{"id":248,"date":"2016-06-05T22:44:46","date_gmt":"2016-06-05T22:44:46","guid":{"rendered":"http:\/\/eventlogxp.com\/blog\/?p=248"},"modified":"2019-11-06T11:24:10","modified_gmt":"2019-11-06T11:24:10","slug":"process-tracking-with-event-log-explorer","status":"publish","type":"post","link":"https:\/\/eventlogxp.com\/blog\/process-tracking-with-event-log-explorer\/","title":{"rendered":"Process tracking with Event Log Explorer"},"content":{"rendered":"<p>When performing forensic analysis or system audit activities, you may want to track what programs ran on the investigated computers. Windows security auditing lets you enable process tracking and monitor process creation and process termination. To enable process auditing you should use Group Policy Editor (gpedit.msc) or Local Security Policy (secpol.msc). You should configure Security Settings -&gt; Audit Policy -&gt; Audit Process Tracking or use Advanced Audit Policy Configuration -&gt; System Audit Policy -&gt; Detailed Tracking. After enabling process auditing, Windows will register the following events in Security log:<\/p>\n<blockquote><p>4688 &#8211; A new process has been created.<br \/>\n4689 &#8211; A process has exited.<\/p><\/blockquote>\n<p>Let&#8217;s check what events generated when we run an application. I will run Event Log Explorer (elex.exe) for test.\u00a0Running this application generates a number of events. First, as expected, event 4688 was registered in Security log:<\/p>\n<pre>A new process has been created.\r\nSubject:\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Security ID:\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 S-1-5-21-1388294503-2733603710-2753204785-1000\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Account Name:\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0     Michael\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Account Domain:\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0MIKE-HP\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Logon ID:\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 000332DD\r\n\r\nProcess Information:\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 New Process ID:\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a00000254C\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 New Process Name:\u00a0\u00a0\u00a0\u00a0\u00a0        C:\\Program Files (x86)\\Event Log Explorer\\elex.exe\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Token Elevation Type:\u00a0\u00a0       TokenElevationTypeLimited (3)\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Creator Process ID:\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0     00001010\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Process Command Line:\r\n\r\nToken Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.\r\n\r\nType 1 is a full token with no privileges removed or groups disabled.\u00a0 A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.\r\n\r\nType 2 is an elevated token with no privileges removed or groups disabled.\u00a0 An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator.\u00a0 An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.\r\n\r\nType 3 is a limited token with administrative privileges removed and administrative groups disabled.\u00a0 The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.<\/pre>\n<p>However, the next event (event id 4689) shows that this process has exit immediately:<\/p>\n<pre>A process has exited.\r\n\r\nSubject:\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Security ID:\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 S-1-5-21-1388294503-2733603710-2753204785-1000\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Account Name:\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Michael\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Account Domain:\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 MIKE-HP\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Logon ID:\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 000332DD\r\n\r\nProcess Information:\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Process ID:\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0         0000254C\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Process Name:\u00a0            C:\\Program Files (x86)\\Event Log Explorer\\elex.exe\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Exit Status:\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0       C000042C<\/pre>\n<p>Let&#8217;s explore fields in the event descriptions. Subject group is quite clear. Just pay attention to Logon ID \u2013 using this ID you can link these events with event 4624 (account logon, New Logon\\Logon ID). Process Information group is more interesting for process tracking.<\/p>\n<p><strong>New Process ID<\/strong> (Process ID for 4689 event) defines the ID of Windows process (created or terminated). Note that it is in hexadecimal format, so you need to match with process IDs in Task Manager or other programs, you need to convert it into decimal value.