windbg2df


Namewindbg2df JSON
Version 0.10 PyPI version JSON
download
home_pagehttps://github.com/hansalemaos/windbg2df
Summaryprovides a convenient and streamlined approach to analyze Windows processes by converting windbg requests to pandas DataFrames
upload_time2023-07-04 11:57:34
maintainer
docs_urlNone
authorJohannes Fischer
requires_python
licenseMIT
keywords windbg
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            
# provides a convenient and streamlined approach to analyze Windows processes by converting windbg requests to pandas DataFrames

## pip install windbg2df

#### Tested against Windows 10 / Python 3.10 / Anaconda 


### Process analysis: 

It allows users to gather detailed information about a specific process, 
such as loaded modules, handles, and stack traces. This can help in diagnosing 
issues related to process behavior, resource utilization, or memory management.

### Memory region analysis: 

The module enables users to obtain information about specific memory regions within a process. 
This can be useful for identifying memory-related problems, analyzing memory usage patterns, 
or investigating memory leaks.

###  Memory category analysis: 

Users can retrieve information about memory categories using the module. 
This can provide insights into memory allocation patterns, such as the distribution 
of memory across different categories like heap, stack, or virtual memory.

### Integration with external tools: 

The module integrates with tools like 
procdump.exe https://download.sysinternals.com/files/Procdump.zip 
and kd.exe (WinDbg CLI) https://go.microsoft.com/fwlink/?linkid=2237510 
to perform analysis tasks. This allows users 
to leverage the capabilities of these powerful tools without 
directly interacting with them, simplifying the analysis process.

