{"version":3,"file":"WJBZI1Ghk-105.CzHQR4UX.mjs","names":["o","a","n","r"],"sources":["https:/framerusercontent.com/modules/xkgOTPH3D819XQA1Lv94/eR4rSJ71QRKrSlJgE7Yy/WJBZI1Ghk-105.js"],"sourcesContent":["import{jsx as e,jsxs as t}from\"react/jsx-runtime\";import{ComponentPresetsConsumer as n,Link as o}from\"framer\";import{motion as a}from\"framer-motion\";import*as i from\"react\";import r from\"https://framerusercontent.com/modules/pVk4QsoHxASnVtUBp6jr/HTBsNkEMAb7TUGaO3DBy/CodeBlock.js\";export const richText=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"So, are you looking to obtain a certification in the cybersecurity world, but you don't know where to start? Don't worry, here is everything you should know about the most important certifications in the field. In this post, we will take a look at almost every certification Fluid Attacks' members have acquired. So, what we are about to tell you is based on our experience too.\"}),/*#__PURE__*/e(\"p\",{children:\"Let's start with some preliminary clarifications for this and subsequent posts related to certifications. We have decided to group the certificates according to their level of difficulty. Of course, the difficulty of the tests that must be passed to obtain each certificate can only be determined by the persons who have submitted them. However, we have considered it worthwhile to give a level within the following scale: beginner, intermediate and advanced (and the intermediates that we can identify in the middle of that spectrum).\"}),/*#__PURE__*/e(\"img\",{alt:\"Logo CompTIA Security+\",className:\"framer-image\",height:\"250\",src:\"https://framerusercontent.com/images/m8jQWvx58yA4X7EHRFTOxLz56j0.png\",srcSet:\"https://framerusercontent.com/images/m8jQWvx58yA4X7EHRFTOxLz56j0.png?scale-down-to=512 512w,https://framerusercontent.com/images/m8jQWvx58yA4X7EHRFTOxLz56j0.png?scale-down-to=1024 1024w,https://framerusercontent.com/images/m8jQWvx58yA4X7EHRFTOxLz56j0.png 1920w\",style:{aspectRatio:\"1920 / 500\"},width:\"960\"}),/*#__PURE__*/t(\"h6\",{children:[\"Logo by \",/*#__PURE__*/e(o,{href:\"https://www.lcpe.org.uk/courses/comptia-security-certification/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"London College of Professional Education\"})}),\".\"]})]});export const richText1=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"h2\",{children:\"CompTIA Security+\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(o,{href:\"https://www.comptia.org/certifications/security\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Granted by CompTIA\"})}),\". It’s a \",/*#__PURE__*/e(\"strong\",{children:\"beginner\"}),\" exam.\",/*#__PURE__*/e(\"br\",{}),'It is designed for novice candidates who want to \"',/*#__PURE__*/e(o,{href:\"https://www.comptia.org/faq/security/what-is-on-the-comptia-security-exam\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"pursue an IT security career\"})}),'.\" As its main page says, obtaining the certificate validates that the candidate has the necessary base \"to perform core security functions.\" In addition to being introductory, it is a ',/*#__PURE__*/e(\"strong\",{children:\"mandatory certificate\"}),' to fulfill the \"',/*#__PURE__*/e(o,{href:\"https://www.comptia.org/certifications/security\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"DoD 8570 compliance\"})}),'.\" The certificate ',/*#__PURE__*/e(\"strong\",{children:\"expires every three years\"}),\", which is why people with experience in this type of exam usually repeat it. It is a recommended exam to demonstrate essential cybersecurity knowledge. Each participant will be \",/*#__PURE__*/e(o,{href:\"https://www.isc2.org/articles/SSCP-vs-SecurityPlus-Compare-Cybersecurity-Certifications\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"asked to\"})}),' \"perform basic security tasks, including configuring, managing and troubleshooting networks.\" Threat identification skills, pentesting and intrusion detections are fundamental in obtaining this certification. The exam lasts ninety minutes and is based on multiple choice and performance-based activities.']}),/*#__PURE__*/e(\"h2\",{children:\"Certified Ethical Hacker (CEH)\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(o,{href:\"https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Granted by EC-Council\"})}),\". Another \",/*#__PURE__*/e(\"strong\",{children:\"beginner\"}),\" certificate.\",/*#__PURE__*/e(\"br\",{}),\"It is perfect for people who want to make their way into penetration exams. The preparation level that a candidate must have is practically the same as that required to achieve CompTIA Security+. However, unlike the latter, it is not based on multiple-choice questions but has practical tests. In this sense, it is expected that the tester can put into practice technical skills and not only theoretical. Unlike Security+, CEH holders attempt to attack systems with the ultimate purpose of anticipating cybercriminal attacks and fixing those security breaches. Another difference between Security+ and CEH is that you have two options to take the second exam. You \",/*#__PURE__*/e(\"strong\",{children:\"can take the course\"}),\" before submitting the exam, or you can \",/*#__PURE__*/e(\"strong\",{children:\"demonstrate two years\"}),\" of experience. If you don’t have that experience and don’t want to take the course, you should consider Security+ first.\"]}),/*#__PURE__*/t(\"p\",{children:['In this sense, it could be considered that CEH is slightly more complex than Security+ since it asks for experience or preparation that the other does not. In addition, it could be regarded as a much more specialized certification as people interested in obtaining it must be professionals working in ethical hacking. Security+ is, in this respect, much more general, as it \"',/*#__PURE__*/e(o,{href:\"https://blog.netwrix.com/2019/04/04/comptia-security-vs-sscp-cissp-gsec-ccna-ceh/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"provides a broad base of knowledge suitable to multiple environments\"})}),'.\" ',/*#__PURE__*/e(\"strong\",{children:\"Both must be renewed three years after being issued\"}),\".\"]}),/*#__PURE__*/e(\"h2\",{children:\"Certified DevSecOps Professional (CDP)\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(o,{href:\"https://www.practical-devsecops.com/certified-devsecops-professional/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Granted by Practical DevSecOps\"})}),\".\",/*#__PURE__*/e(\"br\",{}),\"It is a beginner-intermediate certification. If most certificates are focused on pentesters who want to be part of \",/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/blog/red-team-exercise/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"a red team\"})}),\", the CDP is designed for developers to strengthen their techniques, especially those related with \",/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/blog/devsecops-concept/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Development Security Operations\"})}),\" (DevSecOps). The exam to obtain it \",/*#__PURE__*/e(o,{href:\"https://www.practical-devsecops.com/certified-devsecops-professional/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"requires\"})}),\" basic knowledge of Linux commands and an understanding of security practices such as those of \",/*#__PURE__*/e(o,{href:\"https://help.fluidattacks.com/portal/en/kb/articles/criteria-compliance-owasprisks/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"the OWASP Top 10\"})}),\". The exam lasts 12 hours. Upon completion, \",/*#__PURE__*/e(o,{href:\"https://medium.com/devops4me/review-study-guide-certified-devsecops-professional-cdp-be3cf8ae95e5\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"the candidates\"})}),' \"should be able to implement the real DevSecOps approach in the CI/CD pipeline and doing security tasks at scale.\"']}),/*#__PURE__*/e(\"h2\",{children:\"Offensive Security Certified Professional (OSCP)\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(o,{href:\"https://www.offensive-security.com/pwk-oscp/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Granted by Offensive Security\"})}),\".\",/*#__PURE__*/e(\"br\",{}),\"It is an \",/*#__PURE__*/e(\"strong\",{children:\"intermediate\"}),' level certification and is focused on practical skills. It certifies that the candidate \"',/*#__PURE__*/e(o,{href:\"https://resources.infosecinstitute.com/topic/top-5-penetration-testing-certifications-security-professionals/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"demonstrates a comprehensive mastery and practical understanding of pentesting\"})}),'.\" To obtain it, you must pass a completely hands-on exam. In order to achieve it, it is ',/*#__PURE__*/e(\"strong\",{children:\"mandatory\"}),\" to take the Penetration Testing \",/*#__PURE__*/e(o,{href:\"https://www.offensive-security.com/pwk-oscp/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"with Kali Linux (PWK/PEN-200) course\"})}),\". It is designed for people who want to strengthen their skills as pentesters. In this sense, it is recommended to take it after having obtained the CEH. The exam takes 24 hours of practice tests and 24 hours of writing a report. That makes it a good candidate for those interested in being prepared before submitting the longest and most difficult exams. Those usually last 48 hours.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Certified Red Team Professional (CRTP)\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(o,{href:\"hhttps://www.pentesteracademy.com/activedirectorylab\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Granted by Pentester Academy\"})}),\".\",/*#__PURE__*/e(\"br\",{}),\"It is an \",/*#__PURE__*/e(\"strong\",{children:\"intermediate\"}),\" level certification. In fact, the CRTP is very close to the OSCP in the level of complexity. To obtain it, candidates must do an intermediate-level exam that \",/*#__PURE__*/e(o,{href:\"https://nileshsapariya.blogspot.com/2020/07/certified-red-team-professional-crtp.html\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"requires\"})}),' to \"compromise several machines in a fully patched environment and produce a well thought out report including mitigations.\" This test lasts 24 hours, followed by 48 hours available to write a report on what has been done. As required by the OSCP, this certificate is entirely hands-on and focuses on assessing security on ',/*#__PURE__*/e(o,{href:\"https://www.quest.com/solutions/active-directory/what-is-active-directory.aspx\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Active Directory\"})}),\". Like Security+ and CEH, it is an exam that \",/*#__PURE__*/e(\"strong\",{children:\"expires after three years\"}),\". With the OSCP and CEH, CRTP is considered the last certification of the triad needed to start a career within a red team.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Offensive Security Wireless Attacks (OSWP)\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(o,{href:\"https://www.offensive-security.com/wifu-oswp/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Granted by Offensive Security\"})}),\".\",/*#__PURE__*/e(\"br\",{}),\"It is a \",/*#__PURE__*/e(\"strong\",{children:\"beginner-intermediate\"}),\" exam. It is usually accomplished after the CEH and is designed for people who want to consolidate their careers as security analysts or network administrators. It is an exam that begins with \",/*#__PURE__*/e(o,{href:\"https://medium.com/@obikag/my-wifu-journey-oswp-certification-review-a1784730449c\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"lots of information\"})}),\" and reports of \",/*#__PURE__*/e(o,{href:\"https://thomfre.dev/my-oswp-experience\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"theoretical training\"})}),\". The exam focuses on auditing and testing the security of wireless devices. This makes it different from other certifications we have reviewed because it is the only one focused on wireless. Here testers will identify vulnerabilities in those systems and exploit them for attacks. The exam is limited to \",/*#__PURE__*/e(\"strong\",{children:\"four hours\"}),\" and verifies practical skills.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Certified Red Team Expert (CRTE)\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(o,{href:\"https://www.pentesteracademy.com/redteamlab\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Granted by Pentester Academy\"})}),\".\",/*#__PURE__*/e(\"br\",{}),\"In a past blog post, \",/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/blog/new-red-team-expert/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"we interviewed Daniel Yepes\"})}),\" about his experience obtaining this certificate. It is an \",/*#__PURE__*/e(\"strong\",{children:\"intermediate-advanced\"}),' certificate. It usually follows the OSCP, so it is common for them to be compared. If the OSCP gave you the fundamental tools to become a pentester, the CRTE takes that and gets you to the next level. It is usually considered a \"',/*#__PURE__*/e(o,{href:\"https://www.linkedin.com/pulse/oscp-crte-which-one-should-you-take-valentin-giraud\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"more realistic\"})}),'\" test for keeping up with what a true pentester would do in his day-to-day life. Similar to the CRTP, the CRTE is focused on Active Directory infrastructure networks. In this sense, both (CRTP and CRTE) differ from the OSCP because they can give a more general look at how to exploit vulnerabilities. The examination is 24 hours in length plus 24 hours to the writing exam.']}),/*#__PURE__*/e(\"img\",{alt:\"Logo by Pentester Academy\",className:\"framer-image\",height:\"253\",src:\"https://framerusercontent.com/images/Zwzx1VDbSydOMgV3pF1kYu5pXgE.png\",srcSet:\"https://framerusercontent.com/images/Zwzx1VDbSydOMgV3pF1kYu5pXgE.png?scale-down-to=512 512w,https://framerusercontent.com/images/Zwzx1VDbSydOMgV3pF1kYu5pXgE.png?scale-down-to=1024 1024w,https://framerusercontent.com/images/Zwzx1VDbSydOMgV3pF1kYu5pXgE.png 1920w\",style:{aspectRatio:\"1920 / 506\"},width:\"960\"}),/*#__PURE__*/t(\"h6\",{children:[\"Logo by \",/*#__PURE__*/e(o,{href:\"https://twitter.com/SecurityTube/status/1193756503179714560/photo/1\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Pentester Academy\"})}),\".\"]}),/*#__PURE__*/t(\"p\",{children:[\"Let’s stop here for today. Until now, we have reviewed almost every beginner or intermediate certification we have gotten. In the next post, we will take a look at the most advanced certifications. Hopefully, we will be continuing to accomplish more \",/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/certifications/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"certificates\"})}),\" because we in Fluid Attacks are committed to constantly improving our red team.\"]}),/*#__PURE__*/t(\"p\",{children:[\"At Fluid Attacks, we specialize in cybersecurity through \",/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/solutions/penetration-testing-as-a-service/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"pentesting\"})}),\" or ethical hacking. For more information, don’t hesitate to \",/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/contact-us/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"contact us!\"})})]}),/*#__PURE__*/t(\"p\",{children:[\"_____\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"⚠️ \",/*#__PURE__*/e(\"strong\",{children:\" \"}),/*#__PURE__*/e(\"em\",{children:/*#__PURE__*/e(\"strong\",{children:\"Update Feb 6, 2024: We have posted our \"})}),/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/blog/top-10-hacking-certifications/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"em\",{children:/*#__PURE__*/e(\"strong\",{children:\"top 10 hardest ethical hacking certifications\"})})})}),/*#__PURE__*/e(\"em\",{children:/*#__PURE__*/t(\"strong\",{children:[\", so you choose the next one you will earn and even trace a path to help your career.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{})]})}),\"_____\"]})]});export const richText2=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"May of this year marked the third anniversary of one of the most important legislative implementations of the last decade: \",/*#__PURE__*/e(\"strong\",{children:\"The General Data Protection Regulation\"}),\" (\",/*#__PURE__*/e(\"strong\",{children:\"GDPR\"}),\"). In Fluid Attacks, we have talked a little about \",/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/compliance/gdpr/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"what GDPR is\"})}),\", but today we want to dedicate a particular blog post to talk about what it has achieved, why it is essential and, above all, how it has affected you directly.\"]}),/*#__PURE__*/e(\"img\",{alt:\"GDPR\",className:\"framer-image\",height:\"350\",src:\"https://framerusercontent.com/images/savWUfyjHuZeXnWw4EvG8K3Grjc.png\",srcSet:\"https://framerusercontent.com/images/savWUfyjHuZeXnWw4EvG8K3Grjc.png?scale-down-to=512 512w,https://framerusercontent.com/images/savWUfyjHuZeXnWw4EvG8K3Grjc.png?scale-down-to=1024 1024w,https://framerusercontent.com/images/savWUfyjHuZeXnWw4EvG8K3Grjc.png 1920w\",style:{aspectRatio:\"1920 / 700\"},width:\"960\"}),/*#__PURE__*/t(\"h6\",{children:[\"Figure by \",/*#__PURE__*/e(o,{href:\"https://www.snel.com/what-is-gpdr/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"SNEL\"})}),\".\"]})]});export const richText3=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"h2\",{children:\"What is the GDPR?\"}),/*#__PURE__*/t(\"p\",{children:[\"The \",/*#__PURE__*/e(o,{href:\"https://youtu.be/ilLEdbfzw-Ihttps://youtu.be/ilLEdbfzw-I\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"GDPR\"})}),' \"is the backbone of the EU’s data protection and privacy legislation.\" Its main objective is to strengthen privacy laws across the European Union to fit the digital age. This legislation updated and unified data privacy laws, by replacing the 1995 EU Data Protection Directive, a policy designed for the last millennium.']}),/*#__PURE__*/t(\"p\",{children:[\"The law was published in the European Parliament \",/*#__PURE__*/e(o,{href:\"https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"legislative act 679\"})}),' on 27 April 2016. Its main premise is that \"the protection of natural persons in relation to the processing of personal data is a fundamental right.\" Before its creation, the running data protection standard law was the 1995 EU Data Protection Directive. Rules established there did not have a global or general range, but they must be “ ',/*#__PURE__*/e(o,{href:\"https://www.virtual-college.co.uk/resources/the-differences-between-gdpr-and-data-protection\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"implemented through national legislation\"})}),\".” Previously, personal information management legislation was not standardized, though there were some guidelines. Before the 2000s, personal information used to be stored on massive shelves full of documents. Today most of that information is digital. Therefore, it is urgent to establish rules of the game for large companies that privately store data.\"]}),/*#__PURE__*/t(\"p\",{children:[\"As we shared in our \",/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/compliance/gdpr/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"GDPR Compliance section\"})}),\", this policy was approved by the European Parliament on 14 April 2016 and went into effect \",/*#__PURE__*/e(o,{href:\"https://whatis.techtarget.com/definition/General-Data-Protection-Regulation-GDPR\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"on 25 May 2018\"})}),\". Almost the entire approach revolves around a set of rules \",/*#__PURE__*/e(o,{href:\"https://youtu.be/ilLEdbfzw-I\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"designed to protect personal\"})}),\" information from unnecessary risks by specifying how companies should store, handle and share such data. It was approved by the European Union (EU) and the European Economic Area (EEA). The \",/*#__PURE__*/e(o,{href:\"https://youtu.be/ilLEdbfzw-I\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"regulation applies\"})}),\" to companies that have operations in the EU and that process personal data. Besides, it doesn’t matter if the holding company activities take place in the Union or not. Any company in the world with customers or employees in the EU must comply with GDPR.\"]}),/*#__PURE__*/t(\"p\",{children:[\"GDPR requires organizations to understand better what data their businesses have and how it is stored. In another blog post, we talked about this when we explained the controversy over the opening of the \",/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/blog/apple-data-center-china/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Apple Data Center in Guizhou\"})}),\", China. The point is that this \",/*#__PURE__*/e(o,{href:\"https://youtu.be/ilLEdbfzw-I\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"increased understanding\"})}),\" proactively helps streamline detection and response in the event of a costly security incident (like a data breach). Of course, beyond the legal need to comply with the standards called for by the GDPR, there is a necessity to make companies safer from cybersecurity breaches.\"]}),/*#__PURE__*/e(\"h2\",{children:\"GDPR compliance\"}),/*#__PURE__*/t(\"p\",{children:['A company committed to GDPR compliance proactively identifies vulnerabilities and prepares autonomously to validate the security of their trade of personal data. One of the ways in which companies would fulfil the GDPR’s privacy requirements would be by reducing the amount of unneeded information. In this sense, companies \"',/*#__PURE__*/e(o,{href:\"https://youtu.be/ilLEdbfzw-I\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"shouldn’t hold data they don’t need for longer than they need\"})}),'.\" This strengthens the company’s security and reduces storage costs, as there is less data to store.']