{
  "version": 3,
  "sources": ["ssg:https://framerusercontent.com/modules/4YbcEreTIp0bxiaV6tuj/dfhD05HTZyVBuZtM2wMq/tQZ7tM3qa-7.js"],
  "sourcesContent": ["import{jsx as e,jsxs as t}from\"react/jsx-runtime\";import*as i from\"react\";export const richText=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"strong\",{children:[\"Slack\",/*#__PURE__*/e(\"br\",{})]}),\"In this use case, Slack acts as the interface for initiating and receiving messages. It serves as the platform where communications are sent and received, which Mindflow utilizes to intercept and process user queries or commands in real-time.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"strong\",{children:[\"OpenAI's GPT\",/*#__PURE__*/e(\"br\",{})]}),\"OpenAI's GPT is the AI engine that interprets and responds to messages from Slack. It analyzes the content and context of the conversation, generating human-like responses to continue the interaction without the need for manual input.\"]})]});export const richText1=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Google Sheets\"})});export const richText2=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/t(\"p\",{children:[\"Mindflow enhances productivity by enabling Slack-driven searches within \",/*#__PURE__*/e(\"strong\",{children:\"Google Sheets\"}),\", quickly returning specific key/value data pairings directly to the Slack channel, simplifying data lookup.\"]})});export const richText3=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{style:{\"--framer-line-height\":\"2em\"},children:[\"Time Lost in Manual Searches\",/*#__PURE__*/e(\"br\",{}),\"Inefficiency in Data Management\",/*#__PURE__*/e(\"br\",{}),\"Delay in Information Retrieval\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]});export const richText4=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{style:{\"--framer-line-height\":\"2em\"},children:[\"Instant Data Access\",/*#__PURE__*/e(\"br\",{}),\"Accurate Information Retrieval\",/*#__PURE__*/e(\"br\",{}),\"Streamlined Communication Workflows\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]});export const richText5=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Command Reception in Slack\"}),/*#__PURE__*/e(\"br\",{}),\"Mindflow automates the initiation of data searches through slash commands in Slack, bypassing the need for manual navigation and search within Google Sheets, thus saving time and reducing context-switching.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Key/Value Pair Search\"}),/*#__PURE__*/e(\"br\",{}),\"Upon receiving a search command, Mindflow autonomously parses Google Sheets for the specified key/value pair, a task that would manually involve multiple steps and potential for oversight, ensuring quick and precise data retrieval.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Results Delivery to Slack\"}),/*#__PURE__*/e(\"br\",{}),\"Mindflow completes the loop by automatically posting the search results back into Slack. This replaces the manual process of copying data from Google Sheets and messaging it, streamlining the communication flow and reducing the risk of data mishandling.\"]})});export const richText6=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"strong\",{children:[\"Slack\",/*#__PURE__*/e(\"br\",{})]}),\"Slack is the platform where the search command is initiated. It acts as the user interface, allowing team members to input commands in a familiar chat environment, which triggers the automated search process within Google Sheets.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"strong\",{children:[\"Google Sheets\",/*#__PURE__*/e(\"br\",{})]}),\"Google Sheets is the data repository being searched. It receives queries from the Mindflow automation and returns the relevant data rows based on the key/value pairs searched, eliminating manual data lookup.\"]})]});export const richText7=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Mindflow automates the validation process for CrowdStrike on new Jamf-registered devices, ensuring security compliance through timely Slack notifications.\"})});export const richText8=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{style:{\"--framer-line-height\":\"2em\"},children:[\"Time Delay in Manual Checks \",/*#__PURE__*/e(\"br\",{}),\"IT Team Workload \",/*#__PURE__*/e(\"br\",{}),\"Inconsistent Device Tracking \",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]});export const richText9=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/t(\"p\",{style:{\"--framer-line-height\":\"2em\"},children:[\"Immediate Notification Dispatch \",/*#__PURE__*/e(\"br\",{}),\"Consistent Compliance Enforcement \",/*#__PURE__*/e(\"br\",{}),\"Improved IT Resource Management \",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})});export const richText10=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Device Registration Monitoring\"}),/*#__PURE__*/e(\"br\",{}),\"Mindflow automates the monitoring of new device registration in Jamf, a task that typically requires constant manual oversight. The automated process rapidly identifies devices not yet acknowledged in CrowdStrike, minimizing potential security gaps that can occur with manual tracking.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Notification via Slack\"}),/*#__PURE__*/e(\"br\",{}),\"Mindflow replaces manual notification procedures by automatically dispatching alerts to a Slack channel when a device is enrolled in Jamf. This immediate notification accelerates the recognition process, significantly reducing the time between device enrollment and security verification.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Follow-Up on Device Acknowledgement\"}),/*#__PURE__*/e(\"br\",{}),\"If a device is not recognized by CrowdStrike, Mindflow automates follow-up notifications. This ensures that no device goes unchecked for more than an hour, a considerable improvement over manual checks that could lead to longer vulnerability windows.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"IT Department Alerting\"}),/*#__PURE__*/e(\"br\",{}),\"Mindflow facilitates automated communication with the IT department in the event of a failure in device detection by CrowdStrike. This automatic escalation bypasses the manual process of drafting and sending emails, ensuring that potential issues are addressed promptly.\"]})});export const richText11=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"strong\",{children:[\"Jamf\",/*#__PURE__*/e(\"br\",{})]}),\"Jamf is pivotal for the initial registration of new devices within the network. It serves as the starting point for the automation workflow, signaling the presence of a new device that needs to be verified by CrowdStrike, thereby triggering the subsequent automated checks and notifications.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"strong\",{children:[\"CrowdStrike\",/*#__PURE__*/e(\"br\",{})]}),\"CrowdStrike's role is to provide endpoint security verification. Once a device is enrolled in Jamf, CrowdStrike confirms whether the device is compliant with security protocols. Mindflow automates this verification process, reducing the response time to potential threats compared to manual verification.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"strong\",{children:[\"Slack\",/*#__PURE__*/e(\"br\",{})]}),\"Slack acts as the communication hub in this use case. It is where notifications about device enrollments are posted, and follow-up alerts are sent if a device is not recognized by CrowdStrike. This immediate and centralized communication replaces various manual notification methods.\"]})]});export const richText12=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate IP Analysis\"})});export const richText13=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate the geo-localization of IP addresses in bulk by extracting data, utilizing Really Free Geo IP for analysis, and reporting via email and webhook integrations.