{"id":6184,"date":"2023-11-16T07:02:18","date_gmt":"2023-11-16T07:02:18","guid":{"rendered":"\/cybersecurity-blog\/?p=6184"},"modified":"2023-11-17T11:15:57","modified_gmt":"2023-11-17T11:15:57","slug":"upload-files-to-active-tasks","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/upload-files-to-active-tasks\/","title":{"rendered":"Upload Additional Files into Active Tasks in ANY.RUN"},"content":{"rendered":"\n<p><a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=activefileupload&amp;utm_content=landing&amp;utm_term=161123\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a> cloud virtual machines already come with a selection of pre-installed software that you can choose from when setting up your environment. However, to enhance your analysis, you might need external files, such as custom scripts, debugging tools, or secondary malware components.&nbsp;<\/p>\n\n\n\n<p>Now, you can upload additional files, with a total size limit of 500 MB, into ongoing tasks. This feature allows you to incorporate your own tools into ANY.RUN&#8217;s cloud VMs as needed.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"670\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img_1-1024x670.png\" alt=\"\" class=\"wp-image-6186\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img_1-1024x670.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img_1-300x196.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img_1-768x502.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img_1-1536x1004.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img_1-2048x1339.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img_1-370x242.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img_1-270x177.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img_1-740x484.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Additional file uploads are available across all plans. However, plans starting from Hunter and above offer extra functionalities, such as manual file deletion from recent tasks and a Tools collection feature that allows users to save lists of favorite tools.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Where can I upload files into a VM?<\/strong>&nbsp;<\/h2>\n\n\n\n<p>You can access this new feature in two locations within our interface: when initially configuring a task, and from the top-right corner of the main task view while the task is running.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"535\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img_2-1024x535.png\" alt=\"\" class=\"wp-image-6187\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img_2-1024x535.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img_2-300x157.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img_2-768x401.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img_2-1536x803.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img_2-2048x1070.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img_2-370x193.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img_2-270x141.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img_2-740x387.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>By clicking on the arrow upload icon (higlighted above), a modal for uploading files will open, showing the statuses of your files and your file lists.<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nTry free virtual machines with custom file uploads <br><span class=\"highlight\">in the cloud<\/span>&nbsp;\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/app.any.run\/#register\/\" rel=\"noopener\" target=\"_blank\">\nCreate free account\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">Uploading additional files into active tasks&nbsp;&nbsp;<\/h2>\n\n\n\n<p>The new <strong>Upload files to VM <\/strong>modal window is where you can manage your files while a task is running.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"533\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img_3-1024x533.png\" alt=\"\" class=\"wp-image-6188\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img_3-1024x533.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img_3-300x156.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img_3-768x400.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img_3-1536x800.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img_3-370x193.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img_3-270x141.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img_3-740x385.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img_3.png 1944w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>The modal has two tabs: <strong>Recently uploaded <\/strong>and <strong>Tools collection<\/strong>. Only the <strong>Recently uploaded<\/strong> tab is accessible to users on our Free and Searcher plans.&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Recently uploaded: This section shows your last 500 MB of file uploads, quickly loadable into the virtual machine. Available for all users. Note: when the 500 MB limit is reached, non-favorited files are auto-deleted with new uploads. Files are linked to your account, not specific tasks, facilitating access to recent files for analysis across multiple tasks.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Tools collection: Exclusive to Hunter and Enterprise users, this tab stores up to 500 MB of your favorite files for easy access. Unlike the Recently Uploaded section, surpassing the 500 MB limit doesn&#8217;t auto-delete old uploads; manual file deletion is required when space runs out.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Additionally, any file uploaded while in the <strong>Tools collection<\/strong> tab will be automatically marked as a favorite.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Uploading files during environment configuration&nbsp;<\/h2>\n\n\n\n<p>Another way to manage file uploads is by dropping files into a VM while creating a task. Note that in this scenario, files can only be loaded into the &#8216;Tools collection&#8217; section, which is not available for Free and Searcher plans.<\/p>\n\n\n\n<figure class=\"wp-block-video\"><video controls src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/upload-v2-edit.webm\"><\/video><\/figure>\n\n\n\n<p>You&#8217;ll notice that there is no separate option to choose where the file is loaded. Instead, this is controlled by the directory selected in the <strong>Start object from<\/strong> selector.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">When should you upload additional files into an active task?&nbsp;<\/h2>\n\n\n\n<p><strong>Case 1<\/strong><\/p>\n\n\n\n<p>Analysts can upload tools of their choice, either from the Tools collection or by directly uploading them from Recently Uploaded. Since our paid plans allow tasks to run for up to 24 minutes, it&#8217;s very convenient for debugging certain malware samples or creating memory dumps directly within a running virtual machine, without the need to install software on the workstation.<\/p>\n\n\n\n<p>Here&#8217;s an example of a basic toolset: Click <strong>Download sample<\/strong> in <a href=\"https:\/\/app.any.run\/tasks\/a50e2c17-c30b-4e93-b485-628bb09c23f7\/?utm_source=anyrunblog&amp;utm_medium=article_bottom&amp;utm_campaign=activefileupload&amp;utm_content=task&amp;utm_term=161123\" target=\"_blank\" rel=\"noreferrer noopener\">this task<\/a> to get it.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Case 2<\/strong><\/p>\n\n\n\n<p>Another use case for the upload feature is to study a new strain of ransomware.