}),/*#__PURE__*/t(\"p\",{children:[\"Along with these commitments, \",/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/compliance/gdpr/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"the company must\"})}),\" (a) identify personal data and evaluate their access permission, (b) corroborate that they are asking for explicit consent to use others information, and (c) be sure to process data following legal support. Besides, they must strengthen security, reduce risks of attacks, and transmit trust. One such situation is the regulation of passwords. Nowhere in the document is a rule that explains what kind of security filters a password should have.\"]}),/*#__PURE__*/t(\"p\",{children:[\"However, that doesn’t mean it’s a minor issue or that you can’t establish a rule of your own that is in line with what the GDPR requires. \",/*#__PURE__*/e(o,{href:\"https://thehackernews.com/2021/06/strengthen-your-password-policy-with.html\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"The Hacker News\"})}),', for example, recently published a list of recommendations that should be considered \"to create a GDPR compliant password policy.\" Their most important recommendations are (a) avoid secret questions, (b) consider implementing multi-factor authentication (MFA), and (c) \"use a 3-rd party tool to help your password policy reach your entire end-user directory.\"']}),/*#__PURE__*/e(\"h2\",{children:\"Fluid Attacks's GDPR compliance\"}),/*#__PURE__*/t(\"p\",{children:[\"For example, we at Fluid Attacks use \",/*#__PURE__*/e(o,{href:\"https://help.fluidattacks.com/portal/en/kb/articles/stack-okta/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Okta\"})}),\" as our identity management platform. It allows us to give access to applications without disclosing credentials and maintaining the least privileged approach. It is a very comprehensive tool because it supports MFA by using a one-time password (\",/*#__PURE__*/e(\"strong\",{children:\"OTP\"}),\"). Every half minute, it generates a new OTP. You can also send push notifications to your trusted device (usually your phone) through its Okta Verify app. Finally, because you must use your phone to sign in to the Okta Verify app, it enforces biometric MFA for both face and fingerprint (if the device supports it).\"]}),/*#__PURE__*/e(\"p\",{children:\"At Fluid Attacks, we recognize the difficulty many companies have to be up-to-date with every standard. It is not because they don’t want to be updated, but because those standards are always evolving and adapting to new day’s challenges. That’s why, when we offer security alternatives, we always offer services to determine if your company complies with this type of security requirements. To achieve this, not only do we care to fully understand the core points of standards such as GDPR, but we strive to disseminate them and explain them to our customers, and to the general public.\"}),/*#__PURE__*/e(\"img\",{alt:\"GDPR personal data\",className:\"framer-image\",height:\"540\",src:\"https://framerusercontent.com/images/FUy0M797WYXEt3nnAUpZ1mj3wg.png\",srcSet:\"https://framerusercontent.com/images/FUy0M797WYXEt3nnAUpZ1mj3wg.png?scale-down-to=512 512w,https://framerusercontent.com/images/FUy0M797WYXEt3nnAUpZ1mj3wg.png?scale-down-to=1024 1024w,https://framerusercontent.com/images/FUy0M797WYXEt3nnAUpZ1mj3wg.png 1920w\",style:{aspectRatio:\"1920 / 1080\"},width:\"960\"}),/*#__PURE__*/t(\"h6\",{children:[\"Figure by \",/*#__PURE__*/e(o,{href:\"https://searchdatamanagement.techtarget.com/answer/What-is-included-in-the-GDPR-definition-of-personal-data\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"TechTarget\"})}),\".\"]}),/*#__PURE__*/e(\"h2\",{children:\"Problems with GDPR?\"}),/*#__PURE__*/t(\"p\",{children:[\"Finally, it should be noted that GDPR \",/*#__PURE__*/e(\"strong\",{children:\"has not been exempt from controversy\"}),\". On 1 July, Johannes Caspar, a leading German regulator who worked for more than ten years at the helm of the Hamburg data protection commission, \",/*#__PURE__*/e(o,{href:\"https://www.cpomagazine.com/data-protection/outgoing-privacy-commissioner-calls-gdpr-broken-says-that-basic-model-cant-work/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"stepped down\"})}),\". His disillusionment with the EU’s General Data Protection Regulation stemmed from the fact that the policies allow, precisely, security weaknesses and flaws.\"]}),/*#__PURE__*/e(\"p\",{children:\"In a Bloomberg report, Caspar said:\"}),/*#__PURE__*/e(\"blockquote\",{children:/*#__PURE__*/e(\"p\",{children:\"The basic model of the procedure set up by GDPR has massive flaws and it just can't work. You can't accept this in the long term. The problem is what use are these laws to the people if they're not being applied?\"})}),/*#__PURE__*/t(\"p\",{children:[\"His criticism is based in two situations. First, companies that did not comply with GDPR policies had been estimated to have penalties. These were set out in \",/*#__PURE__*/e(o,{href:\"https://gdpr-info.eu/art-83-gdpr/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"article 83 (5)\"})}),'. It states that infringements shall be subject to administrative purposes “up to 4% of the total worldwide annual turnover.\" But to date, no company has come close to paying that penalty. Second, GDPR gives regulators ',/*#__PURE__*/e(o,{href:\"https://www.bloomberg.com/news/articles/2021-06-25/eu-s-broken-gdpr-needs-fixing-departing-privacy-chief-warns\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"lots of room for interpretation\"})}),'\" of the rules. Which makes it onerous to verify law enforcement.']}),/*#__PURE__*/e(\"p\",{children:\"Precisely, to fulfill the GDPR purpose, a change in the appropriation of individuals and companies of these policies is required. They should not be seen as an imposition but as guidelines to preserve data security and privacy. That is why you should take GDPR seriously as a guide to strengthen your security and save money.\"}),/*#__PURE__*/t(\"p\",{children:[\"At Fluid Attacks, we are specialized in cybersecurity through \",/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/solutions/penetration-testing-as-a-service/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"pentesting\"})}),\" or ethical hacking. For more information, don’t hesitate to \",/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/contact-us/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"contact us!\"})})]})]});export const richText4=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"Most of us have faced \",/*#__PURE__*/e(\"code\",{children:\"AMSI\"}),\" (Antimalware Scan Interface) and suffered the constraints it poses whenever we want to load a fancy PowerShell module like \",/*#__PURE__*/e(o,{href:\"https://github.com/PowerShellMafia/PowerSploit/tree/master/Recon\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"PowerView\"})}),\" or \",/*#__PURE__*/e(o,{href:\"https://github.com/PowerShellMafia/PowerSploit/tree/master/Exfiltration\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Invoke-Mimikatz\"})}),\" in the middle of a \",/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/blog/red-team-exercise/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Red Team engagement\"})}),\".\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"code\",{children:\"AMSI\"}),\" is a programmatic resource offered by Microsoft to enable an interface to any application for interacting with any anti-malware product available on the machine. \",/*#__PURE__*/e(\"code\",{children:\"AMSI\"}),\" is EDR-agnostic and can be integrated with any vendor. When \",/*#__PURE__*/e(\"code\",{children:\"AMSI\"}),\" appears on stage, something like this should be familiar:\"]}),/*#__PURE__*/e(\"img\",{alt:\"AMSI on stage\",className:\"framer-image\",height:\"255\",src:\"https://framerusercontent.com/images/M3DBgOKo5OkJ9AeTmjRBjLYnQ.png\",srcSet:\"https://framerusercontent.com/images/M3DBgOKo5OkJ9AeTmjRBjLYnQ.png?scale-down-to=512 512w,https://framerusercontent.com/images/M3DBgOKo5OkJ9AeTmjRBjLYnQ.png?scale-down-to=1024 1024w,https://framerusercontent.com/images/M3DBgOKo5OkJ9AeTmjRBjLYnQ.png 1920w\",style:{aspectRatio:\"1920 / 511\"},width:\"960\"})]});export const richText5=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"Programmatically, \",/*#__PURE__*/e(\"code\",{children:\"AMSI\"}),\" can be included in an application using \",/*#__PURE__*/e(o,{href:\"https://docs.microsoft.com/en-us/windows/win32/amsi/antimalware-scan-interface-functions\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Win32 API\"})}),\" functions and the \",/*#__PURE__*/e(\"code\",{children:\"IAmsiStream\"}),\" \",/*#__PURE__*/e(\"code\",{children:\"COM\"}),\" \",/*#__PURE__*/e(o,{href:\"https://docs.microsoft.com/en-us/windows/win32/api/amsi/nn-amsi-iamsistream\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"interface\"})}),\".\"]}),/*#__PURE__*/t(\"p\",{children:[\"As a result, if an application was built with \",/*#__PURE__*/e(\"code\",{children:\"AMSI\"}),\", \",/*#__PURE__*/e(\"code\",{children:\"amsi.dll\"}),\" will become part of the runtime modules of the application. Hence, it is seen as a \",/*#__PURE__*/e(\"code\",{children:\"DLL\"}),\" that is loaded at runtime when the application starts. The basic architecture of \",/*#__PURE__*/e(\"code\",{children:\"AMSI\"}),\" is the following:\"]}),/*#__PURE__*/e(\"img\",{alt:\"AMSI architecture\",className:\"framer-image\",height:\"321\",src:\"https://framerusercontent.com/images/arp8f1T6G8QFScMXhkDE7C0PpFU.png\",srcSet:\"https://framerusercontent.com/images/arp8f1T6G8QFScMXhkDE7C0PpFU.png?scale-down-to=512 512w,https://framerusercontent.com/images/arp8f1T6G8QFScMXhkDE7C0PpFU.png?scale-down-to=1024 1024w,https://framerusercontent.com/images/arp8f1T6G8QFScMXhkDE7C0PpFU.png 1920w\",style:{aspectRatio:\"1920 / 643\"},width:\"960\"}),/*#__PURE__*/t(\"h6\",{children:[\"Source: \",/*#__PURE__*/e(o,{href:\"https://docs.microsoft.com/en-us/windows/win32/amsi/how-amsi-helps\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Microsoft\"})}),\".\"]}),/*#__PURE__*/t(\"p\",{children:[\"As you can see, the functions responsible for checking the content for malicious content are \",/*#__PURE__*/e(\"code\",{children:\"AmsiScanBuffer()\"}),\" and \",/*#__PURE__*/e(\"code\",{children:\"AmsiScanString()\"}),\". These functions act as the entry point that the application uses to send the suspected tainted input to the underlying antivirus software.\"]}),/*#__PURE__*/t(\"p\",{children:[\"Using a tool like \",/*#__PURE__*/e(o,{href:\"https://processhacker.sourceforge.io/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Process Hacker\"})}),\", it is possible to check the runtime modules on any process in the system. Checking the process of our PowerShell session, we can see the \",/*#__PURE__*/e(\"code\",{children:\"AMSI\"}),\" \",/*#__PURE__*/e(\"code\",{children:\"DLL\"}),\" loaded in memory:\"]}),/*#__PURE__*/e(\"img\",{alt:\"amsi.dll\",className:\"framer-image\",height:\"102\",src:\"https://framerusercontent.com/images/AJBFgj61X5Iy6qaWDBQfApo9Ls.webp\",srcSet:\"https://framerusercontent.com/images/AJBFgj61X5Iy6qaWDBQfApo9Ls.webp?scale-down-to=512 512w,https://framerusercontent.com/images/AJBFgj61X5Iy6qaWDBQfApo9Ls.webp 613w\",style:{aspectRatio:\"613 / 204\"},width:\"306\"}),/*#__PURE__*/t(\"p\",{children:[\"We can also check the exported symbols, which are the functions provided as the high-level interface with \",/*#__PURE__*/e(\"code\",{children:\"AMSI\"}),\". Here we can see all the exported functions that compose \",/*#__PURE__*/e(\"code\",{children:\"AMSI\"}),\", including \",/*#__PURE__*/e(\"code\",{children:\"AmsiScanBuffer()\"}),\" and \",/*#__PURE__*/e(\"code\",{children:\"AmsiScanString()\"}),\".\"]}),/*#__PURE__*/e(\"img\",{alt:\"AMSI exports\",className:\"framer-image\",height:\"181\",src:\"https://framerusercontent.com/images/HdsKGuoINJjHNuCx8dP2pEk0aIQ.png\",srcSet:\"https://framerusercontent.com/images/HdsKGuoINJjHNuCx8dP2pEk0aIQ.png?scale-down-to=512 512w,https://framerusercontent.com/images/HdsKGuoINJjHNuCx8dP2pEk0aIQ.png?scale-down-to=1024 1024w,https://framerusercontent.com/images/HdsKGuoINJjHNuCx8dP2pEk0aIQ.png 1276w\",style:{aspectRatio:\"1276 / 363\"},width:\"638\"}),/*#__PURE__*/t(\"p\",{children:[\"However, these two functions are not really different. In fact, \",/*#__PURE__*/e(\"code\",{children:\"AmsiScanString()\"}),\" is a small function which uses \",/*#__PURE__*/e(\"code\",{children:\"AmsiScanBuffer()\"}),\" underneath. This can be seen in WinDBG:\"]}),/*#__PURE__*/e(\"img\",{alt:\"AmsiScanString\",className:\"framer-image\",height:\"318\",src:\"https://framerusercontent.com/images/UAj6hfFLcrvdVtLsiwTPD2EXktE.webp\",srcSet:\"https://framerusercontent.com/images/UAj6hfFLcrvdVtLsiwTPD2EXktE.webp?scale-down-to=512 512w,https://framerusercontent.com/images/UAj6hfFLcrvdVtLsiwTPD2EXktE.webp?scale-down-to=1024 1024w,https://framerusercontent.com/images/UAj6hfFLcrvdVtLsiwTPD2EXktE.webp 1048w\",style:{aspectRatio:\"1048 / 636\"},width:\"524\"}),/*#__PURE__*/e(\"p\",{children:\"And with a disassembler:\"}),/*#__PURE__*/e(\"img\",{alt:\"AmsiScanString in disassembler\",className:\"framer-image\",height:\"522\",src:\"https://framerusercontent.com/images/uOzLsQUanDRyIV5sUXy7z1p2FA.webp\",srcSet:\"https://framerusercontent.com/images/uOzLsQUanDRyIV5sUXy7z1p2FA.webp?scale-down-to=512 512w,https://framerusercontent.com/images/uOzLsQUanDRyIV5sUXy7z1p2FA.webp?scale-down-to=1024 1024w,https://framerusercontent.com/images/uOzLsQUanDRyIV5sUXy7z1p2FA.webp 1117w\",style:{aspectRatio:\"1117 / 1045\"},width:\"558\"}),/*#__PURE__*/t(\"p\",{children:[\"So, if we can bypass the checks performed by \",/*#__PURE__*/e(\"code\",{children:\"AmsiScanBuffer()\"}),\", we can also bypass \",/*#__PURE__*/e(\"code\",{children:\"AmsiScanString()\"}),\"!\"]}),/*#__PURE__*/e(\"p\",{children:\"Let’s get it done!\"}),/*#__PURE__*/t(\"p\",{children:[\"Here, we can see the disassembly graph of \",/*#__PURE__*/e(\"code\",{children:\"AmsiScanBuffer()\"}),\":\"]}),/*#__PURE__*/e(\"img\",{alt:\"AmsiScanBuffer\",className:\"framer-image\",height:\"591\",src:\"https://framerusercontent.com/images/9cXUVBL9y1qh9a5GKWBCwGVOVWw.gif\",srcSet:\"https://framerusercontent.com/images/9cXUVBL9y1qh9a5GKWBCwGVOVWw.gif?scale-down-to=512 512w,https://framerusercontent.com/images/9cXUVBL9y1qh9a5GKWBCwGVOVWw.gif?scale-down-to=1024 1024w,https://framerusercontent.com/images/9cXUVBL9y1qh9a5GKWBCwGVOVWw.gif 1839w\",style:{aspectRatio:\"1839 / 1183\"},width:\"919\"}),/*#__PURE__*/e(\"p\",{children:\"As you can see, it is not a complex function either.\"}),/*#__PURE__*/e(\"p\",{children:\"At the end of the function, we can see this:\"}),/*#__PURE__*/e(\"img\",{alt:\"AmsiScanBuffer at the end\",className:\"framer-image\",height:\"527\",src:\"https://framerusercontent.com/images/Eb3vnagokLgj81oGu7KO5zJiI0.webp\",srcSet:\"https://framerusercontent.com/images/Eb3vnagokLgj81oGu7KO5zJiI0.webp?scale-down-to=512 512w,https://framerusercontent.com/images/Eb3vnagokLgj81oGu7KO5zJiI0.webp?scale-down-to=1024 1024w,https://framerusercontent.com/images/Eb3vnagokLgj81oGu7KO5zJiI0.webp 1654w\",style:{aspectRatio:\"1654 / 1054\"},width:\"827\"}),/*#__PURE__*/t(\"p\",{children:[\"It seems that the actual anti-malware scanning is performed in the instructions that compose the big box on the left. Also, we notice that several \",/*#__PURE__*/e(\"code\",{children:\"JMP\"}),\" instructions land in \",/*#__PURE__*/e(\"code\",{children:\"mov eax 0x800700057\"}),\" and then the function ends. The value \",/*#__PURE__*/e(\"code\",{children:\"0x80070057\"}),\" is a standardized error code from Microsoft, which is \",/*#__PURE__*/e(\"code\",{children:\"E_INVALIDARG\"}),\". In this case, it’s used by \",/*#__PURE__*/e(\"code\",{children:\"AmsiScanBuffer()\"}),\" to return when the parameters passed by the caller code are not valid.\"]}),/*#__PURE__*/t(\"p\",{children:[\"So, what would happen if we modify the \",/*#__PURE__*/e(\"code\",{children:\"AmsiScanBuffer()\"}),\" function in memory to bypass the anti-malware checking instructions altogether and force it always to return \",/*#__PURE__*/e(\"code\",{children:\"0x80070057\"}),\"? Let’s check it!\"]}),/*#__PURE__*/e(\"p\",{children:\"First, let’s examine the instructions using WinDBG:\"}),/*#__PURE__*/e(\"img\",{alt:\"Examine the instructions\",className:\"framer-image\",height:\"446\",src:\"https://framerusercontent.com/images/aoBnJL0T5O6eUFfDmWQ0f3TvDI.webp\",srcSet:\"https://framerusercontent.com/images/aoBnJL0T5O6eUFfDmWQ0f3TvDI.webp?scale-down-to=512 512w,https://framerusercontent.com/images/aoBnJL0T5O6eUFfDmWQ0f3TvDI.webp?scale-down-to=1024 1024w,https://framerusercontent.com/images/aoBnJL0T5O6eUFfDmWQ0f3TvDI.webp 1335w\",style:{aspectRatio:\"1335 / 893\"},width:\"667\"}),/*#__PURE__*/t(\"p\",{children:[\"Here we can see the disassembled instructions of \",/*#__PURE__*/e(\"code\",{children:\"AmsiScanBuffer()\"}),\". We can also see the byte-code corresponding to the \",/*#__PURE__*/e(\"code\",{children:\"mov eax,80070057h\"}),\" instruction: \",/*#__PURE__*/e(\"code\",{children:\"b857000780\"}),\".\"]}),/*#__PURE__*/t(\"p\",{children:[\"Using that information, we can modify the very beginning of \",/*#__PURE__*/e(\"code\",{children:\"AmsiScanBuffer()\"}),\" with the following instructions:\"]}),/*#__PURE__*/e(\"div\",{className:\"framer-text-module\",style:{height:\"auto\",width:\"100%\"},children:/*#__PURE__*/e(n,{componentIdentifier:\"module:pVk4QsoHxASnVtUBp6jr/HTBsNkEMAb7TUGaO3DBy/CodeBlock.js:default\",children:t=>/*#__PURE__*/e(r,{...t,code:\"b857000780          mov eax,0x80070057\\nc3                  ret\",language:\"Markdown\"})})}),/*#__PURE__*/t(\"p\",{children:[\"That would move the \",/*#__PURE__*/e(\"code\",{children:\"E_INVALIDARG\"}),\" value (\",/*#__PURE__*/e(\"code\",{children:\"0x80070057\"}),\") to \",/*#__PURE__*/e(\"code\",{children:\"EAX\"}),\", making it the return value of \",/*#__PURE__*/e(\"code\",{children:\"AmsiScanBuffer()\"}),\", and then the function ends with a \",/*#__PURE__*/e(\"code\",{children:\"RET\"}),\". As can be seen above, the bytes \",/*#__PURE__*/e(\"code\",{children:\"b857000780\"}),\" and \",/*#__PURE__*/e(\"code\",{children:\"c3\"}),\" are the byte-codes of those instructions.\"]}),/*#__PURE__*/t(\"p\",{children:[\"We can do the memory patching using \",/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/blog/hevd-dos/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"WinDBG\"})}),\". The steps are the following:\"]}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Attach the current PowerShell session to WinDBG.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Break the execution.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[\"Try to load a common flagged module (e.g., \",/*#__PURE__*/e(\"code\",{children:\"PowerView\"}),\") to see \",/*#__PURE__*/e(\"code\",{children:\"AMSI\"}),\" in action.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[\"Check the current instructions of the beginning of \",/*#__PURE__*/e(\"code\",{children:\"AmsiScanBuffer()\"}),\". This can be accomplished with \",/*#__PURE__*/e(\"code\",{children:\"u amsi!AmsiScanBuffer\"}),\" inside WinDBG.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[\"As we are in a little-endian architecture (\",/*#__PURE__*/e(\"code\",{children:\"x86_64\"}),\"), we need to reverse the byte-code of the \",/*#__PURE__*/e(\"code\",{children:\"mov eax,0x80070057 | ret\"}),\" instructions: \",/*#__PURE__*/e(\"code\",{children:\"c380070057b8\"}),\".\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[\"Modify the start of \",/*#__PURE__*/e(\"code\",{children:\"amsi!AmsiScanBuffer\"}),\" with those bytes. This can be done using \",/*#__PURE__*/e(\"code\",{children:\"eq amsi!AmsiScanBuffer c380070057b8\"}),\".\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Resume the execution.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[\"Load again \",/*#__PURE__*/e(\"code\",{children:\"PowerView\"}),\".\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[\"Enjoy an \",/*#__PURE__*/e(\"code\",{children:\"AMSI\"}),\"-free PowerShell session!\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"Let’s check the bypass in action:\"}),/*#__PURE__*/e(\"img\",{alt:\"Bypass success\",className:\"framer-image\",height:\"677\",src:\"https://framerusercontent.com/images/0yHXLkIO0kMpC0jTeoYLXbRcTw.gif\",srcSet:\"https://framerusercontent.com/images/0yHXLkIO0kMpC0jTeoYLXbRcTw.gif?scale-down-to=512 512w,https://framerusercontent.com/images/0yHXLkIO0kMpC0jTeoYLXbRcTw.gif?scale-down-to=1024 1024w,https://framerusercontent.com/images/0yHXLkIO0kMpC0jTeoYLXbRcTw.gif 1688w\",style:{aspectRatio:\"1688 / 1354\"},width:\"844\"}),/*#__PURE__*/t(\"p\",{children:[\"However, returning \",/*#__PURE__*/e(\"code\",{children:\"80070057\"}),\" is not the only way to bypass \",/*#__PURE__*/e(\"code\",{children:\"AmsiScanBuffer()\"}),\". In fact, we can make it return \",/*#__PURE__*/e(\"code\",{children:\"0\"}),\", using something like \",/*#__PURE__*/e(\"code\",{children:\"sub eax,eax | ret\"}),\", and the bypass will be successful as well.\"]}),/*#__PURE__*/e(\"p\",{children:\"Let’s see:\"}),/*#__PURE__*/e(\"img\",{alt:\"Another bypass success\",className:\"framer-image\",height:\"533\",src:\"https://framerusercontent.com/images/pbbHzcmWVFDbxxGnfK3yCESHbg.gif\",srcSet:\"https://framerusercontent.com/images/pbbHzcmWVFDbxxGnfK3yCESHbg.gif?scale-down-to=512 512w,https://framerusercontent.com/images/pbbHzcmWVFDbxxGnfK3yCESHbg.gif?scale-down-to=1024 1024w,https://framerusercontent.com/images/pbbHzcmWVFDbxxGnfK3yCESHbg.gif 1337w\",style:{aspectRatio:\"1337 / 1067\"},width:\"668\"}),/*#__PURE__*/t(\"p\",{children:[\"Success! Now we can use \",/*#__PURE__*/e(\"code\",{children:\"PowerView\"}),\", \",/*#__PURE__*/e(\"code\",{children:\"Invoke-Mimikatz\"}),\" or any other Red Team tool!