I wonder what kind of stuff you guys would pick out from victim computers, after your little handy tool got executed within a super pr0 haxx.

The main question would be: Is there any kind of public "database" which shows all registry entries or encrypted file locations of local saved passwords from various games and other software?

Actually i only detect like 5 games by registry and search the users folder for some document names like "credit" or "password".
Next up is reading browser passwords and maybe the windows key, but they'r more like useless.

I'm open to suggestions!