<\/p>\n\n\n\n<p>If you analyze the ransomware algorithm to identify errors in its execution and create a decryptor, study its behavior, and develop a counteraction algorithm, then this feature gives you the ability to upload additional files inside the virtual machine during the execution of the ransomware and even after the decryption of the files<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>This feature significantly expands the capabilities of our cloud virtual sandbox, allowing you to bring in any tool of your choice, limited only by the upload size. Have questions or feedback? Let us know what you think of this feature in the comment section below!&nbsp;<\/p>\n\n\n\n<p><strong>About ANY.RUN<\/strong>&nbsp;<\/p>\n\n\n\n<p>ANY.RUN is a cloud malware sandbox that handles the heavy lifting of malware analysis for SOC and DFIR teams. Every day, 300,000 professionals use our platform to investigate incidents and streamline threat analysis.&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>Request a demo today and enjoy 14 days of free access to our Enterprise plan.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&amp;utm_medium=article_bottom&amp;utm_campaign=activefileupload&amp;utm_content=trial&amp;utm_term=161123\" target=\"_blank\" rel=\"noreferrer noopener\">Request demo \u2192<\/a>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>ANY.RUN cloud virtual machines already come with a selection of pre-installed software that you can choose from when setting up your environment. However, to enhance your analysis, you might need external files, such as custom scripts, debugging tools, or secondary malware components.&nbsp; Now, you can upload additional files, with a total size limit of 500 [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":6191,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[57,54,34,55,56],"class_list":["post-6184","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-service-updates","tag-anyrun","tag-features","tag-malware-analysis","tag-release","tag-update"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Upload Additional Files into Active Tasks in ANY.RUN - ANY.RUN&#039;s Cybersecurity Blog<\/title>\n<meta name=\"description\" content=\"Upload extra files, debugging and analysis tools, or secondary malware components to running cloud VMs in ANY.RUN.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/upload-files-to-active-tasks\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Vlad Ananin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/upload-files-to-active-tasks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/upload-files-to-active-tasks\/\"},\"author\":{\"name\":\"Vlad Ananin\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Upload Additional Files into Active Tasks in ANY.RUN\",\"datePublished\":\"2023-11-16T07:02:18+00:00\",\"dateModified\":\"2023-11-17T11:15:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/upload-files-to-active-tasks\/\"},\"wordCount\":727,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"features\",\"malware analysis\",\"release\",\"update\"],\"articleSection\":[\"Service Updates\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/upload-files-to-active-tasks\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/upload-files-to-active-tasks\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/upload-files-to-active-tasks\/\",\"name\":\"Upload Additional Files into Active Tasks in ANY.RUN - ANY.RUN&#039;s Cybersecurity Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2023-11-16T07:02:18+00:00\",\"dateModified\":\"2023-11-17T11:15:57+00:00\",\"description\":\"Upload extra files, debugging and analysis tools, or secondary malware components to running cloud VMs in ANY.RUN.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/upload-files-to-active-tasks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/upload-files-to-active-tasks\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/upload-files-to-active-tasks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Service Updates\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Upload Additional Files into Active Tasks in ANY.RUN\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"Vlad Ananin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/564ed55b05884a34062108096c0ed973?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/564ed55b05884a34062108096c0ed973?s=96&d=mm&r=g\",\"caption\":\"Vlad Ananin\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/vlad-ananin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Upload Additional Files into Active Tasks in ANY.RUN - ANY.RUN&#039;s Cybersecurity Blog","description":"Upload extra files, debugging and analysis tools, or secondary malware components to running cloud VMs in ANY.RUN.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/upload-files-to-active-tasks\/","twitter_misc":{"Written by":"Vlad Ananin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/upload-files-to-active-tasks\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/upload-files-to-active-tasks\/"},"author":{"name":"Vlad Ananin","@id":"https:\/\/any.run\/"},"headline":"Upload Additional Files into Active Tasks in ANY.RUN","datePublished":"2023-11-16T07:02:18+00:00","dateModified":"2023-11-17T11:15:57+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/upload-files-to-active-tasks\/"},"wordCount":727,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","features","malware analysis","release","update"],"articleSection":["Service Updates"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/upload-files-to-active-tasks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/upload-files-to-active-tasks\/","url":"https:\/\/any.run\/cybersecurity-blog\/upload-files-to-active-tasks\/","name":"Upload Additional Files into Active Tasks in ANY.RUN - ANY.RUN&#039;s Cybersecurity Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2023-11-16T07:02:18+00:00","dateModified":"2023-11-17T11:15:57+00:00","description":"Upload extra files, debugging and analysis tools, or secondary malware components to running cloud VMs in ANY.RUN.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/upload-files-to-active-tasks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/upload-files-to-active-tasks\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/upload-files-to-active-tasks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Service Updates","item":"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/"},{"@type":"ListItem","position":3,"name":"Upload Additional Files into Active Tasks in ANY.RUN"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"Vlad Ananin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/564ed55b05884a34062108096c0ed973?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/564ed55b05884a34062108096c0ed973?s=96&d=mm&r=g","caption":"Vlad Ananin"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/vlad-ananin\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/6184"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=6184"}],"version-history":[{"count":5,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/6184\/revisions"}],"predecessor-version":[{"id":6201,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/6184\/revisions\/6201"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/6191"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=6184"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=6184"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=6184"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}