{"id":2008,"date":"2022-05-20T06:21:00","date_gmt":"2022-05-20T06:21:00","guid":{"rendered":"\/cybersecurity-blog\/?p=2008"},"modified":"2022-12-21T06:46:57","modified_gmt":"2022-12-21T06:46:57","slug":"release-notes-may-20-2022","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/release-notes-may-20-2022\/","title":{"rendered":"Release Notes  May 20, 2022"},"content":{"rendered":"\n<p>Hello, ANY.RUN users! Today we announce a new update on the service. This time, we discuss a new look of text reports that will help you review the task\u2019s details more conveniently.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Why do you need a text report?&nbsp;<\/h3>\n\n\n\n<p>You finished the malware analysis of a task and got all the information you needed. And all you want is to take all data with you for further work or share it with your colleagues. For this case, <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=in-house&amp;utm_content=release_notes_may_20\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">ANY.RUN <\/a>offers different formats of reports: JSON, PCAP, Process matrix, MITRE Matrix, and others. But one complete file that can come in handy is a text report.&nbsp;<br><\/p>\n\n\n\n<p>The text report contains details about the task:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>general information such as file name, verdict, threats, and others.<\/li><li>behavior activities<\/li><li>static information&nbsp;<\/li><li>video and screenshots<\/li><li>system events&nbsp;<\/li><li>network&nbsp;<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/ObS_iUMmVjhlemIB6tLcoUtD99X3VtIMcyJpqfD-t3zNd527LRNVlEv9B1EizxjX5gf0Z6w9dyoLdzesFRvy0GHSVaFH50QjRoJpYQsuWa5RrGOTOQTPYhrRbQYQa3qef6kqtg4go-LtcP75PQ\" alt=\"\"\/><figcaption><em> General info in the text report<\/em><\/figcaption><\/figure>\n\n\n\n<p>The text report guarantees that you won\u2019t miss any vital information. Moreover, you can download, share or print it to avoid losing your analysis.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Text report update&nbsp;<\/h3>\n\n\n\n<p>This release brought a change for text reports. We know how difficult it is to sit down in front of the screen all day. That is why our team has decided to redesign the text report\u2019s look not only for convenient work but, what is also essential, a comfortable one. Here are all the changes:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>simple navigation: pagination, choose the number of lines you want to see<\/li><li>the enhanced data structure, logical info block placement&nbsp;<\/li><li>extended task field for even more detailed info<\/li><li>easy print control, decide exactly what you want to print&nbsp;<\/li><li>improved table look for the printed version, all information at once<\/li><li>user-friendly design, so it\u2019s easy to sift through details<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/AT8em-Evvg-tk1_8XeMQ7wbmOVU4Ki5LSwxS77iVaTQoWRlpVe_sWSJeWwubMzGi8Ai3XTCHIO-HT5suZIIM5TFhAaQ2Kx3nHnnjjv535fPlWyZ2HahMFXjyQCDO0TRVs-j025MY0P1oMDnpTQ\" alt=\"\"\/><figcaption><em> Processes in text reports<\/em><\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Print exactly what you need<\/h3>\n\n\n\n<p>When we are done with the assignment, the last thing we want to do is to waste time on documentation. Another step or a new task seems more appealing, rather than going through tons of data.&nbsp;<br><\/p>\n\n\n\n<p>ANY.RUN text report saves this time. While reviewing the task and reading the report, remove the tick in the Add for printing box near the block you want to hide. And the bunch of data you don\u2019t need will be removed for the printed version \u2013 the only information you need and you have chosen. Moreover, the hidden block will get out of your way, so you can stay focused on the essential data.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/myZDHDPHcME3dPrNQhHhXTNbz-KZAogJPsaNpaix4BULVvyH9YRIy_JhhU5Wx3GqYgQoE5rwSMMRVcsyi4bflpt7qhN0yvQiMr-o-QIQqzlF8ZLaegaEpXflb3HwjS4B5zfEA-qVLhpVDdIGDg\" alt=\"\"\/><figcaption><em>Print control for the text report&#8217;s printed version<\/em><\/figcaption><\/figure>\n\n\n\n<p>The more convenient, user-friendly, and bright look of text reports will definitely save you time during your everyday work. Upload a file, start the task, and try <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=in-house&amp;utm_content=release_notes_may_20\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">ANY.RUN<\/a>&#8216;s upgraded text report now.<br><\/p>\n\n\n\n<p>Tasks mentioned in the article:&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/caab9e58-2c39-47c6-929e-531487293851?_ga=2.43754149.1629383991.1644211310-721531124.1644211309\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">https:\/\/app.any.run\/tasks\/caab9e58-2c39-47c6-929e-531487293851?