08-05-2020, 03:28 AM
I don't think so. You would need to have the password to decrypt it and get the private keys (the HD mechanism automatically allows to generate and lookup all the addresses and public keys if you have successfully unlocked / decrypted it with the correct password).
There is an example file here: https://github.com/gurnec/btcrecover/blo...wallet.aes
and of course all you can see is random data (althrough there is some "metadata" in the file, like salts/iv etc).
The data is encrypted and therefore you would need to decrypt it first to "see" the content.
There might be other (even log) files around your system that might kind of reveal some info, especially if it's true you used 2 wallets and already the timestamps could reveal some info (see https://github.com/hashcat/hashcat/issue...-662353053). If there is an outgoing transaction from one wallet/address and a new MultiBit wallet was just generated some minutes before, they might be related. The timestamp could reveal a lot (and there might be other files too, just install, even the old version of, the software and see what files are created etc).
of course it makes sense to make safe backups of all the important files, before you do any such experiments
There is an example file here: https://github.com/gurnec/btcrecover/blo...wallet.aes
and of course all you can see is random data (althrough there is some "metadata" in the file, like salts/iv etc).
The data is encrypted and therefore you would need to decrypt it first to "see" the content.
There might be other (even log) files around your system that might kind of reveal some info, especially if it's true you used 2 wallets and already the timestamps could reveal some info (see https://github.com/hashcat/hashcat/issue...-662353053). If there is an outgoing transaction from one wallet/address and a new MultiBit wallet was just generated some minutes before, they might be related. The timestamp could reveal a lot (and there might be other files too, just install, even the old version of, the software and see what files are created etc).
of course it makes sense to make safe backups of all the important files, before you do any such experiments