{"id":91481,"date":"2023-02-21T17:25:22","date_gmt":"2023-02-21T11:55:22","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=91481"},"modified":"2023-06-17T16:33:05","modified_gmt":"2023-06-17T11:03:05","slug":"your-office-document-is-at-risk-xll-a-new-attack-vector","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/your-office-document-is-at-risk-xll-a-new-attack-vector\/","title":{"rendered":"Your Office Document is at Risk &#8211; XLL, A New Attack Vector"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p>Microsoft Office documents are used worldwide by both corporates and home-users alike. \u00a0It\u2019s different office versions, whether licensed or unlicensed offers users an easy way to create and modify files. However, this software is also susceptible to <a href=\"https:\/\/www.quickheal.co.in\/home-users\/quick-heal-internet-security\">cyberattacks<\/a>.<\/p>\n<p>Cybercriminals often take advantage of its vulnerability and use VBA (Visual Basic Application) macros as entry points to gain access to targeted systems and devices.<\/p>\n<p>Over the years, VBA macros has been a domineering threat for Office documents with its ability to spread malware. And, this is why Microsoft has finally decided to block VBA macros for files that have \u2018mark of the web\u2019 (MOTW) tag. \u00a0With this change, whenever users open a file downloaded from internet, \u00a0such as email attachments which have macros, the following message will be displayed:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91482 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/02\/Security-Risk-Warning.png\" alt=\"\" width=\"728\" height=\"60\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/Security-Risk-Warning.png 1241w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/Security-Risk-Warning-300x25.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/Security-Risk-Warning-650x53.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/Security-Risk-Warning-768x63.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/Security-Risk-Warning-789x65.png 789w\" sizes=\"(max-width: 728px) 100vw, 728px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em><b>Fig-1.<\/b><\/em><\/strong><em>\u00a0Security Risk Warning<\/em><\/p>\n<p>As a result, attackers are now forced to think of alternative ways to reach their victims. And, here\u2019s where Microsoft Add-ins come into the picture.<\/p>\n<p><strong>What is Microsoft add-ins?<\/strong><\/p>\n<p>An add-in is a software program that expands the capabilities of main programs. It is a term commonly used by Microsoft and other platforms which have additional functions that can be added to primary programs. Office add-ins are DLL files which have different extensions depending on the application. Microsoft Excel and Word have add-ins with the file extensions, <em>\u2018.xll\u2019<\/em>\u00a0and <em>\u2018.wll\u2019<\/em>\u00a0respectively.<\/p>\n<p>For Word, the <em>&#8216;.wll&#8217;<\/em>\u00a0add-in needs to be placed in a specific location, specified by the registry value HKCU\\Software\\Microsoft\\Office\\16.0\\Word\\Security\\Trusted Locations, depending on the Office version. This will ensure that <em>&#8216;.wll&#8217;<\/em>\u00a0add-in gets executed by word application.<\/p>\n<p>For Excel add-ins, whenever <em>\u2018.xll\u2019<\/em>\u00a0file gets loaded, it will be opened by an excel application.<\/p>\n<p><strong>Malicious XLL files <\/strong><\/p>\n<p>Many threat actors have started using XLL files as the initial vector. These files are mainly shared as an email attachment. It is associated with an icon similar to other excel supported file making it hard for end users to distinguish between the original excel file and an add-in file.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-91484 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/02\/Malicious-DLL-with-.XLL-extension.png\" alt=\"\" width=\"110\" height=\"113\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/Malicious-DLL-with-.XLL-extension.png 110w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/Malicious-DLL-with-.XLL-extension-80x81.png 80w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/Malicious-DLL-with-.XLL-extension-45x45.png 45w\" sizes=\"(max-width: 110px) 100vw, 110px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em><b>Fig-2.<\/b><\/em><\/strong><em>\u00a0Malicious DLL with .XLL extension<\/em><\/p>\n<p>Upon opening such files, excel will display a warning about the malicious code in it.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-91485 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/02\/MS-office-warning-for-Add-in.png\" alt=\"\" width=\"396\" height=\"218\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/MS-office-warning-for-Add-in.png 396w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/MS-office-warning-for-Add-in-300x165.png 300w\" sizes=\"(max-width: 396px) 100vw, 396px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em><b>Fig-3.