{"id":3133,"date":"2015-07-02T01:39:50","date_gmt":"2015-07-02T01:39:50","guid":{"rendered":"http:\/\/www.hexacorn.com\/blog\/?p=3133"},"modified":"2016-07-31T02:13:50","modified_gmt":"2016-07-31T02:13:50","slug":"links-to-post-series","status":"publish","type":"post","link":"https:\/\/www.hexacorn.com\/blog\/2015\/07\/02\/links-to-post-series\/","title":{"rendered":"Links to post series"},"content":{"rendered":"<p><a href=\"https:\/\/twitter.com\/ximad\">ximad <\/a>pinged me asking if I can make some of the content more readable &#8211; I will think of it and perhaps convert some of this stuff into a PDF, but in the mean time providing a series of links for the &#8216;longer&#8217; series on the blog<\/p>\n<h3>Da Li&#8217;L World of DLL Exports and Entry Points<\/h3>\n<p>Da Li&#8217;L World of DLL Exports and Entry Points, Part 1<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2013\/08\/08\/da-lil-world-of-dll-exports-and-entry-points-part-1\/\">https:\/\/www.hexacorn.com\/blog\/2013\/08\/08\/da-lil-world-of-dll-exports-and-entry-points-part-1\/<\/a><\/p>\n<p>Da Li&#8217;L World of DLL Exports and Entry Points, Part 2<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2013\/08\/11\/da-lil-world-of-dll-exports-and-entry-points-part-2\/\">https:\/\/www.hexacorn.com\/blog\/2013\/08\/11\/da-lil-world-of-dll-exports-and-entry-points-part-2\/<\/a><\/p>\n<p>Da Li&#8217;L World of DLL Exports and Entry Points, Part 3<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2013\/08\/21\/da-lil-world-of-dll-exports-and-entry-points-part-3\/\">https:\/\/www.hexacorn.com\/blog\/2013\/08\/21\/da-lil-world-of-dll-exports-and-entry-points-part-3\/<\/a><\/p>\n<h3>Anti-forensics<\/h3>\n<p>The shortest anti-forensics code in the world<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2012\/01\/21\/the-shortest-anti-forensics-code-in-the-world\/\">https:\/\/www.hexacorn.com\/blog\/2012\/01\/21\/the-shortest-anti-forensics-code-in-the-world\/<\/a><\/p>\n<p>The shortest anti-forensics code in the world &#8211; take #2<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2012\/03\/16\/the-shortest-anti-forensics-code-in-the-world-take-2\/\">https:\/\/www.hexacorn.com\/blog\/2012\/03\/16\/the-shortest-anti-forensics-code-in-the-world-take-2\/<\/a><\/p>\n<p>Purple Haze &#8211; Anti-forensics and anti-detection<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2012\/02\/13\/purple-haze-anti-forensics-and-andi-detection\/\">https:\/\/www.hexacorn.com\/blog\/2012\/02\/13\/purple-haze-anti-forensics-and-andi-detection\/<\/a><\/p>\n<p>Anti-forensics &#8211; live examples<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2012\/02\/18\/anti-forensics-live-examples\/\">https:\/\/www.hexacorn.com\/blog\/2012\/02\/18\/anti-forensics-live-examples\/<\/a><\/p>\n<p>Anti-forensics \u2013 live examples, Part 2<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2014\/06\/27\/anti-forensics-live-examples-part-2\/\">https:\/\/www.hexacorn.com\/blog\/2014\/06\/27\/anti-forensics-live-examples-part-2\/<\/a><\/p>\n<p>Anti-forensics \u2013 live examples, Part 3<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2014\/08\/29\/anti-forensics-live-examples-part-3\/\">https:\/\/www.hexacorn.com\/blog\/2014\/08\/29\/anti-forensics-live-examples-part-3\/<\/a><\/p>\n<h3><strong>Enter Sandbox Series<\/strong><\/h3>\n<p>Enter Sandbox &#8211; part 1: All APIs are equal, but some APIs are more equal than others<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2015\/05\/29\/enter-sandbox-part-1-all-api-are-equal-but-some-apis-are-more-equal-than-others\/\">https:\/\/www.hexacorn.com\/blog\/2015\/05\/29\/enter-sandbox-part-1-all-api-are-equal-but-some-apis-are-more-equal-than-others\/<\/a><\/p>\n<p>Enter Sandbox \u2013 part 2: COM, babe COM<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2015\/06\/09\/enter-sandbox-part-2-com-babe-com\/\">https:\/\/www.hexacorn.com\/blog\/2015\/06\/09\/enter-sandbox-part-2-com-babe-com\/<\/a><\/p>\n<p>Enter Sandbox \u2013 part 3: If you see Native code is creative<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2015\/06\/10\/enter-sandbox-part-3-if-you-see-native-code-is-creative\/\">https:\/\/www.hexacorn.com\/blog\/2015\/06\/10\/enter-sandbox-part-3-if-you-see-native-code-is-creative\/<\/a><\/p>\n<p>Enter Sandbox \u2013 part 4: In search for Deus Ex Machina<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2015\/06\/12\/enter-sandbox-part-4-in-search-for-deus-ex-machina\/\">https:\/\/www.hexacorn.com\/blog\/2015\/06\/12\/enter-sandbox-part-4-in-search-for-deus-ex-machina\/<\/a><\/p>\n<p>Enter Sandbox \u2013 part 5: In search for Deus Ex Machina II<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2015\/06\/17\/enter-sandbox-part-5-in-search-for-deus-ex-machina-ii\/\">https:\/\/www.hexacorn.com\/blog\/2015\/06\/17\/enter-sandbox-part-5-in-search-for-deus-ex-machina-ii\/<\/a><\/p>\n<p>Enter Sandbox \u2013 part 6: The Nullsoft hypothesis and other installers&amp;#039; conundrums<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2015\/06\/26\/enter-sandbox-part-6-the-nullsoft-hypothesis-and-other-installers-conundrums\/\">https:\/\/www.hexacorn.com\/blog\/2015\/06\/26\/enter-sandbox-part-6-the-nullsoft-hypothesis-and-other-installers-conundrums\/<\/a><\/p>\n<p>Enter Sandbox \u2013 part 7: Hello, \u0645\u0631\u062d\u0628\u0627, \u60a8\u597d, \u0437\u0434\u0440\u0430\u0432\u0441\u0442\u0432\u0443\u0439\u0442\u0435, \u03b3\u03b5\u03b9\u03b1 \u03c3\u03b1\u03c2<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2015\/06\/27\/enter-sandbox-part-7-hello-%d9%85%d8%b1%d8%ad%d8%a8%d8%a7-%e6%82%a8%e5%a5%bd-%d0%b7%d0%b4%d1%80%d0%b0%d0%b2%d1%81%d1%82%d0%b2%d1%83%d0%b9%d1%82%d0%b5-%ce%b3%ce%b5%ce%b9%ce%b1-%cf%83\/\">https:\/\/www.hexacorn.com\/blog\/2015\/06\/27\/enter-sandbox-part-7-hello-%d9%85%d8%b1%d8%ad%d8%a8%d8%a7-%e6%82%a8%e5%a5%bd-%d0%b7%d0%b4%d1%80%d0%b0%d0%b2%d1%81%d1%82%d0%b2%d1%83%d0%b9%d1%82%d0%b5-%ce%b3%ce%b5%ce%b9%ce%b1-%cf%83\/<\/a><\/p>\n<h3>Beyond good ol&#8217; Run key<\/h3>\n<p><strong>Beyond good ol&#8217; Run key<\/strong><\/p>\n<p><a href=\"https:\/\/www.hexacorn.com\/blog\/2012\/07\/23\/beyond-good-ol-run-key\/\">\u00a0https:\/\/www.hexacorn.com\/blog\/2012\/07\/23\/beyond-good-ol-run-key\/<\/a><\/p>\n<ul>\n<li>\u00a0A large number of different, more and less known mechanisms described &#8211; firts part of the series and as such, quite a big post<\/li>\n<li>ICQ\n<ul>\n<li>HKCU\\Software\\Mirabilis\\ICQ\\Agent\\Apps<\/li>\n<\/ul>\n<\/li>\n<li>Standard apps that contain functionality \/ options to launch mandatory programs(P2P apps, etc.)