuB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,2PAA4P,EAAC,AAAC,EAAC,CAAc,EAAuB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,+BAAgC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,oCAAqC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qCAAsC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAuB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,gCAAiC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,4BAA6B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0BAA2B,EAAC,AAAC,CAAC,EAAC,CAAc,EAAuB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,+BAAgC,EAAC,CAAC,wRAAyR,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,qBAAsB,EAAC,CAAC,uRAAwR,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,6BAA8B,EAAC,CAAC,mTAAoT,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0BAA2B,EAAC,CAAC,6RAA8R,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAuB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,aAAc,EAAC,CAAC,0XAA2X,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,OAAQ,EAAC,CAAC,kXAAmX,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAuB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,wSAAyS,EAAC,AAAC,EAAC,CAAc,EAAuB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,+BAAgC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,2BAA4B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,iCAAkC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAuB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,2BAA4B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,8BAA+B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,8BAA+B,EAAC,AAAC,CAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,iCAAkC,EAAC,CAAC,oSAAqS,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,6BAA8B,EAAC,CAAC,2PAA4P,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,+BAAgC,EAAC,CAAC,0QAA2Q,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,wWAAyW,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,0FAAuG,EAAE,KAAK,CAAC,SAAS,MAAO,EAAC,CAAC,mMAAoM,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,qRAAsR,EAAC,AAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,iCAAkC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,iCAAkC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,+BAAgC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,8BAA+B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,+BAAgC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6BAA8B,EAAC,AAAC,CAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,iCAAkC,EAAC,CAAC,kSAAmS,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wBAAyB,EAAC,CAAC,gPAAiP,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,4BAA6B,EAAC,CAAC,wRAAyR,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,cAAe,EAAC,CAAC,+QAAgR,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,gBAAiB,EAAC,CAAC,qPAAsP,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,YAAa,EAAC,CAAC,iPAAkP,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,gBAAiB,EAAC,CAAC,sOAAuO,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,OAAQ,EAAC,CAAC,gPAAiP,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,sMAAuM,EAAC,AAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,uBAAwB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,wBAAyB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,wBAAyB,EAAC,AAAC,CAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,+BAAgC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,+BAAgC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,+BAAgC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,uVAAwV,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,8UAA+U,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,gUAAiU,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,8TAA+T,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6TAA8T,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,kTAAmT,EAAC,AAAC,CAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,wOAAyO,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,+SAAgT,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qSAAsS,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6SAA8S,EAAC,AAAC,CAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,+PAAgQ,EAAC,AAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,yBAA0B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6BAA8B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,4BAA6B,EAAC,AAAC,CAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,yBAA0B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,4BAA6B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,yBAA0B,EAAC,AAAC,CAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,mVAAoV,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,oUAAqU,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,wUAAyU,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0VAA2V,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,uTAAwT,EAAC,AAAC,CAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,uVAAwV,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,wUAAyU,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,4VAA6V,EAAC,AAAC,CAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,6BAA8B,EAAC,AAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,kMAAmM,EAAC,AAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,+BAAgC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6BAA8B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6BAA8B,EAAC,AAAC,CAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,4BAA6B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,+BAAgC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0BAA2B,EAAC,AAAC,CAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,4ZAA6Z,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,iVAAkV,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,gXAAiX,EAAC,AAAC,CAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,uTAAwT,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,iQAAkQ,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0RAA2R,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,ySAA0S,EAAC,AAAC,CAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,gCAAiC,EAAC,AAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,qJAAsJ,EAAC,AAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,MAAM,CAAC,uBAAuB,KAAM,EAAC,SAAS,CAAC,yBAAsC,EAAE,KAAK,CAAE,EAAC,CAAC,4BAAyC,EAAE,KAAK,CAAE,EAAC,CAAC,6BAA8B,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,KAAK,CAAC,UAAU,gBAAiB,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,MAAM,CAAC,uBAAuB,KAAM,EAAC,SAAS,CAAC,gCAA6C,EAAE,KAAK,CAAE,EAAC,CAAC,iCAA8C,EAAE,KAAK,CAAE,EAAC,CAAC,gCAAiC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,KAAK,CAAC,UAAU,gBAAiB,