<\/b><\/em><\/strong><em>\u00a0MS office warning for Add-in<\/em><\/p>\n<p>It is possible for a <em>\u201c.dll\u201d<\/em>\u00a0(dynamic-link library) file to be renamed as a <em>\u201c.xll\u201d<\/em>\u00a0(Excel add-in) file and used for malicious purposes. The difference between a regular DLL and an XLL file is that XLLs can have certain exported functions which will be called by the Excel Add-In manager if triggered by the Excel application. When XLL file is launched by Excel, it will invoke the export functions based on the defined XLL interface like <em>xlAutoOpen<\/em>\u00a0and <em>xlAutoClose <\/em>similar to the methods <em>Auto_Open<\/em>\u00a0and <em>Auto_Close<\/em>\u00a0in VBA macros. These functions can be used to load malicious code and download malware payload.<\/p>\n<p><strong>Technical Analysis:<\/strong><\/p>\n<p>It begins with\u00a0a\u00a0file named \u201cBankStatement-1674745402.xll\u201d, which is a 64 bit DLL\u00a0file. This file contains\u00a0one export function in it with a name \u201cxlAutoOpen\u201d as shown in fig 4.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-91486 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/02\/DLL-Export-Function.png\" alt=\"\" width=\"564\" height=\"103\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/DLL-Export-Function.png 564w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/DLL-Export-Function-300x55.png 300w\" sizes=\"(max-width: 564px) 100vw, 564px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em><b>Fig-4.<\/b><\/em><\/strong><em>\u00a0DLL Export Function<\/em><\/p>\n<p>We have executed this DLL file explicitly using \u201crundll32.exe\u201d with the parameters,<\/p>\n<p style=\"text-align: center;\">\u201cC:\\Windows\\SysWOW64\\rundll32.exe C:\\Users\\user\\Desktop\\9009859256\\BankStatement-1674745402.xll, xlAutoOpen\u201d.<\/p>\n<p>In fig 5, we can see process execution flow.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-91488 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/02\/Process-Flow-of-Execution.png\" alt=\"\" width=\"339\" height=\"138\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/Process-Flow-of-Execution.png 339w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/Process-Flow-of-Execution-300x122.png 300w\" sizes=\"(max-width: 339px) 100vw, 339px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em>Fig-5.<\/em><\/strong><em>\u00a0Process Flow of Execution<\/em><\/p>\n<p>The export function has a code (shown in fig 6) that uses the strcat function to generate different strings that are having link and commands for execution. The below function creates a link\u00a0\u201c<u>http[:]\/\/160[.]119[.]253[.]36\/filesetup_v17.3.4.zip<\/u>\u201d\u00a0and it tries to connect to this link to download the zip file and saved as a \u201c<strong><b>mypictures.zip<\/b><\/strong>\u201d.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-91489 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/02\/Code-for-generation-of-Link-and-connection.png\" alt=\"\" width=\"437\" height=\"342\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/Code-for-generation-of-Link-and-connection.png 437w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/Code-for-generation-of-Link-and-connection-300x235.png 300w\" sizes=\"(max-width: 437px) 100vw, 437px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em>Fig-6.<\/em><\/strong><em>\u00a0Code for generation of Link and connection<\/em><\/p>\n<p>After this, <a href=\"https:\/\/blogs.quickheal.com\/powershell-an-attackers-paradise\/\">PowerShell<\/a> is used to unzip this zip file into the %Temp% folder with the below-mentioned command,<\/p>\n<p><strong>\u201cpowershell.exe Expand-Archive \u2013Path &#8220;C:\\Users\\user\\AppData\\Local\\Temp\\mypictures.zip&#8221; -DestinationPath &#8220;C:\\Users\\user\\AppData\\Local\\Temp\\&#8221;&#8221;<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>After unzipping we get \u201c<strong>filesetup_v17.3.4<\/strong>\u201d named folder in the %Temp% folder which has the \u201c<strong>Resources<\/strong>\u201d folder and \u201c<strong>filesetup_v17.3.4.jpg<\/strong>\u201d file inside.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-91490 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/02\/filesetup_v17.3.4-folder-into-Temp.png\" alt=\"\" width=\"543\" height=\"265\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/filesetup_v17.3.4-folder-into-Temp.png 543w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/filesetup_v17.3.4-folder-into-Temp-300x146.png 300w\" sizes=\"(max-width: 543px) 100vw, 543px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em>Fig-7.<\/em><\/strong><em>\u00a0<\/em><strong><em>filesetup_v17.3.4<\/em><\/strong><em>\u00a0folder into Temp<\/em><\/p>\n<p>Resources folder has multiple XML files containing dummy data. Attackers purposely put that data to make the analysis gruelling. The \u201c<strong>filesetup_v17.3.4.jpg<\/strong>\u201d is not an image file format file. It is nothing but a 32-bit PE File written in .NET language and it looks like an Inno Setup Module installer.