also there is a rule "if there is data from cryptocurrency wallets" or "for all" [+] stealer can now use system proxies. if a proxy is installed on the system, but there is no connection through it, the stealer will try to connect directly (just in case) [+] reduced the load in the admin panel. [+] added...