<\/li>\n<li>\u2018Scanning\u2019 files with AV when downloaded<\/li>\n<li>Windows Shell alternatives<\/li>\n<li>AutoStart when Scanner button is pressed\n<ul>\n<li>HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\explorer\\AutoplayHandlers\\Handlers<\/li>\n<li>HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\StillImage\\Registered Applications<\/li>\n<li>HKLM\\SYSTEM\\CurrentControlSet\\Control\\StillImage\\Events\\STIProxyEvent<\/li>\n<\/ul>\n<\/li>\n<li>Autostart by re-using existing autostart entries<\/li>\n<li>Autostart via Plugins<\/li>\n<li>File System infection<\/li>\n<\/ul>\n<p><strong>Beyond good ol\u2019 Run key, Part 2<\/strong><\/p>\n<p><a href=\"https:\/\/www.hexacorn.com\/blog\/2012\/09\/16\/beyond-good-ol-run-key-part-2\/\">https:\/\/www.hexacorn.com\/blog\/2012\/09\/16\/beyond-good-ol-run-key-part-2\/<\/a><\/p>\n<ul>\n<li>Focused on standard apps that contain functionality \/ options to launch mandatory programs (Archivers, downloaders, Messengers, etc.) and the functionality is related to external viewers, AV scanners\n<ul>\n<li>WinRar\n<ul>\n<li>HKCU\\Software\\WinRAR\\Viewer\\ExternalViewer<\/li>\n<li>HKCU\\Software\\WinRAR\\VirusScan\\Name<\/li>\n<\/ul>\n<\/li>\n<li>WinZip\n<ul>\n<li>HKCU\\Software\\Nico Mak Computing\\WinZip\\programs\\zip2exe<\/li>\n<li>HKCU\\Software\\Nico Mak Computing\\WinZip\\programs\\viewer<\/li>\n<li>HKCU\\Software\\Nico Mak Computing\\WinZip\\programs\\vviewer<\/li>\n<li>HKCU\\Software\\Nico Mak Computing\\WinZip\\programs\\arc<\/li>\n<li>HKCU\\Software\\Nico Mak Computing\\WinZip\\programs\\arj<\/li>\n<li>HKCU\\Software\\Nico Mak Computing\\WinZip\\programs\\lha<\/li>\n<li>HKCU\\Software\\Nico Mak Computing\\WinZip\\programs\\scan<\/li>\n<li>HKCU\\Software\\Nico Mak Computing\\WinZip\\programs\\viewer<\/li>\n<li>HKCU\\Software\\Nico Mak Computing\\WinZip\\programs\\zip2exe<\/li>\n<\/ul>\n<\/li>\n<li>Internet Download Manager\n<ul>\n<li>HKCU\\Software\\DownloadManager\\VScannerProgram<\/li>\n<\/ul>\n<\/li>\n<li>Download Accelerator Plus (DAP)\n<ul>\n<li>HKCU\\Software\\SpeedBit\\Download Accelerator\\AntiVirusEXE<\/li>\n<\/ul>\n<\/li>\n<li>\u00a0Orbit Downloader\n<ul>\n<li>%USERPROFILE%\\Application Data\\Orbit\\conf.dat%USERPROFILE%\\Application Data\\Orbit\\conf.dat<\/li>\n<\/ul>\n<\/li>\n<li>\u00a0Windows Live Messenger\n<ul>\n<li>HKCU\\Software\\Microsoft\\MSNMessenger\\AntiVirus<\/li>\n<\/ul>\n<\/li>\n<li>Miranda\n<ul>\n<li>%USERPROFILE%\\Application Data\\Miranda\\PROFILEFOLDER\\PROFILEFILENAME.dat<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>Beyond good ol\u2019 Run key, Part 3<\/strong><\/p>\n<p><a href=\"https:\/\/www.hexacorn.com\/blog\/2013\/01\/19\/beyond-good-ol-run-key-part-3\/\">https:\/\/www.hexacorn.com\/blog\/2013\/01\/19\/beyond-good-ol-run-key-part-3\/<\/a><\/p>\n<ul>\n<li>Code-in-the-middle proxy<\/li>\n<li>Application Registration (App Paths) hijacking\n<ul>\n<li>HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\App Paths<\/li>\n<\/ul>\n<\/li>\n<li>Text Services (TSF)<\/li>\n<li>DLL load order<\/li>\n<li>IIS Server Extensions (ISAPI filters)<\/li>\n<li>AppCertDlls\n<ul>\n<li>HKLM\\CurrentControlSet\\Control\\Session Manager\\AppCertDlls<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>Beyond good ol\u2019 Run key, Part 4<\/strong><br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2013\/09\/19\/beyond-good-ol-run-key-part-4\/\">https:\/\/www.hexacorn.com\/blog\/2013\/09\/19\/beyond-good-ol-run-key-part-4\/<\/a><\/p>\n<ul>\n<li>Hijacking