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0BAA2B,EAAC,CAAc,EAAE,KAAK,CAAE,EAAC,CAAC,4PAAyQ,EAAE,KAAK,CAAE,EAAC,CAAc,EAAE,KAAK,CAAE,EAAC,CAAc,EAAE,SAAS,CAAC,SAAS,qBAAsB,EAAC,CAAc,EAAE,KAAK,CAAE,EAAC,CAAC,2PAA4P,CAAC,EAAC,AAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,CAAC,QAAqB,EAAE,KAAK,CAAE,EAAC,AAAC,CAAC,EAAC,CAAC,0OAA2O,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,CAAC,QAAqB,EAAE,KAAK,CAAE,EAAC,AAAC,CAAC,EAAC,CAAC,uQAAwQ,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,oRAAqR,EAAC,AAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,uBAAwB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,wBAAyB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,4BAA6B,EAAC,AAAC,CAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,4BAA6B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6BAA8B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,4BAA6B,EAAC,AAAC,CAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,mDAAoD,EAAC,CAAC,2QAA4Q,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,oDAAqD,EAAC,CAAC,sRAAuR,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,gCAAiC,EAAC,CAAC,2PAA4P,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yCAA0C,EAAC,CAAC,8OAA+O,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kDAAmD,EAAC,CAAC,iPAAkP,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAA0B,EAAC,CAAC,kSAAmS,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,0ZAA2Z,EAAC,AAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,kUAAmU,EAAC,AAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,oCAAqC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,yCAA0C,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,2BAA4B,EAAC,AAAC,CAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,sCAAuC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,+BAAgC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mCAAoC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,iDAAkD,EAAC,CAAC,0RAA2R,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,qCAAsC,EAAC,CAAC,mSAAoS,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,uBAAwB,EAAC,CAAC,+TAAgU,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,4CAA6C,EAAC,CAAC,sUAAuU,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,8BAA+B,EAAC,CAAC,yZAA0Z,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,OAAQ,EAAC,CAAC,8kBAA+kB,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,gRAAiR,EAAC,AAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,4BAA6B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6CAA8C,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,gCAAiC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,kCAAmC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0BAA2B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6BAA8B,EAAC,AAAC,CAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,iCAAkC,EAAC,CAAC,mWAAoW,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,6CAA8C,EAAC,CAAC,6VAA8V,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,mCAAoC,EAAC,CAAC,mWAAoW,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,OAAQ,EAAC,CAAC,sVAAuV,CAAC,EAAC,AAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,8RAA+R,EAAC,AAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,uCAAwC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0CAA2C,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,uCAAwC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,8CAA+C,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6CAA8C,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,wCAAyC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,2BAA4B,EAAC,CAAC,4OAA6O,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wBAAyB,EAAC,CAAC,8QAA+Q,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,+BAAgC,EAAC,CAAC,kRAAmR,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,QAAS,EAAC,CAAC,oUAAqU,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,OAAQ,EAAC,CAAC,mUAAoU,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,OAAQ,EAAC,CAAC,4UAA6U,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,0BAA2B,EAAC,AAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAC,iDAA8D,EAAE,OAAO,CAAC,SAAS,2BAA4B,EAAC,CAAC,2MAA4M,CAAC,EAAC,AAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,0BAA2B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,iCAAkC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,2BAA4B,EAAC,AAAC,CAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,2BAA4B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0BAA2B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0BAA2B,EAAC,AAAC,CAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,oBAAqB,EAAC,CAAC,yMAAsN,EAAE,OAAO,CAAC,SAAS,2BAA4B,EAAC,CAAC,4FAA6F,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,iCAAkC,EAAC,CAAC,iSAAkS,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kBAAmB,EAAC,CAAC,8BAA2C,EAAE,OAAO,CAAC,SAAS,2BAA4B,EAAC,CAAC,6RAA8R,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,UAAW,EAAC,CAAC,uLAAoM,EAAE,OAAO,CAAC,SAAS,2BAA4B,EAAC,CAAC,qKAAsK,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,QAAS,EAAC,CAAC,4VAA6V,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,OAAQ,EAAC,CAAC,sTAAuT,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,kQAAmQ,EAAC,AAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,4BAA6B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,gCAAiC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0BAA2B,EAAC,AAAC,CAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,wBAAyB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,oCAAqC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6BAA8B,EAAC,AAAC,CAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0CAA2C,EAAC,CAAC,iSAAkS,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sBAAuB,EAAC,CAAC,6RAA8R,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,iCAAkC,EAAC,CAAC,wRAAyR,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,oBAAqB,EAAC,CAAC,+RAAgS,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,oBAAqB,EAAC,CAAC,gaAAia,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,gBAAiB,EAAC,CAAC,icAAkc,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,4BAA6B,EAAC,AAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,yUAA0U,EAAC,AAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,yCAA0C,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,yCAA0C,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,kDAAmD,EAAC,AAAC,CAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,4CAA6C,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,wCAAyC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,gCAAiC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,KAAK,CAAC,UAAU,gBAAiB,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