{"id":1025,"date":"2022-08-03T15:00:00","date_gmt":"2022-08-03T14:00:00","guid":{"rendered":"https:\/\/conscia.com\/ie\/?p=1025"},"modified":"2025-09-23T15:04:04","modified_gmt":"2025-09-23T14:04:04","slug":"diving-deep-how-to-detect-malware-persistency-pt-1","status":"publish","type":"post","link":"https:\/\/conscia.com\/ie\/blog\/diving-deep-how-to-detect-malware-persistency-pt-1\/","title":{"rendered":"Diving Deep: How to detect Malware Persistency pt. 1"},"content":{"rendered":"\n<p class=\" wp-block-paragraph\">During a cyber-attack adversaries might gain access to an environment through a certain system, but that might not be their actual targeted system or that might not be their end goal.&nbsp;<strong>To establish a permanent foothold<\/strong>&nbsp;in the environment and plan new attacks within the environment or simply continue to infect the system through reboots, adversaries need to establish persistency in that environment. There are several ways to do that and, in this article series, we will list some of the most prevalent malware persistency mechanisms.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">In this entry, we will focus on utilizing\u00a0<strong>Windows registry for malware persistency<\/strong>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading  wp-block-paragraph\">Windows Registry<\/h2>\n\n\n\n<p class=\" wp-block-paragraph\">Windows registry is utilized by the system to store and retrieve system and user settings. However,&nbsp;malware authors can exploit this utility&nbsp;to ensure persistency for the malicious software by inserting values into registries that are&nbsp;<strong>automatically executed on startup<\/strong>.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">Here are some typical locations for autoruns:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>DAT\\Software\\Microsoft\\ Windows\\CurrentVersion\\Run<\/code><\/li>\n\n\n\n<li><code>HKCU\\Software\\Wow6432Node\\Microsoft\\Windows<\/code><\/li>\n\n\n\n<li><code>NT\\CurrentVersion\\Windows<\/code><\/li>\n\n\n\n<li><code>HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce\\*<\/code><\/li>\n\n\n\n<li><code>HKLM\\Software\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Run\\*<\/code><\/li>\n\n\n\n<li><code>HKLM\\Software\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\RunOnce\\*<\/code><\/li>\n\n\n\n<li><code>HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\\Run\\*<\/code><\/li>\n<\/ul>\n\n\n\n<p class=\" wp-block-paragraph\">If you are interested to see it yourself on your own system, you can download&nbsp;<a href=\"https:\/\/docs.microsoft.com\/en-us\/sysinternals\/downloads\/autoruns\">Autoruns<\/a>&nbsp;from Microsoft and see something like the below.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/conscia.com\/wp-content\/uploads\/2022\/08\/2022-08-03-09_36_37-autoruns-sysinternals_-www.sysinternals.com_.png\" alt=\"\" class=\"wp-image-16275\"\/><figcaption class=\"wp-element-caption\">Figure 1 \u2013 Autoruns example<\/figcaption><\/figure>\n\n\n\n<p class=\" wp-block-paragraph\">And here is a simple example of how one would\u00a0<strong>create such persistency with C++<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/conscia.com\/wp-content\/uploads\/2022\/08\/2022-08-03-10_17_33-%E2%97%8F-persistency.cpp-visual-studio-code.png\" alt=\"\" class=\"wp-image-16278\"\/><figcaption class=\"wp-element-caption\">Figure 2 \u2013 Malware persistency example with C++<\/figcaption><\/figure>\n\n\n\n<p class=\" wp-block-paragraph\">When analyzing malware samples, you might discover\u00a0<strong>usages of WinAPI function<\/strong>\u00a0that interact with registry. As shown in the above screenshot of the code, these may be used to gain persistence in the victim\u2019s environment.<\/p>\n\n\n\n<h2 class=\"wp-block-heading  wp-block-paragraph\">Detecting Windows registry persistency<\/h2>\n\n\n\n<p class=\" wp-block-paragraph\">Since this persistency method relies on modifying some typical and known registry keys, we could leverage our\u00a0<strong>EDR<\/strong> (Endpoint Detection and Response) tool to\u00a0<strong>detect any suspicious changes<\/strong>\u00a0to registries. Especially the ones that we listed at the beginning of this article. A lot of EDR tools will have such detection rules already built-in. However, it will be the analyst\u2019s job to determine whether this modification of registry is indeed malicious.