{"id":4078,"date":"2020-10-02T11:20:26","date_gmt":"2020-10-02T11:20:26","guid":{"rendered":"https:\/\/www.adlice.com\/?p=4078"},"modified":"2022-12-21T10:31:21","modified_gmt":"2022-12-21T10:31:21","slug":"what-is-a-trojan","status":"publish","type":"post","link":"https:\/\/www.adlice.com\/es\/what-is-a-trojan\/","title":{"rendered":"What is a Trojan ? How to Remove ?"},"content":{"rendered":"<div class=\"wp-block-ub-table-of-contents-block ub_table-of-contents\" id=\"ub_table-of-contents-7e648f58-f6ae-4441-b59c-006f2a321aa1\" data-linktodivider=\"false\" data-showtext=\"show\" data-hidetext=\"hide\" data-scrolltype=\"auto\" data-enablesmoothscroll=\"false\" data-initiallyhideonmobile=\"false\" data-initiallyshow=\"true\"><div class=\"ub_table-of-contents-header-container\" style=\"\">\n\t\t\t<div class=\"ub_table-of-contents-header\" style=\"text-align: left; \">\n\t\t\t\t<div class=\"ub_table-of-contents-title\"><\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t<\/div><div class=\"ub_table-of-contents-extra-container\" style=\"\">\n\t\t\t<div class=\"ub_table-of-contents-container ub_table-of-contents-1-column \">\n\t\t\t\t<ul style=\"\"><li style=\"\"><a href=\"https:\/\/www.adlice.com\/es\/what-is-a-trojan\/#0-history\" style=\"\">History<\/a><\/li><li style=\"\"><a href=\"https:\/\/www.adlice.com\/es\/what-is-a-trojan\/#1-how-do-they-work-\" style=\"\">How do they work ?<\/a><\/li><li style=\"\"><a href=\"https:\/\/www.adlice.com\/es\/what-is-a-trojan\/#2-current-situation\" style=\"\">Current situation<\/a><\/li><li style=\"\"><a href=\"https:\/\/www.adlice.com\/es\/what-is-a-trojan\/#3-in-the-wild\" style=\"\">In the Wild<\/a><\/li><li style=\"\"><a href=\"https:\/\/www.adlice.com\/es\/what-is-a-trojan\/#4-how-to-remove-a-trojan-\" style=\"\">How to remove a trojan ?<\/a><\/li><\/ul>\n\t\t\t<\/div>\n\t\t<\/div><\/div>\n\n\n<h4 class=\"has-accent-color has-text-color wp-block-heading\" id=\"0-history\">History<\/h4>\n\n\n\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Trojan_horse_(computing)\">Trojan (Trojan horse)<\/a> deserves its name well. Like when the Greeks leaving behind a large wooden horse as a victory offering, it was in reality a trap since the horse contained soldiers. Software trojan horses use the same model, <strong>presenting themselves as innocuous<\/strong> or beneficial but are in reality malicious. There is no real consensus when the first trojan was developed, but the first ones were unsophisticated pieces of software. Current ones are powerful foes, often hard to remove.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"has-accent-color has-text-color wp-block-heading\" id=\"1-how-do-they-work-\">How do they work ?<\/h4>\n\n\n\n<p>Trojan horses usually <strong>use social engineering<\/strong>, like a pirated software or a fake Office document send by mail, to gain control over a computer. Once installed, they usually <a href=\"https:\/\/www.adlice.com\/fr\/kernelmode-rootkits-part-1-ssdt-hooks\/\">hide themselves from the system<\/a> and make it impossible for the user to remove. Their functionally know no end, but they are able to spy on the user, send spams, make attacks, <a href=\"https:\/\/www.adlice.com\/malware-cryptominer\/\">mine using the compromised computer resources<\/a>, etc.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"has-accent-color has-text-color wp-block-heading\" id=\"2-current-situation\">Current situation<\/h4>\n\n\n\n<p>Since the <a href=\"https:\/\/www.adlice.com\/what-is-code-signing\/\">hardening of Code Signing with Windows 7<\/a>, trojan horses are much easier to detect and remove. However, due to their evolved functionalities, they still account for a large threat. Nowadays, trojans with mining-engines are ones of the most common malware in the wild.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"has-accent-color has-text-color wp-block-heading\" id=\"3-in-the-wild\">In the Wild<\/h4>\n\n\n\n<p>One of a well-known trojan horse was named <strong>DarkComet<\/strong>. It was initially made public in 2008 for legit situations where a user wanted to remote-access its devices. However, since 2012, it became a full-fledged weaponized trojan being users from newbies hackers to sponsored-states agencies.