{"id":114,"date":"2025-02-11T14:09:06","date_gmt":"2025-02-11T14:09:06","guid":{"rendered":"https:\/\/www.cyberguard6.com\/blog\/?p=114"},"modified":"2025-02-11T14:09:06","modified_gmt":"2025-02-11T14:09:06","slug":"dangers-and-abuse-of-psexec","status":"publish","type":"post","link":"https:\/\/www.cyberguard6.com\/blog\/dangers-and-abuse-of-psexec\/","title":{"rendered":"The Dangers and Abuse of PsExec in Cyber Threats"},"content":{"rendered":"<p>PsExec, a powerful Sysinternals tool developed by Microsoft, is widely used by IT administrators for remote execution of processes on Windows systems. However, it is also a favorite tool among threat actors for lateral movement, privilege escalation, and remote code execution in cyber attacks. Understanding the risks and detection methods associated with PsExec is critical for cybersecurity professionals to prevent abuse and mitigate threats effectively.<\/p>\n<h4>How Attackers Exploit PsExec<\/h4>\n<p>Threat actors often use PsExec to move laterally within a compromised network, execute malicious payloads, and deploy ransomware or other malware. Since PsExec is a legitimate tool, its use can blend in with normal administrative activity, making it challenging to detect and stop malicious behavior.<\/p>\n<p>Attackers exploit PsExec in the following ways:<\/p>\n<ul data-spread=\"false\">\n<li>Lateral Movement: By executing commands on remote machines, attackers can move from one compromised system to another.<\/li>\n<li>Privilege Escalation: If executed with SYSTEM or administrator privileges, PsExec allows attackers to execute high-privileged tasks.<\/li>\n<li>Stealthy Execution: Since PsExec does not require manual installation and operates without GUI interaction, it is harder to detect than traditional remote desktop access.<\/li>\n<li>Malware Deployment: Attackers use PsExec to remotely deploy ransomware and other malicious payloads across a network.<\/li>\n<\/ul>\n<h4>Understanding the Difference: <code>psexec.exe<\/code> vs. <code>psexecsvc.exe<\/code><\/h4>\n<p>When PsExec is executed, it drops a service executable (<code>psexecsvc.exe<\/code>) on the target machine to facilitate remote execution. Understanding the distinction between these two files is crucial for detection:<\/p>\n<ul data-spread=\"false\">\n<li><code><strong>psexec.exe<\/strong><\/code>: This is the client executable run on the attacker&#8217;s system. It connects to a remote system and installs a temporary service.<\/li>\n<li><code><strong>psexecsvc.exe<\/strong><\/code>: This is the service that gets installed on the destination system to enable remote command execution. Once the task is completed, this service is usually removed automatically, but in some cases, remnants may be left behind.<\/li>\n<\/ul>\n<h4>Detecting PsExec Abuse: Event ID 7045<\/h4>\n<p>One of the best ways to detect the use of PsExec is by monitoring Windows Event Logs, specifically Event ID <strong>7045<\/strong>, which indicates a service installation. Since PsExec operates by installing a temporary service (<code>psexecsvc.exe<\/code>), the appearance of this event could signal potential malicious activity.<\/p>\n<h4>How to Identify PsExec Execution via Event Logs<\/h4>\n<ol start=\"1\" data-spread=\"false\">\n<li><strong>Open Event Viewer<\/strong> (<code>eventvwr.msc<\/code>).<\/li>\n<li>Navigate to <strong>Windows Logs<\/strong> &gt; <strong>System<\/strong>.<\/li>\n<li>Look for <strong>Event ID 7045<\/strong> with details showing a service named <code>PSEXESVC<\/code>.<\/li>\n<li>The <strong>Image Path<\/strong> in the event details will typically point to <code>C:\\Windows\\PSEXESVC.exe<\/code>, confirming PsExec usage.<\/li>\n<li>Cross-reference the event with login attempts (Event ID <strong>4624<\/strong>) or failed logins (Event ID <strong>4625<\/strong>) to determine if the execution aligns with suspicious authentication patterns.<\/li>\n<li>If unauthorized or unexpected PsExec activity is detected, investigate further using network and process monitoring tools.<\/li>\n<\/ol>\n<h4>Mitigation Strategies<\/h4>\n<p>To prevent and detect PsExec abuse, consider the following mitigation techniques:<\/p>\n<ul data-spread=\"false\">\n<li>Restrict Administrative Privileges: Limit the number of users with administrative privileges to reduce attack surfaces.<\/li>\n<li>Block PsExec Execution: Use endpoint security solutions or Group Policy to block PsExec execution.<\/li>\n<li>Monitor for New Service Installations: Implement SIEM alerts for Event ID 7045 and unexpected service creations.