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">The best way to determine this is by either&nbsp;<strong>observing the parent process<\/strong>&nbsp;of the command that initiated the registry change. In this case, one could detect a suspicious executable, perhaps unsigned executable, unexpected file path, bad reputation, etc. This would give them a reason to report this as a potential intrusion.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">One other way would be to&nbsp;<strong>inspect the actual registry modification<\/strong>. In our simple case, you can see that we were quite open with our registry name (\u201c<em>malicious\u201d<\/em>) and our malware executable name is \u201c<em>bad.exe\u201d<\/em>. This probably won\u2019t be the case in real life scenarios, but some values might still give it out as a suspicious change.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>During a cyber-attack adversaries might gain access to an environment through a certain system, but that might not be their actual targeted system or that might not be their end goal.&nbsp;To establish a permanent foothold&nbsp;in the environment and plan new attacks within the environment or simply continue to infect the system through reboots, adversaries need [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1026,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1],"global_solutions":[9,22],"global_partners":[],"global_industries":[25],"global_business_outcome":[43],"global_types":[],"class_list":["post-1025","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","global_solutions-cybersecurity","global_solutions-threat-intelligence","global_industries-all-industries","global_business_outcome-security-operations"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.4 (Yoast SEO v26.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Diving Deep: How to detect Malware Persistency pt. 1 - Conscia Ireland<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conscia.com\/ie\/blog\/diving-deep-how-to-detect-malware-persistency-pt-1\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Diving Deep: How to detect Malware Persistency pt. 1\" \/>\n<meta property=\"og:description\" content=\"During a cyber-attack adversaries might gain access to an environment through a certain system, but that might not be their actual targeted system or that might not be their end goal.&nbsp;To establish a permanent foothold&nbsp;in the environment and plan new attacks within the environment or simply continue to infect the system through reboots, adversaries need [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conscia.com\/ie\/blog\/diving-deep-how-to-detect-malware-persistency-pt-1\/\" \/>\n<meta property=\"og:site_name\" content=\"Conscia Ireland\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-03T14:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-23T14:04:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-4-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mikkel Elvej\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mikkel Elvej\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/conscia.com\/ie\/blog\/diving-deep-how-to-detect-malware-persistency-pt-1\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/conscia.com\/ie\/blog\/diving-deep-how-to-detect-malware-persistency-pt-1\/\"},\"author\":{\"name\":\"Mikkel Elvej\",\"@id\":\"https:\/\/conscia.com\/ie\/#\/schema\/person\/e65cdf0ee22f4931e48d2ae6c7943a5e\"},\"headline\":\"Diving Deep: How to detect Malware Persistency pt. 1\",\"datePublished\":\"2022-08-03T14:00:00+00:00\",\"dateModified\":\"2025-09-23T14:04:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/conscia.com\/ie\/blog\/diving-deep-how-to-detect-malware-persistency-pt-1\/\"},\"wordCount\":437,\"publisher\":{\"@id\":\"https:\/\/conscia.com\/ie\/#organization\"},\"image\":{\"@id\":\"https:\/\/conscia.com\/ie\/blog\/diving-deep-how-to-detect-malware-persistency-pt-1\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-4-1.