You can edit almost every page by Creating an account. Otherwise, see the FAQ.


From EverybodyWiki Bios & Wiki

Script error: No such module "Draft topics". Script error: No such module "AfC topic".

Founded 📆
Founder 👔Aleksey Lapshin
Headquarters 🏙️Dubai, UAE
Area served 🗺️
Products 📟 Malware sandbox
Number of employees
🌐 Website[Lua error in Module:WikidataIB at line 665: attempt to index field 'wikibase' (a nil value). ] 
📇 Address
📞 telephone

ANY.RUN is a cybersecurity company headquartered in Dubai, the United Arab Emirates.[1] It is a vendor of an interactive sandbox for malware analysis.[2] [3]

The company was founded in 2016 by Aleksey Lapshin and has a team of 70 people working on its products.[4] [5]

The ANY.RUN Sandbox[edit]

ANY.RUN provides a cloud-based sandbox environment for analyzing potentially malicious software and URLs.[6] [7] Users can upload samples to conduct dynamic malware analysis and observe their behavior in real time, as well as to collect indicators of compromise (IoCs) and enrich security information and event management (SIEM) systems.[8] [9]

ANY.RUN offers a free public community plan with limited features, including analysis in a Windows 7 32-bit VM.[10] [11] The free version offers detailed information about the uploaded file's execution, including the launched processes, network and registry activity, and file data, while upgraded paid plans provide additional functionalities.[11] [12] [13] The sandbox provides several operating system options for analysis.[14]


This article "ANY.RUN" is from Wikipedia. The list of its authors can be seen in its historical and/or the page Edithistory:ANY.RUN. Articles copied from Draft Namespace on Wikipedia could be seen on the Draft Namespace of Wikipedia and not main one.

  1. "ANY.RUN - Crunchbase Company Profile & Funding".
  2. "ANY.RUN - Interactive Online Malware Sandbox". Retrieved 2024-02-22.
  3. Yahia, Mostafa (2024-02-22). Effective Threat Investigation for SOC Analysts: The ultimate guide to examining various threats and attacker techniques using security logs. Packt Publishing (published 2023). pp. 24–26. ISBN 9781837638758. Search this book on
  4. "Aleksey Lapshin | CEO - ANY.RUN". Forbes Technology Council. Retrieved 2024-03-01.
  5. "Any.Run - An Interactive Malware Analysis Tool - Is Now Open To The Public". BleepingComputer. Retrieved 2024-02-22.
  6. Kleymenov, Alexey; Thabet, Amr (2022). Mastering Malware Analysis: A malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacks (2nd ed.). Packt Publishing Ltd. pp. 112–113. ISBN 9781803230818. Search this book on
  7. Ahmed, Mohiuddin; Moustafa, Nour; Barkat, Abu; Haskell-Dowland, Paul, eds. (2022). Next-Generation Enterprise Security and Governance. CRC Press. p. 27. ISBN 9781000569797. Search this book on
  8. Dahj, Jean Nestor M. (2022). Mastering Cyber Intelligence: Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense. Packt Publishing Ltd. p. 206. ISBN 9781800208285. Search this book on
  9. Muñoz, Diego; Cordero, David; Barría Huidobro, Cristian (2019). "Methodology for Malware Scripting Analysis in Controlled Environments Based on Open Source Tools". In Mata-Rivera, Miguel Felix; Zagal-Flores, Roberto; Barría-Huidobro, Cristian. Telematics and Computing. Communications in Computer and Information Science. 1053. Cham: Springer International Publishing. p. 348. doi:10.1007/978-3-030-33229-7_29. ISBN 978-3-030-33229-7. Search this book on
  10. Davidoff, Sherri; Durrin, Matt; Sprenger, Karen (2022). Ransomware and Cyber Extortion: Response and Prevention. Addison-Wesley Professional. ISBN 9780137450435. Search this book on
  11. 11.0 11.1 Dawson, Maurice; Tabona, Oteng; Maupong, Thabiso (2022). Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security. IGI Global. p. 208. ISBN 9781799886938. Search this book on
  12. Marais, Benjamin; Quertier, Tony; Chesneau, Christophe (2022). "Malware Analysis with Artificial Intelligence and a Particular Attention on Results Interpretability". In Matsui, Kenji; Omatu, Sigeru; Yigitcanlar, Tan; González, Sara Rodríguez. Distributed Computing and Artificial Intelligence, Volume 1: 18th International Conference. Lecture Notes in Networks and Systems. 327. Cham: Springer International Publishing. pp. 43–55. arXiv:2107.11100. doi:10.1007/978-3-030-86261-9_5. ISBN 978-3-030-86261-9. Unknown parameter |s2cid= ignored (help) Search this book on
  13. Preeti; Agrawal, A. K. (2022). "A Comparative Analysis of Open Source Automated Malware Tools". 2022 9th International Conference on Computing for Sustainable Global Development (INDIACom). pp. 226–230. doi:10.23919/indiacom54597.2022.9763227. ISBN 978-93-80544-44-1. Retrieved 2024-03-01. Unknown parameter |s2cid= ignored (help) Search this book on
  14. Wilhoit, Kyle; Opacki, Joseph (2022). Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs. Packt Publishing ltd. ISBN 9781801818667. Search this book on