{"id":1416,"date":"2021-04-21T05:34:00","date_gmt":"2021-04-21T05:34:00","guid":{"rendered":"\/cybersecurity-blog\/?p=1416"},"modified":"2024-07-24T14:37:41","modified_gmt":"2024-07-24T14:37:41","slug":"release-notes-21-04","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/release-notes-21-04\/","title":{"rendered":"Release Notes   April 21, 2021"},"content":{"rendered":"\n<p>ANY.RUN is back with changes!&nbsp;<br><\/p>\n\n\n\n<p>We always listen to our users and try to make your experience with the service better and more convenient. This release is all about the New task window.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Update overview:<br><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>new features \u2013 command-line presets and configuration presets<\/li>\n\n\n\n<li>usability improvements<\/li>\n\n\n\n<li>drag and drop files functionality<\/li>\n\n\n\n<li>help widget&nbsp;<\/li>\n\n\n\n<li>window redesign<\/li>\n<\/ul>\n\n\n\n<p>Here is a new version of the New task window.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Simple mode&nbsp;<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2021\/04\/Simple-mode.png\" alt=\"\" class=\"wp-image-1439\"\/><\/figure>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A URL and a file&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>There is a novelty in the URL field. Now you have the checkbox \u201cDownload file and start\u201d. The file is downloaded and immediately run via the link you provide.&nbsp;<br><\/p>\n\n\n\n<p>Moreover, it\u2019s so easy to upload files with new functionality \u2013 just drag and drop a file in the corresponding field and you\u2019re good to run a task. The convenient way to start your analysis.&nbsp;<br><\/p>\n\n\n\n<p>The simple mode has acquired bright colors of a new design and a more visual way to choose an operating system as well as its bitness.&nbsp;<br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Pro mode&nbsp;<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2021\/04\/Pro-mode-1024x843.png\" alt=\"\" class=\"wp-image-1440\"\/><\/figure>\n\n\n\n<p>A lot of reviews and comments inspired us to improve the advanced settings. We have changed the logic, the structure, added a couple of new features, and the design, of course. Almost the same old window but much better. Let\u2019s dive into these modifications:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Command-line presets<\/li>\n<\/ul>\n\n\n\n<p>Hunters used to type the command-line manually. For your convenience, a new function has appeared \u2013 the command-line presets. Now you can also choose between different pre-installed presets and perform a more elaborate analysis.&nbsp;<br><\/p>\n\n\n\n<p>For example, change &#8220;Local Group Policy&#8221; to check if the analyzed malware is triggered. Just type &#8220;gpedit.msc&#8221; into the field to open the editor after the start of the task.<br><\/p>\n\n\n\n<p>You may open the &#8220;Command Prompt&#8221; utility by typing &#8220;cmd&#8221; into the field.<br><\/p>\n\n\n\n<p>Do you need to change Microsoft Excel options before the task\u2019s launch? Paste &#8220;excel&#8221; and alter options in the Excel window.&nbsp;<br><\/p>\n\n\n\n<p>When you run the DLL file, provide parameters, so the first CMD command is rundll32.exe %FILENAME%,NameOfParameter. Like this: rundll32.exe %FILENAME%,DllRegisterServer.<br><\/p>\n\n\n\n<p>Use all Windows command prompt utilities with that feature. Check out &#8220;tracert&#8221;, &#8220;netstat&#8221;, &#8220;bitsadmin&#8221; and a lot of others during your research: start a command prompt with &#8220;cmd \/k command&#8221;.<br><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Duration, Network, and Privacy<\/li>\n<\/ul>\n\n\n\n<p>Alter the configurations on the fly with the more convenient menu including the precise selection of the analysis time.&nbsp;<br><\/p>\n\n\n\n<p>The Network block has an upgraded VPN interface for your fast work. You can upload a custom OpenVPN config file. There is no need to get back to the profile, now you can drag and drop it in the special field right here. Upload, save and choose the VPN from your own list.&nbsp;<br><\/p>\n\n\n\n<p>This release has made privacy settings very easy to find. Privacy has a dedicated block, so you\u2019ll never miss it.<br><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Configuration presets<\/li>\n<\/ul>\n\n\n\n<p>You know that there is a default configuration that you can save and run a task with. But it\u2019s not enough. Each threat requires a specific approach. Our team understands you and has added a new feature \u2013 presets.&nbsp;<br><\/p>\n\n\n\n<p>Now you can save as many configuration sets as you want. Create special conditions for njRAT, Lokibot, or any other malware, and save them all. Switch between presets whenever you need them and launch the task with the exact environment you\u2019ve picked. The machine remembers your configurations, so you can save time and immediately start the analysis. No more manual typing, or choosing, one click and go to the investigation.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Help widget&nbsp;<\/strong><\/h3>\n\n\n\n<p>If you are a new user and get a little confused with the Pro mode functions, now you can click on a question mark icon to bring up the tooltip. Every block is provided with a detailed description of what each feature means and how to use it. ANY.RUN does its best to make your work easy, especially with advanced options.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2021\/04\/Pro-mode-help-1024x842.png\" alt=\"\" class=\"wp-image-1441\"\/><\/figure>\n\n\n\n<p>Moreover, there are some design changes in the task interface. \u201cAdd tags to your task\u201d has an improved view.\t<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"749\" height=\"261\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/tagsnew.png\" alt=\"\" class=\"wp-image-8388\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/tagsnew.png 749w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/tagsnew-300x105.