<\/p>\n<p><strong>New Process Name<\/strong> (Process Name) the full path to the executable.<\/p>\n<p><strong>Token Elevation Type<\/strong> defines how the process runs under UAC (User Account Control). Token Elevation Types are described in the event description. &#8220;1&#8221; means that UAC is disabled (set to Never Notify) or your run the program from Administrator account or a service account (e.g. when system services start, they will register 4688 event with elevation type = 1). &#8220;2&#8221; means that the user ran the process elevated. This happens when the program manifests itself to run elevated or the user explicitly ran the program using Run as Administrator option. &#8220;3&#8221; means that the process has been ran without elevation.<\/p>\n<p><strong>Creator Process ID<\/strong> defines a process ID of the process that started this new process. Note that it is in hexadecimal format as well as New Process ID.<\/p>\n<p><strong>Process Command Line<\/strong> defines a command line used to start the process. It includes the full path to the executable along with command line parameters. By default, Process Command Line is empty (because it may contains sensitive data like passwords). To enable command line logging you should enable policy &#8220;Include command line in process creation events&#8221;. This policy is available at Administrative Templates -&gt; System -&gt; Audit Process Creation.<\/p>\n<p><strong>Exist status<\/strong> (in event 4689) \u2013 the process exit code. Zero value commonly means that the process has exited normally.<\/p>\n<p>In my example we can see that elex.exe has been terminated immediately after start with exit code C000042C. This code indicates that the process required elevation. Why this happens. The program (elex.exe) is designed to run elevated. When I started it by clicking on its icon, Windows tried to run it first and only then detected the program requires elevation. That&#8217;s why it terminated current instance.<\/p>\n<p>What&#8217;s next? The next event is 4688 and Windows starts consent.exe process. This program\u00a0displays Window UAC dialog and prompts the user for permissions to run our program\u00a0elevated. Then (if the user accepts elevation) Windows starts dllhost.exe process (event 4688) to provide running COM+ components, terminates consent.exe (event 4689) and at last starts elex.exe (event 4688 with Token Elevation Type = 2). This means that we can ignore processes that terminated immediately with exist status of C000042C and\u00a0when tracking the processes, I would recommend to exclude the helper processes like consent.exe, dllhost.exe, conhost.exe, svchost.exe, taskhost.exe.<\/p>\n<p>If I start the program \u00a0using &#8220;Run as administrator&#8221; option, Windows will not\u00a0register first run\/exit events, but register all the\u00a0rest events (consent, dllhost, and elevated elex.exe).<\/p>\n<h3>Let&#8217;s practice<\/h3>\n<p>First we should filter Security log by event id = 4688, 4689. I will use Log Loading filter \u2013 but you can use general filter instead.<\/p>\n<p><a href=\"http:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/06\/process-tracking-filter-4688-4689.png\" rel=\"attachment wp-att-249\" data-rel=\"lightbox-gallery-iMVePqlO\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" class=\"alignnone size-medium wp-image-249\" src=\"http:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/06\/process-tracking-filter-4688-4689-287x300.png\" alt=\"process-tracking-filter-4688-4689\" width=\"287\" height=\"300\" srcset=\"https:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/06\/process-tracking-filter-4688-4689-287x300.png 287w, https:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/06\/process-tracking-filter-4688-4689.png 390w\" sizes=\"(max-width: 287px) 100vw, 287px\" \/><\/a><\/p>\n<p>Now we can display process name (path to the executable) in the list as custom columns. I will add 2 custom columns \u2013 Process started and Process Terminated.<\/p>\n<p><a href=\"http:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/06\/process-tracking-custom-column.png\" rel=\"attachment wp-att-250\" data-rel=\"lightbox-gallery-iMVePqlO\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" class=\"alignnone size-medium wp-image-250\" src=\"http:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/06\/process-tracking-custom-column-300x96.png\" alt=\"process-tracking-custom-column\" width=\"300\" height=\"96\" srcset=\"https:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/06\/process-tracking-custom-column-300x96.png 300w, https:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/06\/process-tracking-custom-column-768x245.png 768w, https:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/06\/process-tracking-custom-column-1024x327.png 1024w, https:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/06\/process-tracking-custom-column-660x211.png 660w, https:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/06\/process-tracking-custom-column.png 