{"id":15093,"date":"2024-03-03T10:17:45","date_gmt":"2024-03-03T10:17:45","guid":{"rendered":"https:\/\/ramsdata.com.pl\/opswat\/products\/filescan\/"},"modified":"2025-06-18T14:10:42","modified_gmt":"2025-06-18T14:10:42","slug":"filescan","status":"publish","type":"page","link":"https:\/\/ramsdata.com.pl\/en\/opswat\/products\/filescan\/","title":{"rendered":"FileScan"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"15093\" class=\"elementor elementor-15093 elementor-10466\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3d24bd05 e-flex e-con-boxed e-con e-parent\" data-id=\"3d24bd05\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d7f3e6e e-con-full e-flex e-con e-child\" data-id=\"d7f3e6e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-251b837c elementor-widget elementor-widget-image\" data-id=\"251b837c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"145\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/MetaDefender-Core-Logo-1024x185.webp\" class=\"attachment-large size-large wp-image-13340\" alt=\"\" srcset=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/MetaDefender-Core-Logo-1024x185.webp 1024w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/MetaDefender-Core-Logo-300x54.webp 300w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/MetaDefender-Core-Logo-768x139.webp 768w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/MetaDefender-Core-Logo-1536x278.webp 1536w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/MetaDefender-Core-Logo-2048x371.webp 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6deebc25 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"6deebc25\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">FileScan<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-16c0257b e-flex e-con-boxed e-con e-parent\" data-id=\"16c0257b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-31c17974 e-flex e-con-boxed e-con e-child\" data-id=\"31c17974\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-72fccc88 e-flex e-con-boxed e-con e-child\" data-id=\"72fccc88\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-25e6804a elementor-widget elementor-widget-image\" data-id=\"25e6804a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"2560\" height=\"2560\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/ai-cybersecurity-virus-protection-machine-learning-1-scaled.jpg\" class=\"attachment-full size-full wp-image-13430\" alt=\"\" srcset=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/ai-cybersecurity-virus-protection-machine-learning-1-scaled.jpg 2560w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/ai-cybersecurity-virus-protection-machine-learning-1-300x300.jpg 300w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/ai-cybersecurity-virus-protection-machine-learning-1-1024x1024.jpg 1024w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/ai-cybersecurity-virus-protection-machine-learning-1-150x150.jpg 150w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/ai-cybersecurity-virus-protection-machine-learning-1-768x768.jpg 768w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/ai-cybersecurity-virus-protection-machine-learning-1-1536x1536.jpg 1536w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/ai-cybersecurity-virus-protection-machine-learning-1-2048x2048.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-53f47e8e e-flex e-con-boxed e-con e-child\" data-id=\"53f47e8e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2b74b5e0 elementor-widget elementor-widget-heading\" data-id=\"2b74b5e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Prompt. In detail.\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-707158a9 elementor-widget elementor-widget-text-editor\" data-id=\"707158a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>FileScan.IO is a Next-Gen Sandbox and free malware analysis service. It runs at 10 times the speed of traditional sandboxes with 90% less resource consumption, and its unique adaptive threat analysis technology also enables zero-day malware detection and more Indicator of Compromise (IOCs) extractions.