Daniel3618 Posted April 21, 2013 ID:672358 Share Posted April 21, 2013 I ran a full scan on my computer. A file named "C:\ ... firstrun.png (stolen.data)" appeared in the log file. Rather than show me what was stolen so I could specifically deal with those things, Mbam deleted the file. I changed all the passwords to my email and all accounts involving money. I would have done that either way, but there are a number of things that are in the I kind of care if it gets stolen but not enough to spend another hour changing passwords, like a gaming or forum account. It would be an inconvience to have that taken but I'd just submit a lost account request and get it back within a day or two. If that firstrun.png file was just placed on my desktop instead of deleted, I could have used it as a list of what was comprised and what I should change specifically. That is all. Link to post Share on other sites More sharing options...
exile360 Posted April 21, 2013 ID:672366 Share Posted April 21, 2013 Greetings and welcome The file was not deleted. Whenever Malwarebytes Anti-Malware removes a threat, it creates a backup copy in quarantine. In order to view the contents of the file, you can restore it by visiting the Quarantine tab in Malwarebytes Anti-Malware and using the Restore button, then you can open the PNG file with notepad.If nothing else was found on your system when you ran the scan, I'd recommend getting the system checked further for the presence of infection because unless this was a false positive, some piece of malware created that file. To get your system checked for malware, please follow the instructions posted here. Link to post Share on other sites More sharing options...
exile360 Posted April 21, 2013 ID:672377 Share Posted April 21, 2013 One additional thing I neglected to mention. The data contained within the file itself may actually be encrypted, so it may not be readable as plain text, so the only way to know what type of data the file contains may be to determine what infection created it and find out what type of data that particular threat is programmed to harvest. Link to post Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now