ZohoAssist
Appsv1.1
Author: Andrew Rathbun
description
Zoho Assist artifacts
paths
7 paths
› paths use Windows environment syntax
collection commands
# PowerShell Artifact Collection Script
# Target: ZohoAssist
# Run as Administrator
#Requires -RunAsAdministrator
$ErrorActionPreference = "SilentlyContinue"
$DestBase = "D:\Evidence"
# Function to handle artifact collection with robocopy
function Collect-Artifact {
param (
[string]$SourceDir,
[string]$FolderName,
[string]$FileMask = "*"
)
$FullDest = Join-Path -Path $DestBase -ChildPath $FolderName
robocopy "$SourceDir" "$FullDest" "$FileMask" /E /COPY:DAT /R:0 /W:0 /NP /NFL /NDL /NJH /NJS | Out-Null
}
# 1. Zoho Assist log files in AppData\Local
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\ZohoMeeting\log"
Collect-Artifact -SourceDir "$UserPath" -FolderName "Zoho_Assist_log_files_in_AppData_Local"
# 2. Zoho Assist .conf files in AppData\Local
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\ZohoMeeting"
Collect-Artifact -SourceDir "$UserPath" -FileMask "*.conf" -FolderName "Zoho_Assist__conf_files_in_AppData_Local"
# 3. Zoho Assist log files in ProgramData
Collect-Artifact -SourceDir "C:\ProgramData\ZohoMeeting\log" -FolderName "Zoho_Assist_log_files_in_ProgramData"
# 4. Zoho Assist .conf files
Collect-Artifact -SourceDir "C:\ProgramData\ZohoMeeting" -FileMask "*.conf" -FolderName "Zoho_Assist__conf_files"
# 5. Zoho Assist log files in Program Files*
Collect-Artifact -SourceDir "C:\Program Files*\ZohoMeeting\UnAttended\ZohoMeeting\logs" -FolderName "Zoho_Assist_log_files_in_Program_Files_"
# 6. Zoho Assist .conf files in Program Files*
Collect-Artifact -SourceDir "C:\Program Files*\ZohoMeeting\UnAttended\ZohoMeeting" -FileMask "*.conf" -FolderName "Zoho_Assist__conf_files_in__Program_Files_"
# 7. Zoho Assist .txt files in Program Files*
Collect-Artifact -SourceDir "C:\Program Files*\ZohoMeeting\UnAttended\ZohoMeeting" -FileMask "*.txt" -FolderName "Zoho_Assist__txt_files_in__Program_Files_"
Write-Host "Collection complete!" -ForegroundColor Green› Save as .ps1 and run as Administrator. Use: powershell -ExecutionPolicy Bypass -File script.ps1