\"]}),/*#__PURE__*/e(\"img\",{alt:\"Using tools\",className:\"framer-image\",height:\"354\",src:\"https://framerusercontent.com/images/ZfhhRFK2JkJLZVSY9LZ6YBmBFw.gif\",srcSet:\"https://framerusercontent.com/images/ZfhhRFK2JkJLZVSY9LZ6YBmBFw.gif?scale-down-to=512 512w,https://framerusercontent.com/images/ZfhhRFK2JkJLZVSY9LZ6YBmBFw.gif?scale-down-to=1024 1024w,https://framerusercontent.com/images/ZfhhRFK2JkJLZVSY9LZ6YBmBFw.gif 1394w\",style:{aspectRatio:\"1394 / 708\"},width:\"697\"}),/*#__PURE__*/e(\"h2\",{children:\"Conclusion\"}),/*#__PURE__*/t(\"p\",{children:[\"Memory patching is a nice trick to use to modify the behavior of running applications. Keep in mind that this technique is not persistent. The modification of \",/*#__PURE__*/e(\"code\",{children:\"AmsiScanBuffer()\"}),\" is performed \",/*#__PURE__*/e(\"strong\",{children:\"on the memory of the PowerView process\"}),\" and the original \",/*#__PURE__*/e(\"code\",{children:\"amsi.dll\"}),\" is never touched on disk.\"]})]});export const richText6=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/blog/authors/andres-roldan/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Andres Roldan\"})}),\", our VP of Hacking, did it again! He earned another certification that proves his expertise as an \",/*#__PURE__*/e(\"strong\",{children:\"excellent pentester!\"}),\" If you want to know more about his previous certification, you can check out our \",/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/blog/recent-osce/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"post about OSCE\"})}),\".\"]}),/*#__PURE__*/t(\"p\",{children:[\"On this occasion, we are talking about the \",/*#__PURE__*/e(\"strong\",{children:\"eLearnSecurity Web application Penetration Tester\"}),\" certification (\",/*#__PURE__*/e(\"strong\",{children:\"eWPT\"}),\"). It assesses a cybersecurity professional's web application \",/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/solutions/penetration-testing-as-a-service/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"penetration testing\"})}),\" skill. The exam is a skill-based test that requires candidates to perform a real-world web app pentesting simulation.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(o,{href:\"https://elearnsecurity.com/product/ewpt-certification/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"eWPTv1 is different\"})}),' from conventional certifications because to obtain it, candidates must perform an exam that simulates what professional pentesters do in real life. It urges the tester to use every methodology and tool known to exploit vulnerabilities. At the same time, it is necessary to prove that the candidate perfectly understands what she is doing. That is why it requires a detailed report as an essential part of the exam. In it, testers must provide proof of their findings while writing \"a commercial-grade penetration testing report that correctly identifies the weaknesses.\"']}),/*#__PURE__*/e(\"p\",{children:\"We congratulate Andres on this new achievement, and we want to take some minutes with him to understand his experience taking that exam better. Concurrently, we want to go deeper into some tips that anyone interested in doing this exam should consider.\"}),/*#__PURE__*/e(\"img\",{alt:\"eWPTv1 logo\",className:\"framer-image\",height:\"261\",src:\"https://framerusercontent.com/images/hi0PKVtOOaGEhuEu8rV9m8q1PQk.png\",srcSet:\"https://framerusercontent.com/images/hi0PKVtOOaGEhuEu8rV9m8q1PQk.png?scale-down-to=512 512w,https://framerusercontent.com/images/hi0PKVtOOaGEhuEu8rV9m8q1PQk.png?scale-down-to=1024 1024w,https://framerusercontent.com/images/hi0PKVtOOaGEhuEu8rV9m8q1PQk.png 1920w\",style:{aspectRatio:\"1920 / 522\"},width:\"960\"})]});export const richText7=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"What is the exam about, and why did you decide to take it?\"})}),/*#__PURE__*/e(\"p\",{children:\"The exam is one hundred percent practical. The goal is to find all vulnerabilities (focused on web ones) in a scope delivered in a letter of engagement. eLearnSecurity says that the evaluation of the test is mainly based on the submitted report, which corresponds to a document with the highest quality. In it, the tester must sort, classify, and detail the vulnerabilities found.\"}),/*#__PURE__*/e(\"p\",{children:\"The laboratory where the test is done is available for seven days from the start of the exam. You have an additional fourteen days to submit the report.\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"As a tip\"}),\", it is crucial to understand the scope of the delivered document and what it implies (do not try anything different from that scope). In fact, eWPTv1 tests the abilities and knowledge that we achieve in Fluid Attacks. As \",/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/blog/red-team-exercise/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"a red team\"})}),\", we manually search vulnerabilities in a defined target, though we usually support that searching with different types of tools.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:'Since this test is not multiple-choice questions but involves \"'}),/*#__PURE__*/e(o,{href:\"https://cutt.ly/dmfsphm\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"strong\",{children:\"to perform an actual penetration test\"})})}),/*#__PURE__*/e(\"strong\",{children:',\"'}),\" \",/*#__PURE__*/e(\"strong\",{children:\"was the exam preparation different from other exams you have taken?\"})]}),/*#__PURE__*/e(\"p\",{children:\"My best preparation was my experience doing pentesting in Fluid Attacks.\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"That means you did not prepare yourself with the course given by INE?\"}),\" \",/*#__PURE__*/e(\"strong\",{children:\"(Considering that INE \"}),/*#__PURE__*/e(o,{href:\"https://ine.com/pages/about-us\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"strong\",{children:\"“is the premier provider of Technical Training for the IT industry\"})})}),/*#__PURE__*/e(\"strong\",{children:\"” and owner of eLearn Security.)\"})]}),/*#__PURE__*/e(\"p\",{children:\"I didn't prepare with the INE.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"How did you know you were ready to take the exam?\"})}),/*#__PURE__*/e(\"p\",{children:\"I did not know that. I took the eWPT test to learn about the type of eLearnSecurity exams, and it was a pleasant surprise to find that the experience gained at Fluid Attacks was enough to earn the certification.\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"What should we expect from the report that needs to be done as part of the test?\"}),\" \",/*#__PURE__*/e(\"strong\",{children:\"How did you approach it?\"})]}),/*#__PURE__*/e(\"p\",{children:\"The report must be of the best quality. There it would help if you described every vulnerability found in the evaluation target. You must include screenshots and evidence of exploitation of vulnerabilities and impacts obtained.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Tell us a little about your experience at the time of the exam.\"})}),/*#__PURE__*/t(\"p\",{children:[\"The scan started on May 31, 2021, and \",/*#__PURE__*/e(\"strong\",{children:\"I found all vulnerabilities on the same day\"}),\". On June 1, I prepared the report and presented it on June 2 in the morning.\"]}),/*#__PURE__*/t(\"p\",{children:[\"The candidate can use any tool during the exam, yet \",/*#__PURE__*/e(\"strong\",{children:\"most vulnerabilities are found manually\"}),\". Therefore it is vital to know how to use the tools to our advantage and not delegate one hundred percent of the responsibility to them.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Will you have to take any certificate renewal exams?\"})}),/*#__PURE__*/e(\"p\",{children:\"No, this certification has no expiration.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Any tips for preparing for this particular exam?\"})}),/*#__PURE__*/e(\"p\",{children:'If you have more than three years of experience in pentesting, the exam will be a \"familiar experience.\" If you do not have that experience, I recommend doing the training in INE to find the vulnerabilities and generate a quality report.'}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"What’s next after this certification?\"})}),/*#__PURE__*/t(\"p\",{children:[\"After this, I will keep preparing for other certifications, including \",/*#__PURE__*/e(\"strong\",{children:\"eWPTX\"}),\", an advanced version of eWPT.\"]}),/*#__PURE__*/e(\"p\",{children:\"Thank you, Andres, for your time and your clarifications. Again, at Fluid Attacks, we congratulate you on this achievement!\"}),/*#__PURE__*/t(\"p\",{children:[\"As we said before, this is not the first certification that Andres Roldan has obtained. If you are interested in knowing how our Offensive Team Leader prepared his previous certificate, we recommend reading our post, “\",/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/blog/osce-journey/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"A Journey to OSCE\"})}),\".” Since you are there, we also recommend you read our last post, in which we interviewed \\xd3scar Uribe about his experience obtaining the \",/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/blog/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"OSED certification\"})}),\".\"]}),/*#__PURE__*/e(\"p\",{children:\"Finally, we at Fluid Attacks do not stop at our mission to offer the best red team to our clients. That’s why we are constantly facing new challenges and strengthening our ethical hacking skills.\"}),/*#__PURE__*/t(\"p\",{children:[\"If you want to \",/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/blog/certificates-comparison-i/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"know more about the certifications\"})}),\" that the members of our red team have obtained, you can follow this \",/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/certifications/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"link\"})}),\".\"]})]});export const richText8=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"In this blog post, we speak with \",/*#__PURE__*/e(\"strong\",{children:\"\\xd3scar Uribe\"}),\", one of our \",/*#__PURE__*/e(\"strong\",{children:\"Security Analysts\"}),\", who will complete two years with Fluid Attacks. We congratulate him for his achievement by obtaining \",/*#__PURE__*/e(\"strong\",{children:\"The Offensive Security Exploit Developer\"}),\" (\",/*#__PURE__*/e(\"strong\",{children:\"OSED\"}),\") certification.\"]}),/*#__PURE__*/t(\"p\",{children:[\"The OSED is a certificate granted by \",/*#__PURE__*/e(o,{href:\"https://www.offensive-security.com/why-offsec/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Offensive Security\"})}),'. Having the OSED ensures that the person has \"',/*#__PURE__*/e(o,{href:\"https://www.offensive-security.com/exp301-osed/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"the skills and expertise necessary to bypass basic Windows security mitigations using custom exploits\"})}),'.\" In this light, OSED is an intermediate exploit development cert. To obtain it, the person must do a test that starts \"with basic buffer overflow attacks and builds into learning the skills needed to crack the critical security mitigations protecting enterprises.\"']}),/*#__PURE__*/e(\"p\",{children:\"Now, considering this context, let us talk with \\xd3scar to know more about the certification, the exam and how he studied for it.\"}),/*#__PURE__*/e(\"img\",{alt:\"OSED course logo\",className:\"framer-image\",height:\"250\",src:\"https://framerusercontent.com/images/xyWP5OLpSRaLWO53uW5h4YB4vo.png\",srcSet:\"https://framerusercontent.com/images/xyWP5OLpSRaLWO53uW5h4YB4vo.png?scale-down-to=512 512w,https://framerusercontent.com/images/xyWP5OLpSRaLWO53uW5h4YB4vo.png?scale-down-to=1024 1024w,https://framerusercontent.com/images/xyWP5OLpSRaLWO53uW5h4YB4vo.png 1920w\",style:{aspectRatio:\"1920 / 500\"},width:\"960\"}),/*#__PURE__*/t(\"h6\",{children:[\"EXP-301 course logo by \",/*#__PURE__*/e(o,{href:\"https://cutt.ly/ImqcfmF\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Offensive-Security\"})}),\".\"]})]});export const richText9=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"On the Offensive Security page, they recommend taking the EXP-301 course. Did you take it to prepare yourself for the exam?\"})}),/*#__PURE__*/e(\"p\",{children:\"Yes, it is necessary to take the course in order to obtain the certification.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Did you think the EXP-301 course was enough as a preparation course?\"})}),/*#__PURE__*/e(\"p\",{children:\"The course met my expectations. All the issues are explained in great detail. The course begins by explaining basic topics and as it progresses, it goes deeper and deeper into new techniques.\"}),/*#__PURE__*/e(\"p\",{children:\"When you do the course, you have access to a laboratory where you can put into practice and reinforce the knowledge that you have obtained.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"What does the Windows User Mode Exploit Development course consist of? Why did you decide to take it?\"})}),/*#__PURE__*/e(\"p\",{children:\"The course is aimed at exploiting vulnerabilities in Windows operating systems. It focuses, mainly, on memory corruption vulnerabilities such as Buffers Overflows and techniques for bypassing security mitigations.\"}),/*#__PURE__*/e(\"p\",{children:\"I decided to do the course because I am very passionate about things at a low level within operating systems. I want to understand how a program works and how it can be abused by an attacker to compromise a system.\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"The exam takes 47 hours and 45 minutes plus 24 hours to submit the documentation.\"}),\" \",/*#__PURE__*/e(\"strong\",{children:\"How to be prepared for such a long exam?\"})]}),/*#__PURE__*/e(\"p\",{children:\"Usually, Offensive Security certifications are very long. That means you always must be prepared for a long day. So it is important to take breaks from time to time to have a clear mind and not feel so exhausted.\"}),/*#__PURE__*/e(\"p\",{children:\"During the preparation, I had long study days trying to simulate how the exam would be. This helped me to be prepared.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"How did you manage the time they gave you?\"})}),/*#__PURE__*/e(\"p\",{children:\"I divided the 48 hours into equal parts. This is the time I set out to use at most for each exercise. And I established that I would move on to the next exercise in the event that I ran out of time.\"}),/*#__PURE__*/e(\"p\",{children:\"Once the exam began, I dedicated myself to understanding what they asked me to do in each exercise and what requirements I should take into account for the documentation.\"}),/*#__PURE__*/e(\"p\",{children:\"During the exam, every two hours, I took a small break to clear my mind. It is important to take these short breaks so you don’t feel so exhausted with each exercise. You also have to take hours to sleep because the day is very long and the time you have scheduled is enough to perform the exercises and get rest.\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"The exam \"}),/*#__PURE__*/e(o,{href:\"https://www.offensive-security.com/exp301-osed/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"strong\",{children:\"asks you to be familiar\"})})}),/*#__PURE__*/e(\"strong\",{children:\" with debuggers (ImmunityDBG, \"}),/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/blog/reversing-mortals/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"strong\",{children:\"OllyDBG\"})})}),/*#__PURE__*/e(\"strong\",{children:\"), basic 32-bit exploitation concepts and to be comfortable with \"}),/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/blog/road-to-functional-python/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"strong\",{children:\"Python\"})})}),/*#__PURE__*/e(\"strong\",{children:\" 3. Do you think they are sufficient requirements, or would you add some other skills to be prepared for the exam?\"})]}),/*#__PURE__*/e(\"p\",{children:\"The course begins by explaining the 32-bit architecture. Then Offensive Security explains how WinDbg, the used debugger, works. If you’re familiar with these concepts, it will allow you to better understand and move faster during this part.\"}),/*#__PURE__*/t(\"p\",{children:[\"On top of that, it would be valuable to understand how a Buffer Overflow works. And finally, it would be nice to have a basic knowledge of \",/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/blog/reverse-engineering/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"reverse engineering\"})}),\".\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Tell us a bit about your experience at the time of the exam.\"}),\" \",/*#__PURE__*/e(\"strong\",{children:\"How did you feel before and during the exam?\"})]}),/*#__PURE__*/e(\"p\",{children:\"Before the exam, I was a little nervous because I didn’t have much experience doing Reverse Engineering, which is an essential part of the exam. But it is also important to clarify that the course material is sufficient to pass the certification.\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"The exam is a roller coaster of emotions\"}),\". There are moments when you feel bad because you have not advanced for a while, but then you find something that you had missed and allows you to move forward. When that happens, you get a boost of encouragement and confidence to continue with the exam.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"How were your preparation days?\"})}),/*#__PURE__*/t(\"p\",{children:[\"The course lasted two months in which I had access to the laboratory. During this period, I studied every day from 2 to 4 hours after work. When this time ended, I started studying by replicating my own exploits in \",/*#__PURE__*/e(\"strong\",{children:\"ExploitDB\"}),\". After that, I continued with a routine like the previous one: two to four hours of work.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Did the pandemic change anything about your presentation of this exam compared to others you’ve taken?\"})}),/*#__PURE__*/e(\"p\",{children:\"No. Every certification that I have presented has been during the pandemic, so there is no change. On the contrary, I think the pandemic gave me more time to study.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"What was the hardest part of the exam? And how did you respond to that?\"})}),/*#__PURE__*/e(\"p\",{children:\"For me, the most challenging thing about the exam was the part of finding the vulnerabilities using Reverse Engineering. Since I knew it would be difficult, I practiced a lot of how to reverse applications with already known vulnerabilities.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Will you have to take any certificate renewal exams?\"})}),/*#__PURE__*/e(\"p\",{children:\"No, none of the Offensive Security certifications expire. It is enough to get them once.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Any tips for preparing for this particular exam?\"})}),/*#__PURE__*/e(\"p\",{children:\"I would recommend that before starting the course, you study Reverse Engineering, Buffer Overflows and techniques to exploit them. Because the better these topics are understood, the better your performance will be during the exam and the course.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"What’s next after this certification?\"})}),/*#__PURE__*/t(\"p\",{children:[\"After this certification, I want to take the \",/*#__PURE__*/e(\"strong\",{children:\"OSEP\"}),\". Suppose someone obtains the \",/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/certifications/oswe/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"strong\",{children:\"OSWE\"})})}),\", \",/*#__PURE__*/e(\"strong\",{children:\"OSED\"}),\" and \",/*#__PURE__*/e(\"strong\",{children:\"OSEP\"}),\" certifications. In that case, they are given a new certificate called \",/*#__PURE__*/e(\"strong\",{children:\"OSCE3\"}),\", which replaces the \",/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/blog/recent-osce/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"OSCE\"})}),\" that was withdrawn the previous year.\"]}),/*#__PURE__*/e(\"p\",{children:\"Thank you so much, \\xd3scar, for your time in sharing your experience with the OSED certification.\"}),/*#__PURE__*/e(\"p\",{children:\"We at Fluid Attacks are very proud of \\xd3scar's achievement! We do not stop in our mission to offer the best red team to our clients. That's why we are constantly facing new challenges and strengthening our ethical hacking skills.\"}),/*#__PURE__*/t(\"p\",{children:[\"If you want to \",/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/blog/certificates-comparison-i/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"know more about the certifications\"})}),\" that the members of our \",/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/blog/red-team-exercise/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"red team\"})}),\" have obtained, you can follow this \",/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/certifications/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"link\"})}),\".\"]}),/*#__PURE__*/t(\"p\",{children:[\"Contact us if you want our red team to search for complex vulnerabilities in your software. Or enjoy our offer now of a \",/*#__PURE__*/e(o,{href:\"https://app.fluidattacks.com/SignUp\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"21-day free trial\"})}),\" of security testing with our automated tools. You can upgrade at any time to include red team operations.