,iCAAkC,EAAC,CAAC,kRAAmR,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,2BAA4B,EAAC,CAAC,8QAA+Q,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,uBAAwB,EAAC,CAAC,kRAAmR,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,qBAAsB,EAAC,CAAC,mSAAoS,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,eAAgB,EAAC,CAAC,0SAA2S,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,SAAU,EAAC,CAAC,sTAAuT,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kBAAmB,EAAC,CAAC,oRAAqR,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,OAAQ,EAAC,CAAC,6VAA8V,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,qRAAsR,EAAC,AAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,6BAA8B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,yBAA0B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0BAA2B,EAAC,AAAC,CAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,+BAAgC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,+BAAgC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,yBAA0B,EAAC,AAAC,CAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,uiBAAwiB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qgBAAsgB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qlBAAslB,EAAC,AAAC,CAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,qaAAsa,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0aAA2a,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,8WAA+W,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,8WAA+W,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,wXAAyX,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0bAA2b,EAAC,AAAC,CAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,uPAAwP,EAAC,AAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,wBAAyB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,2CAA4C,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0BAA2B,EAAC,AAAC,CAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,yBAA0B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mBAAoB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qBAAsB,EAAC,AAAC,CAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,gDAAiD,EAAC,CAAC,8TAA+T,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0BAA2B,EAAC,CAAC,kUAAmU,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,oCAAqC,EAAC,CAAC,iXAAkX,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAA0B,EAAC,CAAC,kVAAmV,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,qBAAsB,EAAC,CAAC,qVAAsV,CAAC,EAAC,AAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,mRAAoR,EAAC,AAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,8BAA+B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,+BAAgC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,oCAAqC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,uCAAwC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,yBAA0B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,oCAAqC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,uBAAwB,EAAC,CAAC,2PAA4P,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,oBAAqB,EAAC,CAAC,wQAAyQ,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,iBAAkB,EAAC,CAAC,mRAAoR,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,6BAA8B,EAAC,CAAC,4HAAyI,EAAE,OAAO,CAAC,SAAS,YAAa,EAAC,CAAC,KAAkB,EAAE,OAAO,CAAC,SAAS,eAAgB,EAAC,CAAC,SAAsB,EAAE,OAAO,CAAC,SAAS,WAAY,EAAC,CAAC,wJAAyJ,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,8BAA+B,EAAC,CAAC,8XAA+X,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,wWAAyW,EAAC,AAAC,CAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,4PAA6P,EAAC,AAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,+BAAgC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,+BAAgC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6CAA8C,EAAC,AAAC,CAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,iCAAkC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,uCAAwC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,iCAAkC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wBAAyB,EAAC,CAAC,gSAAiS,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,2BAA4B,EAAC,CAAC,oSAAqS,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,oBAAqB,EAAC,CAAC,wSAAyS,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,2BAA4B,EAAC,CAAC,uSAAwS,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,8BAA+B,EAAC,CAAC,uXAAwX,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,4KAA6K,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,sRAAuR,EAAC,AAAC,CAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,iSAAkS,EAAC,AAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,mCAAoC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,kCAAmC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,yCAA0C,EAAC,AAAC,CAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,sCAAuC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,oCAAqC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mCAAoC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0BAA2B,EAAC,CAAC,uSAAwS,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wBAAyB,EAAC,CAAC,yRAA0R,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0BAA2B,EAAC,CAAC,6PAA8P,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,qBAAsB,EAAC,CAAC,oTAAqT,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,6BAA8B,EAAC,CAAC,6QAA8Q,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,SAAU,EAAC,CAAC,+XAAgY,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,OAAQ,EAAC,CAAC,gYAAiY,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,yBAA0B,EAAC,AAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,0SAA2S,EAAC,AAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,oCAAqC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qCAAsC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,8BAA+B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,KAAK,CAAC,UAAU,gBAAiB,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,wCAAyC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,uCAAwC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,yBAA0B,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,qBAAsB,EAAC,CAAC,oQAAqQ,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,6BAA8B,EAAC,CAAC,sOAAuO,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,+BAAgC,EAAC,CAAC,iRAAkR,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,uBAAwB,EAAC,CAAC,0RAA2R,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sBAAuB,EAAC,CAAC,mQAAoQ,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,SAAU,EAAC,CAAC,qWAAsW,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,+BAAgC,EAAC,CAAC,sbAAub,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,6BAA8B,EAAC,AAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,0QAA2Q,EAAC,AAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,2