### Data exploration: 

The module returns analysis results in the form of pandas DataFrames, making it 
convenient to manipulate, filter, and visualize the gathered data. 
This facilitates exploratory data analysis and enables users to extract insights efficiently.


```python
     |  ProcDumpAnalyzer(pid, kd_exe='kd.exe', procdump_exe='procdump.exe')
     |  
     |  Class for analyzing process dumps using ProcDump and WinDbg.
     |  
     |  Args:
     |      pid (int): Process ID of the target process.
     |      kd_exe (str): Path to the kd.exe executable. Default is "kd.exe".
     |      procdump_exe (str): Path to the procdump.exe executable. Default is "procdump.exe".
     |  
     |  Attributes:
     |      kd_exe (str): Path to the kd.exe executable.
     |      procdump_exe (str): Path to the procdump.exe executable.
     |      pid (int): Process ID of the target process.
     |      fi: File information object for the process dump.
     |  
     |  Methods:
     |      get_procdump(): Retrieves the process dump using ProcDump and sets the file information.
     |      delete_all_tmp_files(): Deletes all temporary files generated during analysis.
     |      get_lmu_df(): Retrieves the loaded module information from the process dump as a DataFrame.
     |      get_handle_df(): Retrieves the handle information from the process dump as a DataFrame.
     |      get_kv_df(): Retrieves the call stack information from the process dump as a DataFrame.
     |      get_memory_region_df(start_address, end_address): Retrieves the memory region information from the process dump
     |          for the specified address range as a DataFrame.
     |      get_memory_cats_df(): Retrieves the memory categorization information from the process dump as a DataFrame.
     |  
     |  Example:
     |  from windbg2df import ProcDumpAnalyzer
     |  pro = ProcDumpAnalyzer(
     |  pid=12704,
     |  kd_exe=r"C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\kd.exe",
     |  procdump_exe=r"procdump.exe",
     |  ).delete_all_tmp_files().get_procdump()
     |  dflmu = pro.get_lmu_df()
     |  dfhandle = pro.get_handle_df()
     |  dfkv = pro.get_kv_df()
     |  start_address = "00007ff6`1b010000"
     |  end_address = "00007ff6`1b042000"
     |  df = pro.get_memory_region_df(start_address=start_address, end_address=end_address)
     |  dfmem = pro.get_memory_cats_df()
     |  
     |  print(dflmu[:20].to_string())
     |  print(dfhandle[:20].to_string())
     |  print(dfkv[:20].to_string())
     |  print(df[:20].to_string())
     |  print(dfmem[:20].to_string())
     |  
     |  # Output (notepad.exe)
     |  # 0            aa_start             aa_end                   aa_module_name
     |  # 0   00007ff6`1b010000  00007ff6`1b042000            notepad    (deferred)
     |  # 1   00007ffa`67cc0000  00007ffa`67d98000            efswrt     (deferred)
     |  # 2   00007ffa`70ef0000  00007ffa`71174000            comctl32   (deferred)
     |  # 3   00007ffa`71af0000  00007ffa`71b55000            oleacc     (deferred)
     |  # 4   00007ffa`7ae00000  00007ffa`7b0a7000            iertutil   (deferred)
     |  # 5   00007ffa`824c0000  00007ffa`8255b000  TextInputFramework   (deferred)
     |  # 6   00007ffa`833c0000  00007ffa`834d2000            MrmCoreR   (deferred)
     |  # 7   00007ffa`85d80000  00007ffa`85d9b000            mpr        (deferred)
     |  # 8   00007ffa`8e950000  00007ffa`8ec7a000    CoreUIComponents   (deferred)
     |  # 9   00007ffa`8f900000  00007ffa`8fa52000            WinTypes   (deferred)
     |  # 10  00007ffa`91830000  00007ffa`91904000       CoreMessaging   (deferred)
     |  # 11  00007ffa`91c70000  00007ffa`91d09000            uxtheme    (deferred)
     |  # 12  00007ffa`91ec0000  00007ffa`9211a000     twinapi_appcore   (deferred)
     |  # 13  00007ffa`92250000  00007ffa`92279000            rmclient   (deferred)
     |  # 14  00007ffa`92f30000  00007ffa`92f61000            ntmarta    (deferred)
     |  # 15  00007ffa`93ef0000  00007ffa`93f00000            umpdc      (deferred)
     |  # 16  00007ffa`93f00000  00007ffa`93f1e000            profapi    (deferred)
     |  # 17  00007ffa`93f20000  00007ffa`93f6a000            powrprof   (deferred)
     |  # 18  00007ffa`93f70000  00007ffa`93f81000      kernel_appcore   (deferred)
     |  # 19  00007ffa`93fb0000  00007ffa`94031000    bcryptPrimitives   (deferred)
     |  
     |  
     |  
     |  # 0             Handle                  Type
     |  # 0   0000000000000004                 Event
     |  # 1   0000000000000008                 Event
     |  # 2   000000000000000c  WaitCompletionPacket
     |  # 3   0000000000000010          IoCompletion
     |  # 4   0000000000000014       TpWorkerFactory
     |  # 5   0000000000000018               IRTimer
     |  # 6   000000000000001c  WaitCompletionPacket
     |  # 7   0000000000000020               IRTimer
     |  # 8   0000000000000024  WaitCompletionPacket
     |  # 9   0000000000000028
     |  # 10  000000000000002c
     |  # 11  0000000000000030
     |  # 12  0000000000000034             Directory
     |  # 13  0000000000000038                 Event
     |  # 14  000000000000003c                 Event
     |  # 15  0000000000000040                  File
     |  # 16  0000000000000044
     |  # 17  0000000000000048
     |  # 18  000000000000004c             ALPC Port
     |  # 19  0000000000000050
     |  
     |  
     |  
     |  # 0           Child-SP            RetAddr                                                            Args to Child                          Call Site
     |  # 0  000000e0`ed4af6a8  00007ffa`95df3a5d  00000000`00000000 00000000`00000000 0000b99e`00000000 00007ff6`00000001       win32u!NtUserGetMessage+0x14