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-101548c5 e-flex e-con-boxed e-con e-child\" data-id=\"101548c5\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4911a4be e-flex e-con-boxed e-con e-child\" data-id=\"4911a4be\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7238ade elementor-widget elementor-widget-text-editor\" data-id=\"7238ade\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Constantly changing threats<\/h1>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-024dc53 elementor-widget elementor-widget-text-editor\" data-id=\"024dc53\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We are in a technological arms race as threat actors are constantly refining their techniques and creating ever more sophisticated malware to evade security solutions.<br><br>This means that malware analysis systems must be able to effectively analyze these threats regardless of the evasive measures used and the level of sophistication.<br><br>This analysis must be able to take the action of extracting built-in Indicators of Compromise (IOCs) for pre-emptive blocking measures, breach detection and proactive threat hunting in a post-breach scenario.<br><br>Strong obfuscation and encryption in malware means that only the actual execution of the malware (usually in an isolated environment, also known as dynamic analysis) was effective in extracting the necessary key IOCs (e.g., network IPs, URLs, domains) on a consistent basis.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-84e3eea e-flex e-con-boxed e-con e-parent\" data-id=\"84e3eea\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-56b36261 e-flex e-con-boxed e-con e-child\" data-id=\"56b36261\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a978349 e-con-full e-flex e-con e-child\" data-id=\"a978349\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t<div class=\"elementor-element elementor-element-7adce4f5 e-flex e-con-boxed e-con e-child\" data-id=\"7adce4f5\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4ba515e3 elementor-widget elementor-widget-image\" data-id=\"4ba515e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"54\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/MetaDefender-Core-Logo-300x54.webp\" class=\"attachment-medium size-medium wp-image-13340\" alt=\"\" srcset=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/MetaDefender-Core-Logo-300x54.webp 300w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/MetaDefender-Core-Logo-1024x185.webp 1024w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/MetaDefender-Core-Logo-768x139.webp 768w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/MetaDefender-Core-Logo-1536x278.webp 1536w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/MetaDefender-Core-Logo-2048x371.webp 2048w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-57e6cb3a e-flex e-con-boxed e-con e-child\" data-id=\"57e6cb3a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-704ee8f1 elementor-widget elementor-widget-text-editor\" data-id=\"704ee8f1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>FileScan &#8211; Next-Gen Approach<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2e95de8 e-flex e-con-boxed e-con e-child\" data-id=\"2e95de8\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-53d4e89b elementor-widget elementor-widget-text-editor\" data-id=\"53d4e89b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We asked ourselves a simple question: what if we could create a technology that would bridge the gap between static analysis and full-fledged VM-based sandbox systems?<br><br>We needed something that could scan thousands of files for malware in a short period of time, while overcoming layers of obfuscation to get to the &#8220;nuggets of gold&#8221; (IOCs) that are so invaluable &#8211; all with low resource requirements, easy maintenance and high efficiency.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4be7d9ee elementor-widget elementor-widget-text-editor\" data-id=\"4be7d9ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Why OPSWAT FileScan?