BAA4B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mCAAoC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,4BAA6B,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,0BAA2B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,2BAA4B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0CAA2C,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,2BAA4B,EAAC,CAAC,kRAAmR,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,4BAA6B,EAAC,CAAC,gTAAiT,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sCAAuC,EAAC,CAAC,mRAAoR,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,6BAA8B,EAAC,CAAC,kRAAmR,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,aAAc,EAAC,CAAC,qRAAsR,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,QAAS,EAAC,CAAC,wVAAyV,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,OAAQ,EAAC,CAAC,uYAAwY,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,8BAA+B,EAAC,AAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,kRAAmR,EAAC,AAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,8BAA+B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,yBAA0B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,kCAAmC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,yBAA0B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,8BAA+B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,+BAAgC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,2CAA4C,EAAC,CAAC,4NAA6N,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sDAAuD,EAAC,CAAC,4OAA6O,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kCAAmC,EAAC,CAAC,qPAAsP,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,mCAAoC,EAAC,CAAC,yPAA0P,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,4BAA6B,EAAC,CAAC,uQAAwQ,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,8BAA+B,EAAC,CAAC,mPAAoP,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,cAAe,EAAC,CAAC,qQAAsQ,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kBAAmB,EAAC,CAAC,sQAAuQ,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,0BAA2B,EAAC,AAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,yQAA0Q,EAAC,AAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,kCAAmC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,8BAA+B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,8BAA+B,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,6BAA8B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,4BAA6B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,2BAA4B,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,uBAAwB,EAAC,CAAC,4TAA6T,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wBAAyB,EAAC,CAAC,mTAAoT,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kCAAmC,EAAC,CAAC,+SAAgT,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,6BAA8B,EAAC,CAAC,iUAAkU,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAA0B,EAAC,CAAC,sNAAuN,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,eAAgB,EAAC,CAAC,gRAAiR,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,oQAAqQ,EAAC,AAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,8BAA+B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,2BAA4B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,oCAAqC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,wBAAyB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,4BAA6B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,gCAAiC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAA0B,EAAC,CAAC,6TAA8T,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yCAA0C,EAAC,CAAC,+XAAgY,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,eAAgB,EAAC,CAAC,iXAAkX,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,uBAAwB,EAAC,CAAC,kWAAmW,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,+BAAgC,EAAC,CAAC,0UAA2U,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,YAAa,EAAC,CAAC,2PAA4P,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,aAAc,EAAC,CAAC,wOAAyO,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,aAAc,EAAC,CAAC,wQAAyQ,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,+OAAgP,EAAC,AAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,0BAA2B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,gCAAiC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,gCAAiC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,qBAAsB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,wBAAyB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,8BAA+B,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,4BAA6B,EAAC,CAAC,0TAA2T,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,mCAAoC,EAAC,CAAC,wTAAyT,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kCAAmC,EAAC,CAAC,4UAA6U,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,cAAe,EAAC,CAAC,iMAAkM,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,eAAgB,EAAC,CAAC,wPAAyP,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,4PAA6P,EAAC,AAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,sBAAuB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,iCAAkC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,kBAAmB,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,2BAA4B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,gCAAiC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,2BAA4B,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0BAA2B,EAAC,CAAC,0WAA2W,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAA0B,EAAC,CAAC,iTAAkT,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAA0B,EAAC,CAAC,kVAAmV,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,qBAAsB,EAAC,CAAC,4RAA6R,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,QAAS,EAAC,CAAC,gQAAiQ,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,OAAQ,EAAC,CAAC,6PAA8P,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,oRAAqR,EAAC,AAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,qBAAsB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0BAA2B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,8BAA+B,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,8BAA+B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6BAA8B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,uBAAwB,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,8BAA+B,EAAC,CAAC,4UAA6U,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kCAAmC,EAAC,CAAC,6YAA8Y,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yCAA0C,EAAC,CAAC,mXAAoX,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,YAAa,EAAC,CAAC,gQAAiQ,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,cAAe,EAAC,CAAC,iVAAkV,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,6BAA8B,EAAC,AAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,6PAA8P,EAAC,AAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,yBAA0B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