     |  # 1  000000e0`ed4af6b0  00007ff6`1b01a3e3  00007ff6`1b010000 00000000`0003085c 00000000`00000000 00000000`00000000            user32!GetMessageW+0x2d
     |  # 2  000000e0`ed4af710  00007ff6`1b030347  000001fb`a1e245c0 000001fb`a1e245c2 00000000`00000000 00000000`00000000              notepad!WinMain+0x293
     |  # 3  000000e0`ed4af7e0  00007ffa`96527c24  00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000     notepad!__mainCRTStartup+0x19f
     |  # 4  000000e0`ed4af8a0  00007ffa`970ad721  00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000  kernel32!BaseThreadInitThunk+0x14
     |  # 5  000000e0`ed4af8d0  00000000`00000000  00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000      ntdll!RtlUserThreadStart+0x21
     |  
     |  
     |  
     |  #    aa_address1_hex_block aa_address2_hex_block aa_address_int_block   aa_address_sub      aa_whole_string  aa_Byte_int  aa_2Bytes_int  aa_4Bytes_int        aa_8Bytes_int  aa_4Bytes_float  aa_8Bytes_float aa_string
     |  # 0               00007ff6              1b010000      140694991732736  140694991732736  b'MZ..............'           77          19789     1296911693  2111428794711362893     2.152747e+08    1.552849e-167      b'M'
     |  # 1               00007ff6              1b010000      140694991732736  140694991732737  b'MZ..............'           90          23130     1515870810  2187159913151224410     1.536522e+16    1.830507e-162      b'Z'
     |  # 2               00007ff6              1b010000      140694991732736  140694991732738  b'MZ..............'          144          37008     2425393296  2634764732586823824    -5.702072e-29    1.458565e-132   b'\x90'
     |  # 3               00007ff6              1b010000      140694991732736  140694991732739  b'MZ..............'            0              0              0                    0     0.000000e+00     0.000000e+00       b''
     |  # 4               00007ff6              1b010000      140694991732736  140694991732740  b'MZ..............'            3            771       50529027   217020518514230019     3.850090e-37    3.720974e-294   b'\x03'
     |  # 5               00007ff6              1b010000      140694991732736  140694991732741  b'MZ..............'            0              0              0                    0     0.000000e+00     0.000000e+00       b''
     |  # 6               00007ff6              1b010000      140694991732736  140694991732742  b'MZ..............'            0              0              0                    0     0.000000e+00     0.000000e+00       b''
     |  # 7               00007ff6              1b010000      140694991732736  140694991732743  b'MZ..............'            0              0              0                    0     0.000000e+00     0.000000e+00       b''
     |  # 8               00007ff6              1b010000      140694991732736  140694991732744  b'MZ..............'           64          16448     1077952576  1171006547816366144     3.003922e+00    2.093500e-230      b'@'
     |  # 9               00007ff6              1b010000      140694991732736  140694991732745  b'MZ..............'            0              0              0                    0     0.000000e+00     0.000000e+00       b''
     |  # 10              00007ff6              1b010000      140694991732736  140694991732746  b'MZ..............'            0              0              0                    0     0.000000e+00     0.000000e+00       b''
     |  # 11              00007ff6              1b010000      140694991732736  140694991732747  b'MZ..............'            0              0              0                    0     0.000000e+00     0.000000e+00       b''
     |  # 12              00007ff6              1b010000      140694991732736  140694991732748  b'MZ..............'          255          65535     4294967295  5476377146882523135              NaN     1.255420e+58   b'\xff'
     |  # 13              00007ff6              1b010000      140694991732736  140694991732749  b'MZ..............'          255          65535     4294967295  5476377146882523135              NaN     1.255420e+58   b'\xff'
     |  # 14              00007ff6              1b010000      140694991732736  140694991732750  b'MZ..............'            0              0              0                    0     0.000000e+00     0.000000e+00       b''
     |  # 15              00007ff6              1b010000      140694991732736  140694991732751  b'MZ..............'            0              0              0                    0     0.000000e+00     0.000000e+00       b''
     |  # 16              00007ff6              1b010010      140694991732752  140694991732752  b'........@.......'          184          47288     3099113656  3798989389199620280    -8.808210e-05     1.008224e-54   b'\xb8'
     |  # 17              00007ff6              1b010010      140694991732752  140694991732753  b'........@.......'            0              0              0                    0     0.000000e+00     0.000000e+00       b''
     |  # 18              00007ff6              1b010010      140694991732752  140694991732754  b'........@.......'            0              0              0                    0     0.000000e+00     0.000000e+00       b''
     |  # 19              00007ff6              1b010010      140694991732752  140694991732755  b'........@.......'            0              0              0                    0     0.000000e+00     0.000000e+00       b''
     |  
     |  
     |  # 0  aa_ aa_BaseAddress aa_EndAddress_1 aa_RegionSize      aa_Type     aa_State                   aa_Protect                                                     aa_Usage
