Crash Dump Information

Overview

Evidence: Crash Dump Information Description: Collect information about crash dumps Category: System Platform: windows Short Name: cdi Is Parsed: Yes Sent to Investigation Hub: Yes Collect File(s): No

Background

When Windows encounters a critical error (BSOD), it can create crash dump files containing system memory and diagnostic information. These dumps come in different formats:

  • Full memory dump (MEMORY.DMP): Complete physical memory

  • Kernel dump: Kernel memory only

  • Minidumps: Small dumps with essential information

Crash dump locations are configured in the registry under HKLM\SYSTEM\CurrentControlSet\Control\CrashControl.

Data Collected

This collector gathers structured data about crash dump information.

Crash Dump Information Data

Field
Description
Example

Path

Full path to crash dump

C:\Windows\MEMORY.DMP

Minidump

Whether this is a minidump

FALSE

FileModified

Last modified timestamp

2023-10-15T14:30:00

FileAccessed

Last accessed timestamp

2023-10-15T15:45:00

FileCreated

Creation timestamp

2023-10-15T14:30:00

Collection Method

This collector:

  • Reads crash dump configuration from registry:

    • HKLM\SYSTEM\CurrentControlSet\Control\CrashControl - DumpFile value

    • HKLM\SYSTEM\CurrentControlSet\Control\CrashControl - MinidumpDir value

  • Catalogs dump files (actual collection of large dumps may be optional)

  • Records dump file metadata and timestamps

Forensic Value

Crash dumps can reveal system instability issues and rootkit behavior. Investigators use this data to analyze system crash causes, detect rootkit-induced crashes, identify driver bugs or exploitation, analyze kernel memory state, and correlate crashes with malware activity.

Last updated

Was this helpful?