debuggers\n<ul>\n<li>Standalone Debugger (32- and 64- bit)\n<ul>\n<li>HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\AeDebug<\/li>\n<li>HKLM\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows NT\\CurrentVersion\\AeDebug<\/li>\n<\/ul>\n<\/li>\n<li>NET Debugger (32- and 64- bit)\n<ul>\n<li>HKLM\\SOFTWARE\\Microsoft\\.NETFramework\\DbgManagedDebugger<\/li>\n<li>HKLM\\SOFTWARE\\Wow6432Node\\Microsoft\\.NETFramework\\DbgManagedDebugger<\/li>\n<\/ul>\n<\/li>\n<li>Script Debugger\n<ul>\n<li>HKCR\\CLSID\\{834128A2-51F4-11D0-8F20-00805F2CD064}\\LocalServer32\\@<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>Hijacking Process Debug Manager\n<ul>\n<li>HKLM\\SOFTWARE\\Classes\\CLSID\\{78A51822-51F4-11D0-8F20-00805F2CD064}\\InprocServer32\\@<\/li>\n<\/ul>\n<\/li>\n<li>ServiceDll Hijack\n<ul>\n<li>ServiceDll parameter under HKLM\\SYSTEM\\CurrentControlSet\\Services\\<\/li>\n<\/ul>\n<\/li>\n<li>Mapi32 Stub Library\n<ul>\n<li>HKLM\\Software\\Clients\\Mail::(default)\\DLLPath<\/li>\n<li>HKLM\\Software\\Clients\\Mail::(default)\\DLLPathEx<\/li>\n<\/ul>\n<\/li>\n<li>Hijacking Client executables\n<ul>\n<li>HKLM\\Software\\Clients\\ f.ex.\n<ul>\n<li>HKLM\\SOFTWARE\\Clients\\Mail\\Windows Mail\\InstallInfo\\HideIconsCommand<\/li>\n<li>HKLM\\SOFTWARE\\Clients\\Mail\\Windows Mail\\InstallInfo\\ReinstallCommand<\/li>\n<li>HKLM\\SOFTWARE\\Clients\\Mail\\Windows Mail\\InstallInfo\\ShowIconsCommand<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>Windows 2000 Welcome\n<ul>\n<li>C:\\WINNT\\Welcome.exe via<\/li>\n<li>HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\tips\\Show<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>Beyond good ol\u2019 Run key, Part 5<\/strong><br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2013\/12\/08\/beyond-good-ol-run-key-part-5\/\">https:\/\/www.hexacorn.com\/blog\/2013\/12\/08\/beyond-good-ol-run-key-part-5\/<\/a><\/p>\n<ul>\n<li>A number of Phantom DLLs that are loaded as code via LoadLibrary variants, but not present on a system in its default install<\/li>\n<\/ul>\n<p><strong>Beyond good ol\u2019 Run key, Part 6<\/strong><br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2014\/01\/10\/beyond-good-ol-run-key-part-6-2\/\">https:\/\/www.hexacorn.com\/blog\/2014\/01\/10\/beyond-good-ol-run-key-part-6-2\/<\/a><\/p>\n<ul>\n<li>Visual Basic persistence via\n<ul>\n<li>HKLM\\SOFTWARE\\Microsoft\\VBA\\Monitors<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>Beyond good ol\u2019 Run key, Part 7<\/strong><br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2014\/02\/09\/beyond-good-ol-run-key-part-7\/\">https:\/\/www.hexacorn.com\/blog\/2014\/02\/09\/beyond-good-ol-run-key-part-7\/<\/a><\/p>\n<ul>\n<li>Oasys (Office Automation System) loading %windir%\\system32\\BTLOG.DLL via\n<ul>\n<li>HKLM\\SOFTWARE\\Microsoft\\OASys\\OAClient<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>Beyond good ol\u2019 Run key, Part 8<\/strong><br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2014\/02\/21\/beyond-good-ol-run-key-part-8-2\/\">https:\/\/www.hexacorn.com\/blog\/2014\/02\/21\/beyond-good-ol-run-key-part-8-2\/<\/a><\/p>\n<ul>\n<li>Persistence via Jumplists, including Multiple Link functionality that launches more than one application with one click<\/li>\n<\/ul>\n<p><strong>Beyond good ol\u2019 Run key, Part 