{"id":74016,"date":"2017-05-14T14:25:15","date_gmt":"2017-05-14T21:25:15","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=74016"},"modified":"2025-05-27T20:18:14","modified_gmt":"2025-05-28T03:18:14","slug":"analysis-wannacry-ransomware","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-wannacry-ransomware\/","title":{"rendered":"Further Analysis of WannaCry Ransomware"},"content":{"rendered":"<p>McAfee Labs has closely monitored the activity around the ransomware WannaCry. Many sources have reported on this attack and its behavior, including <a href=\"https:\/\/securingtomorrow.mcafee.com\/business\/analysis-wannacry-ransomware-outbreak\/\">this post<\/a> by McAfee\u2019s Raj Samani and Christiaan Beek and <a href=\"https:\/\/securingtomorrow.mcafee.com\/executive-perspectives\/wannacry-old-worms-new\/\">this post <\/a>by Steve Grobman. In the last 24 hours, we have learned more about this malware. These findings mainly concern the malware\u2019s network propagation, Bitcoin activity, and differences in observed variants.<\/p>\n<h2>Malware network behavior<\/h2>\n<p>WannaCry uses the MS17-010 exploit to spread to other machines through NetBIOS. The malware contains exploits in its body that are used during the exploitation phase.\u00a0These are related to CVE-2017-0143, CVE-2017-0144, CVE-2017-0145, CVE-2017-0146, CVE-2017-0147, and CVE-2017-0148, all based on the MS17-10 security bulletin.<\/p>\n<p>In many reports we read that the malware generates a list of internal IPs. We found that the malware generates random IP addresses, not limited to the local network. The following is an example attempt at propagation:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-74023 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-1.png\" alt=\"\" width=\"636\" height=\"343\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-1.png 636w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-1-300x162.png 300w\" sizes=\"auto, (max-width: 636px) 100vw, 636px\" \/><\/a><\/p>\n<p>With this, the malware can spread not only to other machines in same network, but also across the Internet if sites allow NetBIOS packets from outside networks. This could be one reason for the widespread infection seen in this outbreak and why many people are unsure about the initial infection vector of the malware.<\/p>\n<p>Another interesting characteristic of the malware is that once a machine with an open NetBIOS port is found, the malware will send three NetBIOS session setup packets to it. One has the proper IP of the machine being exploited, and the other two contain two IP addresses hardcoded in the malware body:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-74024 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-2.png\" alt=\"\" width=\"553\" height=\"116\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-2.png 553w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-2-300x63.png 300w\" sizes=\"auto, (max-width: 553px) 100vw, 553px\" \/><\/a><\/p>\n<p>The preceding packet contains the IP of the machine being exploited. It uses the test network 192.168.0.0\/24. The other two packets, below, contain different IPs that the malware has in its code:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-3.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-74025 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-3.png\" alt=\"\" width=\"611\" height=\"131\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-3.png 611w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-3-300x64.png 300w\" sizes=\"auto, (max-width: 611px) 100vw, 611px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-4.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-74026 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-4.png\" alt=\"\" width=\"552\" height=\"131\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-4.png 552w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-4-300x71.png 300w\" sizes=\"auto, (max-width: 552px) 100vw, 552px\" \/><\/a><\/p>\n<p>This activity and the presence of two hardcoded IP addresses (192.168.56.20, 172.16.99.5) could be used to detect the exploit using network intrusion prevention systems.<\/p>\n<p>Server message block (SMB) packets also contain the encrypted payload, which consists of exploit shellcode and the file launcher.dll. During our analysis, we found the malware is encrypted using a 4-byte XOR key, 0x45BF6313.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-5.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-74027 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-5.png\" alt=\"\" width=\"817\" height=\"323\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-5.png 817w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-5-300x119.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-5-768x304.png 768w\" sizes=\"auto, (max-width: 817px) 100vw, 817px\" \/><\/a><\/p>\n<p><em>Encrypted payload with the key 0x45BF6313.<\/em><\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-6.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-74028 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-6.png\" alt=\"\" width=\"825\" height=\"441\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-6.png 825w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-6-300x160.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-6-768x411.png 768w\" sizes=\"auto, (max-width: 825px) 100vw, 825px\" \/><\/a><\/p>\n<p><em>Decrypted launcher.dll payload.<\/em><\/p>\n<p>We also found following x64 shellcode being transferred during network communication over SMB.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-7.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-74029 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-7.png\" alt=\"\" width=\"650\" height=\"576\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-7.png 650w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-7-300x266.