\"})});export const richText14=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{style:{\"--framer-line-height\":\"2em\"},children:[\"Manual Data Collection Effort\",/*#__PURE__*/e(\"br\",{}),\"Increased Analysis Time\",/*#__PURE__*/e(\"br\",{}),\"Potential for Inaccuracy\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]});export const richText15=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{style:{\"--framer-line-height\":\"2em\"},children:[\"Streamlined Operational Efficiency\",/*#__PURE__*/e(\"br\",{}),\"Accurate Geolocation Mapping\",/*#__PURE__*/e(\"br\",{}),\"Seamless Integration with Other Tools\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]});export const richText16=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Extracting IP Addresses\"}),/*#__PURE__*/e(\"br\",{}),\" Mindflow automates the extraction of submitted IP addresses, a task that if done manually, can be tedious and prone to errors. Through automation, Mindflow ensures a swift and accurate gathering of IP data, significantly reducing the potential for human error and speeding up the overall process.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Analysis via Really Free Geo IP\"}),/*#__PURE__*/e(\"br\",{}),\"By automating the analysis with Really Free Geo IP, Mindflow eliminates the need for manual queries to determine the geolocation of each IP address. This automation not only accelerates the retrieval of geolocation data but also ensures consistency and accuracy in the analysis, vastly outperforming manual efforts in both speed and reliability.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Integration with Reporting Tools\"}),/*#__PURE__*/e(\"br\",{}),\"Mindflow seamlessly integrates the geolocation data with Webhook.site and email for efficient reporting. This automation replaces manual compilation and dissemination of reports, streamlining the communication of findings and significantly enhancing the efficiency of reporting processes compared to manual methods.\"]})});export const richText17=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"strong\",{children:[\"Really Free Geo IP\",/*#__PURE__*/e(\"br\",{})]}),\"Really Free Geo IP is the foundational tool in this use case, tasked with the initial geo-lookup of IP addresses. It provides the crucial data on geographical location without requiring authentication, making it a key starting point for the automation process.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"strong\",{children:[\"VirusTotal\",/*#__PURE__*/e(\"br\",{})]}),\"VirusTotal is integrated for enhancing security analysis by checking the IP addresses against a vast database of known threats. This step adds a layer of security by identifying potentially harmful IP addresses, thus enriching the geo-lookup process with security insights.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"strong\",{children:[\"AbuseIPDB\",/*#__PURE__*/e(\"br\",{})]}),\"AbuseIPDB plays a critical role in assessing the reputation of the IP addresses. By querying AbuseIPDB, the automation gains insight into the history of abuse associated with each IP, further solidifying the analysis with reputation data.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"strong\",{children:[\"GreyNoise\",/*#__PURE__*/e(\"br\",{})]}),\"GreyNoise is utilized to filter out the background noise of the internet, distinguishing between benign and malicious IP addresses. This tool provides context on whether an IP address is part of widespread attacks or innocuous, enhancing decision-making in the automation flow.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"strong\",{children:[\"Webhook.site\",/*#__PURE__*/e(\"br\",{})]}),\"Webhook.site is used for API integration examples, acting as a receiver for the geo-lookup data. This tool demonstrates how the extracted IP information can be seamlessly integrated with other systems, showcasing the flexibility of the automation in real-world applications.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"strong\",{children:[\"Email for Reporting\",/*#__PURE__*/e(\"br\",{})]}),\"Email integration finalizes the automation process by distributing the geo-lookup results. This ensures that stakeholders are promptly informed about the geographical locations of the IP addresses, completing the loop of the automation process with actionable intelligence.\"]})]});export const richText18=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Mindflow automates IP reputation checks using AbuseIPDB and VirusTotal after querying data from Snowflake.\"})});export const richText19=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/t(\"p\",{style:{\"--framer-line-height\":\"2em\"},children:[\"Manual Data Queries \",/*#__PURE__*/e(\"br\",{}),\"Time-Intensive IP Checks \",/*#__PURE__*/e(\"br\",{}),\"Manual Reporting \",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})});export const richText20=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/t(\"p\",{style:{\"--framer-line-height\":\"2em\"},children:[\"Immediate Data Retrieval \",/*#__PURE__*/e(\"br\",{}),\"Rapid Reputation Assessment \",/*#__PURE__*/e(\"br\",{}),\"Automated Reporting \",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})});export const richText21=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Running SQL Queries in Snowflake\"}),/*#__PURE__*/e(\"br\",{}),\"Mindflow automates the execution of SQL queries within Snowflake, extracting IP addresses for analysis. This replaces the manual process of writing and running queries, saving time and reducing the potential for human error.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"IP Reputation Check with AbuseIPDB\"}),/*#__PURE__*/e(\"br\",{}),\"Mindflow automates the task of checking IP addresses against AbuseIPDB for reputation scoring. This immediate automated check enhances security operations by quickly identifying potentially harmful IP addresses, which would be slower and less reliable if done manually.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"IP Scan Report with VirusTotal\"}),/*#__PURE__*/e(\"br\",{}),\" Mindflow uses VirusTotal to automatically generate detailed reports on the scanned IPs. This automation replaces the manual submission of IPs to VirusTotal and the retrieval of reports, streamlining the threat analysis process.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Automated Reporting in Zendesk\"}),/*#__PURE__*/e(\"br\",{}),\"The results from the automated IP checks are then used by Mindflow to add comments to Zendesk tickets. This ensures that all relevant information is logged and tracked without manual data entry, significantly improving response times for support teams.\"]})});export const richText22=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"strong\",{children:[\"Snowflake\",/*#__PURE__*/e(\"br\",{})]}),\"In this use case, Snowflake is used to run SQL queries to retrieve data. Mindflow automates this step, which traditionally involves manual execution of queries, leading to faster data retrieval and analysis.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"strong\",{children:[\"AbuseIPDB\",/*#__PURE__*/e(\"br\",{})]}),\"AbuseIPDB checks the reputation of IP addresses. Integrated within Mindflow, it automates the reputation assessment, which would otherwise be a manual process, enhancing the efficiency of security operations.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"strong\",{children:[\"VirusTotal\",/*#__PURE__*/e(\"br\",{})]}),\"VirusTotal provides detailed reports on IP addresses. By automating this step with Mindflow, the time-consuming process of manually scanning IPs and interpreting reports is eliminated.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"strong\",{children:[\"Zendesk\",/*#__PURE__*/e(\"br\",{})]}),\"Zendesk is used for ticketing and customer support. Mindflow automates the addition of comments to tickets based on the analysis results, which would otherwise be a manual task, thereby streamlining customer support workflows.\"]})]});export const richText23=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Mindflow automates threat intelligence by analyzing IPv4 addresses with VirusTotal, streamlining cybersecurity efforts through enrichment and notifications.