dfirhub

FreeDownloadManager

Author: Matt Dawson

description

Free Download Manager

paths

3 paths
AppsFDM Database
C:\Users\%user%\AppData\Local\Free Download Manager\fdm.sqlite

fdm.sqlite shows Torrents, downloads, folder history, auth credentials and more. Will also pull fdm.sqlite in db_backup/

AppsFDM Backup Info
C:\Users\%user%\AppData\Local\Free Download Manager\backup\backup.info

Backup info file - can change backup name from userdata.zip, so could give indication of file name

AppsFDM Database (userdata.zip)
C:\Users\%user%\AppData\Local\Free Download Manager\backup\userdata.zip

fdm.sqlite can also appear in the backup folder in a compressed userdata.zip file

paths use Windows environment syntax

collection commands

# PowerShell Artifact Collection Script
# Target: FreeDownloadManager
# Run as Administrator

#Requires -RunAsAdministrator

$ErrorActionPreference = "SilentlyContinue"
$DestBase = "D:\Evidence"

# Function to handle directory creation and copying
function Collect-Artifact {
    param (
        [string]$SourcePath,
        [string]$FolderName
    )
    $FullDest = Join-Path -Path $DestBase -ChildPath $FolderName
    if (-not (Test-Path -Path $FullDest)) {
        New-Item -ItemType Directory -Path $FullDest -Force | Out-Null
    }
    Copy-Item -Path $SourcePath -Destination $FullDest -Recurse -Force
}

# 1. FDM Database
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\Free Download Manager\"
Collect-Artifact -SourcePath "$UserPath\fdm.sqlite" -FolderName "FDM_Database"

# 2. FDM Backup Info
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\Free Download Manager\backup\"
Collect-Artifact -SourcePath "$UserPath\backup.info" -FolderName "FDM_Backup_Info"

# 3. FDM Database (userdata.zip)
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\Free Download Manager\backup\"
Collect-Artifact -SourcePath "$UserPath\userdata.zip" -FolderName "FDM_Database__userdata_zip_"

Write-Host "Collection complete!" -ForegroundColor Green

Save as .ps1 and run as Administrator. Use: powershell -ExecutionPolicy Bypass -File script.ps1

cyberchef recipes

Open in CyberChef to decode values extracted from this artifact.