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-295903e7 elementor-widget elementor-widget-text-editor\" data-id=\"295903e7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Perform IOC detection and extraction for all popular threats (files and URLs) in a single platform<\/li><li>Quickly identify threats, their capabilities and update security systems<br>Search the corporate network for compromised endpoints<\/li><li>API-based framework for easy integration with existing systems<\/li><li>Easy reporting for entry-level analysts and executive summary<\/li><li>Easy deployment (in the cloud on platforms such as AWS or on-premises, including air gapped)<\/li><li>Standard report export formats (HTML\/PDF\/MISP\/STIX)<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4c2f1900 e-con-full e-flex e-con e-child\" data-id=\"4c2f1900\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-167f5d6f elementor-widget elementor-widget-image\" data-id=\"167f5d6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"614\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/why-filescan.png-1024x786.webp\" class=\"attachment-large size-large wp-image-13880\" alt=\"\" srcset=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/why-filescan.png-1024x786.webp 1024w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/why-filescan.png-300x230.webp 300w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/why-filescan.png-768x589.webp 768w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/why-filescan.png.webp 1144w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1ef01603 e-flex e-con-boxed e-con e-parent\" data-id=\"1ef01603\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1f3edda0 e-flex e-con-boxed e-con e-child\" data-id=\"1f3edda0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-243341a1 e-flex e-con-boxed e-con e-child\" data-id=\"243341a1\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-335c268d elementor-widget elementor-widget-image\" data-id=\"335c268d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"525\" height=\"430\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/EC_Cybersecurity_Technology_750-e1709392508181.jpg\" class=\"attachment-full size-full wp-image-13640\" alt=\"\" srcset=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/EC_Cybersecurity_Technology_750-e1709392508181.jpg 525w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/EC_Cybersecurity_Technology_750-e1709392508181-300x246.jpg 300w\" sizes=\"(max-width: 525px) 100vw, 525px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1269ac14 e-flex e-con-boxed e-con e-child\" data-id=\"1269ac14\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-549eddbd elementor-widget elementor-widget-heading\" data-id=\"549eddbd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Adaptive hazard analysis<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-74e1e5a3 elementor-widget elementor-widget-text-editor\" data-id=\"74e1e5a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>OPSWAT FileScan&#8217;s unique adaptive threat analysis technology enables zero-day malware detection and more Indicator of Compromise (IOCs) extractions.<\/p><p>Key features:<\/p><ul><li>Threat-agnostic file and URL analysis capable of massive amounts of processing thanks to a scalable architecture<\/li><li>Focus on the extraction of intrusion indicators (IOCs), including the operating context for incident response<\/li><li>Our patented Rapid Dynamic Analysis engine enables detection of targeted attacks bypassing anti-analytical tricks (e.g., geofencing)<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1f18150b e-flex e-con-boxed e-con e-child\" data-id=\"1f18150b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-42ada9c5 e-flex e-con-boxed e-con e-child\" data-id=\"42ada9c5\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-62e0372d elementor-widget elementor-widget-heading\" data-id=\"62e0372d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Strong. Quick. Efficient.\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6d569280 elementor-widget elementor-widget-text-editor\" data-id=\"6d569280\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Utilizing unique adaptive threat analysis technology, OPSWAT FileScan is built for power, speed and efficiency.<\/p><p><br>10x Faster &#8211; In any race, speed counts &#8211; and OPSWAT FileScan is ten times faster than a traditional sandbox.<br><br>100x More Efficient &#8211; OPSWAT FileScan is 100x more resource efficient than other Sandboxes.<br><br>Setup in less than an hour &#8211; In less than an hour, OPSWAT FileScan is up and running to help protect you from malware.<br><br>25,000 Files per Day &#8211; On a single server, OPSWAT FileScan can process 25,000 files per day.