{"id":291,"date":"2016-10-17T10:39:52","date_gmt":"2016-10-17T10:39:52","guid":{"rendered":"http:\/\/www.protegent360.com\/blog\/?p=291"},"modified":"2023-02-25T10:52:20","modified_gmt":"2023-02-25T05:22:20","slug":"how-to-decrypt-files-encrypted-by-ransomware","status":"publish","type":"post","link":"https:\/\/protegent360.com\/blog\/how-to-decrypt-files-encrypted-by-ransomware\/","title":{"rendered":"How to Decrypt Files Encrypted By Ransomware"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p>In our series of Ransomware discussion, today we come up with measures you can try on to decrypt files which are encrypted by Ransomware. It has been declared globally by all antivirus companies and FBI as well that Ransomware is the most deadly virus (or encryption) for which there is still no remedy found.<\/p>\n<p>In this edition of Ransomware, we are going to list down the remedial steps you could try to get back your encrypted data:<\/p>\n<p><!--more--><\/p>\n<p><b><span style=\"text-decoration: underline;\">System Restore<\/span><\/b><\/p>\n<p>This is the mostly commonly used measure used for getting back the files and data which is being encrypted by Ransomware. To perform the System Restore, you first need to restart your system and presses F8 continuously while the system boots.<\/p>\n<p>There after a screen will be displayed where user has to select safe mode for Windows to start. Thereafter the Windows opens using only the necessary application which is required for the startup of Windows and doesn\u2019t run other add-on application which also includes the application or process of Ransomware present on the infected system.<\/p>\n<p>Then click on the Start Menu -&gt; Accessories -&gt; System Tools -&gt; System Restore. After that a pop-up screen is displayed where you need to select the system restore point from the past dates available in the options. After selecting the restore point, click on Finish. After that the system will automatically gets restarted and starts restoring the Windows to previous restore point. After the System Restore process is completed, the Windows gets restarted and you will be able to see the data present in your system in the previous decrypted version.<\/p>\n<p><b><span style=\"text-decoration: underline;\">Restore Previous Version of Files &amp; Folders<\/span><\/b><\/p>\n<p>This solution works on the level of files and folders when you want to decrypt only some of the files and folders from your Ransomware infected system. Like in the above solution, the system needs to be restarted using the safe mode.<\/p>\n<p>Now right click on the file or folder which you want to decrypt. Click on the properties, a pop-up window will get opened, click on Previous version menu. Thereafter select the previous saved version of the files or folder dated before the date your system got infect from Ransomware. After that click on Restore and you will get back your previous non-infected file or folder.<\/p>\n<p><b><span style=\"text-decoration: underline;\">Manually Removal<\/span><\/b><\/p>\n<p>Ransomware gets into your system and starts a process which keeping on running without the user knowing about it. During this process, Ransomware starts decrypting data files in the system and doesn\u2019t allow the files to be accessible to the user. In this case, you need to follow the following steps:<\/p>\n<ul>\n<li><b>Stop Malicious Ransomware Process using Task Manager<\/b><\/li>\n<\/ul>\n<p>Open Task Manager and go in the process submenu. Ransomware malicious process is generally located in <b>%AppData%\\{2ED2A2FE-872C-D4A0-17AC-E301404F1CBA}\\ folder<\/b> and name itself with a random Windows executable. We suggest keeping the process name saved in text document for reference before killing the process. \u00a0Locate for other suspicious files associated with Ransomware and delete the respective directories with the suspicious files.<\/p>\n<ul>\n<li><b>Hidden Files to be Unrevealed<\/b><\/li>\n<\/ul>\n<p>Click on any folder. In the organize menu, click on \u201cShow Hidden Files &amp; Folder\u201d option. Now uncheck \u201cHidden files\u201d. Now click on \u201cApply\u201d &amp;\u201dOK\u201d button.<\/p>\n<ul>\n<li><b>Locate Ransomware in the Startup Location<\/b><\/li>\n<\/ul>\n<p>Press Window + R key. Then type \u201cRegedit\u201d in the pop-up window. We recommend that be careful during this process as you might accidentally delete some system registries which might result in Windows crash. Now delete the suspicious executable file. Now go to the host file at <b>System32\/Drivers\/etc\/host<\/b> and delete the foreign IPs connected to your system mentioned at the bottom of the host file. Delete all of these foreign IP addresses except the local entry.<\/p>\n<ul>\n<li><b>Restore System <\/b><\/li>\n<\/ul>\n<p>Click on the Start Menu -&gt; Accessories -&gt; System Tools -&gt; System Restore and restore the system to get back your original data files.