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-7-564x500.png 564w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/a><\/p>\n<p><em>EternalBlue code.<\/em><\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-8.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-74030 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-8.jpg\" alt=\"\" width=\"618\" height=\"234\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-8.jpg 618w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-8-300x114.jpg 300w\" sizes=\"auto, (max-width: 618px) 100vw, 618px\" \/><\/a><\/p>\n<p><em>DoublePulsar code.<\/em><\/p>\n<h2>Worm behavior<\/h2>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-A.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-74043 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-A.png\" alt=\"\" width=\"1086\" height=\"342\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-A.png 1086w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-A-300x94.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-A-768x242.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-A-1024x322.png 1024w\" sizes=\"auto, (max-width: 1086px) 100vw, 1086px\" \/><\/a><\/p>\n<p><em>Machine A at left, Machine B at right.\u00a0<\/em><\/p>\n<p>The infection flow to the vulnerable host (Machine B).<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-B.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-74044 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-B.png\" alt=\"\" width=\"1071\" height=\"646\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-B.png 1071w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-B-300x181.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-B-768x463.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-B-1024x618.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-B-829x500.png 829w\" sizes=\"auto, (max-width: 1071px) 100vw, 1071px\" \/><\/a><\/p>\n<p><em>Kernel mode at left, user mode at right.<\/em><\/p>\n<p>&nbsp;<\/p>\n<h2>Infection using kernel exploit<\/h2>\n<p>In our analysis, we found that on infected machines the SMB driver srv2.sys is vulnerable in kernel module and is exploited by the malware to spread using SMB communication.<\/p>\n<p>A compromised srv2.sys will inject launcher.dll into the user-mode process lsass.exe, which acts as the loader for mssecsvc.exe. This DLL contains only one export, PlayGame:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-9.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-74031 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-9.png\" alt=\"\" width=\"347\" height=\"317\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-9.png 347w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-9-300x274.png 300w\" sizes=\"auto, (max-width: 347px) 100vw, 347px\" \/><\/a><\/p>\n<p>The code simply extracts the ransomware dropper from the resource shown previously, and starts it using the function CreateProcess:<\/p>\n<p><strong><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-10.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-74032 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-10.png\" alt=\"\" width=\"440\" height=\"791\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-10.png 440w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-10-167x300.png 167w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-10-278x500.png 278w\" sizes=\"auto, (max-width: 440px) 100vw, 440px\" \/><\/a>\u00a0<\/strong><\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-11.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-74033 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-11.png\" alt=\"\" width=\"549\" height=\"242\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-11.png 549w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-11-300x132.png 300w\" sizes=\"auto, (max-width: 549px) 100vw, 549px\" \/><\/a><\/p>\n<p><em>Injected launcher.dll in the lsass.exe address space. <\/em><\/p>\n<h1><\/h1>\n<h2>Malware variants in the wild<\/h2>\n<p>As reported by <a href=\"https:\/\/www.ncsc.gov.uk\/blog-post\/finding-kill-switch-stop-spread-ransomware-0\">several sources<\/a>, the malware dropper contains code to check to two specific domains before executing its ransomware or the network exploit codes.<\/p>\n<ul>\n<li>hxxp:\/\/www[dot]iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea[dot]com<\/li>\n<li>hxxp:\/\/www[dot]ifferfsodp9ifjaposdfjhgosurijfaewrwergwea[dot]com<\/li>\n<\/ul>\n<p>While looking for more samples in our malware database, we came across several other droppers (MD5: 509C41EC97BB81B0567B059AA2F50FE8) that did not exhibit this same behavior. These other droppers did not have the code to exploit machines through NetBIOS or to check for the kill-switch domain. With these samples, the ransomware code would be executed in all cases.<\/p>\n<p>These samples were found in the wild, which means they are capable of infecting and spreading, but in a much less aggressive way. Once the ransomware infects a machine, it also tries to infect any network shares mounted as local disks. Anyone accessing these shares could execute the malware sample by mistake and infect themselves. This infection vector is not as effective as the network exploit but could nonetheless wreak havoc in a corporate environment.<\/p>\n<p>We also examined the droppers (for example, MD5: DB349B97C37D22F5EA1D1841E3C89EB4) that had the exploit code to compare with the other samples. We found that this exploit-aware dropper is a wrapper around the other droppers.<\/p>\n<p>Looking at the exploit-aware sample, we found that one of the resources contains a 3.4MB .exe file that is the same as the other type of droppers:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-12.