\"})});export const richText24=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/t(\"p\",{style:{\"--framer-line-height\":\"2em\"},children:[\"Manual IP Address Analysis \",/*#__PURE__*/e(\"br\",{}),\"Slower Threat Response \",/*#__PURE__*/e(\"br\",{}),\"Potential for Oversight \",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})});export const richText25=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/t(\"p\",{style:{\"--framer-line-height\":\"2em\"},children:[\"Accelerated Threat Detection \",/*#__PURE__*/e(\"br\",{}),\"Real-Time Intelligence Gathering \",/*#__PURE__*/e(\"br\",{}),\"Automated Notification Delivery \",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})});export const richText26=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"IP Address Ingestion\"}),/*#__PURE__*/e(\"br\",{}),\"Mindflow automates the ingestion of an array of IP addresses through a webhook. This process, which is crucial for threat intelligence, typically requires tedious manual data entry and can be prone to human error, making automation a significant time-saver and accuracy enhancer.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Threat Analysis with VirusTotal\"}),/*#__PURE__*/e(\"br\",{}),\"Each IP address is automatically evaluated using VirusTotal, bypassing the manual process of individually scanning each IP. This automation ensures consistent and rapid threat analysis, greatly reducing the window of vulnerability that manual processes may introduce.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Automated Email Alerts\"}),/*#__PURE__*/e(\"br\",{}),\"Mindflow sends out automated email alerts based on the results from VirusTotal. Where manually this would require drafting and sending individual emails, the automation ensures that critical threat information is communicated immediately and without the need for direct human intervention.\"]})});export const richText27=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"strong\",{children:[\"Webhook\",/*#__PURE__*/e(\"br\",{})]}),\"The webhook serves as the entry point in the automation flow, responsible for ingesting an array of IP addresses. This replaces the manual process of collecting and inputting data, providing a more efficient and error-free start to the threat analysis procedure.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"strong\",{children:[\"VirusTotal\",/*#__PURE__*/e(\"br\",{})]}),\"VirusTotal is integral for the automated analysis and evaluation of the ingested IP addresses. It replaces the manual task of checking each IP against databases for potential threats, significantly speeding up the threat intelligence process and ensuring a standardized assessment.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"strong\",{children:[\"Email Service\",/*#__PURE__*/e(\"br\",{})]}),\"The email service is automated to send notifications based on the analysis results from VirusTotal. This replaces the manual task of creating and sending reports, ensuring timely and consistent communication of threat intelligence findings.\"]})]});export const richText28=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\" Mindflow streamlines IP address investigations using GreyNoise to provide intelligence and historical scanning context efficiently. \"})});export const richText29=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/t(\"p\",{style:{\"--framer-line-height\":\"2em\"},children:[\"Manual Analysis Effort \",/*#__PURE__*/e(\"br\",{}),\"Time Consuming Investigations \",/*#__PURE__*/e(\"br\",{}),\"Information Overload \",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})});export const richText30=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/t(\"p\",{style:{\"--framer-line-height\":\"2em\"},children:[\"Quick Threat Identification \",/*#__PURE__*/e(\"br\",{}),\"Enhanced Analytical Depth \",/*#__PURE__*/e(\"br\",{}),\"Efficient Data Utilization \",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})});export const richText31=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"IP Address Form Submission\"}),/*#__PURE__*/e(\"br\",{}),\"Mindflow automates the initial submission of a suspicious IP address for investigation, which traditionally requires manual entry. This step ensures a standardized approach to capturing IP details for further analysis.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Basic Intelligence Review\"}),/*#__PURE__*/e(\"br\",{}),\"The automation includes a review of basic intelligence related to the IP address using GreyNoise, streamlining what would otherwise be a manual lookup process in various databases and tools.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Deep Scan Analysis\"}),/*#__PURE__*/e(\"br\",{}),\"Mindflow further automates the option to conduct a deeper historical scan analysis, providing insights into the IP's behavior over time. This replaces the manual process of sifting through historical data, offering immediate, in-depth intelligence.\"]})});export const richText32=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"strong\",{children:[\"Input Form\",/*#__PURE__*/e(\"br\",{})]}),\"The input form is the initial interface for users to submit suspicious IP addresses. It simplifies the data collection process, which would otherwise be manual, ensuring consistent information capture for analysis.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"strong\",{children:[\"GreyNoise\",/*#__PURE__*/e(\"br\",{})]}),\"GreyNoise serves as the analytical tool that examines the IP address against its database of internet background noise. It automates the identification of potentially harmful IPs by comparing them to known benign or malicious activity, a task that is significantly more complex and time-consuming if done manually.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"strong\",{children:[\"Email Service\",/*#__PURE__*/e(\"br\",{})]}),\"The email service is used to automate the dissemination of the analysis results. This replaces the need for manual report writing and distribution, ensuring prompt delivery of information to the concerned parties.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"strong\",{children:[\"Jira\",/*#__PURE__*/e(\"br\",{})]}),\"Jira is integrated for issue tracking and management. When an IP is found to be suspicious or malicious, an issue is automatically created in Jira, streamlining the workflow for incident response teams and replacing manual ticketing.\"]})]});export const richText33=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Mindflow enriches IP intelligence by evaluating arrays of IPv4 addresses with VirusTotal Enterprise, alerting via email if threats are detected.\"})});export const richText34=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{style:{\"--framer-line-height\":\"2em\"},children:[\"Configuration of Analysis Tools\",/*#__PURE__*/e(\"br\",{}),\"Fine-Tuning Detection Algorithms\",/*#__PURE__*/e(\"br\",{}),\"Setup Automated Notification System\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]});export const richText35=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{style:{\"--framer-line-height\":\"2em\"},children:[\"Minimized False Positive Rates\",/*#__PURE__*/e(\"br\",{}),\"Streamlined Threat Data Integration\",/*#__PURE__*/e(\"br\",{}),\"Immediate Threat Notifications\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]});export const richText36=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"IP Address Ingestion\"}),/*#__PURE__*/e(\"br\",{}),\"Mindflow automates the ingestion of IP addresses into the VirusTotal Enterprise system. If done manually, this task would require significant time to gather and input each IP address and is prone to human error, which can lead to missed or incorrect entries.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Threat Analysis\"}),/*#__PURE__*/e(\"br\",{}),\"Each IP address is automatically analyzed for potential threats using VirusTotal Enterprise. Automating this step with Mindflow increases the efficiency and accuracy of threat detection compared to the slower, less reliable manual analysis.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Threat Notification\"}),/*#__PURE__*/e(\"br\",{}),\"If a threat is detected, Mindflow automatically generates and sends an email notification. This immediate notification replaces what would typically be a manual alert process, speeding up the time it takes to respond to and mitigate threats.