Malwarebytes
Antivirusv1.1
Author: Drew Ervin & Kirtan Shah
description
Malwarebytes Data
paths
4 paths
AntivirusMalwareBytes Anti-Malware Logs
C:\ProgramData\Malwarebytes\Malwarebytes Anti-Malware\Logs\mbam-log-*.xmlAntivirusMalwareBytes Anti-Malware Service Logs
C:\ProgramData\Malwarebytes\MBAMService\logs\mbamservice.log*AntivirusMalwareBytes Anti-Malware Scan Logs
C:\Users\%user%\AppData\Roaming\Malwarebytes\Malwarebytes Anti-Malware\Logs\AntivirusMalwareBytes Anti-Malware Scan Results Logs
C:\ProgramData\Malwarebytes\MBAMService\ScanResults› paths use Windows environment syntax
collection commands
# PowerShell Artifact Collection Script
# Target: Malwarebytes
# Run as Administrator
#Requires -RunAsAdministrator
$ErrorActionPreference = "SilentlyContinue"
$DestBase = "D:\Evidence"
# Function to handle directory creation and copying
function Collect-Artifact {
param (
[string]$SourcePath,
[string]$FolderName
)
$FullDest = Join-Path -Path $DestBase -ChildPath $FolderName
if (-not (Test-Path -Path $FullDest)) {
New-Item -ItemType Directory -Path $FullDest -Force | Out-Null
}
Copy-Item -Path $SourcePath -Destination $FullDest -Recurse -Force
}
# 1. MalwareBytes Anti-Malware Logs
Collect-Artifact -SourcePath "C:\ProgramData\Malwarebytes\Malwarebytes Anti-Malware\Logs\\mbam-log-*.xml" -FolderName "MalwareBytes_Anti_Malware_Logs"
# 2. MalwareBytes Anti-Malware Service Logs
Collect-Artifact -SourcePath "C:\ProgramData\Malwarebytes\MBAMService\logs\\mbamservice.log*" -FolderName "MalwareBytes_Anti_Malware_Service_Logs"
# 3. MalwareBytes Anti-Malware Scan Logs
$UserPath = Join-Path $env:USERPROFILE "AppData\Roaming\Malwarebytes\Malwarebytes Anti-Malware\Logs\"
Collect-Artifact -SourcePath "$UserPath\*" -FolderName "MalwareBytes_Anti_Malware_Scan_Logs"
# 4. MalwareBytes Anti-Malware Scan Results Logs
Collect-Artifact -SourcePath "C:\ProgramData\Malwarebytes\MBAMService\ScanResults\*" -FolderName "MalwareBytes_Anti_Malware_Scan_Results_Logs"
Write-Host "Collection complete!" -ForegroundColor Green› Save as .ps1 and run as Administrator. Use: powershell -ExecutionPolicy Bypass -File script.ps1