Most valuable data on your system for a malware author is login cookies and saved auth tokens of various services.
But it is true that work and personal machines have different threat vectors.
Most valuable data on your system for a malware author is login cookies and saved auth tokens of various services.