\"]})]});export const richText10=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"This week several cybersecurity portals (see \",/*#__PURE__*/e(o,{href:\"https://cutt.ly/fn06kPV\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"thehackernews\"})}),\", \",/*#__PURE__*/e(o,{href:\"https://cutt.ly/Vn06ECO\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"darkreading\"})}),\", \",/*#__PURE__*/e(o,{href:\"https://cutt.ly/Vn06Ap3\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"news.softpedia\"})}),\", \",/*#__PURE__*/e(o,{href:\"https://cutt.ly/Yn06HUk\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"channelasia.tech\"})}),\" and \",/*#__PURE__*/e(o,{href:\"https://cutt.ly/6n06X4R\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"securelist\"})}),\") confirmed that \",/*#__PURE__*/e(\"strong\",{children:\"North Korea\"}),\" has built a \",/*#__PURE__*/e(\"strong\",{children:\"campaign of cyberattacks\"}),\" targeting South Korea. Its goal? \",/*#__PURE__*/e(o,{href:\"https://cutt.ly/vn06BvD\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Spy on\"})}),\" high-profile government officials, financial institutions, banking organizations, and government administrative offices of the highest level such as the Korea Internet and Security Agency (KISA), the South Korean Ministry of Foreign Affairs, the South Korean Embassy of Sri Lanka, the Deputy Consul General at Korean Consulate General in Hong Kong, educational centers such as Seoul National University, the country’s largest university and one of the Top 50 universities worldwide (according to \",/*#__PURE__*/e(o,{href:\"https://cutt.ly/8n2wUzc\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"QS ranking\"})}),\"). They have even targeted global organizations such as the International Atomic Energy Agency and the Nuclear Security Officer.\"]}),/*#__PURE__*/t(\"p\",{children:[\"The \",/*#__PURE__*/e(o,{href:\"https://www.fbi.gov/wanted/cyber/park-jin-hyok\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"FBI\"})}),\" has acknowledged the link that North Korean hacking groups have had with conspiracy campaigns orchestrated by that Government. In addition, the \",/*#__PURE__*/e(o,{href:\"https://cutt.ly/Hn2wnzA\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"U.S. Department of the Treasury\"})}),\" has identified these groups as state-sponsored. But who are these groups? Who are their victims, and why? Are they a global threat?\"]})]});export const richText11=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"h2\",{children:\"Lazarus\"}),/*#__PURE__*/t(\"p\",{children:[\"One of the most famous North Korean criminal gangs is \",/*#__PURE__*/e(\"strong\",{children:\"Lazarus\"}),\". It has been operating since at least \",/*#__PURE__*/e(o,{href:\"https://cutt.ly/Cn2rnuF\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"2009\"})}),\". However, the U.S. Department of the Treasury \",/*#__PURE__*/e(o,{href:\"https://cutt.ly/Hn2wnzA\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"insists\"})}),' it was created by the North Korean government in 2007 and is run by the country’s security service, the Reconnaissance General Bureau (RGB). The RGB is in charge of the country’s cyber activities and is \"',/*#__PURE__*/e(o,{href:\"https://cutt.ly/Hn2wnzA\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"involved in the trade of North Korean arms\"})}),'.\"']}),/*#__PURE__*/t(\"p\",{children:[\"It was \",/*#__PURE__*/e(o,{href:\"https://cutt.ly/tn061M7\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"recently confirmed\"})}),\" that WannaCry, a malware \",/*#__PURE__*/e(o,{href:\"https://cutt.ly/1n2wvpu\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"used to extort money\"})}),\", was used against Japanese multinational company \",/*#__PURE__*/e(\"strong\",{children:\"Sony\"}),\" in an attack that costed more than \",/*#__PURE__*/e(o,{href:\"https://cutt.ly/tn061M7\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"$1B\"})}),\" in 2014. Apparently, the attack was retaliation for \",/*#__PURE__*/e(o,{href:\"https://cutt.ly/tn061M7\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Sony’s film\"})}),\" \",/*#__PURE__*/e(o,{href:\"https://cutt.ly/Tn2wxFJ\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"em\",{children:\"The Interview\"})})}),\", a comedy that ridiculed dictator Kim Jong Un. The attack \",/*#__PURE__*/e(o,{href:\"https://cutt.ly/Wn2wl7V\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"perpetrated by Lazarus\"})}),\", in any case, was not limited to Sony but also targeted international banks and cryptocurrency companies.\"]}),/*#__PURE__*/t(\"p\",{children:[\"In 2017, the same malware infected more than \",/*#__PURE__*/e(o,{href:\"https://cutt.ly/vn2wj3n\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"300 thousand\"})}),' computers and impacted at least 150 countries worldwide, including the United States, Australia, Canada, New Zealand and the United Kingdom. The attack was particularly striking for having reached the \"',/*#__PURE__*/e(o,{href:\"https://cutt.ly/Hn2wnzA\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"hospital systems\"})}),' in the United Kingdom, Russia’s interior ministry, FedEx in the U.S., Germany’s rail network, a Spanish telecommunications operator and major companies in Asia.\" It was undoubtedly a media attack because of its impact and the variety of companies and organizations affected. Yet, we had to wait two years after the attack until the U.S. Department of the Treasury ',/*#__PURE__*/e(o,{href:\"https://cutt.ly/Hn2wnzA\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"confirmed\"})}),' that \"Lazarus Group was involved in the destructive WannaCry 2.0 ransomware attack\" aforementioned.']}),/*#__PURE__*/e(\"h2\",{children:\"Organization\"}),/*#__PURE__*/t(\"p\",{children:[\"In the \",/*#__PURE__*/e(o,{href:\"https://cutt.ly/zn2wfZ0\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"white paper\"})}),\" that \",/*#__PURE__*/e(o,{href:\"https://www.lexfo.fr/en/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Lexfo\"})}),\", a recognized french technical expertise firm in computer security, presented on Lazarus, it was concluded that they are not a single group. Instead, the cybercriminal gang has subdivisions in charge of attacking from different fronts: \\\"the Lazarus 'core' aiming at disrupting activities and causing damage, \",/*#__PURE__*/e(\"strong\",{children:\"Andariel\"}),\", hacking for profit and intelligence, and \",/*#__PURE__*/e(\"strong\",{children:\"Bluenoroff\"}),', motivated by financial gains\" (my emphasis). Andariel has been the most prominent part of Lazarus dedicated to ',/*#__PURE__*/e(o,{href:\"https://cutt.ly/fn06kPV\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"targeting South Korean entities with malware attacks\"})}),\".\"]}),/*#__PURE__*/t(\"p\",{children:[\"As a case study, Lazarus is quite particular because \",/*#__PURE__*/e(o,{href:\"https://cutt.ly/Hn2wnzA\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"it is directly controlled\"})}),\" by a North Korean government entity. This is astonishing because there are not many cases of public relationships between cybercriminal gangs and governments. Perhaps Russian groups are the most famous cases, but we still don’t have official communication from the Russian government that publicly accepts they work together. In this way, Lazarus operations make it a peculiar state-owned company, which resorts to cybercrime to commit its misdeeds. Yet, it has little autonomy to carry out its criminal activities. But how can we explain this unusual formation of a criminal group?\"]}),/*#__PURE__*/e(\"img\",{alt:\"Lazarus\",className:\"framer-image\",height:\"400\",src:\"https://framerusercontent.com/images/aZihHBkPId7TjVy5ckUbdXvQ0.png\",srcSet:\"https://framerusercontent.com/images/aZihHBkPId7TjVy5ckUbdXvQ0.png?scale-down-to=512 512w,https://framerusercontent.com/images/aZihHBkPId7TjVy5ckUbdXvQ0.png?scale-down-to=1024 1024w,https://framerusercontent.com/images/aZihHBkPId7TjVy5ckUbdXvQ0.png 1920w\",style:{aspectRatio:\"1920 / 800\"},width:\"960\"}),/*#__PURE__*/t(\"h6\",{children:[\"Taken from \",/*#__PURE__*/e(o,{href:\"https://cutt.ly/zn2wfZ0\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Lexfo's white paper\"})}),\".\"]}),/*#__PURE__*/e(\"h2\",{children:\"The North Korean case\"}),/*#__PURE__*/t(\"p\",{children:[\"For many years now, North Korea has been subject to several economic sanctions. Since 2006, the \",/*#__PURE__*/e(o,{href:\"https://www.un.org/press/en/2006/sc8853.doc.htm\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"United Nations\"})}),\" has unanimously condemned the nuclear tests being executed by the Democratic Republic of Korea. For this reason, dozens of \",/*#__PURE__*/e(o,{href:\"https://cutt.ly/In2wsTp\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"economic sanctions\"})}),\" were carried out, orchestrated primarily by the United States, as North Korea is seen as \",/*#__PURE__*/e(o,{href:\"https://fas.org/sgp/crs/row/RL31696.pdf\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"posing a threat to U.S. national security\"})}),\". These \",/*#__PURE__*/e(\"strong\",{children:\"economic pressures\"}),\" are intended to \",/*#__PURE__*/e(\"strong\",{children:\"constrain\"}),\" the Asian nation from \",/*#__PURE__*/e(\"strong\",{children:\"denuclearizing\"}),\". Unfortunately, denuclearization has not been achieved, and the North Korean nuclear arsenal has been \",/*#__PURE__*/e(o,{href:\"https://www.bbc.com/news/world-asia-41174689\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"strengthened\"})}),\" recently.\"]}),/*#__PURE__*/t(\"p\",{children:[\"Given this background, it is not hard to think that North Korea has implemented methods to secure capital in 'unorthodox' ways. Hence, the relationship that the RGB has with Lazarus is not strange. Therefore, \\\"\",/*#__PURE__*/e(o,{href:\"https://cutt.ly/fn06kPV\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"North Korea has been behind an increasingly orchestrated effort aimed at infiltrating computers of financial institutions\"})}),'\" to perform ',/*#__PURE__*/e(o,{href:\"https://cutt.ly/Rn2wpBb\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"cryptocurrency heists\"})}),\" or ransomware attacks. Specifically, with WannaCry, their goal is to use malware to steal data and spy on competitors. In particular, \",/*#__PURE__*/e(o,{href:\"https://cutt.ly/fn06kPV\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Andariel has been responsible for\"})}),' \"attempting to steal bank card information by hacking into ATMs to withdraw cash or sell customer information on the black market.\"']}),/*#__PURE__*/e(\"h2\",{children:\"Go round in circles?\"}),/*#__PURE__*/t(\"p\",{children:[\"This is a vicious circle. Instead of making the Asian country less and less threatening to the international community, what economic blockades do is push the government to finance itself in illegal ways that risk the finances, cybersecurity and privacy of other nations. That, in turn, leads to increasingly strong sanctions on the part of the international community. One of the highest points of Lazarus' criminal shots was the ambitious Bangladesh Central Bank attack in 2016. The Korean gang attempted to steal more than \",/*#__PURE__*/e(o,{href:\"https://cutt.ly/Yn2wq5Z\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"$850M\"})}),\". The action was almost entirely thwarted but cost the Bangladeshi institution $81M, a figure reduced to $63M after \",/*#__PURE__*/e(o,{href:\"https://cutt.ly/dn2wiZa\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"$18M\"})}),\" were recovered.\"]}),/*#__PURE__*/t(\"p\",{children:[\"That same year the administration of then-President Barack Obama announced its \",/*#__PURE__*/e(o,{href:\"https://cutt.ly/Fn2wyv0\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Executive Order 13722 of March 15, 2016\"})}),\". President Obama established that, due to North Korea’s persistence in developing its nuclear and missile programs, the U.S. government recognizes the Asian country as a national priority. That decision was supported considering the rise of North Korean cybercriminal activities that targeted European, American, and Asian countries. As a result, it prohibited any direct or indirect commercial exchange with every type of North Korean company.\"]}),/*#__PURE__*/t(\"p\",{children:[\"Given these circumstances, it is not surprising that North Korea is focused on financing groups whose objective is to steal, defraud, and procure large amounts of money illegally. Hence statements such as \",/*#__PURE__*/e(o,{href:\"https://cutt.ly/fn06kPV\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Seongsu Park\"})}),', Kaspersky Senior Security Researcher, make sense: \"The Andariel group […​] have underlined their place as a financially motivated state-sponsored actor.\" The case of Andariel, or what in practical terms is the same, Lazarus, is much more problematic than that of ',/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/blog/ransomware-as-a-service/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"RaaS\"})}),\" organizations such as \",/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/blog/jbs-revil-cyberattack/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"REvil\"})}),\", or criminal gangs like \",/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/blog/pipeline-ransomware-darkside/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"DarkSide\"})}),\" or \",/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/blog/spectre/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Spectre\"})}),\" because they are being funded by the Korean government itself. One more reason to be prepared and to take \",/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/blog/optimism-bias/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"cybersecurity with the attention it deserves\"})}),\". You don’t have to wait for these types of attacks to occur in order to realize that \",/*#__PURE__*/e(\"strong\",{children:\"it’s necessary to protect your systems\"}),\".\"]}),/*#__PURE__*/t(\"p\",{children:[\"At Fluid Attacks we are specialized in cybersecurity through \",/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/solutions/penetration-testing-as-a-service/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Pentesting\"})}),\" and \",/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/blog/what-is-ethical-hacking/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Ethical Hacking\"})}),\". For more information, don’t hesitate to \",/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/contact-us/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"contact us\"})}),\"!\"]})]});export const richText12=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(o,{href:\"https://appleinsider.com/articles/21/05/27/first-apple-data-center-in-china-officially-commences-operations\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"On May 25\"})}),\", \",/*#__PURE__*/e(\"strong\",{children:\"Apple\"}),\" opened its first \",/*#__PURE__*/e(\"strong\",{children:\"Data Center (DC)\"}),\" in the \",/*#__PURE__*/e(\"strong\",{children:\"province of Guizhou\"}),', southwest of China. This means that from now on, Apple \"',/*#__PURE__*/e(o,{href:\"https://www.bangkokpost.com/tech/2117731/censorship-surveillance-and-profits-hard-bargain-for-apple-in-china\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"stores the personal data of its Chinese customers on computer servers run by a state-owned Chinese firm.\"})}),'\" This has been very controversial given the calls of different organizations and human rights defenders. As we will see, they report that Chinese Apple users face potential abuses and intrusions into privacy by the Chinese government. In this post, we explain why they say so and what the controversy consists of.']})});export const richText13=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"h2\",{children:\"Hey China, think different!\"}),/*#__PURE__*/t(\"p\",{children:[\"This Apple-China project has been underway for more than three years, as \",/*#__PURE__*/e(o,{href:\"https://news.cgtn.com/news/2021-05-27/Apple-s-China-data-center-starts-operation-10BTZQKlCWA/index.html\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"in 2017, Apple signed a $1B\"})}),\" agreement to build its first DC. Chinese employees are the ones who \",/*#__PURE__*/e(o,{href:\"https://www.nytimes.com/2021/05/17/technology/apple-china-censorship-data.html\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"physically control\"})}),' the computers. The Chinese government will store the digital keys used \"',/*#__PURE__*/e(o,{href:\"https://www.datacenterdynamics.com/en/news/apples-chinese-data-centers-store-encryption-keys-in-same-facility-as-user-data/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"to unlock the data stored\"})}),'.\" According to a lengthy ',/*#__PURE__*/e(o,{href:\"https://www.nytimes.com/2021/05/17/technology/apple-china-censorship-data.html?smid=url-share\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"New York Times (NYT) report\"})}),', such assignments would imply that \"Apple abandoned the encryption technology it used elsewhere after China would not allow it.\" In fact, in their report, NYT insists that \"China is making Apple work for the Chinese government.\" Apple would be collaborating with censoring thousands of applications \"including foreign news outlets, gay dating services, and encrypted messaging apps.\"']}),/*#__PURE__*/e(\"h2\",{children:\"What is the matter?\"}),/*#__PURE__*/t(\"p\",{children:[\"The same NYT report argues that it would be almost impossible to prevent the \",/*#__PURE__*/e(o,{href:\"https://www.nytimes.com/2021/05/17/technology/apple-china-censorship-data.html\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Chinese government from having\"})}),' \"access to the emails, photos, documents, contacts, and locations of millions of Chinese residents.\" These signed agreements are coordinated with the Personal Information Protection Law (',/*#__PURE__*/e(o,{href:\"https://www.newamerica.org/cybersecurity-initiative/digichina/blog/chinas-draft-personal-information-protection-law-full-translation/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"PIPL\"})}),\"). \",/*#__PURE__*/e(o,{href:\"https://www.newamerica.org/cybersecurity-initiative/digichina/blog/how-will-chinas-privacy-law-apply-to-the-chinese-state/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"PIPL regulates\"})}),' \"the collection, storage, use, processing, transmittal, provision, and disclosure (collectively, ‘handling’) of personal information by ‘organizations and individuals’\" in China.']}),/*#__PURE__*/t(\"p\",{children:[\"The problem comes in determining what limits a government should have to intervene in the storage and collection of information. The \",/*#__PURE__*/e(o,{href:\"https://www.business-humanrights.org/fr/derni%C3%A8res-actualit%C3%A9s/china-adopts-cyber-security-law-in-face-of-overseas-opposition/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Chinese government’s justification\"})}),' for intervening in privacy in this way is to protect itself from \"growing threats such as hacking and terrorism.\" Yet, the implementation of these policies ',/*#__PURE__*/e(o,{href:\"https://www.reuters.com/article/us-china-parliament-cyber-idUSKBN132049\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"is highly intrusive\"})}),\". \",/*#__PURE__*/e(o,{href:\"https://www.hrw.org/news/2016/11/06/china-abusive-cybersecurity-law-set-be-passed\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Human Rights Watch stated\"})}),' in one of their latest communiques that it was \"a regressive measure that strengthens censorship, surveillance, and other controls over the Internet.\" But why does opening a DC in a country like China make all this intervention possible?']}),/*#__PURE__*/t(\"p\",{children:[\"The heart of the matter relies on \",/*#__PURE__*/e(\"strong\",{children:\"how data storage works\"}),\" and whether a government could access that information by having DC in its territory.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Data storage: bits and bytes\"}),/*#__PURE__*/t(\"p\",{children:[\"Storing digital information means saving a collection of \",/*#__PURE__*/e(\"strong\",{children:\"bits\"}),\" and \",/*#__PURE__*/e(\"strong\",{children:\"bytes\"}),\". A bit is a binary digit, \",/*#__PURE__*/e(o,{href:\"https://www.redhat.com/sysadmin/bits-vs-bytes\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"the minimum unit of data measurement\"})}),\". All cyber information is stored and transmitted in bits. \",/*#__PURE__*/e(o,{href:\"https://kb.iu.edu/d/ackw\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Bytes\"})}),\" are ordered sets of bits: exactly eight bits (the reason they are eight and no more or fewer bits is more historical than technical). Those bytes are the minimum unit of data processed by a computer.\"]}),/*#__PURE__*/t(\"p\",{children:[\"When those bits and bytes, digital information, are collected and retained, we talk about \",/*#__PURE__*/e(o,{href:\"https://www.redhat.com/en/topics/data-storage\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"data storage\"})}),\". For the storage process, you need a physical repository or a \",/*#__PURE__*/e(o,{href:\"https://computer.howstuffworks.com/ram.htm\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"memory cell\"})}),\". Physically a memory cell is the junction of a transistor and a capacitor, but virtually it represents a bit of data. \",/*#__PURE__*/e(o,{href:\"https://www.cpisolutions.com/blog/what-is-a-data-center/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Data Center\"})}),\" (DC) is a physical facility that stores countless memory cells, hardware designed to store those bits.\"]}),/*#__PURE__*/e(\"p\",{children:\"Any company could have its own DC. However, managing and verifying good maintenance of that equipment is often cumbersome. This is why it is common for that service to be outsourced. Thus, DCs are usually managed by specialized companies.