Skip to content

Crash Dump Information

Evidence: Crash Dump Information
Description: Collect information about crash dumps
Category: System
Platform: windows
Short Name: cdi
Is Parsed: Yes
Sent to Investigation Hub: Yes
Collect File(s): No

When Windows encounters a critical error (BSOD), it can create crash dump files containing system memory and diagnostic information. These dumps come in different formats:

  • Full memory dump (MEMORY.DMP): Complete physical memory
  • Kernel dump: Kernel memory only
  • Minidumps: Small dumps with essential information

Crash dump locations are configured in the registry under HKLM\SYSTEM\CurrentControlSet\Control\CrashControl.

This collector gathers structured data about crash dump information.

FieldDescriptionExample
PathFull path to crash dumpC:\Windows\MEMORY.DMP
MinidumpWhether this is a minidumpFALSE
FileModifiedLast modified timestamp2023-10-15T14:30:00
FileAccessedLast accessed timestamp2023-10-15T15:45:00
FileCreatedCreation timestamp2023-10-15T14:30:00

This collector:

  • Reads crash dump configuration from registry:
    • HKLM\SYSTEM\CurrentControlSet\Control\CrashControl - DumpFile value
    • HKLM\SYSTEM\CurrentControlSet\Control\CrashControl - MinidumpDir value
  • Catalogs dump files (actual collection of large dumps may be optional)
  • Records dump file metadata and timestamps

Crash dumps can reveal system instability issues and rootkit behavior. Investigators use this data to analyze system crash causes, detect rootkit-induced crashes, identify driver bugs or exploitation, analyze kernel memory state, and correlate crashes with malware activity.