<\/li>\n<li>Disable Remote Service Creation: Configure Windows firewall rules and security policies to prevent unauthorized remote service installation.<\/li>\n<li>Harden Network Access: Restrict access to administrative shares (e.g., <code>ADMIN$<\/code>, <code>C$<\/code>) that PsExec relies on for execution.<\/li>\n<\/ul>\n<h4>Conclusion<\/h4>\n<p>While PsExec is a legitimate tool that serves useful administrative functions, its potential for abuse by cyber attackers cannot be ignored. By monitoring for specific indicators such as Event ID 7045 and implementing security best practices, organizations can significantly reduce the risk of unauthorized PsExec use in their networks. Proactive detection and proper security controls will help mitigate the risks associated with this powerful yet dangerous tool.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>PsExec, a powerful Sysinternals tool developed by Microsoft, is widely used by IT administrators for remote execution of processes on Windows systems. However, it is also a favorite tool among threat actors for lateral movement, privilege escalation, and remote code execution in cyber attacks. Understanding the risks and detection methods associated with PsExec is critical&hellip; <a class=\"more-link\" href=\"https:\/\/www.cyberguard6.com\/blog\/dangers-and-abuse-of-psexec\/\">Continue reading <span class=\"screen-reader-text\">The Dangers and Abuse of PsExec in Cyber Threats<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[7],"tags":[],"class_list":["post-114","post","type-post","status-publish","format-standard","hentry","category-psexec","entry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Dangers and Abuse of PsExec in Cyber Threats<\/title>\n<meta name=\"description\" content=\"&quot;Learn how cyber attackers exploit PsExec for lateral movement and privilege escalation. Discover how to detect PsExec abuse using Windows Event ID 7045 and implement security measures to prevent unauthorized remote execution.&quot;\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguard6.com\/blog\/dangers-and-abuse-of-psexec\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Dangers and Abuse of PsExec in Cyber Threats\" \/>\n<meta property=\"og:description\" content=\"&quot;Learn how cyber attackers exploit PsExec for lateral movement and privilege escalation. Discover how to detect PsExec abuse using Windows Event ID 7045 and implement security measures to prevent unauthorized remote execution.&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguard6.com\/blog\/dangers-and-abuse-of-psexec\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberGuard 6 Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-11T14:09:06+00:00\" \/>\n<meta name=\"author\" content=\"Jason\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jason\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/dangers-and-abuse-of-psexec\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/dangers-and-abuse-of-psexec\\\/\"},\"author\":{\"name\":\"Jason\",\"@id\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/#\\\/schema\\\/person\\\/d34605e12eebeb4c509712189ee29ba7\"},\"headline\":\"The Dangers and Abuse of PsExec in Cyber Threats\",\"datePublished\":\"2025-02-11T14:09:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/dangers-and-abuse-of-psexec\\\/\"},\"wordCount\":578,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/#organization\"},\"articleSection\":[\"psexec\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/dangers-and-abuse-of-psexec\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/dangers-and-abuse-of-psexec\\\/\",\"url\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/dangers-and-abuse-of-psexec\\\/\",\"name\":\"The Dangers and Abuse of PsExec in Cyber Threats\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/#website\"},\"datePublished\":\"2025-02-11T14:09:06+00:00\",\"description\":\"\\\"Learn how cyber attackers exploit PsExec for lateral movement and privilege escalation. Discover how to detect PsExec abuse using Windows Event ID 7045 and implement security measures to prevent unauthorized remote execution.