\"]})});export const richText37=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"strong\",{children:[\"VirusTotal Enterprise\",/*#__PURE__*/e(\"br\",{})]}),\"VirusTotal Enterprise functions as the core analytical tool in this use case, providing threat intelligence and analysis for the IP addresses ingested by the system. Its role is to assess each IP for potential security risks automatically.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/t(\"strong\",{children:[\"Send Email\",/*#__PURE__*/e(\"br\",{})]}),\"The email service is used to dispatch notifications once VirusTotal has identified a threat. This automation replaces the manual task of creating and sending security alerts to relevant personnel.\"]})});export const richText38=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate URL Analysis\"})});export const richText39=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Mindflow automates detection of malicious content by analyzing URLs with OCR, and manages incidents via Zendesk tickets.\"})});export const richText40=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{style:{\"--framer-line-height\":\"2em\"},children:[\"Integration of OCR API\",/*#__PURE__*/e(\"br\",{}),\"Training for Zendesk Use\",/*#__PURE__*/e(\"br\",{}),\"System Monitoring Necessity\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]});export const richText41=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{style:{\"--framer-line-height\":\"2em\"},children:[\"Heightened Fraud Detection\",/*#__PURE__*/e(\"br\",{}),\"Consistent Content Analysis\",/*#__PURE__*/e(\"br\",{}),\"Efficient Incident Reporting\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]});export const richText42=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Retrieve Pinterest Page\"}),/*#__PURE__*/e(\"br\",{}),\"Mindflow automates the retrieval of Pinterest pages for URL analysis. Manually, this would involve significant browsing and data collection time, which the automation process significantly reduces, making the task more efficient and less error-prone.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"OCR Image Analysis\"}),/*#__PURE__*/e(\"br\",{}),\"Mindflow uses OCR to analyze images from URLs for fraudulent content automatically. This replaces the need for manual image examination, which is not only time-consuming but also susceptible to human error, thus enhancing the accuracy and speed of fraud detection.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Create Zendesk Ticket\"}),/*#__PURE__*/e(\"br\",{}),\"Once potential fraud is identified, Mindflow automates the creation of a Zendesk ticket for further analysis. When done manually, this step can be slow and lead to a backlog of cases. Automation ensures that each case is promptly and systematically logged for review.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Email Deletion Request\"}),/*#__PURE__*/e(\"br\",{}),\"If content is confirmed as malicious, Mindflow automates the process of sending an email to request deletion. Automating this step replaces the need for manually drafting and sending emails, which streamlines the process of mitigating fraudulent content.\"]})});export const richText43=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"strong\",{children:[\"Pinterest\",/*#__PURE__*/e(\"br\",{})]}),\"Pinterest is the source for public content in this use case. It serves as the starting point where images containing URLs are found and extracted for analysis, automating the collection process that would otherwise be manual.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"strong\",{children:[\"OCR\",/*#__PURE__*/e(\"br\",{})]}),\"The OCR (Optical Character Recognition) tool is utilized to analyze the text within images extracted from Pinterest. It automates the identification of potentially fraudulent or abusive content within these images, which would be cumbersome and less reliable if done by hand.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/t(\"strong\",{children:[\"Zendesk\",/*#__PURE__*/e(\"br\",{})]}),\"Zendesk is used for ticketing and managing the workflow of reviewing and resolving incidents of fraud and abuse. By creating tickets automatically, Mindflow ensures that every identified issue is tracked and addressed, improving response times compared to manual logging.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"strong\",{children:[\"Email Service\",/*#__PURE__*/e(\"br\",{})]}),\"The email service is integrated to automate the sending of deletion requests for malicious content. This automation replaces manual email drafting and sending, ensuring a timely and consistent response to identified threats.\"]})]});export const richText44=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Threat Intelligence Automation\"})});export const richText45=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/t(\"p\",{children:[\"Mindflow leverages \",/*#__PURE__*/e(\"strong\",{children:\"URLhaus, VirusTotal, and URLScan\"}),\" to swiftly analyze and validate the safety of domains, enhancing cyber threat response times.\"]})});export const richText46=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/t(\"p\",{style:{\"--framer-line-height\":\"2em\"},children:[\"Manual Investigation Time\",/*#__PURE__*/e(\"br\",{}),\"Inconsistent Analysis Quality\",/*#__PURE__*/e(\"br\",{}),\"Delayed Threat Response\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})});export const richText47=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/t(\"p\",{style:{\"--framer-line-height\":\"2em\"},children:[\"Quick Threat Verification\",/*#__PURE__*/e(\"br\",{}),\"Consistent Analysis Accuracy\",/*#__PURE__*/e(\"br\",{}),\"Proactive Threat Mitigation\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})});export const richText48=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Domain Analysis with URLScan\"}),/*#__PURE__*/e(\"br\",{}),\"Mindflow automates the scrutiny of domains using URLScan, a task which, if done manually, can be laborious and inconsistent. Automation ensures a standardized and thorough examination, improving the speed and reliability of security assessments.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/t(\"strong\",{children:[/*#__PURE__*/e(\"br\",{}),\"Threat Detection with VirusTotal\"]}),/*#__PURE__*/e(\"br\",{}),\"By integrating VirusTotal, Mindflow automates the detection of potential threats associated with a domain. This supplants the manual, error-prone process of individually checking security databases, leading to quicker, more accurate threat responses.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Domain Verification with URLhaus\"}),/*#__PURE__*/e(\"br\",{}),\"Mindflow utilizes URLhaus to automatically verify domain integrity, a process which manually could take considerable time and may not be as thorough. This automation aids in swiftly identifying malicious domains, significantly cutting down the time security teams spend on verification.\"]})});export const richText49=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"strong\",{children:[\"URLScan\",/*#__PURE__*/e(\"br\",{})]}),\"URLScan is utilized within this use case as a primary tool for scanning and analyzing the security of domains. Its role is to automatically evaluate domain safety, which would be more time-consuming and less systematic if performed manually.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"strong\",{children:[\"VirusTotal\",/*#__PURE__*/e(\"br\",{})]}),\"VirusTotal's integration into the workflow serves the purpose of assessing domains against a database of known threats. It automates the process of virus and malware detection, vastly improving the speed and breadth of security assessments over manual analysis.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"strong\",{children:[\"URLhaus\",/*#__PURE__*/e(\"br\",{})]}),\"URLhaus is leveraged in this use case to cross-reference domains against its repository of malicious URLs. Its role is to automatically confirm if a domain is listed as harmful, which enhances the threat intelligence process by providing quick and accurate data that would be slower to compile manually.