<\/p>\n<p>An Inno Setup is a free and popular installer framework used to create installers for Windows applications. It provides a scripting language that allows developers to customize the installation process, including the creation of shortcuts, registry entries, and other system configuration.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-91492 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/02\/filesetup_v17.3.4.jpg-file-info-in-Die-too.png\" alt=\"\" width=\"593\" height=\"352\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/filesetup_v17.3.4.jpg-file-info-in-Die-too.png 593w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/filesetup_v17.3.4.jpg-file-info-in-Die-too-300x178.png 300w\" sizes=\"(max-width: 593px) 100vw, 593px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em>Fig-8.<\/em><\/strong><em>\u00a0<\/em><em>\u201c<\/em><strong><em>filesetup_v17.3.4.jpg<\/em><\/strong><em>\u201d<\/em><em>\u00a0file info in Die tool<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>This .NET file has 213 methods in it (shown in fig 9) which are highly obfuscated. We can de-obfuscate using\u00a0<strong>de4dot<\/strong>\u00a0obfuscators. To avoid reversing a .NET application, the author has implemented multiple methods to make it more difficult for any researcher to understand the code and logic of the application.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-91493 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/02\/NET-Methods-Coun.png\" alt=\"\" width=\"167\" height=\"345\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/NET-Methods-Coun.png 167w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/NET-Methods-Coun-145x300.png 145w\" sizes=\"(max-width: 167px) 100vw, 167px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em>Fig-9.<\/em><\/strong><em>\u00a0\u201c.NET Methods Count\u201d<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>This \u201c<strong>filesetup_v17.3.4.jpg<\/strong>\u201d file executed using below mentioned command,<\/p>\n<p><strong>\u201ccmd.exe \/c start C:\\Users\\user\\AppData\\Local\\Temp\\filesetup_v17.3.4\\filesetup_v17.3.4.jpg\u201d<\/strong><\/p>\n<p>This file uses a few anti-debugging techniques at the start of the execution which are mentioned as below,<\/p>\n<p>1. OllyDbg is a popular debugger tool that can be used to analyze and modify running programs, including .NET applications. One technique for detecting and preventing debugging using OllyDbg involves checking for the presence of a specific string that is associated with the debugger.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-91494 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/02\/OLLDBG-Tool-Check.png\" alt=\"\" width=\"479\" height=\"96\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/OLLDBG-Tool-Check.png 479w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/OLLDBG-Tool-Check-300x60.png 300w\" sizes=\"(max-width: 479px) 100vw, 479px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em>Fig-10.<\/em><\/strong><em>\u00a0OLLDBG Tool Check<\/em><\/p>\n<p>\u00a02. Debugger registry check which is used to determine if a debugger is attached to the process and take appropriate action if one is found.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91496 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/02\/Debugger-registry-check.png\" alt=\"\" width=\"703\" height=\"113\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/Debugger-registry-check.png 821w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/Debugger-registry-check-300x48.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/Debugger-registry-check-650x105.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/Debugger-registry-check-768x123.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/Debugger-registry-check-789x127.png 789w\" sizes=\"(max-width: 703px) 100vw, 703px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em>Fig-11.<\/em><\/strong><em>\u00a0Debugger registry check<\/em><\/p>\n<p>\u00a03. IsDebuggerPresent function is used to detect if a debugger is attached to the process or not.<\/p>\n<p>4. CheckRemoteDebuggerPresent function is used to detect if a debugger is attached to the current process or a remote process or not.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91498 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/02\/IsDebuggerPresent-and-CheckRemoteDebuggerPresent-Function.png\" alt=\"\" width=\"690\" height=\"414\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/IsDebuggerPresent-and-CheckRemoteDebuggerPresent-Function.png 785w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/IsDebuggerPresent-and-CheckRemoteDebuggerPresent-Function-300x180.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/IsDebuggerPresent-and-CheckRemoteDebuggerPresent-Function-650x390.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/IsDebuggerPresent-and-CheckRemoteDebuggerPresent-Function-768x461.