Google Chrome:

Chrome Passwords are stored in a SQLite file the sites name and sites
username is in clear text but the password is seeded in a Triple DES
algorithm. The file is called Web Data and is stored in the following

XP – C:Documents and SettingsUsernameLocal SettingsApplication DataGoogleChromeUser DataDefault

Vista – C:UsersUsernameAppdataLocalGoogleChromeUser DataDefault


Note- I have just realised the new version of trillian the passwords made be stored/encrypted differently.

Trillian Passwords are stored in .ini files the first character of
the password is encrypted with XOR with the key 243 then the password is
converted into hex. The file is based on what the password is for so if
it was icq it would be icq.ini (for new versions I think they are all
stored in a file called accounts.ini or something similar if you open it
up with notepad you will see all the data + the encrypted password).
The files are stored in the following location:

XP (old version) – C:Program FilesTrillianusers

XP (new version) – C:Documents and SettingsUsernameLocal
SettingsApplication DataTrillianuserglobal – I am not sure on exact
but it is somewhere there.

Vista (old version)- C:Program FilesTrillianusers

Vista (new version)- C:UsersUsernameAppdataRoamingTrillianusergl obal

MSN /Windows Live Messenger:

MSN Messenger version 7.x: The passwords are stored under HKEY_CURRENT_USERSoftwareMicrosoftIdentityCRLC reds[AccountName]

Windows Live Messenger version 8.x/9.x: The passwords are stored in
the Credentials file, with entry name begins with “WindowsLive:name=”.
They a set of Win API functions (Credential API’s) to store its’
security data (Credentials). These functions store user information,
such as names and passwords for the accounts (Windows Live ID
credentials). Windows Live ID Credential records are controlled by the
operating system for each user and for each session. They are attached
to the “target name” and “type”. If you are familiar with SQL you can
think of target name and type as the primary key. Table below lists most
frequently used fields in Windows Live ID Credential records.


Paltalk Passwords are using the same password encryption algorithm.
Paltalk passwords are stored in the registry. To encrypt the new
password Paltalk looks at the serial number of the disk C: and performs
a mix with the Nickname. The resulting string is then mixed again with
the password and some other constants. The final string is then encoded
and written to the registry.

AIM, ICQ and Yahoo Messenger passwords that are stored by Paltalk are encoded by BASE64 algorithm.

The passwords are stored in the Registry, under HKEY_CURRENT_USERSoftwarePaltalk[Account Name]

Google Talk:

Google Talk passwords are encoded/decoded using Crypto API. Encrypted
Gmail passwords are stored by Google Talk in the registry under

TalkAccounts[Account Name]


The passwords are stored in one of the following filenames:
signons.txt, signons2.txt, and signons3.txt (depends on Firefox version)

These password files are located inside the profile folder of
Firefox, in [Windows Profile]Application
DataMozillaFirefoxProfiles[Profile Name]

Also, key3.db, located in the same folder, is used for encryption/decription of the passwords.

Yahoo Messenger 6.x:

The password is stored in the Registry, under HKEY_CURRENT_USERSoftwareYahooPager

(”EOptions string” value)

Yahoo Messenger 7.5 or later:

The password is stored in the Registry, under HKEY_CURRENT_USERSoftwareYahooPager – “ETS” value.

The value stored in “ETS” value cannot be recovered back to the original password.


AIM uses Blowfish and base64 algorithms to encrypt the AIM passwords.

448-bit keyword is used to encrypt the password with Blowfish. The
encrypted string is then encoded using base64. The passwords are stored
in the Registry, under HKEY_CURRENT_USERSoftwareAmerica


Passwords are stored in a .xml file located in Filezilla on appdata their is sources for this

Internet Explorer 4.00 – 6.00:

The passwords are stored in a secret location in the Registry known as the “Protected Storage”.

The base key of the Protected Storage is located under the following key:

“HKEY_CURRENT_USERSoftwareMicrosoftProtected Storage System Provider”.

You can browse the above key in the Registry Editor (RegEdit), but
you won’t be able to watch the passwords, because they are encrypted.

Also, this key cannot easily moved from one computer to another, like you do with regular Registry keys.

Internet Explorer 7.00 – 8.00:

The new versions of Internet Explorer stores the passwords in 2 different locations.

AutoComplete passwords are stored in the Registry under

HTTP Authentication passwords are stored in the Credentials file
under Documents and SettingsApplication DataMicrosoftCredentials ,
together with login passwords of LAN computers and other passwords.


The passwords are stored in wand.dat filename, located under [Windows Profile]Application DataOperaOperaprofile

Outlook Express (All Versions):

The POP3/SMTP/IMAP passwords Outlook Express are also stored in the
Protected Storage, like the passwords of old versions of Internet

Outlook 98/2000:

Old versions of Outlook stored the POP3/SMTP/IMAP passwords in the
Protected Storage, like the passwords of old versions of Internet

Outlook 2002-2008:

All new versions of Outlook store the passwords in the same Registry key of the account settings.

The accounts are stored in the Registry under
HKEY_CURRENT_USERMicrosoftWindows NTCurrentVersionWindows Messaging
SubsystemProfiles[ProfileName]9375CFF0413111d3B88A00104B2A6676[Account Index]

If you use Outlook to connect an account on Exchange server, the
password is stored in the Credentials file, together with login
passwords of LAN computers.


The password file is located under [Windows Profile]Application DataThunderbirdProfiles[Profile Name]

You should search a filename with .s extension.


The main password of Digsby is stored in [Windows Profile]Application DataDigsbydigsby.dat

All other passwords are stored in Digsby servers.


Please enter your comment!
Please enter your name here