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4fa6a4b e-flex e-con-boxed e-con e-child\" data-id=\"4fa6a4b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5573e8b5 elementor-widget elementor-widget-image\" data-id=\"5573e8b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"383\" height=\"333\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/GettyImages-1410003855.jpg\" class=\"attachment-full size-full wp-image-13750\" alt=\"\" srcset=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/GettyImages-1410003855.jpg 383w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/GettyImages-1410003855-300x261.jpg 300w\" sizes=\"(max-width: 383px) 100vw, 383px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3eed4e58 e-flex e-con-boxed e-con e-parent\" data-id=\"3eed4e58\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5fcf0cc e-flex e-con-boxed e-con e-child\" data-id=\"5fcf0cc\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6c7f96d6 e-con-full e-flex e-con e-child\" data-id=\"6c7f96d6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t<div class=\"elementor-element elementor-element-735e40f e-flex e-con-boxed e-con e-child\" data-id=\"735e40f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4c1e3be5 elementor-widget elementor-widget-image\" data-id=\"4c1e3be5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"54\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/MetaDefender-Core-Logo-300x54.webp\" class=\"attachment-medium size-medium wp-image-13340\" alt=\"\" srcset=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/MetaDefender-Core-Logo-300x54.webp 300w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/MetaDefender-Core-Logo-1024x185.webp 1024w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/MetaDefender-Core-Logo-768x139.webp 768w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/MetaDefender-Core-Logo-1536x278.webp 1536w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/MetaDefender-Core-Logo-2048x371.webp 2048w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a5f6342 e-flex e-con-boxed e-con e-child\" data-id=\"a5f6342\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3a65714b elementor-widget elementor-widget-text-editor\" data-id=\"3a65714b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>FileScan &#8211; Competition comparison<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3eb38239 e-flex e-con-boxed e-con e-child\" data-id=\"3eb38239\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c6efee3 elementor-widget elementor-widget-text-editor\" data-id=\"c6efee3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span>The table below compares the current feature set of the OPSWAT FileScan engine with its peer group.  <\/span><span>This feature set does not include platform features such as API coverage, customizable ACLs, OAuth integration, CEF syslog feedback, etc. Please contact us to book a technical demo and explore all the features and capabilities of the platform.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7ef9621 e-flex e-con-boxed e-con e-child\" data-id=\"7ef9621\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-de41f09 elementor-widget elementor-widget-eael-advanced-data-table\" data-id=\"de41f09\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-advanced-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ea-advanced-data-table-wrap\" data-id=\"de41f09\"><div class=\"ea-advanced-data-table-wrap-inner\">\n                <table class=\"ea-advanced-data-table ea-advanced-data-table-static ea-advanced-data-table-de41f09 ea-advanced-data-table-sortable\" data-id=\"de41f09\"><thead><tr><th>Function<\/th><th>FileScan.IO<\/th><th>Cloud online analysis tool A<\/th><th>Online cloud analysis tool B<\/th><th>Popular static analysis tools<\/th><\/tr><\/thead><tbody><tr><td>Render URLs and detect phishing sites<\/td><td>yes<\/td><td>yes<\/td><td>No<\/td><td>No<\/td><\/tr><tr><td>Extract and decode almost all malicious VBA macros<\/td><td>Yes<\/td><td>No<\/td><td>yes<\/td><td>No<\/td><\/tr><tr><td>Analyze VBA stomp files designed for any system<\/td><td>yes<\/td><td>No<\/td><td>No<\/td><td>No<\/td><\/tr><tr><td>Shell code emulation (x86 32\/64)<\/td><td>yes<\/td><td>No<\/td><td>yes<\/td><td>No<\/td><\/tr><tr><td>Export MISP (JSON) and STIX report formats<\/td><td>yes<\/td><td>No<\/td><td>No<\/td><td>No<\/td><\/tr><tr><td>Extract and analyze