     |  # 0    +     0`00000000      0`21c40000    0`21c40000                  MEM_FREE                                                                                      Free
     |  # 1    +     0`21c40000      0`21c41000    0`00001000  MEM_PRIVATE   MEM_COMMIT                                                             <unknown>  [2..........J....]
     |  # 2    +     0`21c41000      0`21c50000    0`0000f000                  MEM_FREE                                                                                      Free
     |  # 3    +     0`21c50000      0`21c51000    0`00001000  MEM_PRIVATE   MEM_COMMIT                                                             <unknown>  [0..........J....]
     |  # 4    +     0`21c51000      0`7ffe0000    0`5e38f000                  MEM_FREE                                                                                      Free
     |  # 5    +     0`7ffe0000      0`7ffe1000    0`00001000  MEM_PRIVATE   MEM_COMMIT                                                             Other      [User Shared Data]
     |  # 6    +     0`7ffe1000      0`7ffe3000    0`00002000                  MEM_FREE                                                                                      Free
     |  # 7    +     0`7ffe3000      0`7ffe4000    0`00001000  MEM_PRIVATE   MEM_COMMIT                                                             <unknown>  [HalT.....9V..P..]
     |  # 8    +     0`7ffe4000     e0`ed430000   e0`6d44c000                  MEM_FREE                                                                                      Free
     |  # 9    +    e0`ed430000     e0`ed49c000    0`0006c000  MEM_PRIVATE  MEM_RESERVE                                                                 Stack      [~0; 31a0.514]
     |  # 10        e0`ed49c000     e0`ed49f000    0`00003000  MEM_PRIVATE   MEM_COMMIT  PAGE_READWRITE | PAGE_GUARD                                    Stack      [~0; 31a0.514]
     |  # 11        e0`ed49f000     e0`ed4b0000    0`00011000  MEM_PRIVATE   MEM_COMMIT                                                                 Stack      [~0; 31a0.514]
     |  # 12   +    e0`ed4b0000     e0`ed600000    0`00150000                  MEM_FREE                                                                                      Free
     |  # 13   +    e0`ed600000     e0`ed61c000    0`0001c000  MEM_PRIVATE  MEM_RESERVE                                                                                 <unknown>
     |  # 14        e0`ed61c000     e0`ed61d000    0`00001000  MEM_PRIVATE   MEM_COMMIT                                                                         PEB        [31a0]
     |  # 15        e0`ed61d000     e0`ed61f000    0`00002000  MEM_PRIVATE   MEM_COMMIT                                                                 TEB        [~0; 31a0.514]
     |  # 16        e0`ed61f000     e0`ed800000    0`001e1000  MEM_PRIVATE  MEM_RESERVE                                                                                 <unknown>
     |  # 17   +    e0`ed800000    1fb`a1c40000  11a`b4440000                  MEM_FREE                                                                                      Free
     |  # 18   +   1fb`a1c40000    1fb`a1c50000    0`00010000   MEM_MAPPED   MEM_COMMIT                               Heap       [ID: 1; Handle: 000001fba1c40000; Type: Segment]
     |  # 19   +   1fb`a1c50000    1fb`a1c54000    0`00004000   MEM_MAPPED   MEM_COMMIT                                                             <unknown>  [.........p...NB.]
     |  
     |  Methods defined here:
     |  
     |  __init__(self, pid, kd_exe='kd.exe', procdump_exe='procdump.exe')
     |      Initialize a ProcDumpAnalyzer object.
     |      
     |      Args:
     |          pid (int): The process ID to analyze.
     |          kd_exe (str): The path to the kd.exe executable (default is "kd.exe").
     |          procdump_exe (str): The path to the procdump.exe executable (default is "procdump.exe").
     |  
     |  delete_all_tmp_files(self)
     |      Delete all temporary files.
     |      
     |      Returns:
     |          ProcDumpAnalyzer: The ProcDumpAnalyzer object.
     |  
     |  get_handle_df(self)
     |      Get the handle information as a DataFrame.
     |      
     |      Returns:
     |          pd.DataFrame: The DataFrame containing the handle information.
     |  
     |  get_kv_df(self)
     |      Get the stack trace information as a DataFrame.
     |      
     |      Returns:
     |          pd.DataFrame: The DataFrame containing the stack trace information.
     |  
     |  get_lmu_df(self)
     |      Get the LMU (Loaded Module List) as a DataFrame.
     |      
     |      Returns:
     |          pd.DataFrame: The DataFrame containing the LMU information.
     |  
     |  get_memory_cats_df(self)
     |      Get the memory categories information as a DataFrame.
     |      
     |      Returns:
     |          pd.DataFrame: The DataFrame containing the memory categories information.
     |  
     |  get_memory_region_df(self, start_address, end_address)
     |      Get the memory region information as a DataFrame for the specified address range.
     |      
     |      Args:
     |          start_address (str): The start address of the memory region.
     |          end_address (str): The end address of the memory region.
     |      
     |      Returns:
     |          pd.DataFrame: The DataFrame containing the memory region information.
     |  
     |  get_procdump(self)
     |      Get the procdump file for the specified process ID.
     |      
     |      Returns:
     |          ProcDumpAnalyzer: The ProcDumpAnalyzer object.
```