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-74034 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-12.png\" alt=\"\" width=\"926\" height=\"319\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-12.png 926w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-12-300x103.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-12-768x265.png 768w\" sizes=\"auto, (max-width: 926px) 100vw, 926px\" \/><\/a><\/p>\n<p>The preceding resource is extracted after the remote host is exploited and sent to the victim and installed as a service. This event starts the infection on the remote machine.<\/p>\n<h2>File decryption<\/h2>\n<p>WannaCry offers free decryption for some random number of files in the folder C:\\McAfee\\&lt;random folder name&gt;\\f.wnry. We have seen 10 files decrypted for free.<\/p>\n<p>In the first step, the malware checks the header of each encrypted file. Once successful, it calls the decryption routine, and decrypts all the files listed in C:\\McAfee\\&lt;random folder name&gt;\\ f.wnry.<\/p>\n<p>A code snippet of the header check:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-13.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-74035 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-13.png\" alt=\"\" width=\"890\" height=\"299\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-13.png 890w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-13-300x101.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-13-768x258.png 768w\" sizes=\"auto, (max-width: 890px) 100vw, 890px\" \/><\/a><\/p>\n<p>The format of the encrypted file:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-14.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-74036 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-14.png\" alt=\"\" width=\"627\" height=\"333\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-14.png 627w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-14-300x159.png 300w\" sizes=\"auto, (max-width: 627px) 100vw, 627px\" \/><\/a><\/p>\n<p>To decrypt all the files on an infected machine we need the file 00000000.dky, which contains the decryption keys. The decryption routine for the key and original file follows:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-15.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-74037 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-15.png\" alt=\"\" width=\"886\" height=\"409\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-15.png 886w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-15-300x138.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-15-768x355.png 768w\" sizes=\"auto, (max-width: 886px) 100vw, 886px\" \/><\/a><\/p>\n<h2>Bitcoin activity<\/h2>\n<p>WannaCry uses three Bitcoin wallets to receive payments from its victims. Looking at the payment activity for these wallets gives us an idea of how much money the attackers have made.<\/p>\n<p>The current statistics as of May 13 show that not many people have paid to recover their files:<\/p>\n<ul>\n<li>Wallet 12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw<\/li>\n<li><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-16.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-74038 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-16.png\" alt=\"\" width=\"1083\" height=\"149\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-16.png 1083w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-16-300x41.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-16-768x106.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-16-1024x141.png 1024w\" sizes=\"auto, (max-width: 1083px) 100vw, 1083px\" \/><\/a><\/li>\n<li>Wallet 13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94<\/li>\n<li><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-17.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-74040 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-17.png\" alt=\"\" width=\"1093\" height=\"158\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-17.png 1093w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-17-300x43.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-17-768x111.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-17-1024x148.png 1024w\" sizes=\"auto, (max-width: 1093px) 100vw, 1093px\" \/><\/a><\/li>\n<li>Wallet 115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn<\/li>\n<li><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-18.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-74039 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-18.png\" alt=\"\" width=\"1075\" height=\"161\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-18.png 1075w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-18-300x45.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-18-768x115.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-18-1024x153.png 1024w\" sizes=\"auto, (max-width: 1075px) 100vw, 1075px\" \/><\/a><\/li>\n<\/ul>\n<p>The attackers appear to have earned a little over BTC 15.44 (US$27,724.22). That is not much considering the number of infected machines, but these numbers are increasing and might become much higher in the next few days. It\u2019s possible that the sink holing of two sites may have helped slow things down:<\/p>\n<ul>\n<li>hxxp:\/\/www[dot]iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea[dot]com<\/li>\n<li>hxxp:\/\/www[dot]ifferfsodp9ifjaposdfjhgosurijfaewrwergwea[dot]com<\/li>\n<\/ul>\n<p>Multiple organizations across more than 90 countries have been impacted, according to reports.<\/p>\n<p>We will update this blog as we learn more.