9<\/strong><br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2014\/03\/02\/beyond-good-ol-run-key-part-9\/\">https:\/\/www.hexacorn.com\/blog\/2014\/03\/02\/beyond-good-ol-run-key-part-9\/<\/a><\/p>\n<ul>\n<li>Persistence via Pinned Apps pointing to malicious components<\/li>\n<\/ul>\n<p><strong>Beyond good ol\u2019 Run key, Part 10<\/strong><br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2014\/04\/16\/beyond-good-ol-run-key-part-10\/\">https:\/\/www.hexacorn.com\/blog\/2014\/04\/16\/beyond-good-ol-run-key-part-10\/<\/a><\/p>\n<ul>\n<li>HKCU\\Software\\Microsoft\\Office Test\\Special\\Perf (used by <a href=\"http:\/\/researchcenter.paloaltonetworks.com\/2016\/07\/unit42-technical-walkthrough-office-test-persistence-method-used-in-recent-sofacy-attacks\/\">Sofacy<\/a>)<\/li>\n<li>WWLIBcxm.DLL proxy loaded via\n<ul>\n<li>HKCU\\Software\\Microsoft\\Office\\14.0\\Word<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>Beyond good ol\u2019 Run key, Part 11<\/strong><br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2014\/04\/27\/beyond-good-ol-run-key-part-11\/\">https:\/\/www.hexacorn.com\/blog\/2014\/04\/27\/beyond-good-ol-run-key-part-11\/<\/a><\/p>\n<ul>\n<li>Added large repository of autoruns mechanisms\n<ul>\n<li>http:\/\/gladiator-antivirus.com\/forum\/index.php?showtopic=24610<\/li>\n<\/ul>\n<\/li>\n<li>Persistence via modified Environment variables (permanently set inside the Registry)\n<ul>\n<li>HKCU\\Environment<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>Beyond good ol\u2019 Run key, Part 12<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2014\/05\/21\/beyond-good-ol-run-key-part-12\/\">https:\/\/www.hexacorn.com\/blog\/2014\/05\/21\/beyond-good-ol-run-key-part-12\/<\/a><\/p>\n<p>Beyond good ol\u2019 Run key, Part 13<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2014\/06\/18\/beyond-good-ol-run-key-part-13\/\">https:\/\/www.hexacorn.com\/blog\/2014\/06\/18\/beyond-good-ol-run-key-part-13\/<\/a><\/p>\n<p>Beyond good ol\u2019 Run key, Part 14<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2014\/07\/08\/beyond-good-ol-run-key-part-14\/\">https:\/\/www.hexacorn.com\/blog\/2014\/07\/08\/beyond-good-ol-run-key-part-14\/<\/a><\/p>\n<p>Beyond good ol\u2019 Run key, Part 15<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2014\/08\/04\/beyond-good-ol-run-key-part-15\/\">https:\/\/www.hexacorn.com\/blog\/2014\/08\/04\/beyond-good-ol-run-key-part-15\/<\/a><\/p>\n<p>Beyond good ol\u2019 Run key, Part 16<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2014\/08\/27\/beyond-good-ol-run-key-part-16\/\">https:\/\/www.hexacorn.com\/blog\/2014\/08\/27\/beyond-good-ol-run-key-part-16\/<\/a><\/p>\n<p>Beyond good ol\u2019 Run key, Part 17<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2014\/08\/31\/beyond-good-ol-run-key-part-17\/\">https:\/\/www.hexacorn.com\/blog\/2014\/08\/31\/beyond-good-ol-run-key-part-17\/<\/a><\/p>\n<p>Beyond good ol\u2019 Run key, Part 18<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2014\/11\/14\/beyond-good-ol-run-key-part-18\/\">https:\/\/www.hexacorn.com\/blog\/2014\/11\/14\/beyond-good-ol-run-key-part-18\/<\/a><\/p>\n<p>Beyond good ol\u2019 Run key, Part 19<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2014\/12\/04\/beyond-good-ol-run-key-part-19\/\">https:\/\/www.hexacorn.com\/blog\/2014\/12\/04\/beyond-good-ol-run-key-part-19\/<\/a><\/p>\n<p>Beyond