1042w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>Let&#8217;s remove helper processes from the list. We can filter by description parameters:<\/p>\n<pre> Process Information\\Process Name\u00a0 does not contain host.exe\r\n Process Information\\New Process Name\u00a0 does not contain host.exe\r\n Process Information\\Process Name\u00a0 does not contain consent.exe\r\n Process Information\\New Process Name\u00a0 does not contain consent.exe<\/pre>\n<p><a href=\"http:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/06\/process-tracking-filter-helper.png\" rel=\"attachment wp-att-251\" data-rel=\"lightbox-gallery-iMVePqlO\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" class=\"alignnone size-medium wp-image-251\" src=\"http:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/06\/process-tracking-filter-helper-300x267.png\" alt=\"process-tracking-filter-helper\" width=\"300\" height=\"267\" srcset=\"https:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/06\/process-tracking-filter-helper-300x267.png 300w, https:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/06\/process-tracking-filter-helper-660x587.png 660w, https:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/06\/process-tracking-filter-helper.png 705w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>Now we can see the result:<\/p>\n<p><a href=\"http:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/06\/process-tracking-result.png\" rel=\"attachment wp-att-252\" data-rel=\"lightbox-gallery-iMVePqlO\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" class=\"alignnone size-medium wp-image-252\" src=\"http:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/06\/process-tracking-result-300x124.png\" alt=\"process-tracking-result\" width=\"300\" height=\"124\" srcset=\"https:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/06\/process-tracking-result-300x124.png 300w, https:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/06\/process-tracking-result-768x316.png 768w, https:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/06\/process-tracking-result-660x272.png 660w, https:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/06\/process-tracking-result.png 944w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<h3>Windows 10<\/h3>\n<p>Windows 10 (and forthcoming Windows 2016) comes with modified details of event 4688. The most significant addition is that the event description contains Creator Process Name field. It defines the name of the process that started this new process.<\/p>\n<a class=\"synved-social-button synved-social-button-share synved-social-size-24 synved-social-resolution-single synved-social-provider-facebook nolightbox\" data-provider=\"facebook\" target=\"_blank\" rel=\"nofollow\" title=\"Share on Facebook\" href=\"https:\/\/www.facebook.com\/sharer.php?u=https%3A%2F%2Feventlogxp.com%2Fblog%2Fwp-json%2Fwp%2Fv2%2Fposts%2F248&#038;t=Process%20tracking%20with%20Event%20Log%20Explorer&#038;s=100&#038;p&#091;url&#093;=https%3A%2F%2Feventlogxp.com%2Fblog%2Fwp-json%2Fwp%2Fv2%2Fposts%2F248&#038;p&#091;images&#093;&#091;0&#093;=https%3A%2F%2Feventlogxp.com%2Fblog%2Fwp-content%2Fuploads%2F2016%2F06%2Fprocess-tracking.jpg&#038;p&#091;title&#093;=Process%20tracking%20with%20Event%20Log%20Explorer\" style=\"font-size: 0px;width:24px;height:24px;margin:0;margin-bottom:5px;margin-right:5px\"><img alt=\"Facebook\" title=\"Share on Facebook\" class=\"synved-share-image synved-social-image synved-social-image-share\" width=\"24\" height=\"24\" style=\"display: inline;width:24px;height:24px;margin: 0;padding: 0;border: none\" src=\"https:\/\/eventlogxp.com\/blog\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/48x48\/facebook.png\" \/><\/a><a class=\"synved-social-button synved-social-button-share synved-social-size-24 synved-social-resolution-single synved-social-provider-twitter nolightbox\" data-provider=\"twitter\" target=\"_blank\" rel=\"nofollow\" title=\"Share on Twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Feventlogxp.com%2Fblog%2Fwp-json%2Fwp%2Fv2%2Fposts%2F248&#038;text=Check%20this%20Event%20Log%20Explorer%20blog%20post\" style=\"font-size: 0px;width:24px;height:24px;margin:0;margin-bottom:5px;margin-right:5px\"><img alt=\"twitter\" title=\"Share on Twitter\" class=\"synved-share-image synved-social-image synved-social-image-share\" width=\"24\" height=\"24\" style=\"display: inline;width:24px;height:24px;margin: 0;padding: 0;border: none\" src=\"https:\/\/eventlogxp.com\/blog\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/48x48\/twitter.png\" \/><\/a><a class=\"synved-social-button synved-social-button-share synved-social-size-24 synved-social-resolution-single synved-social-provider-reddit nolightbox\" data-provider=\"reddit\" target=\"_blank\" rel=\"nofollow\" title=\"Share on Reddit\" href=\"https:\/\/www.reddit.com\/submit?url=https%3A%2F%2Feventlogxp.com%2Fblog%2Fwp-json%2Fwp%2Fv2%2Fposts%2F248&#038;title=Process%20tracking%20with%20Event%20Log%20Explorer\" style=\"font-size: 