The reg keys and scripts it runs basically just searches for mapped drives and in alphabetical order e.g. C:, D:, O:, U: encrypts the data (if the victim user has permission to files in the locations).
So its safe to have AND should have network backups as long as they are not mapped!