{"id":52540,"date":"2016-02-11T21:13:57","date_gmt":"2016-02-11T21:13:57","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=52540"},"modified":"2016-02-12T23:23:52","modified_gmt":"2016-02-12T23:23:52","slug":"52540","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/52540\/","title":{"rendered":"TeslaCrypt Ransomware"},"content":{"rendered":"<p><strong>TeslaCrypt 3.0 stopped by SuperShield<\/strong><\/p>\n<p><!--more--><\/p>\n<p>There are now three versions of TeslaCrypt that have circulated: 1.0, 2.0, and 3.0.\u00a0The latest, TeslaCrypt 3.0, was first discovered in January 2016.<\/p>\n<p>We\u2019ve recently come across several TeslaCrypt files trying to execute on our users&#8217; machines and blocked them. Before downloading and executing the\u00a0file in a\u00a0virtual machine, I was suspicious of the file as soon as I noticed\u00a0that it had jumbled letters for a vendor and product name. I&#8217;ve put together a short video (about 3 minutes long) showing what this file would have done to your computer if it was not blocked by SuperShield. We received this file (TeslaCrypt 3.0) from a user&#8217;s computer on February 8, 2016.<\/p>\n<p>Some notes\u00a0about the video:<\/p>\n<ul>\n<li>You can see when I first attempt to run the file SuperShield blocks it. I then turn off SuperShield and run it again.<\/li>\n<li>I&#8217;ve set up some fake &#8220;Valuable Documents&#8221; to simulate files on your computer, each containing just a few sentences.<\/li>\n<li>The middle of the video has been sped up as it takes about a minute for the action to begin.<\/li>\n<li>After the file was executed,\u00a0you can see that\u00a0there was a spike in CPU usage, and then it automatically closes Task Manager so I can&#8217;t access it.<\/li>\n<li>Several versions of recovery instructions pop up, and the &#8220;Valuable Documents&#8221; have been encrypted. When I change the extension and open\u00a0them, the entire document is gibberish.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/youtu.be\/37dzoG2wgKI\">https:\/\/youtu.be\/37dzoG2wgKI<\/a><\/p>\n<p>Versions 1.0 and 2.0 can sometimes be decrypted using a tool developed by BloodDolly called TeslaDecoder. (<a href=\"http:\/\/download.bleepingcomputer.com\/BloodDolly\/TeslaDecoder.zip\">Download<\/a>)<\/p>\n<p>The tool\u00a0will try to locate the decryption key on your machine. If the key has been removed from your machine it will not be able to decrypt the files. The developer states\u00a0in the\u00a0<a href=\"http:\/\/download.bleepingcomputer.com\/BloodDolly\/changelog.txt\">change log<\/a>, &#8220;Currently I don&#8217;t know how to recover one of the private keys&#8230;&#8221; referring to TeslaCrypt 3.0. It may have success finding this key in the older versions of TeslaCrypt, but in version 3.0 it currently is not able to recover the key from your machine.<\/p>\n<p>When I tried to use the tool to decrypt the &#8220;Valuable Documents&#8221; you see in the video, it was unsuccessful.<\/p>\n<p>It is best to have recent backups of your data\u00a0that you can restore.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>TeslaCrypt 3.0 stopped by SuperShield<\/p>\n","protected":false},"author":58,"featured_media":52568,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4851,4522],"tags":[56,4895,4852,4853],"class_list":["post-52540","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware-research-team","category-pc-safety-2","tag-malware","tag-malware-research","tag-teslacrypt","tag-teslacrypt-ransomware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>TeslaCrypt Ransomware<\/title>\n<meta name=\"description\" content=\"TeslaCrypt 3.0 stopped by SuperShield There are now three versions of TeslaCrypt that have circulated: 1.0, 2.0, and 3.0.\u00a0The latest, TeslaCrypt 3.0, was\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/52540\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"TeslaCrypt Ransomware\" \/>\n<meta property=\"og:description\" content=\"TeslaCrypt 3.0 stopped by SuperShield There are now three versions of TeslaCrypt that have circulated: 1.0, 2.0, and 3.0.\u00a0The latest, TeslaCrypt 3.0, was\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/52540\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2016-02-11T21:13:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-02-12T23:23:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/logo_fb.png\" \/>\n\t<meta property=\"og:image:width\" content=\"200\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Devin Bergin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Devin Bergin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/52540\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/52540\\\/\"},\"author\":{\"name\":\"Devin Bergin\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/e1a87aba65278d9cd1064ad1966895fe\"},\"headline\":\"TeslaCrypt Ransomware\",\"datePublished\":\"2016-02-11T21:13:57+00:00\",\"dateModified\":\"2016-02-12T23:23:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/52540\\\/\"},\"wordCount\":375,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/52540\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/logo_fb.png\",\"keywords\":[\"malware\",\"Malware