,8BAA+B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qCAAsC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,4BAA6B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,8BAA+B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mCAAoC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sBAAuB,EAAC,CAAC,wTAAyT,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,mBAAoB,EAAC,CAAC,0TAA2T,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wBAAyB,EAAC,CAAC,6WAA8W,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kBAAmB,EAAC,CAAC,yWAA0W,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,iCAAkC,EAAC,CAAC,oWAAqW,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,+BAAgC,EAAC,CAAC,8NAA+N,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,OAAQ,EAAC,CAAC,+UAAgV,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,gCAAiC,EAAC,AAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,2MAA4M,EAAC,AAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,4BAA6B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,kCAAmC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,iCAAkC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0BAA2B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0BAA2B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qCAAsC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,kCAAmC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qBAAsB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qBAAsB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,iCAAkC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,8BAA+B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6BAA8B,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kCAAmC,EAAC,CAAC,yTAA0T,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,2BAA4B,EAAC,CAAC,+RAAgS,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,OAAQ,EAAC,CAAC,kOAAmO,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,OAAQ,EAAC,CAAC,6RAA8R,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,qPAAsP,EAAC,AAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,0BAA2B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,4BAA6B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,4BAA6B,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,wBAAyB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,4BAA6B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6BAA8B,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,uBAAwB,EAAC,CAAC,4TAA6T,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wBAAyB,EAAC,CAAC,0TAA2T,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,mBAAoB,EAAC,CAAC,0WAA2W,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,oBAAqB,EAAC,CAAC,+SAAgT,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,MAAO,EAAC,CAAC,+UAAgV,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,OAAQ,EAAC,CAAC,0WAA2W,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,iPAAkP,EAAC,AAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,gCAAiC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,kCAAmC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,kCAAmC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,yBAA0B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,kCAAmC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,2BAA4B,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,2DAA4D,EAAC,CAAC,0VAA2V,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,gCAAiC,EAAC,CAAC,gSAAiS,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0CAA2C,EAAC,CAAC,6TAA8T,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,6BAA8B,EAAC,CAAC,yRAA0R,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wBAAyB,EAAC,CAAC,sMAAuM,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,eAAgB,EAAC,CAAC,sPAAuP,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,YAAa,EAAC,CAAC,sRAAuR,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,MAAO,EAAC,CAAC,0NAA2N,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,QAAS,EAAC,CAAC,4NAA6N,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,OAAQ,EAAC,CAAC,qQAAsQ,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,uOAAwO,EAAC,AAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,gCAAiC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,wBAAyB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,uBAAwB,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,4BAA6B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,kCAAmC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,uCAAwC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yCAA0C,EAAC,CAAC,wQAAyQ,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wCAAyC,EAAC,CAAC,0QAA2Q,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,mCAAoC,EAAC,CAAC,qRAAsR,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,8CAA+C,EAAC,CAAC,kUAAmU,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,WAAY,EAAC,CAAC,0MAA2M,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,QAAS,EAAC,CAAC,oOAAqO,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kBAAmB,EAAC,CAAC,+MAAgN,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,UAAW,EAAC,CAAC,mPAAoP,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,OAAQ,EAAC,CAAC,2OAA4O,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,8BAA+B,EAAC,AAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,iOAAkO,EAAC,AAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,0BAA2B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,oCAAqC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,+BAAgC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,wBAAyB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6BAA8B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6BAA8B,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wBAAyB,EAAC,CAAC,0SAA2S,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,iCAAkC,EAAC,CAAC,+cAAgd,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wBAAyB,EAAC,CAAC,2PAA4P,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kBAAmB,EAAC,CAAC,yVAA0V,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,2PAA4P,EAAC,AAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,mCAAoC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,yBAA0B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,iCAAkC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,yBAA0B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,2BAA4B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,sBAAuB,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,sgBAAugB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,sbAAub,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,ggBAAigB,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wBAAyB,EAAC,CAAC,wUAAyU,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