            

Raw data

            {
    "_id": null,
    "home_page": "https://github.com/hansalemaos/windbg2df",
    "name": "windbg2df",
    "maintainer": "",
    "docs_url": null,
    "requires_python": "",
    "maintainer_email": "",
    "keywords": "windbg",
    "author": "Johannes Fischer",
    "author_email": "aulasparticularesdealemaosp@gmail.com",
    "download_url": "https://files.pythonhosted.org/packages/46/db/391a927929897db88cb49c78d94ddd3022f0dfc5a1479f0f9bcc03e1288e/windbg2df-0.10.tar.gz",
    "platform": null,
    "description": "\r\n# provides a convenient and streamlined approach to analyze Windows processes by converting windbg requests to pandas DataFrames\r\n\r\n## pip install windbg2df\r\n\r\n#### Tested against Windows 10 / Python 3.10 / Anaconda \r\n\r\n\r\n### Process analysis: \r\n\r\nIt allows users to gather detailed information about a specific process, \r\nsuch as loaded modules, handles, and stack traces. This can help in diagnosing \r\nissues related to process behavior, resource utilization, or memory management.\r\n\r\n### Memory region analysis: \r\n\r\nThe module enables users to obtain information about specific memory regions within a process. \r\nThis can be useful for identifying memory-related problems, analyzing memory usage patterns, \r\nor investigating memory leaks.\r\n\r\n###  Memory category analysis: \r\n\r\nUsers can retrieve information about memory categories using the module. \r\nThis can provide insights into memory allocation patterns, such as the distribution \r\nof memory across different categories like heap, stack, or virtual memory.\r\n\r\n### Integration with external tools: \r\n\r\nThe module integrates with tools like \r\nprocdump.exe https://download.sysinternals.com/files/Procdump.zip \r\nand kd.exe (WinDbg CLI) https://go.microsoft.com/fwlink/?linkid=2237510 \r\nto perform analysis tasks. This allows users \r\nto leverage the capabilities of these powerful tools without \r\ndirectly interacting with them, simplifying the analysis process.\r\n\r\n### Data exploration: \r\n\r\nThe module returns analysis results in the form of pandas DataFrames, making it \r\nconvenient to manipulate, filter, and visualize the gathered data. \r\nThis facilitates exploratory data analysis and enables users to extract insights efficiently.\r\n\r\n\r\n```python\r\n     |  ProcDumpAnalyzer(pid, kd_exe='kd.exe', procdump_exe='procdump.exe')\r\n     |  \r\n     |  Class for analyzing process dumps using ProcDump and WinDbg.\r\n     |  \r\n     |  Args:\r\n     |      pid (int): Process ID of the target process.\r\n     |      kd_exe (str): Path to the kd.exe executable. Default is \"kd.exe\".\r\n     |      procdump_exe (str): Path to the procdump.exe executable. Default is \"procdump.exe\".\r\n     |  \r\n     |  Attributes:\r\n     |      kd_exe (str): Path to the kd.exe executable.\r\n     |      procdump_exe (str): Path to the procdump.exe executable.\r\n     |      pid (int): Process ID of the target process.\r\n     |      fi: File information object for the process dump.\r\n     |  \r\n     |  Methods:\r\n     |      get_procdump(): Retrieves the process dump using ProcDump and sets the file information.\r\n     |      delete_all_tmp_files(): Deletes all temporary files generated during analysis.\r\n     |      get_lmu_df(): Retrieves the loaded module information from the process dump as a DataFrame.\r\n     |      get_handle_df(): Retrieves the handle information from the process dump as a DataFrame.\r\n     |      get_kv_df(): Retrieves the call stack information from the process dump as a DataFrame.\r\n     |      get_memory_region_df(start_address, end_address): Retrieves the memory region information from the process dump\r\n     |          for the specified address range as a DataFrame.\r\n     |      get_memory_cats_df(): Retrieves the memory categorization information from the process dump as a DataFrame.\r\n     |  \r\n     |  Example:\r\n     |  from windbg2df import ProcDumpAnalyzer\r\n     |  pro = ProcDumpAnalyzer(\r\n     |  pid=12704,\r\n     |  kd_exe=r\"C:\\Program Files (x86)\\Windows Kits\\10\\Debuggers\\x64\\kd.exe\",\r\n     |  procdump_exe=r\"procdump.exe\",\r\n     |  ).delete_all_tmp_files().get_procdump()\r\n     |  dflmu = pro.get_lmu_df()\r\n     |  dfhandle = pro.get_handle_df()\r\n     |  dfkv = pro.get_kv_df()\r\n     |  start_address = \"00007ff6`1b010000\"\r\n     |  end_address = \"00007ff6`1b042000\"\r\n     |  df = pro.get_memory_region_df(start_address=start_address, end_address=end_address)\r\n     |  dfmem = pro.get_memory_cats_df()\r\n     |  \r\n     |  print(dflmu[:20].to_string())\r\n     |  print(dfhandle[:20].to_string())\r\n     |  print(dfkv[:20].to_string())\r\n     |  print(df[:20].to_string())\r\n     |  print(dfmem[:20].to_string())\r\n     |  \r\n     |  # Output (notepad.exe)\r\n     |  # 0            aa_start             aa_end                   aa_module_name\r\n     |  # 0   00007ff6`1b010000  00007ff6`1b042000            notepad    (deferred)\r\n     |  # 1   00007ffa`67cc0000  00007ffa`67d98000            efswrt     (deferred)\r\n     |  # 2   00007ffa`70ef0000  00007ffa`71174000            comctl32   (deferred)\r\n     |  # 3   00007ffa`71af0000  00007ffa`71b55000            oleacc     (deferred)\r\n     |  # 4   00007ffa`7ae00000  00007ffa`7b0a7000            iertutil   (deferred)\r\n     |  # 5   00007ffa`824c0000  00007ffa`8255b000  TextInputFramework   (deferred)\r\n     |  # 6   00007ffa`833c0000  00007ffa`834d2000            MrmCoreR   (deferred)\r\n     |  # 7   00007ffa`85d80000  00007ffa`85d9b000            mpr        (deferred)\r\n     |  # 8   00007ffa`8e950000  00007ffa`8ec7a000    CoreUIComponents   (deferred)\r\n     |  # 9   00007ffa`8f900000  00007ffa`8fa52000            WinTypes   (deferred)\r\n     |  # 10  00007ffa`91830000  00007ffa`91904000       CoreMessaging   (deferred)\r\n     |  # 11  00007ffa`91c70000  00007ffa`91d09000            uxtheme    (deferred)\r\n     |  # 12  00007ffa`91ec0000  00007ffa`9211a000     twinapi_appcore   (deferred)\r\n     |  # 13  00007ffa`92250000  00007ffa`92279000            rmclient   (deferred)\r\n     |  # 14  00007ffa`92f30000  00007ffa`92f61000            ntmarta    (deferred)\r\n     |  # 15  00007ffa`93ef0000  00007ffa`93f00000            umpdc      (deferred)\r\n     |  # 16  00007ffa`93f00000  00007ffa`93f1e000            profapi    (deferred)\r\n     |  # 17  00007ffa`93f20000  00007ffa`93f6a000            powrprof   (deferred)\r\n     |  # 18  00007ffa`93f70000  00007ffa`93f81000      kernel_appcore   (deferred)\r\n     |  # 19  00007ffa`93fb0000  00007ffa`94031000    bcryptPrimitives   (deferred)\r\n     |  \r\n     |  \r\n     |  \r\n     |  # 0             Handle                  Type\r\n     |  # 0   0000000000000004                 Event\r\n     |  # 1   0000000000000008                 Event\r\n     |  # 2   000000000000000c  WaitCompletionPacket\r\n     |  # 3   0000000000000010          IoCompletion\r\n     |  # 4   0000000000000014       TpWorkerFactory\r\n     |  # 5   0000000000000018               IRTimer\r\n     |  # 6   000000000000001c  WaitCompletionPacket\r\n     |  # 7   0000000000000020               IRTimer\r\n     |  # 8   0000000000000024  WaitCompletionPacket\r\n     |  # 9   0000000000000028\r\n     |  # 10  000000000000002c\r\n     |  # 11  0000000000000030\r\n     |  # 12  0000000000000034             Directory\r\n     |  # 13  0000000000000038                 Event\r\n     |  # 14  000000000000003c                 Event\r\n     |  # 15  0000000000000040                  File\r\n     |  # 16  0000000000000044\r\n     |  # 17  0000000000000048\r\n     |  # 18  000000000000004c             ALPC Port\r\n     |  # 19  0000000000000050\r\n     |  \r\n     |  \r\n     |  \r\n     |  # 0           Child-SP            RetAddr                                                            Args to Child                          Call Site\r\n     |  # 0  000000e0`ed4af6a8  00007ffa`95df3a5d  00000000`00000000 00000000`00000000 0000b99e`00000000 00007ff6`00000001       win32u!NtUserGetMessage+0x14\r\n     |  # 1  000000e0`ed4af6b0  00007ff6`1b01a3e3  00007ff6`1b010000 00000000`0003085c 00000000`00000000 00000000`00000000            user32!GetMessageW+0x2d\r\n     |  # 2  000000e0`ed4af710  00007ff6`1b030347  000001fb`a1e245c0 000001fb`a1e245c2 00000000`00000000 00000000`00000000              notepad!WinMain+0x293\r\n     |  # 3  000000e0`ed4af7e0  00007ffa`96527c24  00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000     notepad!__mainCRTStartup+0x19f\r\n     |  # 4  000000e0`ed4af8a0  00007ffa`970ad721  00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000  kernel32!BaseThreadInitThunk+0x14\r\n     |  # 5  000000e0`ed4af8d0  00000000`00000000  00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000      ntdll!RtlUserThreadStart+0x21\r\n     |  \r\n     |  \r\n     |  \r\n     |  #    aa_address1_hex_block aa_address2_hex_block aa_address_int_block   aa_address_sub      aa_whole_string  aa_Byte_int  aa_2Bytes_int  aa_4Bytes_int        aa_8Bytes_int  aa_4Bytes_float  aa_8Bytes_float aa_string\r\n     |  # 0               00007ff6              1b010000      140694991732736  140694991732736  b'MZ..............'           77          19789     1296911693  2111428794711362893     2.152747e+08    1.552849e-167      b'M'\r\n     |  # 1               00007ff6              1b010000      140694991732736  140694991732737  b'MZ..............'           90          23130     1515870810  2187159913151224410     1.536522e+16    1.830507e-162      b'Z'\r\n     |  # 2               00007ff6              1b010000      140694991732736  140694991732738  b'MZ..............'          144          37008     2425393296  2634764732586823824    -5.702072e-29    1.458565e-132   b'\\x90'\r\n     |  # 3               00007ff6              1b010000      140694991732736  140694991732739  b'MZ..............'            0              0              0                    0     0.000000e+00     0.000000e+00       b''\r\n     |  # 4               00007ff6              1b010000      140694991732736  140694991732740  b'MZ..............'            3            771       50529027   217020518514230019     3.850090e-37    3.720974e-294   b'\\x03'\r\n     |  # 5               00007ff6              1b010000      140694991732736  140694991732741  b'MZ..............'            0              0              0                    0     0.000000e+00     0.000000e+00       b''\r\n     |  # 6               00007ff6              1b010000      140694991732736  140694991732742  b'MZ..............'            0              0              0                    0     0.000000e+00     0.000000e+00       b''\r\n     |  # 7               00007ff6              1b010000      140694991732736  140694991732743  b'MZ..............'            0              0              0                    0     0.000000e+00     0.000000e+00       b''\r\n     |  # 8               00007ff6              1b010000      140694991732736  140694991732744  b'MZ..............'           