Research\",\"TeslaCrypt\",\"TeslaCrypt Ransomware\"],\"articleSection\":[\"Malware Research Team\",\"PC Safety\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/52540\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/52540\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/52540\\\/\",\"name\":\"TeslaCrypt Ransomware\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/52540\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/52540\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/logo_fb.png\",\"datePublished\":\"2016-02-11T21:13:57+00:00\",\"dateModified\":\"2016-02-12T23:23:52+00:00\",\"description\":\"TeslaCrypt 3.0 stopped by SuperShield There are now three versions of TeslaCrypt that have circulated: 1.0, 2.0, and 3.0.\u00a0The latest, TeslaCrypt 3.0, was\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/52540\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/52540\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/52540\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/logo_fb.png\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/logo_fb.png\",\"width\":200,\"height\":200,\"caption\":\"PC Matic is the Best Antivirus Software - Best Computer Protection Company\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/52540\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"TeslaCrypt Ransomware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/e1a87aba65278d9cd1064ad1966895fe\",\"name\":\"Devin Bergin\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/devin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TeslaCrypt Ransomware","description":"TeslaCrypt 3.0 stopped by SuperShield There are now three versions of TeslaCrypt that have circulated: 1.0, 2.0, and 3.0.\u00a0The latest, TeslaCrypt 3.0, was","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/52540\/","og_locale":"en_US","og_type":"article","og_title":"TeslaCrypt Ransomware","og_description":"TeslaCrypt 3.0 stopped by SuperShield There are now three versions of TeslaCrypt that have circulated: 1.0, 2.0, and 3.0.\u00a0The latest, TeslaCrypt 3.0, was","og_url":"https:\/\/www.pcmatic.com\/blog\/52540\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2016-02-11T21:13:57+00:00","article_modified_time":"2016-02-12T23:23:52+00:00","og_image":[{"width":200,"height":200,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/logo_fb.png","type":"image\/png"}],"author":"Devin Bergin","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Devin Bergin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/52540\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/52540\/"},"author":{"name":"Devin Bergin","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/e1a87aba65278d9cd1064ad1966895fe"},"headline":"TeslaCrypt Ransomware","datePublished":"2016-02-11T21:13:57+00:00","dateModified":"2016-02-12T23:23:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/52540\/"},"wordCount":375,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/52540\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/logo_fb.png","keywords":["malware","Malware Research","TeslaCrypt","TeslaCrypt Ransomware"],"articleSection":["Malware Research Team","PC Safety"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/52540\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/52540\/","url":"https:\/\/www.pcmatic.com\/blog\/52540\/","name":"TeslaCrypt Ransomware","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/52540\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/52540\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/logo_fb.png","datePublished":"2016-02-11T21:13:57+00:00","dateModified":"2016-02-12T23:23:52+00:00","description":"TeslaCrypt 3.0 stopped by SuperShield There are now three versions of TeslaCrypt that have circulated: 1.0, 2.0, and 3.0.\u00a0The latest, TeslaCrypt 3.0, was","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/52540\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/52540\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/52540\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/logo_fb.png","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/logo_fb.png","width":200,"height":200,"caption":"PC Matic is the Best Antivirus Software - Best Computer Protection Company"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/52540\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"TeslaCrypt Ransomware"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/e1a87aba65278d9cd1064ad1966895fe","name":"Devin Bergin","url":"https:\/\/www.pcmatic.com\/blog\/author\/devin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/52540","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/58"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=52540"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/52540\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/52568"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=52540"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=52540"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=52540"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}