<\/p>\n<p><b>At the end, we strongly suggest that if you get back your encrypted files, then make a backup of the data so that you don\u2019t have to be worried in future ransomware attacks. We also suggest that users should create a system restore point regularly after a time of interval.<\/b><\/p>\n<p>That\u2019s it in the discussion of some ways users can try with to decrypt data files encrypted by Ransomware. \u00a0The above discussed remedies are not a permanent solution for decrypting the data files encrypted by Ransomware and these might be useful in certain scenarios. \u00a0. I do believe that the facts mentioned above are true as per my knowledge. I would be happy to if any reader wanted to give their valuable suggestions on the above discussed topic.<\/p>\n<p>As Ransomware is becoming a major threat for internet users, we strongly suggest that users should not open emails containing attachment from unknown \/ non-trusted sources.<\/p>\n<p>We hope that readers would get benefited from the above discussion and we promise that we will be come back with some more in context with Ransomware. Till then keep Protegent in your system for secure computer use.<\/p>\n<h4><strong>Follow us on:-<\/strong><\/h4>\n<p><a href=\"https:\/\/protegent360.com\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-13\" src=\"http:\/\/protegent360.com\/wp-content\/uploads\/2022\/06\/logo.png\" alt=\"\" width=\"148\" height=\"32\" \/><\/a> \u00a0<a href=\"https:\/\/twitter.com\/UnistalGlobal\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-11066\" src=\"http:\/\/protegent360.com\/wp-content\/uploads\/2020\/09\/twitter-icon-circle-blue-logo-0902F48837-seeklogo.com_-300x300.png\" alt=\"\" width=\"36\" height=\"36\" srcset=\"https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/twitter-icon-circle-blue-logo-0902F48837-seeklogo.com_.png 300w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/twitter-icon-circle-blue-logo-0902F48837-seeklogo.com_-150x150.png 150w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/twitter-icon-circle-blue-logo-0902F48837-seeklogo.com_-200x200.png 200w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/twitter-icon-circle-blue-logo-0902F48837-seeklogo.com_-50x50.png 50w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/twitter-icon-circle-blue-logo-0902F48837-seeklogo.com_-100x100.png 100w\" sizes=\"auto, (max-width: 36px) 100vw, 36px\" \/><\/a>\u00a0\u00a0 <a href=\"https:\/\/www.linkedin.com\/company\/unistal-systems-pvt-ltd\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-11067\" src=\"http:\/\/protegent360.com\/wp-content\/uploads\/2020\/09\/640px-LinkedIn_logo_initials-300x300.png\" alt=\"\" width=\"36\" height=\"36\" srcset=\"https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/640px-LinkedIn_logo_initials-300x300.png 300w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/640px-LinkedIn_logo_initials-150x150.png 150w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/640px-LinkedIn_logo_initials-550x550.png 550w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/640px-LinkedIn_logo_initials-600x600.png 600w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/640px-LinkedIn_logo_initials-200x200.png 200w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/640px-LinkedIn_logo_initials-50x50.png 50w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/640px-LinkedIn_logo_initials-100x100.png 100w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/640px-LinkedIn_logo_initials.png 640w\" sizes=\"auto, (max-width: 36px) 100vw, 36px\" \/><\/a>\u00a0\u00a0 <a href=\"https:\/\/www.instagram.com\/unistalglobal\/?hl=en\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-11068\" src=\"http:\/\/protegent360.com\/wp-content\/uploads\/2020\/09\/Instagram_logo_2016.svg_-300x300.png\" alt=\"\" width=\"35\" height=\"35\" srcset=\"https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Instagram_logo_2016.svg_-300x300.png 300w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Instagram_logo_2016.svg_-1024x1024.png 1024w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Instagram_logo_2016.svg_-150x150.png 150w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Instagram_logo_2016.svg_-768x768.png 768w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Instagram_logo_2016.svg_-1536x1536.png 1536w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Instagram_logo_2016.svg_-550x550.png 550w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Instagram_logo_2016.svg_-600x600.png 600w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Instagram_logo_2016.svg_-200x200.png 200w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Instagram_logo_2016.svg_-50x50.png 50w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Instagram_logo_2016.svg_-100x100.png 100w\" sizes=\"auto, (max-width: 35px) 100vw, 35px\" \/><\/a>\u00a0\u00a0 <a href=\"https:\/\/www.facebook.com\/UnistalGlobal\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-11069\" src=\"http:\/\/protegent360.com\/wp-content\/uploads\/2020\/09\/Facebook_Logo_2019-300x300.png\" alt=\"\" width=\"35\" height=\"35\" srcset=\"https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Facebook_Logo_2019-300x300.png 300w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Facebook_Logo_2019-150x150.png 150w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Facebook_Logo_2019-768x768.png 768w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Facebook_Logo_2019-550x550.png 550w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Facebook_Logo_2019-600x600.png 600w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Facebook_Logo_2019-200x200.png 200w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Facebook_Logo_2019-50x50.png 50w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Facebook_Logo_2019-100x100.png 100w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Facebook_Logo_2019.png 800w\" sizes=\"auto, (max-width: 35px) 100vw, 35px\" \/><\/a>\u00a0\u00a0 <a href=\"https:\/\/www.youtube.com\/c\/UnistalGlobal\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-11070\" src=\"http:\/\/protegent360.com\/wp-content\/uploads\/2020\/09\/free-youtube-logo-icon-2431-thumb-300x300.png\" alt=\"\" width=\"37\" height=\"37\" srcset=\"https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/free-youtube-logo-icon-2431-thumb-300x300.png 300w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/free-youtube-logo-icon-2431-thumb-150x150.png 150w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/free-youtube-logo-icon-2431-thumb-200x200.png 200w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/free-youtube-logo-icon-2431-thumb-50x50.png 50w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/free-youtube-logo-icon-2431-thumb-100x100.png 100w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/free-youtube-logo-icon-2431-thumb.png 512w\" sizes=\"auto, (max-width: 37px) 100vw, 37px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; In our series of Ransomware discussion, today we come up with measures you can try on to decrypt files which are encrypted by Ransomware. It has been declared globally by all antivirus companies and FBI as well that Ransomware is the most deadly virus (or encryption) for which there is still no remedy found. In this edition of Ransomware, we are going to list down the remedial steps you could try to get back your encrypted data:<\/p>\n","protected":false},"author":20,"featured_media":12164,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[104,129,133,106],"tags":[158,159,160,161],"class_list":["post-291","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-our-complete-security-software","category-computer-monitoring-software","category-internet-security","category-our-total-security-software","tag-india","tag-infected-files-decryption","tag-online","tag-ransomware-decryption"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Decrypt Files Encrypted By Ransomware<\/title>\n<meta name=\"description\" content=\"In our series of Ransomware discussion, today we come up with measures you can try on to decrypt files which are encrypted by Ransomware.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/protegent360.com\/blog\/how-to-decrypt-files-encrypted-by-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Decrypt Files Encrypted By Ransomware\" \/>\n<meta property=\"og:description\" content=\"In our series of Ransomware discussion, today we come up with measures you can try on to decrypt files which are encrypted by Ransomware.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/protegent360.com\/blog\/how-to-decrypt-files-encrypted-by-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"Our Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-17T10:39:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-25T05:22:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2016\/10\/How-to-Decrypt-Files-Encrypted-By-Ransomware.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"587\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/protegent360.com\/blog\/#website\",\"url\":\"https:\/\/protegent360.com\/blog\/\",\"name\":\"Our Blog\",\"description\":\"World&#039;s Only Antivirus with Data Recovery Software\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/protegent360.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/protegent360.com\/blog\/how-to-decrypt-files-encrypted-by-ransomware\/\",\"url\":\"https:\/\/protegent360.com\/blog\/how-to-decrypt-files-encrypted-by-ransomware\/\",\"name\":\"How to Decrypt Files Encrypted By Ransomware\",\"isPartOf\":{\"@id\":\"https:\/\/protegent360.com\/blog\/#website\"},\"datePublished\":\"2016-10-17T10:39:52+00:00\",\"dateModified\":\"2023-02-25T05:22:20+00:00\",\"author\":{\"@id\":\"https:\/\/protegent360.com\/blog\/#\/schema\/person\/ee21d31223ed61b92f09de8f39040790\"},\"description\":\"In our series of Ransomware discussion, today we come up with measures you can try on to decrypt files which are encrypted by Ransomware.