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conscia.com\/ie\/blog\/diving-deep-how-to-detect-malware-persistency-pt-1\/\",\"url\":\"https:\/\/conscia.com\/ie\/blog\/diving-deep-how-to-detect-malware-persistency-pt-1\/\",\"name\":\"Diving Deep: How to detect Malware Persistency pt. 1 - Conscia Ireland\",\"isPartOf\":{\"@id\":\"https:\/\/conscia.com\/ie\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/conscia.com\/ie\/blog\/diving-deep-how-to-detect-malware-persistency-pt-1\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/conscia.com\/ie\/blog\/diving-deep-how-to-detect-malware-persistency-pt-1\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-4-1.jpg\",\"datePublished\":\"2022-08-03T14:00:00+00:00\",\"dateModified\":\"2025-09-23T14:04:04+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/conscia.com\/ie\/blog\/diving-deep-how-to-detect-malware-persistency-pt-1\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conscia.com\/ie\/blog\/diving-deep-how-to-detect-malware-persistency-pt-1\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conscia.com\/ie\/blog\/diving-deep-how-to-detect-malware-persistency-pt-1\/#primaryimage\",\"url\":\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-4-1.jpg\",\"contentUrl\":\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-4-1.jpg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conscia.com\/ie\/blog\/diving-deep-how-to-detect-malware-persistency-pt-1\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conscia.com\/ie\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Diving Deep: How to detect Malware Persistency pt. 1\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conscia.com\/ie\/#website\",\"url\":\"https:\/\/conscia.com\/ie\/\",\"name\":\"Conscia Ireland\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/conscia.com\/ie\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conscia.com\/ie\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/conscia.com\/ie\/#organization\",\"name\":\"Conscia Ireland\",\"url\":\"https:\/\/conscia.com\/ie\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conscia.com\/ie\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/conscia_logo_tagline_black.png\",\"contentUrl\":\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/conscia_logo_tagline_black.png\",\"width\":994,\"height\":241,\"caption\":\"Conscia Ireland\"},\"image\":{\"@id\":\"https:\/\/conscia.com\/ie\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/conscia-ireland\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/conscia.com\/ie\/#\/schema\/person\/e65cdf0ee22f4931e48d2ae6c7943a5e\",\"name\":\"Mikkel Elvej\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conscia.com\/ie\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g\",\"caption\":\"Mikkel Elvej\"},\"url\":\"https:\/\/conscia.com\/ie\/blog\/author\/mhe\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Diving Deep: How to detect Malware Persistency pt. 1 - Conscia Ireland","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conscia.com\/ie\/blog\/diving-deep-how-to-detect-malware-persistency-pt-1\/","og_locale":"en_US","og_type":"article","og_title":"Diving Deep: How to detect Malware Persistency pt. 1","og_description":"During a cyber-attack adversaries might gain access to an environment through a certain system, but that might not be their actual targeted system or that might not be their end goal.&nbsp;To establish a permanent foothold&nbsp;in the environment and plan new attacks within the environment or simply continue to infect the system through reboots, adversaries need [&hellip;]","og_url":"https:\/\/conscia.com\/ie\/blog\/diving-deep-how-to-detect-malware-persistency-pt-1\/","og_site_name":"Conscia Ireland","article_published_time":"2022-08-03T14:00:00+00:00","article_modified_time":"2025-09-23T14:04:04+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-4-1.jpg","type":"image\/jpeg"}],"author":"Mikkel Elvej","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Mikkel Elvej","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/conscia.com\/ie\/blog\/diving-deep-how-to-detect-malware-persistency-pt-1\/#article","isPartOf":{"@id":"https:\/\/conscia.com\/ie\/blog\/diving-deep-how-to-detect-malware-persistency-pt-1\/"},"author":{"name":"Mikkel Elvej","@id":"https:\/\/conscia.com\/ie\/#\/schema\/person\/e65cdf0ee22f4931e48d2ae6c7943a5e"},"headline":"Diving Deep: How to detect Malware Persistency pt. 1","datePublished":"2022-08-03T14:00:00+00:00","dateModified":"2025-09-23T14:04:04+00:00","mainEntityOfPage":{"@id":"https:\/\/conscia.com\/ie\/blog\/diving-deep-how-to-detect-malware-persistency-pt-1\/"},"wordCount":437,"publisher":{"@id":"https:\/\/conscia.com\/ie\/#organization"},"image":{"@id":"https:\/\/conscia.com\/ie\/blog\/diving-deep-how-to-detect-malware-persistency-pt-1\/#primaryimage"},"thumbnailUrl":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-4-1.