TrendMicro
Author: Drew Ervin, Paul Cabon CERT Almond
description
Trend Micro Data
paths
4 paths
AntivirusTrend Micro Logs
C:\ProgramData\Trend Micro\AntivirusTrend Micro Security Agent Report Logs
C:\Program Files*\Trend Micro\Security Agent\Report\*.logAntivirusTrend Micro Security Agent Connection Logs
C:\Program Files*\Trend Micro\Security Agent\ConnLog\*.logAntivirusTrend Micro Quarantine
C:\Program Files*\Trend Micro\*\Quarantine\*› paths use Windows environment syntax
collection commands
# PowerShell Artifact Collection Script
# Target: TrendMicro
# Run as Administrator
#Requires -RunAsAdministrator
$ErrorActionPreference = "SilentlyContinue"
$DestBase = "D:\Evidence"
# Function to handle directory creation and copying
function Collect-Artifact {
param (
[string]$SourcePath,
[string]$FolderName
)
$FullDest = Join-Path -Path $DestBase -ChildPath $FolderName
if (-not (Test-Path -Path $FullDest)) {
New-Item -ItemType Directory -Path $FullDest -Force | Out-Null
}
Copy-Item -Path $SourcePath -Destination $FullDest -Recurse -Force
}
# 1. Trend Micro Logs
Collect-Artifact -SourcePath "C:\ProgramData\Trend Micro\\*" -FolderName "Trend_Micro_Logs"
# 2. Trend Micro Security Agent Report Logs
Collect-Artifact -SourcePath "C:\Program Files*\Trend Micro\Security Agent\Report\\*.log" -FolderName "Trend_Micro_Security_Agent_Report_Logs"
# 3. Trend Micro Security Agent Connection Logs
Collect-Artifact -SourcePath "C:\Program Files*\Trend Micro\Security Agent\ConnLog\\*.log" -FolderName "Trend_Micro_Security_Agent_Connection_Logs"
# 4. Trend Micro Quarantine
Collect-Artifact -SourcePath "C:\Program Files*\Trend Micro\*\Quarantine\\*" -FolderName "Trend_Micro_Quarantine"
Write-Host "Collection complete!" -ForegroundColor Green› Save as .ps1 and run as Administrator. Use: powershell -ExecutionPolicy Bypass -File script.ps1