- Status
- Offline
- Joined
- Mar 3, 2026
- Messages
- 247
- Reaction score
- 7
Hello Amigos,
Rample is back. I will start releasing some of my projects now.
Today I am dropping my Process-Dumper. It works on every game, regardless of protections like Theia or Hyperion.
Note: A driver is included but it is not Undetected; it is provided strictly for educational purposes to demonstrate the workflow.
ProcessDumper
A tool designed to dump encrypted processes from memory. It monitors pages in real-time, waits for them to decrypt, and reconstructs a working PE file from the memory buffer.
How it works
Features
Usage
Example:
Building:
- Open ProcessDumper.sln in Visual Studio.
- Build ProcessDumper (usermode) and IOCTL Driver (kernel).
- Map the driver with KDMapper before executing the dumper.
Credits:
Import resolution, exception directory fixing, and disk fallback features are inspired by Vulkan @atrexus.
Anyone tested this against more aggressive kernel-level packers? Drop your feedback on the decryption results below.
Rample is back. I will start releasing some of my projects now.
Today I am dropping my Process-Dumper. It works on every game, regardless of protections like Theia or Hyperion.
Note: A driver is included but it is not Undetected; it is provided strictly for educational purposes to demonstrate the workflow.
ProcessDumper
A tool designed to dump encrypted processes from memory. It monitors pages in real-time, waits for them to decrypt, and reconstructs a working PE file from the memory buffer.
How it works
- Kernel driver: Reads memory from the target process directly.
- Page monitor: Watches for NOACCESS pages that transition to readable (decrypted state).
- Reconstruction: Rebuilds the PE with fixed headers, imports, and sections.
- Result: You get a clean .exe dump.
Features
- Kernel driver memory access: Uses an IOCTL driver (mappable with KDMapper) to bypass usermode handle stripping.
- Page decryption monitoring: Catches page transitions from encrypted to readable.
- Import resolution: Scans .rdata, builds a new .rimport section with a proper IAT, and patches call/jmp references.
- Exception directory cleanup: Strips broken RUNTIME_FUNCTION entries.
- Auto-stop threshold: Set a target percentage; the process stops when the dump is sufficiently decrypted.
- Disk file fallback: If a memory read fails, it pulls from the on-disk PE.
Usage
Code:
ProcessDumper.exe <process.exe> [-t threshold]
- -t: Auto-stop at a certain percentage (e.g., 0.5 = 50%). Without this, press F7 to stop manually.
Example:
Code:
ProcessDumper.exe game.exe -t 0.5
Building:
- Open ProcessDumper.sln in Visual Studio.
- Build ProcessDumper (usermode) and IOCTL Driver (kernel).
- Map the driver with KDMapper before executing the dumper.
Credits:
Import resolution, exception directory fixing, and disk fallback features are inspired by Vulkan @atrexus.
Anyone tested this against more aggressive kernel-level packers? Drop your feedback on the decryption results below.