diff --git a/windows/threat-protection/wannacrypt-ransomware-worm-targets-out-of-date-systems-wdsi.md b/windows/threat-protection/wannacrypt-ransomware-worm-targets-out-of-date-systems-wdsi.md index 824f7fb880..6d73bea83b 100644 --- a/windows/threat-protection/wannacrypt-ransomware-worm-targets-out-of-date-systems-wdsi.md +++ b/windows/threat-protection/wannacrypt-ransomware-worm-targets-out-of-date-systems-wdsi.md @@ -71,7 +71,7 @@ When run, WannaCrypt creates the following registry keys: It changes the wallpaper to a ransom message by modifying the following registry key: -- *HKCU\Control Panel\Desktop\Wallpaper: '\\@WanaDecryptor@.bmp'* +- *HKCU\Control Panel\Desktop\Wallpaper: '\\\@WanaDecryptor@.bmp'* It creates the following files in the malware's working directory: @@ -134,8 +134,8 @@ It creates the following files in the malware's working directory: WannaCrypt may also create the following files: - *%SystemRoot%\tasksche.exe* -- *%SystemDrive%\intel\\tasksche.exe* -- *%ProgramData%\\tasksche.exe* +- *%SystemDrive%\intel\\\\tasksche.exe* +- *%ProgramData%\\\\tasksche.exe* It may create a randomly named service that has the following associated ImagePath: `cmd.exe /c '\tasksche.exe'`.