\\\"\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/dangers-and-abuse-of-psexec\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/dangers-and-abuse-of-psexec\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/dangers-and-abuse-of-psexec\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Dangers and Abuse of PsExec in Cyber Threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/\",\"name\":\"CyberGuard 6 Blog\",\"description\":\"Blogging About Digital Forensics &amp; Incident Response\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/#organization\",\"name\":\"CyberGuard 6 Blog\",\"url\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/logo.png\",\"contentUrl\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/logo.png\",\"width\":717,\"height\":60,\"caption\":\"CyberGuard 6 Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/#\\\/schema\\\/person\\\/d34605e12eebeb4c509712189ee29ba7\",\"name\":\"Jason\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5659a77231076ed9e2b05852c4085f0e519369f66a734771d7b5e53ef8980137?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5659a77231076ed9e2b05852c4085f0e519369f66a734771d7b5e53ef8980137?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5659a77231076ed9e2b05852c4085f0e519369f66a734771d7b5e53ef8980137?s=96&d=mm&r=g\",\"caption\":\"Jason\"},\"description\":\"Jason Lapene is a distinguished cybersecurity professional celebrated for his profound expertise and analytical acumen in the field of digital forensics. With a solid academic foundation in Computer Information Systems from Georgia State University and a Master's Degree in Cyber Security from Kennesaw State University, Jason has equipped himself with a comprehensive skill set for tackling complex cyber threats. In addition to his academic credentials, he holds an impressive array of GIAC certifications, including GCFA, GCIH, GSEC, and GSTRT, underscoring his practical and theoretical prowess. With over a decade of experience as a forensic investigator, Jason has honed his skills in various prestigious roles at notable organizations such as Children's Hospital of Atlanta, AT&amp;T, and Rapid7. His specialization in disc forensics, business email compromises, and ransomware investigations and negotiations has made him a sought-after expert in the cybersecurity domain. Jason\u2019s relentless commitment to safeguarding digital environments and his methodical approach to resolving cyber incidents have led to his reputation as a trailblazer in the field, continually advancing the standards of cybersecurity practice.\",\"sameAs\":[\"https:\\\/\\\/www.cyberguard6.com\\\/\"],\"url\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/author\\\/jason\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Dangers and Abuse of PsExec in Cyber Threats","description":"\"Learn how cyber attackers exploit PsExec for lateral movement and privilege escalation. Discover how to detect PsExec abuse using Windows Event ID 7045 and implement security measures to prevent unauthorized remote execution.\"","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguard6.com\/blog\/dangers-and-abuse-of-psexec\/","og_locale":"en_US","og_type":"article","og_title":"The Dangers and Abuse of PsExec in Cyber Threats","og_description":"\"Learn how cyber attackers exploit PsExec for lateral movement and privilege escalation. Discover how to detect PsExec abuse using Windows Event ID 7045 and implement security measures to prevent unauthorized remote execution.\"","og_url":"https:\/\/www.cyberguard6.com\/blog\/dangers-and-abuse-of-psexec\/","og_site_name":"CyberGuard 6 Blog","article_published_time":"2025-02-11T14:09:06+00:00","author":"Jason","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jason","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberguard6.com\/blog\/dangers-and-abuse-of-psexec\/#article","isPartOf":{"@id":"https:\/\/www.cyberguard6.com\/blog\/dangers-and-abuse-of-psexec\/"},"author":{"name":"Jason","@id":"https:\/\/www.cyberguard6.com\/blog\/#\/schema\/person\/d34605e12eebeb4c509712189ee29ba7"},"headline":"The Dangers and Abuse of PsExec in Cyber Threats","datePublished":"2025-02-11T14:09:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberguard6.com\/blog\/dangers-and-abuse-of-psexec\/"},"wordCount":578,"commentCount":0,"publisher":{"@id":"https:\/\/www.cyberguard6.com\/blog\/#organization"},"articleSection":["psexec"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cyberguard6.com\/blog\/dangers-and-abuse-of-psexec\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.cyberguard6.com\/blog\/dangers-and-abuse-of-psexec\/","url":"https:\/\/www.cyberguard6.com\/blog\/dangers-and-abuse-of-psexec\/","name":"The Dangers and Abuse of PsExec in Cyber Threats","isPartOf":{"@id":"https:\/\/www.cyberguard6.com\/blog\/#website"},"datePublished":"2025-02-11T14:09:06+00:00","description":"\"Learn how cyber attackers exploit PsExec for lateral movement and privilege escalation. Discover how to detect PsExec abuse using Windows Event ID 7045 and implement security measures to prevent unauthorized remote execution.