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"647\" height=\"340\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/07\/DarkComet.png\" alt=\"\" class=\"wp-image-4079\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/07\/DarkComet.png 647w, https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/07\/DarkComet-300x158.png 300w\" sizes=\"(max-width: 647px) 100vw, 647px\" \/><\/figure>\n<\/div>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"has-accent-color has-text-color wp-block-heading\" id=\"4-how-to-remove-a-trojan-\">How to remove a trojan ?<\/h4>\n\n\n\n<p>There is a saying on the Internet saying \u201cIf the product is free, you are the product\u201d. Although inaccurate (open-source software is quite the exemple), it is far from being wrong. Never execute or install <a href=\"https:\/\/www.adlice.com\/kms-activators-analysis\/\">activators\/cracks\/keygens<\/a> or the like and be wary of the source of the software you install. Be especially on guard with dubious email messages which may be the source of infections. <\/p>\n\n\n\n<p><a href=\"https:\/\/www.adlice.com\/roguekiller\/\">RogueKiller<\/a>, in its Premium version, offer a very effective real-time protection module. You can also try our general <a href=\"https:\/\/www.adlice.com\/how-to-remove-malware-from-my-pc\/\">malware removal guide<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Trojan horses usually use social engineering, like a pirated software or a fake Office document send by mail, to gain control over a computer. Once installed, they usually hide themselves from the system and make it impossible for the user to remove.<\/p>\n","protected":false},"author":1,"featured_media":4154,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[103],"tags":[2847,48,256],"class_list":["post-4078","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guide","tag-computing","tag-removal","tag-trojan","category-103","description-off"],"views":3891,"yoast_score":71,"yoast_readable":90,"featured_image_src":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/10\/trojan-1700378_1920.jpg","author_info":{"display_name":"tigzy","author_link":"https:\/\/www.adlice.com\/es\/author\/tigzy\/"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is a Trojan ? How to Remove | Definition \u2022 Adlice Software<\/title>\n<meta name=\"description\" content=\"Trojan horses usually use social engineering to gain control over a computer. Learn how they work, and how to remove with this guide.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.adlice.com\/what-is-a-trojan\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is a Trojan ? How to Remove | Definition \u2022 Adlice Software\" \/>\n<meta property=\"og:description\" content=\"Trojan horses usually use social engineering to gain control over a computer. Learn how they work, and how to remove with this guide.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.adlice.com\/what-is-a-trojan\/\" \/>\n<meta property=\"og:site_name\" content=\"Adlice Software\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/RogueKiller\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-02T11:20:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-21T10:31:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/10\/trojan-1700378_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"tigzy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@AdliceSoftware\" \/>\n<meta name=\"twitter:site\" content=\"@AdliceSoftware\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"tigzy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.adlice.com\/what-is-a-trojan\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.adlice.com\/what-is-a-trojan\/\"},\"author\":{\"name\":\"tigzy\",\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d\"},\"headline\":\"What is a Trojan ? How to Remove ?\",\"datePublished\":\"2020-10-02T11:20:26+00:00\",\"dateModified\":\"2022-12-21T10:31:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.adlice.com\/what-is-a-trojan\/\"},\"wordCount\":342,\"publisher\":{\"@id\":\"https:\/\/www.adlice.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.adlice.com\/what-is-a-trojan\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/10\/trojan-1700378_1920.jpg\",\"keywords\":[\"computing\",\"removal\",\"trojan\"],\"articleSection\":[\"Guide\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.adlice.com\/what-is-a-trojan\/\",\"url\":\"https:\/\/www.adlice.com\/what-is-a-trojan\/\",\"name\":\"What is a Trojan ? How to Remove | Definition \u2022 Adlice Software\",\"isPartOf\":{\"@id\":\"https:\/\/www.adlice.