\"]})]});export const richText50=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/t(\"p\",{children:[\"Mindflow automates checking for domain breaches with \",/*#__PURE__*/e(\"strong\",{children:\"HaveIBeenPwned\"}),\", updates affected accounts using \",/*#__PURE__*/e(\"strong\",{children:\"Google Admin Directory\"}),\", and notifies via \",/*#__PURE__*/e(\"strong\",{children:\"Slack\"}),\", streamlining breach response and enhancing security posture.\"]})});export const richText51=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/t(\"p\",{style:{\"--framer-line-height\":\"2em\"},children:[\"Initial Configuration of Integration\",/*#__PURE__*/e(\"br\",{}),\"Training on HaveIBeenPwned and Mindflow\",/*#__PURE__*/e(\"br\",{}),\"Dependency on Third-party Services\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})});export const richText52=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/t(\"p\",{style:{\"--framer-line-height\":\"2em\"},children:[\"Immediate Breach Notifications\",/*#__PURE__*/e(\"br\",{}),\"Quick Remediation of Security Issues\",/*#__PURE__*/e(\"br\",{}),\"Proactive Security Measure Implementation\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})});export const richText53=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/t(\"p\",{children:[\"Domain Breach Check with HaveIBeenPwned\",/*#__PURE__*/e(\"br\",{}),\"Mindflow automates the process of checking domain breaches through HaveIBeenPwned, a task that, if done manually, would be time-consuming and prone to delays. Automated checks ensure immediate detection of breaches, greatly reducing the window of vulnerability and potential damage from exposed data.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"Account Update Using Google Admin Directory:</strong> In the event of a breach, Mindflow automates the security response by updating the affected user accounts through Google Admin Directory. If performed manually, this task would require significant administrative effort and be slower, increasing risk exposure. Automation ensures swift, consistent updates, minimizing potential security risks.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"Notification via Slack\",/*#__PURE__*/e(\"br\",{}),\"Mindflow automates breach notifications through Slack, ensuring that all relevant stakeholders are informed instantly. Compared to manual communication methods, this ensures a faster response, maintains transparency, and allows immediate action to be taken, thus significantly reducing the impact of any security incident.\"]})});export const richText54=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"strong\",{children:[\"HaveIBeenPwned\",/*#__PURE__*/e(\"br\",{})]}),\"Within this use case, HaveIBeenPwned is the primary tool for checking if email accounts associated with the domain have been compromised in data breaches. This service automates the monitoring and identifying security breaches, a process that would be exceedingly laborious to conduct manually.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Admin Directory\"}),/*#__PURE__*/e(\"br\",{}),\"Google Admin Directory is utilized for managing user accounts. It plays a critical role in automating the update of compromised accounts, such as resetting passwords or disabling access, tasks that are otherwise manually intensive and slow, especially at scale.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"strong\",{children:[\"Slack\",/*#__PURE__*/e(\"br\",{})]}),\"Slack acts as the communication hub in this workflow. It is automated to send instant notifications about breach incidents and account updates. This replaces manual communication methods, ensuring timely and consistent alerts to the necessary parties for quick action.\"]})]});export const richText55=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate Security Workflow\"})});export const richText56=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/t(\"p\",{children:[\"The \",/*#__PURE__*/e(\"strong\",{children:\"Request URLs to be added to Zscaler Allowlist\"}),\" use case in Mindflow automates the process of whitelisting URLs. It integrates Urlscan.io for security scanning, Zscaler for updating allowlists, and Atlassian Jira for issue tracking, streamlining the decision-making for URL unblocking requests.\"]})});export const richText57=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/t(\"p\",{style:{\"--framer-line-height\":\"2em\"},children:[\"Manual URL Evaluation Time \",/*#__PURE__*/e(\"br\",{}),\"Increased Security Workload \",/*#__PURE__*/e(\"br\",{}),\"IT Staff Resource Allocation  \",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})});export const richText58=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"Streamlined Security Operations\",/*#__PURE__*/e(\"br\",{}),\"Rapid Response to Threats\",/*#__PURE__*/e(\"br\",{}),\"Data-Driven Decision Making\",/*#__PURE__*/e(\"br\",{}),\"Improved Security Posture\",/*#__PURE__*/e(\"br\",{}),\"Continuous Compliance Monitoring\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]});export const richText59=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"URL Submission to Urlscan.io\"}),/*#__PURE__*/e(\"br\",{}),\"In the Mindflow automated workflow, URL submission to Urlscan.io replaces the manual process of security checking URLs. This integration facilitates immediate and thorough scanning, accelerating the risk assessment and reducing the time spent by IT security teams on manual reviews.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Decision Making for URL Allowlisting\"}),/*#__PURE__*/e(\"br\",{}),\"Mindflow's automation involves an intelligent decision-making process that uses the data from Urlscan.io to determine whether to block or allow a URL. This automation significantly reduces the time taken for decision-making and minimizes human error, compared to the manual evaluation process.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Issue Creation and Tracking in Jira\"}),/*#__PURE__*/e(\"br\",{}),\"Automatically creating and updating Jira tickets for each URL request, Mindflow removes the manual task of ticketing. This ensures that all requests are logged and tracked systematically, improving response times and the accuracy of record-keeping in comparison to manual ticket creation.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/t(\"strong\",{children:[/*#__PURE__*/e(\"br\",{}),\"Automated Communication with Requestors\"]}),/*#__PURE__*/e(\"br\",{}),\"Mindflow automates the communication process by sending emails to the users who submitted the URL requests. This replaces the need for manual email drafting and sending, thereby ensuring timely updates and reducing the administrative burden on staff.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Update Zscaler Allowlist\"}),/*#__PURE__*/e(\"br\",{}),\"Upon decision, Mindflow automates the update of the Zscaler Allowlist, a task that would otherwise require manual intervention. This automation allows for immediate updates to the security infrastructure, enhancing protection and maintaining compliance with minimal delay.\"]})});export const richText60=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"strong\",{children:[\"Urlscan.io\",/*#__PURE__*/e(\"br\",{})]}),\"Urlscan.io is employed for the security scanning of URLs requested to be whitelisted. It analyzes the web content and reputation of the URLs, providing detailed results that inform the allowlisting decision within the automation workflow.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"strong\",{children:[\"Zscaler\",/*#__PURE__*/e(\"br\",{})]}),\"Zscaler is integrated as the cloud-based security platform where the actual updating of the allowlist occurs. Once a URL is deemed safe based on Urlscan.io's analysis, Zscaler updates its allowlist, ensuring that only secure URLs are accessible to users.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"strong\",{children:[\"Atlassian Jira\",/*#__PURE__*/e(\"br\",{})]}),\"Atlassian Jira comes into play for issue tracking and management. It records each URL request as an issue, tracks the decision-making process, and logs the outcome, whether a URL is approved or denied. This ensures a structured and auditable trail for all URL requests within the automation process.