64          16448     1077952576  1171006547816366144     3.003922e+00    2.093500e-230      b'@'\r\n     |  # 9               00007ff6              1b010000      140694991732736  140694991732745  b'MZ..............'            0              0              0                    0     0.000000e+00     0.000000e+00       b''\r\n     |  # 10              00007ff6              1b010000      140694991732736  140694991732746  b'MZ..............'            0              0              0                    0     0.000000e+00     0.000000e+00       b''\r\n     |  # 11              00007ff6              1b010000      140694991732736  140694991732747  b'MZ..............'            0              0              0                    0     0.000000e+00     0.000000e+00       b''\r\n     |  # 12              00007ff6              1b010000      140694991732736  140694991732748  b'MZ..............'          255          65535     4294967295  5476377146882523135              NaN     1.255420e+58   b'\\xff'\r\n     |  # 13              00007ff6              1b010000      140694991732736  140694991732749  b'MZ..............'          255          65535     4294967295  5476377146882523135              NaN     1.255420e+58   b'\\xff'\r\n     |  # 14              00007ff6              1b010000      140694991732736  140694991732750  b'MZ..............'            0              0              0                    0     0.000000e+00     0.000000e+00       b''\r\n     |  # 15              00007ff6              1b010000      140694991732736  140694991732751  b'MZ..............'            0              0              0                    0     0.000000e+00     0.000000e+00       b''\r\n     |  # 16              00007ff6              1b010010      140694991732752  140694991732752  b'........@.......'          184          47288     3099113656  3798989389199620280    -8.808210e-05     1.008224e-54   b'\\xb8'\r\n     |  # 17              00007ff6              1b010010      140694991732752  140694991732753  b'........@.......'            0              0              0                    0     0.000000e+00     0.000000e+00       b''\r\n     |  # 18              00007ff6              1b010010      140694991732752  140694991732754  b'........@.......'            0              0              0                    0     0.000000e+00     0.000000e+00       b''\r\n     |  # 19              00007ff6              1b010010      140694991732752  140694991732755  b'........@.......'            0              0              0                    0     0.000000e+00     0.000000e+00       b''\r\n     |  \r\n     |  \r\n     |  # 0  aa_ aa_BaseAddress aa_EndAddress_1 aa_RegionSize      aa_Type     aa_State                   aa_Protect                                                     aa_Usage\r\n     |  # 0    +     0`00000000      0`21c40000    0`21c40000                  MEM_FREE                                                                                      Free\r\n     |  # 1    +     0`21c40000      0`21c41000    0`00001000  MEM_PRIVATE   MEM_COMMIT                                                             <unknown>  [2..........J....]\r\n     |  # 2    +     0`21c41000      0`21c50000    0`0000f000                  MEM_FREE                                                                                      Free\r\n     |  # 3    +     0`21c50000      0`21c51000    0`00001000  MEM_PRIVATE   MEM_COMMIT                                                             <unknown>  [0..........J....]\r\n     |  # 4    +     0`21c51000      0`7ffe0000    0`5e38f000                  MEM_FREE                                                                                      Free\r\n     |  # 5    +     0`7ffe0000      0`7ffe1000    0`00001000  MEM_PRIVATE   MEM_COMMIT                                                             Other      [User Shared Data]\r\n     |  # 6    +     0`7ffe1000      0`7ffe3000    0`00002000                  MEM_FREE                                                                                      Free\r\n     |  # 7    +     0`7ffe3000      0`7ffe4000    0`00001000  MEM_PRIVATE   MEM_COMMIT                                                             <unknown>  [HalT.....9V..P..]\r\n     |  # 8    +     0`7ffe4000     e0`ed430000   e0`6d44c000                  MEM_FREE                                                                                      Free\r\n     |  # 9    +    e0`ed430000     e0`ed49c000    0`0006c000  MEM_PRIVATE  MEM_RESERVE                                                                 Stack      [~0; 31a0.514]\r\n     |  # 10        e0`ed49c000     e0`ed49f000    0`00003000  MEM_PRIVATE   MEM_COMMIT  PAGE_READWRITE | PAGE_GUARD                                    Stack      [~0; 31a0.514]\r\n     |  # 11        e0`ed49f000     e0`ed4b0000    0`00011000  MEM_PRIVATE   MEM_COMMIT                                                                 Stack      [~0; 31a0.514]\r\n     |  # 12   +    e0`ed4b0000     e0`ed600000    0`00150000                  MEM_FREE                                                                                      Free\r\n     |  # 13   +    e0`ed600000     e0`ed61c000    0`0001c000  MEM_PRIVATE  MEM_RESERVE                                                                                 <unknown>\r\n     |  # 14        e0`ed61c000     e0`ed61d000    0`00001000  MEM_PRIVATE   MEM_COMMIT                                                                         PEB        [31a0]\r\n     |  # 15        e0`ed61d000     