\"}),/*#__PURE__*/e(\"h2\",{children:\"iCloud\"}),/*#__PURE__*/t(\"p\",{children:[\"By outsourcing the DCs, companies store their data using cloud storage (CS). CS is characterized by \",/*#__PURE__*/e(o,{href:\"https://www.redhat.com/en/topics/data-storage/what-is-cloud-storage\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"the abstraction, pooling, and sharing of storage resources through the internet\"})}),\". It does not require a direct connection to the storage hardware. Thus, one company can operate from Colombia, while the hardware that stores its information remains in the United States. Because it is faster to \",/*#__PURE__*/e(o,{href:\"https://www.redhat.com/sysadmin/bits-vs-bytes\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"retrieve and store data on a local CPU than over a network\"})}),\", companies with monetary, human, and technical resources usually have their own DC. That’s the Apple case.\"]}),/*#__PURE__*/t(\"p\",{children:[\"Apple manages its own DC and offers users its own CS system. Their DC is called \",/*#__PURE__*/e(\"strong\",{children:\"iCloud\"}),\", and Apple manages its security. In this regard, Apple maintains on its \",/*#__PURE__*/e(o,{href:\"https://www.apple.com/privacy/features/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"privacy page\"})}),' that, for example, when a credit card is added or used as a payment method, \"a unique Device Account Number is created, which is encrypted in a way that Apple can’t decrypt and stored in the Secure Element of your device.\"']}),/*#__PURE__*/e(\"h2\",{children:\"Guizhou-Cloud Big Data\"}),/*#__PURE__*/t(\"p\",{children:[\"Apple can manage all its users’ information on its own servers, except in China. Specifically, with the launch of its database in Guizhou, \",/*#__PURE__*/e(o,{href:\"https://www.bangkokpost.com/tech/2117731/censorship-surveillance-and-profits-hard-bargain-for-apple-in-china\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Apple asked\"})}),' its Chinese customers \"to accept new iCloud terms and conditions that list GCBD (Guizhou-Cloud Big Data) as the service provider and Apple as ‘an additional party.’\" That is, GCBD \"governs your use of the iCloud product, software, services, and websites.\"']}),/*#__PURE__*/t(\"p\",{children:['The primary provider is \"',/*#__PURE__*/e(o,{href:\"https://global.chinadaily.com.cn/a/201806/07/WS5b1888fba31001b82571e9d1.html\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"a company owned by the provincial government\"})}),',\" in other words, the one in charge of managing Apple users\\' information is the Chinese government itself. That same government \"',/*#__PURE__*/e(o,{href:\"https://thediplomat.com/2017/06/chinas-cybersecurity-law-what-you-need-to-know/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"requires network operators to store select data within China and allows Chinese authorities to conduct spot-checks on a company’s network operations\"})}),'.\"']}),/*#__PURE__*/e(\"h2\",{children:\"Privacy risk and Apple response\"}),/*#__PURE__*/t(\"p\",{children:[\"What is worrying is how that information will be managed. In 2016 it was announced the adoption of the Personal Information Protection Law of the People’s Republic of China (read the \",/*#__PURE__*/e(o,{href:\"https://www.newamerica.org/cybersecurity-initiative/digichina/blog/chinas-draft-personal-information-protection-law-full-translation/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"translation here\"})}),\"). In the face of this type of measure, several rights advocates have spoken out against it.\"]}),/*#__PURE__*/t(\"p\",{children:[\"Apple’s Chief Executive, Tim Cook, has repeatedly said the \",/*#__PURE__*/e(o,{href:\"https://www.bangkokpost.com/tech/2117731/censorship-surveillance-and-profits-hard-bargain-for-apple-in-china\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"data is safe\"})}),\". In addition, the company is aware that there are rules that generate discomfort to the international community and to the company’s own interests. Still, \",/*#__PURE__*/e(o,{href:\"https://www.nytimes.com/2017/07/12/business/apple-china-data-center-cybersecurity.html\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Apple said\"})}),': \"we believe in engaging with governments even when we disagree.\" At the beginning of the negotiations with China, Apple ',/*#__PURE__*/e(o,{href:\"https://www.nytimes.com/2017/07/12/business/apple-china-data-center-cybersecurity.html\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"justified the opening of that DC\"})}),' by saying that its construction \"will allow us to improve the speed and reliability of our products and services while also complying with newly passed regulations.\"']}),/*#__PURE__*/e(\"img\",{alt:\"Apple's market value\",className:\"framer-image\",height:\"400\",src:\"https://framerusercontent.com/images/YZZHKQ1GFxWFEv6FacUqWXPXtW8.png\",srcSet:\"https://framerusercontent.com/images/YZZHKQ1GFxWFEv6FacUqWXPXtW8.png?scale-down-to=512 512w,https://framerusercontent.com/images/YZZHKQ1GFxWFEv6FacUqWXPXtW8.png?scale-down-to=1024 1024w,https://framerusercontent.com/images/YZZHKQ1GFxWFEv6FacUqWXPXtW8.png 1920w\",style:{aspectRatio:\"1920 / 800\"},width:\"960\"}),/*#__PURE__*/t(\"h6\",{children:[\"Source: \",/*#__PURE__*/e(o,{href:\"https://www.nytimes.com/2020/08/19/technology/apple-2-trillion.html\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"The New York Times.\"})})]}),/*#__PURE__*/t(\"p\",{children:[\"When considering the economic factor that Apple’s entry into the Asian giant has represented, the reasons for its pact seem more straightforward. Following its agreement with China, the country has accounted for \",/*#__PURE__*/e(o,{href:\"https://www.bbc.com/news/business-57395094\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"15% of Apple’s revenue\"})}),\". That percentage translates into a bizarre figure when you consider that it is the only company in the world with a turnover higher \",/*#__PURE__*/e(o,{href:\"https://www.nytimes.com/2020/08/19/technology/apple-2-trillion.html\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"than $2 trillion in 2020\"})}),\". This has made it the company with the highest revenue globally, well above Google, Microsoft, Amazon, and Facebook, who are vying for the top 5 \",/*#__PURE__*/e(o,{href:\"https://www.forbes.com/the-worlds-most-valuable-brands/#67d38cd7119c\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"according to Forbes\"})}),\".\"]}),/*#__PURE__*/t(\"p\",{children:['The controversy can be summed up in Apple’s recognition that its profits have skyrocketed like never before, thanks to its entry into China. China has found Apple a great ally in \"protecting\" its citizens from the ',/*#__PURE__*/e(\"em\",{children:\"dangerous cyber world\"}),\". While other companies see China’s requests as a translation of the old saying, \",/*#__PURE__*/e(\"strong\",{children:'\"you shall not pass!\"'}),\" Apple interpreted it as a possibility to strengthen its finances. Only time will tell us how good the decision was.\"]}),/*#__PURE__*/t(\"p\",{children:[\"We hope you have enjoyed this post!\",/*#__PURE__*/e(\"br\",{}),\"At Fluid Attacks we look forward to hearing from you.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/contact-us/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Contact us!\"})})]})]});export const richText14=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"h2\",{children:\"What happened?\"}),/*#__PURE__*/t(\"p\",{children:[\"The world’s largest meat producer was attacked by \",/*#__PURE__*/e(\"strong\",{children:\"REvil\"}),\" on May 31. After the attack, it had to shut down multiple processing plants around the world. In Canada, the United States, and Australia, \",/*#__PURE__*/e(o,{href:\"https://cutt.ly/XnE9cvF\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"some facilities\"})}),' had to close. Especially, \"',/*#__PURE__*/e(o,{href:\"https://cutt.ly/XnE9cvF\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"JBS shut down operations at its Dinmore Australia facility — the biggest beef plant in the southern hemisphere.\"})}),'\"']}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"JBS\"}),\" \",/*#__PURE__*/e(o,{href:\"https://cutt.ly/InE9sOX\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"did not publicly confirm\"})}),\" what kind of attack it was. They also \",/*#__PURE__*/e(o,{href:\"https://cutt.ly/HnE9hxU\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"refrained from pointing out\"})}),\" any responsibility. The world’s press accessed this information thanks to a White House \",/*#__PURE__*/e(o,{href:\"https://cutt.ly/hnE9f9W\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"press briefing on June 1\"})}),\". There, Ms. Karine Jean-Pierre, the White House Principal Deputy Press Secretary, revealed that it was a \",/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/blog/ransomware/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"ransomware attack\"})}),\". And, it was \",/*#__PURE__*/e(o,{href:\"https://www.bloomberg.com/news/articles/2021-06-02/hacking-outfit-linked-to-russia-is-behind-jbs-cyberattack\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Bloomberg\"})}),\" who revealed that it was an attack perpetrated by REvil.\"]}),/*#__PURE__*/t(\"p\",{children:[\"At Fluid Attacks, we have already talked about \",/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/blog/ransomware/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"strong\",{children:\"ransomware\"})})}),\" and \",/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/blog/ransomware-as-a-service/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"strong\",{children:\"Ransomware as a Service (RaaS)\"})})}),\". So it is enough to summarize that this attack consists of installing “\",/*#__PURE__*/e(o,{href:\"https://cutt.ly/InE9sOX\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"malware that encrypts its target’s systems\"})}),\".” Its purpose is to ask for money to decrypt that data or to prevent it from being published.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Who are those involved?\"}),/*#__PURE__*/t(\"p\",{children:[\"The \",/*#__PURE__*/e(\"strong\",{children:\"victim\"}),\" is JBS, a company that, according to its \",/*#__PURE__*/e(o,{href:\"https://jbsfoodsgroup.com/our-business\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"official website\"})}),\", is the #1 global beef producer, #1 global poultry producer, #2 global pork producer. They also own \",/*#__PURE__*/e(o,{href:\"https://primo.com.au/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Primo\"})}),', \"Australia’s largest provider of ham, bacon, salami, and deli meats.\"']}),/*#__PURE__*/t(\"p\",{children:[\"The perpetrator is \",/*#__PURE__*/e(o,{href:\"https://www.bbc.com/news/world-us-canada-57338896\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"REvil\"})}),', \"a criminal network of ransomware hackers that first came to prominence in 2019.\" This group is also ',/*#__PURE__*/e(o,{href:\"https://cutt.ly/PnE3yt0\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/t(a.a,{children:[\"known as \",/*#__PURE__*/e(\"strong\",{children:\"Sodinokibi\"})]})}),\" and appeared in \",/*#__PURE__*/e(o,{href:\"https://cutt.ly/mnE3rGG\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"April 2019\"})}),'. Since then, REvil has incorporated into its criminal portfolio cyberattack methods such as \"',/*#__PURE__*/e(o,{href:\"https://cutt.ly/PnE3yt0\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"malicious spam campaigns and RDP attacks\"})}),\",” but always having ransomware as its main attack.\"]}),/*#__PURE__*/t(\"p\",{children:[\"In our \",/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/blog/ransomware-as-a-service/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"last post\"})}),\", we pointed out that the \",/*#__PURE__*/e(o,{href:\"https://cutt.ly/WnE3isA\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"GandCrab gang ended operations\"})}),\" after a year of trading with exorbitant profits. Some of the gang members would presumably be \",/*#__PURE__*/e(o,{href:\"https://cutt.ly/inE3p0o\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"linked to REvil\"})}),\", a gang that uses an attack model known as RaaS (see Figure 1). According to the \",/*#__PURE__*/e(o,{href:\"https://cutt.ly/0nE9o2c\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"FBI statement\"})}),\" they are the main suspect of the JBS cyberattack.\"]}),/*#__PURE__*/e(\"img\",{alt:\"REvil timeline\",className:\"framer-image\",height:\"171\",src:\"https://framerusercontent.com/images/9tUKbgFi4IwUZe8p0On1zUDfrk.png\",srcSet:\"https://framerusercontent.com/images/9tUKbgFi4IwUZe8p0On1zUDfrk.png?scale-down-to=512 512w,https://framerusercontent.com/images/9tUKbgFi4IwUZe8p0On1zUDfrk.png?scale-down-to=1024 1024w,https://framerusercontent.com/images/9tUKbgFi4IwUZe8p0On1zUDfrk.png 1920w\",style:{aspectRatio:\"1920 / 343\"},width:\"960\"}),/*#__PURE__*/t(\"h6\",{children:[\"Figure 1. \",/*#__PURE__*/e(o,{href:\"https://www.secureworks.com/blog/REvil-the-gandcrab-connection\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"REvil Timeline\"})}),\".\"]}),/*#__PURE__*/t(\"p\",{children:['In October 2020, \"UNKN\", one of the REvil ransomware syndicates, took an interview that was published on the Russian-speaking tech Youtube channel \"',/*#__PURE__*/e(o,{href:\"https://www.youtube.com/watch?v=ZyQCQ1VZp8s\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Russian OSINT\"})}),'.\" It was posted on the official website of ',/*#__PURE__*/e(o,{href:\"https://cutt.ly/rnE0RRY\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Advanced Intelligence\"})}),\", where it was argued that the name evokes the Resident Evil franchise. In the same interview, REvil claimed to make a revenue of $100M in 2019; a year with the goal of achieving at least $1B, ideally $2B. This is consistent with the figure estimated by the \",/*#__PURE__*/e(o,{href:\"https://cutt.ly/mnE9u4a\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"IBM Security X-Force report\"})}),' published in September 2020. According to SecurityIntelligence, in \"our conservative estimate for Sodinokibi ransomware profits in 2020 is at least $81 million.\" Besides, UNKN announced that among the most profitable attack victims ',/*#__PURE__*/e(o,{href:\"https://cutt.ly/rnE0RRY\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"the agriculture sector\"})}),\" is one of the best future targets. This, of course, did not remain an empty promise.\"]}),/*#__PURE__*/e(\"h2\",{children:\"REvil’s modus operandi\"}),/*#__PURE__*/t(\"p\",{children:[\"UNKN noted that REvil’s developer team is \",/*#__PURE__*/e(o,{href:\"https://cutt.ly/rnE0RRY\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"made up of less than ten individuals\"})}),'. The team is so small precisely because they don’t perpetrate most of their attacks. Since they operate as RaaS, most of their attacks \"',/*#__PURE__*/e(o,{href:\"https://cutt.ly/rnE0RRY\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"are conducted by the affiliates or adverts who disseminate the payload and navigate the victim’s networks\"})}),'.\" They are the ones responsible for infecting the systems of their victims with the virus that \"',/*#__PURE__*/e(o,{href:\"https://cutt.ly/XnE9rVV\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"encrypts files after infection and discards a ransom request message\"})}),'.\"']}),/*#__PURE__*/t(\"p\",{children:['REvil affiliates often apply \"',/*#__PURE__*/e(o,{href:\"https://www.infradata.com/resources/what-is-revil-ransomware/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"mass-spread attacks using exploit-kits and phishing-campaigns\"})}),'\" to distribute their malware. But the most commonly used attack vector, according to UNKN, is ',/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/blog/pass-cracking/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"brute-force\"})}),\" Remote Desktop Protocol (\",/*#__PURE__*/e(o,{href:\"https://www.paubox.com/blog/what-is-remote-desktop-protocol-attack/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"RDP\"})}),'). This is very efficient for criminals, because \"',/*#__PURE__*/e(o,{href:\"https://cutt.ly/dnE29W2\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"brute force attacks are usually automated, so it doesn’t cost the attacker a lot of time or energy\"})}),'.\"']}),/*#__PURE__*/e(\"h2\",{children:\"A worldwide attack\"}),/*#__PURE__*/t(\"p\",{children:[\"JBS is headquartered in Brazil and \",/*#__PURE__*/e(o,{href:\"https://cutt.ly/LnE200M\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"has facilities in 20 countries\"})}),', though fifty percent of its \"',/*#__PURE__*/e(o,{href:\"https://cutt.ly/TnE3fHA\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"overall revenue\"})}),'\" corresponds to the United States. Therefore, and given the multiple outsourcing processes of the company, the attack made on JBS servers has required an international effort to solve it. In particular, Andre Nogueira, Chief Executive Officer of the Brazilian company, thanked the ',/*#__PURE__*/e(o,{href:\"https://cutt.ly/4nE2MNh\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"joint work of the United States, Canada, and Australia\"})}),\".\"]}),/*#__PURE__*/t(\"p\",{children:[\"Today, a cyberattack not only affects the company and its employees but can become a global threat. This case is a magnificent example because it \",/*#__PURE__*/e(o,{href:\"https://cutt.ly/znE2Nd6\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"affected countries everywhere\"})}),\": in North America, South America, Oceania, and Europe. Everything happened precisely when the pandemic hit the food sector the hardest. The Food and Agriculture Organization of the United Nations (FAO) published its \",/*#__PURE__*/e(o,{href:\"http://www.fao.org/news/story/en/item/1403339/icode/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"report on food prices\"})}),\" on Tuesday, June 1. The bottom line is that in May food prices have increased so rapidly that they have reached their highest peak since September 2011. If we add to that a cyberattack that paralyzed the meat production company for three days, then the outlook doesn’t seem very encouraging for June.\"]}),/*#__PURE__*/e(\"img\",{alt:\"\",className:\"framer-image\",height:\"540\",src:\"https://framerusercontent.com/images/TvrGKAJmxKNo2fChHM4HkcoCXNc.png\",srcSet:\"https://framerusercontent.com/images/TvrGKAJmxKNo2fChHM4HkcoCXNc.png?scale-down-to=512 512w,https://framerusercontent.com/images/TvrGKAJmxKNo2fChHM4HkcoCXNc.png?scale-down-to=1024 1024w,https://framerusercontent.com/images/TvrGKAJmxKNo2fChHM4HkcoCXNc.png 1920w\",style:{aspectRatio:\"1920 / 1080\"},width:\"960\"}),/*#__PURE__*/t(\"h6\",{children:[\"Figure 2. Graphic by \",/*#__PURE__*/e(o,{href:\"http://www.fao.org/worldfoodsituation/foodpricesindex/en/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"FAO\"})}),\".\"]}),/*#__PURE__*/t(\"p\",{children:[\"The attack was particularly worrying in Australia, where the Minister for Agriculture, Drought, and Emergency Management said on \",/*#__PURE__*/e(o,{href:\"https://cutt.ly/qnE2Vaa\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"a local radio station\"})}),\" that\"]}),/*#__PURE__*/e(\"blockquote\",{children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"It's a global attack\"}),\". And we're working now with international partners around trying to trace and then rectify and obviously prosecute where possible, who has perpetrated this attack.\"]})}),/*#__PURE__*/t(\"p\",{children:['It was the joint effort of different nations that allowed them to face REvils’s attack. This was also made clear by the FBI in its statement on the matter, in which they stated: \"A cyberattack on one is an attack on us all.\" And Russia’s Deputy Foreign Minister Sergei Ryabkov himself backed the idea of working together with international peers by ',/*#__PURE__*/e(o,{href:\"https://www.bbc.com/news/world-us-canada-57318965\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"stating that\"})}),' \"Biden administration had been in contact with Moscow to discuss the cyber-attack.\"']}),/*#__PURE__*/e(\"h2\",{children:\"How did the attack end?\"}),/*#__PURE__*/t(\"p\",{children:[\"Unlike the \",/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/blog/pipeline-ransomware-darkside/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Colonial Pipeline\"})}),\" case or the victims of \",/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/blog/babuk-locker/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Babuk locker\"})}),\", JBS has not confirmed the payment of the ransom. On \",/*#__PURE__*/e(o,{href:\"https://cutt.ly/znE2Z9A\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"June 3\"})}),\", the company’s CEO said they returned to operation at normal capacity because the attack did not affect either the central system or the backup data. And with this, no information about customers, suppliers, or employees was compromised.\"]}),/*#__PURE__*/t(\"p\",{children:[\"Without doubting the company’s quick reaction, or the efficient procedures carried out by the White House and the FBI, let me say that I am still forming my opinion about this outcome. It would sound logical to stick with the official version and not persist in doubt. However, not since \",/*#__PURE__*/e(o,{href:\"https://cutt.ly/RnE2KMS\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"REvil has not given any statement\"})}),\" on its \",/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/blog/dark-web/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"dark web\"})}),\", and considering what \",/*#__PURE__*/e(o,{href:\"https://cutt.ly/nnE3jCJ\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"The Irish Times has published\"})}),\" about it:\"]}),/*#__PURE__*/e(\"blockquote\",{children:/*#__PURE__*/e(\"p\",{children:\"Ransomware syndicates, as a rule, don't post about attacks when they are in initial negotiations with victims — or if the victims have paid a ransom.\"})}),/*#__PURE__*/t(\"p\",{children:[\"Let me leave the door open to whether JBS finally paid the ransom. It would not be the only company that, without denying having paid the ransom, resumes activities after an attack of this type (see \",/*#__PURE__*/e(o,{href:\"https://www.bbc.com/news/business-51017852\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Travelex\"})}),\" case).