Change Log:
--Faster and reliable directory traversing algorithm in the decryptor (create a new one to take advantage of this).
--If windows logon password is changed, now ransomware creation log will reflect this password as a reminder.
--LAN procedure optimized to perform wake on LAN and LAN spreading in a single pass skipping IP addresses not typically associated with common LAN setups.
--Option to skip C drive in the encryption process. In some systems C drive does not contain important data and in some others it does. So you will have the option to skip it or not.
--On-the-fly encryption of newly connected drives occurring while the encryption process is on its way (like USB drives, memory cards, thumb sticks, etc.). If new drives are connected during this period they will recruited for encryption too. Each newly connected drive will be handled in a separate encryption thread.
--Encryption impersonating system processes using process hollowing (csc.exe in the video, 4 options available):
https://mega.nz/file/YIZRFajL#WpmKwR...O_hHcjVUIzqJVU