• 25 Mar 2024
  • 1 Minute to read
  • Contributors
  • Dark


  • Dark

Article Summary

The Dumper extension provides the ability to do dumping of several forensic artifacts on Windows hosts. It supports a single action, which is to dump.

It supports multiple targets--memory to dump the memory of the host, and mft to dump the MFT of the file sytem to CSV. The extension then automates the ingestion of the resulting dump (and dump metadata) to LimaCharlie's Artifact Ingestion system where it can be downloaded or analyzed, and where you can create D&R rules to automate detections of characteristics of those dumps.


When enabled, dumper will be added to the extensions view inside your organization. It will accept the following parameters:

  • sid - a sensor ID for the host to perform the memory dump
  • target - memory or mft
  • retention - the number of days the memory dump should be retained for (default is 30)
  • ignore_cert - ignore cert errors for payload and collection purposes (default false)

Upon submission of a request, the extension will perform a full memory dump of a host and upload the resulting dumps to LimaCharlie's artifact ingestion system and delete the local dumps afterwards.

Dumper requests can also be made via D&R rules. Here is is example of a D&R rule action that makes a request to Dumper:

- action: extension request
  extension name: ext-dumper
  extension action: request_dump
  extension request:
    target: memory
    sid: <<routing.sid>> 
    retention: 30 #default 30
    ignore_cert: true # default false


The dumper extension does not currently validate that the host has enough available disc space for the memory dump. Although the dumper extension is free, the resulting memory dumps uploaded to LimaCharlie are subject to external logs pricing. This add-on relies on other paid resources (payloads) billed based on usage.

Was this article helpful?

What's Next