e0`ed61f000    0`00002000  MEM_PRIVATE   MEM_COMMIT                                                                 TEB        [~0; 31a0.514]\r\n     |  # 16        e0`ed61f000     e0`ed800000    0`001e1000  MEM_PRIVATE  MEM_RESERVE                                                                                 <unknown>\r\n     |  # 17   +    e0`ed800000    1fb`a1c40000  11a`b4440000                  MEM_FREE                                                                                      Free\r\n     |  # 18   +   1fb`a1c40000    1fb`a1c50000    0`00010000   MEM_MAPPED   MEM_COMMIT                               Heap       [ID: 1; Handle: 000001fba1c40000; Type: Segment]\r\n     |  # 19   +   1fb`a1c50000    1fb`a1c54000    0`00004000   MEM_MAPPED   MEM_COMMIT                                                             <unknown>  [.........p...NB.]\r\n     |  \r\n     |  Methods defined here:\r\n     |  \r\n     |  __init__(self, pid, kd_exe='kd.exe', procdump_exe='procdump.exe')\r\n     |      Initialize a ProcDumpAnalyzer object.\r\n     |      \r\n     |      Args:\r\n     |          pid (int): The process ID to analyze.\r\n     |          kd_exe (str): The path to the kd.exe executable (default is \"kd.exe\").\r\n     |          procdump_exe (str): The path to the procdump.exe executable (default is \"procdump.exe\").\r\n     |  \r\n     |  delete_all_tmp_files(self)\r\n     |      Delete all temporary files.\r\n     |      \r\n     |      Returns:\r\n     |          ProcDumpAnalyzer: The ProcDumpAnalyzer object.\r\n     |  \r\n     |  get_handle_df(self)\r\n     |      Get the handle information as a DataFrame.\r\n     |      \r\n     |      Returns:\r\n     |          pd.DataFrame: The DataFrame containing the handle information.\r\n     |  \r\n     |  get_kv_df(self)\r\n     |      Get the stack trace information as a DataFrame.\r\n     |      \r\n     |      Returns:\r\n     |          pd.DataFrame: The DataFrame containing the stack trace information.\r\n     |  \r\n     |  get_lmu_df(self)\r\n     |      Get the LMU (Loaded Module List) as a DataFrame.\r\n     |      \r\n     |      Returns:\r\n     |          pd.DataFrame: The DataFrame containing the LMU information.\r\n     |  \r\n     |  get_memory_cats_df(self)\r\n     |      Get the memory categories information as a DataFrame.\r\n     |      \r\n     |      Returns:\r\n     |          pd.DataFrame: The DataFrame containing the memory categories information.\r\n     |  \r\n     |  get_memory_region_df(self, start_address, end_address)\r\n     |      Get the memory region information as a DataFrame for the specified address range.\r\n     |      \r\n     |      Args:\r\n     |          start_address (str): The start address of the memory region.\r\n     |          end_address (str): The end address of the memory region.\r\n     |      \r\n     |      Returns:\r\n     |          pd.DataFrame: The DataFrame containing the memory region information.\r\n     |  \r\n     |  get_procdump(self)\r\n     |      Get the procdump file for the specified process ID.\r\n     |      \r\n     |      Returns:\r\n     |          ProcDumpAnalyzer: The ProcDumpAnalyzer object.\r\n```\r\n",
    "bugtrack_url": null,
    "license": "MIT",
    "summary": "provides a convenient and streamlined approach to analyze Windows processes by converting windbg requests to pandas DataFrames",
    "version": "0.10",
    "project_urls": {
        "Homepage": "https://github.com/hansalemaos/windbg2df"
    },
    "split_keywords": [
        "windbg"
    ],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "dbe2d49f0482de8e981ac322166f464d65eebd8a64a59ad87124a28522edff87",
                "md5": "c260cb5e78f1556d610741c4db08b868",
                "sha256": "4c51598653c3ec05958bf7eb77dd9ebf11124e926166b09f279eae5777102a52"
            },
            "downloads": -1,
            "filename": "windbg2df-0.10-py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "c260cb5e78f1556d610741c4db08b868",
            "packagetype": "bdist_wheel",
            "python_version": "py3",
            "requires_python": null,
            "size": 40386,
            "upload_time": "2023-07-04T11:57:32",
            "upload_time_iso_8601": "2023-07-04T11:57:32.280302Z",
            "url": "https://files.pythonhosted.org/packages/db/e2/d49f0482de8e981ac322166f464d65eebd8a64a59ad87124a28522edff87/windbg2df-0.10-py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "46db391a927929897db88cb49c78d94ddd3022f0dfc5a1479f0f9bcc03e1288e",
                "md5": "b15a52e91c243b8003e9e54ea433d0f5",
                "sha256": "6ab524145aafc961e83c7aa2596fbd18526f99e3d27f65c09fa2924254ade4bf"
            },
            "downloads": -1,
            "filename": "windbg2df-0.10.tar.gz",
            "has_sig": false,
            "md5_digest": "b15a52e91c243b8003e9e54ea433d0f5",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": null,
            "size": 38812,
            "upload_time": "2023-07-04T11:57:34",
            "upload_time_iso_8601": "2023-07-04T11:57:34.813777Z",
            "url": "https://files.pythonhosted.org/packages/46/db/391a927929897db88cb49c78d94ddd3022f0dfc5a1479f0f9bcc03e1288e/windbg2df-0.10.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2023-07-04 11:57:34",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "hansalemaos",
    "github_project": "windbg2df",
    "travis_ci": false,
    "coveralls": false,
    "github_actions": false,
    "requirements": [],
    "lcname": "windbg2df"
}
        
Elapsed time: 0.12504s