_ga=2.43754149.1629383991.1644211310-721531124.1644211309\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/d7c78081-0a51-43fd-a33e-23791175fb69\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">https:\/\/app.any.run\/tasks\/d7c78081-0a51-43fd-a33e-23791175fb69\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hello, ANY.RUN users! Today we announce a new update on the service. This time, we discuss a new look of text reports that will help you review the task\u2019s details more conveniently.&nbsp; Why do you need a text report?&nbsp; You finished the malware analysis of a task and got all the information you needed. And [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3724,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[57,55,56],"class_list":["post-2008","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-service-updates","tag-anyrun","tag-release","tag-update"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Release Notes May 20, 2022 - ANY.RUN&#039;s Cybersecurity Blog<\/title>\n<meta name=\"description\" content=\"ANY.RUN has updated the service with a new release on the 20th of May. This post will walk you through the improved Text reports.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/release-notes-may-20-2022\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-may-20-2022\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-may-20-2022\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Release Notes May 20, 2022\",\"datePublished\":\"2022-05-20T06:21:00+00:00\",\"dateModified\":\"2022-12-21T06:46:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-may-20-2022\/\"},\"wordCount\":498,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"release\",\"update\"],\"articleSection\":[\"Service Updates\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/release-notes-may-20-2022\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-may-20-2022\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-may-20-2022\/\",\"name\":\"Release Notes May 20, 2022 - ANY.RUN&#039;s Cybersecurity Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2022-05-20T06:21:00+00:00\",\"dateModified\":\"2022-12-21T06:46:57+00:00\",\"description\":\"ANY.RUN has updated the service with a new release on the 20th of May. This post will walk you through the improved Text reports.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-may-20-2022\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/release-notes-may-20-2022\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-may-20-2022\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"teamwork\",\"item\":\"https:\/\/any.run\/tag\/teamwork\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Release Notes May 20, 2022\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Release Notes May 20, 2022 - ANY.RUN&#039;s Cybersecurity Blog","description":"ANY.RUN has updated the service with a new release on the 20th of May. This post will walk you through the improved Text reports.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/release-notes-may-20-2022\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-may-20-2022\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-may-20-2022\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"Release Notes May 20, 2022","datePublished":"2022-05-20T06:21:00+00:00","dateModified":"2022-12-21T06:46:57+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-may-20-2022\/"},"wordCount":498,"commentCount":1,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","release","update"],"articleSection":["Service Updates"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/release-notes-may-20-2022\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-may-20-2022\/","url":"https:\/\/any.run\/cybersecurity-blog\/release-notes-may-20-2022\/","name":"Release Notes May 20, 2022 - ANY.RUN&#039;s Cybersecurity Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2022-05-20T06:21:00+00:00","dateModified":"2022-12-21T06:46:57+00:00","description":"ANY.RUN has updated the service with a new release on the 20th of May. This post will walk you through the improved Text reports.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-may-20-2022\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/release-notes-may-20-2022\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-may-20-2022\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"teamwork","item":"https:\/\/any.run\/tag\/teamwork\/"},{"@type":"ListItem","position":3,"name":"Release Notes May 20, 2022"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/2008"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=2008"}],"version-history":[{"count":1,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/2008\/revisions"}],"predecessor-version":[{"id":3720,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/2008\/revisions\/3720"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/3724"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=2008"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=2008"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=2008"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}