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>McAfee Labs has closely monitored the activity around the ransomware WannaCry. Many sources have reported on this attack and its&#8230;<\/p>\n","protected":false},"author":695,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[76,180,4549,5012],"coauthors":[4136],"class_list":["post-74016","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-cybercrime","tag-malware","tag-ransomware","tag-wannacry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Further Analysis of WannaCry Ransomware | McAfee Blog<\/title>\n<meta name=\"description\" content=\"McAfee Labs has closely monitored the activity around the ransomware WannaCry. Many sources have reported on this attack and its behavior, including this\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Further Analysis of WannaCry Ransomware | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"McAfee Labs has closely monitored the activity around the ransomware WannaCry. Many sources have reported on this attack and its behavior, including this\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-wannacry-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-14T21:25:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-28T03:18:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"636\" \/>\n\t<meta property=\"og:image:height\" content=\"343\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-wannacry-ransomware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-wannacry-ransomware\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"Further Analysis of WannaCry Ransomware\",\"datePublished\":\"2017-05-14T21:25:15+00:00\",\"dateModified\":\"2025-05-28T03:18:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-wannacry-ransomware\/\"},\"wordCount\":1049,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-wannacry-ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-1.png\",\"keywords\":[\"cybercrime\",\"malware\",\"ransomware\",\"WannaCry\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-wannacry-ransomware\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-wannacry-ransomware\/\",\"name\":\"Further Analysis of WannaCry Ransomware | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-wannacry-ransomware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-wannacry-ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-1.png\",\"datePublished\":\"2017-05-14T21:25:15+00:00\",\"dateModified\":\"2025-05-28T03:18:14+00:00\",\"description\":\"McAfee Labs has closely monitored the activity around the ransomware WannaCry. Many sources have reported on this attack and its behavior, including this\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-wannacry-ransomware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-wannacry-ransomware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-wannacry-ransomware\/#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-1.png\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-wannacry-ransomware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Further Analysis of WannaCry Ransomware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Further Analysis of WannaCry Ransomware | McAfee Blog","description":"McAfee Labs has closely monitored the activity around the ransomware WannaCry. Many sources have reported on this attack and its behavior, including this","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Further Analysis of WannaCry Ransomware | McAfee Blog","og_description":"McAfee Labs has closely monitored the activity around the ransomware WannaCry. Many sources have reported on this attack and its behavior, including this","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-wannacry-ransomware\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2017-05-14T21:25:15+00:00","article_modified_time":"2025-05-28T03:18:14+00:00","og_image":[{"width":636,"height":343,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-1.png","type":"image\/png"}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-wannacry-ransomware\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-wannacry-ransomware\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"Further Analysis of WannaCry Ransomware","datePublished":"2017-05-14T21:25:15+00:00","dateModified":"2025-05-28T03:18:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-wannacry-ransomware\/"},"wordCount":1049,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-wannacry-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-1.png","keywords":["cybercrime","malware","ransomware","WannaCry"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-wannacry-ransomware\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-wannacry-ransomware\/","name":"Further Analysis of WannaCry Ransomware | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-wannacry-ransomware\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-wannacry-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-1.png","datePublished":"2017-05-14T21:25:15+00:00","dateModified":"2025-05-28T03:18:14+00:00","description":"McAfee Labs has closely monitored the activity around the ransomware WannaCry. Many sources have reported on this attack and its behavior, including this","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-wannacry-ransomware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-wannacry-ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-wannacry-ransomware\/#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-1.png","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170514-WannaCry-1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-wannacry-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Further Analysis of WannaCry Ransomware"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/74016","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=74016"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/74016\/revisions"}],"predecessor-version":[{"id":214498,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/74016\/revisions\/214498"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=74016"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=74016"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=74016"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=74016"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}