\"]})]});export const richText61=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automate File Security Analysis\"})});export const richText62=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Mindflow automates the analysis of files with Hybrid Analysis upon receipt via webhook, followed by dispatching results directly to users through email.\"})});export const richText63=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{style:{\"--framer-line-height\":\"2em\"},children:[\"Configuration of Analysis Workflows\",/*#__PURE__*/e(\"br\",{}),\"Learning Automated Security Analysis\",/*#__PURE__*/e(\"br\",{}),\"Adjusting to Automated Response Protocols\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]});export const richText64=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{style:{\"--framer-line-height\":\"2em\"},children:[\"Swift Malware Analysis Turnaround\",/*#__PURE__*/e(\"br\",{}),\"Automated Delivery of Analysis Results\",/*#__PURE__*/e(\"br\",{}),\"Strengthened Security Measures\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]});export const richText65=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"File Reception\"}),/*#__PURE__*/e(\"br\",{}),\"Mindflow automates the receipt of files for analysis, which traditionally would require manual upload and initiation of analysis, streamlining the process significantly and reducing the wait time for the start of the analysis.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Malware Analysis\"}),/*#__PURE__*/e(\"br\",{}),\"Conducting file analysis through Hybrid Analysis is automated, bypassing the need for manual data entry and analysis initiation. This ensures a faster response to potential threats, reducing the window of risk exposure.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Email Notification\"}),/*#__PURE__*/e(\"br\",{}),\"The automation includes sending an analysis report via email, which replaces the manual task of compiling and sending security reports, enhancing the efficiency of communication and record-keeping.\"]})});export const richText66=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"strong\",{children:[\"Hybrid Analysis\",/*#__PURE__*/e(\"br\",{})]}),\"Hybrid Analysis is utilized for its threat intelligence capabilities. It performs in-depth analysis of files to identify potential security threats, automating what would otherwise be a manual and technical process of malware investigation.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"strong\",{children:[\"Send Email\",/*#__PURE__*/e(\"br\",{})]}),\"The email service within the workflow is responsible for sending out the analysis results. Automating this step ensures timely and accurate communication of threat findings to concerned parties, streamlining the notification process.\"]})]});\nexport const __FramerMetadata__ = {\"exports\":{\"richText32\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText15\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText19\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText17\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText37\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText5\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText45\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText26\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText6\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText1\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText28\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText13\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText16\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText24\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText54\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText47\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText63\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText53\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText35\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText62\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText9\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText60\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText39\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText57\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText10\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText30\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText56\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText55\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText51\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText4\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText7\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText29\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText46\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText2\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText8\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText41\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText34\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText25\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText64\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText18\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText36\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText27\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText22\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText20\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText52\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText49\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText23\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText40\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText66\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText3\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText44\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText38\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText14\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText21\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText58\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText50\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText12\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText31\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText11\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText43\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText48\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText65\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText42\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText33\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText61\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText59\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"__FramerMetadata__\":{\"type\":\"variable\"}}}"],