good ol\u2019 Run key, Part 20<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2015\/01\/01\/beyond-good-ol-run-key-part-20\/\">https:\/\/www.hexacorn.com\/blog\/2015\/01\/01\/beyond-good-ol-run-key-part-20\/<\/a><\/p>\n<p>Beyond good ol\u2019 Run key, Part 21<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2015\/01\/03\/beyond-good-ol-run-key-part-21\/\">https:\/\/www.hexacorn.com\/blog\/2015\/01\/03\/beyond-good-ol-run-key-part-21\/<\/a><\/p>\n<p>Beyond good ol\u2019 Run key, Part 22<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2015\/01\/06\/beyond-good-ol-run-key-part-22\/\">https:\/\/www.hexacorn.com\/blog\/2015\/01\/06\/beyond-good-ol-run-key-part-22\/<\/a><\/p>\n<p>Beyond good ol\u2019 Run key, Part 23<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2015\/01\/09\/beyond-good-ol-run-key-part-23\/\">https:\/\/www.hexacorn.com\/blog\/2015\/01\/09\/beyond-good-ol-run-key-part-23\/<\/a><\/p>\n<p>Beyond good ol\u2019 Run key, Part 24<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2015\/01\/13\/beyond-good-ol-run-key-part-24\/\">https:\/\/www.hexacorn.com\/blog\/2015\/01\/13\/beyond-good-ol-run-key-part-24\/<\/a><\/p>\n<p>Beyond good ol\u2019 Run key, Part 25<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2015\/01\/28\/beyond-good-ol-run-key-part-25\/\">https:\/\/www.hexacorn.com\/blog\/2015\/01\/28\/beyond-good-ol-run-key-part-25\/<\/a><\/p>\n<p>Beyond good ol\u2019 Run key, Part 26<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2015\/01\/28\/beyond-good-ol-run-key-part-26\/\">https:\/\/www.hexacorn.com\/blog\/2015\/01\/28\/beyond-good-ol-run-key-part-26\/<\/a><\/p>\n<p>Beyond good ol\u2019 Run key, Part 27<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2015\/02\/19\/beyond-good-ol-run-key-part-27\/\">https:\/\/www.hexacorn.com\/blog\/2015\/02\/19\/beyond-good-ol-run-key-part-27\/<\/a><\/p>\n<p>Beyond good ol\u2019 Run key, Part 28<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2015\/02\/23\/beyond-good-ol-run-key-part-28\/\">https:\/\/www.hexacorn.com\/blog\/2015\/02\/23\/beyond-good-ol-run-key-part-28\/<\/a><\/p>\n<p>Beyond good ol\u2019 Run key, Part 29<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2015\/03\/13\/beyond-good-ol-run-key-part-29\/\">https:\/\/www.hexacorn.com\/blog\/2015\/03\/13\/beyond-good-ol-run-key-part-29\/<\/a><\/p>\n<p>Beyond good ol\u2019 Run key, Part 30<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2015\/04\/26\/beyond-good-ol-run-key-part-30\/\">https:\/\/www.hexacorn.com\/blog\/2015\/04\/26\/beyond-good-ol-run-key-part-30\/<\/a><\/p>\n<p>Beyond good ol\u2019 Run key, Part 31<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2015\/05\/29\/beyond-good-ol-run-key-part-31\/\">https:\/\/www.hexacorn.com\/blog\/2015\/05\/29\/beyond-good-ol-run-key-part-31\/<\/a><\/p>\n<p>Beyond good ol\u2019 Run key, Part 32<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2015\/09\/12\/beyond-good-ol-run-key-part-32\/\">https:\/\/www.hexacorn.com\/blog\/2015\/09\/12\/beyond-good-ol-run-key-part-32\/<\/a><\/p>\n<p>Beyond good ol\u2019 Run key, Part 33<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2015\/10\/20\/beyond-good-ol-run-key-part-33\/\">https:\/\/www.hexacorn.com\/blog\/2015\/10\/20\/beyond-good-ol-run-key-part-33\/<\/a><\/p>\n<p>Beyond good ol\u2019 Run key, Part 