\"]}),/*#__PURE__*/t(\"p\",{children:[\"At Fluid Attacks, we specialize in cybersecurity through \",/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/solutions/penetration-testing-as-a-service/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"pentesting\"})}),\" or ethical hacking. For more information, don’t hesitate to \",/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/contact-us/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"contact us\"})}),\"!\"]})]});export const richText15=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Spectre\"}),\" was in the spotlight of cyber threat news in 2018. Its name is a direct reference to the only agent capable of attacking in that way: a specter. Since every ghost always comes back, Spectre has reappeared! To start talking about it, we have prepared a story and a challenge for you. \",/*#__PURE__*/e(\"strong\",{children:\"Can you solve it?\"})]}),/*#__PURE__*/e(\"p\",{children:\"Imagine the following scenario: one businessman increased his company’s efficiency by hiring different people to perform routine tasks even before someone asked them to do so. If a posteriori instruction contradicted what the employees had done, they reversed and forgot those failed actions.\"}),/*#__PURE__*/e(\"p\",{children:\"Some years later, the businessman’s lifeless body appeared in his library. He had a deep wound in his heart with an undue pool of blood. There was nothing nearby that could have been used to kill him. The room had doors and windows closed from the inside with no openings in walls, ceiling, or floor. The only suspect was an employee who was with him two hours before his death. However, after drinking the infallible truth serum, it was confirmed his innocence. The victim’s sister claims the assassin was a ghost. But was it?\"}),/*#__PURE__*/e(\"p\",{children:\"Clues are already given, and we can suggest a solution. But, before that, if you think that this story is merely fiction, I invite you to read what happened with the Spectre case.\"})]});export const richText16=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"h2\",{children:\"Spectre\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(o,{href:\"https://www.ieee-security.org/TC/SP2019/SP19-Slides-pdfs/Paul_Kocher_01_-_Spectre_Attacks-IEEE-SecurityPrivacy_v05.pdf\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Since 2004\"})}),\" the 3.8GHz Pentium 4 has been allowed to \",/*#__PURE__*/e(o,{href:\"https://www.anandtech.com/show/1695\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:'\"bump in speed from the already available 6xx line of processors.\"'})}),\" Computers and devices that work with microchips increased their efficiency. Behind that increased performance, there was an effort \",/*#__PURE__*/e(o,{href:\"https://www.youtube.com/watch?v=zOvBHxMjNls\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"to boost pipeline in average cases\"})}),\", reduce memory delays by using caches, and work during delays using \",/*#__PURE__*/e(\"strong\",{children:\"speculative execution\"}),\". That allowed routine processes (\",/*#__PURE__*/e(o,{href:\"https://turbofuture.com/computers/What-are-the-basic-functions-of-a-CPU\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"such as move data from one memory location to another, or jump to a different address\"})}),\") to be much more efficient. Now, how did this advantage become a vulnerability?\"]}),/*#__PURE__*/t(\"p\",{children:[\"To answer that, we will explain what \",/*#__PURE__*/e(\"strong\",{children:\"speculative execution\"}),\" is by referring to Paul Kocher’s talk: \",/*#__PURE__*/e(o,{href:\"https://youtu.be/zOvBHxMjNls\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"em\",{children:\"Spectre Attacks Exploiting Speculative Execution\"})})}),\". In fact, Spectre was brought out into the open for the \",/*#__PURE__*/e(o,{href:\"https://meltdownattack.com/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"first time\"})}),\" in May 2019 at the \",/*#__PURE__*/e(o,{href:\"https://www.ieee-security.org/TC/SP2019/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"strong\",{children:\"40th IEEE Symposium on Security and Privacy\"})})}),\".\"]}),/*#__PURE__*/e(\"h2\",{children:\"Speculative execution\"}),/*#__PURE__*/t(\"p\",{children:[\"A CPU could start a course of action without confirming that it is the correct path. In other words, \",/*#__PURE__*/e(o,{href:\"https://spectreattack.com/spectre.pdf\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:'\"having the CPU guess likely future execution directions and prematurely execute instructions on these paths.\"'})}),\" This means that even before the value that executes an instruction appears, the CPU is already performing it.\"]}),/*#__PURE__*/t(\"p\",{children:[\"This solution responded to the limited number of processes a CPU can execute at the same time. That number is conditioned by each CPU \",/*#__PURE__*/e(o,{href:\"https://techterms.com/definition/clockcycle#:~:text=A%20clock%20cycle%2C%20or%20simply,processes%20require%20multiple%20clock%20cycles.\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"clock cycle\"})}),\". To avoid waiting,\"]}),/*#__PURE__*/e(\"img\",{alt:\"Kocher et al.\",className:\"framer-image\",height:\"83\",src:\"https://framerusercontent.com/images/Bj7AQ2xGdpO1njC7G7tcdExJzA.png\",srcSet:\"https://framerusercontent.com/images/Bj7AQ2xGdpO1njC7G7tcdExJzA.png?scale-down-to=512 512w,https://framerusercontent.com/images/Bj7AQ2xGdpO1njC7G7tcdExJzA.png?scale-down-to=1024 1024w,https://framerusercontent.com/images/Bj7AQ2xGdpO1njC7G7tcdExJzA.png 1920w\",style:{aspectRatio:\"1920 / 167\"},width:\"960\"}),/*#__PURE__*/t(\"h6\",{children:[/*#__PURE__*/e(o,{href:\"https://spectreattack.com/spectre.pdf\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Text fragment from: Kocher et al., 2019\"})}),\".\"]}),/*#__PURE__*/e(\"p\",{children:'When the value is known, a CPU identifies if the speculation was correct. If so, \"the code continues as supposed, and the result would come faster.\" If the assumption was wrong,'}),/*#__PURE__*/e(\"img\",{alt:\"Kocher\",className:\"framer-image\",height:\"75\",src:\"https://framerusercontent.com/images/D7rhtNhXrGNioq3NJq2cfhqB3Nw.png\",srcSet:\"https://framerusercontent.com/images/D7rhtNhXrGNioq3NJq2cfhqB3Nw.png?scale-down-to=512 512w,https://framerusercontent.com/images/D7rhtNhXrGNioq3NJq2cfhqB3Nw.png?scale-down-to=1024 1024w,https://framerusercontent.com/images/D7rhtNhXrGNioq3NJq2cfhqB3Nw.png 1920w\",style:{aspectRatio:\"1920 / 150\"},width:\"960\"}),/*#__PURE__*/t(\"h6\",{children:[/*#__PURE__*/e(o,{href:\"https://spectreattack.com/spectre.pdf\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Text fragment from: Kocher et al., 2019\"})}),\".\"]}),/*#__PURE__*/t(\"p\",{children:['There is no cost in time or resources since the alternative option is to wait for the value to be revealed. Then either the CPU expects data to execute orders or \"get ahead of the job\" and perform the process before the command. However, over time it was seen that ',/*#__PURE__*/e(o,{href:\"https://www.ieee-security.org/TC/SP2019/SP19-Slides-pdfs/Paul_Kocher_01_-_Spectre_Attacks-IEEE-SecurityPrivacy_v05.pdf\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"there were security implications from speculative execution\"})}),\". In fact, the CPU was opening a vulnerability on its own: a \",/*#__PURE__*/e(\"strong\",{children:\"fault attack\"}),\" hardware was built-in.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Branch Predictor and Out-of-bounds\"}),/*#__PURE__*/t(\"p\",{children:[\"One way to change instructions is by taking advantage of \",/*#__PURE__*/e(\"strong\",{children:\"Branch predictors\"}),\". These are architectural units used \",/*#__PURE__*/e(o,{href:\"https://spectrum.ieee.org/computing/hardware/how-the-spectre-and-meltdown-hacks-really-worked\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:'\"to guess where guess where the next instruction, after a branch, will come from.\"'})}),\" Through them, the CPU speculates whether a conditional branch will be taken and the possible outcome of the instruction if it is executed. If the speculation is wrong, the CPU will reverse all registry contents back to where they were before proceeding.\"]}),/*#__PURE__*/t(\"p\",{children:[\"Now, the CPU performs a legal \",/*#__PURE__*/e(o,{href:\"https://help.fluidattacks.com/portal/en/kb/articles/criteria-vulnerabilities-111/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"out-of-bounds\"})}),\", i.e., \",/*#__PURE__*/e(o,{href:\"https://cwe.mitre.org/data/definitions/125.html\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:'\"the software reads data past the end, or before the beginning, of the intended buffer.\"'})}),\" The Buffer is a memory piece in the processor that allows returning from cache or temporary memory to complete long-lasting memory addresses. Here is where a security breach is performed. In Kocher’s words, the problem is that:\"]}),/*#__PURE__*/e(\"img\",{alt:\"From Kocher's presentation\",className:\"framer-image\",height:\"150\",src:\"https://framerusercontent.com/images/yzRanepu8eu92aUo9QQZu5alCE.png\",srcSet:\"https://framerusercontent.com/images/yzRanepu8eu92aUo9QQZu5alCE.png?scale-down-to=512 512w,https://framerusercontent.com/images/yzRanepu8eu92aUo9QQZu5alCE.png?scale-down-to=1024 1024w,https://framerusercontent.com/images/yzRanepu8eu92aUo9QQZu5alCE.png 1920w\",style:{aspectRatio:\"1920 / 300\"},width:\"960\"}),/*#__PURE__*/t(\"h6\",{children:[/*#__PURE__*/e(o,{href:\"https://youtu.be/zOvBHxMjNls?t=331\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Fragment from Kocher’s presentation\"})}),\".\"]}),/*#__PURE__*/e(\"p\",{children:\"What is astonishing is that it is not only allowed, but it is integrated into CPU operations!\"}),/*#__PURE__*/t(\"p\",{children:[\"This vulnerability has been widely known and analyzed. Since 2018, when it first came to light, Intel and AMD, two of the world’s biggest processor companies, \",/*#__PURE__*/e(o,{href:\"https://spectrum.ieee.org/computing/hardware/how-the-spectre-and-meltdown-hacks-really-worked\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:'\"adjusted their microcode to change the behavior of some assembly-language instructions in ways that limit speculation.\"'})}),' Their solution was to limit \"spaces\" in which speculation is allowed. By doing so, they made specific processing moments safer but slower.']}),/*#__PURE__*/e(\"h2\",{children:\"Spectre reappearance\"}),/*#__PURE__*/t(\"p\",{children:[\"A paper published by the University of Virginia concludes that this threat is not over yet. \",/*#__PURE__*/e(o,{href:\"https://engineering.virginia.edu/news/2021/04/defenseless-uva-engineering-computer-scientists-discover-vulnerability-affecting\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Researchers have\"})}),' \"uncovered a line of attack that breaks all Spectre defenses,\" which means that \"billions of computers and other devices across the globe are just as vulnerable today as they were when Spectre was first announced.\"']}),/*#__PURE__*/t(\"p\",{children:[\"Specifications of this new threat can be reviewed in their \",/*#__PURE__*/e(o,{href:\"https://www.cs.virginia.edu/venkat/papers/isca2021a.pdf\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"article (Ren et al., 2021).\"})}),\" However, the main risk identified in their study is that Spectre vulnerability is not in the software but in the hardware. Notably, Intel, AMD, and AMR processors use \",/*#__PURE__*/e(o,{href:\"https://erik-engheim.medium.com/what-the-heck-is-a-micro-operation-e991f76209e\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"micro-ops\"})}),\" to process complex instructions into small micro-op caches. And \",/*#__PURE__*/e(o,{href:\"https://www.cs.virginia.edu/venkat/papers/isca2021a.pdf\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"published research\"})}),' describes \"attacks that exploit the micro-op cache as a timing channel to transmit secret information.\" As a result of those attacks, criminals can leak secrets in three primary settings (see those settings in detail ',/*#__PURE__*/e(o,{href:\"https://www.cs.virginia.edu/venkat/papers/isca2021a.pdf\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"here\"})}),\").\"]}),/*#__PURE__*/t(\"p\",{children:[\"Although this finding is recent and will be publicly discussed this year in June at the \",/*#__PURE__*/e(o,{href:\"https://www.iscaconf.org/isca2021/program/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"strong\",{children:\"International Symposium on Computer Architecture\"})})}),\", the team that wrote the paper has already talked to Intel and AMD about their findings. On May 4, an \",/*#__PURE__*/e(o,{href:\"https://itwire.com/security/us-researchers-find-flaw-affecting-processors-made-since-2011.html\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Intel spokesman said\"})}),': \"that existing mitigations were not being bypassed and that this scenario was addressed in its secure coding guidance.\" Still, that response is disappointing because the problem should not be solved using constant-time programming. Instead, it should be fixed from its source: processors.']}),/*#__PURE__*/e(\"h2\",{children:\"Not-so-perfect crime\"}),/*#__PURE__*/e(\"p\",{children:\"Let us go back to our crime scene. The key is in the truth serum test. Is it possible that the employee does not remember what he did? Why did he act this way, if he is the assassin? What did he use to get through the victim’s heart? The answer is, perhaps, in the excessive pool of blood. If there is a way to make an object disappear in a couple of hours… Can you think of what it could be?\"}),/*#__PURE__*/t(\"p\",{children:[\"We hope you have enjoyed this post, and we look forward to hearing from you. By the way, do you need help with \",/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/cybersecurity-essentials/what-is-vulnerability-management/\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"vulnerability management\"})}),\"? \",/*#__PURE__*/e(o,{href:\"https://fluidattacks.com/contact-us\",motionChild:!0,nodeId:\"WJBZI1Ghk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Contact us!\"})})]})]});export const richText17=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"In this blog, we will not delve into Colonial Pipelines, though we will mention some details about them. Instead, our spotlight will be the self-appointed criminal gang called DarkSide, which was behind the attack. How they operate, who they are, and, more importantly, how can your company avoid becoming a victim of such an attack?\"})});\nexport const __FramerMetadata__ = {\"exports\":{\"richText4\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText17\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText12\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText10\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText1\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText16\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText5\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText9\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText7\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText14\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText8\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText2\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText11\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText6\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText13\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText15\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText3\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"__FramerMetadata__\":{\"type\":\"variable\"}}}"],"mappings":"2dACa,AADb,GAAkD,IAA4D,IAAuC,IAAwB,IAA4G,CAAa,EAAsB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,4XAA6X,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,yhBAA0hB,EAAC,CAAc,EAAE,MAAM,CAAC,IAAI,yBAAyB,UAAU,eAAe,OAAO,MAAM,IAAI,uEAAuE,OAAO,uQAAuQ,MAAM,CAAC,YAAY,YAAa,EAAC,MAAM,KAAM,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAC,WAAwB,EAAEA,EAAE,CAAC,KAAK,kEAAkE,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,0CAA2C,EAAC,AAAC,EAAC,CAAC,GAAI,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAuB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,SAAS,mBAAoB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAED,EAAE,CAAC,KAAK,kDAAkD,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,oBAAqB,EAAC,AAAC,EAAC,CAAC,YAAyB,EAAE,SAAS,CAAC,SAAS,UAAW,EAAC,CAAC,SAAsB,EAAE,KAAK,CAAE,EAAC,CAAC,qDAAkE,EAAED,EAAE,CAAC,KAAK,4EAA4E,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,8BAA+B,EAAC,AAAC,EAAC,CAAC,4LAAyM,EAAE,SAAS,CAAC,SAAS,uBAAwB,EAAC,CAAC,oBAAiC,EAAED,EAAE,CAAC,KAAK,kDAAkD,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,qBAAsB,EAAC,AAAC,EAAC,CAAC,sBAAmC,EAAE,SAAS,CAAC,SAAS,2BAA4B,EAAC,CAAC,qLAAkM,EAAED,EAAE,CAAC,KAAK,0FAA0F,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,UAAW,EAAC,AAAC,EAAC,CAAC,mTAAoT,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,gCAAiC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAED,EAAE,CAAC,KAAK,mEAAmE,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,uBAAwB,EAAC,AAAC,EAAC,CAAC,aAA0B,EAAE,SAAS,CAAC,SAAS,UAAW,EAAC,CAAC,gBAA6B,EAAE,KAAK,CAAE,EAAC,CAAC,2pBAAwqB,EAAE,SAAS,CAAC,SAAS,qBAAsB,EAAC,CAAC,2CAAwD,EAAE,SAAS,CAAC,SAAS,uBAAwB,EAAC,CAAC,2HAA4H,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,0XAAuY,EAAED,EAAE,CAAC,KAAK,oFAAoF,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,sEAAuE,EAAC,AAAC,EAAC,CAAC,MAAmB,EAAE,SAAS,CAAC,SAAS,qDAAsD,EAAC,CAAC,GAAI,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wCAAyC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAED,EAAE,CAAC,KAAK,wEAAwE,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,gCAAiC,EAAC,AAAC,EAAC,CAAC,IAAiB,EAAE,KAAK,CAAE,EAAC,CAAC,sHAAmI,EAAED,EAAE,CAAC,KAAK,mDAAmD,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,YAAa,EAAC,AAAC,EAAC,CAAC,sGAAmH,EAAED,EAAE,CAAC,KAAK,mDAAmD,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,iCAAkC,EAAC,AAAC,EAAC,CAAC,uCAAoD,EAAED,EAAE,CAAC,KAAK,wEAAwE,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,UAAW,EAAC,AAAC,EAAC,CAAC,kGAA+G,EAAED,EAAE,CAAC,KAAK,sFAAsF,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,kBAAmB,EAAC,AAAC,EAAC,CAAC,+CAA4D,EAAED,EAAE,CAAC,KAAK,oGAAoG,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,gBAAiB,EAAC,AAAC,EAAC,CAAC,qHAAsH,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,kDAAmD,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAED,EAAE,CAAC,KAAK,+CAA+C,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,+BAAgC,EAAC,AAAC,EAAC,CAAC,IAAiB,EAAE,KAAK,CAAE,EAAC,CAAC,YAAyB,EAAE,SAAS,CAAC,SAAS,cAAe,EAAC,CAAC,6FAA0G,EAAED,EAAE,CAAC,KAAK,gHAAgH,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,gFAAiF,EAAC,AAAC,EAAC,CAAC,4FAAyG,EAAE,SAAS,CAAC,SAAS,WAAY,EAAC,CAAC,oCAAiD,EAAED,EAAE,CAAC,KAAK,+CAA+C,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,sCAAuC,EAAC,AAAC,EAAC,CAAC,kYAAmY,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wCAAyC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAED,EAAE,CAAC,KAAK,uDAAuD,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,8BAA+B,EAAC,AAAC,EAAC,CAAC,IAAiB,EAAE,KAAK,CAAE,EAAC,CAAC,YAAyB,EAAE,SAAS,CAAC,SAAS,cAAe,EAAC,CAAC,kKAA+K,EAAED,EAAE,CAAC,KAAK,wFAAwF,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,UAAW,EAAC,AAAC,EAAC,CAAC,uUAAoV,EAAED,EAAE,CAAC,KAAK,iFAAiF,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,kBAAmB,EAAC,AAAC,EAAC,CAAC,gDAA6D,EAAE,SAAS,CAAC,SAAS,2BAA4B,EAAC,CAAC,6HAA8H,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,4CAA6C,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAED,EAAE,CAAC,KAAK,gDAAgD,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,+BAAgC,EAAC,AAAC,EAAC,CAAC,IAAiB,EAAE,KAAK,CAAE,EAAC,CAAC,WAAwB,EAAE,SAAS,CAAC,SAAS,uBAAwB,EAAC,CAAC,mMAAgN,EAAED,EAAE,CAAC,KAAK,oFAAoF,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,qBAAsB,EAAC,AAAC,EAAC,CAAC,mBAAgC,EAAED,EAAE,CAAC,KAAK,yCAAyC,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,sBAAuB,EAAC,AAAC,EAAC,CAAC,oTAAiU,EAAE,SAAS,CAAC,SAAS,YAAa,EAAC,CAAC,iCAAkC,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,kCAAmC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAED,EAAE,CAAC,KAAK,8CAA8C,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,8BAA+B,EAAC,AAAC,EAAC,CAAC,IAAiB,EAAE,KAAK,CAAE,EAAC,CAAC,wBAAqC,EAAED,EAAE,CAAC,KAAK,qDAAqD,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,6BAA8B,EAAC,AAAC,EAAC,CAAC,8DAA2E,EAAE,SAAS,CAAC,SAAS,uBAAwB,EAAC,CAAC,yOAAsP,EAAED,EAAE,CAAC,KAAK,qFAAqF,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,gBAAiB,EAAC,AAAC,EAAC,CAAC,wXAAyX,CAAC,EAAC,CAAc,EAAE,MAAM,CAAC,IAAI,4BAA4B,UAAU,eAAe,OAAO,MAAM,IAAI,uEAAuE,OAAO,uQAAuQ,MAAM,CAAC,YAAY,YAAa,EAAC,MAAM,KAAM,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAC,WAAwB,EAAED,EAAE,CAAC,KAAK,sEAAsE,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,mBAAoB,EAAC,AAAC,EAAC,CAAC,GAAI,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,6PAA0Q,EAAED,EAAE,CAAC,KAAK,2CAA2C,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,cAAe,EAAC,AAAC,EAAC,CAAC,kFAAmF,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,4DAAyE,EAAED,EAAE,CAAC,KAAK,uEAAuE,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,YAAa,EAAC,AAAC,EAAC,CAAC,gEAA6E,EAAED,EAAE,CAAC,KAAK,uCAAuC,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,aAAc,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,QAAqB,EAAE,KAAK,CAAE,EAAC,CAAc,EAAE,KAAK,CAAE,EAAC,CAAC,MAAmB,EAAE,SAAS,CAAC,SAAS,GAAI,EAAC,CAAc,EAAE,KAAK,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,yCAA0C,EAAC,AAAC,EAAC,CAAc,EAAED,EAAE,CAAC,KAAK,+DAA+D,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAsB,EAAE,KAAK,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,+CAAgD,EAAC,AAAC,EAAC,AAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,CAAC,wFAAqG,EAAE,KAAK,CAAE,EAAC,CAAc,EAAE,KAAK,CAAE,EAAC,