The ransomware iterates over all drive letters and recursively enumerates the files in each drive and its subfolders, excluding file paths that contain the stringsWindowsandProgram Filesand the folder pathC:\Documents and Settings(the latter folder was replaced in Windows versions later than Windows ...
Windows Exploitation - Advanced List of Awesome Advanced Windows Exploitation References WiFi Arsenal Pack of various useful/useless tools for 802.11 hacking YARA List of awesome YARA rules, tools, and people Hacker Roadmap A guide for amateur pen testers and a collection of hacking tools, resources...
Windows Exploitation - Advanced List of Awesome Advanced Windows Exploitation References WiFi Arsenal Pack of various useful/useless tools for 802.11 hacking YARA List of awesome YARA rules, tools, and people Hacker Roadmap A guide for amateur pen testers and a collection of hacking tools, resources...