  "mappings": "oFAAiF,IAAMA,EAAsBC,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,QAAqBE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,oPAAoP,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,eAA4BE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,4OAA4O,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeC,EAAuBD,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,EAAeE,EAAuBF,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,SAAS,CAAC,2EAAwFE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,8GAA8G,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAuBL,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,MAAM,CAAC,uBAAuB,KAAK,EAAE,SAAS,CAAC,+BAA4CE,EAAE,KAAK,CAAC,CAAC,EAAE,kCAA+CA,EAAE,KAAK,CAAC,CAAC,EAAE,gCAAgC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeI,EAAuBN,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,MAAM,CAAC,uBAAuB,KAAK,EAAE,SAAS,CAAC,sBAAmCE,EAAE,KAAK,CAAC,CAAC,EAAE,iCAA8CA,EAAE,KAAK,CAAC,CAAC,EAAE,qCAAqC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeK,EAAuBL,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,iNAA8NA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,0OAAuPA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,+PAA+P,CAAC,CAAC,CAAC,CAAC,EAAeM,EAAuBR,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,QAAqBE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,uOAAuO,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,gBAA6BE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,iNAAiN,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeO,EAAuBP,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,4JAA4J,CAAC,CAAC,CAAC,EAAeQ,EAAuBV,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,MAAM,CAAC,uBAAuB,KAAK,EAAE,SAAS,CAAC,+BAA4CE,EAAE,KAAK,CAAC,CAAC,EAAE,oBAAiCA,EAAE,KAAK,CAAC,CAAC,EAAE,gCAA6CA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeS,EAAuBT,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,MAAM,CAAC,uBAAuB,KAAK,EAAE,SAAS,CAAC,mCAAgDE,EAAE,KAAK,CAAC,CAAC,EAAE,qCAAkDA,EAAE,KAAK,CAAC,CAAC,EAAE,mCAAgDA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeU,EAAwBV,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,gSAA6SA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,mSAAgTA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,6PAA0QA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,gRAAgR,CAAC,CAAC,CAAC,CAAC,EAAeW,EAAwBb,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,OAAoBE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,qSAAqS,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,cAA2BE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,kTAAkT,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,QAAqBE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,6RAA6R,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeY,EAAwBZ,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAea,EAAwBb,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,wKAAwK,CAAC,CAAC,CAAC,EAAec,EAAwBhB,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,MAAM,CAAC,uBAAuB,KAAK,EAAE,SAAS,CAAC,gCAA6CE,EAAE,KAAK,CAAC,CAAC,EAAE,0BAAuCA,EAAE,KAAK,CAAC,CAAC,EAAE,0BAA0B,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAee,EAAwBjB,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,MAAM,CAAC,uBAAuB,KAAK,EAAE,SAAS,CAAC,qCAAkDE,EAAE,KAAK,CAAC,CAAC,EAAE,+BAA4CA,EAAE,KAAK,CAAC,CAAC,EAAE,uCAAuC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAegB,EAAwBhB,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,4SAAyTA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,4VAAyWA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,6TAA6T,CAAC,CAAC,CAAC,CAAC,EAAeiB,EAAwBnB,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,qBAAkCE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,sQAAsQ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,aAA0BE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,mRAAmR,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,YAAyBE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,gPAAgP,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,YAAyBE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,uRAAuR,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,eAA4BE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,oRAAoR,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,sBAAmCE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,mRAAmR,CAAC,CAAC,CAAC,CAAC,CAAC,EAAekB,EAAwBlB,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,4GAA4G,CAAC,CAAC,CAAC,EAAemB,EAAwBnB,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,MAAM,CAAC,uBAAuB,KAAK,EAAE,SAAS,CAAC,uBAAoCE,EAAE,KAAK,CAAC,CAAC,EAAE,4BAAyCA,EAAE,KAAK,CAAC,CAAC,EAAE,oBAAiCA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeoB,EAAwBpB,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,MAAM,CAAC,uBAAuB,KAAK,EAAE,SAAS,CAAC,4BAAyCE,EAAE,KAAK,CAAC,CAAC,EAAE,+BAA4CA,EAAE,KAAK,CAAC,CAAC,EAAE,uBAAoCA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeqB,EAAwBrB,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,mOAAgPA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,gRAA6RA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,uOAAoPA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,8PAA8P,CAAC,CAAC,CAAC,CAAC,EAAesB,EAAwBxB,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,YAAyBE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,iNAAiN,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,YAAyBE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,kNAAkN,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,aAA0BE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,0LAA0L,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,UAAuBE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,oOAAoO,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeuB,EAAwBvB,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,8JAA8J,CAAC,CAAC,CAAC,EAAewB,EAAwBxB,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,MAAM,CAAC,uBAAuB,KAAK,EAAE,SAAS,CAAC,8BAA2CE,EAAE,KAAK,CAAC,CAAC,EAAE,0BAAuCA,EAAE,KAAK,CAAC,CAAC,EAAE,2BAAwCA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeyB,EAAwBzB,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,MAAM,CAAC,uBAAuB,KAAK,EAAE,SAAS,CAAC,gCAA6CE,EAAE,KAAK,CAAC,CAAC,EAAE,oCAAiDA,EAAE,KAAK,CAAC,CAAC,EAAE,mCAAgDA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe0B,EAAwB1B,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,0RAAuSA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,8QAA2RA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,mSAAmS,CAAC,CAAC,CAAC,CAAC,EAAe2B,EAAwB7B,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,UAAuBE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,wQAAwQ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,aAA0BE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,2RAA2R,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,gBAA6BE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,kPAAkP,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe4B,EAAwB5B,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,uIAAuI,CAAC,CAAC,CAAC,EAAe6B,EAAwB7B,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,MAAM,CAAC,uBAAuB,KAAK,EAAE,SAAS,CAAC,0BAAuCE,EAAE,KAAK,CAAC,CAAC,EAAE,iCAA8CA,EAAE,KAAK,CAAC,CAAC,EAAE,wBAAqCA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe8B,EAAwB9B,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,MAAM,CAAC,uBAAuB,KAAK,EAAE,SAAS,CAAC,+BAA4CE,EAAE,KAAK,CAAC,CAAC,EAAE,6BAA0CA,EAAE,KAAK,CAAC,CAAC,EAAE,8BAA2CA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe+B,EAAwB/B,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,6NAA0OA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,iMAA8MA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,0PAA0P,CAAC,CAAC,CAAC,CAAC,EAAegC,EAAwBlC,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,aAA0BE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,wNAAwN,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,YAAyBE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,4TAA4T,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,gBAA6BE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,uNAAuN,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,OAAoBE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,2OAA2O,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeiC,EAAwBjC,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,kJAAkJ,CAAC,CAAC,CAAC,EAAekC,EAAwBpC,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,MAAM,CAAC,uBAAuB,KAAK,EAAE,SAAS,CAAC,kCAA+CE,EAAE,KAAK,CAAC,CAAC,EAAE,mCAAgDA,EAAE,KAAK,CAAC,CAAC,EAAE,qCAAqC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAemC,EAAwBrC,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,MAAM,CAAC,uBAAuB,KAAK,EAAE,SAAS,CAAC,iCAA8CE,EAAE,KAAK,CAAC,CAAC,EAAE,sCAAmDA,EAAE,KAAK,CAAC,CAAC,EAAE,gCAAgC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeoC,EAAwBpC,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,qQAAkRA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,mPAAgQA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,mPAAmP,CAAC,CAAC,CAAC,CAAC,EAAeqC,EAAwBrC,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,wBAAqCE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,kPAA+PA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeF,EAAE,SAAS,CAAC,SAAS,CAAC,aAA0BE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,sMAAsM,CAAC,CAAC,