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/conscia.com\/ie\/blog\/diving-deep-how-to-detect-malware-persistency-pt-1\/","url":"https:\/\/conscia.com\/ie\/blog\/diving-deep-how-to-detect-malware-persistency-pt-1\/","name":"Diving Deep: How to detect Malware Persistency pt. 1 - Conscia Ireland","isPartOf":{"@id":"https:\/\/conscia.com\/ie\/#website"},"primaryImageOfPage":{"@id":"https:\/\/conscia.com\/ie\/blog\/diving-deep-how-to-detect-malware-persistency-pt-1\/#primaryimage"},"image":{"@id":"https:\/\/conscia.com\/ie\/blog\/diving-deep-how-to-detect-malware-persistency-pt-1\/#primaryimage"},"thumbnailUrl":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-4-1.jpg","datePublished":"2022-08-03T14:00:00+00:00","dateModified":"2025-09-23T14:04:04+00:00","breadcrumb":{"@id":"https:\/\/conscia.com\/ie\/blog\/diving-deep-how-to-detect-malware-persistency-pt-1\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conscia.com\/ie\/blog\/diving-deep-how-to-detect-malware-persistency-pt-1\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conscia.com\/ie\/blog\/diving-deep-how-to-detect-malware-persistency-pt-1\/#primaryimage","url":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-4-1.jpg","contentUrl":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-4-1.jpg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/conscia.com\/ie\/blog\/diving-deep-how-to-detect-malware-persistency-pt-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conscia.com\/ie\/"},{"@type":"ListItem","position":2,"name":"Diving Deep: How to detect Malware Persistency pt. 1"}]},{"@type":"WebSite","@id":"https:\/\/conscia.com\/ie\/#website","url":"https:\/\/conscia.com\/ie\/","name":"Conscia Ireland","description":"","publisher":{"@id":"https:\/\/conscia.com\/ie\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conscia.com\/ie\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/conscia.com\/ie\/#organization","name":"Conscia Ireland","url":"https:\/\/conscia.com\/ie\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conscia.com\/ie\/#\/schema\/logo\/image\/","url":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/conscia_logo_tagline_black.png","contentUrl":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/conscia_logo_tagline_black.png","width":994,"height":241,"caption":"Conscia Ireland"},"image":{"@id":"https:\/\/conscia.com\/ie\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/conscia-ireland\/"]},{"@type":"Person","@id":"https:\/\/conscia.com\/ie\/#\/schema\/person\/e65cdf0ee22f4931e48d2ae6c7943a5e","name":"Mikkel Elvej","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conscia.com\/ie\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g","caption":"Mikkel Elvej"},"url":"https:\/\/conscia.com\/ie\/blog\/author\/mhe\/"}]}},"_links":{"self":[{"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/posts\/1025","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/comments?post=1025"}],"version-history":[{"count":1,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/posts\/1025\/revisions"}],"predecessor-version":[{"id":1027,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/posts\/1025\/revisions\/1027"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/media\/1026"}],"wp:attachment":[{"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/media?parent=1025"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/categories?post=1025"},{"taxonomy":"global_solutions","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_solutions?post=1025"},{"taxonomy":"global_partners","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_partners?post=1025"},{"taxonomy":"global_industries","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_industries?post=1025"},{"taxonomy":"global_business_outcome","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_business_outcome?post=1025"},{"taxonomy":"global_types","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_types?post=1025"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}