,iBAAkB,EAAC,CAAC,wTAAyT,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,0PAA2P,EAAC,AAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,kCAAmC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,4BAA6B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,+BAAgC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,0BAA2B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,wBAAyB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mCAAoC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,4BAA6B,EAAC,CAAC,uUAAwU,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wBAAyB,EAAC,CAAC,8TAA+T,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,+BAAgC,EAAC,CAAC,sRAAuR,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,qBAAsB,EAAC,CAAC,mSAAoS,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,cAAe,EAAC,CAAC,kUAAmU,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kBAAmB,EAAC,CAAC,2SAA4S,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,OAAQ,EAAC,CAAC,uSAAwS,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,UAAW,EAAC,CAAC,8SAA+S,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,0BAA2B,EAAC,AAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,kRAAmR,EAAC,AAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,+BAAgC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qCAAsC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,gCAAiC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,0BAA2B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,uBAAwB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,+BAAgC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,2BAA4B,EAAC,CAAC,iQAAkQ,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,4BAA6B,EAAC,CAAC,uWAAwW,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAA0B,EAAC,CAAC,2UAA4U,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,2BAA4B,EAAC,CAAC,wSAAyS,CAAC,EAAC,AAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,wTAAyT,EAAC,AAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,+BAAgC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qCAAsC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,4BAA6B,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,0BAA2B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,2BAA4B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0BAA2B,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,8BAA+B,EAAC,CAAC,sXAAuX,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,6BAA8B,EAAC,CAAC,mXAAoX,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,2BAA4B,EAAC,CAAC,uVAAwV,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,oBAAqB,EAAC,CAAC,mYAAoY,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,UAAW,EAAC,CAAC,kYAAmY,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,eAAgB,EAAC,CAAC,0eAA2e,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,OAAQ,EAAC,CAAC,2eAA4e,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,6TAA8T,EAAC,AAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,wCAAyC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6BAA8B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,8BAA+B,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,oCAAqC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,2BAA4B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mCAAoC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kCAAmC,EAAC,CAAC,0ZAA2Z,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,iCAAkC,EAAC,CAAC,kWAAmW,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,2BAA4B,EAAC,CAAC,6XAA8X,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,gCAAiC,EAAC,CAAC,gUAAiU,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,qBAAsB,EAAC,CAAC,yVAA0V,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wBAAyB,EAAC,CAAC,0VAA2V,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,mEAAoE,EAAC,CAAC,oZAAqZ,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,iBAAkB,EAAC,CAAC,2WAA4W,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,eAAgB,EAAC,CAAC,kWAAmW,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,0BAA2B,EAAC,AAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,2PAA4P,EAAC,AAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,wBAAyB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,4BAA6B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qCAAsC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,4BAA6B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,wBAAyB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,+BAAgC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,8BAA+B,EAAC,CAAC,gUAAiU,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,gCAAiC,EAAC,CAAC,wTAAyT,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,gCAAiC,EAAC,CAAC,8aAA+a,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,aAAc,EAAC,CAAC,oXAAqX,CAAC,EAAC,AAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,8PAA+P,EAAC,AAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,wBAAyB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mBAAoB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,wBAAyB,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,2BAA4B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,8BAA+B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,uBAAwB,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,gCAAiC,EAAC,CAAC,kUAAmU,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,+BAAgC,EAAC,CAAC,uWAAwW,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,WAAY,EAAC,CAAC,uTAAwT,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,eAAgB,EAAC,CAAC,kUAAmU,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,2BAA4B,EAAC,AAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,qRAAsR,EAAC,AAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,yBAA0B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,+BAAgC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,8BAA+B,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,2BAA4B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,uBAAwB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,4BAA6B,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,oCAAqC,EAAC,CAAC,sRAAuR,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,gCAAiC,EAAC,CAAC,8UAA+U,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,+BAAgC,EAAC,CAAC,oTAAqT,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,gCAAiC,EAAC,CAAC,kVAAmV,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kBAAmB,EAAC,CAAC,2WAA4W,CAAC,EAAC,AAAC,EAAC,CAAc,GAAyB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,4BAA6B,EAAC,AAAC,EAAC,CACj0lJ,EAAqB,CAAC,QAAU,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,SAAW,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,mBAAqB,CAAC,KAAO,UAAW,CAAC,CAAC"}