JDownloader2
Appsv1
Author: Matt Dawson
description
JDownloader 2
paths
5 paths
› paths use Windows environment syntax
collection commands
# PowerShell Artifact Collection Script
# Target: JDownloader2
# Run as Administrator
#Requires -RunAsAdministrator
$ErrorActionPreference = "SilentlyContinue"
$DestBase = "D:\Evidence"
# Function to handle artifact collection with robocopy
function Collect-Artifact {
param (
[string]$SourceDir,
[string]$FolderName,
[string]$FileMask = "*"
)
$FullDest = Join-Path -Path $DestBase -ChildPath $FolderName
robocopy "$SourceDir" "$FullDest" "$FileMask" /E /COPY:DAT /R:0 /W:0 /NP /NFL /NDL /NJH /NJS | Out-Null
}
# 1. JDownloader 2.0 Download Lists
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\JDownloader 2.0\cfg"
Collect-Artifact -SourceDir "$UserPath" -FileMask "downloadList*.zip" -FolderName "JDownloader_2_0_Download_Lists"
# 2. JDownloader 2.0 Link Collector
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\JDownloader 2.0\cfg"
Collect-Artifact -SourceDir "$UserPath" -FileMask "linkcollector*.zip" -FolderName "JDownloader_2_0_Link_Collector"
# 3. JDownloader 2.0 General Settings
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\JDownloader 2.0\cfg"
Collect-Artifact -SourceDir "$UserPath" -FileMask "org.jdownloader.settings.GeneralSettings.json" -FolderName "JDownloader_2_0_General_Settings"
# 4. JDownloader 2.0 Link Grabber Settings
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\JDownloader 2.0\cfg"
Collect-Artifact -SourceDir "$UserPath" -FileMask "org.jdownloader.gui.views.linkgrabber.addlinksdialog.LinkgrabberSettings.json" -FolderName "JDownloader_2_0_Link_Grabber_Settings"
# 5. JDownloader 2.0 Proxy Settings
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\JDownloader 2.0\cfg"
Collect-Artifact -SourceDir "$UserPath" -FileMask "org.jdownloader.settings.InternetConnectionSettings.customproxylist.json" -FolderName "JDownloader_2_0_Proxy_Settings"
Write-Host "Collection complete!" -ForegroundColor Green› Save as .ps1 and run as Administrator. Use: powershell -ExecutionPolicy Bypass -File script.ps1
› cyberchef recipes
Open in CyberChef to decode values extracted from this artifact.