embedded PE files<\/td><td>yes<\/td><td>No<\/td><td>No<\/td><td>No<\/td><\/tr><tr><td>Decipher JavaScript \/ VBS<\/td><td>yes<\/td><td>No<\/td><td>Yes but limited<\/td><td>No<\/td><\/tr><tr><td>Decipher Powershell scripts<\/td><td>yes<\/td><td>No<\/td><td>Yes but limited<\/td><td>No<\/td><\/tr><tr><td>Analyze the structure of the METF Embed Equation exploit<\/td><td>yes<\/td><td>No<\/td><td>No<\/td><td>No<\/td><\/tr><tr><td>Analyze poorly worded RTF files<\/td><td>yes<\/td><td>No<\/td><td>No<\/td><td>No<\/td><\/tr><tr><td>Analyze Office binary file formats (BIFF5\/BIFF8)<\/td><td>yes<\/td><td>No<\/td><td>No<\/td><td>No<\/td><\/tr><tr><td>Analyze the Strict OOXML file format<\/td><td>yes<\/td><td>No<\/td><td>No<\/td><td>No<\/td><\/tr><tr><td>Automatically decode Base64 strings<\/td><td>yes<\/td><td>No<\/td><td>No<\/td><td>No<\/td><\/tr><tr><td>Detailed annotated disassembly<\/td><td>yes<\/td><td>No<\/td><td>No<\/td><td>No<\/td><\/tr><tr><td>Decrypt password-protected office documents<\/td><td>yes<\/td><td>No<\/td><td>yes<\/td><td>No<\/td><\/tr><tr><td>Decompile Java<\/td><td>yes<\/td><td>No<\/td><td>yes<\/td><td>No<\/td><\/tr><tr><td>Decompile .NET<\/td><td>yes<\/td><td>No<\/td><td>yes<\/td><td>No<\/td><\/tr><tr><td>Calculate .NET platform GUIDs (module version\/TypeLib identifier)<\/td><td>yes<\/td><td>yes<\/td><td>No<\/td><td>No<\/td><\/tr><tr><td>Classify imported APIs<\/td><td>yes<\/td><td>No<\/td><td>No<\/td><td>yes<\/td><\/tr><tr><td>MITER ATT&amp;CK support<\/td><td>yes<\/td><td>No<\/td><td>yes<\/td><td>yes<\/td><\/tr><tr><td>Render PDF pages<\/td><td>yes<\/td><td>yes<\/td><td>yes<\/td><td>No<\/td><\/tr><tr><td>Extract embedded files (e.g. OLE2 from Word)<\/td><td>yes<\/td><td>yes<\/td><td>yes<\/td><td>No<\/td><\/tr><tr><td>Automatically tag samples based on signatures<\/td><td>yes<\/td><td>yes<\/td><td>yes<\/td><td>No<\/td><\/tr><tr><td>Support from YARA<\/td><td>yes<\/td><td>yes<\/td><td>yes<\/td><td>No<\/td><\/tr><tr><td>Generate text metrics (average word size, etc.)<\/td><td>yes<\/td><td>No<\/td><td>No<\/td><td>No<\/td><\/tr><tr><td>Detection of cryptographic constants<\/td><td>yes<\/td><td>No<\/td><td>No<\/td><td>No<\/td><\/tr><tr><td>Text analysis (guessed language)<\/td><td>yes<\/td><td>yes<\/td><td>No<\/td><td>No<\/td><\/tr><tr><td>Map UUIDs to known related files \/ metadata<\/td><td>yes<\/td><td>No<\/td><td>Yes but limited<\/td><td>No<\/td><\/tr><tr><td>Filter strings and detect interesting<\/td><td>yes<\/td><td>No<\/td><td>yes<\/td><td>yes<\/td><\/tr><tr><td>Extract and detect overlay<\/td><td>yes<\/td><td>No<\/td><td>No<\/td><td>yes<\/td><\/tr><tr><td>Integrated white list<\/td><td>yes<\/td><td>yes<\/td><td>yes<\/td><td>No<\/td><\/tr><tr><td>Detect alternative IOCs (email address bitcoin, etc.)<\/td><td>yes<\/td><td>No<\/td><td>yes<\/td><td>No<\/td><\/tr><tr><td>Calculate autentihash<\/td><td>yes<\/td><td>yes<\/td><td>yes<\/td><td>No<\/td><\/tr><tr><td>Verify Authenticode signatures<\/td><td>yes<\/td><td>yes<\/td><td>yes<\/td><td>yes<\/td><\/tr><tr><td>Analyze the RICH header<\/td><td>yes<\/td><td>yes<\/td><td>Yes but limited<\/td><td>yes<\/td><\/tr><tr><td>Calculate entropy of resources<\/td><td>yes<\/td><td>yes<\/td><td>No<\/td><td>yes<\/td><\/tr><tr><td>Detect domain URLs and IP addresses<\/td><td>yes<\/td><td>Yes but limited<\/td><td>yes<\/td><td>yes<\/td><\/tr><tr><td>Calculate resource shortcuts<\/td><td>yes<\/td><td>yes<\/td><td>No<\/td><td>yes<\/td><\/tr><tr><td>Calculate Imphash<\/td><td>yes<\/td><td>yes<\/td><td>yes<\/td><td>No<\/td><\/tr><tr><td>Calculate SSDEEP<\/td><td>yes<\/td><td>yes<\/td><td>yes<\/td><td>No<\/td><\/tr><tr><td>Extract PDB information<\/td><td>yes<\/td><td>yes<\/td><td>yes<\/td><td>yes<\/td><\/tr><tr><td>Detect TLS callbacks<\/td><td>yes<\/td><td>No<\/td><td>yes<\/td><td>yes<\/td><\/tr><tr><td>Solve known import ordinal numbers into names<\/td><td>yes<\/td><td>No<\/td><td>yes<\/td><td>yes<\/td><\/tr><tr><td>Anomaly detection (e.g., header checksum validation)<\/td><td>yes<\/td><td>Yes but limited<\/td><td>yes<\/td><td>yes<\/td><\/tr><tr><td>Query VirusTotal to check reputation<\/td><td>yes<\/td><td>yes<\/td><td>yes<\/td><td>yes<\/td><\/tr><tr><td>Packer detection (PEiD)<\/td><td>yes<\/td><td>yes<\/td><td>yes<\/td><td>yes<\/td><\/tr><tr><td>Detect file types<\/td><td>yes<\/td><td>yes<\/td><td>yes<\/td><td>yes<\/td><\/tr><tr><td>Calculate