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.adlice.com\/what-is-a-trojan\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.adlice.com\/what-is-a-trojan\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/10\/trojan-1700378_1920.jpg\",\"datePublished\":\"2020-10-02T11:20:26+00:00\",\"dateModified\":\"2022-12-21T10:31:21+00:00\",\"description\":\"Trojan horses usually use social engineering to gain control over a computer. Learn how they work, and how to remove with this guide.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.adlice.com\/what-is-a-trojan\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.adlice.com\/what-is-a-trojan\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.adlice.com\/what-is-a-trojan\/#primaryimage\",\"url\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/10\/trojan-1700378_1920.jpg\",\"contentUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/10\/trojan-1700378_1920.jpg\",\"width\":1920,\"height\":1440},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.adlice.com\/what-is-a-trojan\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.adlice.com\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is a Trojan ? How to Remove ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.adlice.com\/#website\",\"url\":\"https:\/\/www.adlice.com\/\",\"name\":\"Adlice Software\",\"description\":\"Anti-malware and analysis tools\",\"publisher\":{\"@id\":\"https:\/\/www.adlice.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.adlice.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.adlice.com\/#organization\",\"name\":\"Adlice Software\",\"url\":\"https:\/\/www.adlice.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png\",\"contentUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png\",\"width\":276,\"height\":276,\"caption\":\"Adlice Software\"},\"image\":{\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/RogueKiller\",\"https:\/\/x.com\/AdliceSoftware\",\"https:\/\/fr.linkedin.com\/company\/adlice-software\",\"https:\/\/www.youtube.com\/channel\/UC4CQ-gIZMGWxl-auf0QqYhQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d\",\"name\":\"tigzy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g\",\"caption\":\"tigzy\"},\"description\":\"Founder and owner of Adlice Software, Tigzy started as lead developer on the popular Anti-malware called RogueKiller. Involved in all the Adlice projects as lead developer, Tigzy is also doing research and reverse engineering as well as writing blog posts.\",\"url\":\"https:\/\/www.adlice.com\/es\/author\/tigzy\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is a Trojan ? How to Remove | Definition \u2022 Adlice Software","description":"Trojan horses usually use social engineering to gain control over a computer. Learn how they work, and how to remove with this guide.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.adlice.com\/what-is-a-trojan\/","og_locale":"es_ES","og_type":"article","og_title":"What is a Trojan ? How to Remove | Definition \u2022 Adlice Software","og_description":"Trojan horses usually use social engineering to gain control over a computer. Learn how they work, and how to remove with this guide.","og_url":"https:\/\/www.adlice.com\/what-is-a-trojan\/","og_site_name":"Adlice Software","article_publisher":"https:\/\/www.facebook.com\/RogueKiller","article_published_time":"2020-10-02T11:20:26+00:00","article_modified_time":"2022-12-21T10:31:21+00:00","og_image":[{"width":1920,"height":1440,"url":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/10\/trojan-1700378_1920.jpg","type":"image\/jpeg"}],"author":"tigzy","twitter_card":"summary_large_image","twitter_creator":"@AdliceSoftware","twitter_site":"@AdliceSoftware","twitter_misc":{"Escrito por":"tigzy","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.adlice.com\/what-is-a-trojan\/#article","isPartOf":{"@id":"https:\/\/www.adlice.com\/what-is-a-trojan\/"},"author":{"name":"tigzy","@id":"https:\/\/www.adlice.com\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d"},"headline":"What is a Trojan ? How to Remove ?","datePublished":"2020-10-02T11:20:26+00:00","dateModified":"2022-12-21T10:31:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.adlice.com\/what-is-a-trojan\/"},"wordCount":342,"publisher":{"@id":"https:\/\/www.adlice.com\/#organization"},"image":{"@id":"https:\/\/www.adlice.com\/what-is-a-trojan\/#primaryimage"},"thumbnailUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/10\/trojan-1700378_1920.jpg","keywords":["computing","removal","trojan"],"articleSection":["Guide"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.adlice.com\/what-is-a-trojan\/","url":"https:\/\/www.adlice.com\/what-is-a-trojan\/","name":"What is a Trojan ? How to Remove | Definition \u2022 Adlice Software","isPartOf":{"@id":"https:\/\/www.adlice.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.adlice.com\/what-is-a-trojan\/#primaryimage"},"image":{"@id":"https:\/\/www.adlice.com\/what-is-a-trojan\/#primaryimage"},"thumbnailUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/10\/trojan-1700378_1920.jpg","datePublished":"2020-10-02T11:20:26+00:00","dateModified":"2022-12-21T10:31:21+00:00","description":"Trojan horses usually use social engineering to gain control over a computer. Learn how they work, and how to remove with this guide.","breadcrumb":{"@id":"https:\/\/www.adlice.com\/what-is-a-trojan\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.adlice.com\/what-is-a-trojan\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.adlice.com\/what-is-a-trojan\/#primaryimage","url":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/10\/trojan-1700378_1920.jpg","contentUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/10\/trojan-1700378_1920.jpg","width":1920,"height":1440},{"@type":"BreadcrumbList","@id":"https:\/\/www.adlice.com\/what-is-a-trojan\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.adlice.com\/es\/"},{"@type":"ListItem","position":2,"name":"What is a Trojan ? How to Remove ?"}]},{"@type":"WebSite","@id":"https:\/\/www.adlice.com\/#website","url":"https:\/\/www.adlice.com\/","name":"Adlice Software","description":"Anti-malware and analysis tools","publisher":{"@id":"https:\/\/www.adlice.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.adlice.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.adlice.com\/#organization","name":"Adlice Software","url":"https:\/\/www.adlice.com\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.adlice.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png","contentUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png","width":276,"height":276,"caption":"Adlice Software"},"image":{"@id":"https:\/\/www.adlice.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/RogueKiller","https:\/\/x.com\/AdliceSoftware","https:\/\/fr.linkedin.com\/company\/adlice-software","https:\/\/www.youtube.com\/channel\/UC4CQ-gIZMGWxl-auf0QqYhQ"]},{"@type":"Person","@id":"https:\/\/www.adlice.com\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d","name":"tigzy","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.adlice.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g","caption":"tigzy"},"description":"Founder and owner of Adlice Software, Tigzy started as lead developer on the popular Anti-malware called RogueKiller. Involved in all the Adlice projects as lead developer, Tigzy is also doing research and reverse engineering as well as writing blog posts.","url":"https:\/\/www.adlice.com\/es\/author\/tigzy\/"}]}},"_links":{"self":[{"href":"https:\/\/www.adlice.com\/es\/wp-json\/wp\/v2\/posts\/4078","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adlice.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.adlice.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.adlice.com\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adlice.com\/es\/wp-json\/wp\/v2\/comments?post=4078"}],"version-history":[{"count":0,"href":"https:\/\/www.adlice.com\/es\/wp-json\/wp\/v2\/posts\/4078\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.adlice.com\/es\/wp-json\/wp\/v2\/media\/4154"}],"wp:attachment":[{"href":"https:\/\/www.adlice.com\/es\/wp-json\/wp\/v2\/media?parent=4078"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.adlice.com\/es\/wp-json\/wp\/v2\/categories?post=4078"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.adlice.com\/es\/wp-json\/wp\/v2\/tags?post=4078"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}