\"","breadcrumb":{"@id":"https:\/\/www.cyberguard6.com\/blog\/dangers-and-abuse-of-psexec\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguard6.com\/blog\/dangers-and-abuse-of-psexec\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguard6.com\/blog\/dangers-and-abuse-of-psexec\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguard6.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The Dangers and Abuse of PsExec in Cyber Threats"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguard6.com\/blog\/#website","url":"https:\/\/www.cyberguard6.com\/blog\/","name":"CyberGuard 6 Blog","description":"Blogging About Digital Forensics &amp; Incident Response","publisher":{"@id":"https:\/\/www.cyberguard6.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguard6.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cyberguard6.com\/blog\/#organization","name":"CyberGuard 6 Blog","url":"https:\/\/www.cyberguard6.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyberguard6.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberguard6.com\/blog\/wp-content\/uploads\/2025\/02\/logo.png","contentUrl":"https:\/\/www.cyberguard6.com\/blog\/wp-content\/uploads\/2025\/02\/logo.png","width":717,"height":60,"caption":"CyberGuard 6 Blog"},"image":{"@id":"https:\/\/www.cyberguard6.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cyberguard6.com\/blog\/#\/schema\/person\/d34605e12eebeb4c509712189ee29ba7","name":"Jason","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/5659a77231076ed9e2b05852c4085f0e519369f66a734771d7b5e53ef8980137?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5659a77231076ed9e2b05852c4085f0e519369f66a734771d7b5e53ef8980137?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5659a77231076ed9e2b05852c4085f0e519369f66a734771d7b5e53ef8980137?s=96&d=mm&r=g","caption":"Jason"},"description":"Jason Lapene is a distinguished cybersecurity professional celebrated for his profound expertise and analytical acumen in the field of digital forensics. With a solid academic foundation in Computer Information Systems from Georgia State University and a Master's Degree in Cyber Security from Kennesaw State University, Jason has equipped himself with a comprehensive skill set for tackling complex cyber threats. In addition to his academic credentials, he holds an impressive array of GIAC certifications, including GCFA, GCIH, GSEC, and GSTRT, underscoring his practical and theoretical prowess. With over a decade of experience as a forensic investigator, Jason has honed his skills in various prestigious roles at notable organizations such as Children's Hospital of Atlanta, AT&amp;T, and Rapid7. His specialization in disc forensics, business email compromises, and ransomware investigations and negotiations has made him a sought-after expert in the cybersecurity domain. Jason\u2019s relentless commitment to safeguarding digital environments and his methodical approach to resolving cyber incidents have led to his reputation as a trailblazer in the field, continually advancing the standards of cybersecurity practice.","sameAs":["https:\/\/www.cyberguard6.com\/"],"url":"https:\/\/www.cyberguard6.com\/blog\/author\/jason\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguard6.com\/blog\/wp-json\/wp\/v2\/posts\/114","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguard6.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberguard6.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguard6.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguard6.com\/blog\/wp-json\/wp\/v2\/comments?post=114"}],"version-history":[{"count":1,"href":"https:\/\/www.cyberguard6.com\/blog\/wp-json\/wp\/v2\/posts\/114\/revisions"}],"predecessor-version":[{"id":115,"href":"https:\/\/www.cyberguard6.com\/blog\/wp-json\/wp\/v2\/posts\/114\/revisions\/115"}],"wp:attachment":[{"href":"https:\/\/www.cyberguard6.com\/blog\/wp-json\/wp\/v2\/media?parent=114"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberguard6.com\/blog\/wp-json\/wp\/v2\/categories?post=114"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberguard6.com\/blog\/wp-json\/wp\/v2\/tags?post=114"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}