section abbreviations<\/td><td>yes<\/td><td>yes<\/td><td>yes<\/td><td>yes<\/td><\/tr><tr><td>Calculate the entropy of the cross sections<\/td><td>yes<\/td><td>yes<\/td><td>yes<\/td><td>yes<\/td><\/tr><tr><td>Extract strings from the executable file<\/td><td>yes<\/td><td>yes<\/td><td>yes<\/td><td>yes<\/td><\/tr><tr><td>Extract\/hide resources<\/td><td>yes<\/td><td>yes<\/td><td>yes<\/td><td>yes<\/td><\/tr><tr><td>Extract\/hide PKCS7 certificate<\/td><td>yes<\/td><td>yes<\/td><td>yes<\/td><td>yes<\/td><\/tr><\/tbody><\/table>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8134ba1 e-flex e-con-boxed e-con e-parent\" data-id=\"8134ba1\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f8763cb e-flex e-con-boxed e-con e-child\" data-id=\"f8763cb\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-326f8e9 e-flex e-con-boxed e-con e-child\" data-id=\"326f8e9\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f3b9ee7 elementor-widget elementor-widget-image\" data-id=\"f3b9ee7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/v617batch2-kul-19-technology1-scaled.jpg\" class=\"attachment-full size-full wp-image-13645\" alt=\"\" srcset=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/v617batch2-kul-19-technology1-scaled.jpg 2560w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/v617batch2-kul-19-technology1-300x200.jpg 300w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/v617batch2-kul-19-technology1-1024x683.jpg 1024w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/v617batch2-kul-19-technology1-768x512.jpg 768w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/v617batch2-kul-19-technology1-1536x1024.jpg 1536w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/v617batch2-kul-19-technology1-2048x1366.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-99ecbcb e-flex e-con-boxed e-con e-child\" data-id=\"99ecbcb\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5637467 elementor-widget elementor-widget-heading\" data-id=\"5637467\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Proven technology<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b4bce4f elementor-widget elementor-widget-text-editor\" data-id=\"b4bce4f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Being very confident in the robustness of our technology and eager for feedback, we run a free community service at www.file-scan.io, which is verified by thousands of daily scans. This field test against fresh malware and phishing threats keeps our solution up to date, hardened and provides a high level of quality. As researchers at heart, we often try out cutting-edge technologies on the community platform, allowing us to quickly adapt to the latest cyber security trends. Only proven technologies make their way into an enterprise-grade commercial product.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>FileScan Prompt. In detail. FileScan.IO is a Next-Gen Sandbox and free malware analysis service. It runs at 10 times the speed of traditional sandboxes with 90% less resource consumption, and its unique adaptive threat analysis technology also enables zero-day malware detection and more Indicator of Compromise (IOCs) extractions. Constantly changing threats We are in a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":14879,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"class_list":["post-15093","page","type-page","status-publish","hentry"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/ramsdata.com.pl\/en\/wp-json\/wp\/v2\/pages\/15093","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ramsdata.com.pl\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ramsdata.com.pl\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ramsdata.com.pl\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ramsdata.com.pl\/en\/wp-json\/wp\/v2\/comments?post=15093"}],"version-history":[{"count":2,"href":"https:\/\/ramsdata.com.pl\/en\/wp-json\/wp\/v2\/pages\/15093\/revisions"}],"predecessor-version":[{"id":38828,"href":"https:\/\/ramsdata.com.pl\/en\/wp-json\/wp\/v2\/pages\/15093\/revisions\/38828"}],"up":[{"embeddable":true,"href":"https:\/\/ramsdata.com.pl\/en\/wp-json\/wp\/v2\/pages\/14879"}],"wp:attachment":[{"href":"https:\/\/ramsdata.com.pl\/en\/wp-json\/wp\/v2\/media?parent=15093"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}