Splashtop
Appsv2
Author: Andrew Rathbun, Yogesh Khatri, Evangelos Dragonas
description
Splashtop
paths
4 paths
SoftwareSplashtop Log Files
C:\Program Files*\Splashtop\Splashtop Remote\Server\logCollects logs for Splashtop
SoftwareSplashtop Log Files in ProgramData
C:\ProgramData\Splashtop\Temp\logCollects logs for Splashtop
SoftwareSplashtop Gateway Log Files
C:\Program Files*\Splashtop\Splashtop Remote\Splashtop Gateway\logCollects logs for Splashtop Gateway
SoftwareSplashtop Enterprise/Business(legacy) Log Files in ProgramData
C:\ProgramData\Splashtop\Splashtop Remote Client for ST*\*\logCollects logs for Splashtop Enterprise/Business(legacy)
› paths use Windows environment syntax
collection commands
# PowerShell Artifact Collection Script
# Target: Splashtop
# Run as Administrator
#Requires -RunAsAdministrator
$ErrorActionPreference = "SilentlyContinue"
$DestBase = "D:\Evidence"
# Function to handle directory creation and copying
function Collect-Artifact {
param (
[string]$SourcePath,
[string]$FolderName
)
$FullDest = Join-Path -Path $DestBase -ChildPath $FolderName
if (-not (Test-Path -Path $FullDest)) {
New-Item -ItemType Directory -Path $FullDest -Force | Out-Null
}
Copy-Item -Path $SourcePath -Destination $FullDest -Recurse -Force
}
# 1. Splashtop Log Files
Collect-Artifact -SourcePath "C:\Program Files*\Splashtop\Splashtop Remote\Server\log\*" -FolderName "Splashtop_Log_Files"
# 2. Splashtop Log Files in ProgramData
Collect-Artifact -SourcePath "C:\ProgramData\Splashtop\Temp\log\*" -FolderName "Splashtop_Log_Files_in_ProgramData"
# 3. Splashtop Gateway Log Files
Collect-Artifact -SourcePath "C:\Program Files*\Splashtop\Splashtop Remote\Splashtop Gateway\log\*" -FolderName "Splashtop_Gateway_Log_Files"
# 4. Splashtop Enterprise/Business(legacy) Log Files in ProgramData
Collect-Artifact -SourcePath "C:\ProgramData\Splashtop\Splashtop Remote Client for ST*\*\log\*" -FolderName "Splashtop_Enterprise_Business_legacy__Log_Files_in_ProgramData"
Write-Host "Collection complete!" -ForegroundColor Green› Save as .ps1 and run as Administrator. Use: powershell -ExecutionPolicy Bypass -File script.ps1