\",\"breadcrumb\":{\"@id\":\"https:\/\/protegent360.com\/blog\/how-to-decrypt-files-encrypted-by-ransomware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/protegent360.com\/blog\/how-to-decrypt-files-encrypted-by-ransomware\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/protegent360.com\/blog\/how-to-decrypt-files-encrypted-by-ransomware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/protegent360.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Decrypt Files Encrypted By Ransomware\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/protegent360.com\/blog\/#\/schema\/person\/ee21d31223ed61b92f09de8f39040790\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/protegent360.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/40e3fe95bdfe6f93a4395dda498d49c4a79d3f702b81ad6fb6a9cc55d07338eb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/40e3fe95bdfe6f93a4395dda498d49c4a79d3f702b81ad6fb6a9cc55d07338eb?s=96&d=mm&r=g\",\"caption\":\"admin\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Decrypt Files Encrypted By Ransomware","description":"In our series of Ransomware discussion, today we come up with measures you can try on to decrypt files which are encrypted by Ransomware.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/protegent360.com\/blog\/how-to-decrypt-files-encrypted-by-ransomware\/","og_locale":"en_US","og_type":"article","og_title":"How to Decrypt Files Encrypted By Ransomware","og_description":"In our series of Ransomware discussion, today we come up with measures you can try on to decrypt files which are encrypted by Ransomware.","og_url":"https:\/\/protegent360.com\/blog\/how-to-decrypt-files-encrypted-by-ransomware\/","og_site_name":"Our Blog","article_published_time":"2016-10-17T10:39:52+00:00","article_modified_time":"2023-02-25T05:22:20+00:00","og_image":[{"width":587,"height":250,"url":"https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2016\/10\/How-to-Decrypt-Files-Encrypted-By-Ransomware.webp","type":"image\/webp"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/protegent360.com\/blog\/#website","url":"https:\/\/protegent360.com\/blog\/","name":"Our Blog","description":"World&#039;s Only Antivirus with Data Recovery Software","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/protegent360.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/protegent360.com\/blog\/how-to-decrypt-files-encrypted-by-ransomware\/","url":"https:\/\/protegent360.com\/blog\/how-to-decrypt-files-encrypted-by-ransomware\/","name":"How to Decrypt Files Encrypted By Ransomware","isPartOf":{"@id":"https:\/\/protegent360.com\/blog\/#website"},"datePublished":"2016-10-17T10:39:52+00:00","dateModified":"2023-02-25T05:22:20+00:00","author":{"@id":"https:\/\/protegent360.com\/blog\/#\/schema\/person\/ee21d31223ed61b92f09de8f39040790"},"description":"In our series of Ransomware discussion, today we come up with measures you can try on to decrypt files which are encrypted by Ransomware.","breadcrumb":{"@id":"https:\/\/protegent360.com\/blog\/how-to-decrypt-files-encrypted-by-ransomware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/protegent360.com\/blog\/how-to-decrypt-files-encrypted-by-ransomware\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/protegent360.com\/blog\/how-to-decrypt-files-encrypted-by-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/protegent360.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Decrypt Files Encrypted By Ransomware"}]},{"@type":"Person","@id":"https:\/\/protegent360.com\/blog\/#\/schema\/person\/ee21d31223ed61b92f09de8f39040790","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/protegent360.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/40e3fe95bdfe6f93a4395dda498d49c4a79d3f702b81ad6fb6a9cc55d07338eb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/40e3fe95bdfe6f93a4395dda498d49c4a79d3f702b81ad6fb6a9cc55d07338eb?s=96&d=mm&r=g","caption":"admin"}}]}},"_links":{"self":[{"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/posts\/291","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/comments?post=291"}],"version-history":[{"count":1,"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/posts\/291\/revisions"}],"predecessor-version":[{"id":12165,"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/posts\/291\/revisions\/12165"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/media\/12164"}],"wp:attachment":[{"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/media?parent=291"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/categories?post=291"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/tags?post=291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}