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/tagsnew-370x129.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/tagsnew-270x94.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/tagsnew-740x258.png 740w\" sizes=\"(max-width: 749px) 100vw, 749px\" \/><\/figure>\n\n\n\n<p>And if you bring up the Task configuration window, you\u2019ll see a new interface for it, too.&nbsp;<br><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"746\" height=\"920\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/screenshotapril-2.png\" alt=\"\" class=\"wp-image-8386\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/screenshotapril-2.png 746w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/screenshotapril-2-243x300.png 243w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/screenshotapril-2-370x456.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/screenshotapril-2-270x333.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/screenshotapril-2-740x913.png 740w\" sizes=\"(max-width: 746px) 100vw, 746px\" \/><\/figure>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/\">ANY.RUN<\/a> team is always eager to make your work fast and easy. Enjoy the more convenient New task window with enhanced features. We hope you will like the improvements and make use of it.&nbsp;<br><\/p>\n\n\n\n<p>We have a lot of plans and ideas, so get ready for the upcoming updates!&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>ANY.RUN is back with changes!&nbsp; We always listen to our users and try to make your experience with the service better and more convenient. This release is all about the New task window. Update overview: Here is a new version of the New task window. Simple mode&nbsp; There is a novelty in the URL field. [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3760,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[57,54,55,56],"class_list":["post-1416","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-service-updates","tag-anyrun","tag-features","tag-release","tag-update"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Release Notes  April 21, 2021 - ANY.RUN&#039;s Cybersecurity Blog<\/title>\n<meta name=\"description\" content=\"ANY.RUN has updated the service with a new release on 21 of April. This post will walk you through the new functionality and design.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/release-notes-21-04\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-21-04\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-21-04\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Release Notes April 21, 2021\",\"datePublished\":\"2021-04-21T05:34:00+00:00\",\"dateModified\":\"2024-07-24T14:37:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-21-04\/\"},\"wordCount\":745,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"features\",\"release\",\"update\"],\"articleSection\":[\"Service Updates\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/release-notes-21-04\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-21-04\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-21-04\/\",\"name\":\"Release Notes April 21, 2021 - ANY.RUN&#039;s Cybersecurity Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2021-04-21T05:34:00+00:00\",\"dateModified\":\"2024-07-24T14:37:41+00:00\",\"description\":\"ANY.RUN has updated the service with a new release on 21 of April. This post will walk you through the new functionality and design.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-21-04\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/release-notes-21-04\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-21-04\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Service Updates\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Release Notes April 21, 2021\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Release Notes  April 21, 2021 - ANY.RUN&#039;s Cybersecurity Blog","description":"ANY.RUN has updated the service with a new release on 21 of April. This post will walk you through the new functionality and design.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/release-notes-21-04\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-21-04\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-21-04\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"Release Notes April 21, 2021","datePublished":"2021-04-21T05:34:00+00:00","dateModified":"2024-07-24T14:37:41+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-21-04\/"},"wordCount":745,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","features","release","update"],"articleSection":["Service Updates"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/release-notes-21-04\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-21-04\/","url":"https:\/\/any.run\/cybersecurity-blog\/release-notes-21-04\/","name":"Release Notes April 21, 2021 - ANY.RUN&#039;s Cybersecurity Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2021-04-21T05:34:00+00:00","dateModified":"2024-07-24T14:37:41+00:00","description":"ANY.RUN has updated the service with a new release on 21 of April. This post will walk you through the new functionality and design.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-21-04\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/release-notes-21-04\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-21-04\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Service Updates","item":"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/"},{"@type":"ListItem","position":3,"name":"Release Notes April 21, 2021"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1416"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=1416"}],"version-history":[{"count":4,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1416\/revisions"}],"predecessor-version":[{"id":8389,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1416\/revisions\/8389"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/3760"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=1416"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=1416"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=1416"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}