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/IsDebuggerPresent-and-CheckRemoteDebuggerPresent-Function-250x150.png 250w\" sizes=\"(max-width: 690px) 100vw, 690px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em>Fig-12. <\/em><\/strong><em>IsDebuggerPresent and CheckRemoteDebuggerPresent Functions<\/em><\/p>\n<p>Racoon Stealer V2 is a type of malware that is designed to steal sensitive information from infected systems. It is capable of stealing various types of files, including .ttf and .xml files, and storing them on the infected system. However, if the CNC (command and control) server is not operational, the malware may be unable to send the stolen information to the server for exfiltration.<\/p>\n<p>In this scenario, the stolen .ttf and .xml files may remain on the infected system until the CNC server becomes available. This can potentially expose sensitive information to the attacker, as they may still be able to access the stolen files on the compromised system.<\/p>\n<p><strong>Quick Heal Protection:<\/strong><\/p>\n<p><a href=\"https:\/\/www.quickheal.co.in\/\">Quick heal<\/a> security labs has been actively hunting for these types of files to ensure that all Quick Heal customers are protected with the following detections.<\/p>\n<ul>\n<li>Downldr.XllfmAgent.S29349494<\/li>\n<li>Downldr.XllDanot.S29357788<\/li>\n<li>Trojan.GenericRl.S24740760<\/li>\n<li>Trojan.RacoonStealerCiR<\/li>\n<\/ul>\n<p><strong>Conclusion:<\/strong><\/p>\n<p>In conclusion, Microsoft Add-Ins can present a potential threat vector for malware like Raccoon Stealer V2. These types of malware are designed to steal sensitive information from infected systems and use Microsoft Add-Ins as a means of delivering the malware to target systems. To mitigate this risk, organizations should implement best practices for endpoint security, such as keeping software up to date, implementing strong antivirus and <a href=\"https:\/\/blogs.quickheal.com\/the-threat-landscape-emerging-viruses-and-malware-to-watch-out-for-in-2023\/\">anti-malware solutions<\/a>, enabling firewalls and other network security measures, as well as educating users on the steps for identifying and avoiding social engineering attacks. By taking these measures, organizations can significantly reduce the risk of malware attacks and data theft through Microsoft Add-Ins and other potential attack vectors.<\/p>\n<p><strong>IOCs:<\/strong><\/p>\n<p><strong>IP:<\/strong><\/p>\n<p>160.119.253.242<\/p>\n<p>160.119.253.36<\/p>\n<p>45.93.201.114<\/p>\n<p><strong>URL:<\/strong><\/p>\n<p>http[:]\/\/160[.]119[.]253[.]36\/filesetup_v17.3.4.zip<\/p>\n<p><strong>Malicious DLL File:<\/strong><\/p>\n<p>ab06eca36c9e011a149ea1625b8ad3629907b2a418ce10fe039870a3d9928bb0<\/p>\n<p>9a652f77b9fba07d04e4021d3f533791bdedf4284fbbc007b4c55fea94a46635<\/p>\n<p>6f74060f131c9034f55349cdeb2b5ebbd73582e6ac9da11c9310892bfdfeba36<\/p>\n<p>5dfa56596b133d080b770e11783b1763da445dc2fef57fe060c87e7b73012308<\/p>\n<p>2d9e90155343ba8f8f8e16c80b1dc62227f607c2ba277491c6f8f384bf5e0499<\/p>\n<p>16522212c1b951ffab57e8f8fa288295cca5d9600e83b74551601246841cae91<\/p>\n<p>0ec2bb5aad17efc7e1e1d8371b04684957684fec8e73df62bd41320bbf517b13<\/p>\n<p>4da00e7d529be457c914b085d66f012c070bf6e3f85675303aa41a7689c08c75<\/p>\n<p>&nbsp;<\/p>\n<p><strong><b>Malicious ZIP File:<\/b><\/strong><\/p>\n<p>59d2403b99c95a057e43dd25e3d58b66331d130b52c19d2919e7966023ede5f6<\/p>\n<p><strong>Subject Matter Expert:<\/strong><\/p>\n<p>Anjali Raut, Akshay Gaikwad<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Microsoft Office documents are used worldwide by both corporates and home-users alike. \u00a0It\u2019s different office versions, whether licensed or unlicensed offers users an easy way to create and modify files. However, this software is also susceptible to cyberattacks. Cybercriminals often take advantage of its vulnerability and use VBA (Visual Basic Application) macros as entry [&hellip;]<\/p>\n","protected":false},"author":62,"featured_media":91503,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1739,21,24,968,1],"tags":[1953,901,534,1970,1702,81,1547,80,38,1971],"class_list":["post-91481","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-email","category-malware","category-spyware","category-uncategorized","tag-malwareattack","tag-cyberattack","tag-cybersecurity","tag-excel","tag-information-stealer","tag-microsoft-office","tag-ms-office","tag-quick-heal","tag-vulnerability","tag-xll"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/91481"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=91481"}],"version-history":[{"count":15,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/91481\/revisions"}],"predecessor-version":[{"id":91746,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/91481\/revisions\/91746"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/91503"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=91481"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=91481"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=91481"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}