CAAC,CAAC,EAAesC,EAAwBtC,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAeuC,EAAwBvC,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,0HAA0H,CAAC,CAAC,CAAC,EAAewC,EAAwB1C,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,MAAM,CAAC,uBAAuB,KAAK,EAAE,SAAS,CAAC,yBAAsCE,EAAE,KAAK,CAAC,CAAC,EAAE,2BAAwCA,EAAE,KAAK,CAAC,CAAC,EAAE,6BAA6B,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeyC,EAAwB3C,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,MAAM,CAAC,uBAAuB,KAAK,EAAE,SAAS,CAAC,6BAA0CE,EAAE,KAAK,CAAC,CAAC,EAAE,8BAA2CA,EAAE,KAAK,CAAC,CAAC,EAAE,8BAA8B,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe0C,EAAwB1C,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,6PAA0QA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,2QAAwRA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,8QAA2RA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,gQAAgQ,CAAC,CAAC,CAAC,CAAC,EAAe2C,EAAwB7C,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,YAAyBE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,mOAAmO,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,MAAmBE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,sRAAmSA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeF,EAAE,SAAS,CAAC,SAAS,CAAC,UAAuBE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,iRAAiR,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,gBAA6BE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,kOAAkO,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe4C,EAAwB5C,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,yCAAyC,CAAC,CAAC,CAAC,EAAe6C,EAAwB7C,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,SAAS,CAAC,sBAAmCE,EAAE,SAAS,CAAC,SAAS,kCAAkC,CAAC,EAAE,gGAAgG,CAAC,CAAC,CAAC,CAAC,EAAe8C,GAAwB9C,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,MAAM,CAAC,uBAAuB,KAAK,EAAE,SAAS,CAAC,4BAAyCE,EAAE,KAAK,CAAC,CAAC,EAAE,gCAA6CA,EAAE,KAAK,CAAC,CAAC,EAAE,0BAAuCA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe+C,GAAwB/C,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,MAAM,CAAC,uBAAuB,KAAK,EAAE,SAAS,CAAC,4BAAyCE,EAAE,KAAK,CAAC,CAAC,EAAE,+BAA4CA,EAAE,KAAK,CAAC,CAAC,EAAE,8BAA2CA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAegD,GAAwBhD,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,wPAAqQA,EAAE,KAAK,CAAC,CAAC,EAAeF,EAAE,SAAS,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,CAAC,EAAE,kCAAkC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,6PAA0QA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,gSAAgS,CAAC,CAAC,CAAC,CAAC,EAAeiD,GAAwBnD,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,UAAuBE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,mPAAmP,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,aAA0BE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,uQAAuQ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,UAAuBE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,iTAAiT,CAAC,CAAC,CAAC,CAAC,CAAC,EAAekD,GAAwBlD,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,SAAS,CAAC,wDAAqEE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,qCAAkDA,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,sBAAmCA,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,EAAE,gEAAgE,CAAC,CAAC,CAAC,CAAC,EAAemD,GAAwBnD,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,MAAM,CAAC,uBAAuB,KAAK,EAAE,SAAS,CAAC,uCAAoDE,EAAE,KAAK,CAAC,CAAC,EAAE,0CAAuDA,EAAE,KAAK,CAAC,CAAC,EAAE,qCAAkDA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeoD,GAAwBpD,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,MAAM,CAAC,uBAAuB,KAAK,EAAE,SAAS,CAAC,iCAA8CE,EAAE,KAAK,CAAC,CAAC,EAAE,uCAAoDA,EAAE,KAAK,CAAC,CAAC,EAAE,4CAAyDA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeqD,GAAwBrD,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,SAAS,CAAC,0CAAuDE,EAAE,KAAK,CAAC,CAAC,EAAE,+SAA4TA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,+YAA4ZA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,yBAAsCA,EAAE,KAAK,CAAC,CAAC,EAAE,oUAAoU,CAAC,CAAC,CAAC,CAAC,EAAesD,GAAwBxD,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,iBAA8BE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,wSAAwS,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,uQAAuQ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,QAAqBE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,8QAA8Q,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeuD,GAAwBvD,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,EAAewD,GAAwBxD,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,SAAS,CAAC,OAAoBE,EAAE,SAAS,CAAC,SAAS,+CAA+C,CAAC,EAAE,yPAAyP,CAAC,CAAC,CAAC,CAAC,EAAeyD,GAAwBzD,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,MAAM,CAAC,uBAAuB,KAAK,EAAE,SAAS,CAAC,8BAA2CE,EAAE,KAAK,CAAC,CAAC,EAAE,+BAA4CA,EAAE,KAAK,CAAC,CAAC,EAAE,iCAA8CA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe0D,GAAwB5D,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,kCAA+CE,EAAE,KAAK,CAAC,CAAC,EAAE,4BAAyCA,EAAE,KAAK,CAAC,CAAC,EAAE,8BAA2CA,EAAE,KAAK,CAAC,CAAC,EAAE,4BAAyCA,EAAE,KAAK,CAAC,CAAC,EAAE,mCAAgDA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe2D,GAAwB3D,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,6RAA0SA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,wSAAqTA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,mSAAgTA,EAAE,KAAK,CAAC,CAAC,EAAeF,EAAE,SAAS,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,CAAC,EAAE,yCAAyC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,6PAA0QA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,kRAAkR,CAAC,CAAC,CAAC,CAAC,EAAe4D,GAAwB9D,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,aAA0BE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,gPAAgP,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,UAAuBE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,gQAAgQ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,iBAA8BE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,6SAA6S,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe6D,GAAwB7D,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,iCAAiC,CAAC,CAAC,CAAC,EAAe8D,GAAwB9D,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,0JAA0J,CAAC,CAAC,CAAC,EAAe+D,GAAwBjE,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,MAAM,CAAC,uBAAuB,KAAK,EAAE,SAAS,CAAC,sCAAmDE,EAAE,KAAK,CAAC,CAAC,EAAE,uCAAoDA,EAAE,KAAK,CAAC,CAAC,EAAE,2CAA2C,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAegE,GAAwBlE,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,MAAM,CAAC,uBAAuB,KAAK,EAAE,SAAS,CAAC,oCAAiDE,EAAE,KAAK,CAAC,CAAC,EAAE,yCAAsDA,EAAE,KAAK,CAAC,CAAC,EAAE,gCAAgC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeiE,GAAwBjE,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,qOAAkPA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,8NAA2OA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,uMAAuM,CAAC,CAAC,CAAC,CAAC,EAAekE,GAAwBpE,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,kBAA+BE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,kPAAkP,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAC,aAA0BE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,2OAA2O,CAAC,CAAC,CAAC,CAAC,CAAC,EACt+4CmE,GAAqB,CAAC,QAAU,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,SAAW,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,mBAAqB,CAAC,KAAO,UAAU,CAAC,CAAC",
  "names": ["richText", "u", "x", "p", "richText1", "richText2", "richText3", "richText4", "richText5", "richText6", "richText7", "richText8", "richText9", "richText10", "richText11", "richText12", "richText13", "richText14", "richText15", "richText16", "richText17", "richText18", "richText19", "richText20", "richText21", "richText22", "richText23", "richText24", "richText25", "richText26", "richText27", "richText28", "richText29", "richText30", "richText31", "richText32", "richText33", "richText34", "richText35", "richText36", "richText37", "richText38", "richText39", "richText40", "richText41", "richText42", "richText43", "richText44", "richText45", "richText46", "richText47", "richText48", "richText49", "richText50", "richText51", "richText52", "richText53", "richText54", "richText55", "richText56", "richText57", "richText58", "richText59", "richText60", "richText61", "richText62", "richText63", "richText64", "richText65", "richText66", "__FramerMetadata__"]
}