0px;width:24px;height:24px;margin:0;margin-bottom:5px;margin-right:5px\"><img alt=\"reddit\" title=\"Share on Reddit\" class=\"synved-share-image synved-social-image synved-social-image-share\" width=\"24\" height=\"24\" style=\"display: inline;width:24px;height:24px;margin: 0;padding: 0;border: none\" src=\"https:\/\/eventlogxp.com\/blog\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/48x48\/reddit.png\" \/><\/a><a class=\"synved-social-button synved-social-button-share synved-social-size-24 synved-social-resolution-single synved-social-provider-pinterest nolightbox\" data-provider=\"pinterest\" target=\"_blank\" rel=\"nofollow\" title=\"Pin it with Pinterest\" href=\"https:\/\/pinterest.com\/pin\/create\/button\/?url=https%3A%2F%2Feventlogxp.com%2Fblog%2Fwp-json%2Fwp%2Fv2%2Fposts%2F248&#038;media=https%3A%2F%2Feventlogxp.com%2Fblog%2Fwp-content%2Fuploads%2F2016%2F06%2Fprocess-tracking.jpg&#038;description=Process%20tracking%20with%20Event%20Log%20Explorer\" style=\"font-size: 0px;width:24px;height:24px;margin:0;margin-bottom:5px;margin-right:5px\"><img alt=\"pinterest\" title=\"Pin it with Pinterest\" class=\"synved-share-image synved-social-image synved-social-image-share\" width=\"24\" height=\"24\" style=\"display: inline;width:24px;height:24px;margin: 0;padding: 0;border: none\" src=\"https:\/\/eventlogxp.com\/blog\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/48x48\/pinterest.png\" \/><\/a><a class=\"synved-social-button synved-social-button-share synved-social-size-24 synved-social-resolution-single synved-social-provider-linkedin nolightbox\" data-provider=\"linkedin\" target=\"_blank\" rel=\"nofollow\" title=\"Share on Linkedin\" href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https%3A%2F%2Feventlogxp.com%2Fblog%2Fwp-json%2Fwp%2Fv2%2Fposts%2F248&#038;title=Process%20tracking%20with%20Event%20Log%20Explorer\" style=\"font-size: 0px;width:24px;height:24px;margin:0;margin-bottom:5px;margin-right:5px\"><img alt=\"linkedin\" title=\"Share on Linkedin\" class=\"synved-share-image synved-social-image synved-social-image-share\" width=\"24\" height=\"24\" style=\"display: inline;width:24px;height:24px;margin: 0;padding: 0;border: none\" src=\"https:\/\/eventlogxp.com\/blog\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/48x48\/linkedin.png\" \/><\/a><a class=\"synved-social-button synved-social-button-share synved-social-size-24 synved-social-resolution-single synved-social-provider-mail nolightbox\" data-provider=\"mail\" rel=\"nofollow\" title=\"Share by email\" href=\"mailto:?subject=Process%20tracking%20with%20Event%20Log%20Explorer&#038;body=Check%20this%20Event%20Log%20Explorer%20blog%20post:%20https%3A%2F%2Feventlogxp.com%2Fblog%2Fwp-json%2Fwp%2Fv2%2Fposts%2F248\" style=\"font-size: 0px;width:24px;height:24px;margin:0;margin-bottom:5px\"><img alt=\"mail\" title=\"Share by email\" class=\"synved-share-image synved-social-image synved-social-image-share\" width=\"24\" height=\"24\" style=\"display: inline;width:24px;height:24px;margin: 0;padding: 0;border: none\" src=\"https:\/\/eventlogxp.com\/blog\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/48x48\/mail.png\" \/><\/a>","protected":false},"excerpt":{"rendered":"<p>When performing forensic analysis or system audit activities, you may want to track what programs ran on the investigated computers. Windows security auditing lets you enable process tracking and monitor process creation and process termination. To enable process auditing you should use Group Policy Editor (gpedit.msc) or Local Security Policy (secpol.msc). You should configure Security Settings -&gt; Audit Policy -&gt; Audit Process Tracking or use\u2026 <span class=\"read-more\"><a href=\"https:\/\/eventlogxp.com\/blog\/process-tracking-with-event-log-explorer\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":2,"featured_media":254,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[40,2],"tags":[5,51,19,21,30,49,4,15],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/eventlogxp.com\/blog\/wp-json\/wp\/v2\/posts\/248"}],"collection":[{"href":"https:\/\/eventlogxp.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eventlogxp.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eventlogxp.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/eventlogxp.com\/blog\/wp-json\/wp\/v2\/comments?post=248"}],"version-history":[{"count":2,"href":"https:\/\/eventlogxp.com\/blog\/wp-json\/wp\/v2\/posts\/248\/revisions"}],"predecessor-version":[{"id":255,"href":"https:\/\/eventlogxp.com\/blog\/wp-json\/wp\/v2\/posts\/248\/revisions\/255"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eventlogxp.com\/blog\/wp-json\/wp\/v2\/media\/254"}],"wp:attachment":[{"href":"https:\/\/eventlogxp.com\/blog\/wp-json\/wp\/v2\/media?parent=248"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eventlogxp.com\/blog\/wp-json\/wp\/v2\/categories?post=248"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eventlogxp.com\/blog\/wp-json\/wp\/v2\/tags?post=248"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}