AAAC,CAAC,EAAC,AAAC,EAAC,CAAC,OAAQ,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAuB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,8HAA2I,EAAE,SAAS,CAAC,SAAS,wCAAyC,EAAC,CAAC,KAAkB,EAAE,SAAS,CAAC,SAAS,MAAO,EAAC,CAAC,sDAAmE,EAAED,EAAE,CAAC,KAAK,4CAA4C,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,cAAe,EAAC,AAAC,EAAC,CAAC,kKAAmK,CAAC,EAAC,CAAc,EAAE,MAAM,CAAC,IAAI,OAAO,UAAU,eAAe,OAAO,MAAM,IAAI,uEAAuE,OAAO,uQAAuQ,MAAM,CAAC,YAAY,YAAa,EAAC,MAAM,KAAM,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAC,aAA0B,EAAED,EAAE,CAAC,KAAK,qCAAqC,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,MAAO,EAAC,AAAC,EAAC,CAAC,GAAI,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAuB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,SAAS,mBAAoB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,OAAoB,EAAED,EAAE,CAAC,KAAK,2DAA2D,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,MAAO,EAAC,AAAC,EAAC,CAAC,mUAAoU,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,oDAAiE,EAAED,EAAE,CAAC,KAAK,2EAA2E,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,qBAAsB,EAAC,AAAC,EAAC,CAAC,sVAAmW,EAAED,EAAE,CAAC,KAAK,+FAA+F,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,0CAA2C,EAAC,AAAC,EAAC,CAAC,qWAAsW,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,uBAAoC,EAAED,EAAE,CAAC,KAAK,4CAA4C,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,yBAA0B,EAAC,AAAC,EAAC,CAAC,+FAA4G,EAAED,EAAE,CAAC,KAAK,mFAAmF,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,gBAAiB,EAAC,AAAC,EAAC,CAAC,+DAA4E,EAAED,EAAE,CAAC,KAAK,+BAA+B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,8BAA+B,EAAC,AAAC,EAAC,CAAC,kMAA+M,EAAED,EAAE,CAAC,KAAK,+BAA+B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,oBAAqB,EAAC,AAAC,EAAC,CAAC,iQAAkQ,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,+MAA4N,EAAED,EAAE,CAAC,KAAK,yDAAyD,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,8BAA+B,EAAC,AAAC,EAAC,CAAC,mCAAgD,EAAED,EAAE,CAAC,KAAK,+BAA+B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,yBAA0B,EAAC,AAAC,EAAC,CAAC,uRAAwR,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,iBAAkB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,wUAAqV,EAAED,EAAE,CAAC,KAAK,+BAA+B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,+DAAgE,EAAC,AAAC,EAAC,CAAC,uGAAwG,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,iCAA8C,EAAED,EAAE,CAAC,KAAK,4CAA4C,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,kBAAmB,EAAC,AAAC,EAAC,CAAC,+bAAgc,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,6IAA0J,EAAED,EAAE,CAAC,KAAK,8EAA8E,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,iBAAkB,EAAC,AAAC,EAAC,CAAC,0WAA2W,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,iCAAkC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,wCAAqD,EAAED,EAAE,CAAC,KAAK,kEAAkE,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,MAAO,EAAC,AAAC,EAAC,CAAC,yPAAsQ,EAAE,SAAS,CAAC,SAAS,KAAM,EAAC,CAAC,8TAA+T,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6kBAA8kB,EAAC,CAAc,EAAE,MAAM,CAAC,IAAI,qBAAqB,UAAU,eAAe,OAAO,MAAM,IAAI,sEAAsE,OAAO,oQAAoQ,MAAM,CAAC,YAAY,aAAc,EAAC,MAAM,KAAM,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAC,aAA0B,EAAED,EAAE,CAAC,KAAK,8GAA8G,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,YAAa,EAAC,AAAC,EAAC,CAAC,GAAI,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,qBAAsB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,yCAAsD,EAAE,SAAS,CAAC,SAAS,sCAAuC,EAAC,CAAC,sJAAmK,EAAED,EAAE,CAAC,KAAK,+HAA+H,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,cAAe,EAAC,AAAC,EAAC,CAAC,iKAAkK,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qCAAsC,EAAC,CAAc,EAAE,aAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,sNAAuN,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,iKAA8K,EAAED,EAAE,CAAC,KAAK,oCAAoC,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,gBAAiB,EAAC,AAAC,EAAC,CAAC,8NAA2O,EAAED,EAAE,CAAC,KAAK,iHAAiH,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,iCAAkC,EAAC,AAAC,EAAC,CAAC,mEAAoE,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,uUAAwU,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,iEAA8E,EAAED,EAAE,CAAC,KAAK,uEAAuE,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,YAAa,EAAC,AAAC,EAAC,CAAC,gEAA6E,EAAED,EAAE,CAAC,KAAK,uCAAuC,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,aAAc,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAuB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,yBAAsC,EAAE,OAAO,CAAC,SAAS,MAAO,EAAC,CAAC,+HAA4I,EAAED,EAAE,CAAC,KAAK,mEAAmE,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,WAAY,EAAC,AAAC,EAAC,CAAC,OAAoB,EAAED,EAAE,CAAC,KAAK,0EAA0E,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,iBAAkB,EAAC,AAAC,EAAC,CAAC,uBAAoC,EAAED,EAAE,CAAC,KAAK,mDAAmD,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,qBAAsB,EAAC,AAAC,EAAC,CAAC,GAAI,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,OAAO,CAAC,SAAS,MAAO,EAAC,CAAC,sKAAmL,EAAE,OAAO,CAAC,SAAS,MAAO,EAAC,CAAC,gEAA6E,EAAE,OAAO,CAAC,SAAS,MAAO,EAAC,CAAC,4DAA6D,CAAC,EAAC,CAAc,EAAE,MAAM,CAAC,IAAI,gBAAgB,UAAU,eAAe,OAAO,MAAM,IAAI,qEAAqE,OAAO,iQAAiQ,MAAM,CAAC,YAAY,YAAa,EAAC,MAAM,KAAM,EAAC,AAAC,CAAC,EAAC,CAAc,EAAuB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,qBAAkC,EAAE,OAAO,CAAC,SAAS,MAAO,EAAC,CAAC,4CAAyD,EAAED,EAAE,CAAC,KAAK,2FAA2F,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,WAAY,EAAC,AAAC,EAAC,CAAC,sBAAmC,EAAE,OAAO,CAAC,SAAS,aAAc,EAAC,CAAC,IAAiB,EAAE,OAAO,CAAC,SAAS,KAAM,EAAC,CAAC,IAAiB,EAAED,EAAE,CAAC,KAAK,8EAA8E,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,WAAY,EAAC,AAAC,EAAC,CAAC,GAAI,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,iDAA8D,EAAE,OAAO,CAAC,SAAS,MAAO,EAAC,CAAC,KAAkB,EAAE,OAAO,CAAC,SAAS,UAAW,EAAC,CAAC,uFAAoG,EAAE,OAAO,CAAC,SAAS,KAAM,EAAC,CAAC,qFAAkG,EAAE,OAAO,CAAC,SAAS,MAAO,EAAC,CAAC,oBAAqB,CAAC,EAAC,CAAc,EAAE,MAAM,CAAC,IAAI,oBAAoB,UAAU,eAAe,OAAO,MAAM,IAAI,uEAAuE,OAAO,uQAAuQ,MAAM,CAAC,YAAY,YAAa,EAAC,MAAM,KAAM,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAC,WAAwB,EAAED,EAAE,CAAC,KAAK,qEAAqE,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,WAAY,EAAC,AAAC,EAAC,CAAC,GAAI,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,gGAA6G,EAAE,OAAO,CAAC,SAAS,kBAAmB,EAAC,CAAC,QAAqB,EAAE,OAAO,CAAC,SAAS,kBAAmB,EAAC,CAAC,8IAA+I,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,qBAAkC,EAAED,EAAE,CAAC,KAAK,wCAAwC,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,gBAAiB,EAAC,AAAC,EAAC,CAAC,8IAA2J,EAAE,OAAO,CAAC,SAAS,MAAO,EAAC,CAAC,IAAiB,EAAE,OAAO,CAAC,SAAS,KAAM,EAAC,CAAC,oBAAqB,CAAC,EAAC,CAAc,EAAE,MAAM,CAAC,IAAI,WAAW,UAAU,eAAe,OAAO,MAAM,IAAI,uEAAuE,OAAO,wKAAwK,MAAM,CAAC,YAAY,WAAY,EAAC,MAAM,KAAM,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,6GAA0H,EAAE,OAAO,CAAC,SAAS,MAAO,EAAC,CAAC,6DAA0E,EAAE,OAAO,CAAC,SAAS,MAAO,EAAC,CAAC,eAA4B,EAAE,OAAO,CAAC,SAAS,kBAAmB,EAAC,CAAC,QAAqB,EAAE,OAAO,CAAC,SAAS,kBAAmB,EAAC,CAAC,GAAI,CAAC,EAAC,CAAc,EAAE,MAAM,CAAC,IAAI,eAAe,UAAU,eAAe,OAAO,MAAM,IAAI,uEAAuE,OAAO,uQAAuQ,MAAM,CAAC,YAAY,YAAa,EAAC,MAAM,KAAM,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,mEAAgF,EAAE,OAAO,CAAC,SAAS,kBAAmB,EAAC,CAAC,mCAAgD,EAAE,OAAO,CAAC,SAAS,kBAAmB,EAAC,CAAC,0CAA2C,CAAC,EAAC,CAAc,EAAE,MAAM,CAAC,IAAI,iBAAiB,UAAU,eAAe,OAAO,MAAM,IAAI,wEAAwE,OAAO,0QAA0Q,MAAM,CAAC,YAAY,YAAa,EAAC,MAAM,KAAM,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0BAA2B,EAAC,CAAc,EAAE,MAAM,CAAC,IAAI,iCAAiC,UAAU,eAAe,OAAO,MAAM,IAAI,uEAAuE,OAAO,uQAAuQ,MAAM,CAAC,YAAY,aAAc,EAAC,MAAM,KAAM,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,gDAA6D,EAAE,OAAO,CAAC,SAAS,kBAAmB,EAAC,CAAC,wBAAqC,EAAE,OAAO,CAAC,SAAS,kBAAmB,EAAC,CAAC,GAAI,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,oBAAqB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,6CAA0D,EAAE,OAAO,CAAC,SAAS,kBAAmB,EAAC,CAAC,GAAI,CAAC,EAAC,CAAc,EAAE,MAAM,CAAC,IAAI,iBAAiB,UAAU,eAAe,OAAO,MAAM,IAAI,uEAAuE,OAAO,uQAAuQ,MAAM,CAAC,YAAY,aAAc,EAAC,MAAM,KAAM,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,sDAAuD,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,8CAA+C,EAAC,CAAc,EAAE,MAAM,CAAC,IAAI,4BAA4B,UAAU,eAAe,OAAO,MAAM,IAAI,uEAAuE,OAAO,uQAAuQ,MAAM,CAAC,YAAY,aAAc,EAAC,MAAM,KAAM,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,sJAAmK,EAAE,OAAO,CAAC,SAAS,KAAM,EAAC,CAAC,yBAAsC,EAAE,OAAO,CAAC,SAAS,qBAAsB,EAAC,CAAC,0CAAuD,EAAE,OAAO,CAAC,SAAS,YAAa,EAAC,CAAC,0DAAuE,EAAE,OAAO,CAAC,SAAS,cAAe,EAAC,CAAC,gCAA6C,EAAE,OAAO,CAAC,SAAS,kBAAmB,EAAC,CAAC,yEAA0E,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,0CAAuD,EAAE,OAAO,CAAC,SAAS,kBAAmB,EAAC,CAAC,iHAA8H,EAAE,OAAO,CAAC,SAAS,YAAa,EAAC,CAAC,mBAAoB,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qDAAsD,EAAC,CAAc,EAAE,MAAM,CAAC,IAAI,2BAA2B,UAAU,eAAe,OAAO,MAAM,IAAI,uEAAuE,OAAO,uQAAuQ,MAAM,CAAC,YAAY,YAAa,EAAC,MAAM,KAAM,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,oDAAiE,EAAE,OAAO,CAAC,SAAS,kBAAmB,EAAC,CAAC,wDAAqE,EAAE,OAAO,CAAC,SAAS,mBAAoB,EAAC,CAAC,iBAA8B,EAAE,OAAO,CAAC,SAAS,YAAa,EAAC,CAAC,GAAI,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,+DAA4E,EAAE,OAAO,CAAC,SAAS,kBAAmB,EAAC,CAAC,mCAAoC,CAAC,EAAC,CAAc,EAAE,MAAM,CAAC,UAAU,qBAAqB,MAAM,CAAC,OAAO,OAAO,MAAM,MAAO,EAAC,SAAsB,EAAEC,EAAE,CAAC,oBAAoB,wEAAwE,SAAS,GAAgB,EAAEC,EAAE,CAAC,GAAG,EAAE,KAAK;yBAAkE,SAAS,UAAW,EAAC,AAAC,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,uBAAoC,EAAE,OAAO,CAAC,SAAS,cAAe,EAAC,CAAC,WAAwB,EAAE,OAAO,CAAC,SAAS,YAAa,EAAC,CAAC,QAAqB,EAAE,OAAO,CAAC,SAAS,KAAM,EAAC,CAAC,mCAAgD,EAAE,OAAO,CAAC,SAAS,kBAAmB,EAAC,CAAC,uCAAoD,EAAE,OAAO,CAAC,SAAS,KAAM,EAAC,CAAC,qCAAkD,EAAE,OAAO,CAAC,SAAS,YAAa,EAAC,CAAC,QAAqB,EAAE,OAAO,CAAC,SAAS,IAAK,EAAC,CAAC,4CAA6C,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,uCAAoD,EAAEH,EAAE,CAAC,KAAK,0CAA0C,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,QAAS,EAAC,AAAC,EAAC,CAAC,gCAAiC,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,kDAAmD,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,sBAAuB,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAC,8CAA2D,EAAE,OAAO,CAAC,SAAS,WAAY,EAAC,CAAC,YAAyB,EAAE,OAAO,CAAC,SAAS,MAAO,EAAC,CAAC,aAAc,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAC,sDAAmE,EAAE,OAAO,CAAC,SAAS,kBAAmB,EAAC,CAAC,mCAAgD,EAAE,OAAO,CAAC,SAAS,uBAAwB,EAAC,CAAC,iBAAkB,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAC,8CAA2D,EAAE,OAAO,CAAC,SAAS,QAAS,EAAC,CAAC,8CAA2D,EAAE,OAAO,CAAC,SAAS,0BAA2B,EAAC,CAAC,kBAA+B,EAAE,OAAO,CAAC,SAAS,cAAe,EAAC,CAAC,GAAI,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAC,uBAAoC,EAAE,OAAO,CAAC,SAAS,qBAAsB,EAAC,CAAC,6CAA0D,EAAE,OAAO,CAAC,SAAS,qCAAsC,EAAC,CAAC,GAAI,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,uBAAwB,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAC,cAA2B,EAAE,OAAO,CAAC,SAAS,WAAY,EAAC,CAAC,GAAI,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAC,YAAyB,EAAE,OAAO,CAAC,SAAS,MAAO,EAAC,CAAC,2BAA4B,CAAC,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mCAAoC,EAAC,CAAc,EAAE,MAAM,CAAC,IAAI,iBAAiB,UAAU,eAAe,OAAO,MAAM,IAAI,sEAAsE,OAAO,oQAAoQ,MAAM,CAAC,YAAY,aAAc,EAAC,MAAM,KAAM,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,sBAAmC,EAAE,OAAO,CAAC,SAAS,UAAW,EAAC,CAAC,kCAA+C,EAAE,OAAO,CAAC,SAAS,kBAAmB,EAAC,CAAC,oCAAiD,EAAE,OAAO,CAAC,SAAS,GAAI,EAAC,CAAC,0BAAuC,EAAE,OAAO,CAAC,SAAS,mBAAoB,EAAC,CAAC,8CAA+C,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,YAAa,EAAC,CAAc,EAAE,MAAM,CAAC,IAAI,yBAAyB,UAAU,eAAe,OAAO,MAAM,IAAI,sEAAsE,OAAO,oQAAoQ,MAAM,CAAC,YAAY,aAAc,EAAC,MAAM,KAAM,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,2BAAwC,EAAE,OAAO,CAAC,SAAS,WAAY,EAAC,CAAC,KAAkB,EAAE,OAAO,CAAC,SAAS,iBAAkB,EAAC,CAAC,8BAA+B,CAAC,EAAC,CAAc,EAAE,MAAM,CAAC,IAAI,cAAc,UAAU,eAAe,OAAO,MAAM,IAAI,sEAAsE,OAAO,oQAAoQ,MAAM,CAAC,YAAY,YAAa,EAAC,MAAM,KAAM,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,YAAa,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,kKAA+K,EAAE,OAAO,CAAC,SAAS,kBAAmB,EAAC,CAAC,iBAA8B,EAAE,SAAS,CAAC,SAAS,wCAAyC,EAAC,CAAC,qBAAkC,EAAE,OAAO,CAAC,SAAS,UAAW,EAAC,CAAC,4BAA6B,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAuB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAED,EAAE,CAAC,KAAK,uDAAuD,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,eAAgB,EAAC,AAAC,EAAC,CAAC,sGAAmH,EAAE,SAAS,CAAC,SAAS,sBAAuB,EAAC,CAAC,qFAAkG,EAAED,EAAE,CAAC,KAAK,6CAA6C,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,iBAAkB,EAAC,AAAC,EAAC,CAAC,GAAI,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,8CAA2D,EAAE,SAAS,CAAC,SAAS,mDAAoD,EAAC,CAAC,mBAAgC,EAAE,SAAS,CAAC,SAAS,MAAO,EAAC,CAAC,iEAA8E,EAAED,EAAE,CAAC,KAAK,uEAAuE,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,qBAAsB,EAAC,AAAC,EAAC,CAAC,wHAAyH,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAED,EAAE,CAAC,KAAK,yDAAyD,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,qBAAsB,EAAC,AAAC,EAAC,CAAC,6jBAA8jB,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,8PAA+P,EAAC,CAAc,EAAE,MAAM,CAAC,IAAI,cAAc,UAAU,eAAe,OAAO,MAAM,IAAI,uEAAuE,OAAO,uQAAuQ,MAAM,CAAC,YAAY,YAAa,EAAC,MAAM,KAAM,EAAC,AAAC,CAAC,EAAC,CAAc,EAAuB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,4DAA6D,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,8XAA+X,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0JAA2J,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,UAAW,EAAC,CAAC,iOAA8O,EAAED,EAAE,CAAC,KAAK,mDAAmD,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,YAAa,EAAC,AAAC,EAAC,CAAC,mIAAoI,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,iEAAkE,EAAC,CAAc,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,uCAAwC,EAAC,AAAC,EAAC,AAAC,EAAC,CAAc,EAAE,SAAS,CAAC,SAAS,IAAK,EAAC,CAAC,IAAiB,EAAE,SAAS,CAAC,SAAS,qEAAsE,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0EAA2E,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,uEAAwE,EAAC,CAAC,IAAiB,EAAE,SAAS,CAAC,SAAS,wBAAyB,EAAC,CAAc,EAAED,EAAE,CAAC,KAAK,iCAAiC,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,oEAAqE,EAAC,AAAC,EAAC,AAAC,EAAC,CAAc,EAAE,SAAS,CAAC,SAAS,kCAAmC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,gCAAiC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,mDAAoD,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qNAAsN,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kFAAmF,EAAC,CAAC,IAAiB,EAAE,SAAS,CAAC,SAAS,0BAA2B,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qOAAsO,EAAC,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,iEAAkE,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,yCAAsD,EAAE,SAAS,CAAC,SAAS,6CAA8C,EAAC,CAAC,+EAAgF,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,uDAAoE,EAAE,SAAS,CAAC,SAAS,yCAA0C,EAAC,CAAC,2IAA4I,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,sDAAuD,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,2CAA4C,EAAC,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,kDAAmD,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,+OAAgP,EAAC,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,uCAAwC,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,yEAAsF,EAAE,SAAS,CAAC,SAAS,OAAQ,EAAC,CAAC,gCAAiC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6HAA8H,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,6NAA0O,EAAED,EAAE,CAAC,KAAK,8CAA8C,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,mBAAoB,EAAC,AAAC,EAAC,CAAC,4IAA4J,EAAED,EAAE,CAAC,KAAK,iCAAiC,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,oBAAqB,EAAC,AAAC,EAAC,CAAC,GAAI,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qMAAsM,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,kBAA+B,EAAED,EAAE,CAAC,KAAK,2DAA2D,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,oCAAqC,EAAC,AAAC,EAAC,CAAC,wEAAqF,EAAED,EAAE,CAAC,KAAK,2CAA2C,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,MAAO,EAAC,AAAC,EAAC,CAAC,GAAI,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAuB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,oCAAiD,EAAE,SAAS,CAAC,SAAS,aAAiB,EAAC,CAAC,gBAA6B,EAAE,SAAS,CAAC,SAAS,mBAAoB,EAAC,CAAC,0GAAuH,EAAE,SAAS,CAAC,SAAS,0CAA2C,EAAC,CAAC,KAAkB,EAAE,SAAS,CAAC,SAAS,MAAO,EAAC,CAAC,kBAAmB,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,wCAAqD,EAAED,EAAE,CAAC,KAAK,iDAAiD,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,oBAAqB,EAAC,AAAC,EAAC,CAAC,kDAA+D,EAAED,EAAE,CAAC,KAAK,kDAAkD,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,uGAAwG,EAAC,AAAC,EAAC,CAAC,4QAA6Q,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,iIAAqI,EAAC,CAAc,EAAE,MAAM,CAAC,IAAI,mBAAmB,UAAU,eAAe,OAAO,MAAM,IAAI,sEAAsE,OAAO,oQAAoQ,MAAM,CAAC,YAAY,YAAa,EAAC,MAAM,KAAM,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAC,0BAAuC,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,oBAAqB,EAAC,AAAC,EAAC,CAAC,GAAI,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAuB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,6HAA8H,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,+EAAgF,EAAC,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,sEAAuE,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,iMAAkM,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6IAA8I,EAAC,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,uGAAwG,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,uNAAwN,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,wNAAyN,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,mFAAoF,EAAC,CAAC,IAAiB,EAAE,SAAS,CAAC,SAAS,0CAA2C,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,sNAAuN,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,wHAAyH,EAAC,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,4CAA6C,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,wMAAyM,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,4KAA6K,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,2TAA4T,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,WAAY,EAAC,CAAc,EAAED,EAAE,CAAC,KAAK,kDAAkD,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,yBAA0B,EAAC,AAAC,EAAC,AAAC,EAAC,CAAc,EAAE,SAAS,CAAC,SAAS,gCAAiC,EAAC,CAAc,EAAED,EAAE,CAAC,KAAK,mDAAmD,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,SAAU,EAAC,AAAC,EAAC,AAAC,EAAC,CAAc,EAAE,SAAS,CAAC,SAAS,mEAAoE,EAAC,CAAc,EAAED,EAAE,CAAC,KAAK,2DAA2D,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,QAAS,EAAC,AAAC,EAAC,AAAC,EAAC,CAAc,EAAE,SAAS,CAAC,SAAS,oHAAqH,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,kPAAmP,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,8IAA2J,EAAED,EAAE,CAAC,KAAK,qDAAqD,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,qBAAsB,EAAC,AAAC,EAAC,CAAC,GAAI,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,8DAA+D,EAAC,CAAC,IAAiB,EAAE,SAAS,CAAC,SAAS,8CAA+C,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,wPAAyP,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0CAA2C,EAAC,CAAC,gQAAiQ,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,iCAAkC,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,0NAAuO,EAAE,SAAS,CAAC,SAAS,WAAY,EAAC,CAAC,4FAA6F,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,wGAAyG,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,sKAAuK,EAAC,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,yEAA0E,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mPAAoP,EAAC,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,sDAAuD,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0FAA2F,EAAC,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,kDAAmD,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,wPAAyP,EAAC,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,uCAAwC,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,gDAA6D,EAAE,SAAS,CAAC,SAAS,MAAO,EAAC,CAAC,iCAA8C,EAAED,EAAE,CAAC,KAAK,gDAAgD,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,MAAO,EAAC,AAAC,EAAC,AAAC,EAAC,CAAC,KAAkB,EAAE,SAAS,CAAC,SAAS,MAAO,EAAC,CAAC,QAAqB,EAAE,SAAS,CAAC,SAAS,MAAO,EAAC,CAAC,0EAAuF,EAAE,SAAS,CAAC,SAAS,OAAQ,EAAC,CAAC,wBAAqC,EAAED,EAAE,CAAC,KAAK,6CAA6C,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,MAAO,EAAC,AAAC,EAAC,CAAC,wCAAyC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,iGAAqG,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,sOAA0O,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,kBAA+B,EAAED,EAAE,CAAC,KAAK,2DAA2D,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,oCAAqC,EAAC,AAAC,EAAC,CAAC,4BAAyC,EAAED,EAAE,CAAC,KAAK,mDAAmD,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,UAAW,EAAC,AAAC,EAAC,CAAC,uCAAoD,EAAED,EAAE,CAAC,KAAK,2CAA2C,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,MAAO,EAAC,AAAC,EAAC,CAAC,GAAI,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,2HAAwI,EAAED,EAAE,CAAC,KAAK,sCAAsC,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,mBAAoB,EAAC,AAAC,EAAC,CAAC,4GAA6G,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,gDAA6D,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,eAAgB,EAAC,AAAC,EAAC,CAAC,KAAkB,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,aAAc,EAAC,AAAC,EAAC,CAAC,KAAkB,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,gBAAiB,EAAC,AAAC,EAAC,CAAC,KAAkB,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,kBAAmB,EAAC,AAAC,EAAC,CAAC,QAAqB,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,YAAa,EAAC,AAAC,EAAC,CAAC,oBAAiC,EAAE,SAAS,CAAC,SAAS,aAAc,EAAC,CAAC,gBAA6B,EAAE,SAAS,CAAC,SAAS,0BAA2B,EAAC,CAAC,qCAAkD,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,QAAS,EAAC,AAAC,EAAC,CAAC,ofAAigB,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,YAAa,EAAC,AAAC,EAAC,CAAC,kIAAmI,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,OAAoB,EAAED,EAAE,CAAC,KAAK,iDAAiD,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,KAAM,EAAC,AAAC,EAAC,CAAC,oJAAiK,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,iCAAkC,EAAC,AAAC,EAAC,CAAC,sIAAuI,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,SAAS,SAAU,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,yDAAsE,EAAE,SAAS,CAAC,SAAS,SAAU,EAAC,CAAC,0CAAuD,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,MAAO,EAAC,AAAC,EAAC,CAAC,kDAA+D,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,SAAU,EAAC,AAAC,EAAC,CAAC,gNAA6N,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,4CAA6C,EAAC,AAAC,EAAC,CAAC,IAAK,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,UAAuB,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,oBAAqB,EAAC,AAAC,EAAC,CAAC,6BAA0C,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,sBAAuB,EAAC,AAAC,EAAC,CAAC,qDAAkE,EAAE,SAAS,CAAC,SAAS,MAAO,EAAC,CAAC,uCAAoD,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,KAAM,EAAC,AAAC,EAAC,CAAC,wDAAqE,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,aAAc,EAAC,AAAC