Update: When a computer object is obtain the exploit tool will ask if the...
Update: When a computer object is obtain the exploit tool will ask if the hacker want to decipher bank/mail or computer password. (it maybe better to check read permission of files before asking to chose?)