{"type":"video","version":"1.0","html":"<iframe width=\"560\" height=\"315\" sandbox=\"allow-same-origin allow-scripts allow-popups allow-forms\" title=\"Recolección de elementos volátiles (por comandos y Redline)\" src=\"https://tubedu.org/videos/embed/2roZbNw1rXN4gnJBtutmc9\" style=\"border: none\" allow=\"fullscreen\"></iframe>","width":560,"height":315,"title":"Recolección de elementos volátiles (por comandos y Redline)","author_name":"Ciberseguridad en Entornos de TI","author_url":"https://tubedu.org/video-channels/ceti","provider_name":"PeerTube","provider_url":"https://tubedu.org","thumbnail_url":"https://tubedu.org/lazy-static/thumbnails/0c1cfb35-6e32-4e19-a866-a0e1bf47144e.jpg","thumbnail_width":1280,"thumbnail_height":720}