34<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2016\/02\/16\/beyond-good-ol-run-key-part-34\/\">https:\/\/www.hexacorn.com\/blog\/2016\/02\/16\/beyond-good-ol-run-key-part-34\/<\/a><\/p>\n<p>Beyond good ol\u2019 Run key, Part 35<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2016\/03\/01\/beyond-good-ol-run-key-part-35\/\">https:\/\/www.hexacorn.com\/blog\/2016\/03\/01\/beyond-good-ol-run-key-part-35\/<\/a><\/p>\n<p>Beyond good ol\u2019 Run key, Part 36<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2016\/03\/10\/beyond-good-ol-run-key-part-36\/\">https:\/\/www.hexacorn.com\/blog\/2016\/03\/10\/beyond-good-ol-run-key-part-36\/<\/a><\/p>\n<p>Beyond good ol\u2019 Run key, Part 37<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2016\/03\/26\/beyond-good-ol-run-key-part-37\/\">https:\/\/www.hexacorn.com\/blog\/2016\/03\/26\/beyond-good-ol-run-key-part-37\/<\/a><\/p>\n<p>Beyond good ol\u2019 Run key, Part 38<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2016\/05\/27\/beyond-good-ol-run-key-part-38\/\">https:\/\/www.hexacorn.com\/blog\/2016\/05\/27\/beyond-good-ol-run-key-part-38\/<\/a><\/p>\n<p>Beyond good ol\u2019 Run key, Part 39<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2016\/05\/30\/beyond-good-ol-run-key-part-39\/\">https:\/\/www.hexacorn.com\/blog\/2016\/05\/30\/beyond-good-ol-run-key-part-39\/<\/a><\/p>\n<p>Beyond good ol\u2019 Run key, Part 40<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2016\/06\/02\/beyond-good-ol-run-key-part-40\/\">https:\/\/www.hexacorn.com\/blog\/2016\/06\/02\/beyond-good-ol-run-key-part-40\/<\/a><\/p>\n<p>Beyond good ol\u2019 Run key, Part 41<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2016\/07\/08\/beyond-good-ol-run-key-part-41\/\">https:\/\/www.hexacorn.com\/blog\/2016\/07\/08\/beyond-good-ol-run-key-part-41\/<\/a><\/p>\n<p>Beyond good ol\u2019 Run key, Part 42<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2016\/07\/22\/beyond-good-ol-run-key-part-42\/\">https:\/\/www.hexacorn.com\/blog\/2016\/07\/22\/beyond-good-ol-run-key-part-42\/<\/a><\/p>\n<p>Beyond good ol\u2019 Run key, Part 43<br \/>\n<a href=\"https:\/\/www.hexacorn.com\/blog\/2016\/07\/28\/beyond-good-ol-run-key-part-43\/\">https:\/\/www.hexacorn.com\/blog\/2016\/07\/28\/beyond-good-ol-run-key-part-43\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>ximad pinged me asking if I can make some of the content more readable &#8211; I will think of it and perhaps convert some of this stuff into a PDF, but in the mean time providing a series of links &hellip; <a href=\"https:\/\/www.hexacorn.com\/blog\/2015\/07\/02\/links-to-post-series\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[4],"tags":[],"_links":{"self":[{"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/posts\/3133"}],"collection":[{"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/comments?post=3133"}],"version-history":[{"count":8,"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/posts\/3133\/revisions"}],"predecessor-version":[{"id":3787,"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/posts\/3133\/revisions\/3787"}],"wp:attachment":[{"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/media?parent=3133"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/categories?post=3133"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/tags?post=3133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}