,EAAC,CAAC,IAAiB,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAsB,EAAE,KAAK,CAAC,SAAS,eAAgB,EAAC,AAAC,EAAC,AAAC,EAAC,CAAC,8DAA2E,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,wBAAyB,EAAC,AAAC,EAAC,CAAC,4GAA6G,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,gDAA6D,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,cAAe,EAAC,AAAC,EAAC,CAAC,8MAA2N,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,kBAAmB,EAAC,AAAC,EAAC,CAAC,gXAA6X,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,WAAY,EAAC,AAAC,EAAC,CAAC,sGAAuG,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,cAAe,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,UAAuB,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,aAAc,EAAC,AAAC,EAAC,CAAC,SAAsB,EAAED,EAAE,CAAC,KAAK,2BAA2B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,OAAQ,EAAC,AAAC,EAAC,CAAC,wTAAsU,EAAE,SAAS,CAAC,SAAS,UAAW,EAAC,CAAC,8CAA2D,EAAE,SAAS,CAAC,SAAS,YAAa,EAAC,CAAC,oHAAiI,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,sDAAuD,EAAC,AAAC,EAAC,CAAC,GAAI,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,wDAAqE,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,2BAA4B,EAAC,AAAC,EAAC,CAAC,ykBAA0kB,CAAC,EAAC,CAAc,EAAE,MAAM,CAAC,IAAI,UAAU,UAAU,eAAe,OAAO,MAAM,IAAI,qEAAqE,OAAO,iQAAiQ,MAAM,CAAC,YAAY,YAAa,EAAC,MAAM,KAAM,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAC,cAA2B,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,qBAAsB,EAAC,AAAC,EAAC,CAAC,GAAI,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,uBAAwB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,mGAAgH,EAAED,EAAE,CAAC,KAAK,kDAAkD,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,gBAAiB,EAAC,AAAC,EAAC,CAAC,+HAA4I,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,oBAAqB,EAAC,AAAC,EAAC,CAAC,6FAA0G,EAAED,EAAE,CAAC,KAAK,0CAA0C,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,2CAA4C,EAAC,AAAC,EAAC,CAAC,WAAwB,EAAE,SAAS,CAAC,SAAS,oBAAqB,EAAC,CAAC,oBAAiC,EAAE,SAAS,CAAC,SAAS,WAAY,EAAC,CAAC,0BAAuC,EAAE,SAAS,CAAC,SAAS,gBAAiB,EAAC,CAAC,0GAAuH,EAAED,EAAE,CAAC,KAAK,+CAA+C,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,cAAe,EAAC,AAAC,EAAC,CAAC,YAAa,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,qNAAmO,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,2HAA4H,EAAC,AAAC,EAAC,CAAC,gBAA6B,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,uBAAwB,EAAC,AAAC,EAAC,CAAC,0IAAuJ,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,mCAAoC,EAAC,AAAC,EAAC,CAAC,sIAAuI,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,sBAAuB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,ihBAA8hB,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,OAAQ,EAAC,AAAC,EAAC,CAAC,uHAAoI,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,MAAO,EAAC,AAAC,EAAC,CAAC,kBAAmB,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,kFAA+F,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,yCAA0C,EAAC,AAAC,EAAC,CAAC,+bAAgc,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,gNAA6N,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,cAAe,EAAC,AAAC,EAAC,CAAC,4QAAyR,EAAED,EAAE,CAAC,KAAK,yDAAyD,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,MAAO,EAAC,AAAC,EAAC,CAAC,0BAAuC,EAAED,EAAE,CAAC,KAAK,uDAAuD,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,OAAQ,EAAC,AAAC,EAAC,CAAC,4BAAyC,EAAED,EAAE,CAAC,KAAK,8DAA8D,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,UAAW,EAAC,AAAC,EAAC,CAAC,OAAoB,EAAED,EAAE,CAAC,KAAK,yCAAyC,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,SAAU,EAAC,AAAC,EAAC,CAAC,8GAA2H,EAAED,EAAE,CAAC,KAAK,+CAA+C,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,8CAA+C,EAAC,AAAC,EAAC,CAAC,yFAAsG,EAAE,SAAS,CAAC,SAAS,wCAAyC,EAAC,CAAC,GAAI,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,gEAA6E,EAAED,EAAE,CAAC,KAAK,uEAAuE,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,YAAa,EAAC,AAAC,EAAC,CAAC,QAAqB,EAAED,EAAE,CAAC,KAAK,yDAAyD,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,iBAAkB,EAAC,AAAC,EAAC,CAAC,6CAA0D,EAAED,EAAE,CAAC,KAAK,uCAAuC,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,YAAa,EAAC,AAAC,EAAC,CAAC,GAAI,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAED,EAAE,CAAC,KAAK,8GAA8G,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,WAAY,EAAC,AAAC,EAAC,CAAC,KAAkB,EAAE,SAAS,CAAC,SAAS,OAAQ,EAAC,CAAC,qBAAkC,EAAE,SAAS,CAAC,SAAS,kBAAmB,EAAC,CAAC,WAAwB,EAAE,SAAS,CAAC,SAAS,qBAAsB,EAAC,CAAC,6DAA0E,EAAED,EAAE,CAAC,KAAK,+GAA+G,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,0GAA2G,EAAC,AAAC,EAAC,CAAC,4TAA6T,CAAC,EAAC,AAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,SAAS,6BAA8B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,4EAAyF,EAAED,EAAE,CAAC,KAAK,0GAA0G,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,6BAA8B,EAAC,AAAC,EAAC,CAAC,wEAAqF,EAAED,EAAE,CAAC,KAAK,iFAAiF,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,oBAAqB,EAAC,AAAC,EAAC,CAAC,4EAAyF,EAAED,EAAE,CAAC,KAAK,8HAA8H,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,2BAA4B,EAAC,AAAC,EAAC,CAAC,6BAA0C,EAAED,EAAE,CAAC,KAAK,gGAAgG,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,6BAA8B,EAAC,AAAC,EAAC,CAAC,kYAAmY,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,qBAAsB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,gFAA6F,EAAED,EAAE,CAAC,KAAK,iFAAiF,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,gCAAiC,EAAC,AAAC,EAAC,CAAC,+LAA4M,EAAED,EAAE,CAAC,KAAK,wIAAwI,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,MAAO,EAAC,AAAC,EAAC,CAAC,MAAmB,EAAED,EAAE,CAAC,KAAK,6HAA6H,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,gBAAiB,EAAC,AAAC,EAAC,CAAC,qLAAsL,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,wIAAqJ,EAAED,EAAE,CAAC,KAAK,yIAAyI,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,oCAAqC,EAAC,AAAC,EAAC,CAAC,gKAA6K,EAAED,EAAE,CAAC,KAAK,0EAA0E,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,qBAAsB,EAAC,AAAC,EAAC,CAAC,KAAkB,EAAED,EAAE,CAAC,KAAK,oFAAoF,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,2BAA4B,EAAC,AAAC,EAAC,CAAC,gPAAiP,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,qCAAkD,EAAE,SAAS,CAAC,SAAS,wBAAyB,EAAC,CAAC,wFAAyF,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,8BAA+B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,4DAAyE,EAAE,SAAS,CAAC,SAAS,MAAO,EAAC,CAAC,QAAqB,EAAE,SAAS,CAAC,SAAS,OAAQ,EAAC,CAAC,8BAA2C,EAAED,EAAE,CAAC,KAAK,gDAAgD,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,sCAAuC,EAAC,AAAC,EAAC,CAAC,8DAA2E,EAAED,EAAE,CAAC,KAAK,2BAA2B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,OAAQ,EAAC,AAAC,EAAC,CAAC,0MAA2M,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,6FAA0G,EAAED,EAAE,CAAC,KAAK,gDAAgD,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,cAAe,EAAC,AAAC,EAAC,CAAC,kEAA+E,EAAED,EAAE,CAAC,KAAK,6CAA6C,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,aAAc,EAAC,AAAC,EAAC,CAAC,0HAAuI,EAAED,EAAE,CAAC,KAAK,2DAA2D,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,aAAc,EAAC,AAAC,EAAC,CAAC,yGAA0G,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,gPAAiP,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,QAAS,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,uGAAoH,EAAED,EAAE,CAAC,KAAK,sEAAsE,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,iFAAkF,EAAC,AAAC,EAAC,CAAC,wNAAqO,EAAED,EAAE,CAAC,KAAK,gDAAgD,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,4DAA6D,EAAC,AAAC,EAAC,CAAC,6GAA8G,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,mFAAgG,EAAE,SAAS,CAAC,SAAS,QAAS,EAAC,CAAC,4EAAyF,EAAED,EAAE,CAAC,KAAK,0CAA0C,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,cAAe,EAAC,AAAC,EAAC,CAAC,iOAAkO,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wBAAyB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,8IAA2J,EAAED,EAAE,CAAC,KAAK,+GAA+G,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,aAAc,EAAC,AAAC,EAAC,CAAC,kQAAmQ,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,4BAAyC,EAAED,EAAE,CAAC,KAAK,+EAA+E,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,8CAA+C,EAAC,AAAC,EAAC,CAAC,qIAAmJ,EAAED,EAAE,CAAC,KAAK,kFAAkF,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,sJAAuJ,EAAC,AAAC,EAAC,CAAC,IAAK,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,iCAAkC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,0LAAuM,EAAED,EAAE,CAAC,KAAK,wIAAwI,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,kBAAmB,EAAC,AAAC,EAAC,CAAC,8FAA+F,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,8DAA2E,EAAED,EAAE,CAAC,KAAK,+GAA+G,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,cAAe,EAAC,AAAC,EAAC,CAAC,+JAA4K,EAAED,EAAE,CAAC,KAAK,yFAAyF,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,YAAa,EAAC,AAAC,EAAC,CAAC,6HAA0I,EAAED,EAAE,CAAC,KAAK,yFAAyF,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,kCAAmC,EAAC,AAAC,EAAC,CAAC,wKAAyK,CAAC,EAAC,CAAc,EAAE,MAAM,CAAC,IAAI,uBAAuB,UAAU,eAAe,OAAO,MAAM,IAAI,uEAAuE,OAAO,uQAAuQ,MAAM,CAAC,YAAY,YAAa,EAAC,MAAM,KAAM,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAC,WAAwB,EAAED,EAAE,CAAC,KAAK,sEAAsE,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,qBAAsB,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,uNAAoO,EAAED,EAAE,CAAC,KAAK,6CAA6C,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,wBAAyB,EAAC,AAAC,EAAC,CAAC,wIAAqJ,EAAED,EAAE,CAAC,KAAK,sEAAsE,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,0BAA2B,EAAC,AAAC,EAAC,CAAC,qJAAkK,EAAED,EAAE,CAAC,KAAK,uEAAuE,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,qBAAsB,EAAC,AAAC,EAAC,CAAC,GAAI,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,yNAAsO,EAAE,KAAK,CAAC,SAAS,uBAAwB,EAAC,CAAC,oFAAiG,EAAE,SAAS,CAAC,SAAS,uBAAwB,EAAC,CAAC,sHAAuH,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,sCAAmD,EAAE,KAAK,CAAE,EAAC,CAAC,wDAAqE,EAAE,KAAK,CAAE,EAAC,CAAc,EAAED,EAAE,CAAC,KAAK,uCAAuC,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,aAAc,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,SAAS,gBAAiB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,qDAAkE,EAAE,SAAS,CAAC,SAAS,OAAQ,EAAC,CAAC,+IAA4J,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,iBAAkB,EAAC,AAAC,EAAC,CAAC,+BAA4C,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,iHAAkH,EAAC,AAAC,EAAC,CAAC,GAAI,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,KAAM,EAAC,CAAC,IAAiB,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,0BAA2B,EAAC,AAAC,EAAC,CAAC,0CAAuD,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,6BAA8B,EAAC,AAAC,EAAC,CAAC,4FAAyG,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,0BAA2B,EAAC,AAAC,EAAC,CAAC,6GAA0H,EAAED,EAAE,CAAC,KAAK,4CAA4C,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,mBAAoB,EAAC,AAAC,EAAC,CAAC,iBAA8B,EAAED,EAAE,CAAC,KAAK,+GAA+G,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,WAAY,EAAC,AAAC,EAAC,CAAC,2DAA4D,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,kDAA+D,EAAED,EAAE,CAAC,KAAK,4CAA4C,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,YAAa,EAAC,AAAC,EAAC,AAAC,EAAC,CAAC,QAAqB,EAAED,EAAE,CAAC,KAAK,yDAAyD,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,gCAAiC,EAAC,AAAC,EAAC,AAAC,EAAC,CAAC,2EAAwF,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,4CAA6C,EAAC,AAAC,EAAC,CAAC,gGAAiG,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,yBAA0B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,OAAoB,EAAE,SAAS,CAAC,SAAS,QAAS,EAAC,CAAC,6CAA0D,EAAED,EAAE,CAAC,KAAK,yCAAyC,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,kBAAmB,EAAC,AAAC,EAAC,CAAC,wGAAqH,EAAED,EAAE,CAAC,KAAK,wBAAwB,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,OAAQ,EAAC,AAAC,EAAC,CAAC,yEAA0E,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,sBAAmC,EAAED,EAAE,CAAC,KAAK,oDAAoD,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,OAAQ,EAAC,AAAC,EAAC,CAAC,0GAAuH,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,CAAC,YAAyB,EAAE,SAAS,CAAC,SAAS,YAAa,EAAC,AAAC,CAAC,EAAC,AAAC,EAAC,CAAC,oBAAiC,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,YAAa,EAAC,AAAC,EAAC,CAAC,iGAA8G,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,0CAA2C,EAAC,AAAC,EAAC,CAAC,qDAAsD,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,UAAuB,EAAED,EAAE,CAAC,KAAK,yDAAyD,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,WAAY,EAAC,AAAC,EAAC,CAAC,6BAA0C,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,gCAAiC,EAAC,AAAC,EAAC,CAAC,kGAA+G,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,iBAAkB,EAAC,AAAC,EAAC,CAAC,qFAAkG,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,eAAgB,EAAC,AAAC,EAAC,CAAC,oDAAqD,CAAC,EAAC,CAAc,EAAE,MAAM,CAAC,IAAI,iBAAiB,UAAU,eAAe,OAAO,MAAM,IAAI,sEAAsE,OAAO,oQAAoQ,MAAM,CAAC,YAAY,YAAa,EAAC,MAAM,KAAM,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAC,aAA0B,EAAED,EAAE,CAAC,KAAK,iEAAiE,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,gBAAiB,EAAC,AAAC,EAAC,CAAC,GAAI,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,uJAAoK,EAAED,EAAE,CAAC,KAAK,8CAA8C,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,eAAgB,EAAC,AAAC,EAAC,CAAC,+CAA4D,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,uBAAwB,EAAC,AAAC,EAAC,CAAC,qQAAkR,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,6BAA8B,EAAC,AAAC,EAAC,CAAC,4OAAyP,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,wBAAyB,EAAC,AAAC,EAAC,CAAC,uFAAwF,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wBAAyB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,6CAA0D,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,sCAAuC,EAAC,AAAC,EAAC,CAAC,4IAAyJ,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,2GAA4G,EAAC,AAAC,EAAC,CAAC,oGAAiH,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,sEAAuE,EAAC,AAAC,EAAC,CAAC,IAAK,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,iCAA8C,EAAED,EAAE,CAAC,KAAK,gEAAgE,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,+DAAgE,EAAC,AAAC,EAAC,CAAC,kGAA+G,EAAED,EAAE,CAAC,KAAK,+CAA+C,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,aAAc,EAAC,AAAC,EAAC,CAAC,6BAA0C,EAAED,EAAE,CAAC,KAAK,sEAAsE,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,KAAM,EAAC,AAAC,EAAC,CAAC,qDAAkE,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,oGAAqG,EAAC,AAAC,EAAC,CAAC,IAAK,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,oBAAqB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,sCAAmD,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,gCAAiC,EAAC,AAAC,EAAC,CAAC,kCAA+C,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,iBAAkB,EAAC,AAAC,EAAC,CAAC,6RAA0S,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,wDAAyD,EAAC,AAAC,EAAC,CAAC,GAAI,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,qJAAkK,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,+BAAgC,EAAC,AAAC,EAAC,CAAC,4NAAyO,EAAED,EAAE,CAAC,KAAK,uDAAuD,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,uBAAwB,EAAC,AAAC,EAAC,CAAC,+SAAgT,CAAC,EAAC,CAAc,EAAE,MAAM,CAAC,IAAI,GAAG,UAAU,eAAe,OAAO,MAAM,IAAI,uEAAuE,OAAO,uQAAuQ,MAAM,CAAC,YAAY,aAAc,EAAC,MAAM,KAAM,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAC,wBAAqC,EAAED,EAAE,CAAC,KAAK,4DAA4D,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,KAAM,EAAC,AAAC,EAAC,CAAC,GAAI,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,oIAAiJ,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,uBAAwB,EAAC,AAAC,EAAC,CAAC,OAAQ,CAAC,EAAC,CAAc,EAAE,aAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sBAAuB,EAAC,CAAC,sKAAuK,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,gWAA6W,EAAED,EAAE,CAAC,KAAK,oDAAoD,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,cAAe,EAAC,AAAC,EAAC,CAAC,sFAAuF,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,yBAA0B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,cAA2B,EAAED,EAAE,CAAC,KAAK,8DAA8D,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,mBAAoB,EAAC,AAAC,EAAC,CAAC,2BAAwC,EAAED,EAAE,CAAC,KAAK,8CAA8C,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,cAAe,EAAC,AAAC,EAAC,CAAC,yDAAsE,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,QAAS,EAAC,AAAC,EAAC,CAAC,gPAAiP,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,mSAAgT,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,mCAAoC,EAAC,AAAC,EAAC,CAAC,WAAwB,EAAED,EAAE,CAAC,KAAK,0CAA0C,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,UAAW,EAAC,AAAC,EAAC,CAAC,0BAAuC,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,+BAAgC,EAAC,AAAC,EAAC,CAAC,YAAa,CAAC,EAAC,CAAc,EAAE,aAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,uJAAwJ,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,0MAAuN,EAAED,EAAE,CAAC,KAAK,6CAA6C,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,UAAW,EAAC,AAAC,EAAC,CAAC,SAAU,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,4DAAyE,EAAED,EAAE,CAAC,KAAK,uEAAuE,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,YAAa,EAAC,AAAC,EAAC,CAAC,gEAA6E,EAAED,EAAE,CAAC,KAAK,uCAAuC,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,YAAa,EAAC,AAAC,EAAC,CAAC,GAAI,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,SAAU,EAAC,CAAC,+RAA4S,EAAE,SAAS,CAAC,SAAS,mBAAoB,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,sSAAuS,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,ihBAAkhB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qLAAsL,EAAC,AAAC,CAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,SAAS,SAAU,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAED,EAAE,CAAC,KAAK,yHAAyH,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,YAAa,EAAC,AAAC,EAAC,CAAC,6CAA0D,EAAED,EAAE,CAAC,KAAK,sCAAsC,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,oEAAqE,EAAC,AAAC,EAAC,CAAC,uIAAoJ,EAAED,EAAE,CAAC,KAAK,8CAA8C,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,oCAAqC,EAAC,AAAC,EAAC,CAAC,wEAAqF,EAAE,SAAS,CAAC,SAAS,uBAAwB,EAAC,CAAC,qCAAkD,EAAED,EAAE,CAAC,KAAK,0EAA0E,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,uFAAwF,EAAC,AAAC,EAAC,CAAC,kFAAmF,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,wCAAqD,EAAE,SAAS,CAAC,SAAS,uBAAwB,EAAC,CAAC,2CAAwD,EAAED,EAAE,CAAC,KAAK,+BAA+B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAsB,EAAE,KAAK,CAAC,SAAS,kDAAmD,EAAC,AAAC,EAAC,AAAC,EAAC,CAAC,4DAAyE,EAAED,EAAE,CAAC,KAAK,8BAA8B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,YAAa,EAAC,AAAC,EAAC,CAAC,uBAAoC,EAAED,EAAE,CAAC,KAAK,2CAA2C,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,6CAA8C,EAAC,AAAC,EAAC,AAAC,EAAC,CAAC,GAAI,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,uBAAwB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,wGAAqH,EAAED,EAAE,CAAC,KAAK,wCAAwC,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,gHAAiH,EAAC,AAAC,EAAC,CAAC,gHAAiH,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,yIAAsJ,EAAED,EAAE,CAAC,KAAK,0IAA0I,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,aAAc,EAAC,AAAC,EAAC,CAAC,qBAAsB,CAAC,EAAC,CAAc,EAAE,MAAM,CAAC,IAAI,gBAAgB,UAAU,eAAe,OAAO,KAAK,IAAI,sEAAsE,OAAO,oQAAoQ,MAAM,CAAC,YAAY,YAAa,EAAC,MAAM,KAAM,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAED,EAAE,CAAC,KAAK,wCAAwC,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,yCAA0C,EAAC,AAAC,EAAC,CAAC,GAAI,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mLAAoL,EAAC,CAAc,EAAE,MAAM,CAAC,IAAI,SAAS,UAAU,eAAe,OAAO,KAAK,IAAI,uEAAuE,OAAO,uQAAuQ,MAAM,CAAC,YAAY,YAAa,EAAC,MAAM,KAAM,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAED,EAAE,CAAC,KAAK,wCAAwC,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,yCAA0C,EAAC,AAAC,EAAC,CAAC,GAAI,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,4QAAyR,EAAED,EAAE,CAAC,KAAK,yHAAyH,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,6DAA8D,EAAC,AAAC,EAAC,CAAC,gEAA6E,EAAE,SAAS,CAAC,SAAS,cAAe,EAAC,CAAC,yBAA0B,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,oCAAqC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,4DAAyE,EAAE,SAAS,CAAC,SAAS,mBAAoB,EAAC,CAAC,wCAAqD,EAAED,EAAE,CAAC,KAAK,gGAAgG,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,oFAAqF,EAAC,AAAC,EAAC,CAAC,gQAAiQ,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,iCAA8C,EAAED,EAAE,CAAC,KAAK,oFAAoF,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,eAAgB,EAAC,AAAC,EAAC,CAAC,WAAwB,EAAED,EAAE,CAAC,KAAK,kDAAkD,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,0FAA2F,EAAC,AAAC,EAAC,CAAC,sOAAuO,CAAC,EAAC,CAAc,EAAE,MAAM,CAAC,IAAI,6BAA6B,UAAU,eAAe,OAAO,MAAM,IAAI,sEAAsE,OAAO,oQAAoQ,MAAM,CAAC,YAAY,YAAa,EAAC,MAAM,KAAM,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAED,EAAE,CAAC,KAAK,qCAAqC,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,qCAAsC,EAAC,AAAC,EAAC,CAAC,GAAI,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,+FAAgG,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,kKAA+K,EAAED,EAAE,CAAC,KAAK,gGAAgG,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,0HAA2H,EAAC,AAAC,EAAC,CAAC,6IAA8I,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,sBAAuB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,+FAA4G,EAAED,EAAE,CAAC,KAAK,iIAAiI,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,kBAAmB,EAAC,AAAC,EAAC,CAAC,yNAA0N,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,8DAA2E,EAAED,EAAE,CAAC,KAAK,0DAA0D,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,6BAA8B,EAAC,AAAC,EAAC,CAAC,2KAAwL,EAAED,EAAE,CAAC,KAAK,iFAAiF,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,WAAY,EAAC,AAAC,EAAC,CAAC,oEAAiF,EAAED,EAAE,CAAC,KAAK,0DAA0D,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,oBAAqB,EAAC,AAAC,EAAC,CAAC,6NAA0O,EAAED,EAAE,CAAC,KAAK,0DAA0D,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,MAAO,EAAC,AAAC,EAAC,CAAC,IAAK,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,2FAAwG,EAAED,EAAE,CAAC,KAAK,6CAA6C,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,kDAAmD,EAAC,AAAC,EAAC,AAAC,EAAC,CAAC,0GAAuH,EAAED,EAAE,CAAC,KAAK,iGAAiG,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,sBAAuB,EAAC,AAAC,EAAC,CAAC,oSAAqS,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,sBAAuB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0YAA2Y,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,kHAA+H,EAAED,EAAE,CAAC,KAAK,sFAAsF,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,0BAA2B,EAAC,AAAC,EAAC,CAAC,KAAkB,EAAED,EAAE,CAAC,KAAK,sCAAsC,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,aAAc,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAwB,EAAA,EAAa,CAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,+UAAgV,EAAC,AAAC,EAAC,CAC357I,EAAqB,CAAC,QAAU,CAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,SAAW,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,mBAAqB,CAAC,KAAO,UAAW,CAAC,CAAC"}